1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
12

Security attacks are classified as either passive or aggressive. True or false

Computers and Technology
1 answer:
kogti [31]3 years ago
3 0

Answer:

false is the answer okkkkkkkkkkkkkkkk

You might be interested in
WILL GIVE BRAINLIEST!! NO LINKS!!!
anyanavicka [17]

Answer:

Maybe try a different charger, and if that works, your phone may have an issue..

Explanation:

Sometimes cords just.. don't work right if you use 'em long enough.

7 0
3 years ago
Read 2 more answers
How desktop case or chassis designed?, material and steps?​
MariettaO [177]

They may require things such as plastic cut outs and glass depending if you want to be able to have a window to look into the pc. Some cases are 3D Printed although they have to be joined by screws at the end due to the fact that one whole print can take over a week and then it has to be well doesn't but looks better when sanded.

3 0
2 years ago
What does modulate your voice mean
alexandr1967 [171]
To modulate your voice is to modify or gain more control of your voice. It basically means to change or adjust the pitch or tone.
7 0
4 years ago
Read 2 more answers
Which option is an example of a Boolean operator?<br> O A. HTML<br> O B. <br> C. SEO<br> D. NOT
gayaneshka [121]

Answer:

D

Explanation:

Boolean Operators are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine or exclude keywords in a search, resulting in more focused and productive results. ... Proximity Operators (with, near and others) can also help you in searching. See Using Proximity Operators for more details and examples.

8 0
3 years ago
Can you change your username? on this app.
qwelly [4]
I made a new account so yeah
8 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program to calculate how much to tip a waiter person based on the quality of service. The script file should ask for the
    12·1 answer
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • What layer uses the UDP protocol
    6·1 answer
  • Give a big-O estimate the number of operations, where an operation is a comparison or a multiplication, used in this segment of
    10·1 answer
  • my pc wants to run the highest graphics even though I restart it everyday and it gets around 10 fps and I have a 1080 Nvidia gra
    7·1 answer
  • Choose the answer that best completes the statement.
    7·2 answers
  • Which type of variable has a text value
    6·1 answer
  • Which of the following is true about main and secondary memory?
    5·1 answer
  • How do i copy a canvas course from old class to new course.
    12·1 answer
  • What are web site and web page?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!