1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
15

Select the correct answer.

Computers and Technology
1 answer:
enyata [817]3 years ago
3 0
It’s B i think, not exactly sure though
You might be interested in
Now, we’re ready to program! Leave the visualizer and go back to https://repl.it/ to write your program. Here is the pseudocode
svlad2 [7]

Answer:

here

Explanation:

6 0
3 years ago
How do i mark a question brainliest?
Slav-nsk [51]

Answer:

You have to have 2 answers on a question.  When you find a question that is pretty reasonable, you should see a little yellow crown.  

Explanation:

Practice on this if you need :D

6 0
3 years ago
Read 2 more answers
Which of the following are pointers? Select all that are correct. hub node router transmission media switch port interconnector
Sphinxa [80]
Hub , switch port , transmission media , hope I helped
4 0
4 years ago
Read 2 more answers
The _______ of the story describes the events that takes place as well as the conflict or problem that must be resolved.
Crank

Answer:

The answer is C the plot.

7 0
3 years ago
How are phishing, ransomware and distributed- denial of service attack alike and different?
Aleks04 [339]

Answer:

Phishing means cyber theft in which the cyber thief sends the target PC a malicious email, which looks like coming from some known source, and they ask for certain critical information, which must not be leaked. Similarly, In ransomware, they send the phishing email with malicious code, and they hack the computer system. They then ask for a ransom as a return for reactivating your PC. Distributed Denial of service attack happens when the traffic flood the bandwidth and the resources of a PC, and finally a lot of are denied of access to them. Ransomware, when it attacks a bank account, becomes a Denial of service attack, as multiple users are stopped from accessing their account. All of these are hence, almost the same and revolves around the phishing email.

Explanation:

Please check the answer.

8 0
3 years ago
Other questions:
  • What is life all about?
    15·2 answers
  • What will happen if you change data that is used in a formula
    10·1 answer
  • Which of the following statements is true?
    14·1 answer
  • 1. When centering one paragraph on a page of text, the user needs to _____.
    15·2 answers
  • Cache memory is a special group of very fast memory circuitry located on or close to the CPU that is used to speed up processing
    13·1 answer
  • What is the unit used to describe the intensity of sound?
    5·1 answer
  • give one word • pressure exerted by a stationary liquid _______. • force in a direction perpendicular to a given surface area __
    9·1 answer
  • Which feature of REPL.it would you use to transmit your program to a friend?
    12·1 answer
  • What is the main difference between cell phone and mobile phone?
    11·2 answers
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!