1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mkey [24]
3 years ago
14

Select the correct answer.

Computers and Technology
1 answer:
S_A_V [24]3 years ago
5 0
I think the answer is b
You might be interested in
How do you change your age on here? I accidentally put that i was 15 but i am only 13. How do I change this?
oksano4ka [1.4K]
I honestly don't think they can or just change your account from what I know of I just tried just now to see for you. I think you jus gotta leave it lol. I'm 13 too I lit myself 16
5 0
3 years ago
What is installing?
Bess [88]

Answer:

The process of putting a new software on a computer.

Explanation:

<em><u>Installing</u></em> is the process of putting a new software on a computer.

<em><u>Updating</u></em> is process of replacing an older version of software with a newer version.

3 0
2 years ago
BRAINLY, WHY CAN'T I COMMENT ANYMORE(what did I do to deserve this)
Crank

Answer:

Did you write something inappropriate

Explanation:

4 0
3 years ago
Read 2 more answers
Which statement about the Paste Link option is true?
zaharov [31]
A statement that is true for the Paste Link option is that you always need the source file to make automatic  updates in the linked document. All info in the linked document is based on the source file so it is an absolute necessity.
7 0
4 years ago
Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
-BARSIC- [3]

Answer:

Option B i.e., False.

Explanation:

The weakness, KRACK tricks a wifi access points to reuse an in-use encryption, enabling the intruder to decode and interpret data intended to remain encrypted. Wireless communication encrypts, that decrypt unencrypted wireless network activity and expose sensitive data.

So, the following scenario is false about the wireless attack.

6 0
3 years ago
Other questions:
  • What does CPC stand for?
    6·2 answers
  • A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217)
    11·1 answer
  • Write a function named get_my_age that returns your age as an int (this is YOUR age, so if you were 21 you would return the numb
    11·1 answer
  • What is the outside of an iPhone called?
    9·2 answers
  • Universal Containers (UC) has a great user interface for their Customer Community Knowledge Base. UC has multiple Communities an
    15·1 answer
  • Which of these is not considered by economists to be a want?
    8·1 answer
  • Which job qualifications are typical for someone who wants to work in Information Support and Services?
    8·2 answers
  • Which of the following can technology NOT do?
    12·1 answer
  • A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryptio
    12·1 answer
  • Which operating system is used by most the supercomputer system in the world
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!