1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gogolik [260]
3 years ago
9

PLEASE HELP I WILL MEDAL AND FAN!

Computers and Technology
2 answers:
PilotLPTM [1.2K]3 years ago
5 0

Thanks! That is very nice of you to answer them all!

ladessa [460]3 years ago
4 0
Hi!

Question 1: George W. Bush.

Question 2: I'm pretty sure it's excessive use of force.

Question 3: About 25 percent.

Question 4: True.

Question 5: To ensure the safety of officers and inmates and to punish those who break the rules.

Question 6: I believe it is false.

Question 7: True.

Question 12: John F. Kennedy.

Question 13: I believe it's False.

Question 15: False.

That's all I know!
You might be interested in
In Microsoft Access, what happens when you save a query once and run it but then add more to the query? What will happen? a)erro
Usimov [2.4K]
D)When the query is run again, the data that meets the new criteria will be retrieved.
5 0
3 years ago
During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move
Troyanec [42]

Answer:

Make sure the cables are functional and properly plugged.

Explanation:

For the fact that everything was working perfectly before the move, but after the move, it was noticed that a few workstations cannot get a valid IP, the first thing that is required to be checked is to ensure that the cables are properly plugged, and if they are, make sure that you test for the functionality of the cables. It is only after these checks and the problem persist, that further troubleshooting is required.

5 0
3 years ago
Which of these devices is usually the default for most home network?
lora16 [44]

Answer:

there are no mutiple choices

5 0
3 years ago
Knowledge management software helps companies preserve the knowledge gained through the use of information so that future users
V125BC [204]

Answer:True

Explanation:

Knowledge Management (KM) software is software that assists with the identification, creation, distribution, and organization of a company’s knowledge pool. KM software, at its best, gives a company a single, unified pool of information that is easily

(1) accessible

(2) discoverable

(3) updated

KM software is meant to make companies leaner, efficient, and more profitable. But a number of challenges exist which make that easier said than done. Let’s look at a few of the primary challenges that make KM software so important for businesses—but so difficult to get right.

8 0
3 years ago
Read 2 more answers
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
Other questions:
  • Why isn't my rank move from ambitious to virsto i met all the requirements
    8·2 answers
  • Consider this program segment: int newNum = 0, temp; int num = k; // k is some predefined integer value 0 while (num > 10) {
    9·1 answer
  • A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin
    6·1 answer
  • Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for com
    15·1 answer
  • When replacing a system board in a laptop, which feature is a must?
    10·1 answer
  • (fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
    13·1 answer
  • Who is the first British in Europe ​
    10·1 answer
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • Five varieties of software​
    13·1 answer
  • What refers to a set of instructions executed in order?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!