1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
9

Victoria has a .... of playing with her hair when she gets nervous​

Computers and Technology
1 answer:
IrinaK [193]3 years ago
6 0

Answer:

Victoria has a tendency of playing with her hair when she gets nervous.

Explanation:

I believe this is what you are asking for.

:))))

You might be interested in
Dave is a recruiter for a large video and animation firm. He is looking for an employee who is willing to give productive hours
kumpel [21]

Answer:

reliabitlity

Explanation:

3 0
3 years ago
In what way, if any, has community building changed in the age of digital media? People’s community building has not changed in
hichkok12 [17]

Answer:

People are now more willing to share highly personal information with strangers. Match each type of digital health, wellness, and security with examples of potential violations.

5 0
3 years ago
Binary is best interpreted by a computer because ​
Nookie1986 [14]
Because it is the back-end programming. It is the basis of all of the other computer languages and allows the computer to function.
8 0
3 years ago
Read 2 more answers
We can draw crescent using ?
Anarel [89]

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

4 0
3 years ago
Read 2 more answers
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Other questions:
  • Public class Robot
    15·1 answer
  • What is the method for removing a domain controller in windows server 2012 r2?
    15·1 answer
  • Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False
    9·1 answer
  • Can you put iPhone voice memos on repeat?
    6·2 answers
  • Ada lovelace designed the first computer
    7·1 answer
  • If the ____________ is broken on a laptop, chances are other parts are also broken.
    5·1 answer
  • Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
    7·1 answer
  • Romans are credited with “inventing” the capital city l? T or F
    6·1 answer
  • HELP! WILL GIVE BRAINLYEST!
    13·1 answer
  • The Danger zone around a robot is?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!