1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
13

Hello my name is Phoenix I will like for you to friend me on Ro blox my user name is Jessiahcoleman and if u play BLOX fruits or

something ill help u
Computers and Technology
1 answer:
hjlf3 years ago
5 0

Answer:

Free Points?

Explanation:

and my name is TSM_Holden23 if u ever want to play with me on ps4

You might be interested in
at the grocery store alexa by 1 1/3 lb of ground turkey nasha by two times as much ground turkey is alexa how much ground turkey
Alexeev081 [22]
tasha buys 2 2/3 much ground turkey
8 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
____ is an iterative software development process that focuses on team productivity and delivers software best practices to all
cluponka [151]

Answer:

RUP

Explanation:

RUP or Rational Unified Process is an IBM's software that divides the development process in four phases. It was developed to work throughout the entire software development life cycle, it's adaptive.

I hope you find this information useful and interesting! Good luck!

5 0
3 years ago
You need to prevent the use of tftp through your firewall. which port would you block?
xz_007 [3.2K]
Hello <span>Huber5598 </span>


Question: <span>You need to prevent the use of tftp through your firewall. which port would you block?
</span><span>
Answer: You should block UDP port 69 to block TFTP


I Hope This Helps You :-)
-Chris</span>
4 0
3 years ago
Which of the following statements expresses why the following code is considered bad form? for (rate = 5; years-- &gt; 0; System
OlgaM077 [116]

Answer:

l and ll only that is the answer

7 0
3 years ago
Read 2 more answers
Other questions:
  • Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
    13·1 answer
  • Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read
    6·1 answer
  • Which of the following is not a main function within end user support?
    13·1 answer
  • What is a project?
    5·2 answers
  • Which of the following is NOT one of the Big 3 Google Applications that we discussed?
    9·2 answers
  • The average price of milk increased from $3.00 last year to $3.50 this year. This is most likely due to:
    14·1 answer
  • The right to make others do things is referred to as _________.
    14·2 answers
  • What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
    6·1 answer
  • If im downloading a game at 4mb/s how many minutes would it take to download 25 GB
    14·2 answers
  • Write a program that reads in exam scores and displays the average score and the high score.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!