1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
9

The muscle in Lane's arm would best be described as which of the following

Computers and Technology
1 answer:
agasfer [191]3 years ago
6 0
Where’s the pic of the answer options?
You might be interested in
Check all of the file types that a Slides presentation can be downloaded as.
GuDViN [60]

Answer:

.JPEG

.PDF

.pptx

General Concepts:

<u>Google</u>

  • Slides has an option to download a wide multitude of formats

Explanation:

If we go into File, and then under Download, we should be able to see which file types that a Slides presentation can be downloaded as.

Attached below is an image of the options.

4 0
3 years ago
Read 2 more answers
Use the table on the right to convert from binary to decimal.
postnew [5]

Answer:

There is no table, so I can only comment on the statements:

The binary value of decimal 10 is A.  ==> False, however A is a hexadecimal representation of 10.

The binary value of decimal 13 is 1001  ==> False, 13 would be 1101.

The binary value of decimal 15 is 1111.  ==> True.

The binary value of decimal 14 is E. ==> Again E is a hexadecimal representation of 14.

7 0
2 years ago
Read 2 more answers
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
Hoochie [10]

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

4 0
3 years ago
Please answer this question​
RSB [31]

Answer:

what is the other language

is it Assamese clarify me in the comment section bro

4 0
3 years ago
010101010101011101011
sattari [20]
Whatwhatwhatwhat???????????
6 0
3 years ago
Other questions:
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • The IBM nine-track tapes that became the industry standard for storage for three decades had several sizes , the most common bei
    13·1 answer
  • When entering data in Access if the data is entered using an Access form, that data is stored in a table or tables. TRUE FALSE
    12·1 answer
  • Difrent between computer and computer system​
    9·1 answer
  • What is true about super computers?
    15·1 answer
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • Explain the concept of conditional formatting​
    9·1 answer
  • EXPLAIN WHY CRYPTOCURRENCIES ARE NOT RELIABLE.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!