1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
5

PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT

Computers and Technology
1 answer:
seropon [69]3 years ago
7 0

Answer:

B

Explanation:

I think that is the right answer

You might be interested in
When users talk about font size,
koban [17]

Answer:

The answer is 10......

4 0
3 years ago
Read 2 more answers
5. Create a vector called to20 that goes from 1 to 20 (use the range notation). Now create a variable called end that goes from
Lady_Fox [76]

Answer:

creating vector:

code:  

to20 <-c(1:20) #creating to20 vector

end <-c(40:50) #creating end vector

to50 <-c(to20,21:30,end) # creating to50 vector

print(to50) # printing to50 vector

Explanation:

8 0
3 years ago
How Oracle 12c advances the security discussion?
krok68 [10]

Answer: The oracle 12 c advances are given below.

Explanation:

The oracle 12 c provides the ability to tag the data with the label of data. It provides the classification to the data. This allows to check which data is sensitive and also allows the combination of sensitive data to be combined with the same table as the bigger data without compromising the security of the database.

8 0
4 years ago
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
Using an outline, how do you maintain your computer or cellphone​
daser333 [38]

Answer:

  1. well first things first be good to your battery.
  2. get padded protection of your laptop.
  3. disable programs you don't use.

6 0
3 years ago
Other questions:
  • 9) If you are working on the part of 5-15 minutes, time-stamping (every 30 seconds) should start at: a) [00:05:00] b) [00:00:00]
    9·1 answer
  • When you define a table's primary key, the dbms automatically creates a(n) _____ index on the primary key column(s) you declared
    14·1 answer
  • Why do you think Google+'s engagement levels are so low? Do you think they will rise as people become more familiar with the soc
    12·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • What is the best memory to be used? Why?
    8·1 answer
  • How do i solve this?
    11·1 answer
  • Which generation computer supported GUI operating system?​
    11·1 answer
  • Điền dữ liệu cho cột Phân loại theo điều kiện sau:
    10·1 answer
  • Alguien que me pueda ayudar diciéndome las características de Visual Object en programacion porfavor?!
    6·1 answer
  • are there any hexadecimal digits that cannot be created using 4 bits? how many bits would you need to represent the hexadecimal
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!