1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
3 years ago
8

Bcghxdfghncfghndfgxdfgjfjgktyerdgftguj

Computers and Technology
2 answers:
bixtya [17]3 years ago
5 0
Are you good bro ???
IgorLugansk [536]3 years ago
4 0

Answer:

Okay

Explanation:

You might be interested in
You want to use a terminal program to terminal into a cisco router. what protocol should i use
Inessa05 [86]
The router could be configured to accept telnet, ssh or http.  For terminal use, I'd hope that ssh would work.
6 0
3 years ago
Ron is creating building blocks in Word. How can he make the building blocks that he created available?
daser333 [38]

A) Store those building in Normal template

7 0
3 years ago
Read 2 more answers
Interest accumulated on the principle of a loan must also be paid. The accumulated interest is known as which of the following?
tangare [24]
I think B but idk lol
7 0
3 years ago
4-One possible performance multiplication enhancement is to do a shift and add instead of an actual multiplication. Since 9 * 6,
pychu [463]

Answer:

Check the explanation

Explanation:

The above question can be sovled in the below step by step way:

15 can be written as 16-1 = 24 -1

Therefore, 15 *13 = (24 -1)*13

= 13*24 - 13

Now, when we left shift a number we multiply it by 2k .Where k is no of times we left shifted it.

Therefore, 13*24 = shift 13 to left 4 times

15 * 13 = shift 13 to left 4 times and subtract 13 from it.

3 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Other questions:
  • What types of scientific claims should be verified
    5·1 answer
  • Consider the provided C++ code in the main.cpp file: The function func2 has three parameters of type int, int, and double, say a
    8·1 answer
  • Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre
    8·2 answers
  • The color pattern in which marine organisms are light on the bottom and dark on the top of their bodies camouflaging them agains
    11·1 answer
  • CODE EXAMPLE 3-1 SELECT vendorName, invoiceNumber, invoiceDate, invoiceTotal FROM vendors INNER JOIN invoices ON vendors .vendor
    13·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • How do you customize Track Changes in a text document?
    11·1 answer
  • which of the following memory types cannot store the data for information permanently Ram chachi Flash Memory hard disk​
    8·1 answer
  • 69696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969
    8·1 answer
  • What is computer fundamental ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!