1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
7

question no.3 a. Can someone pls help me

Computers and Technology
1 answer:
ratelena [41]3 years ago
5 0

Answer:

A=1

B=1

C=0

X= OR

Explanation:

A is XOR

B is NOT

C is AND

X is OR

You might be interested in
Which is a type of artificial neural network (ann) that includes many layers to deal with complex problems that may have very la
STALIN [3.7K]

Answer:

Deep Learning

Explanation:

7 0
2 years ago
List of bad websites and why
r-ruslan [8.4K]

Penny Juice – bad design examples.

Blinkee website – bad design example.

Great Dreams I — bad designed website.
8 0
3 years ago
Which best describes the benefits of renting a home?
WARRIOR [948]
The benefits are that you don't have to worry if something breaks from like a water leake or a storm and get destroyed the home owners have to pay
7 0
4 years ago
Read 2 more answers
What is the use of tag in XML sitemap?
podryga [215]

Answer:

It works as a roadmap which tells search engines what content is available on the website and leads search engines to most important pages on the site. The standard XML tag used for sitemaps can be described as a schema and is used by all the major search engines.

Explanation:

mark me brainliest!!

8 0
2 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
Other questions:
  • He would like to get rid of the graph. What will accomplish
    8·1 answer
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • A storyboard is an example of an implementation tool.<br><br> A.<br> True<br><br> B.<br> False
    8·2 answers
  • Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class.
    10·1 answer
  • Molly, a technician, has been tasked with researching an emulator for the software developers to test cross-platform application
    7·1 answer
  • Which sentences in the passage correctly describe a function?
    11·1 answer
  • What is an electronic tool that stores large amounts of data in one place in a systematic, logical way? A Database B Platform C
    5·1 answer
  • These data provides the responses of 10 students in class A and in class B who were asked how many hours they slept lastThese da
    6·1 answer
  • Write a police description a person who know you well​
    12·1 answer
  • Is anyone else excited for sephiroth (I think I spelt it wrong) in smash. And if you arn't are you excited for christmas
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!