1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
9

If you have limited means, you...?

Computers and Technology
1 answer:
WITCHER [35]3 years ago
6 0

Answer:

You have very little or limited amounts of an item(s).

Explanation:

You might be interested in
Select the correct answer.
zmey [24]

the answer should be the letter a

3 0
4 years ago
Read 2 more answers
Jennifer has written a short story for children. What should be her last step before she submits the story for publication? A) p
erik [133]
It would be a or c when she is writing a childerns story
5 0
4 years ago
Read 2 more answers
I need help <br> Match each words with its definition!!!<br> Please helpppppppp
satela [25.4K]

Answer:

Top to bottom Answer in order

#1 hardskills

#2 goal

#3 value

#4 soft skills

#5 on the job training

#6 self training

6 0
3 years ago
Source code is one particular representation of a software system. It highlights some details and hides others. This is a good e
grigory [225]

Answer:

Abstraction

Explanation:

Under fundamental principles of software engineering, the term "abstraction" is simply defined as the act of highlighting some details and hiding other ones.

Thus, the correct answer among the options is Abstraction.

8 0
3 years ago
Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
Anit [1.1K]

The answer is IPS (Intrusion Prevention Systems)

The Intrusion Prevention Systems and Intrusion Detection Systems (IDS) are two security technologies that secure networks and are very similar in how they work. The IDS detects unauthorized user activities, attacks, and network compromises, and also alerts. The IPS, on the other hand, as mentioned, is very similar to the IDS, except that in addition to detecting and alerting, it can also takes action to prevent breaches.


3 0
3 years ago
Other questions:
  • The brainly home page uses about 112% of my cpu. (On chromebook) any ideas to help increase performance?
    7·2 answers
  • To maintain audience interest in a multimedia presentation, use animations or transition features to control when objects or tex
    13·1 answer
  • Which one of the following is NOT true about energy conversion devices? Group of answer choices Total Energy Input = Energy Diss
    8·1 answer
  • What two units are used to measure the frequency and amplitude of a sound wave?
    10·1 answer
  • Why does Zoologist have no work experience in a related occupation?
    5·1 answer
  • Oracion con punto focal​
    6·1 answer
  • Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
    14·1 answer
  • All of the following are characteristics of a 4 year college except
    11·2 answers
  • A palindrome is a string that reads the same from left to right and from right to left. Design an algorithm to find the minimum
    15·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!