1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
5

Please help it’s timed

Computers and Technology
1 answer:
Lyrx [107]3 years ago
8 0

Answer:

you are proooooooooooooooooooo

Explanation:

You might be interested in
a _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a
Pachacha [2.7K]

Answer:

(WAN) a wide area network

5 0
3 years ago
The following are sources of secondary data except _________. a libraries b data bases c focus groups d syndicated research e sc
sineoko [7]
<span>d syndicated research</span>
8 0
4 years ago
Describe the difference between a myth and a fable.
WINSTONCH [101]

Answer:

A myth is a story about gods and heroes and how the world came into being while a fable is a story about animals, things, and forces of nature that are meant to give a moral lesson. ... “Myth” comes from the Greek word “mythos” meaning “story” while “fable” comes from the Latin word “fabula” meaning “a narrative or tale."

5 0
3 years ago
What information will you find in the 16-bit field in an IP datagram?
faust18 [17]

Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.

Explanation: Hopefully this helps you with what ever u are doing.

7 0
3 years ago
In what type of attack does the attacker send unauthorized commands directly to a database?
Delvig [45]
SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.
4 0
4 years ago
Other questions:
  • PLEASE HELP! Which aspect helps you to change the luminescence of your image?
    10·2 answers
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • A _____ is an audio output device that converts text to speech.
    15·1 answer
  • Which of the following terms is computed as cash provided by operations less capital expenditures and cash dividends? A : adjust
    5·1 answer
  • Top Down Design makes it easier to solve a problem by:___________
    10·1 answer
  • What features are offered by most of the email programs with for receiving and sending messages?
    10·1 answer
  • Which componet is the smallest unit in a spreadsheet
    15·1 answer
  • Which of these is an example of collective voice?
    8·2 answers
  • What are the best ways to conduct research for a presentation? Check all that apply.
    7·2 answers
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!