1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
12

Wilt short answer of the folWhat is an operating systeme te ay maglia​

Computers and Technology
1 answer:
Mamont248 [21]3 years ago
6 0

Answer:

well it game

Explanation:

its gamw because you have to be smart with word njbhjvkgv

You might be interested in
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
4 years ago
Read 2 more answers
What happens to weather patterns when a cold front approaches? What happens to
matrenka [14]

Answer:

The overview including its problem is listed in the explanation segment following.

Explanation:

  • The cool, unobstructed front develops whenever the cool front overwhelms the warm side or front.
  • The warm front increases over its colder, then gradually move towards the surface of the earth.

The subsequent weather system seems to be close to something like a moving warmer front.

So that the above seems to be the right answer.

4 0
3 years ago
What is the biggest difference between technical communication and the other kinds of writing you have done?
lukranit [14]

Answer:

 The main difference between the technical communication and the other different kinds of communication is that as follow:

  • In technical communication, the data or information must be specific and to the point. On the other hand, in general communication there is no such boundary for the conversation.
  • The content of the technical conversation should be in proper and systematic format and in general communication there is no such formatting required.
  • The technical communication always focus on the audience and main purpose of the conversation as compared to general communication.

3 0
3 years ago
Columns are most useful for which tasks ?
amid [387]
Laying out newsletters and creating a visual appeal without images
5 0
3 years ago
_______ is defined as a state of periodic or chronic impairment detrimental to the individual and society.
aleksandrvk [35]
I believe the answer is addiction. 
8 0
4 years ago
Read 2 more answers
Other questions:
  • Using data from the BITS database, define a view named TopLevelClient. It consists of the number, name, address, balance, and cr
    9·1 answer
  • Which term describes the order of arrangement of files and folders on a computer?
    10·1 answer
  • A constructor: A. always accepts two arguments B. has return type of void C. has the same name as the class D. always has an acc
    9·1 answer
  • Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
    5·1 answer
  • The four compass points can be abbreviated by single-letter strings as "N", "E", "S", and "W". Write a function turn_clockwise t
    15·1 answer
  • Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or
    7·1 answer
  • Cuales fueron las consecuencias que creo el storm worm (gusano storm, el informatico)??
    5·1 answer
  • MR. Tom asked her students could they plant a flower and bring it to class. Sarah brought his flower and said it was a rose. Jam
    6·1 answer
  • Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should NOT
    10·1 answer
  • What are the answers to these Python programs
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!