1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OlgaM077 [116]
3 years ago
13

¿Cuál es la función que cumplía los sofistas y Porque eran tan importantes?​

Computers and Technology
1 answer:
omeli [17]3 years ago
8 0

<em>Los sofistas oradores públicos, bocas a sueldo en una cultura oral. Estaban dotados de habla.</em>

You might be interested in
Printed versions of your presentation that contain the slides and blank lines below are called speakers notes
Vadim26 [7]

No, printed versions of your presentation that contain the slides and blank lines below are not called speakers notes.

Speakers notes are notes that are hidden within a PowerPoint presentation and allowing the speaker to refer back to them during the presentation.

6 0
3 years ago
Read 2 more answers
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
What's a common mistake that young people in relationships make?
allochka39001 [22]
B, i say b because oversharing something personal could result in somebody you thought you loved going back telling someone else, causing rumors to be spread out
3 0
2 years ago
You have implemented a network where each device provides shared files with all other devices, what kind of network is it?
Reil [10]

It is a Peer-to-peer type of network when you have implemented a network where each device provides shared files with all other devices.

So the answer is Peer-to-peer.

8 0
3 years ago
Wikis are designed for ________, which is allowing people to contribute more than just posting a response
Viefleur [7K]

Answer:

collabirations

Explanation

Wikis are designed for collabirations, which is allowing people to contribute more than just posting a response.

4 0
3 years ago
Other questions:
  • Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network thr
    13·1 answer
  • What does cro stand for?
    7·2 answers
  • In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
    6·1 answer
  • Naruto Uzumaki who likes naruto ??? who waches it??
    14·2 answers
  • Gleick believes that the book is
    8·1 answer
  • CMS is a content management system that collects, organization, publishes, and manages creative content. Right...?
    9·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • Why are there more producers then consumers?​
    6·2 answers
  • Enhancement of job satisfaction and productivity are key characteristics of which theoretical perspective of work design? ​
    6·1 answer
  • Range paramters - for loop<br> question in picture
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!