1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
3 years ago
14

Which of the following statements is correct?

Computers and Technology
2 answers:
quester [9]3 years ago
4 0

Answer:

hmm... sorry I don't know

Reil [10]3 years ago
4 0
C is the best answer
You might be interested in
What are two examples of ways an electronic record may be distributed to others
lions [1.4K]

Explanation:

Two ways an electronic record may be distributed are e-mail or printing and publishing to others.

6 0
3 years ago
Top 10 web hosting sites ?
swat32
I have only 5 so hope it helps.

1. bluehost
2. HostGator
3. GoDaddy
4. network solutions
5. web.com
7 0
3 years ago
Read 2 more answers
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
OlgaM077 [116]

Answer:

i only have a little that i know sorry,Hope you make this brainly that would make my day

Explanation:

you look for TRUE facts

Things that MAKES sence

Things that are ONLY what you are research.

Thats all that i Know

3 0
3 years ago
Read 2 more answers
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. W
Dahasolnce [82]

Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

<h3>What is standardized protocol?</h3>

Standardized protocols is known to be the one that gives room for people or clients to communicate with any given window manager.

Note that in the above case, Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

Learn more about standardized protocol from

brainly.com/question/14672166

#SPJ1

8 0
2 years ago
Insurance can help you:
AleksAgata [21]
The answer is: D for sure 
7 0
4 years ago
Other questions:
  • What do you believe are the motives of a cyber criminal? Why?
    15·1 answer
  • Select the correct answer.
    12·1 answer
  • Two of the people most often credited with the invention of the Internet and WWW respectively are _____.
    14·1 answer
  • Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server? (Points : 5) Unicast DHCPACK
    8·1 answer
  • C was created to work with UNIX systems in1972, and would be the foundation for several other programming languages, including j
    14·1 answer
  • Size of the information in each field of the database
    12·1 answer
  • The national highway system improved economic activity in Georgia by
    6·2 answers
  • Which line of code will find the first occurrence of a three in an array?
    5·2 answers
  • Define a function below, posodd_number_filter, which takes a single numerical argument. Complete the function to return accepted
    10·1 answer
  • One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!