1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
14

Consider the following method.

Computers and Technology
1 answer:
larisa86 [58]3 years ago
6 0
Thank you please answer my other questions from today
You might be interested in
Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
scZoUnD [109]

Answer:

Firewalls

Explanation:

A firewall is simply a network security system whose main duty is. to prevent unwanted access to. private network.

Firewalls is measures to protect your computer against threats from human actions.

It is also the one singular thing that prevents you from accessing the file on your friends system.

5 0
3 years ago
Which option describes wearable technology?
kotykmax [81]
My opinion is the answers A and D. I would choose A if you can only choose one, though.
7 0
3 years ago
Read 2 more answers
A_________is an orderly collection of fact & information.
sammy [17]

Answer:

C. Database

Explanation:

4 0
3 years ago
EXERCISE
nirvana33 [79]

Answer:

1. True

2. True

3. False

4. True

5. True

8 0
2 years ago
Which computer program did these companies use? fb, Microsoft, Google, LinkedIn​
Verdich [7]

Answer:most of the computer campanies use java script, phyton, c++ or c sharp .

Explanation:

5 0
3 years ago
Other questions:
  • Yesterday Hunter's laptop screen appeared to go black. The laptop was still running, but he could not see the desktop or any gra
    9·1 answer
  • We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack
    15·1 answer
  • Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method sh
    13·1 answer
  • Does anyone take bca on plato
    11·1 answer
  • What are the advantages of businesses using Twitter ?
    12·1 answer
  • IT investments can lead to developing IT capabilities and dynamic IT competencies, which can lead to achieving the following six
    5·1 answer
  • If a code word is defined to be a sequence of different letters chosen from the 10 letters A, B, C, D, E, F, G, H, I, and J, wha
    15·1 answer
  • Who is a second-degree contact on a professional networking profile?
    12·1 answer
  • It is an island country; it fought against us in World War II; it is known for sushi.
    14·2 answers
  • What is technology? *
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!