1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
3 years ago
6

Which is the correct option?

Computers and Technology
1 answer:
Murljashka [212]3 years ago
3 0

Answer:

C

Explanation:

Key logging is when a hacker can track every key u have clicked.

You might be interested in
Which of the following translates packets so that the node can understand them once they enter through a port?
podryga [215]
Hi
D)A NICHappy to assist you!
8 0
3 years ago
Read 2 more answers
Write a family database program. Create a class to represent a person and to store references to the person’s mother, father, an
Gennadij [26K]

Do you go to BASIS?

Sorry I don't have an answer for you, but we have the same assignment in our AP Comp sci class.

Just wondering.

8 0
3 years ago
Which is the best video games​
Travka [436]

Answer:

overwatch and dead by daylight

5 0
3 years ago
Read 2 more answers
A store sells rope only in whole-foot increments. Given three lengths of rope, in feet, the following code segment is intended t
Lynna [10]

Answer:

The answer is "option B".

Explanation:

In the given code, four double variable "len1, len2, len3, and total" is declared, in which the first three variables accept some value, and in the total variable, we add those variable. In the next step, an integer variable minLength is defined, which converts the decimal value to an integer and adds the value that is "0.5". In this section, the code uses as an intended purpose but only if the total of 3 lengths is equivalent to or larger then 0.5, and wrong choices can be described as follows:

  • In option A, It accepts the negative value, that's why it is wrong.
  • Option C, Option D, and Option E all were wrong because the code segment is work as intended.
5 0
3 years ago
What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
Ostrovityanka [42]
Some of the disadvantages of using layered protocols are the redundancy and overall lower performance.
Reimplementing everything from remote and wired to connectionless and association situated application correspondence, with each ringer and shriek of BGP, MPLS, multicast steering and so on would be a gigantic endeavor and potentially unmanageable in this solid across the board convention. I could envision specialty utilize situations where most extreme execution is imperative most importantly where an exceptionally basic framework might be wanted.
8 0
3 years ago
Other questions:
  • Which keyboard feature is a form feed character?
    14·1 answer
  • Which of the following commands is more recommended while creating a bot?
    9·1 answer
  • The 3 parts of the CPU are
    15·2 answers
  • How to get out of the verify your identity page on a dell laptop because it won’t let me
    13·1 answer
  • What refrigerant has been approved for new household refrigerators and freezers
    14·1 answer
  • What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co
    11·1 answer
  • Fire Tint, Inc., (FTI), applies tint to airplane canopies (front windows) manufactured by other companies. When the canopy manuf
    12·1 answer
  • What are the answers for edhesive quiz 2? I can’t add more than 1 photo...
    11·1 answer
  • Write a C++ Programm in which inheritance is used
    7·1 answer
  • Who is responsible for the actions of autonomous systems? (please help me :C)
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!