1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
10

Mha ship what yo fave

Computers and Technology
2 answers:
olga55 [171]3 years ago
5 0

Answer:

both of them are my fav

Explanation:

Diano4ka-milaya [45]3 years ago
4 0

Answer:

umm the first one I think..? lol

You might be interested in
URGENT!!! Which statement is true with regard to bitmap images?
liberstina [14]

Answer:

<u><em>D. You can modify colors easily and quickly.</em></u>

Explanation:

8 0
3 years ago
Read 2 more answers
Check
Ne4ueva [31]

Answer:

B,C,E :)

Explanation:

8 0
3 years ago
When a network mask is applied to any ip address on the network, the result is the ip address' network part followed by zeros?
joja [24]
Yes.








-----------------------------------------------------------------------------------
4 0
4 years ago
Explain 2 ways in which data can be protected in a home computer??
Nonamiya [84]

Answer:

The cloud provides a viable backup option. ...

Anti-malware protection is a must. ...

Make your old computers' hard drives unreadable. ...

Install operating system updates. ...

3 0
3 years ago
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
Other questions:
  • Write an application that encodes English-language phrases into pig Latin. Pig Latin is a form of coded language. There are many
    8·1 answer
  • How old do you have to be to get paid to wave at liberty tax in Abilene tx
    8·2 answers
  • All spreadsheet formula should start with
    12·1 answer
  • What is the value of vals[4][1]? double[][] vals = {{1.1, 1.3, 1.5}, {3.1, 3.3, 3.5}, {5.1, 5.3, 5.5}, {7.1, 7.3, 7.5}};
    6·1 answer
  • Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3.
    11·1 answer
  • Do yall play games..............................................................................................................
    8·2 answers
  • Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
    9·1 answer
  • Habilidades de la alfabetizacion digital?
    12·1 answer
  • Need answer ASAP!!!!
    7·1 answer
  • These statements describe guidelines for the use of tables in presentations.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!