1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
8

+

Computers and Technology
2 answers:
lord [1]3 years ago
8 0

Answer:

Network Risk Analyst

Explanation:

Edg2021

Its in the AV Tech Notes

quester [9]3 years ago
5 0

Answer:

Network administrator

You might be interested in
How many days till earth ends
expeople1 [14]
Several Billion years
5 0
3 years ago
What's 3+3 and stop deleting my question i just wasted 41 points
bazaltina [42]

Answer:

I am pretty confident that the answer is 6

Explanation:

3+3=6

3 0
3 years ago
Read 2 more answers
Anyone else like hunter x hunter?<br> lets talk abt it uwu<br><br> good day :)
Aleks [24]

Answer:

mid

Explanation:

3 0
3 years ago
Read 2 more answers
PLZ HELP NEEDS TO BE ANSWERED ASAP THANK YOU
Stells [14]

In python:

lst = ([])

largest = 0

while len(lst) != 6:

   user_number = int(input("Enter a number: "))

   lst.append(user_number)

   for i in lst:

       if i > largest:

           largest = i

   print(largest)

I hope this helps

7 0
3 years ago
Patrick is working on a computer that is having wireless network connection issues. Patrick decides that he needs to take the la
Aneli [31]

Answer:

C

Explanation:

Please give me brainliest!

4 0
2 years ago
Other questions:
  • Explain the design and development proccess?
    15·1 answer
  • Stella is a bank executive. She is preparing a spreadsheet on the loan repayment schedules of customers. Which function can she
    9·1 answer
  • Why should social security numbers never be given over the telephone?
    5·1 answer
  • What is the Java source filename extension? What is the Java bytecode filename extension?
    14·1 answer
  • Is there any level after genius?
    8·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
    9·1 answer
  • When activated, an Excel object has all the features of an Excel ______?
    9·2 answers
  • Consider the following recursive method.
    14·1 answer
  • Why are iterators useful?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!