1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
7

Please need help ASAP will mark brainliest

Computers and Technology
1 answer:
Levart [38]3 years ago
3 0

Answer:

x8 negakation with a false

You might be interested in
Using ajax technologies and apis, websites and applications can pull information from a variety of sources in order to create __
Mamont248 [21]

Answer:Mashups

Explanation:mashup has several meanings. it used to describe songs that meshed two different styles of music into one song.

It is also used to describe videos that have been compiled using different clips from multiple sources.

mashup also describes a Web application that combines multiple services into a single application.

3 0
3 years ago
A food web is shown below. In this food web, energy is transferred directly from the to the
Irina18 [472]

That answer would be the producer

8 0
3 years ago
9.
Liula [17]

Answer:

128 is ur answer

Explanation:

please mark me as brainilist

5 0
3 years ago
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
Which of the following statements is true of a time management plan? It is work in progress that need to be altered many times?
marusya05 [52]
Cake cake cake cake
3 0
3 years ago
Other questions:
  • convert the following c code to mips. assume the address of base array is associated with $s0, n is associated with $s1, positio
    14·1 answer
  • 1. Write a program to prompt the user to enter a single character and respond back whether or not the character is valid dna. 2.
    12·1 answer
  • Which key is used in word processors to create indentations?
    13·2 answers
  • Please Do Solve it guys...
    6·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • 2:3:5<br>_ _ _<br>3 2 8<br><br><br><br>find ratio​
    5·1 answer
  • Please help with this
    8·1 answer
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
  • Full form of NCP?............
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!