1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
3 years ago
5

Need the answer ASAP!!! I’ll mark brainliest if correct

Computers and Technology
1 answer:
san4es73 [151]3 years ago
7 0

Answer:

update standerds

Explanation:

You might be interested in
Como puedo poner fondo a mi teclado​
nikdorinn [45]

CAN YOU TRANSLATE IT TO ENGLISH PLEASE SO I CAN AWANSER

7 0
3 years ago
Why crt and plasma are not used in laptop ?​
AlekseyPX

Answer:

Plasma monitors are power hungry devices 2 - 3 times more than a CRT monitor making this technology unfit for use in portable devices like laptop computers where batteries are used as the power source. Plasma monitors are extremely susceptible to screen burn.

Explanation: pls mark my answer as brainlist

6 0
3 years ago
What is the result of expression 15 > 10 > 5 in C? What is the result of the same expression in Java?
Inessa05 [86]

Answer:

java: error

C: false

Explanation:

In Java the compiler understand that you are trying to compare an integer (15) with a boolean (10 > 5) this generate the next error:

error: bad operand types for binary operator  

In C the compiler convert (15 > 10 > 5) in (15>10) > (10>5) which is equal to TRUE > TRUE, the compiler can also read it as 1 > 1 (since 1 is TRUE and 0 is FALSE).  like 1>1 is false then C program return false.

5 0
3 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
What does cuda stand for
ludmilkaskok [199]
Compute unified device architecture
6 0
4 years ago
Read 2 more answers
Other questions:
  • Describe the difference between gui and cli​
    9·1 answer
  • 11. In Microsoft Word, when you highlight existing text you want to replace, you're in
    8·1 answer
  • What did the Copernican revolution demonstrate?
    15·1 answer
  • QUESTION 16
    14·1 answer
  • Which of the following is time-dependant? Group of answer choices
    8·1 answer
  • Match the different stages of boot sequence with the order in which they occur.​
    15·2 answers
  • Why does the randomNumber function only use whole numbers between 0 and 1 (basically, 0 and 1)?
    13·1 answer
  • NEED HELP ASAP!!!
    10·1 answer
  • Which key must be pressed in addition to clicking on a hyperlink for it to be followed?
    7·1 answer
  • Four ways to improve the performance of a hard disk include.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!