1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
14

Nvm nothing Srry :3 <3

Computers and Technology
1 answer:
Temka [501]3 years ago
4 0

Answer:wrong

Explanation:

You might be interested in
Can you please provide sample rexx code?
Aleks04 [339]

Answer:

/*  My first REXX program  */

say 'Hello world'

Explanation:

REXX is an OS/2 scripting language.

7 0
3 years ago
6 external parts of computer
vivado [14]
<span>External computer parts are those that connect to the case, often to provide ways to input or output data.

Here are a 6 examples of external parts:
</span>Monitor
Keyboard
Mouse
Speakers
Printer
External Hard Drives

I hope this has helped you.
6 0
3 years ago
Read 2 more answers
Which loan type requires you to make loan payments while you’re attending school?
LUCKY_DIMON [66]
The answer is student loans
3 0
4 years ago
Read 2 more answers
Which statement is true about a metamorphic rock that was exposed to stress equally from all directions?
Zolol [24]
I think the correct answer from the choices listed above is option B. A  metamorphic rock that was exposed to stress equally from all directions <span>will have all of its mineral crystals aligned in layers. Hope this answers the question. Have a nice day.
</span>
7 0
3 years ago
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
yulyashka [42]

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

4 0
4 years ago
Other questions:
  • A __________ network is good for connecting computer clusters.
    13·2 answers
  • The opening of the throttle plate can be delayed as long as
    13·1 answer
  • What is the size of the opening in the camera that the light passes through?
    9·2 answers
  • Which of the following is an example of a wanted versus I need
    5·1 answer
  • What can Strings store
    15·2 answers
  • Which of the following is not a property of a constructor?A. The name of a constructor can be chosen by the programmerB. A const
    11·1 answer
  • Which type of business is best for Juanita to start? a corporation, because she needs a large investment to get started a sole p
    13·2 answers
  • Team ordering You have the results of a completed round-robin tournament in which n teams played each other once. Each game ende
    15·1 answer
  • Question 1 (10 points)
    8·1 answer
  • Write down the importance of computers in this modern era of information technology in brief.​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!