1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
6

MATH PLZ HELP ITS DUE IN 4 MINUTES​

Computers and Technology
2 answers:
zheka24 [161]3 years ago
8 0

Answer:

2

Explanation:

mel-nik [20]3 years ago
3 0
1 , I think I sorry if it’s incorrect
You might be interested in
A_________is an orderly collection of fact & information.
sammy [17]

Answer:

C. Database

Explanation:

4 0
3 years ago
4. Computer processing work that is split between a desktop computer and a more powerful computer that processes and stores shar
jeyben [28]

Answer:

A. client/server

Explanation:

Beacuse a Server or a client is what hold data for big companies like google and microsoft

7 0
3 years ago
What is the full form of flops​
kobusy [5.1K]

Answer:

<em>Floating Point Operations Per Second</em> (FLOPS)

Explanation:

<em>Floating Point Operations Per Second</em> (FLOPS) is a measure of a computer’s performance, especially in fields of scientific calculations that make heavy use of floating-point calculations. Floating-point operations include any operations that involve fractional numbers.

8 0
3 years ago
Read 2 more answers
Traffic flow analysis is classified as which?
Anna35 [415]

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

8 0
3 years ago
In the lab, wireshark continued to capture data in the background until the:
Alex17521 [72]
In the lab, Wireshark continued to capture data in the background until the capture process was manually stopped later in the lab.
Wireshark is a packet analysis tools, it gets the information for traffic passing through a specific network node.

5 0
3 years ago
Other questions:
  • . Once a vulnerability has been identified by Nessus, where would you check for more information regarding the identified vulner
    15·1 answer
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
    13·1 answer
  • Differentiated instruction is designed to educate children through ________ techniques in order to ensure every student is being
    13·1 answer
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • Dante went to change the date for an appointment in his Outlook calendar. He double-clicked in the appointment and made the chan
    11·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • Make this be a 7th grade argument over a boy
    5·2 answers
  • Write a method that makes the input string of sentences ending with and
    11·1 answer
  • What does this comparison block indicate?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!