1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
15

Help plz!! I will mark brainliest

Computers and Technology
2 answers:
Semenov [28]3 years ago
6 0

Answer:i found this

Explanation:

liq [111]3 years ago
6 0
D is my guess. I might be way off because it’s been awhile since I’ve used word
You might be interested in
The content of a text is its
nasty-shy [4]

Text content informs, describes, explains concepts and procedures to our readers

6 0
4 years ago
7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in
Semenov [28]

Answer:

bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn

6 0
2 years ago
list the authours who explained communication, pros and cos, importance of communication and the types of of communication and t
atroni [7]

Answer: the answer is A.

Explanation: hope this helps!

3 0
2 years ago
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
What can be controlled through IoT? Choose four answers.
Maru [420]

<em>The answer is: </em>

<em> </em>

<em>Door locks, light switches, security cameras and desktops (even laptops too) </em>

<em> </em>

<em>When we say Internet of Things, it is basically all objects that can be connected to internet (objects that are parts of our daily lives) can be included in this phrase or quote). There are technologies pertaining to common household items such as locks, switches and cameras that can be controlled through the use of phones and internet. These things collect and stores data such as names, fingerprints, pictures and scans that are used for verification and authentication purposes. </em>

<em> </em>

<em />

5 0
3 years ago
Other questions:
  • Which loan type requires you to make loan payments while you’re attending school?
    7·1 answer
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • A contractor is preparing a bid to install swimming pools at a new housing addition. The estimated time to build the first pool
    12·1 answer
  • What was the first stored prograam electronic digital computer
    11·2 answers
  • Another name for the office button menu is the toolbar. true or false.
    7·2 answers
  • 1. How do you know that A Drop of Water is an expository<br> text? GENRE
    7·1 answer
  • Web design and development tools
    13·1 answer
  • 1st person to answer gets brainliest for free after 5 mins I wont be handing out brainliest
    11·1 answer
  • Question 3 of 10
    12·1 answer
  • Everyone say bye to brainly cause I’m reporting it for being against the law
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!