1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
10

Someone wanna help me with this?

Computers and Technology
2 answers:
erica [24]3 years ago
8 0

Answer:

A podcast is listening, and TV is watching a show or movie

Explanation:

Can you.mark brainliest

Mice21 [21]3 years ago
8 0

Answer:

i think podcasts are becoming popular because they are easier to upload to platforms unlike a news cast you can only post that to tv stations where a podcast you can upload to many thing like social media ,tv,ect.  

Explanation:

You might be interested in
The customer's endpoint device on the wan is called the __________________.​
Lelu [443]
<span>The customer's endpoint device on the WAN is called the Data Terminal Equipment (DTA).
WAN 
is wide area network, referring to a network that extends over a large area. DTA is an end instrument which converts information into signals.</span>
3 0
3 years ago
When using bits to represent fractions of a number, can you make all possible fractions?
saw5 [17]
This is your perfect answer

8 0
3 years ago
Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Lau
Eddi Din [679]

Answer:

answer is c

if my answer is wrong than sorry

7 0
3 years ago
An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific
kari74 [83]

An attacker is preparing to perform what Application attack  when the target vulnerabilities include headers and payloads of specific application protocols.

<h3>What Is an Application Attack?</h3>

An application attack is known to be a type of system attack which is made up of cyber criminals that is said to have access to any unauthorized points.

Note that this kind of Attackers are  the ones that start by  looking at the application layer, and then looking for any kind of application vulnerabilities that is found within the code.

Learn more about vulnerabilities from

brainly.com/question/25633298

3 0
2 years ago
1. Which of the following statements is true regarding the use of refrigerants?
kondaur [170]
A) Records of the dates and quantities of refrigerant recovered and recycled are unnecessary
5 0
3 years ago
Read 2 more answers
Other questions:
  • 1| def saveUserProfile(firstName, lastName, age, height, country):
    7·1 answer
  • What is the problem with the code snippet below? public class Test { public static void main(String[] args) { System.out.println
    6·1 answer
  • The memory unit of a computer has 2M Words of 32 bits (or 4 bytes) each. The computer has an instruction format with 4 fields: a
    14·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • Java public class Odds { public static void main(String[] args) { printOdds(3); printOdds(17/2); int x = 25; printOdds(37 – x +1
    12·1 answer
  • Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
    6·1 answer
  • Fill in the blanks:
    15·1 answer
  • 1. Which one of the following is true about screening interviews?
    7·1 answer
  • Which of the following number is divisible by 3? (340 , 432 , 113)​
    7·1 answer
  • You are attempting to print a document from your workstation to the network printer in your office. The print job failed when yo
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!