1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
9

Plz answer the following ​

Computers and Technology
2 answers:
WITCHER [35]3 years ago
6 0

Answer:

1,00000000 вромгьбр

Explanation:

Аттооь

Kruka [31]3 years ago
5 0

Answer:

it trojan

Explanation:

what is the question asking

You might be interested in
What actions are considered positive body language?
Ainat [17]

Answer:

Greeting with a smile, open handed gestures, and making eye contact

Explanation:

I used this on E2020 and got it right

5 0
3 years ago
Cloud vendors that are hosting hardware, operating system, database, and other software, which clients can then use to build the
iren2701 [21]

Answer:

a. Software as a Service.

Explanation:

These Cloud vendors are said to be providing Software as a Service. This is because regardless of that the underlying specs are in regards to hardware, operating systems, database, etc. The vendor is selling a subscription to their cloud software which bundles all of these services together. Therefore, what they are ultimately providing is a Software that the individual can use as a service, and enjoy all of the included benefits/capabilities.

8 0
3 years ago
A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,
Leni [432]
I might be true and might not which chances are 50%
8 0
3 years ago
1. Which of the following is the most effective password? a)bankaccount1
Yuliya22 [10]
Choice C. Choice C includes uppercase and lowercase leters, has a number, and two characters.

:)
7 0
4 years ago
Read 2 more answers
____ ensures that the network does not become saturated at any one poin
Tcecarenko [31]
The answer is a network layer. It prevents saturation since it manages and distributes data. It serves as a control to all other networks that receives data. The main function is to create, end or reserve connections by identifying and recognizing IP addresses of connected networks.  
5 0
3 years ago
Other questions:
  • Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to pu
    15·1 answer
  • What's the best way to change the font size of all your notes pages at once?
    6·1 answer
  • You are given a class named Clock that has one int instance variable called hours.
    14·1 answer
  • Name the six parts of the product development life cycle.
    7·2 answers
  • Frequently used commands can be placed in or on the _____ in the top left corner of the window.
    12·1 answer
  • Using truth table, prove that:<br><br> (A + B). C = (A . C)+ (B .C) ?
    7·1 answer
  • The first numerical control machine tool was demonstrated in 1952 in the United States at the Massachusetts Institute of Technol
    14·1 answer
  • The variable points stores data that the user has input. what is the data type of this variable?
    12·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
  • Copy the formula in cell M7 to the range M8:M15, and edit the copied formulas to return the value from the column indicated by t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!