1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
2 years ago
11

Davingould1115...................answer 2​

Computers and Technology
2 answers:
Liono4ka [1.6K]2 years ago
6 0

Answer:

srry I didn't understand

KiRa [710]2 years ago
4 0

Answer:

who is that

Explanation:

You might be interested in
What does the Autosum feature on excel do?
BabaBlast [244]
The answer is 1. Pressing the Autosum button highlights the ten cells above it so that you can easily add things together. Hope this helps!
8 0
3 years ago
Why computer known as tool of information​
S_A_V [24]

Answer:

because it has the ability to capture the whole information you need or downloaded

8 0
2 years ago
Why we can not see objects around us in the dark​
malfutka [58]

Answer:

We see an object when light falls on it and gets reflected from its surface and enters our eyes. In a dark room, there is no source of light. no light falls on the surface of objects and we do not see them. This is why we cannot see the objects in a dark room.

4 0
3 years ago
You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom
Phantasy [73]

Answer:

c. your friend can hash all possible options and discover your secret.

Explanation:

SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.

6 0
3 years ago
What type of device can be used to block unwanted traffic initiated from the internet and can also restrict internet access from
statuscvo [17]
It is the firewall exactly.
4 0
3 years ago
Other questions:
  • Why is fragmentation of an ip packet sometimes required?
    12·1 answer
  • I have a cosmetology essay due in 2 hours and i’m still on the research , please help .
    13·1 answer
  • Write a method reverse( ) for OurLinkedList class. The method should return a new OurLinkedList object that is the reverse of th
    8·1 answer
  • Issues with paper based records include a. time spent re-keying data, searching for paper copies, and filing. b. storage volume
    9·1 answer
  • If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
    5·2 answers
  • Explain briefly why every person in the world is not connected to the Internet.
    9·1 answer
  • Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
    13·1 answer
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • What is the code i need to do
    12·1 answer
  • What will the computer do in response to a line of code reading # name = input("What is your name?")
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!