1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
3 years ago
14

Can i eat chicken and you shut

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
5 0

What- (つ._. )つ .................

scoray [572]3 years ago
3 0

Answer:

ofcccc whenn ?

You might be interested in
Which describes the first step a crawler-based search engine uses to find information?
Orlov [11]
<span>Crawler-based search engines are what most of us are familiar with - mainly because that's what Google and Bing are. These companies develop their own software that enables them to build and maintain searchable databases of web pages (the engine), and to organise those pages into the most valuable and pertinent way to the user.</span>
5 0
2 years ago
Read 2 more answers
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
A reaction between an acid and a base is both a neutralization reaction and what other kind of reaction?
astraxan [27]
Hi!

The answer is C. Double replacement.

Have a nice day!
7 0
3 years ago
How do I get rid of this little tool bar????
Serhud [2]

Answer:

settings>Accessibility>Touch>AssistiveTouch>Turn off

Explanation:

4 0
2 years ago
An abstraction is a simplified representation of something that is more complex. Decimal numbers were a useful abstraction in th
Blababa [14]

What was the content of the lesson? It is hard to answer a question we need context on.

6 0
2 years ago
Other questions:
  • Which of the following information security technology is used for avoiding browser-based hacking?
    11·2 answers
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    6·2 answers
  • Where does the VLookup function find its lookup values?
    14·1 answer
  • Where can you check effective access on a shared folder? answer?
    11·1 answer
  • Traffic collisions are among the top killers of children in America.
    13·1 answer
  • Is downloading like installing?
    13·1 answer
  • Point out the correct statement.
    11·1 answer
  • The gene form of a trait is called a(n) ​
    10·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • How should work be allocated to the team in a Scrum project?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!