1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
3 years ago
10

PLEASE SOMEONE PLEASE HELP ME OUT!!!!

Computers and Technology
2 answers:
Arlecino [84]3 years ago
7 0

Answer:

the 1st one

Explanation:

alina1380 [7]3 years ago
6 0

Answer:   Ideate

Explanation:

You might be interested in
The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate
Alex787 [66]

Answer: Phreaker

Explanation:

Phreaker is defined as the unauthorized attack on  authorized communication system for stealing and manipulation phone networks.

  • Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
  • Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
  • Thus, the correct option is option(d)
8 0
3 years ago
Which are the benefits of leveraging web technologies?
allsm [11]

Lower cost - You can leverage web technologies like FB and Google which allow you to advertise and reach billions of users relying on their services at a very low cost as compared to other mediums.  

Security – Data stored with web technology companies offers more security because it is stored in huge data centers that have high-end protection

Increase business efficiency – Web technologies can increase business efficiency and unlock value in your business functions. They can reduce time, provide critical analytics and help your business grow.

4 0
4 years ago
Read 2 more answers
What are two examples of items in Outlook?
marta [7]

Answer:

I believe it would be button and tool bar

8 0
3 years ago
The name of a person their address and their contact information like phone number and email address or consider the minimum inf
andrew-mc [135]

Answer:

false

Explanation:

6 0
4 years ago
In this assignment, you will need to design a complete Black-Box testing plan for the following program. A computer science stud
murzikaleks [220]

Answer: sorry i need points to ask a question hope u understand...

Explanation:

8 0
3 years ago
Other questions:
  • The merge process involves which two types of files?
    9·2 answers
  • The _____ text wrapping option wraps text around the object, with the text forming to the shape of the object.
    14·1 answer
  • Why are some studs and bolts undercut in the middle?
    11·1 answer
  • Maria is starting a pet hotel and needs a website to promote her business and establish her brand. Which of the following is the
    13·1 answer
  • Which is better computer science or software engineering?
    10·2 answers
  • Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals
    7·1 answer
  • Pleaseeeeeeeee I will give a brainliest
    7·1 answer
  • You compared each letter in the correct word to the letter guessed.
    5·1 answer
  • What is property in educational technology
    12·1 answer
  • Question 2:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!