1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
3 years ago
8

Heyy i need friends plz join my pad let I'm 14 btw (link is in the comments)

Computers and Technology
1 answer:
Svet_ta [14]3 years ago
7 0

Answer:

do you want to be friends

Explanation:

You might be interested in
What is ransomware<br>я​
Novosadov [1.4K]

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

5 0
2 years ago
Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
Zielflug [23.3K]
If some files appear dimmed in one of the default folders on your computer, the best course of action would be to A. leave the files as they are.
These files are probably either hidden or system files, which are never meant to be deleted or moved.
8 0
3 years ago
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such
Firlakuza [10]

Answer:

The answer is "physical design"

Explanation:

This design is the method of translating the specification of circuits into a physical design that explains how cells and roads connect. It is an architecture, that involves the system's internal processes of input and output.

  • This system is created by establishing the design criteria, which determines basically what the applicant system is doing.  
  • It includes the architecture, process architecture and software design of user interfaces.
6 0
3 years ago
Hard disk works on the following technologies: (i) Technology used within the hard drive to read &amp; write data to the drive a
Alex787 [66]

Answer:

The green-blue circuit board you can see in the first photo includes the disk controller, a circuit that allows the computer to operate the drive's mechanisms and read/write data to and from it. ... A small hard drive typically has only one platter, but each side of it has a magnetic coating

Explanation:

8 0
2 years ago
Other questions:
  • What are some consequences of internet addiction​
    9·1 answer
  • What percentage of business are using social media today
    14·1 answer
  • Which of the following is true of information systems?
    15·1 answer
  • Write a program to enter a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program n
    10·1 answer
  • What are the steps to creating a blank database? Use the drop-down menus to complete them.
    9·1 answer
  • Write a formula that would return a TRUE result if the sum of the first five numbers in a column of data are negative
    7·1 answer
  • C:/Users/Documents/resume.docx Where is the "resume" document located in this file structure?
    12·1 answer
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • The following code is intended to test whether the int variable num is less than 10, and if so print a warning and set it to 10.
    6·1 answer
  • a blank search examines the first item to see if it is a match, then the second, and so on. answers: linear, binary, and orderly
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!