1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna [14]
3 years ago
10

Why are people getin mad at me for anserin a question ?

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
6 0
Maybe because you didn’t give them the correct answer
You might be interested in
Works in the public domain have copyright that are expired or abandoned true or false
amid [387]

Answer:

False

Explanation:

Only one of the two are true. Works in the public domain have a copyright that has expired only. E.g. Works of classical music artist, are almost always expired, in accorance with American Copyright law. Abandoning a copyright doesn't do anything because so long the copyright has remained unexpired, the copyright remains. Thats why it can take decades for a new movie in a series to release, like "IT" by Stephen King. The copyright hasn't expired but rather was 'abandoned'. Before "IT" 2017 was relasesed, the copyright was abandoned.

4 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
The ____, or typeface, defines the appearance and shape of letters, numbers, and special characters.
Paladinen [302]
Font(s)
fonts is another word for typeface
the appearance of letters and numbers when you chang the font
5 0
3 years ago
The pci express version 4.0 can provide up to what amount of throughput with 16 lanes for data?
netineya [11]

The PCL express version 4.0 can provide up to 32 gigabytes with 16 lanes for data.

<h3>What is PCI Express?</h3>

PCI Express, often known as PCIe or PCI-e, is a high-speed serial computer expansion bus standard that was developed to replace the previous PCI, PCI-X, and AGP bus standards.

Thus, it is correct to state that the PCL express version 4.0 can provide up to 32 gigabytes with 16 lanes for data.

Learn more about PCI Express:
brainly.com/question/13898111
#SPJ1

4 0
2 years ago
What are several networks connected together using a router
elixir [45]

Answer:

local Area Network, Wide Local Area Network and Personal Area Network

8 0
3 years ago
Other questions:
  • Write an expression that executes the loop body as long as the user enters a non-negative number.Note: If the submitted code has
    11·1 answer
  • To create a button that will allow a user to send the form data to the server you use a type of ____
    5·1 answer
  • write a method that will return a person's age entered by keyboard. You will need to include at least one instance variable in t
    11·1 answer
  • A web page ____ can also create a style sheet that takes precedence over the internal style sheets of browsers.
    10·1 answer
  • Identify the use of queue in the process of spooling output to a printer.
    15·1 answer
  • Using the Vigenere cipher, does the length of the key matter?
    8·1 answer
  • What can a scientist do if he repeats and experiment and gets diffrent results?
    5·1 answer
  • What is cyber ethics​
    10·2 answers
  • Which of the following is NOT one of the four benefits of using email?
    14·1 answer
  • Maria needs to use a requirement-gathering method that will help her provide a set of questions to the client. Which method shou
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!