1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firlakuza [10]
3 years ago
14

Erick, who is taking an online course, sent an e-mail to his

Computers and Technology
2 answers:
timurjin [86]3 years ago
7 0

Answer:

C

Explanation:

Took the test on edgenuity, edge 2020 and got it right

erma4kov [3.2K]3 years ago
3 0

Answer:

c

Explanation:

You might be interested in
What is the output of the AWK program?
zhannawk [14.2K]
Luckily your file uses YYYY-MM-SS HH:MM:SS timestamps, which sort alphabetically. Those can be compared with < > <= etc without worrying about any date math. MIN="..." and MAX="..." are where those values are input into awk.
4 0
3 years ago
Which is an advantage of a computer network?
stealth61 [152]
The answer is "networks allow computer to connect quickly and to share data or equipment". This is true because with a commuter network you can instantly share files to all the other computer by putting them of the network file storage center. This also allows multiple pieces of equipment to be used to complete one task that would usually take longer if a single computer did it
5 0
3 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
Naruto Uzumaki who likes naruto ??? who waches it??
nika2105 [10]

Answer:

me

Explanation:

naruto is the coolest dude

6 0
3 years ago
Read 2 more answers
Given two integers low and high representing a range, return the sum of the integers in that range. For example, if low is 12 an
Vaselesa [24]

       System.out.println(sumRange(12, 18)); // prints 105

       System.out.println(sumRange(18, 12)); // prints 0

       System.out.println(sumRange(18, 18)); // prints 18

   }

   public static int sumRange(int low, int high)

   {

       int sum = 0;

       for (int val = low; val <= high; val++){

           sum += val;

       }

       return sum;

   }

}

8 0
3 years ago
Other questions:
  • A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from
    6·1 answer
  • A(n) _____ investigates, analyzes, designs, develops, installs, evaluates, and maintains a company’s information systems.​
    10·1 answer
  • Can you see it now ivy97? I've posted it again.
    8·1 answer
  • To adjust the margins on a page, users will navigate to the _____ tab.
    13·2 answers
  • What is one expectation of open-source software?
    15·1 answer
  • Which of the following illustrates an example of a string data type?
    15·2 answers
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • How do i code........​
    6·2 answers
  • output device. Vrite very short answer of the following questions. What is computer hardware? Which dovico in lini nwhich device
    15·1 answer
  • Ntering a system call involves changing from kernel mode to user mode.<br><br> a. true <br> b. false
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!