1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
3 years ago
10

Does anyone have any advice for me im a junior in highschool

Computers and Technology
2 answers:
Dovator [93]3 years ago
7 0

Answer:

Do your work

Explanation:

Just focus on your school work, don't do anything that will get you in trouble. make friends, make friends with teachers. hope this helped

andriy [413]3 years ago
3 0

Answer:

As a senior the most advice I have is to get as much done as soon as possible, it will be very stressful and tedious but as long as you leave this year with full credits you wont have to worry about much next year.

Explanation:

Side note: If college courses are available TAKE THEM, they will give you both highschool and possibly college credits!

You might be interested in
Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
Vikki [24]

Answer:

Information output and information storage

Explanation:

Output in the form of images, audio, printed on paper, video, 3D models, etc

Storage - saving information internally on hard drive and externally (HDD, SSD, RAID system, etc

6 0
3 years ago
True or false?
kenny6666 [7]

Answer:

True

Explanation:

An effective way of protecting programs against classic stack overflow attacks is to instrument the function entry and exit code to setup and then check its sack frame for any evidence of corruption.

5 0
3 years ago
Read 2 more answers
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
How can you tell if your car is overheating?
Nitella [24]
A) your temp gauge is moving into red
4 0
3 years ago
Read 2 more answers
F he continues to make monthly payments of $100, and makes no new purchases, how many more payments will he have to make before
castortr0y [4]

What is the interest rate?

Divide the total amount due by 100.

8 0
3 years ago
Other questions:
  • 2. Write the binary representation of number 1037.379 in IEEE 754 standard in single precision. Express the result in binary, oc
    7·1 answer
  • Web sites use _____ to track users while they are on the site.
    14·1 answer
  • Which are characteristics of an effective solution? Choose all that apply. solves the problem in anticipated ways each time resu
    5·1 answer
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
  • To filter a list with the Filter function, on an Excel spreadsheet, you need to perform the following steps: (1) click in any ce
    9·1 answer
  • The objects that you place on master pages are called _____.
    6·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • Why are mobile apps often easier to develop than desktop apps?
    11·1 answer
  • A _______ is a group of elements that you want to style in a particular way.
    8·2 answers
  • Which of the following best describes a balanced reaction
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!