1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
10

Please help me !!

Computers and Technology
1 answer:
gavmur [86]3 years ago
6 0

e. uhmmm

19+21=30

like....

easy.

What grade class is this? I wanna do it cause it easy AFef

You might be interested in
What is the practical application of the information acquired by science.
mrs_skeptik [129]

Answer:

Technology

Explanation:

The correct answer is - Technology

Reason -

Technology is the sum of techniques, skills, methods, and processes that are used in the production of goods or services or in the accomplishment of objectives, such as scientific investigation.

5 0
3 years ago
To play game, go inside the Grand Theft Auto V folder and right click and runGTAVLauncher as administrator.If you get any missin
yanalaym [24]

Answer and Explanation

The answer is true because when this error occurs, Microsoft Visual C++ is not installed in your PC, so firstly, download the 64bit version. Once installed restart your PC then open game software If still occur then follow the methods such as

If the error still exists then this software will be removed and fix all error.ensure that you have already installed we setup in your PC and both

Vcredist_x64_2012_x64 and

vcredist_x64_2012_x86

8 0
3 years ago
To access documents stored on a "cloud", you'll
gregori [183]

Answer:

B

Explanation:

5 0
3 years ago
One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
Thepotemich [5.8K]

Answer:

This explanation is true.

Explanation:

The most common forms of encryption used today are;

  • Data Encryption Standard / DES
  • Triple DES
  • Advanced Encryption Standard / AES
  • Twofish

which are mostly symmetric encryption protocols. They use the same key codes for both parties involved in the communication process.

Asymmetric Encryption is widely used in daily communications that is done over the internet and it uses different keys for each party. The public key encrypts the message and then it is sent over to the recipient. The secret key which they have exchanged is then used the decrypt the message.

I hope this answer helps.

7 0
3 years ago
What happens when two computers use the same IP address?
mr Goodwill [35]

Answer:

Its B, "irregular signals sent over the network"

Explanation:

When you duplicate IP addresses don’t make one machine controllable but they rather just <em><u>break</u></em><u><em> network connectivity.</em></u>

<u><em /></u>

<u><em>HOPPPPE THIS HELPPPPPPPPPPPPSS</em></u>

7 0
3 years ago
Other questions:
  • (Statistics) Write a program that includes two functions named calcavg() and variance(). The calcavg() function should calculate
    10·1 answer
  • What area on the Microsoft® Publisher® application screen shows the name of the publication?
    9·1 answer
  • Type 1 hypervisor:
    10·1 answer
  • What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel
    10·1 answer
  • List the difference between GIGO and bug ​
    15·1 answer
  • Explain the<br>4 ways<br><br>ways of arranging icons.<br><br>​
    6·1 answer
  • 2. Explain the difference between a JMP instruction and CALL instruction
    6·1 answer
  • How does a computer do its work? Mention its working principle.<br><br>​
    8·1 answer
  • Please define processor​
    14·1 answer
  • Help me with this two questions please
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!