1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
3 years ago
8

Need help ASAPppppppppp

Computers and Technology
1 answer:
Darina [25.2K]3 years ago
5 0

Answer:

Below picture should give you an indication. On different PC cases, the position of the connectors can be different, so you have to look at the shape.

You might be interested in
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor
miv72 [106K]

Answer:

recognition

Explanation:

<h2><u>Fill in the blanks</u></h2>

When you take a multiple-choice test, you are relying on <u>recognition</u> , a means of retrieving information out of your long-term memory storage system that helps you choose the correct answer.

4 0
3 years ago
Using a USB flash drive, you intend to install Windows 10 on several computers. To save time, you would like to automate the
artcher [175]

Answer:

Create an answer file named config.xml. Place the file on a USB flash drive and run setup.exe.

Create an answer file named automated.exe. Place the file on a USB flash drive and run

4 0
3 years ago
Did batman die in endgame? I dont have enough money to see the movie can you tell me what happens. It said batman died from some
kotykmax [81]

Answer: The Marvel batman, otherwise known as Iron Man did.

Explanation: Movie was pretty good.

5 0
3 years ago
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Other questions:
  • ____ is another term for document properties.
    12·1 answer
  • Mai has recently created her own e-mail account. Her father gave her permission to e-mail her friends and family but warned her
    11·2 answers
  • Damian uses a modem to connect to a dial-up network. Which statements are true of a modem?
    11·2 answers
  • You need a collection to represent secret agents. Every agent has a unique codename that identifies them, and an Agent object th
    14·1 answer
  • State what is meant by the terms: Parallel data transmission ...................................................................
    8·1 answer
  • What do you think color theory<br> in web design is?
    14·1 answer
  • Write a recursive method called, doMyMath, which takes as input any positive integer and calculates the factorial (use comments
    13·1 answer
  • What is the address of the first SFR (I/O Register)​
    11·1 answer
  • Write a program that allows the user to input a total dollar amount for an online shopping order and computes and outputs the sh
    14·1 answer
  • Write an SQL query to list all the records from the member and branch tables.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!