1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
11

Look at the picture below explain and write your answer on your answer sheet​

Computers and Technology
1 answer:
IRISSAK [1]3 years ago
6 0

Answer:

I use a plant sprinkler

how to use? we just need to fill the water and then pour it on the plants.

You might be interested in
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
State whether True / False:<br>The pause option stops the recording temporarily.*<br>True<br>False​
defon

Answer:

true

Explanation:

when you pause a recording it will temporarily stop but, when you hit record again it will continue where you left off

7 0
3 years ago
*hacked*
galben [10]

Hey Litz06,

Sorry that happened to you.

Try changing your password to something complicated so it’s more secure.

5 0
3 years ago
Write down eight points on how modern technology have effected our life ?
luda_lava [24]

Answer:

  1. Made everyday activities easy to do
  2. We have become dependant on mordern technology
  3. We use the internet for everything
  4. Meetings can be done online
  5. food can be ordered and delivered online
  6. Payments can be done using technology
  7. We pay more attention to social media
  8. Meet new people online
3 0
3 years ago
What is sexual intercourse <br><br>​
n200080 [17]

Answer:

immmm ....

I know the answer but I won't tell..lolllll

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is A/B Testing
    10·2 answers
  • Approximately what percent of desktop PCs are used for work-related purposes?
    12·1 answer
  • Computer-based networks that trigger actions by sensing changes in the real or digital world are known as: global marketing plat
    6·1 answer
  • In a word processing program, under which tab or menu option can you adjust the picture brightness?
    8·2 answers
  • What information medium is used to access information from the Internet in the form of HTML pages?
    12·1 answer
  • Data as a service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
    15·1 answer
  • Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th
    10·1 answer
  • What is the text that is entered into a cell used to identify the purpose of the worksheet, columns, and rows? a. date and time
    14·1 answer
  • FIGURE A-1—Use the information in this chart to answer Question 1.
    6·1 answer
  • Write a boolean expression that is true if s references the string end.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!