1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
koban [17]
3 years ago
11

Jnhj hjibfnufnbfjbnkfv fj v

Computers and Technology
1 answer:
kirill [66]3 years ago
6 0

Answer: baller.

Explanation:

You might be interested in
The design strategy that starts with a global view of the entire problem and breaks the problem down into smaller, more manageab
In-s [12.5K]

Answer:

Top down design

Explanation:

Top-down design is an approach that is used to break down the problem into the smaller subpart so that it can be manageable into more clear form.

C programming is the example of a top-down approach while C++ is the example of the bottom-up approach.

The advantages of the top-down design approach are:

1) easy to manage

2) easy to find the error

3) easy to debug

4 0
3 years ago
Kiara is using her software's graphic formats to create a line graph. As she
Ad libitum [116K]

Correct the data she entered , and the software will adjust the graph -apex

5 0
3 years ago
Read 2 more answers
after a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your pin. because it
riadik2000 [5.3K]

The reason that you have not been locked out after several failed PIN login attempts is that your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

Technology known as Trusted Platform Module (TPM) is made to offer hardware-based, security-related functionality. Designed to perform cryptographic operations, a TPM chip is a safe crypto-processor. Malicious software cannot interfere with the TPM's security capabilities, and the chip has numerous physical security features to prevent tampering. Utilizing TPM technology has a number of major benefits, including the following:

  • Cryptographic keys should be created, stored, and used sparingly.
  • Utilize the burnt-in RSA key of the TPM to authenticate platform devices using TPM technology.
  • By recording security metrics, you can assist in ensuring platform integrity.

To learn more about TPM click here:

brainly.com/question/10742732

#SPJ4

7 0
1 year ago
Jack needs to improve sales on a local service for the elderly. What would be the best place for him to place an ad?
Lorico [155]

Answer: D

Local news channels

Explanation:

Since Jack is trying to improve local service the local news would be the best fit to reach the maximum amount of people in his area.

3 0
3 years ago
Read 2 more answers
What is a coaxial cable?
grin007 [14]

Answer:

A transmission line that consists of a tube of electrically conducting material surrounding a central conductor held in place by insulators and that is used to transmit telegraph, telephone, television, and Internet signals.

Coax, short for coaxial, is a type of cable used to transmit data, the internet, video and voice communications. A coax cable is made up of an aluminum and copper shield with an outer plastic jacket (see below) with the dielectric insulator helping to minimize signal loss.

5 0
2 years ago
Other questions:
  • The ___ of a worksheet defines its appearance
    13·1 answer
  • Select the correct answer.
    15·1 answer
  • In Alphatech Systems, email software screens incoming messages by organizing them into mailboxes and identifying junk mail. As a
    13·1 answer
  • 1. Extract title Write a function extract_title that takes one parameter, the filename of a GenBank formatted file, and returns
    14·1 answer
  • ​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted
    8·1 answer
  • The total number of possible keys for des is _________, which a modern computer system can break in a reasonable amount of time.
    10·1 answer
  • For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False
    12·1 answer
  • Describe two types of storage devices?​
    15·1 answer
  • Virus program do not replicate themselves true or false one word answer only​
    15·2 answers
  • a central issue in the microsoft antitrust lawsuit involved microsoft's integration of its internet browser into its windows ope
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!