1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
2 years ago
15

2 red and 2 overlapping balls in the center are surrounded by a green, fuzzy, circular cloud with a white line running through i

t. 2 green balls sit on the white line, and a line leading a bracket around the balls is labeled A. A line leading to a bracket overlapping the white line is labeled B.Identify the parts of the atom that are labeled in the diagram.Label A:Label B:
Computers and Technology
2 answers:
luda_lava [24]2 years ago
8 0

Answer: Label A: nucleus. Label B: Electron Cloud

Explanation: I got it right

tigry1 [53]2 years ago
7 0

Answer:

Label A is nucleus and Label B is electron cloud

Explanation:

You might be interested in
POINT AND BRAINLIEIST GIVE AWAY!!!
Sonbull [250]

Answer:

Hey whats up

Explanation:

Count me in chief! I love when fellow user give out mighty points

7 0
3 years ago
Read 2 more answers
What is true about the dilation?
madreJ [45]

Hey hey hey! I recently took the test and the answer is D | (• ◡•)|

7 0
3 years ago
Read 2 more answers
Is virtualization self monitoring
NISA [10]

Answer:

No

Explanation:

Virtual and physical metrics have to be collected and analysed to look for allocation problems such as: VM sprawl, too many VMs, or improperly provisioned VMs are occurring.

4 0
3 years ago
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
Larry recently viewed an auction listing on a website. as a result, his computer executed code that popped up a window that aske
RUDIKE [14]
<span>Larry recently viewed an auction listing on a website. as a result, his computer executed code that popped up a window that asked for his password. The type of attack larry had likely encountered is the </span><span>Cross-site scripting (XSS).</span>
4 0
3 years ago
Other questions:
  • What guidelines should you follow when adding graphics to your presentations?
    14·2 answers
  • How do you work with collaborators like copywriters developers and project managers?
    11·1 answer
  • Timothy is a multimedia designer. He needs to create a prototype of a new product that his firm is launching. Which multimedia s
    11·1 answer
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • User can use ______ commands to search for and correct words in a document
    13·1 answer
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • I need help with Exercise 3.6.7: Sporting Goods Shop in CodeHS. ASAP
    5·1 answer
  • Pick the correct characteristics that define the porous inkjet paper.
    6·1 answer
  • after entering backstage view, and clicking account settings, what are the steps for creating a delegate for an outlook folder
    6·1 answer
  • Select the correct answer.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!