1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
14

Ema Company for business .

Computers and Technology
1 answer:
AnnyKZ [126]3 years ago
3 0

Answer:

200 is the answer

Explanation:

You might be interested in
Taday is the anniversary of September 11, 2001. you were to meet the child of a victim or survivor of 9/11, what would you say t
Vlad1618 [11]

Answer:

Hi How's you day

Explanation:

7 0
4 years ago
Network firewall entry and exit points are called
LuckyWell [14K]
___the answer is ports
6 0
4 years ago
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
Which structural semantic will the given HTML code snippet form?
Serhud [2]

Answer:

i think it is ...table

Explanation:

or....heading.

5 0
3 years ago
Concept about borderless classroom because of technology​
Elan Coil [88]

Answer:

With Borderless Classroom Technology, every student remains a part of the classroom. ... That is to be 'as simple as a light switch' and as effective in lighting the learning experience as educators focused on students, not on technology." Borderless Classroom Technology is an extension of that philosophy.

HAS TO BE RIGHT- GOOGLE TOLD ME

5 0
3 years ago
Other questions:
  • 3.A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 9
    11·1 answer
  • Why is important to maintain a naming convention within the company that is developing computer programs?
    6·1 answer
  • What is cutting-edge technology
    6·1 answer
  • Develop a program that implements the POLYNOMIAL ADT using the LIST ADT. The POLYNOMIAL ADT is used to represent polynomials and
    8·1 answer
  • If number is 20, what is printed to the console after this code is executed?
    13·1 answer
  • True/false
    8·1 answer
  • .13 LAB: Library book sorting Two sorted lists have been created, one implemented using a linked list (LinkedListLibrary linkedL
    14·1 answer
  • alexa is scanning a photograph whitch mode should she use A green tone B blue tone C greyscale D sepia ​
    15·2 answers
  • Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propaga
    15·1 answer
  • Q1) What would be the output of the program shown in the figure?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!