1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
2 years ago
5

What is the answer ??​

Computers and Technology
2 answers:
dlinn [17]2 years ago
6 0

Answer:

Minicomputer answer The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Bro please follow me we should help each other

Natali5045456 [20]2 years ago
3 0

<em>=</em><em> </em><em>Option</em><em> </em><em>b</em><em> </em><em>Minicomputer ..........</em>

You might be interested in
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
I will give brainliest!!!!! I NEED HELP ASAP!!!!!!!
klemol [59]

Answer:

I'm pretty sure it's the first answer.

4 0
3 years ago
Whats the best way to get into a computers programming to get past firewalls
raketka [301]

you can use the software psiphon

6 0
3 years ago
Read 2 more answers
Explain how communication is smooth and efficient working​
ohaa [14]

Answer:

To communicate effectively, you need to avoid distractions and stay focused. Inconsistent body language. Nonverbal communication should reinforce what is being said, not contradict it. If you say one thing, but your body language says something else, your listener will likely feel that you're being dishonest.

8 0
3 years ago
Read 2 more answers
A PHP variable name a. can be a PHP reserved word b. can start with a letter, a digit, or two underscores c. can contain special
maw [93]

Answer:

The correct answers are c. can contain special characters d. is case-sensitive

Explanation:

Variable can be referred to as a container used for storing values such as numeric values, memory addresses, characters, character string so it can be used in any part of the program. Every programming language has rules that you must strictly follow while naming a variable, and some of the rules for naming variable in PHP are A variable name can contain letters, numbers, and characters  after the first character and A variable name is case sensitive.

3 0
3 years ago
Other questions:
  • Which of the following would be a considered a want rather than a need for most people?
    15·1 answer
  • Studying MyMagic+ helps one understand the costs associated with information systems deployment at scale. According to your read
    12·1 answer
  • The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
    5·1 answer
  • A relational database is different from a simple database because it has more than one _____.
    13·1 answer
  • Write a function solution that, given an array A consisting of N integers, returns the number of fragements of A whose sum equal
    9·1 answer
  • What is the output by the code system.out.print(8-4+2);
    13·1 answer
  • What is the significance of the scientific method?
    6·1 answer
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
  • Assume you have written a method with the header num yourMethod(string name, num code). The method's type is ____ .
    11·1 answer
  • An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!