1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
6

I have no idea which one please help!

Computers and Technology
2 answers:
goblinko [34]3 years ago
7 0

Answer:

• Can make copies so long as they're for friends and relatives.

.

shutvik [7]3 years ago
6 0

Answer:

i think its the second one

Explanation:

brainliest pls

You might be interested in
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
4 years ago
Read 2 more answers
FIRST AMSWER GET BRAINLIEST​
MA_775_DIABLO [31]

Answer:

agile --> business modeling

RAD --> pair programing

waterfall --> deployment

spiral --> risk analysis

v-shaped model --> integration testing

not too sure about this but i tried

4 0
3 years ago
Computer viruses often spread by means of what?
lozanna [386]
Email attachments hope this helps
8 0
3 years ago
Read 2 more answers
In which part of a professional email should you try to be brief, but highly descriptive
aev [14]
The correct answer is the Subject line

The subject line is usually just a very short sentence that presents the problem briefly and straight to the point.
4 0
4 years ago
Which statement best justifies the use of a high-speed cache in a CPU?
crimeas [40]

Cache memory is a high-speed memory that stores the instructions and data that have been frequently accessed.  It decreases the time it takes to decode the instructions stored in the instruction pipeline.

A.  It decreases the time it takes to decode instructions stored in the instruction pipeline.

<u>Explanation:</u>

Whenever an instruction is invoked or some data is accessed, the CPU looks for it in the cache memory before accessing the main memory.

If the content is found in the cache memory, it accessed from there and then and hence the access time and decode time is reduced as there were no main memory lockups.

6 0
4 years ago
Other questions:
  • Any method of determining whether an event or object is older or younger than others
    13·2 answers
  • How many times is "Alert" displayed in the following loop? for (int k =0; k&lt;= 100; k++) cout &lt;&lt; "Alert"; O 101 0 1 oo О
    7·1 answer
  • How do you change a Word document to an .html file? Save it as a Web page. Save it as a plain text document. Copy it in rich tex
    14·1 answer
  • Which microphones are considered to have the best quality?
    12·2 answers
  • How do you represent the decimal integer 50 in binary?
    14·1 answer
  • Why do you think they added the wait .5 seconds block?
    13·1 answer
  • Which of the following is considered an integrated software system? a) Material requirements planning systems (MRP I) b) Manufac
    14·1 answer
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
  • All variables are----------------------------------------------- help please
    7·2 answers
  • Cybersquatters:_________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!