1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dominik [7]
3 years ago
8

Actividades que puedes Aser con un martillo y su explicación

Computers and Technology
1 answer:
madam [21]3 years ago
6 0

Answer:

hi how are you thx yets1wud

You might be interested in
In which scenario would someone most likely be
andrew11 [14]

Answer:

Option 1. Brent is preparing for his class speech

Explanation:

I chose option one because he would need presentation software to show his class about his speech

5 0
3 years ago
Which is the most recent version of microsoft windows?
nignag [31]

Answer:

Windows 11, version 21H2.

Explanation:

this is the latest version as of October 2021.

I hope I helped you!

4 0
2 years ago
Differentiate the term, "bundling," as applied to a Mac/Apple computer and a PC.
saw5 [17]

Answer:

Mac comes with the up (or is bundled with) the up-to-date OS where with windows there are multiple flavors to choose from.

Explanation:

Sorry if its wrong

8 0
3 years ago
Run-time parameters passed to a function allow you to use different values each time the function is called.
stich3 [128]

Answer:

True

Explanation:

Run-time parameters passed to a function allow you to use different values each time the function is called. Let us consider an example:

int add(int a,int b){

   return a+b;

}

Now we can execute the same function with different parameters at runtime:

add(3,4) returns 7.

add(1,2) return 3.

add (10,1) return 11.

During each invocation , the formal function parameters are substituted by actual runtime values and the function code is executed.

8 0
3 years ago
You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
Sergeu [11.5K]

Answer:

Active Attack

• It is an active attack 1, because someone is actively attacking your system. It is also an active attack because it is affecting the way your system works negatively, and visibly.

• 2, because they have been caught for actively committing a crime.

• lastly, because a brute-force is classified as an active attack, regardless. It is an illegal way to attempt to damage, steal or change a root password.

•<em> Fun fact </em>

 <em>A DDoS(distributed denial-of-service) is also classified as an active attack.</em>

6 0
2 years ago
Other questions:
  • List four examples of soft and hard skills
    10·2 answers
  • Insurance can help you:
    11·1 answer
  • Why it is important for everyday people to have access to credible online information?
    9·2 answers
  • Write the definition of a function printAttitude , which hasan int parameter and returns nothing. The function prints amessage t
    13·1 answer
  • Which tab is used to configure editing restrictions in Word 2016? Review References Security Developer
    6·2 answers
  • What is your favorite food
    11·2 answers
  • A special case of the non-inverting amplifier is when
    12·1 answer
  • Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
    11·1 answer
  • If you have _____, you can evaluate whether information is misleading, biased, or out of date. Group of answer choices informati
    7·1 answer
  • Which iteration must have an expression that has a true or false value?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!