1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
14

ONLY ANSWER IF YOU KNOW HOW TO WRITE THIS CODE

Computers and Technology
2 answers:
denis-greek [22]3 years ago
8 0

Answer:

WRITE THIS CODE

WRITE

WRITE

DochEvi [55]3 years ago
7 0

RHE CODE THW CODE WYM 2 WHSHDBDNDJDJDJJRJRD

You might be interested in
Type the correct answer in the book spell all words correctly Michael and Bob are discussing the execution of a JavaScript code
g100num [7]

Answer: I think C++ of https

Explanation: I hope it's right

6 0
4 years ago
Which printing process uses a toner that sticks to the charged drum and thermally fuses onto a page?
PSYCHO15rus [73]
<h2>Hello!</h2>

The answer is: B. electrostatic printing.

<h2>Why?</h2>

Electrostatic printing (laser printing) is the process where a laser beam passes   repeatedly (back and forth) over a negatively charged cylinder (drum) drawing a differentially charged image, then,  the drum is coated in electrically charged powder (toner), finally,  the paper is heated in order to fuse the toner to the paper.

Have a nice day!

7 0
3 years ago
Knowing what you know now about frequency analysis, would you feel comfortable sending your password over the Internet using a s
EleoNora [17]

Answer:

The following scenario is False.

Explanation:

In the following question, there is some information about the question is missing that is True / False.

The above statement is false because though hard, it would still be decoded by others. So, we cannot feel safe or comfortable while sending our password to anyone through the internet because it is not safe and someone decodes it and they steal the following information or they can misuse the following data also.

3 0
3 years ago
Information stored on CD-ROM disc must be read and then erased.True or false?​
Kisachek [45]

Answer:

False

Explanation:

3 0
3 years ago
What is the first step to understand the potential impact to the business about a Security threat?
Anastasy [175]

Answer:

<u>Identify assets and their values</u>

Explanation:

As a security analyst, the first step to determine the potential security threat is to understand

  • what kind of assets needs to be protected?
  • what is the value of such assets?

7 0
3 years ago
Other questions:
  • Jim has listed stages of the product life cycle in his presentation. Which slide element can Jim use to make the items in the li
    7·2 answers
  • Is the ability to use digital tools for reading communicating and learning online?​
    5·1 answer
  • PLS HURRY<br> Look at the image below
    15·1 answer
  • A = 250; B = 325. which of the following statements is true? A ==B A&gt;B A =B
    12·1 answer
  • Question #2
    15·2 answers
  • What are the different methods of enhancing/decorating<br> bamboo product​
    15·1 answer
  • What is a graphics card?
    5·1 answer
  • What is an a free open source content management system for publishing web content​
    8·1 answer
  • Could anyone help me with this assignment please?
    6·1 answer
  • Becuase privacy is personal customers, where should your data privacy efforts align?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!