1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
2 years ago
13

Please fill in I give 50 points!!

Computers and Technology
1 answer:
wariber [46]2 years ago
3 0

Answer:

* explains the whole paragraph what ever that is * there

You might be interested in
What is the difference between Windows 7 and Windows 10?
Tanzania [10]
Windows 10 is new and windows 7 is old
6 0
3 years ago
What can be used to store data, plant viruses, or steal data?
SCORPION-xisa [38]

Answer:

<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

4 0
3 years ago
Question # 4 Dropdown Finish the code for this function. ​
DaniilM [7]

Answer:

==

Explanation:

I did it on edge 2021

8 0
3 years ago
Read 2 more answers
Explain software piracy and Hacking​
Andru [333]

Answer:

Hacking refers to attempts to gain information from otherwise undisclosed areas. Hacking is the most commonly known computer crime, however, people refer to hacking as committing any criminal act using a computer while this is not the case. ... Piracy refers to the unauthorized duplication of computer software.

Hope this helps!!

Explanation:

8 0
3 years ago
Read 2 more answers
What tasks do data entry macros commonly perform? Check all that apply.
Paha777 [63]

Answer:

test whether a user entered a value

3 0
3 years ago
Other questions:
  • Write an overloaded constructor for the Table class that will take a single argument for the color of the table Write a set meth
    13·1 answer
  • In her presentation, Emily has inserted two tables in a slide and formatted the text on all slides. Which feature of the present
    12·1 answer
  • What is the name of the keyboard developed in the 1930s?
    13·1 answer
  • In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as wel
    7·1 answer
  • A network technician is designing a network for a small company. The network technician needs to implement an email server and w
    7·1 answer
  • What is the output of the following program?
    5·1 answer
  • Which is an example of a table style option?
    7·1 answer
  • n a particular board game, there is exactly one row and it comprises N spaces, numbered 0 through N - 1 from left to right. Ther
    12·1 answer
  • Edhesive 7.2 code practice Write a function named ilovepython that prints out I love Python three times. Then, call that functio
    13·1 answer
  • Topic: Video Games
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!