1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
15

How do I write a good personal narrative pls help im struggling very hard rn.​

Computers and Technology
1 answer:
statuscvo [17]3 years ago
4 0

Answer: Find out which starter makes your partner most interested in reading your story.

1. Start with action or dialogue.

2. Ask a question or set of questions.

3. Describe the setting so readers can imagine it.

4. Give background information that will interest readers.

5. Introduce yourself to readers in a surprising way.

Explanation:

You might be interested in
Difference between TIFF and BMP
Lina20 [59]

Answer:

Both TIFF and BMP are bitmap files, but TIFF files contain tags with additional information, like color space, resolution and print size, and can have 16-bit/channel depth (BMP's are limited to 8 bit). Taking a step back, there's no significant problem with first-generation JPEG files which use moderate compression.

Explanation:

4 0
3 years ago
Which of the following is not a scene mode?
tatiyna
I believe the answer is C) Model.
7 0
4 years ago
Read 2 more answers
An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP
yaroslaw [1]

Answer:

The correct option to the following question is option (A) DNS spoofing.

Explanation:

(Domain Name System)DNS spoofing is also known as the Domain Name System Poisoning.

DNS spoofing referred to as the DNS server is the record of 'spoofed' or redirect the traffic. This redirections of the traffic assents the hackers to steal data, spread malware, etc.

<u>DNS works out by using various functions are</u>:

  • 'Compromising the DNS server'
  • 'DNS cache poisoning'
  • 'Implementing the Metropolitan Area Network in Middle Attack'.
5 0
4 years ago
BRAINLIEST plz help
avanturin [10]

Answer:C

Explanation:

8 0
4 years ago
EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.
kipiarov [429]

Electronic data interchange (EDI), <u>e-cash</u>, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

  • Electronic data interchange (EDI).
  • e-cash.
  • Smart cards.
  • Digital certificates.

Read more: brainly.com/question/24112967

7 0
3 years ago
Other questions:
  • Question 9.9. Encryption is BEST described as
    12·1 answer
  • Write a Tip Calculator in code in VMware Fusion
    13·1 answer
  • Suppose we are comparing implementations of insertion sort and merge sort on the same machine. for inputs of size n, insertion s
    10·1 answer
  • PLEASE HELP ASAP i will mark brilliant
    12·2 answers
  • C programming:
    13·1 answer
  • HOW DO I TURN THE CAPS LOCK OFF???? PLEASE HELP IT WONT STOP!!!!
    5·2 answers
  • How many components of a computer? ​
    11·1 answer
  • It's the same drop-down answers for both.
    15·1 answer
  • Any task done by software can also be done using computer hardware, and any operation performed directly by hardware can be done
    8·1 answer
  • What is the most appropriate data type for each of these items?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!