1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
8

Which is a feature of a strong thesis statement?

Computers and Technology
1 answer:
inessss [21]3 years ago
6 0
A strong thesis statement should answer, but not elaborate on your opinion, or the facts of the central question.
You might be interested in
Please help me on this I don't know which one they are​
Nutka1998 [239]
Hi, the photo doesn’t show the question on what to answer, all I see are empt boxes, if you message me the question I will answer it for you!
7 0
3 years ago
Read 2 more answers
Firestick optimizing system storage and applications loop
fiasKO [112]

Answer:

IF THIS DOES OCCUR THEN THE SYSTEM WILL AUTOMATICALLY CUT OFF WITH NO WARNING AT ALL...

Explanation:

ON WHAT INFORMATION AND RESEARCH HAS GIVEN ME IT WILL BE THE  AWNSER GIVEN AT THE TOP...

7 0
2 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
Observe the things at Home in which you are using binary
vazorg [7]

Explanation:

All five things i can come up with her

1. Doors (we either open or close them)

2. Tap (we either open or close the valve)

3.  Electric stove/cooker

4. The lid of containers

5. Shoes/ foot wears(we put them ON or OFF)

7 0
3 years ago
US-CERT is a set of moderated mailing lists full of detailed, full-disclosure discussions and announcements about computer secur
n200080 [17]

Answer:

False

Explanation:

BugTraq is a high volume, full disclosure mailing list for the detailed discussion and announcement of computer security vulnerabilities, not US-CERT

3 0
3 years ago
Other questions:
  • The house had a wonderful pool of ... (his/its/our) own.​
    5·1 answer
  • What part of a file name does windows use to know which application to open to manage the file?
    13·2 answers
  • Which registry hive is loaded first during windows startup?
    5·1 answer
  • Write a program to read data from a file named problem 2. ext. This file has three exams data (floating point data) in three col
    11·1 answer
  • Please Do Solve it guys...
    6·1 answer
  • Good ways to increase sales on phone accesories?
    10·2 answers
  • When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequen
    15·1 answer
  • Help101111 avatar can we be friend's please? My name is Keegan. what is yours?
    12·1 answer
  • Write Epic username plz
    6·1 answer
  • Internal exception java.net.socketexception connection reset 1.18
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!