1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
2 years ago
14

To find information on a network use a ____

Computers and Technology
1 answer:
igomit [66]2 years ago
4 0

Answer:

circuit

Explanation:

You might be interested in
9. What is composition? Why is composition important?
Veronika [31]
Composition- a work of music, literature, or art

This is important because art helps people express oneself
4 0
3 years ago
Which is a good technique for effectively proofreading your presentation?
laiz [17]
Read it backwords. it helps look for spelling errors.
7 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
What is a basic operation of computers
ruslelena [56]
What is the context of the question? With all that you have provided my best guess would be "computational function/solving"
8 0
3 years ago
Carbon monoxide poisoning can result from breathing
Mamont248 [21]
The answer is the letter a
6 0
3 years ago
Other questions:
  • Number Analysis Program: Write a program that reads data from the text file numbers.txt. Assume the file contains a series of nu
    14·1 answer
  • Which Game Is Better & Favorite For You?
    12·2 answers
  • How many much memory is in one megabyte ?
    9·1 answer
  • What is an objective of state-sponsored attackers?
    11·1 answer
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks yo
    7·1 answer
  • . Which of the following is NOT a valid declaration for a character string?
    6·1 answer
  • Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to
    5·1 answer
  • Brainly is brainly am I correct ​
    11·2 answers
  • A column does not consist of
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!