1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
5

Which appears at the intersection of a column and row?

Computers and Technology
1 answer:
Evgesh-ka [11]3 years ago
6 0
Between the intersection between every column and row is a cell.
You might be interested in
Which of the following types of tasks are comparatively easy for artificial intelligent systems?
Varvara68 [4.7K]

Answer:

I believe the answer would be B) Expert tasks?

Explanation:

Might be wrong but trust your gut!!

I believe this because.. wasn't that what most AI was made for/programmed to do....??  Carry out tasks that others couldn't do so easily? Ask yourself............

Have a wonderful weekend and good luck!!!

5 0
2 years ago
Networks that are designed to connect similar computers that share data and software with each other are called:_______
sergij07 [2.7K]

Networks that are designed to connect similar computers that share data and software with each other are called: Peer to Peer (P2P) Networks.

<h3>What is a networking software?</h3>

A networking software can be defined as a set of executable instructions (codes) that is typically designed and developed to instruct a networking device on how to perform a specific task or transmit data from one location to another.

<h3>The types of networking software.</h3>

Generally, there are three main types of networking software and these include the following:

  • Security software
  • Connection software
  • Transport software

In Computer networking, Peer to Peer (P2P) Networks can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

7 0
2 years ago
HELP PLEASE ⚠️⚠️⚠️⚠️⚠️⚠️⚠️❗❗❗❗❓❓❓<br> Why does it matter that we protect African Wild Dogs?
pshichka [43]

Explanation:

African wild dogs are among the most effective predators in the world. They use extraordinary cooperation and teamwork to pursue, overhaul and bring down their prey.African wild dogs are struggling to cope with the rapid increase in human settlements and infrastructure development that are encroaching on their traditional range. They are perfectly adapted to their natural environment, but require vast territories to survive – much larger than most other carnivore species. This increased exposure to human contact poses numerous threats to the wild dogs’ survival.

If you have any questions revolving around this topic,feel free to ask me and I will be glad to help,Good luck!

4 0
3 years ago
Read 2 more answers
What are possible challenges for cyber bullying
Anestetic [448]

Answer:

well, you will have your account deleted/ arrested because of cyber bullying

Explanation:

so don't!!! (hint hint XD)

6 0
3 years ago
Read 2 more answers
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Other questions:
  • You are able to change the formatting of a table after it is inserted into a placeholder. True or false
    9·2 answers
  • What device can boost an analog signal? a digital signal?
    12·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • A(n) _____ is a type of computer crime perpetrator whose primary motive is to achieve financial gain.
    5·1 answer
  • The Consumer Price Index (CPI) is the tool used to measure inflation. It is calculated through a ____ which asks the amount of m
    7·1 answer
  • Long-tail keywords are:
    9·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it?
    5·1 answer
  • Does anyone have a pdf of the greatest by eddie van der meer????
    15·1 answer
  • def list_length(shrinking_list): ''' A recursive way to count the number of items in a list. ''' if shrinking_list
    10·1 answer
  • Mencione 2ejemplos de procesos manuales
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!