1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
2 years ago
8

Alayna is researching information online to write her essay about the Berlin Wall.

Computers and Technology
1 answer:
Rasek [7]2 years ago
5 0

Answer:

b

Explanation:

because it is most accurate

You might be interested in
What does PRAM stand for?
Nana76 [90]
<span>PRAM- Phase-Change Random Access Memory</span>
7 0
3 years ago
Read 2 more answers
10 Ejemplos de Software de Sistema. AYUDENME POR FAVOR SE LOS SUPLICO
bearhunter [10]

Answer:

MacOS, Linux, Android, Microsoft Windows, software de ciencia computacional, motores de juegos, automatización industrial y aplicaciones de software como servicio.

:-) (-:

6 0
3 years ago
How to use the copy machine for creating a copy on the auto feed, from 1 sided to 2 sidedcopy. (2-3 paragraphs)
Bond [772]
Just take the page out and flip it.
3 0
3 years ago
Describe an appropriate study routine. Include characteristics of an appropriate time and place to complete study activities.
iVinArrow [24]
When you get off of school while it is fresh in your mind and in a quiet place where you can stay on task without distractions.

7 0
3 years ago
Read 2 more answers
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
Other questions:
  • Plz answer these questions...those who give answer get the brainliest......hurry up..!!!​
    14·1 answer
  • Which of the following is where you can save, select a template, change document properties, and close or exit excel?
    8·1 answer
  • Which of the following is the correct style tag for having the web page's text be aligned to the right?
    6·2 answers
  • Name 3 examples of operating system software that are not Windows based.
    5·1 answer
  • A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
    5·2 answers
  • True or false
    10·1 answer
  • The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
    8·1 answer
  • 3.29 LAB: Login name Write a program that creates a login name for a user, given the user's first name, last name, and a four-di
    10·1 answer
  • Which program will have the output shown below?
    11·2 answers
  • Who invented Satellites? What purpose does it serve? How has it impacted society today?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!