answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katena32 [7]
1 year ago
9

Find true or false. A hacker is hacking software with access in sensitive information from your computer​

Computers and Technology
1 answer:
Alina [70]1 year ago
7 0
ITS TRUE!!I SEARCHED IT
You might be interested in
Which item follows html instructions to assemble web pages
REY [17]

Answer: CSS

Explanation:

Its helps in the designing of the structures that HTML would have created.

5 0
2 years ago
What is the area of a parallelogram whose vertices are A(−1, 12) , B(13, 12) , C(2, −5) , and D(−12, −5) ? Enter your answer in
11Alexandr11 [23.1K]
<span>Looking at the first two vertices, A and B, we see that the x values have a difference of (-1 - 13) units, or 14 units. This gives us the base of the parallelogram. Next, we look at the difference between the y values between B and C to find the height. In this case, they are (12 - [-5] ) units, or 17 units. The area of a parallelogram is simply base multiplied by height, which is (14 * 17), or 238 square units.</span>
3 0
2 years ago
Read 2 more answers
Assume a program requires the execution of 50 x 106 FP instructions, 110 x 106 INT instructions, 80 x 106 L/S instructions, and
Molodets [167]

Explanation:

FP - 50 \times 10^6

CPI - 1

INT -110 \times 10^6,

CPI - 1

I/S - 80 \times 10^6 ,

CPI - 4

Branch - 16 \times 10^6

CPI - 2

Clock Speed - 2 \times 10^9

Time(old) =\frac{50 x 10^6 + 110 x 10^6 + 4 x ( 80 x 10^6) + 2 x (16 x 10^ 6)}{2 x 10^9}

Time(old) = 256 \times 10^ {-3}

Time(new) =  \frac{256 \times 10^{-3}}{2}

                = 128 \times 10^{-3}

                =\frac{CPI(new) x [50 x 10^6 + 110 x 10^6 + 4 x ( 80 x 10^6) + 2 x (16 x 10^ 6)]}{2 x 10^9}

                =  128 \times 10^{-3}

CPI(new) = \frac{-206}{50}

               = -4.12

3 0
2 years ago
5. Many vehicles have indicator lights telling you when your
I am Lyosha [343]

Answer:

A.

Explanation:

The rest is nearly impossible to detect or not worth the time.

8 0
2 years ago
Read 2 more answers
You’re trying to cast a video presentation from your tablet to a projector for a training session with some new hires. Although
Vikki [24]

Answer:

Troubleshooting steps to take:

  1. Restart the tablet
  2. Restart the projector

Explanation:

When such problems occur, the basic and quick troubleshooting step is to restart the device or devices involved.

  1. Restart the tablet: This could come in handy regarding this problem. The inability to connect to the projector could be due to the inability of a specific service or driver needed for the projector. Restarting the tablet will load up the drivers and services again to enable smooth connections. When a restart is done, bugs are fixed, internet connection is rectified, memory leaks are stopped, performance is aided, the RAM (Random Access Memory) is flushed or cleaned. This should resolve the problem, however, if not, try number 2.
  2. Restart the projector: There are driver software on projectors, and due to one system failure or another, these software may fail to load. This could affect its connection to another device. As done in (1), restarting the projector will fix those bugs and load up, which should solve the connection issue.
7 0
2 years ago
Other questions:
  • What is a cursor?
    6·2 answers
  • Richard uses Microsoft outlook as his email client. He wants to check whether he has received any new mail. Identify which key R
    12·1 answer
  • If a street has a central lane bordered by solid yellow and broken yellow lines, you ________________.
    6·1 answer
  • It is an array containing information such as headers, paths and script locations wherein it is created by the web server itself
    8·1 answer
  • In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
    5·1 answer
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    8·1 answer
  • Write a program that calculates taxi fare at a rate of $1.50 per mile. Your pro-gram should interact with the user in this manne
    12·1 answer
  • It is also called teleconferencing or web conferencing,which is an online meeting wherein two or more people can see,hear,and ta
    14·1 answer
  • Docker is focused on ______ containerization.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!