1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashcka [7]
2 years ago
15

20 points!!!!! Help, I am being timed!!!!!!!

Computers and Technology
1 answer:
jarptica [38.1K]2 years ago
3 0

Answer: XML files that contain the code that to be inserted, elements that control its behaviour and metadata such as the author's name.

Explanation:

You might be interested in
Software refers to:
aev [14]

Answer:

Software refers to the programs that run on your computer.

Explanation:

Examples are Word and PowerPoint. Computer programs contain instructions that the hardware carries out. ... Another program (called a compiler or interpreter) translates these instructions into machine language which the computer hardware understands.

7 0
3 years ago
Read 2 more answers
Explain the levels of data model​
gregori [183]

Answer:

Data modeling occurs at three levels—physical, logical, and conceptual.

  • A physical model is a schema or framework for how data is physically stored in a database.

  • A conceptual model identifies the high-level, user view of data.

  • A logical data model sits between the physical and conceptual levels and allows for the logical representation of data to be separate from its physical storage.

4 0
3 years ago
Which of the following statement is true? Single choice. (2 Points) Views are virtual tables that are compiled at run time All o
Elenna [48]

Answer:

All of the mentioned views could be looked as an additional layer in the table which enables us to protect intricate or sensitive data based upon our needs.

Explanation:

View is a virtual table which executed a pre compiled query. It is a table in which selective portion of the data can be seen from one or more tables. Queries are not allowed in indexed views and adding column is not possible. Views can be looked as an additional layer in the virtual table which protects sensitive data.

8 0
3 years ago
Your supervisor informs you that she would like to roll-out a VPN solution for your organization. Assume this is a small to mid-
katen-ka-za [31]

Answer:

1) The VPN Client

2) VPN Server

Explanation:

The first VPN solution includes following elements.

1) The VPN Client: In our solution we required a VPN client.

2) VPN Server: The server of VPN includes following elements:

a) IP addressing

b) Tunnel and authentication

c) Remote access policy

d) Filtering

3) The software and hardware includes:

a) VPN enabled optamized router

b) VPN enabled firewall

So, according to first VPN solution we required vpn client as well as the vpn server.

The second solution include the vpn client as well as the vpn server. Here vpn client as well as the vpn

server having very limited functionality.

5 0
3 years ago
When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the
bazaltina [42]

Answer:

The correct answer to the following question will be "Buffer overflow".

Explanation:

  • For security policy and computing, the buffer overflow is a phenomenon where the code overwrites the boundaries of the buffer when adding data to the buffer and overwrites neighboring storage positions.
  • A vulnerability of buffer overflow occurs when you offer so much data to a program. Excessive data corrupts memory space in the vicinity and it may change certain data. As a consequence, the program could report a mistake or act differently. These vulnerabilities are often referred to as buffer overrun.
  • If the programmer constructs a compiled code which does not test for a given quantity of system memory, the buffer overflow would strike on it.

Therefore, Buffer overflow is the right answer.

4 0
3 years ago
Other questions:
  • If you’re presenting in a darkened room, what text and background should you use to provide maximum readability?1) Light text on
    5·1 answer
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(
    8·1 answer
  • What is the specifications, number of sales, positive and negative points and a few popular games of the first PlayStation?
    13·1 answer
  • Communication of a message between two processes implies which of the following? (A) Synchronization (B) Atomic operation (C) Bl
    11·1 answer
  • Is it safe to turn on a computer without ram?
    5·2 answers
  • Hi need help on this <br> what is cyberspace
    14·1 answer
  • Meats ages hair and feathers all contain this monomer
    13·1 answer
  • Who is your favorite MHA Character? Or what anime show of your favorite character
    12·1 answer
  • In your own opinion how comes the surface grinding machine is called a highly accurate machine tool?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!