1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
2 years ago
15

The Synonyms submenu offers a list of synonyms for a word. Is it always a good idea to use whatever synonyms are presented on th

e Synonyms submenu for a given word? Why or why not?
Computers and Technology
1 answer:
Ann [662]2 years ago
7 0

Answer:

No

Explanation:

Synonyms are sometimes NEARLY the same. Not exactly the same. Therefore the meanings can change a bit. For example a synonym for "bad" is "careless."

"I think corn is bad."

and

"I think corn is careless." - this sentence wouldn't make sense.

That's why, no, you shouldn't ALWAYS use the synonym.

You might be interested in
Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
VikaD [51]

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

5 0
3 years ago
Declare a prototype for a function called isPrime that returns true or false and expects a single parameter named number of type
Sphinxa [80]

<u>Answer:</u>

<em>A prototype for a function called isPrime that returns is true.</em>

<u>Explanation:</u>

Function prototype is just a skeletal part of the function which has <em>a return type, function name and the respective parameters. </em>

There is a difference between function and function prototype.

Function is nothing but a <em>function definition</em>, where it actually has all the lines of codes which need to be processed when it is called. It can be invoked any number of times and anywhere within the<em> scope of the function</em>. <em> </em>

As per the given question, the prototype can be,

<em>bool isPrime (int); </em>

7 0
3 years ago
Variables set equal to patterns are said to be:_______.
NemiM [27]

Answer:

b. instantiated.

Explanation:

In computer programming, to be instatiated or when variables are instatiated; this simply refers to the acts of making example out of a group variables or a form of template. For example in a situation of class of objects.

Hence, in this case, the correct answer to the question above is the option B, in which Variables set equal to patterns are said to be INSTATIATED

5 0
3 years ago
A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b
MrRa [10]
Yes you will mate, hope this helps!
7 0
3 years ago
Which of the following is true of two-factor authentication?
dybincka [34]

Answer: D)It relies on two independent proofs of identity.

Explanation: Two factor authentication is technique which uses two steps/stage for the verification or authentication.It is done for the extra security maintenance.IT is also known as 2FA. It consist of two different authentication component so that it penetrates through double protection layer .

Other options are incorrect because It RSA public key cannot be used for the authentication of private content. It does not use both hand geometry at same time for both the levels and It does not utilize only single sign-on technology. Thus, the correct option is option(D).

7 0
3 years ago
Other questions:
  • Which function can you use to abbreviate the lengthy expression, A1+A2+A3+A3...+A19+A20?  MAX COUNT SUM ROUND
    10·2 answers
  • Josh's boss asked him to write a letter to their customers explaining some upcoming price increases. But Josh was in a hurry to
    8·2 answers
  • Fact about energy that will make a knex car move
    7·2 answers
  • "What is the capital of Belarus?" is an example of what type of search query
    10·2 answers
  • I need help getting earbuds please help
    11·2 answers
  • Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate
    11·1 answer
  • How are comments in a Java program treated by the compiler?
    14·2 answers
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
  • What is the difference between a crosstab query and a subquery?
    11·2 answers
  • 1.Microsoft Word is a/an ........​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!