1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
2 years ago
13

Which method can be used for making a robot perform a different set of functions?

Computers and Technology
1 answer:
stepan [7]2 years ago
4 0

Answer:

D. Because rewriting it can make it preform new functions.

Explanation:

You might be interested in
A standard computer monitor is 1024 pixels wide and 768 pixels tall
Annette [7]
If this is a true or false question the answer is true
8 0
4 years ago
To determine what to study, one should first
BlackZzzverrR [31]
Reading
Re-writing important stuff over again on paper.
highlight
6 0
3 years ago
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
Which type of game controller has a set of controls for each hand?
svet-max [94.6K]
If you play the Wii, they have the controller and then they have a nunchuck that connects to the other controller, and you use that with your other hand. Hope that helps :)
6 0
3 years ago
A network administrator needs information about the printers that employees can access. Where can he find the information? The a
Kaylis [27]
The information can be found on the printserver or terminal serve information where mapped users to the server printers were granted or have access to. On setup of server printers, the administrators allow certain individual access to the terminal server after installing the printer to be made available on the server.
6 0
3 years ago
Read 2 more answers
Other questions:
  • If you combine two cells into one, what action are you performing?
    12·2 answers
  • Re-write the following arithmetic expressions as Scheme expressions and show the result of the Scheme interpreter when invoked o
    13·1 answer
  • 3) An algorithm has a run time of O(nk ) for some integer k. On an input of size 500, the algorithm takes 16 seconds to run. On
    8·1 answer
  • There are two kinds of type that you can add to a document in Photoshop. You can add
    13·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Say you find a module in a package that does a lot of awesomely useful things, but the name of it is module_that_does_many_aweso
    12·1 answer
  • Which of the following statements opens the file info.txt for both input and output? a) dataFile.open("info.txt", ios::in &amp;&
    11·2 answers
  • To protect yourself from the risk of product failure, what strategy could you use?
    15·1 answer
  • In what decade was photography invented? the 1800s the 1820s the 1840s the 1860s
    15·1 answer
  • May someone help me with the this question pls , The governor of a state wants to inform the people about a change in the tax po
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!