1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
2 years ago
7

The name for the instructions you write to a computer in a program

Computers and Technology
2 answers:
aliina [53]2 years ago
4 0

Answer:

Code

Explanation:

The code is instructions that you can write yourself or download from online

VMariaS [17]2 years ago
4 0

Answer:

Code

Explanation:

Code

The name for the instructions you write to a computer in a program

You might be interested in
Select three advantages of cloud computing.
Julli [10]

Answer:

A,B,and C

Explanation:

Hopefully this helps!

7 0
3 years ago
Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
Alexeev081 [22]

Answer:

TRUE

Explanation:

Intrusion Detection System (IDS) monitors policy violations or malicious activities in a system or network. It could be a device or a software application.

IDS differs according to the size of the network. There are two main classifications: Host-based Intrusion Detection System (HIDS) and Network Intrusion Detection System (NIDS). HIDS observes important Operating System (OS) files. While the NIDS analyses network traffic, they are placed at a unique point or several unique points to monitor outgoing and incoming traffic within the network.

Hence it tries to identify unique sequences appearing across several packets in a traffic stream than in individual packets.

7 0
3 years ago
A _______ attack is where the input includes code that is then executed by the attacked system.
sweet [91]

Answer: Code injection

Explanation:

3 0
2 years ago
"In about 100 words, discuss the technologies that Walmart’s trucking fleet might use to better manage their operations. Include
Sergio [31]

Answer:

The answer to this question can be described as follows:

Explanation:

The term Tracking technology is divided into two parts first tacking and technology, in which Tracking is being used to increase or decrease the frequency of both the document on one page by increasing or growing the distance among letters, and technology is how we use engineering for intensive purposes.

  • The technology of tracking It is very the fusion of many innovations, that can also be combined to build machines, which follow the material, stock or even the fleets of vehicles. A delivery of situation-based services to wireless networks can be achieved by similar programs.
  • The principal aim is to look at individuals or items on the movement and to provide for the further analysis a timely ordered locational sequence of details.
3 0
3 years ago
Tahir is setting up a message option before sending an e-mail to a colleague. He goes into the Properties dialog box and chooses
Fed [463]

The answer is Sensitivity

Tahir can restrict actions a recipient can take on the messages he sends. It is recommended that you use IRM (Information Rights Management) if available. Choosing the private option will restrict the recipient from taking actions such as forwarding a confidential message to another person. When Tahir selects the private option, the recipient of the message will see a “please treat this as private” in the information bar.

3 0
4 years ago
Other questions:
  • Blender questions
    8·2 answers
  • Which best describes a VPN?
    14·2 answers
  • What width would you choose for the pdf?
    12·1 answer
  • Which type of market are you in if your firm, along with three other firms, controls 95% of the total music industry?
    13·1 answer
  • Why do we have to watch a video to get answers?
    7·2 answers
  • Which workplace trend are outsourcing and telecommuting are examples of? Please select the best answer from the choices provided
    13·2 answers
  • Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers r
    8·1 answer
  • Lab Assignment 3 Phase 1 Create a class named Car, which is supposed to represent cars within a Java program. The following are
    6·1 answer
  • (a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many
    10·1 answer
  • In this program you will read in the number of seconds and convert it to days, hours, minutes and remaining seconds.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!