1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
2 years ago
12

Explain an example of a blacklisting program and how it works

Computers and Technology
1 answer:
masha68 [24]2 years ago
8 0

A blacklist might consist, for example, of a list of names developed by a company that refuses to hire individuals who have been identified as union organizers; a country that seeks to boycott trade with other countries for political reasons; a LABOR UNION that identifies firms with which it will not work

You might be interested in
Which programming element is used by a game program to track and display score information
laiz [17]
I think the answer is variables.
4 0
4 years ago
Read 2 more answers
If you create and invoke a recursive function without accounting for a base case, what can go wrong?
oksian1 [2.3K]

Every recursive function should have an exit criterion (=handling the base case) to exit the recursion.

Without it, it wil recurse forever, until system resources run out (typically the call stack will overflow and your program will crash).

6 0
3 years ago
Current versions of windows support file names up to ________ characters long
Verizon [17]
Newer, or current versions of Windows from XP to 10 use the NTFS file system. The file system supports up to 255 characters in a file name. The total path length supports up to 30,000 characters.
3 0
4 years ago
¿Cuales son las empresas mas exitosas que aún usan hoja de cálculo? porfa es urgentee
dem82 [27]

Answer:excel

Explanation:

6 0
3 years ago
One of the newest electronic conveniences is the ________, which can serve as a credit card, a debit card, and even unlock doors
77julia77 [94]
Computer Chips. / SILICON. This is just an educated guess
7 0
4 years ago
Other questions:
  • Your boss calls you from his home to use the vpn connection you configured for him on his laptop. he has traditionally depended
    6·1 answer
  • Write a program that reads in text from standard input (hint: use Scanner) and prints out the number of words in the text. For t
    5·1 answer
  • Which of the following scenarios can best be addressed by operations management?
    11·1 answer
  • The function of the file server is to : 1. store data and software programs that can be used by client computers on the network.
    12·1 answer
  • What 2 important components are found on a motherboard? (2 points each)
    13·1 answer
  • What are the paparazzi?
    8·1 answer
  • Task 1
    9·1 answer
  • Plagiarism is considered
    6·1 answer
  • swer from the options 1. How many basic input devices does a desktop computer have? a)2 b)3 c)1 d)4 2. The computer equipment wh
    8·1 answer
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!