1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
4 years ago
7

Can somebody plz explain this question to me?

Computers and Technology
1 answer:
viktelen [127]4 years ago
5 0
11 30 21 would be the output.
You might be interested in
Why are there problems with patching electronics such as heart rate monitors and MRI machines that run embedded Windows OSs?
timofeeve [1]

Answer:

The various problems with patching electronics such as heart rate monitors and MRI machines that run embedded Windows OSs is that they have a certification which is usually at a specific revision level.

Another issue is that probably the maker or the manufacturer didn’t provide the patch method which would have been used to fix such electronics.

8 0
3 years ago
When a browser is open on your computer, what browser tool is used to move the webpage to the previously viewed page on the brow
ch4aika [34]

Answer:

back arrow button

Explanation:

7 0
3 years ago
Which statement BEST describes the benefits of muscular fitness training? A. High levels of muscular fitness can improve your se
Alenkasestr [34]
I dont really know too much about this, But i know a decent amount so im going to say C or D
7 0
3 years ago
What are chemical manufacturers required to provide to anyone who purchases or uses their chemicals for a work purpose? Select a
Julli [10]

Answer:

Labels and Safety Data Sheets.

Explanation:

Label is a short description of what is inside the container. And Safety Data Sheets has everything that is required. You have precautionary measures listed as well as the training details in the safety data sheets. The training PPE is hence not required definitely. However, the only other thing required is the label, as without that you will not come to know what is inside the container from outside. Hence, the above answer.

8 0
3 years ago
Read 2 more answers
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
Other questions:
  • A touch screen is classified as a special type of scanning device true or false
    15·1 answer
  • What are advanced topics in programming
    15·1 answer
  • The function below takes a single parameter number_list which is a list that can contain integers and floats. Complete the funct
    9·1 answer
  • In the 219th meeting of the American Astronomical Society, what planet's borders were said to be recognizable from space? Hint:
    12·1 answer
  • Joshua needs to join in two cells together which of the following would perform the function
    14·1 answer
  • Which of the following statements about cover letters is false?
    14·2 answers
  • Give one advantage of saving file in the same folder<br>​
    13·2 answers
  • A photojournalist is more employable than a reporter or a photographer because they can perform more than one job
    13·1 answer
  • What is ?
    9·2 answers
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!