1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
7

If in your checkout cart right before you buy something there is an option saying "this order contains a gift." on amazon, what

happens when you click that
Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
7 0
You have to pick a gift. Mostly it's a dollar. Then you can go back and continue.
You might be interested in
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
The purchase of one cup of coffee a day what's going to do
xz_007 [3.2K]
Well if you add it up , if one cup of coffe is $1, then in one year it would be $365 on coffe.
7 0
3 years ago
Read 2 more answers
C programming:
mixas84 [53]
IsTeenager = ( ( kidAge >= 13 ) && ( kidAge <= 19 ) ) ? true : false;

Another way:

if( ( kidAge >= 13 ) && ( kidAge <= 19 ) )
  isTeenager = true;
else
   isTeenager = false;
8 0
3 years ago
When you heat a pot on a stove, the handle gets warm. which type of heat transfer is possible
valina [46]

Answer:

conduction

Explanation:

The handle will warm up until it's total heat losses equal the total heat coming in. Heat comes in mostly by conduction from the body of the pot.

5 0
3 years ago
Read 2 more answers
Assuming that s and t are Strings, which of the following code fragments are such that the value returned by s.indexOf( t ) befo
KengaRu [80]

Answer:

What programming language is this

Explanation:

5 0
3 years ago
Other questions:
  • Read each scenario, and then select the best wireless device for the worker’s needs. A trucker is constantly on the road. He fre
    8·2 answers
  • Describe mobile computing
    7·1 answer
  • Explain why professional software that is developed for a customer is not simply the programs that have been developed and deliv
    13·1 answer
  • In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
    14·1 answer
  • Kevin needs to get his data from a database into a text file to send to another group. He needs to _____.
    12·2 answers
  • Where do charts get the data series names?
    14·1 answer
  • Please help me I need a help
    13·1 answer
  • The sun can be an excellent source of natural light.<br> True.<br> False.
    8·2 answers
  • QUESTION 5
    9·1 answer
  • Location of a video or photoshoot is not important when it comes to preplanning the shoot.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!