1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
3 years ago
5

How to build an arch bridge​

Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
3 0

get resources like nails and wood and a couple rolls of tape if anything goes wrong

You might be interested in
The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
SashulF [63]

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

8 0
3 years ago
Can geico save me 15% or more on car insurance?
horsena [70]

Answer:

yes the ad says geico can save you 15% percent or more on car insurance

7 0
3 years ago
Read 2 more answers
HELP ME PLEASE !!!!!!!!!!
Snezhnost [94]

Answer:

the last one

Explanation:

8 0
3 years ago
What term is used to identify the visual interface that displays information it receives from the computer?
olga nikolaevna [1]
The answer to this question is A
7 0
3 years ago
Which of the following did you include in your notes?
iVinArrow [24]

Answer:

How you will be innovative in what you offer

Explanation:

personally I think all 3 but it is what it is

6 0
3 years ago
Other questions:
  • You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
    7·1 answer
  • What year did buck tooth bob become famous
    11·2 answers
  • Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the bool variabl
    6·1 answer
  • Convert 578.2 into hexadecimal​
    9·1 answer
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • A user complains that the pointer movement on his laptop computer is very erratic what should you do?
    9·1 answer
  • What is keyword density?
    15·2 answers
  • A relational database contains a series of _____ that can be connected to form relationships.
    7·1 answer
  • In the context of machine learning, an artificial neural network (ann) is most likely used for?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!