1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
9

Free points! your welcome

Computers and Technology
2 answers:
larisa [96]3 years ago
6 0

Answer:

thanks! Have a good day!

Explanation:

Dvinal [7]3 years ago
5 0

Answer:

Thanks!!!!

Explanation:

You might be interested in
Are sql injections legal?
natima [27]

Essentially, if you are seen to be someone who knows what you are doing, then even typing in a single-quote to a web form has been enough to be arrested and charged over in the past.

But lets say i'm writing a pen test tool that will be doing sqli testing and let it loose on sites that are 'out in the wild'. I'm not going to be doing dumps of any information. But is just the vulnerability scan itself illegal?



8 0
3 years ago
Assume that c is a char variable has been declared and already given a value. write an expression whose value is true if and onl
lara [203]
Return isgraph(c));
////////////////

7 0
2 years ago
How have advances in computer technology changed the planning process?
Nady [450]

I am assuming you are talking about programming

I hope this helps

OPEN THE ATTACHMENT

6 0
2 years ago
What operating system good for 3d modeler
Brrunno [24]

Answer:

If you're looking for a distribution to use for 3D work, we would recommend trying either CentOS or Ubuntu, in second place. It can be installed on any PC computer that is able to run windows, and can even dual boot. It can not, however run windows or mac applications.

Explanation:

<h3>I hope this helps!</h3>
5 0
2 years ago
Read 2 more answers
Companies use virtualization to do all of the following except:
dangina [55]

Answer:

c)

Explanation:

Virtualization refers to running a virtual instance of a computer system apart from the actual software. Companies use this virtualization to do all of the following except Reduce the amount of applications in corporate datacenters. Instead few systems have the applications and those systems are cloned through virtualization.

4 0
3 years ago
Other questions:
  • Suppose your company has decided that it needs to make certain busy servers faster. Processes in the workload spend 60% of their
    5·1 answer
  • A way to have cells in your spreadsheet change formats based on the value of the cells is called ________.
    8·1 answer
  • P3. In Section 4.2 , we noted that the maximum queuing delay is (n–1)D if the switching fabric is n times faster than the input
    8·1 answer
  • The various online technology tools that enable people to communicate easily via the Internet to share information and resources
    5·1 answer
  • How does collaborating on a project improve its quality?
    9·1 answer
  • Which of the following statements represents the number of columns in a regular two-dimensional array named values?
    9·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    10·1 answer
  • Write code that does the following: opens an output file with the filename number_list.txt, uses a loop to write the numbers 1 t
    8·1 answer
  • Which statement is true of integrating an expert system into the database component of a decision support system (DSS)? a. It re
    14·2 answers
  • Write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate cond
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!