1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
4 years ago
14

The second finger on the left hand types _____. 3 E D C 1 Q A Z 7 U J M 8 I K ,

Computers and Technology
2 answers:
hram777 [196]4 years ago
7 0
The first finger on the left (Index) is choice "2" (1,Q,A,Z)

The second finger on the right (Middle) is choice "4" (8,I,K)

The first finger on the right (Index) is "3" (7,U,J,M

Which leaves choice "1" (3,E,D,C)

Hope this helps
Gennadij [26K]4 years ago
5 0

he second finger on the right (Middle) is choice "4" (8,I,K)

You might be interested in
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
sashaice [31]

Answer:

The answer is below

Explanation:

Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.

When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.

5 0
3 years ago
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
lakkis [162]

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

7 0
3 years ago
8. Given the array String[] words, which already contains 1 or more values, write a block of code which counts and returns the n
Vikentia [17]

Answer:

Following are the code to this question:

public class Main//defining a class

{

public static void main(String[] arg)//defining main method

{

  String[] words={"Key","day", "Know", "kind"};//defining array of String words

  int x=0;//defining integer variable for count value

  for(int i=0;i<words.length;i++)//defining for loop for count value

  {

 if(words[i].startsWith("k")||words[i].startsWith("K"))//use if block to check word start from k

  x=x+1;//increment the value of x

  }

System.out.print("The number of letters which starts from k is: "+ x);//print value with message

}

}

Output:

The number of letters which starts from k is: 3

Explanation:

In this code, inside the main method an array of String "words" is defined that hold a value, and in the next step an integer variable "x" is defined, which is used to count the letters, which starts from k.

For this, a for loop is used that counts the value and in this an, if block is defined that uses the "startsWith" method to check the value and increment the value of x and at the last, it prints its value.

7 0
3 years ago
In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powere
lora16 [44]

It’s called a “Cold Boot” attack
6 0
3 years ago
Wide area network (WAN) connects multiple networks that are in the same geographical locations.
xeze [42]

Answer:

False.

Explanation:

<em>This is pertaining to LAN or Local Area Network. LAN is a type of network that is consist of one or several networks located in one geographical area or location. Wherein WAN or Wide Area Network is a type of network that is located in different or several geographical area. The basic example of WAN is the Internet. Networks of computers are connected even though they are not wired physically.</em>

5 0
3 years ago
Other questions:
  • Write a program that prints the following 45 pairs of numbers:
    10·1 answer
  • If you value achievement, which of the following is important to you?
    7·2 answers
  • Which PowerShell command will upgrade the VM configuration version to take advantage of the new features in Windows Server 2016?
    12·1 answer
  • In which of the following situations will a macro make your work more efficient?
    12·1 answer
  • By using the internet, your company can obtain discounts thorugh...
    15·2 answers
  • Define function multiply(), and within the function: Get user input() of two strings made of whole numbers Cast the input to int
    11·1 answer
  • What did I do wrong? May you please correct it for me...I was also looking on how to delay when it prints. Like when it prints a
    9·1 answer
  • A mysql prompt has been opened for you. Using the college database, complete the following tasks (use either a single-line or a
    7·1 answer
  • In which career field, would the computing technology industry Associates CompTIAA+ certification be useful?
    12·1 answer
  • Why might you use the More button in the Find and Replace dialog box?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!