1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
14

Yes, because it allows many users to get together and work to help project their services.

Computers and Technology
1 answer:
gregori [183]3 years ago
7 0
Whats the question lmaoooooooooooooooooooooo
You might be interested in
Plz answer the following ​
Kruka [31]

Answer:

it trojan

Explanation:

what is the question asking

5 0
3 years ago
Read 2 more answers
You have been tasked with training end users in security best practices and have observed a trend among users in which many are
quester [9]

Hi, A Tech-Savvy here.

Answer:

(C) Lengthen the time period between forced password changes.

7 0
2 years ago
Your personality is that of everyone else
lubasha [3.4K]

hmmmmm but is it really

5 0
3 years ago
Read 2 more answers
Implement the function couple, which takes in two lists and returns a list that contains lists with i-th elements of two sequenc
In-s [12.5K]

Answer:

couple.py

def couple(s1,s2):

  newlist = []

  for i in range(len(s1)):

      newlist.append([s1[i],s2[i]])

  return newlist

s1=[1,2,3]

s2=[4,5,6]

print(couple(s1,s2))

enum.py

def couple(s1,s2):

  newlist = []

  for i in range(len(s1)):

      newlist.append([s1[i],s2[i]])

  return newlist

def enumerate(s,start=0):

  number_Array=[ i for i in range(start,start+len(s))]

  return couple(number_Array,s)

s=[6,1,'a']

print(enumerate(s))

print(enumerate('five',5))

Explanation:

7 0
3 years ago
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
2 years ago
Other questions:
  • In your presentation you added a text box to?
    5·1 answer
  • What is the difference between a fragment shader and vertex shader? How do they relate?
    8·1 answer
  • How does emotional awareness help you with non-verbal communication?
    13·2 answers
  • Which statement is true of Web-based social media?
    12·1 answer
  • Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different
    13·1 answer
  • Code embedded into an HTML page and downloaded by a user; resides on the client and helps process Web form input. Common clients
    9·1 answer
  • Hi there! I just started my beginner computer science class and I was wondering if anyone wants to help with an assignment i'm h
    15·1 answer
  • What is an operating system that controls some aspects of the computer?
    10·2 answers
  • Which network device sends data to every device that is connected to it?.
    7·1 answer
  • What feature should you enable to prevent the sidhistory attribute from being used to falsely gain administrative privileges in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!