1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
8

Pls help!!!!!!!!!!!!

Computers and Technology
1 answer:
son4ous [18]3 years ago
5 0

Answer:

i am 100% sure it is (B)

Explanation:

To delete offensive or irrelevant posts  

You might be interested in
Type the correct answer in the box. Spell all words correctly.
OleMash [197]

Answer:The page up and page down keys are sometimes called PgUp or PgDn and they are located on the right of the keyboard with page up on top and page down on the bottom. This short article about technology can be made longer.

Explanation:

3 0
4 years ago
Which lines of the code, marked by Q, are legally declared based on the scope of the variable?​
WINSTONCH [101]

inside a function or a block which is called local variables

4 0
2 years ago
which of these is another name for a pre- written formula a.reference b. function c. value d. selection​
sineoko [7]

Answer:

the answer is b. function

6 0
3 years ago
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
3 years ago
How do you copy from a file to another document<br>​
algol13

Answer:

you highlight it then double tap and click copy or after it is highlighted press ctrl and c together then to paste you double tap and click paste or you can press ctrl v

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" an
    13·2 answers
  • When a relationship is established between two or more arrays by using the same subscript to relate entries between the arrays,
    14·2 answers
  • You are creating a budget for your new business.What should you include
    15·1 answer
  • In 1-2 sentences, describe how to use the thesaurus in the Word Processor you have used.
    7·2 answers
  • Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as netw
    8·1 answer
  • The computer that is used in scientific research is ........​
    7·1 answer
  • Consider the following class definition.
    7·1 answer
  • You cannot then move and resize the control on the form as desired with your mouse TRUE OR FALSE​
    6·2 answers
  • I / a / caught / when / was / on / disease / holiday / I​
    14·2 answers
  • A system that receives drawing information from electronic cad files, prepares the printing materials, and controls the size and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!