1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
11

You can replace the parentheses on a function call with square brackets.

Computers and Technology
1 answer:
victus00 [196]3 years ago
3 0

Answer:

ok is that a question or an answer because that does not make since

Explanation:

You might be interested in
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
2 years ago
Hey guys,i have a question. 2x + 7x + 1y.how do i simplify it
Nastasia [14]

Answer:

9x+y Lol use photo math :) !!

5 0
3 years ago
Which of the following best characterizes the state of programming languages over time? They increase in popularity as more prod
Rufina [12.5K]
<h2>Answer:</h2>

Option D: They vary based on popularity and market demand of products designed with the language.

is the correct answer that best categorizes the state o programming languages over time.

<h2 /><h2>Explanation:</h2>

With the advent of time, new programming languages are also introduced. But this doesn't means that the older ones are loosing or gaining popularity because of others. Changing or development of product design in the market tells us that the programming languages have their own specific properties on the basis of which they are used.

From this we can conclude that a programming language gets popular due to its specifications and features that may not get diminished by the features o other programming languages.

<h3>For example:</h3>
  • Java script is used mostly to create desktop apps.
  • C language is used widely in embedded systems and electronics.

<h3>I hope it will help you a lot!</h3>
8 0
4 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
4 years ago
Read 2 more answers
Walking paths across the part is represented by the equation why equals -4x - 6​
Setler79 [48]

Answer:

I believe this is a graph question which would be impossible to do on brainly. Butttt, if so, -4x means you would go to the right 4, and the 6 means you would go up 6

Hope this helps:)

if you want to further explain question I'd be glad to help :))

5 0
3 years ago
Other questions:
  • What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
    9·2 answers
  • What does "WPA" stand for?
    15·2 answers
  • To view the contents of a file that was compressed with the bzip2 utility, you must used the ____________________ command.
    9·1 answer
  • A triangle is an example of __________ .
    9·1 answer
  • WILL UPVOTE ALL plz
    11·1 answer
  • Write a python program that asks the user to enter a student's name and 8 numeric tests scores (out of 100 for each test). The n
    5·1 answer
  • The attacker sent data that was able to manipulate the return address that is reserved to store expected data
    5·1 answer
  • Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh
    13·1 answer
  • Compute series multiplier resistors RM = 100Ω:
    8·1 answer
  • Alguien me podria ayudar a hacer este codigo porfavor? en php Desarrolle el código que solicite los datos (desde teclado) Nombre
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!