1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
4 years ago
8

Write a javascript class called theclass that contains a method called thealert that pops up an alert saying "boo"

Computers and Technology
1 answer:
Korolek [52]4 years ago
8 0
This can't be answered
You might be interested in
Digital cameras are less susceptible to UV light true or false
Nesterboy [21]
Yes because the UV light is brighter
3 0
3 years ago
Read 2 more answers
Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute
GuDViN [60]

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

8 0
3 years ago
Which component is likely to be a performance bottleneck on a workstation used to edit digital movies
rjkz [21]

Explanation:

The disk subsystem - the files will be too large to be stored completely in system memory and so must be streamed from the disk, which will need to be both large and fast.

4 0
3 years ago
Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
galben [10]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Depending on the needs of the device programmers these OS have various locking frameworks. Spinlocks become beneficial for preemptive multitasking processes during which a thread will operate in such an active loop instead of risking a rest queue latency. Mutexes become beneficial to utility lockers.

  • Solaris 2 employs flexible mutexes, indicating something like this on preemptive multitasking computers, the mutex is introduced with either a spinning switch.
  • Semaphores and state variations are much more effective methods for consistency where a commodity needs to be managed for such a prolonged period of time because spinning is unstable over a prolonged time.

8 0
3 years ago
Why do computers need RAM and ROM?<br>Please explain simply. :)
amm1812
RAM stands for Random Access Memory
ROM stands for Read Only Memory

Computers need RAM because RAM is the place in the computers, where the operating system, application programs, and data (in current use) are stored that way the computers processor can easily reach it. ROM is memory that can not be changed by a program or the user. ROM has its memory even after it is turned off. ROM is an example of telling your computer how to start up.

Sorry that was kinda long. Hope this helps you out! Have an AWESOME rest of your day!
3 0
3 years ago
Other questions:
  • The class shown below called is called CSVReader. Use this class exactly as it is written (specifically don’t add any instance v
    8·1 answer
  • The extension name of a java bytecode file is ________.
    8·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills
    5·1 answer
  • What are the basic problem that my pc can have?
    14·1 answer
  • Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model
    7·1 answer
  • Student aid is based on either financial need or _____ need.
    12·2 answers
  • What is a spark line? how is a different a chart​
    14·1 answer
  • Rick is teaching a photographic worship about sun color and image. He shows the students a few images to teach them about contra
    12·1 answer
  • What is a benefit of using a client/server network?
    7·1 answer
  • Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!