1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
4 years ago
5

In the code that follows, window is a/an ____________________________. window.prompt("enter your name");

Computers and Technology
1 answer:
vitfil [10]4 years ago
7 0
An object, or an instance of the class it is referring to.
You might be interested in
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens
Angelina_Jolie [31]

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
5 0
3 years ago
A type of authentication that requires the user to provide something that they know, such
bagirrra123 [75]
The answer would be true
5 0
3 years ago
Write short note on points to consider while using attributes with the tags.​
ASHA 777 [7]

Answer:

Explanation:

Tags are used to display the content but what about the specifics of that content like if a lik should open ina window or the location of an image .Attributes are used to specify things like this regarding the content on your webpages.Attributes are located within tags.Attributes are located in start tag only,not in end tags.

7 0
3 years ago
Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongl
RideAnS [48]

<u>Explanation:</u>

It is important to bear in mind that a penetration tester (analyst) performs a risk management role of a firm's internal system by attempting to break into an IT system.

Here are the benefits to internal systems;

  • They help detect security loopholes before a cyberattack.
  • They determine how vulnerable a network or computer program is.
  • They advise the IT firm's security teams on how to mitigate vulnerabilities detected.

7 0
3 years ago
You are choosing between two different window washing companies. The first charges $5 per window. The second charges a base fee
tatiyna

Answer:

20

Explanation:

8 0
2 years ago
Other questions:
  • By using colocated, replicated hardware and software, cloud solution providers reduce many threats to IT resources.
    5·1 answer
  • A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web br
    7·1 answer
  • Cloud computing service providers manage different computing resources based on the services they offer. Which resources do IaaS
    10·1 answer
  • ________ is/are used to temporarily hold small units of program instructions and data immediately before, during, and after exec
    11·1 answer
  • Which of these is a Microsoft certification for system engineers?
    9·1 answer
  • An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The pho
    12·1 answer
  • For local patterns that change quickly, these methods are preferred 1. data driven 2. model drive 3. trend and seasonality drive
    10·1 answer
  • Describe how to add slide numbers and image to a Microsoft power point presentations ?​
    5·1 answer
  • Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
    9·1 answer
  • Which step of the problem-solving process did the farmer use in order to figure out what success would look like?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!