1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
4 years ago
15

Which of the following processes should angel use to merge cells a1:d4 to create a title

Computers and Technology
1 answer:
liubo4ka [24]4 years ago
4 0
<span>A. =AVG(A1:A10). hope it helps</span>
You might be interested in
WHAT BIRD IS SHOWN ON THE ARM OF BLOODHOUND?
ruslelena [56]

Answer:

Looks like a raven to me

Explanation:

4 0
4 years ago
Read 2 more answers
The AND operator is a disjunction and the OR operator is a conjunction.
qwelly [4]

Answer:

True but it might be false but i think is true

8 0
3 years ago
A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the se
Nata [24]

Answer:

The correct answer is Option(A) i.e., An SQL injection attack is being

attempted.

Explanation:

In this given question some information is missing and is not the complete question. The missing is given as :

SELECT * FROM and ‘1’ = ‘1’

Which of the following can the security administrator determine from this?

A. The SQL injection attacked is being attempted.

B. An Legitimated connections is being dropped.

C. The network scan are being done by the system.

D. An attack of XSS is being attempted.

Now, coming to the answer "The security administration sees that an SQL injection is attempted while it notices a lot of connection dropped and has replaced with the firewall and will be the possible issue flagged on it, SQL injection is a type of injection that possibly executes harmful or malicious statements and effects any website or web application".

Hence the correct answer is Option A.

5 0
3 years ago
Why is wearable technology important?
BaLLatris [955]
If you are in war, Wearable Technology would provide Night Vision which would spot Hostile Soldiers in forests or in the dark.
8 0
3 years ago
You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your univer
inna [77]

Answer and Explanation:

  • The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.
  • The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.
  • The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.
  • The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.
  • The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.
  • The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.
8 0
3 years ago
Other questions:
  • A device that produces a permanent human-readable text of graphic document.
    15·1 answer
  • A machine called a centrifuge is used in _____.
    8·1 answer
  • Professional photography is a competitive job field. <br> true <br> false
    12·2 answers
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • What table element represents a field within a record in powerpoint A column B Row C header D footer
    14·1 answer
  • True or False?Only flying unmanned aircraft over 20lbs requires preparation and safety calculations.
    8·1 answer
  • You want to copy data from one cell or range to an adjacent cell or range in your spreadsheet, without using a shortcut key. Whi
    10·1 answer
  • A chip that wakes up the computer system
    10·1 answer
  • Moving images of real event​
    12·2 answers
  • 1. (01.03 MC) What is a string in Python
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!