1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
8

Tricia needs to tell her browser how to display a web page. What will she need to use? Compiler

Computers and Technology
1 answer:
Tanya [424]3 years ago
5 0
You will need to use a translator
You might be interested in
6. Write a C++ program to print the largest three elements in an array. <br>​
jasenka [17]

Answer:

if (arr[i] > max) -> max3 = max2, max2 = max , max = arr[i]. else if (arr[i] > max2) -> max3 = max2, max2 = arr[i]. else if (arr[i] > max3) -> max3 = arr[i]. At the end of the loop, we will print all three values.

7 0
2 years ago
Which function converts the user's input to a number with a decimal?
levacccp [35]

Answer:

Explanation: integer is the meaning of int() if you payed attention to programming class, int() would be a WHOLE number and not a decimal number, 2nd of all, a decimal number would be float() so the answer is int() hope i helped!

Explanation:

hope this helped good luck

4 0
3 years ago
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
juin [17]

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
5 0
3 years ago
In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the
rusak2 [61]

Answer:

Explanation:

def the_perfect(n):

  try: #exception handling if n is a negative number

       n > 0

   except: #return -1 if the error is reached

       return -1

  else:

        total = 0

        for i in range(1, n): #for loop from 1 to the target number

           if n % i == 0:

               total += i

   return total == n  #should return true if number is perfect number

print(perfect_number(8))

8 0
3 years ago
Properly defined the primary part of a CPU​
zloy xaker [14]

Answer:

The CPU dye or the tiny resistors

Explanation:

fdsafdjslakjfdkslajfdklsajfkldsajfkldsajfkldsajfklsdajfkldsajfkldsaklfdsjal

8 0
4 years ago
Other questions:
  • A small company has developed a specialized software product that it configures specially for each customer. New customers usual
    14·1 answer
  • The stack ADT may be implemented with
    13·1 answer
  • Your friend wants to know about Microsoft Expression Web 4. Which of the following terms will you use to describe Microsoft Expr
    5·1 answer
  • Which option allows you to add different effects for each of the bulleted items on your slide
    13·1 answer
  • When you use your fingerprint on a reader attached to your computer to authenticate yourself as the legitimate computer user, wh
    6·1 answer
  • Assuming that a year has 365 days, write a class named DayOfYear that takes an integer representing a day of the year and transl
    6·1 answer
  • Please label the parts its urgent Best answer receives a brainliest and 20 points please i need it :) :) ​
    5·2 answers
  • Regular languages are closed under complement. True False
    7·1 answer
  • Public class Dog
    7·1 answer
  • When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!