1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
7

Which of the following is something you need to keep an eye out for

Computers and Technology
2 answers:
cricket20 [7]3 years ago
7 0

Answer:

D. Pedestrians ignoring DON'T WALK signs

Explanation: Near packed intersections pedestrians commonly ignore "don't walk" signs.

Brilliant_brown [7]3 years ago
4 0

Answer:

D. Pedestrians ignoring DON'T WALK signs

Explanation:

Pedestrians ignoring DON'T WALK signs is something you need to keep an eye out for  near packed intersections.

You might be interested in
Given the following class definition and the variable declaration:
Lorico [155]

Answer:

The answer is "Option d".

Explanation:

In the above-given code, two-class is defined that is "employee and manager", in which the first class "employee" defines two variables that are "name, id". In this name is pointer type character and id is a long type variable.

In the second class "manager" one variable "rank" and the employee object is created. In this class, the rank variable is a pointer type character, and outside this class, a reference "x" is created.

In this code, we use both class object that uses the "employee" class variable that is id to hold value in it.

7 0
3 years ago
Write a program that will compare two names. The program prompts the user to enter two names for a comparison. If the names are
asambeis [7]

Answer:

We can use comparison operator 'Equals to' (==) to compare two strings.

Explanation:

We can use conditional statement 'if else' to put conditions. If statement contains boolean expression.If statement is followed by else block. If the boolean expression evaluates to true, then the if block of code is executed, otherwise else block of code is executed.

If we want to compare two strings with uppercase, then we can convert the input strings given by users using ToUpper() string function.

For example,

 string abc;

string uppercase= abc.ToUpper(); // gives ABC as result

I have written a program using c# as a  programming language in a word document and attached the same. Please find. Thank you!

Download doc
5 0
4 years ago
In what type of attack does the attacker send unauthorized commands directly to a database?
Delvig [45]
SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.
4 0
4 years ago
Sql injections is an attack in which __ code is inserted into strings that are later passed to an instance of sql server.
jek_recluse [69]

Answer:

malicious code

Please Mark Brainliest If This Helped!

7 0
2 years ago
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions
docker41 [41]

Answer:

Codes of conduct

Explanation:

Codes of conduct are a set of rules or norms established by an organization for all employees, students or users, to ensure individual responsibilities and proper practices. The code of conduct can cover overall behaviour of individuals in an organization, but a specific code of conduct can be developed for proper computer use in order to establish what is appropriate and available to use in the organization´s computers, and also to restrict or avoid non related content.

7 0
3 years ago
Read 2 more answers
Other questions:
  • A _______ is used to analyze and summarize your data without graphical support.
    10·1 answer
  • Darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. which of these options sho
    11·1 answer
  • QUESTION 16
    14·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
    5·2 answers
  • Imagine that a crime has been committed and being a police officer you have to investigate the case. Solving a crime can be a ve
    12·1 answer
  • Dividing a hard drive into multiple sections is known as partitioning
    5·1 answer
  • Rachel wants to copy eight rows of data from one spreadsheet to another. She opens the spreadsheet, highlights the appropriate d
    15·2 answers
  • Most computers include a network card designed to connect a computer to the net using standard telephone service. True or False?
    11·1 answer
  • 21. If you want to improve the performance of your PC, you need to upgrade the
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!