1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
8

A comma is also called a statement terminator. A. True B. False

Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
8 0

Answer:

The answer is False

Explanation:

A comma is also called a statement terminator. A. True B. False

The answer is False

Comma is used to separate individiual values or data types

variables.

A semi-colon (;) at end of a statement is called terminator.

You might be interested in
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that eb
myrzilka [38]

The first step that Ebba should take is: Information gathering and Reconnaissance.

<h3>What is an In-house Penetration Test?</h3>

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

brainly.com/question/19085749

3 0
2 years ago
What are the safety lifestyle before using computer​
masya89 [10]

make sure to drink water and take 20 second break from computer every 20 minutes

3 0
3 years ago
Write a program that asks a user to roll a single die twice to get a sum value of 7. If the sum is 11, the user loses. If the su
barxatty [35]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

int dice1;

int dice2;

int sum;

int roll_die_twice(int dice1,int dice2){

 

if(sum==7){

printf("winner");

 

}

else if (sum==11){

printf("looser");

}

else if (sum!=7 && sum!=11)

{

printf("nor winner or looser");

 

}

}

int main()

{

roll_die_twice(2,7);

return 0;

}

The code screenshot and code output can be seen in the attached image below.

6 0
4 years ago
Read 2 more answers
Pam, a senior level IT developer, and Samantha, a summer intern, are working together on a new organization-wide vacation policy
Svetllana [295]

Answer:

B.

Explanation:

Based on the scenario it can be said that in order to efficiently work with Samantha on her laptop during the project, Pam should export her settings to a file for Samantha to import. Doing so will make sure that both individuals have the exact same platform to work on and will make communicating changes and ideas a lot easier and more efficient.

6 0
4 years ago
Other questions:
  • Draw the cache tables and the state of all bits within them. Suppose you have a 16 byte cache with 2 byte long cachelines that i
    6·1 answer
  • Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on
    6·1 answer
  • What role does the agenda play in a webinar??
    14·1 answer
  • Where do you access the status report of an assigned task that is open?
    12·2 answers
  • 6. Assume there are three small caches, each consisting of four one-word blocks. One cache is fully associative, a second is two
    5·1 answer
  • What is the action take to the input called?
    15·1 answer
  • Stress is an illness not unlike cancer.<br> True<br> False
    6·2 answers
  • A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an
    5·1 answer
  • If an item that is purchased is digital, this may involve a direct ______ of the item you purchased.
    15·1 answer
  • It's in Python, everything sort of explained in the image below,
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!