1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
12

A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an a

ntivirus scanner reporting a suspected virus are all examples of:
Computers and Technology
1 answer:
ser-zykov [4K]3 years ago
4 0
<span>The answer is Event.  A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of Event.
</span>
You might be interested in
Write a program that reads numbers from the user until a blank line is entered. Your
ddd [48]

Answer:

nums = []

while True:

   in = input()

   if in:

       nums.append(in)

   else:

       break

if nums:

   avg = sum(nums) / len(nums)

   for i in range(len(nums)):

       if nums[i] == avg:

           print(f"index: {i+1}")

           print(nums[i])

else:

   print(-1)  # if there aren't any values in nums

Explanation:

Assuming that you are coding in Python 3x. The last 'else' statement is an edge case that you might want to consider, I don't know what you want to put there, but I'm just going to leave it as -1.

5 0
2 years ago
If you use your computer primarily for telnet into a remote computer, will you have a large long distance telephone bill?
Nikolay [14]

If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill.

<h3>What is telnet used for?</h3>

Telnet is known to be a kind of a network protocol that is said to be used to virtually look into a computer and to give a two-way, working hand in hand and text-based communication channel that exist between two machines.

Note that, If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill because it does not apply in any way.

Learn more about telnet from

brainly.com/question/23640188

#SPJ1

4 0
2 years ago
I need help please?!!!!
mrs_skeptik [129]
It would be wear a seatbelt
6 0
3 years ago
Read 2 more answers
________ is the extent to which differences in observed scale scores reflect true differences among objects on the characteristi
AysviL [449]

Answer: Validity

Explanation:Validity is the type of claim that is made towards the measuring of reliability of any element. The differences appearing in the measurement of the elements displays the validly factor is not up to the mark which indirectly implies that reliability is not high. Validity is the situation in which all the parameters appearing in the element is perfect. If validity is perfect then only perfect reliability is achieved.

7 0
3 years ago
Q) a materialized view is generally built using
NARA [144]
It does not matter its is just a view and is not required to store data
3 0
3 years ago
Other questions:
  • What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
    12·1 answer
  • In your presentation you added a text box to?
    5·1 answer
  • What are some ways to insert a row or column? Check all that apply.
    10·2 answers
  • Find the quotient and the remainder of 11010111 ÷ 1010, assuming that the binary numbers are signed integers in two's complement
    6·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • A customer wants to purchase a new home computer. The machine will mainly be used for internal browsing and streaming video, exc
    7·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks yo
    7·1 answer
  • Which of the following is the correct binary representation of the number 2?
    14·1 answer
  • Can you create energy?
    11·1 answer
  • GUYS THERE IS A HACKER IN BRAINLY PLEASE DONT PRESS ON THE WEBSITE THEY WILL HACK YOU.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!