1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
4 years ago
7

So lets see what you know...Write me a short code and include a detailed explanation of the language used and what the out come

of the code is?
any code will do, just as long as it's related to anything in fundamentals of computer science.
Computers and Technology
1 answer:
BabaBlast [244]4 years ago
4 0

Answer:

(cmd):netsh//wlan//showall

Explanation:

idk what I'm doing<( ̄︶ ̄)↗

You might be interested in
A hot spot is the __________. A. Point that collides with other objects B. Point an object spins around when it rotates C. First
Ber [7]
I would think it's A
5 0
4 years ago
. Which of the following is the correct syntax for a method header with parameters? a. public static void example(x, y) { b. pub
mojhsa [17]

Answer:

e.

public static void example(int x, in y)

Explanation:

The header comprises the access modifiers (public static), return type (void), method name (example), and parameters with the type of variable before the name of the parameters (int a, int b).

4 0
3 years ago
A list is a collection that ______________
BigorU [14]

Answer:

free points?

Explanation:

jk d

5 0
3 years ago
<img src="https://tex.z-dn.net/?f=954-696-0879" id="TexFormula1" title="954-696-0879" alt="954-696-0879" align="absmiddle" class
PSYCHO15rus [73]
The answer is -621 (that’s what my calculator said).... btw why didn’t you just use a calculator for this...?
5 0
3 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
Other questions:
  • Who gave a demonstration of modern computer systems showing a mouse and when?
    8·1 answer
  • In cell e9, enter a formula that calculates the session fee for a member. members receive a member discount off the non-member s
    9·1 answer
  • Selet the correct answer.
    11·2 answers
  • Write a declaration for a class named City, which has the members cityName, a string, and position, a Location structure (declar
    10·1 answer
  • Want to network 2 laptops togetger using ethernet cable...But it won't connect
    9·1 answer
  • How do web bugs invade a person's privacy?
    7·1 answer
  • Which term describes the surrounding area of this image?
    10·1 answer
  • What type of light comes from reflections off other objects?
    5·1 answer
  • Please answer........
    5·1 answer
  • Real life example of hexadecimal and octal decimal “for example in binary light switch”
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!