1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
14

_____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which

are related to a topic of interest.
Computers and Technology
1 answer:
ANTONII [103]3 years ago
5 0
It might be google????
You might be interested in
You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping syst
Nonamiya [84]

Answer:

Network bridge

Explanation:

You are an administrator of a growing network. You notice the network you have created is broadcasting but you cannot ping systems on different segments of your network. What device should you use to fix this issue?

✓ Network bridge

3 0
2 years ago
COMPUTER SCIENCE:PIXELS
DIA [1.3K]
The number of bits used to represent each pixel determines how many colors or shades of grey can be displayed. For example, in 8-bit color mode the color monitor uses 8 bits for each pixel, making it possible to display 2 to the 8th power (256) colors/shades of grey.
3 0
3 years ago
What can a user modify on a business card using the Edit Business Card dialog box? Check all that apply.
vredina [299]

Answer:

layout,image,font,background color,

Explanation: i just did it on edge

7 0
3 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
You will include code that will validate all user input. If the user inputs an invalid value, the program will respond with an e
alukav5142 [94]

Answer:

See explanation (Program written in C++)

Explanation:

The question is incomplete as the invalid values were not included in the question.

However, to make the sense of it, I'll answer your question using the following conditions.

1. Invalid values include: Numbers less than 0 (See comments for explanations)

#include <iostream>

using namespace std;

int main() {

//This line declares num (for user input)

int num;

//The following iteration keeps repeating itself until a number greater than 0 is entered using do while loop

do{

//This line prompts user for input

cout<<"Numbers greater than 0: ";

//This line gets input from the user

cin>>num;}

while(num<1);//This condition checks for valid user input

cout<<"You entered: "<<num; //This line prints out the user input

}

2. Invalid values include: Odd Numbers

I'll make use of the above code (in 1)

Start by replacing:

cout<<"Numbers greater than 0: ";

with

cout<<"Even Numbers: "; //This prompts user for even numbers

Replace

while(num<1);

with

while(num%2==1); //This checks if input is odd. If yes, the loop is repeated

3. Invalid values include: Even Numbers

I'll make use of the above code (in 1)

Start by replacing:

cout<<"Numbers greater than 0: ";

with

cout<<"Odd Numbers: "; //This prompts user for Odd numbers

Replace

while(num<1);

with

while(num%2==0); //This checks if input is even. If yes, the loop is repeated

8 0
3 years ago
Other questions:
  • Which of the following is a primary source?
    6·2 answers
  • The US government takes the protection of patients' private information very seriously. In 1996, went into effect. This law prot
    14·1 answer
  • In a formatted text file, ________ signal(s) the beginning and end of a formatting command.
    12·1 answer
  • What is the purpose of an exhaust emission system
    6·1 answer
  • Project 4: Strictly Identical arrays
    7·1 answer
  • 4. Write an interactive program CountOddDigits that accepts an integer as its inputs and prints the number of even-valued digits
    10·1 answer
  • Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh
    13·1 answer
  • What are the different types database of end users? Discuss the main activi-ties of each
    6·2 answers
  • 6.1.5: Function definition: Volume of a pyramid.
    8·1 answer
  • Tick the best alternatives 1. Which one of the following is input device? a) Speaker b) Printer c. Monitor d. Mouse​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!