1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
3 years ago
6

In 3-4 sentences, write a note to a friend describ

Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
7 0

you can copy and paste your text.

amid [387]3 years ago
7 0
In order to move text from one part of a document to another, you must first highlight the text you want to move by holding down the left button on your mouse and dragging across the desired text. You then right click and roll over menu that appears and select ‘copy’. Then go to the new desired location of the text and right click there. Roll over the pop up menu and select paste; your text should appear in this new location.
You might be interested in
An online service provider provides its users with hosted​ computers, an operating​ system, and a database management system​ (D
kondaur [170]

Answer:

<em>platform as a service (PaaS)</em>

Explanation:

Platform as a Service (PaaS) <em>is a cloud services system in which a third-party vendor offers hardware and software services</em> – usually the ones required for the production of applications – to internet users.

The hardware and software are managed by a PaaS company on its own network.

As more of a consequence, PaaS helps users to access in-house technology for designing or running a new app.

8 0
3 years ago
The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
luda_lava [24]

Answer:

B

Explanation:

...if they make use of the four-model approach, the time taken to develop the model would increase.

Cheers

5 0
4 years ago
Someone, please answer this.
Sav [38]

Answer: A loop will continue running until the defined condition returns false . ... You can type js for , js while or js do while to get more info on any of these. ... initialization - Run before the first execution on the loop. ... But it can be used to decrement a counter too. statement - Code to be repeated in the loop.

Explanation:

7 0
3 years ago
Assuming deq is a deque object, the expression deq.push_front(elem) deletes the first element from deq.
horrorfan [7]

Answer: False

Explanation:

This code code not deletes element from deq. This insert element at the beginning of deq. if it was deq.pop_front(elem) then it would have deleted the first element.

Therefore, it is false.

4 0
3 years ago
A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the se
Nata [24]

Answer:

The correct answer is Option(A) i.e., An SQL injection attack is being

attempted.

Explanation:

In this given question some information is missing and is not the complete question. The missing is given as :

SELECT * FROM and ‘1’ = ‘1’

Which of the following can the security administrator determine from this?

A. The SQL injection attacked is being attempted.

B. An Legitimated connections is being dropped.

C. The network scan are being done by the system.

D. An attack of XSS is being attempted.

Now, coming to the answer "The security administration sees that an SQL injection is attempted while it notices a lot of connection dropped and has replaced with the firewall and will be the possible issue flagged on it, SQL injection is a type of injection that possibly executes harmful or malicious statements and effects any website or web application".

Hence the correct answer is Option A.

5 0
3 years ago
Other questions:
  • The shortest-route technique would best be used to determine the amount of LAN network wiring within a building. determine the p
    12·1 answer
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • The most common size for a brochure is _____.
    9·1 answer
  • Which of the following is the formula used to calculate the risk that remains after you apply controls? a. ALE=SLExARO b. Total
    9·1 answer
  • Write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles. Use the follow
    9·1 answer
  • If you want to go directly to a specific web page using a URL, where should you type the URL in Firefox?
    14·2 answers
  • On a computer with two or more cpus, ____ is a technique in which each processor or core works on a different job.
    15·1 answer
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • WAP to find the area of cuboid​
    13·1 answer
  • Choose the response that best completes the following statement.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!