1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
13

Only 2 people answer this

Computers and Technology
2 answers:
balu736 [363]3 years ago
8 0

Answer:

2

Explanation:

marysya [2.9K]3 years ago
7 0

Answer:

1

Explanation:

You might be interested in
Consider the attack scenario given below:
Sonbull [250]

Answer:

Cookie Poisoning Attack

Explanation:

  • In this scenario, the attacker steals the cookie in the step 3 for malicious reasons.
  • Here, the attacker modifies the cookies on the web browser.
  • So, the attacker is poisoning the cookies and using it for online orders in this scenario.
  • As the attacker is poisoning the cookies on the browser this is called Cookie Poisoning Attack.
  • In Cookie Poisoning Attacks, the control of browser and the computer and the whole network can be compromised to the attacker.
  • To prevent the Cookie Poisoning Attack, the cookies have to be encrypted for the security reasons.
4 0
3 years ago
Jane is debugging a code consisting of 25 lines. The code starts executing at line 11. At line 13, the code calls another method
Free_Kalibri [48]
C.) 18

-------------------------------------
6 0
3 years ago
Read 2 more answers
Whatis NOT a key factor while designing a website?
Vaselesa [24]

Answer: Complexity

Explanation: Web designing is referred as the designing of a web page for different purposes such as online business,etc. The most important factor is usability for the improvement in performance of any site and keeping it successful.

It should be user friendly so that interaction and understanding between user and web page can easy.Consistency is also a feature which ensure that web page opened in any browser should have similar quick working.

But there should be no complexity present in the web design which can cause misunderstand with the user and functioning.

7 0
3 years ago
Print "Censored" if userInput contains the word "darn", else print userInput. End with newline. Ex: If userInput is "That darn c
barxatty [35]

Answer:

#include <string>

#include <iostream>

using namespace std;

int main() {

string userInput;

getline(cin, userInput);

// Here, an integer variable is declared to find that the user entered string consist of word darn or not

int isPresent = userInput.find("darn");

if (isPresent > 0){

cout << "Censored" << endl;

// Solution starts here

else

{

cout << userInput << endl;

}

// End of solution

return 0;

}

// End of Program

The proposed solution added an else statement to the code

This will enable the program to print the userInput if userInput doesn't contain the word darn

6 0
3 years ago
How to get an object from a container in java.
Vinil7 [7]
If it stores any type of objects mixed, use Object as storage class. All classes inherit from Object and for primitives use their respective wrapper classes. Or just use one of the bazillion container classes that already exist.
3 0
2 years ago
Other questions:
  • You work for a large enterprise company that handles time-sensitive information. Your supervisor has asked that you set up a con
    8·1 answer
  • Suppose you were assigned to develop a logical model of the registration system at a school or college. would you be better off
    9·1 answer
  • If you are unsure about what is or isn’t appropriate to wear to a new job, what is the best thing to do?
    13·2 answers
  • You can use the results from a search on a database in all of these ways except to ____.
    11·2 answers
  • An application needs to calculate sales tax for purchases. You decide to simplify the code by putting the sales tax calculation
    9·1 answer
  • Find products that satisfy BOTH conditions below:______
    6·1 answer
  • Which of the following is input devices? (a)Scanner (b) Keyboard (c) Both a and b (d) Plotter​
    5·1 answer
  • Kyle returns to work the next day and he would like to continue working on the document from yesterday. What should Kyle do?
    7·1 answer
  • The retention of encoded information over time refers to
    14·1 answer
  • Explain why computer professionals are engaged in technical services
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!