1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
11

If a surface is. it is exactly vertical

Computers and Technology
1 answer:
Jobisdone [24]3 years ago
8 0
What are the choices
You might be interested in
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
Name two driving factors in the development of computers.
sertanlavr [38]

The two driving factors in the development of computers are the  Skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack].

<h3>What re the matters?</h3>

There are some matters to consider. For business programs, I'd say gaming. A lot of what the common laptop makes use of for enterprise doesn't require that kind of electricity.

  1. The skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack]
  2. Process familiarity. [If dev team knows the stack but the deployment/service team is new, then you may run into deployment and maintenance issues.]

Read more about the computers:

brainly.com/question/24540334

#SPJ1

8 0
2 years ago
How buffers are used when stream a video or a music from the internet to your computer.
jekas [21]

Answer:

Restart it.

Explanation:

8 0
3 years ago
Using the physical mail analogy, what part of an address on an envelope is most like the ip address?
Slav-nsk [51]
The recipient IP address would would be the recipient home address. 
8 0
3 years ago
Select the processes that help to create a program.
Marina86 [1]

Debugging ..............

4 0
3 years ago
Other questions:
  • 8. Seleccione la respuesta correcta de acuerdo con las opciones que aparece a continuación:
    11·1 answer
  • Function templates ___________.
    5·1 answer
  • Items in the __________ area of a class are accessible to all entities that can "see" the object(s) of that class type
    10·1 answer
  • How can utility poles be eliminated as roadside hazards
    9·1 answer
  • Which of the following clauses of the UPDATE command is optional? (Points : 2) UPDATE
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa
    14·1 answer
  • You must regularly do this on your computer to prevent a virus from infecting it​
    9·2 answers
  • With which type of satellite is there a propagation delay?
    5·1 answer
  • Advantages and disadvantages of a watch tower​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!