1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
4 years ago
6

Narrow margins are helpful for which task?

Computers and Technology
1 answer:
inessss [21]4 years ago
6 0

Answer: A: fitting the most content on a page

Explanation:

Trust me my guy

You might be interested in
Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates wh
____ [38]

Answer:

count_land = count_air = count_water = 0

while True:

   s = input("Enter a string: ")

   if s == "xxxxx":

       break

   else:

       if s == "land":

           count_land += 1

       elif s == "air":

           count_air += 1

       elif s == "water":

           count_water += 1

print("land: " + str(count_land))

print("air: " + str(count_air))

print("water: " + str(count_water))

Explanation:

*The code is in Python

Initialize the variables

Create a while loop that iterates until a specific condition is met. Inside the loop, ask the user to enter the string. If it is "xxxxx", stop the loop. Otherwise, check if it is "land", "air", or "water". If it is one of the given strings, increment its counter by 1

When the loop is done, print the number of strings entered in the required format

4 0
3 years ago
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
Do applications need to exchange udp control messages before exchanging data
Molodets [167]

The answer is NO.

Thats what makes UDP connectionless. Aclient that is going to send a UDP message to the server just sends it.The server does not know it is coming untill it arrives .When a server recieves a UDP message it gets the source address/port and the data.

7 0
4 years ago
Each cable type can transport data at a particular speed only so far before its signals begin to weaken past the point that a re
Nataliya [291]

Answer:

attenuation

Explanation:

Based on the information provided within the question it can be said that the phenomenon that is being described in this scenario is known as attenuation. In the context of physics, this refers to the gradual loss of intensity of something when traveling through a medium. Which in this case would be the data signals travelling through the cables.

7 0
3 years ago
All margins of a report are _____ inch. *<br><br> 1<br> 2<br> 3<br> 4
MA_775_DIABLO [31]

Answer:

The answer is "1 inch"

Explanation:

The margin is also known as space, it is the distance between the document 's text and edge. In default, its distance is 1, and it also allows you to customize, the new document, which is set to standard.

  • In other words, we can say that it implies the one-inch gap between the text and each edge, which is based on your specifications.
  • It also allows you to customize the margin size of the document, and other choices were wrong because it is the customize size.

6 0
3 years ago
Other questions:
  • The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the:
    12·1 answer
  • What are the basic tools for coding HTML manually?
    10·2 answers
  • Ross has to create a presentation for his class but can't decide on a topic. What should he do?
    14·2 answers
  • Write a program using Python that prompts for an integer and prints the integer, but if something other than an integer is input
    11·2 answers
  • Purpose: This application provides experience with user input and interaction in the Console, writing files to disk, working wit
    9·1 answer
  • What is the difference between = and == in terms of java..?
    6·2 answers
  • Dogs are great pets for families because they teach children many important life lessons. (2) A dog must be walked and fed at ce
    7·2 answers
  • Which view would you need to use to make
    14·1 answer
  • Two time series techniques that are appropriate when the data display a strong upward or downward trend are ___________ and ____
    14·1 answer
  • WILL GIVE BRAINLIEST ANSWER!!!<br><br> How do you manage your screen time?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!