1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
9

Plz help

Computers and Technology
2 answers:
svetoff [14.1K]3 years ago
8 0

Answer:

a b d

Explanation:

i just answered the question got it right edge 2020

Goshia [24]3 years ago
6 0

Answer:

A. It is important to identify the keywords and concepts.

B. The Cornell method can be useful when students need detailed notes.

D. The main idea of the material must always be identified.

Explanation:

I answered the question on edge too! and got it right thanks to the person above me :)

You might be interested in
What are the benefits of maintaining you vehicle?
Bezzdna [24]
Well If you maintain it It wont break down all at one time.
And the vehicle will last a lot longer than one that you don't maintain.
3 0
4 years ago
Which kind of blocks is used to hold values​
makvit [3.9K]

Answer:

Variable block.

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

For instance, to pass a class to a family of classes use the code;

\\parameter Name as Type (Keywords) = value;

\\procedure XorSwap (var a,b :integer) = "myvalue";

Hence, variable block is used to hold values. Also, it can be used to hold strings in variables, which may be displayed through the computer monitor.

8 0
3 years ago
The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web se
dangina [55]

Answer:

Banner Grabbing

Explanation:

Banner grabbing is a reconnaissance technique to retrieve information about a computer or about a network and its services. This is used by administrators to take inventory of systems and services on their network.

Banner grabbing is used to gain information about a remote server and is intruders sometimes use this technique to retrieve information about remote servers.  divulge software version numbers and other system information on network hosts. This is a technique of getting software banner information. This information may include operating system information, version and certain services and this helps hackers to attack the network. Banner grabbing can disclose vulnerable applications which can result in service misuse and exploitation.

Banner grabbing is done manually or automatically by using tools. Tools commonly used to perform banner grabbing are Telnet, Wget, nmap, zmap and Netcat etc.

4 0
4 years ago
How is a transaction verified on a cryptocurrency network?.
Agata [3.3K]

Answer:

By being a part of a block to a block chain and each block in the block chain is precisely connected to the block that was before it.

Explanation:

I Hope This Helps You

6 0
3 years ago
To permit electrical energy to be sent over long distances at high voltage, then reduced to a lower voltage for everyday use, wh
AVprozaik [17]
High-voltage direct current
7 0
3 years ago
Read 2 more answers
Other questions:
  • WordArt styles allow you to add ____.
    9·1 answer
  • Why does hamlet want to kill himself and what stops him from doing that?
    10·1 answer
  • A _____ is an area hosted by a Web server in which project members and colleagues can share documents, models, photos, and other
    6·1 answer
  • Which of the following lists contains the five essential elements of a computer? Group of answer choices: 1. inputs, returns, pr
    11·1 answer
  • The basic assumption that underlines event driven modeling is that the system can be represented as a model with an infinite num
    9·1 answer
  • 1. Write the syntax of the following HTML commands by using any one attribute
    6·2 answers
  • NEED IT ASAP. Jack is an accountant. He cant access the spreadsheet software, which is installed on the server. what should jack
    13·1 answer
  • If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connec
    8·1 answer
  • Cho lược đồ CSDL “Quản lý BÁN HÀNG” có các bảng như bên dưới. (Thuộc tính in đậm và
    7·1 answer
  • Prior to the 1996 NEC, ____ receptacles and cords were permitted. However, now it is mandatory that a separate equipment groundi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!