1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
14

What should my school do? someones been trying to hack the wifi and computers here.

Computers and Technology
1 answer:
Snezhnost [94]3 years ago
5 0

they should have a fund raiser and collect money and then put up strong fire walls on all the computers

You might be interested in
……………………is one of the most popular cloud storage facilities.​
lord [1]
Chcgzrsfchvuvjbnkggvbbb.
4 0
3 years ago
Create a Python script that takes two parameters to do the following:-
tekilochka [14]

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

6 0
3 years ago
What's up with this new update?
Andre45 [30]

Answer:

so do i the notifications are out of control i try to ignore them

Explanation:

and yea so it seems you like to do things such as VR? if so i suggest one from the Oculus brand i dont use them but i heard they were good!

~Brianna/edgumacation

4 0
3 years ago
Read 2 more answers
4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
earnstyle [38]

Answer:

.data

str1: .asciiz "Hello"

str2: .asciiz "mars"

msg: .asciiz "String after the concatenate: "

.text

main:

#load the address str1 to $a0

la $a0,str1

#initialize $t0 with 0

li $t0,0

#loop to find the length of str1

#$t0 stores the length of str1

loop1:

#load byte of $a0 to $t1

lb $t1,0($a0)

#branch for equal.If $t1 equal to 0,jump to label stop1

beq $t1,0,stop1

addi $t0,$t0,1 #increase the count

addi $a0,$a0,1 #increase the address

#jump to label loop1

j loop1

stop1:

#load the address of str2 to $a1

la $a1,str2

#loop2 concatenate the each element in str2 to str1

loop2:

lb $t2,0($a1) #load character in str2 to $t2

sb $t2,0($a0) #store value in $t2 to str1

beq $t2,0,stop2

addi $a1,$a1,1 #increase the address of str2

addi $a0,$a0,1 #increase the address of str1

j loop2

stop2:

#syscall for print string is $v0 = 4

#syscall to termiante the program is $v0 = 10

#print the message

li $v0, 4

la $a0, msg

syscall

#print the concatenated string

li $v0,4

la $a0,str1

syscall

#termiante the program

li $v0, 10

syscall

Explanation:

3 0
3 years ago
Which of the following is a valid HTML tag?<br> Oo<br><br> &gt;hl
siniylev [52]

Answer:

>hl is a valid HTML tag.

3 0
3 years ago
Other questions:
  • Henry is creating a firewall rule that will allow inbound mail to the organization. what tcp port must he allow through the fire
    10·2 answers
  • Provide an example of a closed‐end credit account that Caroline has.
    6·1 answer
  • The term used for doing business online is referred to as ___.
    12·1 answer
  • Susan teaches many individuals and business professionals how, why, and the benefits and challenges to using social media. Of th
    15·1 answer
  • The private field, which is known as the property‘s __________, holds any data that is assigned to the property.a. private datab.
    9·1 answer
  • How have productivity programs improved the professional lives of people? (check all that apply)
    8·2 answers
  • Organizations following Waterfall methodology usually begin with requirements gathering, in which the development team attempts
    14·1 answer
  • What type of internet connection do you think you'd get in Antarctica?
    14·2 answers
  • Re:
    15·1 answer
  • !!! 20 points !!!!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!