1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
3 years ago
8

Halp Computer Science

Computers and Technology
2 answers:
oee [108]3 years ago
6 0
The first one is GUI
the second one is directory
ArbitrLikvidat [17]3 years ago
4 0

1st: GUI

2nd: directory

You might be interested in
Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to con
ch4aika [34]

Answer:

The search bars in search engines to find the most reliable information.  

Explanation:

8 0
3 years ago
Which of the following is NOT a Boolean Search term used to refine search engine results? A. AND B. With C. OR D. NOT
den301095 [7]
B. With. Width isn't a boolean comparative operator
7 0
4 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Write a program that keeps taking integers until the user enters in python
soldi70 [24.7K]

int main {

//variables

unsigned long num = 0;

std::string phrase = " Please enter your name for confirmation: " ;

std::string name;

//codes

std::cout << phrase;

std::cin>> name;

while ( serial.available() == 0 ) {

num++;

};

if ( serial.avaliable() > 0 ) {

std::cout << " Thank you for your confirmation ";

};

};

3 0
3 years ago
Other questions:
  • This toolbar can be used to change the way the text in your presentation looks. Drawing
    5·2 answers
  • What does an operating system do?
    11·2 answers
  • What FAA-approved document gives the leveling means to be used when weighing an aircraft?
    5·1 answer
  • Mary is an aspiring web designer. Which degree she should opt for to strengthen her portfolio? A. bachelor’s degree in computer
    11·1 answer
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 then the outp
    12·1 answer
  • One way that Intuit handles the ________ of its TurboTax and other financial software is through its websites. The site includes
    11·2 answers
  • The primary purpose of an operating system is: To provide a software interface between the hardware and the application programs
    11·1 answer
  • Việc áp dụng khai báo hải quan điện tử có áp dụng chữ ký số, đem lại những lợi ích gì
    10·1 answer
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
  • You're on the lead generation team at a wine reseller called Partners in Wine. You've noticed that the user open rate of your em
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!