1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
6

ITS MAKING ME TYPE URL CODES NOW!

Computers and Technology
1 answer:
Oxana [17]3 years ago
6 0

Answer:

You have to the [] and it should work.

Explanation:

Hope this helped!!

You might be interested in
A set of well-defined steps for performing a task or solving a problem is known as a(n):A) HierarchyB) AlgorithmC) Central Proce
RideAnS [48]

Answer:

The correct answer to the following question will be Option B (Algorithm).

Explanation:

  • An algorithm seems to be a countable series of very well-defined, machine guidance that is implementable, and are generally used to solve a group of issues and to perform a calculation.
  • It is widely used for processing of the data, computation and other associated computational and numerical activities.
  • A coding algorithm is a process of the computer that's a lot like just a formula that tells the machine precisely what actions you need to follow to fix a problem or achieve a goal. 

The other three options will not be able to fix the problems that arise while achieving a goal, execution of a function or creating program code.

Therefore, Option B is the right answer.

5 0
3 years ago
If a node has a wireless connection to the internet, does that node have to be mobile
Marizza181 [45]
No it does not . answers
8 0
3 years ago
TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals
Law Incorporation [45]

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

5 0
3 years ago
8. Which of the following could be measured by defining a goal in Google Analytics?
Slav-nsk [51]

All of these could be measured by defining a goal in Google Analytics is the answer.

Explanation:

  • Google Analytics is a web analytics service offered by Google that tracks and reports website traffic, currently as a platform inside the Google Marketing Platform brand.
  • Google Analytics is one of the most popular digital analytics software. It is Google's free web analytics service that allows you to analyze in-depth detail about the visitors on your website. It provides valuable insights that can help you to shape the success strategy of your business.
  • Google Analytics works by the inclusion of a block of JavaScript code on pages in your website. When users to your website view a page, this JavaScript code references a JavaScript file which then executes the tracking operation for Analytics.
  • The percentage of visits that result in a site registration , conversion rate , the percentage of visits during which visitors spent at least two minutes on the site all define a goal in Google Analytics.

8 0
3 years ago
Can't get Brainly to load on my Apple Mac. Why won’t it load? Does it need another program to work?
Lorico [155]

Answer:

Did you download it or did you open it in a "New Tab"?

6 0
3 years ago
Read 2 more answers
Other questions:
  • Farah works in an office with two other employees. All three share a printer and an Internet connection. The utility that makes
    6·2 answers
  • Can somebody help me?
    11·1 answer
  • 3-Write a program in some language that has both static and stack dynamic local variables in subprograms. Create six large (at l
    9·2 answers
  • Two Technicians are discussing ShopKey Pro. Technician
    14·1 answer
  • Use the drop-down menus to complete the steps to share a presentation through OneDrive.
    6·1 answer
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
  • When computer network are joined together they form a bigger network called the​
    5·1 answer
  • With which feature or menu option of a word processing program can you make an image like this?
    14·2 answers
  • Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation o
    14·1 answer
  • 9
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!