1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
6

ITS MAKING ME TYPE URL CODES NOW!

Computers and Technology
1 answer:
Oxana [17]3 years ago
6 0

Answer:

You have to the [] and it should work.

Explanation:

Hope this helped!!

You might be interested in
Which of the following would NOT be considered a cause of technological progress?
lyudmila [28]
My best guess would be <span>C. patents. This is because a technological process works with marketing and research, unlike patents. </span><span />
5 0
3 years ago
tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?
SIZIF [17.4K]

A DNS attack which would only impact a single user is: DNS poisoning attack.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.

In Cybersecurity, there are different types of DNS attacks and these include:

  • ‎DNS flood attack.
  • DNS tunneling.
  • DNS poisoning attack.

DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.

Read more: brainly.com/question/17273205

7 0
3 years ago
Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
shepuryov [24]

Answer:

In case the data is arranged in the ascending order, you can always change the Binary search tree into a Height BST, and which is also known as the self-balancing BT. And through this, it's quite on hand to better the operations like searching on the new BST. And these SBBTs are quite commonly made use of for constructing as well as maintaining the ordered list. This is the case in the case of the priority queue, and this is what is required here.

Explanation:

Please check the answer.

3 0
4 years ago
Jeroo Bob has just awoken from a long night's sleep and is hungry for some winsum flowers. He walks out of
IgorLugansk [536]

Answer:

bro this is long try something easy

Explanation:

im lazy to read

7 0
3 years ago
Which of the following is not one of the current changes taking place in information systems​ technology? A. Growth in cloud com
lana66690 [7]

Answer:

Growth in the PC platform

Explanation:

Information system technology refers to study, design, implementation, management, support - of computer based information system.

In today's technical growth age : the area has undergone many dynamic changes :

Changes of technical upgradation & application of IT info - Growth in cloud computing,  Increased usage of data generated by the Internet of Things, Emerging mobile digital platform, Growing business use of big data

However, Growth of PC platform is not one of the current changes taking place in information systems​ technology.

6 0
3 years ago
Other questions:
  • Which aspect of business does accounting measure?
    14·1 answer
  • We discussed making incremental dumps in some detail in the text. In Windows it is easy to tell when to dump a file because ever
    5·1 answer
  • Problem statement: Using loop, write a program that will ask the user to enter a character for left or right. Then, the user wil
    13·1 answer
  • Which of the following is true of how computers represent numbers?
    9·2 answers
  • Accessing disk is much slower than accessing memory. As a result, many file systems have been designed with various optimization
    7·1 answer
  • What do the power key and refresh key do when pressed together
    11·1 answer
  • In many multiprocessor systems __________ is used rather than dedicated processor assignment; in order to evenly distribute work
    14·1 answer
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    15·1 answer
  • A group of two or more computer systems linked together via communication devices is called:.
    10·1 answer
  • class Login: def __init__(self): self.login_name = 'none' self.login_password = 'none' # TODO: Define class method - check_crede
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!