1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
3 years ago
11

Answer to this if you have apex legends on either pc xbox one or PS4 for the one that answers and does gets brainliest please do

not report this question
Computers and Technology
2 answers:
weqwewe [10]3 years ago
3 0

Answer:

I got it on Ps4

mars1129 [50]3 years ago
3 0

Answer:

Yes

Explanation:

Apex is ok but dying slowly

You might be interested in
A binary search algorithm is written (as in the modules, for example) which searches a pre-sorted array for some user-defined va
Mazyrski [523]

Answer:

c) it will always return with an answer of 7 or fewer comparisons of data.

Explanation:

As maximum number of comparison in worst case for sorted binary search is log₂n, here n = 100, so maximum search is at least 6.6 which is approximately 7.

4 0
3 years ago
Find meanings for the words and give examples where you can<br><br> WORTH 30 points
NARA [144]
Vector: A one dimensional array. A 1 inch arrow pointing at a 30° angle.
Bitmap: Image file format. An image displayed on a computer monitor.
Image file types: JPEG, GIF, PDF.
Variables: A value that can change based on information in the program. null, int, char.
Program sequencing: Running code in order, from top to bottom.
Program integration: Combining parts of software into one system.
HTML: Programming language, short for Hypertext Markup Language. You can create paragraphs with HTML.
Good web design: A website that is easy to use, pleasing to look at, and suits the brand of the website accordingly.
3 0
3 years ago
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
What does it mean to design,<br> implement, and maintain computer<br> systems?
docker41 [41]

Answer:

Let's take an example of the embedded system, which is a perfect example of this question as a computer system. Suppose we want the embedded system to record the details related to soil of agricultural land. We will take an IoT device which will be a sensor that can register soil properties, and get connected to the computer system through the internet. And we design an embedded system that registers these values and then copy them like somewhere in DB space on Amazon cloud or Google cloud. And finally display on some LCD or a big projector, or whatever, and like we design. Thus we have designed, and now when we install this on agriculture land, we implement it, and since check regular for correct performance, we maintain this embedded or a mini-computer system as well. This is what design, implement and maintain computer systems mean.

Explanation:

Please check the answer section.

8 0
3 years ago
on which two interfaces or ports can security be improved by configuring executive timeouts? (choose two.)
ELEN [110]

Executive timeouts are configured using ports such as Console port, Aux port, VTY port.

Executive time outs are used to automatically disconnect devices which have been idle for a specific period of time.

In IOS devices, the executive timeout automatically disconnect users after 10 minutes of inactivity. These users can either be console or VTY user. The executive timeout can be set using line mode command.

Executive timeouts are configured using ports such as Console port, Aux port, VTY port.

Find out more using: brainly.com/question/13025617

5 0
2 years ago
Other questions:
  • In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria. in
    8·1 answer
  • To display or distribute information from a database, programmers or database administrators create ___ .
    12·1 answer
  • If you don’t have a paper copy of the FAFSA form, how else can you fill it out?
    13·2 answers
  • A _____ is a network that uses multiple access points to link a series of devices that speak to each other to form a network con
    10·1 answer
  • You want the user to enter the length, width, and height from the keyboard. Which cin statement is correctly written?
    10·1 answer
  • Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f
    11·1 answer
  • Font size, font style, and _______ are all aspects of character formatting.
    14·2 answers
  • Conduct a site research on a specific property using the concepts discussed during this week.
    11·1 answer
  • The process in which a server is partitioned into smaller components virtually.
    9·1 answer
  • How can a cell phone tower help people​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!