1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
11

2. When creating a formula for balancing a checkbook, what do you subtract from the credits? A. debits B. check numbers C. trans

actions D. dates
Computers and Technology
1 answer:
DIA [1.3K]3 years ago
5 0
I think c transitions
You might be interested in
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
freeeeeeeeeeeeeeeeee poiiiiiiiiiiiiiiiiiiiiiiiiiinnnnnnnnnnnnnnnnnnnnnnttttttttttttttttttttttttsssssssssssssssssss
Jlenok [28]

Answer:

i want some

Explanation:

EEEEEEEEEEE

7 0
3 years ago
Read 2 more answers
Anyone here play sims 4 and know how to help me with his last exception file?
zysi [14]

Answer:

Explanation:

What game is this

3 0
3 years ago
While their rational of a drug user's mind knows that they shouldn't use it again, another part of the brain overrides such warn
Levart [38]
I'm unsure in What it is you're asking.

While their rational of a drug user's mind???
this alone makes no direct sense.

also I'm unsure what Computers and Technology have to do with drug user's or their brains.

I can leave you with this a drug addict is and addict hence the name it's an addiction so there is no rationality or distinctiveness in knowing not to use again until one truly wants to get help and change for the better of self.

hope this helps
4 0
3 years ago
A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of
leonid [27]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • The vulnerability is a term that is used to state that any system has some limitation by which the system causes an error while performing the action.
  • The above question states a software and asked the action which is used by the analyst to prevent the limitation. So the system will use the input validation.
  • It is because this prevents the error. it is because this will help to proceed with the wrong or invalid information on the database and the database or system can not hold the wrong data.
  • Hence option c is the correct answer while the other option is not correct because other options can not able to fix the limitation of the above system.
6 0
3 years ago
Other questions:
  • Whenever I try to plug in my code it will not work. I also need to add 4 more polygons and I don't know where.
    11·1 answer
  • ​Case-Based Critical Thinking Questions​Case 9-1Melissa, a computer science engineering student, is learning the basics of progr
    11·1 answer
  • Jeremy, a newly appointed assistant Director, is excited about his job. the director of the movie has assigned him the responsib
    6·1 answer
  • Which of the following statements about arrays are true?
    10·1 answer
  • The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their manifestation in
    9·1 answer
  • 19. Fair use applies to which of the following situations?
    14·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    9·1 answer
  • What is bit in computer science? (You must select all correct answers.) Hb. A. A part of a tool, such as a router. Non. B. A bas
    6·2 answers
  • Consider the information about the meaning of the word analog from paragraph 2 listed below. Which of the following phrases best
    7·1 answer
  • Organizations can face criminal or civil penalties for being ______ in protecting their sensitive data.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!