1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
7

Where is the worlds biggest cookie​

Computers and Technology
2 answers:
saul85 [17]3 years ago
7 0

North Carolina, USA on 17 May 2003. The chocolate chip cookie weighed 18 tonnes (40,000 lb) and had a diameter of 30.7 m (101 ft).

rjkz [21]3 years ago
3 0

I believe the cookie monster has it

You might be interested in
Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp
pychu [463]

An example of a security misconfiguration is the absence of adequate security hardening throughout the application stack or incorrectly set permissions.

<h3>What are security misconfigurations?</h3>

Security measures that are incorrectly set or left unsecured are known as security misconfigurations,

They, put your systems and data at risk. Basically, a misconfiguration might result from any poorly described configuration changes, default settings, or a technical problem with any component in your endpoints.

Cross-Origin resource sharing (CORS), and verbose error messages are a few instances of security misconfigurations.

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example of security misconfigurations.

Hence, security misconfigurations are the correct answer.

To learn more about the security misconfigurations refer to:

brainly.com/question/14613247

#SPJ1

5 0
1 year ago
Page Setup options are important for printing a PowerPoint presentation a certain way. The button for the Page Setup dialog box
FrozenT [24]

Answer: Design tab

Explanation:

The page setup simply refers to the parameters which are defined by a particular user which is vital in knowing how a printed page will appear. It allows user to customize the page layout. The parameters include size, page orientation, quality of print,margin etc.

It should be noted that page setup options are vital for printing a PowerPoint presentation in a certain way and the button for the Page Setup dialog box can be found in the design tab.

4 0
3 years ago
Will an email sent from a phone say it was sent from your phone
Morgarella [4.7K]
 Most emails sent<span> from devices like an </span>Android phone<span> or </span>Iphone<span> have an extra line at </span>the<span> ending which suggests that they have </span>sent their <span>replies
or </span>emails<span> using </span>their phones<span>.

So most likely, yes.</span>
6 0
3 years ago
Read 2 more answers
Consider the most important item among all the categories of information stored on your personal computer. As it applies to that
GarryVolchara [31]

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

5 0
3 years ago
Fill in the correct formula called a contains numbers from Rhodes 1 to 20 you can use the formula blank to find the volume of th
Flauer [41]

Answer:

Waist

Explanation:

5 0
3 years ago
Other questions:
  • Alicia is a dietitian. She gives other people suggestions for nutrition. She wants to organize a large amount of data concerning
    13·1 answer
  • Can Microsoft Excel can use Headers and Footers, just like Microsoft Word
    9·1 answer
  • What does the do not disturb button do on the iphone?
    12·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    13·1 answer
  • List the steps in setting up an online banking account
    12·2 answers
  • An element in an array is 4 bytes long and there are 10 elements in the array. How big is the array?
    6·2 answers
  • Describe how a web browser and web server work together to send a web page to a user
    8·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • What happens when text is added to grouped objects that is larger than an object ?
    9·2 answers
  • Write the Stats method record that takes a test score and records that score in the database. If the score already exists in the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!