1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
14

The commands available from a menu do not change. True or false

Computers and Technology
2 answers:
STatiana [176]3 years ago
5 0

yesyeyesyeyeyeyeyyeyeyeyeyeyeyeyeyeyyeYES

jeka943 years ago
3 0

i believe this will be false


You might be interested in
Types of computer that we use in our daily life​
ozzi

Answer:

all coumputers

Explanation:

i just like coumputers

5 0
3 years ago
Read 2 more answers
29
denis23 [38]

The correct answer is A it transfers control to the next loop in the program.


The most valid answer is that the break statement Exits the loop and continues executing the program, but assuming that there are other loops, the control of the program will go to them since the first loop is broken out of.


3 0
3 years ago
Observe the following statements and decide whether the variable result’s value is TRUE or FALSE.
devlian [24]

Answer:

    result 1 = false;

     result 2 = true;      

Explanation:

result 1 = (43 < -77 && 1! = 10)

            43 < -77 = false

             1 != 10 = true

for any false && true logical operator, it returns false

    result 1 = false;

 false = 90 < -77 || -1 < 43

              90 < -77 = false

                -1 < 43 = true

for any false || true logical operator, it returns true

  result 2 = true;      

5 0
3 years ago
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
3 years ago
Which type of attack cripples the network and prevents legitimate users from accessing network resources
yaroslaw [1]

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

6 0
3 years ago
Other questions:
  • Write Python algebraic expressions corresponding to the following statements: (a) The sum of the first five positive integers (b
    14·1 answer
  • When you were configuring Encrypting File System (EFS) in the lab, a __________ on the Documents folder in the File Explorer ind
    5·1 answer
  • End-user development: the process by which an organization's non-it specialists create software applications.
    8·1 answer
  • You just brought a new hard drive for your computer. U plan to use this as a secondary hard drive to store all your uma files. O
    10·1 answer
  • Assume that we would like to expand the MIPS register file to 128 and keep the size of all other fields as in the original MPIS
    7·2 answers
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • Bulldog Holdings is a U.S.-based consumer electronics company. It owns smaller firms in Japan and Taiwan where most of its cell
    5·1 answer
  • Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f
    12·2 answers
  • What were the names of Henry VIII's six wives?
    9·2 answers
  • Gaining information by tricking an individual into releasing information is often referred to as.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!