1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanya [424]
4 years ago
7

Having some prior knowledge about your topic is helpful when conducting internet research. please select the best answer from th

e choices provided t f
Computers and Technology
2 answers:
larisa86 [58]4 years ago
0 0
The answer is true. I just took the quiz
Assoli18 [71]4 years ago
0 0

Answer:

its true

Explanation:

You might be interested in
Can you give 10 facts about the Victorians please
kaheart [24]
1. Health professionals in the Victorian era were constantly innovating and suggesting new and interesting ways to fight illnesses.

2. Toxic arsenic was widely consumed by Victorians. Women believed it had qualities which made skin appear younger, and so it was a major ingredient in many cosmetics.

3. Many Victorians would specialise in collecting objects, from zoological and botanical to geological and archaeological.

4. In the Victorian era, people were fascinated by ancient Egypt. Many historians believe this was down to the parallels that could be drawn from their relationships with death.

5. The Victorian era has often been described by historians as the ‘Golden Years’ as it was a hugely important time for innovation. One innovation was the postage stamp!

6. As well as mourning loved ones, there was another, more practical reason, why so many Victorians wore a lot of black – it was all down to pollution.

7. Victorians were big advocates of spiritualism and believed in the afterlife. Public events involving hypnosis, séances and fortune telling were popular occasions during the era, and it was big money for the people performing these acts.

8. Queen Victoria wasn’t actually called Victoria – she was in fact named Alexandrina after her godfather, Tsar Alexander I of Russia. Victoria was a middle name which she shared with her mother.

9. If a lady was at home in the day she was expected to be properly dressed and prepared for visitors between the hours of 3pm and 5pm.

10. Gothic novels were at their peak. Some of the best were written in this era, think of Dracula and the works of Edgar Allan Poe.
4 0
3 years ago
To mark all modifications made to the document, activate the
Mariulka [41]

Answer:

Compare

Explanation:

5 0
3 years ago
Read 2 more answers
5.23 LAB: Contains the character
torisob [31]

Answer:

In C++:

#include<iostream>

#include<vector>

using namespace std;

int main() {

int len;

cout<<"Length: ";  cin>>len;

string inpt;

vector<string> vect;

for(int i =0;i<len;i++){

  cin>>inpt;

  vect.push_back(inpt); }

char ch;

cout<<"Input char: ";  cin>>ch;  

for(int i =0;i<len;i++){

  size_t found = vect.at(i).find(ch);  

      if (found != string::npos){

          cout<<vect.at(i)<<" ";

          i++;

      }

}  

return 0;

}

Explanation:

This declares the length of vector as integer

int len;

This prompts the user for length

cout<<"Length: ";  cin>>len;

This declares input as string

string inpt;

This declares string vector

vector<string> vect;

The following iteration gets input into the vector

for(int i =0;i<len;i++){

  cin>>inpt;

  vect.push_back(inpt); }

This declares ch as character

char ch;

This prompts the user for character

cout<<"Input char: ";  cin>>ch;  

The following iterates through the vector

for(int i =0;i<len;i++){

This checks if vector element contains the character

  size_t found = vect.at(i).find(ch);  

If found:

      if (found != string::npos){

Print out the vector element

          cout<<vect.at(i)<<" ";

And move to the next vector element

          i++;

      }

}  

7 0
2 years ago
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
There are various risks from attacks on wi-fi networks. These include all of the following except _____.
Mariulka [41]

There are various risks from attacks on wi-fi networks. These include all of the following except creating option d: malware.

<h3>What is malware?</h3>

This is said to be any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software.

Note that Computer viruses, worms, as well as Trojan horses, ransomware, and spyware are said to be examples of malware.

Lastly, Malware, often seen as malicious software, is a general word for any program or piece of code written with the intention of causing harm to a computer, network, or server.

Learn more about malware from

brainly.com/question/399317
#SPJ1

See options below

Blackbox

Acting

Miracle

Malware

5 0
1 year ago
Other questions:
  • You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, includi
    7·1 answer
  • Which of these is an advantage of using the Clipboard task pane? A. You are able to apply OLE easily. B. There are more paste op
    15·2 answers
  • _____ is a function performed by control programs that manages computer resources, such as storage and memory.
    11·1 answer
  • 1. _____ can’t be rewritten by the computer in which it’s installed, but it has the advantage of being very _____.
    6·1 answer
  • A computer that no longer works after having minor repair work done to it may have been damaged by ____
    13·2 answers
  • Rachel wants to post content from digital cameras on the web. Which online tool will help Rachel to post and edit content on a w
    5·1 answer
  • Which vendor certification would you think is the most relevant in the field of IT security? Why?
    7·1 answer
  • 40 points to answer ALL
    9·2 answers
  • Convert 1/32 GB into MB​
    14·1 answer
  • What are LinkedIn automation tools used for?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!