1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
3 years ago
14

Cheri needs to write a small program that interacts with the user. What step will allow her to do this?

Computers and Technology
2 answers:
Alinara [238K]3 years ago
8 0

Answer:

Including a input statement

Explanation:

You need a input statement in order for it to work, here´s an example;

script.parent.click <u>then</u>

you need the ¨.mouse¨ after parent or it wouldnt work.

Tju [1.3M]3 years ago
3 0

Answer:

Including an input statement

Incorporating engaging content

Explanation:

Interaction suggests that the user will provide input, for which you will need an input statement.

However, part of the interaction would also be to incorporate engaging content, so I would not dismiss that answer.

You might be interested in
Where does the oracle11g server store information about objects in the database, including information about constraints?
tiny-mole [99]
The oracle11g server stores information about objects in the database, including information about constraints in the tables.  <span>An </span>Oracle database is a set of files that store Oracle data in persistent disk storage.<span>A database </span>instance<span> is a set of memory structures that manage database files</span>.
4 0
3 years ago
Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
Strike441 [17]

Answer:

Penetration monitoring is conducted based on the vulnerability evaluation (Were a susceptibility evaluated and mentioned).

Explanation:

Penetration Test

  • Penetration testing is carried out from both within (the network or application) as well as outside that aims to gain access to the system to evaluate if any suspicious activity or improper behavior is likely within the device.
  • When there are some other potential security vulnerabilities, they are all found in the integration check that involves vulnerability assessment for frameworks and checking for network management.
  • Automation of penetration testing is used to make it work better.
  • Penetration monitoring deals with the same risk evaluation correlated with a disadvantage.

Privilege escalation

  • They need to think about known vulnerabilities as the system for network management works conditional on the privilege rates. Such that, increasing user has an article has highlighted and the consumer is only allowed to control or use the resources that should be used appropriately, depending on the level of privilege.
  • If he gets elevated access then it will be a failure to have access control mechanism.

Leaving backdoors

  • The creator uses backdoors to test the system's functionality during the designing processes.
  • The loophole can be a workaround overriding the identification for all users, or a default password.
  • They would need to worry about leaving the backdoor because the backdoor.which is performed either deliberately or involuntarily will circumvent the entire security mechanism.
  • During the intrusion testing process, the both privilege increase and the escape from the gateway can be discovered due to the research being done both inside and outside the device.
  • The tester's testing phase acts as various users so that any destabilization of access may be found.
  • The tester will use all numerous methods to supersede the technique of official approval, but when there are certain backdoors, maybe he can start by pointing that out.

6 0
4 years ago
50 Points! 25 Points Each! Please help ASAP! Will mark brainliest! See attached image.
monitta

Answer:

I can't see the image

Explanation:

please put image up there

6 0
3 years ago
Read 2 more answers
Which heading size fits for the word headings​
hjlf
The first one h4 is yhat
3 0
3 years ago
Read 2 more answers
.WAP to enter monthly sale of Salesman and give him commission i.E. If the monthly sale is more than 500000 then commision will
nexus9112 [7]

sales = float(input("Enter monthly sales amount: $"))

commission = 0.05

if sales> 500000:

   commission = 0.1

print("You earned: $"+str(sales*commission))

I wrote my code in python 3.8. I hope this helps.

5 0
3 years ago
Other questions:
  • In the spreadsheet example shown in chapter 5 ____ run from top bottom and are designated by a letter?
    12·2 answers
  • Adding a ____ to text adds depth and helps the letters display prominently.
    5·1 answer
  • What is a color that cannot be created by mixing other colors together?
    15·2 answers
  • You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a cal
    10·1 answer
  • Technician A says that to cover all possible vehicle conditions, coolant must have a high freezing point. Technician B says cool
    6·2 answers
  • The design of a blog refers to:
    10·1 answer
  • How can a cell phone tower help people​
    11·2 answers
  • Jonathan is in the process of creating a photo of a fluttering flag with cars moving around in the background. He wants the flag
    13·2 answers
  • Write the name of main ore of silver.Write any two application of sliver​
    14·1 answer
  • What happened to China and India after they modernized their workforces by providing more training and education?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!