1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
10

What is a good coding site

Computers and Technology
1 answer:
Helga [31]3 years ago
6 0

Sratch.com

-Agarvated

You might be interested in
I AM GIVING BRAINLEST!!!!!!!!
elena-s [515]

Answer:

B. 10%

Explanation:

The JPG file is a great format as it often manages to compress files to 1/10 of the size of the original file which is especially good for saving on bandwidth. JPG is a popular graphic format, which is characterized by a high degree of compression, which leads to a decrease in image quality.

6 0
3 years ago
Read 2 more answers
What three best practices can help defend against social engineering attacks?
lina2011 [118]

The three best practices that can help protect against social engineering are:

  • Be watchful of instructions to click on enticing web links.
  • Educate employees regarding policies.
  • Avoid disclosing your login details.
<h3>Social engineering</h3>

This refers to online crimes that are socially engineered or designed to trick victims into providing certain information or carrying out certain actions that would cause unknown harm to them or others.

For example, they may be tricked into revealing their security information or other personal information via email correspondence.

You can learn more about social engineering here brainly.com/question/26072214

#SPJ12

6 0
2 years ago
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
How to code for a database?​
olganol [36]

Answer: <em><u> How to code for a database?​ A database is an organized collection of data, generally stored and accessed electronically from a computer system. Where databases are more complex they are often developed using formal design and modeling techniques. </u></em>

WWW. Wikipedia.com

Explanation: When creating a database first you need to make a software program then you need to start planing on what to do ...

{ A database management program (DBMS) is a software package design designed to manipulate, define, retrieve, and manage data in database.

A DBMS generally manipulates the data itself, the the data format, field names, record structure and file structure.}

<h3><u><em>HoPe ThIs HeLpS YoU!!</em></u></h3>

<u><em /></u>

7 0
3 years ago
Is the following a true statement in our world? Why or why not?
posledela

Answer:

The statement would be true

.

Explanation:

let,  L = is a NFL player

      M = teaches in CSU

      N = has tattoos

Given that:

nfl player who teaches in csu = L^ M                 (this is false every time)

Above statement is L ^ M -> N

this would be true because

false -> true                  (true

)

false -> false                  (true

)

Second  exp:

There are no players who teach in Csu therefore if we say they all have tattoos statement would be true.

4 0
3 years ago
Other questions:
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • Difference between volatile and non volatile memory
    14·2 answers
  • Georgenotfound??? question mark??
    15·2 answers
  • According to the Doppler effect, objects moving away from Earth would have a
    12·2 answers
  • The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
    5·1 answer
  • economists measure the personal satisfaction someone gets from consuming goods and services with the concept of.....?
    6·1 answer
  • IRQ 0 interrupt have _______________ priority<br> ? low<br> ? medium<br> ? highest<br> ? lowest
    13·1 answer
  • Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They d
    10·1 answer
  • Please Help Me!!!!!!!!!!!!!
    5·1 answer
  • Write an application that inputs a five digit integer (The number must be entered only as ONE input) and separates the number in
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!