1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pani-rosa [81]
3 years ago
13

HELP PLZ !!

Computers and Technology
1 answer:
cluponka [151]3 years ago
4 0

Answer:

typeof  operator returns the data type of the data it acts upon

Explanation:

“typeof” is a operator in javascript which “returns” the “data type” of the given data.

For eg:

<script>

document.write(typeof  “John” )

document.writeln(typeof new Date();

document.writeln(typeof 10+20);

document.writeln(typeof 20.4);

document.writeln(typeof function(){});

</script>

The above code is a sample javascript code to explain “typeof” operator. As per the program the first line returns “String”, second returns “date”, third line returns integer”, the next line returns “float” and the last line returns “function”. So, from this we can “conclude” that the “typeof” operator returns data type.

You might be interested in
How do Brainly experts and verified users format their answers to look like this:
koban [17]

{ \dashrightarrow{ \green{ \tt{use \: the \: latex}}}} \\  \\  { \blue{ \sf{ \: refer \: to \: the \: pdf \: available}}} \\ { \blue{ \sf{at \: https : \  \:  \ \: latex \: on \: brainly}}}

3 0
3 years ago
Read 2 more answers
Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet c
VashaNatasha [74]

Answer:

Option (d) is correct

Explanation:

Previously saved capture files can be read using Wireshark. For this, select the File then open the menu. Then Wireshark will pop up the “File Open” dialog box.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a .pcapng extension, which stands for packet capture, next generation.

5 0
3 years ago
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
3 years ago
What's the difference between an exe file and an msi file? check all that apply.
motikmotik

An EXE file is an executable that may have an MSI file as one its help; An executable or EXE file can "wrap" an MSI file, which is used by the Windows Installer to guide the building process of an application.

MSI files are utilized by the Windows Installer to control how your application is installed.

<h3>What is the difference between an EXE file and MSI file?</h3>

The main difference between the two attachments is their purpose. EXE is used mainly to indicate that the file is an executable one.

In comparison, MSI indicates that the file is a Windows installer. While an MSI is operated only with installers, this is not the case with EXE.

To learn more about EXE file, refer

brainly.com/question/28146265

#SPJ4

7 0
1 year ago
Identify the data link trailer blocker
IRINA_888 [86]
What are ur possible answers
7 0
3 years ago
Other questions:
  • True or false: Your digital footprint is all the information about you online that only you post. Group of answer choices
    12·2 answers
  • How do you run a function in python?
    5·1 answer
  • Fifty part-time students were asked how many courses they were taking this term. The (incomplete) results are shown below. Need
    6·1 answer
  • ________ is the process the compiler uses to divide your source code into meaningful portions; the message means that the compil
    7·1 answer
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • Which of these is an example of input?
    6·1 answer
  • Help me asap ill give brainliest
    8·1 answer
  • RUNTIME ORGANIZATION AND DATA LAYOUT.​
    8·1 answer
  • A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and
    6·1 answer
  • Trying to make the baseplate red and turn off can collide then the game waits 5 seconds and turns on can collide, making the bas
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!