1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pani-rosa [81]
3 years ago
13

HELP PLZ !!

Computers and Technology
1 answer:
cluponka [151]3 years ago
4 0

Answer:

typeof  operator returns the data type of the data it acts upon

Explanation:

“typeof” is a operator in javascript which “returns” the “data type” of the given data.

For eg:

<script>

document.write(typeof  “John” )

document.writeln(typeof new Date();

document.writeln(typeof 10+20);

document.writeln(typeof 20.4);

document.writeln(typeof function(){});

</script>

The above code is a sample javascript code to explain “typeof” operator. As per the program the first line returns “String”, second returns “date”, third line returns integer”, the next line returns “float” and the last line returns “function”. So, from this we can “conclude” that the “typeof” operator returns data type.

You might be interested in
When the program generates or populates reports after getting the data and processinng,it is called
TiliK225 [7]

Answer:

In computing, extract, transform, load (ETL) is the general procedure of copying data from one or more sources into a destination system which represents the data differently from the source(s) or in a different context than the source(s).

Data extraction involves extracting data from homogeneous or heterogeneous sources; data transformation processes data by data cleansing and transforming them into a proper storage format/structure for the purposes of querying and analysis; finally, data loading describes the insertion of data into the final target database such as an operational data store, a data mart, data lake or a data warehouse. Hope this helps! PLEASE GIVEE ME BRAINLIST!!! =)

6 0
3 years ago
9. Which of the following prefixes which relate to bytes are arranged from the smallest to the largest? a) mega, giga, tera, kil
dem82 [27]

Answer:

Explanation:

C

kilo = 1000

mega = 1,000,000

giga = 1 billion = 1 000 000 000

tera = 1 trillion = 1 000 000 000  000

6 0
3 years ago
10. In cell R8, enter a formula using the AVERAGEIF function to determine the average number of post-secondary years for student
mart [117]

Answer:

On cell R8, type in the formula  "=AVERAGEIF(M2:M31,"Elected",D2:D31)".

Explanation:

Microsoft Excel is a spreadsheet application developed by Microsoft as a part of the office package, used for statistical analysis of data. It has several tools used for this purpose.

The AVERAGEIF function is used to give the average of numeric column based on a condition. The formula above uses the word 'Elected' in the M column to calculate the average of numbers in the D column.

7 0
3 years ago
what is the difference between the registry and server manager in reference to its management/configuration ?
Ksivusya [100]

Explanation:

Server manager perform various types management tasks in Microsoft window to manage remote severs without require any physical access. It enable remote desktop connection protocols. It basically use server manager for manage the server remotely.

Registry is very important as it store essential information about the window system and about its configurations. It is mainly use in Microsoft window for operating its system and applications. It also store low level settings in the system.

6 0
3 years ago
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
Other questions:
  • Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
    13·1 answer
  • Do I get charged for my brainy membership before or after the 6 months
    8·2 answers
  • Which is not the option applicable to the technology reference framework for advanced countries?
    11·1 answer
  • 1. Bones do not change position when the muscles contract and release.
    7·1 answer
  • What term is used to describe the harassment of computer users through various forms of internet communications?
    5·1 answer
  • Easy 25 points answer what is it called that you use only 1 and 0 like this 1010010011001100011110001010010101001010101010010101
    5·1 answer
  • Shadow systems focus on ________. a. improving the scalability of relational databases b. reducing redundancies in relational da
    12·1 answer
  • .When might you want to use static IP addressing?
    13·1 answer
  • The space between the margin<br> and start<br> of paragraph is called
    8·1 answer
  • Once the data center routes to the destination server that hosts the website, what's the next step in the Internet process?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!