1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
3 years ago
12

Which of these statements is true? agile is a programming language sql is a database language html stands for "hypertext markup

link" java is short for javascript?
Computers and Technology
2 answers:
77julia77 [94]3 years ago
7 0
Sql is a database language
schepotkina [342]3 years ago
3 0

The answer is: SQL is a database language

SQL is programming language that is used when we want create a design and manage our data base. It is very important for programmers who want program using this language to have a good command in Tuple relational calculus and Algebra because it's often used to  handle structured data that has relations between different variables.

You might be interested in
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
Which feature of a blog helps to store and retrieve older posts?
Rashid [163]
Could it be archive posts? I'm not sure, but I believe it's archive posts.
8 0
3 years ago
Read 2 more answers
In a binary search, _______________________________ . a. It is assumed that all of the elements are integers. b. It is assumed t
madam [21]

Answer:

d. It is assumed that the search pool is ordered.

Explanation:

A binary search/logarithimic search/half interval search/binary chop refers to search algorithm in computer science that sorts data in array in key:value arrangements. In order to locate a value in binary search, the key to the value in a sorted array is located. A binary search is characterized by an ascending, descending order arrangement of the array.

6 0
3 years ago
What is a trojan horse in computer science?
Firdavs [7]

Answer:

type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Explanation its malware

4 0
3 years ago
How can one protect against virus outbreaks in an organization?  What are the common causes of this problems?  How would use add
kobusy [5.1K]

<u>Virus outbreaks in an organization:</u>

In an organization end user who uses the computer or laptop or workstation is not aware of virus outbreaks. So As IT administrator of an organization she/he has aware of latest virus attack and rectification solution before outbreaks.

Common causes for this virus outbreaks problem is update virus definition or database. Update operating system patches on regular basis.

Installation appropriate anti-virus in each workstation or desktop or laptop and scheduling virus scanning and take necessary steps.

To address and troubleshoot disconnect workstation and desktop or laptop from LAN. Uninstalled unnecessary software, delete temp folder contents.

8 0
3 years ago
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • What is data. Explain it in brief
    11·2 answers
  • Complex communication skills will probably never be outsourced to a computer because they require the human touch.
    8·1 answer
  • Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence.
    5·1 answer
  • 1. You have recently been hired by a leading firm, which provides information management solutions to large corporations. As a n
    12·2 answers
  • When you _____ a scroll bar, a shortcut menu appears with commands related to the scroll bar
    10·1 answer
  • I was able to solve the question :))
    7·1 answer
  • What is the problem, if any, with the following code?The desired output is [3,19].
    13·1 answer
  • Fill in the word to complete the sentence.
    10·1 answer
  • List all the steps used to search for 25 in the sequence given below. Use both (a) linear search and (b) binary search. 2, 7, 13
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!