1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
3 years ago
7

(01.05 LC)

Computers and Technology
2 answers:
liq [111]3 years ago
8 0
Their answer is known as an input, because they are saying what they know/think. Sorry if this didnt help have a nice day though^^
andriy [413]3 years ago
7 0
The answer is input! because the input is what the user enters, the output is what comes out from that, and the text and value aren’t related to the user
You might be interested in
Your friend wants to know about Microsoft Expression Web 4.
Vlad [161]
Microsoft Expression Web 4 is 
--
Component of Expression Studio
--
Design and Develop Web Pages using HTML5, CC3, ASP.Net, and more
--
Requires .Net Framework & Silverlight 4.0
--
3 0
2 years ago
What can save a computer from damage by sudden increases in voltage?
Simora [160]
Surge protector :) hope this helps
7 0
3 years ago
If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will b
ahrayia [7]

Mapping to the IP address of the logged-in user<u>-will detect  a credential theft</u>

<u></u>

Explanation:

In the "Domain Credential Filter" method the firewall matches the username and the password submitted by the user with the corporate user id and password.

In order to match the credentials submitted by the user the firewalls retrieves data from the bloom filter which is further connected  to windows  User-ID credential service add-on.

The firewall also looks in its Mapping Table for the IP address of the logged-in user

3 0
3 years ago
Which database item would show details such as a customer’s name, their last purchase, and other details about a customer
WARRIOR [948]
It would be a table...most likely in a CRM or Sales database
4 0
3 years ago
Read 2 more answers
What's a common mistake that young people in relationships make?
allochka39001 [22]
B, i say b because oversharing something personal could result in somebody you thought you loved going back telling someone else, causing rumors to be spread out
3 0
2 years ago
Other questions:
  • WILL GIVE BRANLYIST
    6·1 answer
  • A network protocol is a set of rules defining communication between two devices. True False
    8·2 answers
  • which software is used to mimic intricate hand drawings into digital paintings? _____ is used to replicate hand drawings into di
    7·1 answer
  • Which of the following is most accurate?
    10·1 answer
  • What is a Hard Drive
    13·1 answer
  • What is known as networking in the IT field?
    8·1 answer
  • What is MS-Word? Write some versions of MS-Word.
    8·2 answers
  • বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
    10·2 answers
  • Program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code
    13·1 answer
  • What is a word processing program? Give examples of word processing programs.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!