1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
9

Analyze the following code. Which of the following statements is correct?

Computers and Technology
1 answer:
matrenka [14]3 years ago
8 0

Answer:

that is complex wow

Explanation:

You might be interested in
Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
Serggg [28]

Answer: (D)DoS attack.

Explanation:

Denial of Service attack occurs when an hacker prevents the real users from accessing the service by sending excessive message to the server asking it to authenticate requests with invalid return address.

7 0
3 years ago
Raul in Colombia can enter data into a spreadsheet. Olivia in England can access the spreadsheet a few minutes later and use Rau
Mila [183]

True, as long as the application is a cloud-based spreadsheet (like Google Docs or MS Office 365), which allows multiple users in any location to view or edit the data with proper access permissions.

7 0
3 years ago
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
kvasek [131]

Answer:

When we journey from a particular city to another city and we don’t really know the path then we ask for path and go on that which is just the same thing as packet switching.

Explanation:

Suppose system A intends to send packet to system B the steps and procedures are given below

1. A breakdown of large file into smaller bits of data on system A will first occur.

2.It attach separate headers for every portion of the file so that each portion looks like separate packet.

3.Header file in chunks will contain ip address of the file receiver which here is system B.

4. the Switch system will utilize the IP present in header to decide the link to destination.

6 0
4 years ago
Digital cameras are less susceptible to UV light.Select one of the options below as your answer:A. TrueB. False
horrorfan [7]
<span>Digital cameras are less susceptible to UV light. TRUE. In fact, there is an existing photography called Ultraviolet Photography. It is a process of photography that records images by using the light from the ultraviolet spectrum. There are two possible ways to use UV in taking photographs: via reflected UV and UV induced fluorescence.</span>
4 0
3 years ago
Read 2 more answers
A file with a com extension is most likely to be a(n) ___ file.
olasank [31]
I think that the answer is: A executable
4 0
3 years ago
Read 2 more answers
Other questions:
  • Maya enjoys connectedWith her friends and social media apps but one of her friends post a lot of stuff that my thinks it’s annoy
    14·1 answer
  • The set of communications rules for exchanging information electronically on the internet is called the ________.
    10·1 answer
  • 12. When trying to identify the sorted column in a table, you would look for the column where A. an arrow is displayed in the fi
    10·2 answers
  • What is the primary responsibility of the federal reserve bank??
    11·1 answer
  • All of the following are helpful tips for protecting your digital privacy, except:
    10·2 answers
  • Drag each label to the correct location on the image. Match the movie qualities with the right period of movies.
    8·1 answer
  • How do you fix this!!!!
    5·1 answer
  • Another term for the plot structure of the hero journey
    13·1 answer
  • An end-user license agreement protects _____.
    11·1 answer
  • Which package is required for shadow passwords to be enabled?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!