1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
11

Let's go! About to hit 40k!!! Glad to help on Brainly®!!!

Computers and Technology
1 answer:
Katarina [22]3 years ago
5 0

GJ! Keep up the good work!

You might be interested in
When creating a shape in Word, what are some available options? Check all that apply. adding text to the shape changing the size
netineya [11]

Answer:

adding text to the shape

changing the size of the shape

changing the location of the shape

Explanation:

A word is can be regarded as graphical word processing program on the computer which can be used by users to type and to save documents. The word also has alot of useful tools with TABs such Insert, pagelayout, Design and others. It was developed by Microsoft corporation.

To create shapes in words, these step can be taken;

✓click "insert" at the interphase

✓Then look for "shapes" and select the needed shape.

✓To draw the shape, it should be clicked then drag holding the mouse.

✓after drawing, any modifications can be made, text can be added and lots more.

It should be noted that When creating a shape in Word, some of available options are;

✓adding text to the shape

✓changing the size of the shape

✓changing the location of the shape

8 0
3 years ago
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
Mashcka [7]

Answer:oof

Explanation:

4 0
3 years ago
Read 2 more answers
Design a program that asks the user to enter a string containing a series of single digit numbers with nothing separating them.
ruslelena [56]

Answer:

  1. def calcSum(d):
  2.    sum = 0
  3.    for x in d:
  4.        sum += int(x)
  5.    return sum
  6. digits = input("Please enter your digits: ")
  7. print(calcSum(digits))

Explanation:

The solution code is written in Python.

Firstly, create a function that take one input digit string (Line 1).

In the function, create a sum variable with initial value 0.

Use a for loop to traverse through each character in the digit string and in the loop use int method to convert each character to integer and add it to sum variable (Line 3-5) and return the sum as output.

Next, use input function to prompt user enter a digit string (Line 7).

Lastly test the function by passing the input digit as argument and print the result (Line 8).

7 0
3 years ago
In Windows Vista, which location contains the Printer link?
ipn [44]
I believe it's B.) Printer and Faxes.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • Which method of the form passes data without appending the parameters to the url?
    5·1 answer
  • Write a function "nonRepeatings" that takes a string "s3" and returns the non-repeating characters in this string. Sample Input
    11·1 answer
  • If a function needs to return more than one value, as a rule of good programming style, you should change it to a(n) ___________
    6·1 answer
  • Crop marks are used on an illustration to indicate to the printer the
    10·1 answer
  • "Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required f
    6·1 answer
  • 2.13) A simple rule to estimate your ideal body weight is to allow 110 pounds for the first 5 feet of height and 5 pounds for ea
    15·1 answer
  • How do you calculate the life span of patents?
    13·1 answer
  • What is the missing line of code?
    7·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!