1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
5

What is the name of the file in which this

Computers and Technology
1 answer:
anyanavicka [17]3 years ago
3 0

Answer:

B

Explanation:

i’m an information technology  student and as I remember we used this  name

You might be interested in
What is the best approach to testing a website
Ronch [10]

A vital part of any website project is the quality assurance stage. Prior to launch, final QA testing ensures that your site is working according to your expectations and that your site users won’t be frustrated with any non-functioning pages.

7 0
3 years ago
A popular game allows for in-app purchases to acquire extra lives in the game. When a player purchases the extra lives, the numb
Taya2010 [7]

Based on the fact that the hacker's actions are done before the application reading of the lives purchased, this is <u>d. Race condition. </u>

<h3>What is a race condition?</h3>

This is when certain processes in an application depend on the timing of a a previous process or event. The flow of information can then be intercepted before the process completes.

This is what the hacker did here by accessing the application to change the number of lives purchased before the application read the number of lives purchased.

In conclusion, option D is correct.

Find out more on the race condition at brainly.com/question/13445523.

4 0
3 years ago
Name this<br><br>The feature allows you to add text/picture in the background of the document. ​
sertanlavr [38]
I think it is picture/text wrapping

I wouldn’t trust this though

I’m sorry if it’s wrong
4 0
3 years ago
Who you think is better? Ninja or TFue ,btw do you know who icebear is?
andrew11 [14]

Answer:

no, no i dont think i will.

Explanation:

4 0
3 years ago
Give the full form of http​
astraxan [27]
Hypertext Transfer Protocol
h is for hyper
the T in text is the first T
transfer is the second T
and P is for protocol

HTTP hope that helps
8 0
3 years ago
Other questions:
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit,
    14·2 answers
  • Match the careers with the education required for each job
    5·1 answer
  • Anyone got the edmentum computer programming post test answers?
    6·1 answer
  • Now let's create a memo. The memo should include all parts of a memo, and these parts should appear in the correct order. In you
    9·1 answer
  • What dynamic would best describe the genre of rock and roll?
    10·1 answer
  • Write a program in python to accept three numbers and print the largest of the three
    10·1 answer
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • Explain to Alana why she might not want to blast her boss on social media just yet.<br>​
    6·1 answer
  • What type of internet connection do you think you'd get in Antarctica?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!