1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
2 years ago
7

A look to different section of the same page is known as_____.

Computers and Technology
1 answer:
11Alexandr11 [23.1K]2 years ago
6 0

Answer:

hatdoggggggggg

Explanation:

sunoggggggg

You might be interested in
Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last
evablogger [386]

Answer:

The method is as follows:

public static int lastIndexOf(int [] numbers, int num){

    int lastIndex = numbers[0];

    for(int i =0; i<numbers.length;i+=num){

        lastIndex = numbers[i];

    }

    return lastIndex;

}

Explanation:

This defines the method

public static int lastIndexOf(int [] numbers, int num){

This initializes the lastIndex to the first element of the array

    int lastIndex = numbers[0];

This iterates through every "num" element of the array

    for(int i =0; i<numbers.length;i+=num){

This gets the current index... until the last

        lastIndex = numbers[i];     }

This returns the last

    return lastIndex; }

7 0
2 years ago
What is the force generated by a rocket motor to propel a spacecraft forward?
Burka [1]
That would be D: Thrust
3 0
3 years ago
Explain the difference between overexposed vs. underexposed images?
hichkok12 [17]

Answer:

If a photo is too dark, it is underexposed. Details will be lost in the shadows and the darkest areas of the image. If a photo is too light, it is overexposed. Details will be lost in the highlights and the brightest parts of the image.

3 0
2 years ago
Read 2 more answers
Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
Mnenie [13.5K]

Answer:

Binary file.

Explanation:

                           In this case, the network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transaction. However, the transaction data seems indecipherable. The explanation for this is that the TCP transaction file is a Binary File and because of this the network secuirty analyst is unable to decipher the transaction file.

                           The solution for this is to convert the binary file into text file which is human readable.

3 0
2 years ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Other questions:
  • The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
    7·1 answer
  • What is the role of the federal government in regulating the media and the internet?
    6·2 answers
  • Which of the following is a true statement?
    12·2 answers
  • Nuclear batteries use devices called thermocouples, which convert the ____ of a nuclear reaction into electricity.
    9·1 answer
  • Send me the answers<br>​
    15·1 answer
  • 3.
    12·1 answer
  • What are some other possible causes of an overheating laptop
    7·1 answer
  • Suppression of politically or socially unacceptable co
    5·1 answer
  • Find the output<br>I need it immediately​
    15·1 answer
  • Give a brief explanation about the internet.plsssss
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!