1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
9

Code embedded into an HTML page and downloaded by a user; resides on the client and helps process Web form input. Common clients

ide scripting languages include JavaScript and VBScript.
Computers and Technology
1 answer:
Stels [109]3 years ago
8 0

Answer:

TRUE

Explanation:

You might be interested in
Write a class Example() such that it has a method that gives the difference between the size of strings when the '-' (subtractio
Mariulka [41]

Answer:

class Example:

def __init__(self, val):

self.val = val

def __gt__(self, other):

return self.val > other.val

def __sub__(self,other):

return abs(len(self.val) - len(other.val))

def main():

obj1 = Example('this is a string')

obj2 = Example('this is another one')

print(obj1 > obj2)

print(obj1 - obj2)

main()

\color{red}\underline{Output:}

3 0
3 years ago
Interruption attacks are also called ___ attacks:
Lelu [443]

Answer:

Interruption attack are also referred to as Denial Of Service(DOS) attack.

Explanation:

Interruption attack are also called denial of service.The main aim of  interruption attack or Denial Of Srvice attack is to make resources unavailable.

For example:- wordpress.com had an DOS attack that took down their servers hence the service was unavailable for it's users.

Hence we conclude that the answer to this question is Denail of Service (DOS).

4 0
3 years ago
Which layer of the OSI model provides a user interface in the form of an entry point for programs to access the network infrastr
Alexandra [31]

The OSI model layer that provides a user interface in the form of an entry point for software programs to access the network infrastructure is: application layer.

<h3>What is the OSI model?</h3>

OSI model is an acronym for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems)

<h3>The layers of the OSI model</h3>

In Computer networking, the seven (7) layers of the OSI model include the following in sequential order;

  • Physical Layer
  • Data link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

The uppermost layer of the OSI model which is the "application layer" gives software programs an access to the services that allow internet connection or network infrastructure.

Read more on OSI model here: brainly.com/question/14446612

3 0
2 years ago
What is ransomware<br>я​
Novosadov [1.4K]

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

5 0
2 years ago
A ________ is an input device that responds to finger touch.
AURORKA [14]

1 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 2

6 0
3 years ago
Read 2 more answers
Other questions:
  • 3. What type of error is in the following sentence? "George W. Bush is the President of the United States of
    5·1 answer
  • Karen has opened a new business and is using Google Display Ads to build awareness of her new products. How does Google Display
    6·1 answer
  • How many points are in an inch? <br> A 24<br> B 50<br> C 72<br> D 100
    5·1 answer
  • Which zone of the ocean is deepest ?
    7·2 answers
  • True / False<br> 1. A byte is a standardized unit of measure that is always 8-bits.
    7·1 answer
  • Write the definition of a function reverse, whose first parameter is an array of integers and whose second parameter is the numb
    15·1 answer
  • Which graph is the solution to the system 2x – 3 and y &lt; 2x + 4?
    5·2 answers
  • Select three advantages of cloud computing.
    12·1 answer
  • Why is it a good idea not to change the subject line when replying to a message?
    8·2 answers
  • Which is government departments fund the Global Positioning System
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!