1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
3 years ago
5

Defensive programming is sometimes referred to as _________.

Computers and Technology
1 answer:
Romashka [77]3 years ago
6 0
Anti-malware and Anti-Virus
You might be interested in
Which of the following statements is the least abstraction of the world wide web
Sliva [168]
<span>Documents, images and other data you can access by providing a uniform Resource Locator. URL - the Web Address

I hope this helps. You didn't give me the choices to from.  </span>
8 0
3 years ago
Read 2 more answers
When registering online for your classes you log onto to a website provided by your university. The computer and web browser tha
dedylja [7]

Answer:

Client, Server

Explanation:

The web browser acts as a client while the university computer acts as a server.

In a Server-Client model or architecture, the server provide the resources while the client request for the resources.

In this case, the university computer provide the resources that is to be consumed by the web browser after it must have made some request. The resources provided by the server (university computer) is based on the client (web browser) request.

6 0
3 years ago
Read 2 more answers
Which network device regenerates the data signal without segmenting the network? modem?
Yanka [14]
Hub(s) is the answer
6 0
3 years ago
What is the binary equivalent of the volume 3F?
kaheart [24]

Answer:

The binary equivalent of the volume 3F is

A. 00111111

Hope it will help. :)❤

6 0
2 years ago
Which is an appropriate strategy for using a workplace blog?
OLEGan [10]

Answer:

a

Explanation:

8 0
3 years ago
Other questions:
  • How many total channels are available in the United States for wireless LAN use in the unlicensed 2.4ghz ism band ?
    6·1 answer
  • Which of the following is not a general strategy for organizing and analyzing qualitative data?a.Convert the data into one or mo
    6·1 answer
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • This needs to be written in Java.
    11·1 answer
  • (BRAINLIEST QUESTION!!!)
    11·1 answer
  • May someone type this down below just like how it is shown in the picture.
    7·1 answer
  • Here's a better picture of my pc mouse and keyboard​
    5·2 answers
  • Please help
    11·1 answer
  • It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.
    5·2 answers
  • Quick!! I'm TIMED!!!
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!