1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
3 years ago
6

The __________________ standard is the basic test for the permissibility of mail and literature that is used by corrections to j

ustify restricting inmates' rights.
Computers and Technology
1 answer:
Over [174]3 years ago
6 0

Answer:

clear and present danger.

Explanation:

Clear and present danger is the basic test for the permissibility of mail and the literature and is used for justifying restricting inmates rights.Prisoners does not have full constitutional rights but they yet retain some constitutional rights. So we conclude that clear and present danger is the correct ans wer.

You might be interested in
Research and identify at least five specialized search engines and their applications.
Varvara68 [4.7K]

Specialized search engines indexes content specialized by topic or location and are used to deliver more relevant results to the user. It indexes pages for particular topics. Examples of specialized search engines and their applications include;

1. Uquery.com – This new search engine focuses more on the emergence of iPhone and iPod touch applications

2. Taptu.com – A downloadable search engine that helps the user find items specific to fit on a mobile screen

3. Yahooligans – A sub-domain of yahoo that focuses on kid friendly games.

4. Pubmed.com – This is specifically meant for students in medical schools

5. Zillow.com – Online real estate service that provides information regarding home purchase.

5 0
3 years ago
Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect
suter [353]

Answer:

Airplane mode has been set on the tablet.

Explanation:

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot but is still unable to connect to the internet.

This is because the Airplane mode has been set on the tablet.

5 0
3 years ago
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
3 years ago
the_____ tool is used to change the select text to capital letters or small letters (change case /grow font)​
solong [7]

Answer:

on word you can use shortcut "Shift+f3" to change uppercase lowercase and title case if that is what you are asking for

3 0
3 years ago
Input 10 integers and display the following:
LekaFEV [45]

Answer:

// code in C++

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

   int sum_even=0,sum_odd=0,eve_count=0,odd_count=0;

   int largest=INT_MIN;

   int smallest=INT_MAX;

   int n;

   cout<<"Enter 10 Integers:";

   // read 10 Integers

   for(int a=0;a<10;a++)

   {

       cin>>n;

       // find largest

       if(n>largest)

       largest=n;

       // find smallest

       if(n<smallest)

       smallest=n;

       // if input is even

       if(n%2==0)

       {  

           // sum of even

           sum_even+=n;

           // even count

           eve_count++;

       }

       else

       {

           // sum of odd    

          sum_odd+=n;

          // odd count

          odd_count++;

       }

   }

   

   // print sum of even

   cout<<"Sum of all even numbers is: "<<sum_even<<endl;

   // print sum of odd

   cout<<"Sum of all odd numbers is: "<<sum_odd<<endl;

   // print largest

   cout<<"largest Integer is: "<<largest<<endl;

   // print smallest

   cout<<"smallest Integer is: "<<smallest<<endl;

   // print even count

   cout<<"count of even number is: "<<eve_count<<endl;

   // print odd cout

   cout<<"count of odd number is: "<<odd_count<<endl;

return 0;

}

Explanation:

Read an integer from user.If the input is greater that largest then update the  largest.If the input is smaller than smallest then update the smallest.Then check  if input is even then add it to sum_even and increment the eve_count.If the input is odd then add it to sum_odd and increment the odd_count.Repeat this for 10 inputs. Then print sum of all even inputs, sum of all odd inputs, largest among all, smallest among all, count of even inputs and count of odd inputs.

Output:

Enter 10 Integers:1 3 4  2 10 11 12 44 5 20                                                                                

Sum of all even numbers is: 92                                                                                            

Sum of all odd numbers is: 20                                                                                              

largest Integer is: 44                                                                                                    

smallest Integer is: 1                                                                                                    

count of even number is: 6                                                                                                

count of odd number is: 4

3 0
4 years ago
Other questions:
  • someone who protects valuable online information, like phone numbers and passwords would be considered​
    8·1 answer
  • Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
    15·1 answer
  • A ____ client locates all or most of the processing logic on the server.
    11·1 answer
  • Date criteria are automatically enclosed in ____ when entered in a query design.
    11·1 answer
  • Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
    15·1 answer
  • Write a script that calculates the common factors between 8 and 24. To find a common factor, you can use the modulo operator (%)
    14·1 answer
  • What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
    11·1 answer
  • Please help explain this calculator code.
    15·1 answer
  • Alguien porfavor me dice como cambiar de idioma en brainly
    15·1 answer
  • The data source in the document which has the information common to all documents. True or false 
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!