Answer:
a. connect ----------- a network.
Explanation:
Middleware sits in between the front end and the back end. The back end can be like a database residing on the server, which can be on the cloud or at any computer systems across the network, however, it is always on the server, and the front end or the client request is on the user's computer. Hence, it connects the processes running on different computer systems across the network. Hence, Option A is correct.
So it does not connect a computer system to a network, and nor does it provide the best business practices to ERP Systems, and it does not integrate the computer's operating system and its applications as well. The last one is application software like a word processor.
Answer:
import java.util.Scanner;
public class num2 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter Name");
String name = in.next();
System.out.println("Enter Age");
int age = in.nextInt();
System.out.println("The age of "+name +" is "+age);
}
}
Explanation:
Java programming language is used to write the code.
The scanner class is used to prompt and receive values for name and age which are stored in the appropriate variables.
The key idea here is using string concatenation in the output statement in order to print the desired output
Answer:
To show all text in an outline. Position the cursor the and then press
Alt + Shift + A
Explanation:
Answer:
Option D: Botnet
is the correct answer.
<h3>When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, <u>Botnets </u>are responsible.
</h3>
Explanation:
A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.
All other listed options spread malicious data by some other means.
I hope it will help you!
Answer:hacking a computer is all I know
Explanation: