1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
11

People, can anyone point me a highlighter for google chorme ?

Computers and Technology
1 answer:
damaskus [11]3 years ago
5 0
You just click and hold
You might be interested in
Assignment
Lena [83]

Answer:

it

is

not

a

big

question

it

is

so

simple

5 0
3 years ago
Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
LiRa [457]

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

4 0
3 years ago
What guidance identifies federal information security controls?
Vladimir79 [104]

Answer:

<u>FIPS</u> <u>Publication</u> <u>2</u><u>0</u><u>0</u>, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

3 0
2 years ago
Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
Leona [35]

Answer:4. Authorization memo

Explanation: Authorization memo is a document that gives a go ahead to perform certain activities on the network, gives you the opportunity to work on the network on behalf of the CIO, although you are as well reminded that you are only doing this on behalf of someone, therefore advised to take precautions. Authorization memo is a reminder formal document that gives you access to do something on behalf of your CIO.

4 0
3 years ago
Essay : Explore an editing studio or research online about editing studios and prepare a report that describes the roles and res
olya-2409 [2.1K]

Editor is main role where he or she place proper graphics with sound effects and record the same and play and get the feedback from director and producer.

<u>Explanation:</u>

Normally editing the picture or video and remixing the video with sound are done by graphic designer, editor or sound engineer.

All three had do proper coordination to get proper output results

Graphic designer who makes the video or photo their color combinations and picture orientation.

Sound designed after the graphic mix been done sound engineer has play proper BGM and record sound.

7 0
3 years ago
Other questions:
  • F we are reduced to a set of computer algorithms, how do we differentiate ourselves from our programming or our connectome? is i
    8·1 answer
  • An iPad Is An Example Of Which Type Of Computer?
    11·2 answers
  • The computer stores a program while the program is running, as well as the data thatthe program is working with, in _____.
    10·1 answer
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • Which of the following statements describes a good reason to use lossless audio compression?
    6·1 answer
  • When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?
    7·1 answer
  • What are the two basic classes of active directory objects?
    14·1 answer
  • Pick one of the following scenarios and
    6·1 answer
  • So im new how exactly does this point system work???​
    6·1 answer
  • What is the difference between a loop and a function?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!