1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
3 years ago
7

Since the web.xml file describes how the web application should be configured when it is deployed on a server, the file is known

as the
Computers and Technology
1 answer:
HACTEHA [7]3 years ago
5 0
The answer is:<span>deployment descriptor (DD)</span>
You might be interested in
An anagram of a string is another string with the same characters in the same frequency, in any order. For example 'ab', 'bca, a
nlexa [21]

Answer:

from collections import Counter

def anagram(dictionary, query):

   newList =[]

   for element in dictionary:          

       for item in query:

           word = 0

           count = 0

           for i in [x for x in item]:

               if i in element:

                   count += 1

                   if count == len(item):

                       newList.append(item)

   ans = list()

   for point in Counter(newList).items():

       ans.append(point)

   print(ans)        

mylist = ['jack', 'run', 'contain', 'reserve','hack','mack', 'cantoneese', 'nurse']

setter = ['ack', 'nur', 'can', 'con', 'reeve', 'serve']

anagram(mylist, setter)

Explanation:

The Counter class is used to create a dictionary that counts the number of anagrams in the created list 'newList' and then the counter is looped through to append the items (tuple of key and value pairs) to the 'ans' list which is printed as output.

4 0
3 years ago
If you type too much text on a PowerPoint slide, the additional text is added to a second slide.
Snowcat [4.5K]

Answer:

This is false

The text just goes out of the slide and you can't see it until you lower the font size or until you delete some of it.

Explanation:

5 0
3 years ago
evaluating how well various computers will handle an organization's workload by running a representative set of real jobs on the
muminat

Answer:

Benchmarking.

Explanation:

5 0
2 years ago
What term below is used to describe an attack that sends unsolicited messages to bluetooth enabled devices?
lukranit [14]
Cybercrime or cyberattack?
4 0
3 years ago
The phase of hacking where the attacker creates a profile of the target is known as ________________ and is also referred to as
tatyana61 [14]
The stage of hacking where the attacker constructs a profile of the target is recognized as Foot-printing and is also referred to as reconnaissance. Reconnaissance is perhaps the extensive phase that is occasionally weeks or months. The black hat uses a diversity of causes to learn as much as likely about the target business and how it functions as well as internet searches, social engineering, dumpster diving, domain name management or search services and non-intrusive network scanning. The undertakings in this phase are not easy to protect against. Facts about an organization find its method to the internet via many routes and employees are often trapped into providing tidbits data which over time, act to complete a complete picture of procedures, organizational arrangement and possible soft spots. 
4 0
3 years ago
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • Which transfer of learning occurs when the performance of a maneuver interferes with the learning of another maneuver?
    6·1 answer
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • An iPad Is An Example Of Which Type Of Computer?
    11·2 answers
  • Which of the following components does a typical two stroke engine contain
    7·2 answers
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • Give one example of a civil engineering structure.
    5·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable nIncompletes that cont
    6·1 answer
  • Photoshop files are generally small in size. True or false
    13·1 answer
  • What was used to enhance silent films of the early 1900s
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!