1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
8

What is a command-line program?

Computers and Technology
2 answers:
Lilit [14]3 years ago
8 0
Answer: D (80%)



Explanation: it a thing to do with coding
tester [92]3 years ago
6 0
A, I think.....


Explanation:
You might be interested in
Which of the following are ways a vote thief could cast multiple votes in an online election? (check all that apply)
saveliy_v [14]

Answer:

All of the given options apply and are correct.          

Explanation:

a) The first option is correct because the intruder can use denial-of-service attack and by flooding the site with traffic to get the voter server unavailable. Then he can direct the voters to a fraud vote server.

b) The second options correctly applies too because the thief also buys the pass codes from the people who want to sell their right to vote and this way the thief can purchase multiple pass code and cast multiple votes.

c) The hackers can set up fake vote servers and then direct the voters to these servers or websites in order to collect pass codes of voters. These pass codes can then be misused by the thief to cast multiple votes in an online election.

d) Social engineering techniques can also be used to get pass codes from certain voters. By manipulating the targeted voters psychologically they can get their pass codes to cast multiple votes illegally.

3 0
3 years ago
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
Leno4ka [110]

Answer:

B. Change the router's default administrative password

Explanation:

The best way to prevent any unauthorized use is to change the password to something more secure using 12 minimum characters and including number, symbols, upper and lower case.

4 0
3 years ago
What Is database as used in computer science​
Natalija [7]

Answer:

A database is an organized collection of structured information, or data, typically stored electronically in a computer system.

8 0
2 years ago
The quality of lacking a pattern or organization so that result are unpredictable is also known as?
Aloiza [94]
<h2>Answer:</h2>

The quality of lacking a pattern or organization so that result are unpredictable is also known as<u> Randomness.</u>

<h2>Explanation:</h2>

In the daily routine work, randomness can be defined as the apparent lack of pattern. Randomness occurs when there is no predictability in events. Thus a random pattern of events, steps or symbols often has no sequence and order so they lead eventually towards Randomness. Similarly when elements will not follow an intelligible pattern or a proper combination they will result in Randomness.

<h3>I hope it will help you!</h3>
3 0
3 years ago
In Java a final class must be sub-classed before it.<br> ?? True<br><br> ?? False
Soloha48 [4]

Answer: False

Explanation: In java, whenever a final class is declared it cannot be extended further and also it is not possible for a declared class to be overridden in the sub class. A class can be declared final by using the final keyword. Final class cannot be extended but they can be used to extend the other classes.Therefore the final class cannot be sub classed before it in java.

6 0
3 years ago
Other questions:
  • A network using multiple cell towers falls under which type of network?
    13·1 answer
  • The presentation ____ determines the formatting characteristics of fonts and colors.
    11·2 answers
  • Write a program with a method computeCommission which takes a double that is the salesAmount and returns the commissions for sal
    9·1 answer
  • Match the items with their respective descriptions.
    6·2 answers
  • The radix sort
    7·1 answer
  • Java Programming Using nested if statement For a student to be accepted in XYZ College, the student must meet the following requ
    5·1 answer
  • Does anyone know what these two things are?
    12·2 answers
  • "Rights and duties are two sides of the same coin." Explain with examples​
    5·1 answer
  • What is keyword density?
    15·2 answers
  • It is important to analyze the sources and uses of cash because:___.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!