1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
3 years ago
10

True or false

Computers and Technology
1 answer:
atroni [7]3 years ago
5 0

Answer:

for no.2 true and for Ctrl-Z False

Explanation:

Ctrl-z is and "undo" shortcut

not really sure about no.1 though, sorry :(

You might be interested in
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
What does it mean for a heap to be complete?
Dmitry [639]

Answer:

 A complete heap is a heap in which the all the nodes are completely filled and the level of the each node are equal to each other. So, if the heap satisfied this condition then, the heap are complete.

In the computer science, heap is the special type of tree based on the data structure. Binary heap is one of the type of heap and it become complete binary tree when, it satisfied the ordering of heap property.

There are basically two types of heap ordering that are:

1) MAX heap property: In the max heap ordering property each node are less than or equal to its parent node value.

2) MIN heap property: In the min heap property each node is greater and equal to its particular parent value.

3 0
4 years ago
Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
Elanso [62]
B False





---------------------------------
3 0
4 years ago
Which data type could be used for the field, remark or comment? ​
katrin2010 [14]

Answer:

While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.

copied from google

hope that helps

3 0
3 years ago
One of the reasons that organized crime has been around so long is that it provides goods and services that society wants. A. Tr
Anna11 [10]

The answer would be:

<em><u>A) True</u></em>

8 0
3 years ago
Read 2 more answers
Other questions:
  • Sorts by value in reverse order; keeps the same key
    6·1 answer
  • An automated search feature used by search engines to find results that match your search terms is called a spider or ?
    5·1 answer
  • A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sha
    5·2 answers
  • _________ attacks are becoming less common in modern operating systems.
    11·1 answer
  • Can anyone find any words in here?
    14·2 answers
  • Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
    5·1 answer
  • What scientific principle would a plumber need to know when designing and installing plumbing a new construction
    13·1 answer
  • Which online article citation is correctly formatted according to MLA standards?
    15·2 answers
  • Which of the following players is on offence
    9·1 answer
  • Which requires large computer memory?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!