1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
3 years ago
15

How many ways do advertisers determine target audiences ??????

Computers and Technology
1 answer:
guapka [62]3 years ago
7 0
Your most logical answer is B 3. :)
You might be interested in
__________________ ensures that each row is uniquely identified by the primary key, which means that a proper search for an exis
klemol [59]

Solution:

Database integrity ensures that each row is uniquely identified by the primary key, which means that a proper search for an existing tuple (row) will always be successful.

Thus the required answer is D

4 0
3 years ago
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
What is a text designed for editing and authoring code is<br> A code editor <br> B
Otrada [13]
The text designed for editing and authoring code is source code editor.
A Source code editor is a text program designed specifically for editing source code of computer program by programmers. It may be a standalone application or it may be built into an (IDE) integrated development environment or web browser. source code editors are most  fundamental programming tools as the fundamental job of programmers is to write and edit source code.
6 0
3 years ago
In vehicles equipped with ABS, the driver's foot must remain firmly on the _________ to activate the ABS.
DanielleElmas [232]
<span>The driver’s foot must remain firmly on the brake pedal to activate the ABS.

An Anti-lock Brake system (ABS) is an effective braking system if used correctly. It simply keeps the foundation braking systems from locking up. It allows the driver to maintain directional stability and in some cases, reduces stopping distances during emergency situations when a driver slams the brake.
The foot of those drivers in vehicles equipped with ABS should remain firmly on the brake pedal, allowing this system to automatically kick in. In case of a slippery road or a panic stop, an Anti-lock Brake system prevents wheel lock up and helps your vehicle maintain a straight line</span>
3 0
3 years ago
Read 2 more answers
1.) what is the minimum number of bits required to represent -3,997 using 2's complement form?
lisabon 2012 [21]

The binary representation of +3997 is 1111 1001 1101.

In one's complement this is simply adding a sign bit and inverting all the bits:

1 0000 0110 0010

The two's complement is the one's complement plus 1:

1 0000 0110 0011

That's 13 bits. Normally the sign bit would be at an 8, 16 or 32,... bit boundary.

For -436 it's 10 0100 1100 and 10 bits


8 0
3 years ago
Other questions:
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • When one block is executed after another block in order from top to bottom, this is called ______ (see picture) Question 31 opti
    8·1 answer
  • An icon in a document preset that looks like the play button on a YT video, what type of document is the preset meant to be used
    13·2 answers
  • Which of the following works on the pay-per-click (PPC) and cost-per-click (CPC) concept? ~ Plato
    9·1 answer
  • What is a traffic controller?what are its functions?
    13·1 answer
  • Examine the following declarations and definitions for the array-based implementations for the Stack and Queue ADTs. Assume that
    14·1 answer
  • If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/A
    7·1 answer
  • HELP PLS!!! In a presentation, what is layout?
    10·2 answers
  • What is the difference between MySQL and MariaDB?
    9·1 answer
  • Explain how to add cell A1 and cell B3 in excel
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!