1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
12

Which of the following correctly declares an array:

Computers and Technology
1 answer:
AleksandrR [38]3 years ago
6 0

Answer:

a.

Explanation:

You might be interested in
The point on the middle of an edge in SketchUp is called a...
sergey [27]

Answer:

.

Explanation:

.

8 0
4 years ago
Read 2 more answers
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
It is desirable to provide a degree of __________ __________ among classes so that one class is not adversely affected by anothe
alexandr402 [8]

Answer:

The right approach is "Traffic isolation ".

Explanation:

  • A significant amount of those same traffic insulation is necessary. Therefore one class isn't influenced by yet another traffic class which makes a mistake. Then maybe the packages throughout the traffic could collapse.
  • This also eliminates uncertainty with people operating the infrastructure. If you don't need the VLANs to speak to one another because you could implement anything about this illustration as well as add it to certain VLANs.
4 0
3 years ago
In the computing environment the numerical value represented by the pre-fixes kilo-, mega-, giga-, and so on can vary depending
nignag [31]

Answer:

1024 bytes in a megabyte and there are 8000000 bits in a megabyte. They are different.

Explanation:

5 0
3 years ago
Name this<br><br>The feature allows you to add text/picture in the background of the document. ​
sertanlavr [38]
I think it is picture/text wrapping

I wouldn’t trust this though

I’m sorry if it’s wrong
4 0
3 years ago
Other questions:
  • kindly for the website of stedeo code.org if I login is the time of logging appears at my teacher ??is it registered ​
    14·1 answer
  • Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
    15·2 answers
  • Question #4
    5·2 answers
  • Which of the following information is most important to include in a timeline
    14·2 answers
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • If an individual receives 1.8 mGy while standing 4 ft from a source of radiation for 2 minutes, which of the following option(s)
    9·1 answer
  • Explain the applications software that you use everyday
    5·1 answer
  • Critical Thinking Questions
    15·2 answers
  • to see additional functions available in an open desktop, document or website what action should the user perform?
    11·2 answers
  • What purpose does encryption on the internet serve? Why is it so important?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!