1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
12

Breaking code rules is only a problem once in a while. Group of answer choices True False

Computers and Technology
1 answer:
seropon [69]3 years ago
4 0

Answer:

false because you could get into a lot of trouble.

Explanation:

You might be interested in
Type the correct answer in the box. Spell all words correctly.
trasher [3.6K]

syntax are programming languages that specify a series of structured functions. C is an example of such a language.

7 0
3 years ago
What is the most important factors to consider when designing a powerpoint presentation?
balandron [24]
It is always helpful to choose a template, and an attractive theme to begin with. Next, display only the keywords or phrases that you need in your PowerPoint. This will help it look less boring (if its a whole paragraph of writing, it looks boring). Lastly, it is important to add visuals or images to your PowerPoint. Google Slides is also very convenient to use. Please message me if you have any other concerns! 
3 0
3 years ago
Read 2 more answers
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
Where can the slide layout be changed
NeTakaya
To change<span> an existing </span>layout<span>, do one or more of the following: To add a placeholder, on the </span>Slide<span> Master tab, click Insert Placeholder, and then select a placeholder type from the list. Click a location on the </span>layout<span>, and then drag to draw the placeholder. Resize, reposition, or delete a placeholder.</span>
4 1
3 years ago
Read 2 more answers
Create a stack with three integers and then use .toarray to copy it to an array.
Marizza181 [45]

Answer:

import java.util.*;

import java.lang.*;

import java.io.*;

class Codechef

{

public static void main (String[] args)

{

    Stack<Integer> mat=new Stack<Integer>();

    mat.add(1);

    mat.add(3);

    mat.add(6);

    System.out.println(mat);

    Object [] a=mat.toArray();

    for(int i=0;i<a.length;i++)

    System.out.println(a[i]);

}

}

Explanation:

An integer type stack st is created;

1,3 and 6 are added to the stack.

printing the contents of the stack.

array a is created form the stack using toArray().

Then printing the array.

6 0
3 years ago
Other questions:
  • In Microsoft Word, when you highlight existing text you want to replace, you are in
    13·1 answer
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • A hard drive cannot be partitioned until the device _________ is set.
    15·1 answer
  • Rule- based systems are subset of expert systems true or false?
    7·1 answer
  • the two main ways in which marketers address the competition with their strategies are by satisfying a need better than a compet
    6·2 answers
  • Http://www.alegrium.com/sgi/2/eibder
    5·1 answer
  • Var1 = 1<br> var2 = 2<br> var3 = "3"<br> print(var1 + var2 + var3)
    5·1 answer
  • How to transfer polygon from eth to polygon in ledger live
    6·1 answer
  • This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner object represents a
    8·1 answer
  • Briefly describe the working of computer processing system?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!