1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
12

Which of the following programming languages

Computers and Technology
2 answers:
trapecia [35]3 years ago
5 0

Answer:

I think

BASIC programming language

Nutka1998 [239]3 years ago
5 0

Answer:

It's A B and D

You might be interested in
What shortcut keys do i use to print something on my keyboard ?
romanna [79]
CTRL+P. It's usually pressed when you want to print something.
5 0
3 years ago
Read 2 more answers
Who conceptualizes the design and the working of a website
Citrus2011 [14]
Answer is "Web Designer".

Web Designers are the "artists" of the website. They conceptualize the layout and functionality of the site, from features to format. They may do little coding, and are mostly involved in the creative elements of web design. The Web Developer is less big-picture, and more knitty-gritty building of the website. She is the one who does the coding and actually builds the website, using the web designer's model. 
3 0
3 years ago
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi
kvasek [131]

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

3 0
3 years ago
Please discuss what you consider to be some of the biggest challenges your company will face when working from the Linux command
Nastasia [14]

Answer:

Command remembering issues.

Explanation:

The biggest challenge my company will face when working on Linux is remembering issues of the commands. The commands in Linux are a bit difficult to remember as they are complicated bit but practice can solve this issue. "Practice makes a man perfect" this well known saying suggests that practice can make perfect and this well known saying also works with Linux the more practice the employees do the more perfect they get.

3 0
3 years ago
Write a script that calculates the common factors between 8 and 24. To find a common factor, you can use the modulo operator (%)
AnnyKZ [126]

Answer:

  1. common = []
  2. num1 = 8
  3. num2 = 24
  4. for i in range(1, num1 + 1):
  5.    if(num1 % i == 0 and num2 % i == 0):
  6.        common.append(i)
  7. print(common)

Explanation:

The solution is written in Python 3.

Firstly create a common list to hold a list of the common factor between 8 and 24 (Line 1).

Create two variables num1, and num2 and set 8 and 24 as their values, respectively (Line 3 - 4).

Create a for loop to traverse through the number from 1 to 8 and use modulus operator to check if num1 and num2 are divisible by current i value. If so the remainder of both num1%i and num2%i  will be zero and the if block will run to append the current i value to common list (Line 6-8).

After the loop, print the common list and we shall get [1, 2, 4, 8]

8 0
3 years ago
Other questions:
  • While driving you encounter an emergency vehicle stopped ahead. Discuss how the move over law applies to this situation and your
    13·1 answer
  • How many people watch Anime in the world?
    15·2 answers
  • What commonly predefined alias is configured to run the ls âl command?
    15·1 answer
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • Write four overloaded methods called randomize. Each method will return a random number based on the parameters that it receives
    5·2 answers
  • What is the binary system?
    13·2 answers
  • Discribe two ways you can zoom in and out from an image
    9·2 answers
  • 4.7 code practice question 2 edhesive i cant figure out the code for this problem csn anyone help me?
    5·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!