1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
5

Do you ever just . . . . . . . . . . . . .

Computers and Technology
2 answers:
eduard3 years ago
6 0

Answer:

Ok than taste in art is immaculent amazing wonderful

Nezavi [6.7K]3 years ago
4 0

Answer:

sure? *confusion*

Explanation:

You might be interested in
Case Project 9-4: Troubleshoot an IP configurationYou work at a help desk and have just received a call from an employee who say
Svetllana [295]

Answer:

To get the IP address and other information on the workstation, type 'ipconfig' for windows or 'ifconfig' or Linux and press the return key.

The subnet mask is a class B type and 169.254.14.11 IP address shows that the workstation cannot access the DHCP server, so the IP address is not properly configured for network connection.

Explanation:

A computer network is an interconnection and intercommunication of two or more computer devices. All devices in a network must have an IP address, which can be static or dynamic from a DHCP server.

When a computer is configured to receive IP address from a DHCP server, but cannot reach the server, the IP address from the range of 169 is automatically assigned to it but still would not be able to communicate with other devices in the network.

4 0
2 years ago
The web server software used has a significant impact on how a web site's web pages look on a user's computer.
soldi70 [24.7K]
False. Apache (which serves about 63% of the web pages) just serves the files. How it looks is a combination of the HTML and CSS that the site uses.
6 0
3 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
2 years ago
What are the three fundamental features of anobject-oriented programming language?
hjlf

Answer:

  1. Inheritance
  2. Data abstraction or Data encapsulation
  3. Polymorphism.

Explanation:

The three fundamental features of an object oriented programming language are written above.

1. Inheritance:It is the mechanism when a class acquires the properties of some other class.The class which acquires the properties is called the child class and the class from which properties are inherited is called the base class.

2. Data encapsulation is clubbing different types of data in one place.That what class does .It can contain different data types in one place and those variables can be public ,private or protected.

3.Polymorphism it the property when an entity is processed in more than one form.Either be it run time or compile time polymorphism .

6 0
3 years ago
Which of the following would be MOST useful to determine why packets from a computer outside the network are being dropped on th
jek_recluse [69]

Answer:

c.

Explanation:

3 0
3 years ago
Other questions:
  • According to the author. Consider diverse and various domains of programming languages and applications.
    14·1 answer
  • 13. You're expecting an important call from Mr. Suarez, a potential customer. While waiting for this call, your supervisor calls
    15·1 answer
  • Bit stream methods commonly use algorithm functions like the exclusive or operation (__________.
    11·1 answer
  • Write a method called findNames that meets the following specs: It takes two arguments: a list of strings, allNames, and a strin
    12·1 answer
  • An ironworker standing 30 feet in the air is safe wearing a full body harness that is not tied off
    15·2 answers
  • For a business that is properly using a social media information system, the system can
    13·1 answer
  • 2 4.1.2 Quiz: Information Systems and Business Planning
    11·1 answer
  • What are the importance of Help and Support feature of Windows​
    6·1 answer
  • What year did polaroid introduce one-step photography with the SX-70
    14·1 answer
  • windows switches to secure desktop mode when the uac prompt appears. what is the objective of secure desktop mode?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!