1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Julli [10]
3 years ago
14

Wanna be friends anyone

Computers and Technology
2 answers:
Scilla [17]3 years ago
6 0

Answer:

MEEEEEEEE

Explanation:

Klio2033 [76]3 years ago
3 0

Answer:

lol nice pic sure

Explanation:

You might be interested in
Consider the following Stack operations:
maxonik [38]

Answer:

Sequence of popped values: h,s,f.

State of stack (from top to bottom): m, d

Explanation:

Assuming that stack is  initially empty. Suppose that p contains the popped values. The state of the stack is where the top and bottom are pointing to in the stack. The top of the stack is that end of the stack where the new value is entered and existing values is removed. The sequence works as following:

push(d) -> enters d to the Stack

Stack:  

d ->top

push(h) -> enters h to the Stack

Stack:

h ->top

d ->bottom

pop() -> removes h from the Stack:

Stack:

d ->top

p: Suppose p contains popped values so first popped value entered to p is h

p = h

push(f) -> enters f to the Stack

Stack:

f ->top

d ->bottom

push(s) -> enters s to the Stack

Stack:

s ->top

f

d ->bottom

pop() -> removes s from the Stack:

Stack:

f ->top

d -> bottom

p = h, s

pop() -> removes f from the Stack:

Stack:

d ->top

p = h, s, f

push(m) -> enters m to the Stack:

Stack:

m ->top

d ->bottom

So looking at p the sequence of popped values is:

h, s, f

the final state of the stack:

m, d

end that is the top of the stack:

m

6 0
3 years ago
EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
Bond [772]

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

7 0
3 years ago
What is the maximum number of edges for an undirected graph? A directed graph?
siniylev [52]

Answer:

For undirected graph n(n-1) for directed graph \frac{n(n-1)}{2}

Explanation:

The maximum number of edges for a undirected graph is given by n(n-1), where n is number of vertices

The maximum number of edges in directed graph is given by \frac{n(n-1)}{2}, where n is number of vertices

The maximum number of edges is greater in undirected graph than directed graph

5 0
4 years ago
Guys, if you ask a question on here and someone answers but they only provide a link and their username starts with a G, ITS A H
Galina-37 [17]

Answer:

oki

Explanation:

3 0
3 years ago
What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation witho
tatiyna
Don’t crowd the slide, use images that will grab them audience’s attention, don’t use fonts that are hard to read, make sure your font color can show up on your background color!
6 0
4 years ago
Other questions:
  • Students recently created a Gaming Club at their school. On Friday of every week, students bring in their gaming consoles (Xbox,
    10·1 answer
  • A computer’s BIOS is defined as the
    12·2 answers
  • Derek is working at the help desk when he receives a call from a client about an issue with the company’s email. The customer is
    11·1 answer
  • How do i get around goguardian from a chromebook
    14·1 answer
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • John’s grandparents make wine for special occasions. They add a pinch of yeast to crushed grapes. Over time, this action release
    15·2 answers
  • He made me so angry when he didn’t let me make my point that I had to stalk after him.
    5·2 answers
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the im
    8·1 answer
  • Select the function of keypunches that were used as one of the earliest input devices. A. It was used to control the cursor on t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!