1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
7

Write a program to enter the initial and final value and display only the multiples of 4.

Computers and Technology
1 answer:
lbvjy [14]3 years ago
7 0

I've included my code in the image below. Best of luck.

You might be interested in
The question is in the photo
Anastaziya [24]

Answer:

a

the most suitable answer

8 0
3 years ago
Emily loves her job as an executive recruiter for a large hospital located in Seattle, Washington. Part of Emily's job requires
Nana76 [90]

Answer:

D. Collective intelligence

Explanation:

Collective intelligence appears when people work together. It is derived  from the collaboration, collective actions, and competition of many parties.

In Emily's job, she collaborate with partners, compare competitors and tap into the knowledge of prospective employees, partners, and customers. Thus, she performs collective intelligence.

3 0
3 years ago
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
3 years ago
Which of the following keys moves the insertion point to the end of data in a cell?
IgorC [24]
C) End is the key that moves the insertion point to the end of data in a cell. 
5 0
3 years ago
Name a software program?​
Tju [1.3M]

Answer:

mathematica ,is a software program helps to solve maths equation ...

Explanation:

mark me as brainliest ❤️

6 0
3 years ago
Other questions:
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • Identify at least three body language messages that project a positive attitude?
    15·1 answer
  • Which best describes inserting a table using the Table Gallery
    10·2 answers
  • Why is it so important that you know how much traffic dfs replication requires?
    13·2 answers
  • 4. True or False? Electrons flow out from the POSITIVE end of a battery. *<br> True<br> False
    7·1 answer
  • ______was developed as an interim management protocol with OSI as the ultimate network management protocol.
    5·1 answer
  • Which type of appliance can host several functions, such as antimalware, firewall, content filter, and proxy server
    11·1 answer
  • Name all mario kart games in order
    15·2 answers
  • Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the method in a pr
    13·1 answer
  • How to code for a database?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!