1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
10

WILL GIVE BRAINLIEST!!!!!!!!!

Computers and Technology
1 answer:
sukhopar [10]3 years ago
7 0

Answer:

True

Explanation:

You might be interested in
In java, c or c++ code, when a number begins with a leading 0, what do you know about that number: (example: int zzz = 012;) in
Katarina [22]
A leading 0 denotes octal notation, so the digits 8 and 9 are not used.
In normal decimal notation 12 means 1*10+2, in octal, it means 1*8+2.

The leading 0x denotes hexadecimal notation, here the digits are extended with 6 letters, a through f. 0x12 means 1*16+2.

Without any prefix, we have normal decimal notation.
5 0
4 years ago
You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
choli [55]

Answer:

Default gateway

Explanation:

The default gateway would be needed to change for the configuration value because when plugged to the computer system into other's network. The Internet Protocol addressing for network users that is static. Then, the other user finds the system can connect on a similar subnet with hosts and not with hosts on another subnet and no further computer systems have facing the problem.

3 0
4 years ago
Read 2 more answers
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Given a one dimensional array arr, what is the correct way ofgetting the number of elements in arr
SVETLANKA909090 [29]

Answer:

The answer is option 1 arr.length.

Explanation:

In java arr.length gives the correct number of elements in the array.The length is function is only applicable for arrays.

The length() method is applicable for strings.

arr.length-1 will give 1 element less.

There is no .size for arrays in java.

So we conclude that arr.length is correct way of getting the number of elements in one dimensional array arr.

3 0
4 years ago
11. SQL Output III
borishaifa [10]

Answer:

wertweabcd

Explanation:

The LPAD() function left-pads a string with another string, to a certain length.

LPAD(string, length, lpad_string)

Parameter Description

string: Required. The original string. If the length of the original string is larger than the length parameter, this function removes the overfloating characters from string

length: Required. The length of the string after it has been left-padded

lpad_string: Required. The string to left-pad to string.

In example;

SELECT LPAD("SQL Brainly", 20, "ABC");

Output : ABCABCABSQL Brainly

4 0
2 years ago
Other questions:
  • Function of network security​
    9·1 answer
  • What is the output of the loop for count in range(5): print(count)?
    6·1 answer
  • A​ __________ is a commonly used tool for showing how the parts of a whole are distributed.
    11·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • The Python MySQL Connector library:
    15·1 answer
  • The _____ model of a systems development life cycle provides for progressive development of operational software, with each rele
    8·1 answer
  • Why transport layer is usingconnectionless services if network layer is providing connection oriented services?
    10·1 answer
  • sometimes people who have been playing gta for a while are annoying, i was playing gta this weekend and was trying to escape, bu
    8·2 answers
  • Kevin, a manager at FitPlus fitness club, owns a website that updates information regarding his fitness club. He created backgro
    12·1 answer
  • What are the 3 attributes of information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!