1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
12

Jerry can use an program to restrict information from going out without his permission.

Computers and Technology
2 answers:
inysia [295]3 years ago
7 0
The answer is predictions
Mazyrski [523]3 years ago
7 0

Answer:

ok but what do you want?

Explanation:

ANTIVIRUS or anti cookie software

is what it is i think

You might be interested in
Consider the Palindrom class discussed in class. Which of the following is true? It uses one stack and one queue to find out if
yawa3891 [41]

Answer:

It uses a recursive method to find out if a string is a palindrome

Explanation:

Palindrome is a word or a sequence which is read same as backward as forwards. There are various method to find a palindrome. Palindrome can be determined recursively by identifying the first and last letters of the word. These first and last letter should be same. If they are same then the word or sequence is palindrome.

5 0
3 years ago
While traditionally employers used computers to track ordering and inventory, computers are used now to
AlexFokin [52]

Answer:

The correct answer should be A. automate merchandise ordering and inventorying.

5 0
3 years ago
Database queries is an example of
storchak [24]

Answer:

A query in a database is a request for information stored within a database management system (DBMS), which is the software program that maintains data.

SQL(Structured Query Language ( is a standard language for storing, manipulating, and retrieving data in database.

Five types of SQL queries are:

1) Data Definition Language (DDL).

used to define and modify the structure of a database.

2) Data Manipulation Language (DML).

used to manipulate (change) the data in the database.

3) Data Control Language(DCL).

used for access control and permission management for users in the database.

4) Transaction Control Language(TCL).

used for maintaining consistency of the database and for the management of transactions made by the DML commands.

5) Data Query Language (DQL).

used for performing queries on the data within schema objects.

8 0
2 years ago
12.2 Sort an array in ascending order Write a program that gets a list of integers from input, and outputs the integers in ascen
notsponge [240]

Answer:

Explanation:

The following code is written in Java, it asks the user for the number of inputs that will be made and then the inputs. These inputs are placed into an array. Then the array is sorted and printed out to the terminal.

public static void sortArrayList() {

           ArrayList<Integer> sortedList = new ArrayList();

           Scanner input = new Scanner(System.in);

           System.out.println("Enter number of digits in Array");

           int numberOfInputs = input.nextInt();

           for (int i = 0; i < numberOfInputs; i++) {

                   System.out.println("Enter a number");

                   sortedList.add(input.nextInt());

           }

           int n = sortedList.size();

           for (int i = 0; i < n; i++)

               for (int j = 0; j < n-i-1; j++)

                   if (sortedList.get(j) > sortedList.get(j + 1))

                   {

                       // swap arr[j+1] and arr[j]

                       int temp = sortedList.get(j);

                       sortedList.set(j, sortedList.get(j + 1));

                       sortedList.set(j + 1, temp);

                   }

           for (int x : sortedList) {

               System.out.println(x);

           }

       }

7 0
3 years ago
Which domain indicates that a website is sponsored by a university or college?
d1i1m1o1n [39]

There are two domains that are commonly associated with sites that owned by a university or college: .edu and .ac.

In the case of .edu, <u>it is only available for United States higher education institutions or higher education institutions outside U.S that are affiliated with the United States since 2001.</u>

For non-U.S colleges and universities, they will commonly <u>use .ac as a second-level domain before putting in their country domain as the top-level domain.</u> Examples of this would be .ac.uk and .ac.jp.  


8 0
3 years ago
Other questions:
  • "ikev2 requires the use of which of authentication protocol?"
    5·1 answer
  • Write a complete program whose class name is hello and that displays hello, world on the screen.
    13·2 answers
  • A systems analyst draws a lifeline with an X at the end. This lifeline represents _____.a. a message that cannot be deliveredb.
    9·2 answers
  • Explain the importance of calculating a robot’s ability to extend its arm
    15·1 answer
  • Movie recommendations? I’m in middle school so nothing nasty bro and I don’t really like horror movies so none of those either
    13·2 answers
  • How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    13·1 answer
  • What is the command for basic router configuration?
    6·1 answer
  • Select the correct answer.
    15·1 answer
  • where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
    6·1 answer
  • Which communication network pattern offers a fairly even flow of information, but two people interact with only one other?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!