1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
3 years ago
10

Referat noaptea la școala cu sfârșit de groază​

Computers and Technology
1 answer:
solniwko [45]3 years ago
7 0

Te ajut eu daca vrei tu la refera

You might be interested in
Type the correct answer in the box. Spell all words corre ctly.
Andru [333]

Answer:

publication file I think ?

5 0
3 years ago
Read 2 more answers
When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the
bazaltina [42]

Answer:

The correct answer to the following question will be "Buffer overflow".

Explanation:

  • For security policy and computing, the buffer overflow is a phenomenon where the code overwrites the boundaries of the buffer when adding data to the buffer and overwrites neighboring storage positions.
  • A vulnerability of buffer overflow occurs when you offer so much data to a program. Excessive data corrupts memory space in the vicinity and it may change certain data. As a consequence, the program could report a mistake or act differently. These vulnerabilities are often referred to as buffer overrun.
  • If the programmer constructs a compiled code which does not test for a given quantity of system memory, the buffer overflow would strike on it.

Therefore, Buffer overflow is the right answer.

4 0
3 years ago
The Bureau of Justice Statistics was able to determine that what % of identity theft victims were unable to determine how their
Iteru [2.4K]

Answer:

68%

Explanation:

Identity theft is a kind of crime that is committed when individuals are impersonated. The person who commits the crime assumes the personality of the victim. This could happen in the case of internet financial crimes where the financial details of individuals are stolen and then used to make unauthorized transactions.

The Bureau of Justice report on identity theft victims in 2014 shows that among the victims of this act only 32% knew how the offender was able to obtain their information. This would mean that 68% of the victims were unable to determine how their information as stolen.

6 0
4 years ago
Create a generic bubble sort method. Refer to the pseudo code below for a description of the sorting algorithm. Your method must
tangare [24]

Answer:

import java.util.Arrays;

import java.util.Random;

public class GenericSort{

/**

* Method for swapping the value

* @param list

* @param i

* @param j

*/

private static <T> void swap(T[] list, int i, int j) {

if (i != j) {

T temp = list[i];

list[i] = list[j];

list[j] = temp;

}

}

/**

* Generic method for sorting array

* who implement the comparable interface

* @param list

*/

public static <T extends Comparable<T>> void bubble_sort_(T[] list) {

//used the given algo

for (int k=1;k<list.length; k++){

for (int i=0; i<list.length-k;i++){

//using the compareTo method from comparable interface

if(list[i].compareTo(list[k])>0) {

swap(list,k,i);

}

}

}

}

public static void main(String[] args) {

Random rand = new Random();

//Array for int and double

Integer intArray[ ] = new Integer[100];

Double doubleArray []= new Double[100];

for(int i = 0;i<100;i++) {

intArray[i] = rand.nextInt(1000);

doubleArray[i] = 0 + (1000 - 0) * rand.nextDouble();

}

System.out.println("Integer Array Before Sorting ...");

System.out.println(Arrays.toString(intArray));

bubble_sort_(intArray);

System.out.println("Integer Array After sorting.....");

System.out.println(Arrays.toString(intArray));

System.out.println("\n\nDouble array Before Sorting ....");

System.out.println(Arrays.toString(doubleArray));

bubble_sort_(doubleArray);

System.out.println("Double array after sorting ...");

System.out.println(Arrays.toString(doubleArray));

}

}

Explanation:

7 0
3 years ago
What is a unique text-based Internet address corresponding to a computer’s unique numeric IP address called?
Andrews [41]
The answer is A.  Good Luck!
6 0
3 years ago
Other questions:
  • Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network thr
    13·1 answer
  • When copying and pasting text, the first step is _____.
    10·2 answers
  • Whoever likes anime add my discord notadaikon#3128
    11·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • An employee sets up an automation that transfers files in a specific folder on their PC to a remote drive for archiving, provide
    11·1 answer
  • A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
    8·1 answer
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • Select all that apply.
    6·1 answer
  • Alice and Bob are unknown to each other. Alice wants to send an encrypted message to Bob. So it chooses a KDC which is known to
    14·1 answer
  • Which of these would be the fastest transition duration?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!