1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
9

_____ selectors are used to select elements based on elements that are adjacent to them in the document hierarchy.

Computers and Technology
1 answer:
Bezzdna [24]3 years ago
3 0

Answer:

Sibling

Explanation:

  • Sibling elements that share the same parents are adjacent to each other
  • The basics are one level higher
  • The last item on the childless hierarchy is decent.
  • The child is the immediate next item
  • so correct answer is sibling
You might be interested in
What is the 1st operation that is calculated in a formula?
rusak2 [61]

Answer:

i think the second one

3 0
3 years ago
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
Attacks in which a user reaches a directory outside of the WWW root directory and its subdirectories is called a(n) ________ att
uranmaximum [27]

Answer:

Directory traversal

Explanation:

Directory traversal or path traversal is HTTP attack in which user can reach to the restricted directories and query them outside of www root directory. Web servers these days provide multiple type of security layers to avoid this type of attacks.

5 0
4 years ago
NO links!!! please, In this task, you will prepare the necessary documents required to apply for the job. Conduct research and f
serious [3.7K]

To apply for a job, you must provide a resume, cover letter, reference list, letters of recommendation, portfolio, and employment certificate.

About these documents we can inform you that:

  • The Resume presents the most generalized information about the candidate's educational and professional background.
  • The cover letter must be made to show more in-depth information, where the candidate reinforces their most positive points and relevant to the job vacancy.
  • The reference list presents the opinion of other professionals about your professional abilities.
  • The portfolio must be submitted by candidates related to artistic or visual areas and presents the works already created by that professional.
  • The employment certificate must show your professional history in more detail.

Thus, we can state that the application for a job vacancy requires that many documents and information be provided.

More information on writing a resume at the link:

brainly.com/question/862477

7 0
3 years ago
Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
MrRissso [65]

Answer:

C.

Explanation:

decDiscount = GetDiscount(decSales, decRate)

is the correct statement. The function GetDiscount has two parameters "decSales" and "decRate", the result from the function is assigned to "decDiscount".

4 0
3 years ago
Other questions:
  • What did you include in your response? Check all that
    15·1 answer
  • Which of the following is the best example of potential energy?
    9·2 answers
  • Amazon.com first started out as a place to: auction items online. sell books and music online. make friends online. exchange mon
    8·1 answer
  • Create a class that acts as a doubly linked list node. it should contain all the required data fields, at least 1 constructor, a
    7·1 answer
  • Using positive self talk is a great way to
    12·2 answers
  • Hadoop is : open source software framework designed for distributing data-processing over inexpensive computers. data mining pla
    12·1 answer
  • List any three positive impacts of computer technology in our society?
    15·1 answer
  • Viết thuật toán và chương trình: Tính tổng:<br> S=1+2+...i
    8·1 answer
  • You have been asked to replace a cracked screen on a laptop. The replacement screen was delivered today, but it did not include
    7·1 answer
  • What is the worst case complexity of the push operation for an array-based stack?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!