1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
12

Rate my dog out of ten give explanation why

Computers and Technology
1 answer:
Karolina [17]3 years ago
7 0

Answer:

10/10

Explanation:

i love dogs. he's a super cute dog and i love him without even knowing him

You might be interested in
Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,
oksano4ka [1.4K]

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

3 0
3 years ago
Read 2 more answers
HELP ASAP
vladimir2022 [97]

Answer:

B

Explanation:

took the test on egdenuity

7 0
3 years ago
(Will mark brainiest) The ultimate goal of a distributed denial of service attack is to:
Mumz [18]

Answer: B

Explanation: They are trying to flood the service with so many things like messages, connection requests, that the system can't handle it and will shut down or crash.

5 0
3 years ago
Read 2 more answers
Which of the following is true of a traditional systems development environment?​ a. ​ Systems are developed and delivered in an
pshichka [43]

Answer:

c. ​ Many applications require substantial desktop computing power and resources.

Explanation:

From the options given, the correct answer is C.

Traditional system development is the development of computer software for a typical computer system.

The other options is true for web based system development environment.

Option A mention web based framework as traditional development environment and this is not correct.

Option B mention scalability and running on multiple hardware. This is not true for traditional development environment as it is not scalable and it doesn't run on multiple hardware concurrently. So B is not correct.

Option C is correct as Many applications require substantial desktop computing power and resources.

Option D is not correct as traditional system development environment is not the platform for internet based development. Internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel.

6 0
3 years ago
What are the SPEC benchmarks?
Sloan [31]

Answer: Answer

Explanation: benchmarks designed to test the CPU performance of a modern server computer system. It is split into two components, the first being CINT2006, the other being CFP2006 (SPECfp), for floating point testing. SPEC defines a base runtime for each of the 12 benchmark programs

3 0
3 years ago
Other questions:
  • strategy that is used to help improve the chances that your site will be found by search engines is known as search engine
    12·1 answer
  • What command line utility can be used to repair the bcd on a windows installation?
    13·1 answer
  • What does the minimum password age setting control?
    15·1 answer
  • HIGH POINTS!!! <br>List the creation date of each gaming console to exist.​
    8·1 answer
  • Given the function definition void something ( int a, int&amp; b ) { int c; c = a + 2; a = a* 3; b = c + a; } what is the output
    6·1 answer
  • Write JavaScript code to declare a variable of the name favoriteColor
    13·1 answer
  • HELP ASAP
    7·1 answer
  • AJ created a list, and he needs all of the numbers to be in order. Which Python function will allow him to organize his list num
    5·2 answers
  • Often, a single source does not contain the data needed to draw a conclusion. It may be necessary to combine data from a variety
    9·1 answer
  • how could environmental and energy problem Kenya faces as far computer installations are concerned be avoided​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!