1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
11

Can Someone help plz?

Computers and Technology
1 answer:
Ugo [173]3 years ago
7 0

Answer:

i dont understand sorry

Explanation:

You might be interested in
The number 1 represent what state in binary code
love history [14]
True, is the state of a binary 1
6 0
3 years ago
The producers of media messages want to get their information to?
alexandr1967 [171]
It is B        .............
6 0
3 years ago
Read 2 more answers
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
il63 [147K]

Answer:

VM escape attack

Explanation:

<em>In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.</em>

6 0
2 years ago
Use-case points is a project effort estimation approach based on unique features of _______ and object orientation.
Lelechka [254]
The choices that should have been included are: 

a. functions
b. classes
c. objects
d. projects
e. use cases

Use-case points is a project effort estimation approach based on unique features of E. USE CASES and object orientation.
7 0
3 years ago
To create an instance of Big Decimal for 454.45, use ________.
agasfer [191]

Answer:

C.

Explanation:

Based on the Java documentation; when creating an instance of BigDecimal, we can pass a string as a constructor.

System.out.println(new BigDecimal("454.45"));

8 0
4 years ago
Other questions:
  • 3. You arrive at an intersection with traffic lights that are not working because of a power outage. What do you do?
    9·1 answer
  • 5. Write a function that takes two lists of integers and returns a list containing tuples with corresponding elements from both
    8·1 answer
  • How do you represent the decimal integer 50 in binary?
    14·1 answer
  • The ability of a person booking a flight on Southwest's website to reserve a car from Dollar Rent-A-Car without having to leave
    6·1 answer
  • We need ____ pointers to build a linked list.
    6·1 answer
  • For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing t
    14·1 answer
  • The most effective technique of malware propagation among the following list
    7·1 answer
  • An online news website relies on in-page advertisements to make money. Their article pages have multiple slots for advertisement
    5·1 answer
  • And this also please. help​
    15·1 answer
  • Sort the layout options for two types of masters in PowerPoint.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!