1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
satela [25.4K]
3 years ago
14

Select all the correct answers.

Computers and Technology
2 answers:
goblinko [34]3 years ago
6 0

Answer:

A, C, E

or 1, 3, 5

Explanation:

Took the test!

Elden [556K]3 years ago
5 0

Answer: Bulleted or numbered lists, presenting data in tables, and the formatting one.

Explanation: I’m taking the test and i’m pretty sure that’s right, lmk if you got a better answer though!

You might be interested in
In the 21st century organization we will see:
kykrilka [37]

Answer: All of the above

Explanation: As the technology is getting improved and advanced time to time, it will put a huge impact on various sections of organization.

The advancement in the IT infrastructures will be seen by the improvement in the software,networks, data centers, hardware etc and their functioning.This will lead increase the focus of the technology towards the IT infrastructure.

Security is the feature that requires to be developed throughout the time as hacker and attackers come up with various attacks and other malicious activity to steal the confidential data and information .Thus security constantly needs to be improved and focused which will continue to happen in 21st century.

Business of organizations are becoming online and this will tend the organizations to become more indulged online business or e-business in future as it provides more benefits and vast coverage .Thus, all the options are correct.

5 0
4 years ago
DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
Alja [10]

There are some typos in this question as the numbers become too large and lead to undefined during calculations.

so the correct data is:

Songs = 12

Rock = 15

Blues = 20

Disco = 15

The answer & explanation for this question is given in the attachment below.

4 0
3 years ago
Brainliest to Best Answer!
Shtirlitz [24]
ArrayIndexOutOfBoundsException
because it includes the extra info that you tried (and failed) to access an array
8 0
3 years ago
What are Boolean​ connectors? A. sites that connect you to more information on your topic B. databases that link your topic to a
Gala2k [10]

A,B,C AND D.  All depend on end user uses.

A. sites that connect you to more information on your topic

B. databases that link your topic to available sources

C. indexes on connective materials

D. shortcuts to help you narrow the search field

<u>Explanation:</u>

Boolean connectors are nothing but Boolean operators such as AND, OR, NOT, XOR,IMP, ISNOT , “=”, “>=”, “<>”,”<=” extra.

It all depends up how the end user uses in the programming languages. Normally if Boolean connector returns true value, instruction or set of instruction are used to execute for next core of action in the programming language.

Mostly in any programming language relation operators such as “=”, “>=”,”<=”,” <>” extra with his combination add on logical operators are used such as “And”, “OR” and “NOT” extra.

3 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
Other questions:
  • Most colleges require blank years of foriegn language for admission
    9·1 answer
  • Software that controls a computer. an os controls how system resources are used and provides a user interface, a way of managing
    13·1 answer
  • The piece of hardware that contains the circuitry that processes the information coming in to the computer and tells the other h
    8·1 answer
  • Write a short program that uses a for loop to write the numbers 1 through 10 to a file
    11·1 answer
  • Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 thr
    8·1 answer
  • Plsss help me plsssssss
    11·1 answer
  • Although it is not a term Excel uses, how do most people think of Excel?
    13·1 answer
  • In what Career Cluster you get to design, build, and destroy things
    6·1 answer
  • How communication skills are different from self management skills
    10·2 answers
  • To set up scenarios,then set up a list, then set up the reference cell. to set up the cells that display the output results from
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!