1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
2 years ago
14

Spam and i report

Computers and Technology
2 answers:
defon2 years ago
8 0

Answer:

option d is the correct answer

mars1129 [50]2 years ago
6 0

Answer:

For your other question I think it's true

Explanation:

You might be interested in
Which of the following tasks is least effective at preventing a computer virus?
worty [1.4K]
Anti-virus software is set to scan your computer weekly is the least effective.
3 0
3 years ago
Read 2 more answers
Complete the statement using the correct term.
eduard

Answer:

Pixels

Explanation:

3 0
3 years ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
hammer [34]

Answer:

In C++:

#include<iostream>

#include<vector>

using namespace std;

int main() {

int len;

cout<<"Length: ";  cin>>len;

string inpt;

vector<string> vect;

for(int i =0;i<len;i++){

   cin>>inpt;

   vect.push_back(inpt); }

char ch;

cout<<"Input char: ";  cin>>ch;  

for(int i =0;i<len;i++){

   size_t found = vect.at(i).find(ch);  

       if (found != string::npos){

           cout<<vect.at(i)<<" ";

           i++;

       }

}  

return 0;

}

Explanation:

This declares the length of vector as integer

int len;

This prompts the user for length

cout<<"Length: ";  cin>>len;

This declares input as string

string inpt;

This declares string vector

vector<string> vect;

The following iteration gets input into the vector

<em>for(int i =0;i<len;i++){ </em>

<em>    cin>>inpt; </em>

<em>    vect.push_back(inpt); } </em>

This declares ch as character

char ch;

This prompts the user for character

cout<<"Input char: ";  cin>>ch;  

The following iterates through the vector

for(int i =0;i<len;i++){

This checks if vector element contains the character

   size_t found = vect.at(i).find(ch);  

If found:

       if (found != string::npos){

Print out the vector element

           cout<<vect.at(i)<<" ";

And move to the next vector element

           i++;

       }

}  

4 0
3 years ago
Here is the header for a function named computeValue:
zhuklara [117]

Answer:

B) computeValue(10);

Explanation:

Given

Header: void computeValue(int value)

Required

Determine the valid call

To call a function from another function or from the main, the following syntax has to be used.

<em>function-name(parameter-1, parameter-2, parameter-3,.....,parameter-n);</em>

<em />

In the function header given:, the following can be observed:

  • The function name is computeValue
  • It has only one parameter and it is of type integer

So, to call the function; we make use of computeValue(10);

Where 10 represents the value of the parameter (i.e. argument)

7 0
2 years ago
Other questions:
  • A cell reference that has only one $ is referred to as a(n) ____ cell reference. alternative mixed relative absolute
    7·1 answer
  • Describe what is meant by the following:
    14·1 answer
  • Which industry has the highest employment figure for both teen and young adults in July, 2014?
    6·1 answer
  • How do i delete an account for brainly how do i delete everything
    7·2 answers
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • Suppose that we are using PDDL to describe facts and actions in a certain world called JUNGLE. In the JUNGLE world there are 4 p
    7·1 answer
  • Which of the following is used to move to end of the row?​
    8·1 answer
  • How many pieces can be connected on to a to an SPS​
    11·1 answer
  • Xavier buys a new laptop for $540. He makes a down payment $75 and pays the rest in 6 equal monthly payments, p. What equation r
    7·1 answer
  • Project manager Kevin has to create a project team organizational chart. Which activity should he perform before creating this c
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!