1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
5

Ashton assigned a string value to a variable. Which program statement should he use?

Computers and Technology
1 answer:
m_a_m_a [10]3 years ago
6 0

Answer: c because there cant be numbers or simboles also nooooooo spaces

Explanation:

brainlyist plz

You might be interested in
How will wireless information appliances and services affect the business use of the Internet and the Web? Explain.
Paraphin [41]

Answer:

wireless information appliances and services affect the business use of the internet and the web in a positive way. Wireless information appliances and services affect the business use of the web and internet by allowing internet pretty much anywhere. Now days devices like cell phones can access almost everything a regular computer can access. The use of wireless information allows businesses to stay in constant contact with customers, employees, and suppliers.

3 0
3 years ago
What are the possible consequences of invasion of privacy?
Sergio039 [100]
Jail time since you can be considered a spy or a perv. Whatever you aim is of course.
7 0
3 years ago
Todd, a manager at Dexter Manufacturing, has received a grievance filed by a group of his subordinates who are union members. Wh
romanna [79]

Answer:

B. The employees contact the labor union arbitrator, who then sends an e-mail to Todd.

Explanation

Todd, 5he manager has just received a grievance filed by his subordinates who are union members because of a dispute.

A grievance can be filed when there is dissatisfaction at work, or anger at policy or something else that is a work related grievance.

The likeliest scenario for escalating their dissatisfaction to their employee would be to present their grievance through their union arbitrator who is charged with protecting the work interests of its union members.

This is necessary because the employer knows the anger of the employees and dialogue can take place.

7 0
3 years ago
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
3 years ago
Managers can use __ software to discuss financial performance with the help of slides and charts
Natali5045456 [20]

Answer:

presentation

Explanation:

Software like Google Slides and Microsoft Powerpoint can be utilized to present financial performances through the use of slides and charts.

6 0
3 years ago
Other questions:
  • Raymond has to send a number of large documents to his charterer accountant for filing his taxes. Which email etiquette should R
    15·2 answers
  • how do you define technological world is a easier way for this low iq girl to understand its for my essay pls help me im about t
    15·1 answer
  • Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
    13·1 answer
  • Which one of the following items is an example of software?
    12·2 answers
  • When you're working with a word processing document and you press the del key, what happens?
    6·2 answers
  • Which of the following statements is true about a file stream?
    5·1 answer
  • Which app or website teaches java and phyton
    15·1 answer
  • ((11111111-1011100) X (10100 / 10))- ( 110010000+ 1110011)
    14·1 answer
  • Which part of the brain controls the movement of muscles​
    6·1 answer
  • Which of the following is NOT a career in the Information Support and Services pathway?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!