1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
4 years ago
5

What to take for ptsd

Computers and Technology
2 answers:
REY [17]4 years ago
6 0
Dank memes and medicine
Svetllana [295]4 years ago
3 0

Answer:

prazosin is my current pill for sexual assault nightmares so it might help

Explanation:

You might be interested in
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
Which security measure provides protection from IP spoofing?
anyanavicka [17]

Answer:

An SSL also provides protection from IP spoofing.

8 0
3 years ago
What are the importance of computer in today's generation​
MariettaO [177]

Answer:

We use it everyday for all sorts of stuff

Explanation:

8 0
3 years ago
PLEASE HELP ME!!!!!!!
vitfil [10]
It is probably a hyperlink, but it could be an action.
5 0
4 years ago
Read 2 more answers
2. What is the name for an action performed by the VR Robot?
pychu [463]
Parameter is the answer you wanted
4 0
3 years ago
Read 2 more answers
Other questions:
  • Convert the following binary numbers to decimal numbers. (Show your work) a. 110110 b. 100111 c. 101101
    6·1 answer
  • If needed, you can pull over on the shoulder of the freeway to take a break if you are tired. true or false (drivers ed) need as
    11·1 answer
  • What is the advantage of defining a target user?
    6·1 answer
  • What your computer can do to you?
    14·2 answers
  • Write a program that reads in the following data, all entered on one line with at least one space separating them: a) an integer
    13·1 answer
  • It is possible to turn extrinsic factors into intrinsic motivators. true or false
    5·2 answers
  • How to delete the last element in array
    15·1 answer
  • E) Point out the errors( if any) and correct them:-
    14·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • Need some help writing a simple PYTHON Student registration program:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!