1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
10

Choose the type of collection created with each assignment statement

Computers and Technology
1 answer:
Leviafan [203]3 years ago
4 0

Answer:

dictionary

tuple

list

Explanation:

You might be interested in
1<br> Q9. Which tool is used to cancel the<br> action of undo tool ? *
Stels [109]

Answer:

hold down CTRL + Z and it will reverse to the last action

6 0
3 years ago
After a CPU decodes an instruction, what is the next step in the execution cycle?
Nat2105 [25]

Answer: E) The CPU executes the instruction by performing ALU operations.

Explanation: The execution cycle is of three stages namely; fetch, decode and execute. These are the functions that the CPU carries out from the time of boot-up up until it's shut down.

At the fetch stage, the computer retrieves program instructions from its memory register, at the decode stage; the decoders interprets the instructions from the instructions register and then the next stage will be the executions, at this stage; the interpreted instructions are then passed to relevant function units of the CPU to carry out the required instructions.

E.g mathematical and logic functions are passed on the ARITHMETIC AND LOGIC UNIT(ALU) to perform.

8 0
3 years ago
Chip is examining data regarding the age at which people got married. He notices that in a number of cases people were reported
erastova [34]

Answer:

Data Cleaning

Explanation:

According to my research on data management, I can say that based on the information provided within the question what Chip is doing is an example of Data Cleaning. This term refers to the process of finding errors within sets of data and correcting or removing them from the set, or even the database entirely, this includes any data that may be inaccurate to completely wrong.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
Helpppp pleaseee thanksss​
Archy [21]

Answer:

B!

Explanation:

i think... Here is an example

3 0
3 years ago
An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and
Readme [11.4K]

Answer:

a. Install a web application firewall.

Explanation:

In this scenario, an organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users (employees) are provided with a specific set of tools (software applications) installed, which they must use to perform their duties. However, other tools (software applications) are not permitted for compliance and tracking purposes of employees who flouted the rules made by the management. Also, team members are able to access the internet for purposes such as, product lookups and to research customer issues.

In order to keep the team focused on customer issues and minimize distractions, the security engineer should install a web application firewall.

A web application firewall is an application firewall that can be used for monitoring, filtering, blocking or denial of bidirectional packets (http traffics); to and from websites or web applications.

When a web application firewall is properly implemented and configured by the security engineer, it inspects all http traffics and provides adequate protection against cookie poisoning, security misconfigurations, SQL injection, broken authentication, cross-site scripting (XSS), file inclusion, sensitive data leaks, buffer overflow etc.

Basically, the web application firewall primarily prevents an application layer (layer 7 of the OSI model) attacks.

Hence, to fulfil the manager's requirements, the security engineer should install a web application firewall which basically works as a reverse proxy protecting the web server from vulnerabilities or potential attacks.

7 0
3 years ago
Other questions:
  • What will be displayed after the following statements have been executed? int x = 15, y = 26, z = 32; x = x + 12; y = y/6; z -=
    15·1 answer
  • As the European powers grew more industrialized, their colonies became very important as sources of A)slave labor. B)raw materia
    12·2 answers
  • The process of deciding a court case based on the basis of previous decisions is the principle of which of the following?
    10·1 answer
  • What is the answer to in Microsoft Word you can access the blank from the command command from the mini toolbar what is the corr
    10·2 answers
  • In a non-price rationing system, consumers receive goods and services first-come, first served. Give me an example of a time whe
    8·1 answer
  • In a mobile app for computer technicians in a large college, an initial trigger event could be ____.
    7·1 answer
  • If, in a recursive solution, function A calls function B which calls function C, this is called ________ recursion. indirect thr
    6·1 answer
  • Complete the following sentence.
    12·1 answer
  • Write a function that receives a StaticArray and returns an integer that describes whether the array is sorted. The method must
    14·1 answer
  • which two statements about incoming and outgoing interfaces in firewall policies are true? (choose two.)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!