1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
13

Technical term

Computers and Technology
1 answer:
Ivanshal [37]3 years ago
6 0

Answer:

  1. <em><u>We limit the number of queries to the 32 as "portable" in the term (and any subsequent words) was excluded from the investigation</u></em>.
You might be interested in
Jasper and Samantha are in a robotics competition. The guidelines state that the robots should be able to move a 10-gram weight
Inessa [10]

Answer:

evaluating a solution

Explanation:

just did the test :)

4 0
3 years ago
Explain the steps you take to complete an Internet search. Do you use a particular search engine every time or do you alternate?
Naddik [55]
1. Personally, I always use the same search engine, which is Google. I once opened Bing mistakenly, but obviously returned to Google immediately. Google is my preferred choice because I've used it for such a long time that I've gotten so used to it and cannot change it. The other search engines don't look as appealing to me as Google.

2. Some advantages would be definitely the format of the information you get from a search engine as opposed to the metasearch engine - sometimes, the metasearch engine cannot provide you with complete results or even complete sentences, so you may be left with illegible texts. On the other hand, metasearch engines can give you so much more information than regular search engines.

3. If the credentials seem legit, based on particular rules as to how to write sources used (such as Chicago style, APA, etc.), then you can safely assume the source is credible. If the author wrote everything necessary in his text (especially works cited/links available), you can usually trust that source.
5 0
3 years ago
Write down the result of each expression in the output column and specify the datatype of the result.Datatype should follow the
sergiy2304 [10]

Answer:

Kindly check the explanation section.

Explanation:

Below are the expression given in the question and the corresponding output and Datatype.

(1). Expression = 7/2 + 9.2/2.

Output = 7.6, Datatype = double

(2). Expression = 3.4 + 2 5 f.

Output = 5.9, Datatype = double.

(3). Expression = "whale" . Substring (2,5).

Output = "ale" , Datatype = string.

(4). Expression= (int) 9.2 + 6.0 f.

Output = 15.0 f, Datatype = float.

(5). Expression = (2 <= 1) && (5! = 2) || (8 + 5!= 13).

Output = false, Datatype = boolean

(6) Expression =1.5 f == 1.5?.

Output: “false” , Datatype : “true ”

Output = “false”,

Datatype= String.

(7). Expression = “joey”.charAtt(4).

Output = error, Datatype = error“.

(8). Expression = madmax”.

indexOf(“a”) + 7.

Output: 8 , Datatype = int.

(9). Expression = 2 + 3 + “catdog” + 1 + 2.

Output = “5catdog12”, Datatype = String.

(10). Expression = String.format(“%3.3f”,7.89672).

output = “7.897”, datatype = String.

(11). Expression = “captain”.indexOf(“a”, 2).

Output = 4, datatype = int.

(12). true ? ++3: 3++.

Output = error, dataty = error.

(13). Expression = new String[]{“tony”,“josh”}[0].

Output = “tony”, Datatype = String.

(14). Expression = “patrick”.substring(2) +“lucky”.substring(4).

Output = “tricky”, Datatype = String.

(15). Expression = “popFizz”.indexOf(“o”) + 2.4+ 6L.

Output9.4, Datatype = double.

(16). Expression = “pizza”.indexOf(“z”).

Output = 2, Datatype = int.

3 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
software that instructs the computer how to run applications and controls the display/keyboard is known as the what?
Tomtit [17]
<span>The software that instructs the computer how to run applications and controls the display /keyboard is known as DRIVERS software, A driver is a software program that enables a specific hardware device to work with a computers operating system. Drivers may be required for internal components such as video cards and optical media drives.</span>
7 0
3 years ago
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • How can a user begin working with a new, blank workbook in Excel?
    10·1 answer
  • How is an orthographic drawing similar or different from an isometric drawing
    12·1 answer
  • I'm using assembly language. This is my assignment. I kinda confused about how to write code for this assignment. Can anyone exp
    11·1 answer
  • What are the benefits of maintaining you vehicle?
    11·1 answer
  • 1.Can ICTs be innovatively used in the absence of minimum literacy levels among the poor?
    5·1 answer
  • "The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
    13·1 answer
  • How could you use your technology skill and Microsoft Excel to organize, analyze, and compare data to decide if a specific insur
    12·1 answer
  • What is data and information
    9·1 answer
  • We initialize the parameters to all zero values and run the linear perceptron algorithm through these points in a particular ord
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!