1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
9

Do a comment if u hate me.or think im d.U.m b. add a answer if u dont care. thank all the asnwers or report for saying i dont ex

ist...
write a comment saying no means you kinda care
Computers and Technology
1 answer:
docker41 [41]3 years ago
6 0

Answer:

i dont know you just wanted points

Explanation:

You might be interested in
Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
mel-nik [20]

Answer:

Kernel

Explanation:

The Kernel is the part of the operating system core which is responsible for controlling security, managing the file system, and providing a platform for applications to run on.

5 0
3 years ago
Which of the following characterizes how an enabled security program might react to a new program installation on a computer sys
sammy [17]

Answer:

<em>It might automatically set a restore point for the computer system</em>

<em></em>

7 0
3 years ago
Read 2 more answers
When should an individual consider entering parenthood?
-BARSIC- [3]
  In my opinion, after marriage. And during the time you're married, be sure you are going to stay with that person a long time because divorces can cause mental health issues towards the child. And if your loved one is abusive, an alcoholic, etc. then you should get out that relationship immediately before having children. Therefore, your children will have a happy, healthy, life. 
5 0
3 years ago
With the Linux operating system, its open source design means it can be used, modified and ______
nadya68 [22]

Answer:

distributed.

Explanation:

Because Linux is released under an open source license, which prevents restrictions on the use of the software, anyone can run, study, modify, and redistribute the source code, or even sell copies of their modified code, as long as they do so under the same license.

3 0
3 years ago
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
Other questions:
  • When you right-click a spreadsheet object, what command should you select to activate the sheet?
    6·2 answers
  • Which if the following is an example of tangible property?
    7·1 answer
  • [15 points] 3.2 Lesson Practice (holy marry mother of joseph)
    7·1 answer
  • What is a left hand door lever?
    13·2 answers
  • What are the best ways to find data within a spreadsheet or database? Check all that apply. sorting tools the help function scro
    11·2 answers
  • Where can i watch twilight breaking Dawn 2 full movie. In the internet where can i wath it for free
    14·1 answer
  • can Results shown at the top of the Google search engine results page (SERP) always get high Needs Met ratings
    10·1 answer
  • Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
    13·1 answer
  • What is a task that is not associated with loading existing data into a new ERP system.
    11·2 answers
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!