1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
3 years ago
15

Which programming language uses objects? C++ ALGOL Pascal BASIC

Computers and Technology
2 answers:
svetlana [45]3 years ago
7 0

Answer:

C++

Explanation:

I am a c++ dev

Effectus [21]3 years ago
4 0

Answer:

its A

C++

Explanation:

Youre amazing

You might be interested in
A document may wordwrap differently depending on the type of printer being used.
Naddika [18.5K]

I believe the answer is true :)

7 0
4 years ago
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
klasskru [66]

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

7 0
3 years ago
As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 employees who work fro
Strike441 [17]

Answer:

To provide remote network access to the users to work, the network administrator can use virtual private network (VPN) along with some firewall to protect the system from hackers and other security threats.

Explanation:

Virtual Private Network (VPN) can be used to provide remote access to the users who are currently working from some remote areas. Many companies who have their branches or franchises in different parts of the city uses VPN to connect then all with the company server.

In this way, a firewall has been needed that protect the systems of users as well as company to protect from different security hazards such as hackers, authorization of the users and other security threats.

in this case, 12 em[employees who need remote access to the network can be connected through VPN along with the installation of some suitable firewall.

8 0
4 years ago
What should you do if a dialog box covers an area of the screen that you need to see?
KatRina [158]

Hm ok, so a dialog box is in the way it may just be as simple as zooming out if it is on a internet browser. The first picture below shows you how to do it on chrome,and the second picture on how to on Mozilla Firefox.

Both of these areas are found in the upper right corner of your internet browser, but <u>if I didn't answer this question the way you need it answered let me know!</u> I can edit and revise for whatever device or system you need me to, for a short period of time before the question locks.

Thanks!

5 0
4 years ago
Read 2 more answers
Which of the following conditions will maximize the amount of interest you earn
choli [55]
The answer is the amount of money you put in it, brainliest please.
4 0
3 years ago
Other questions:
  • What is the device that allows users to manipulate data by controlling an onscreen pointer
    5·2 answers
  • What is a locally stored url, or the address of a file or internet page saved as a shortcut?
    10·1 answer
  • C. to which cache block will the memory address 0x000063fa map
    14·1 answer
  • _____ refers to the physical components used to collect, store, organize, and process data and to distribute information
    7·1 answer
  • What is considered Tim Berners-Lee's greatest contribution to the World Wide Web?
    5·1 answer
  • You want to write a Python program to compute the average of three integer quiz grades for a single student. Decide what variabl
    8·1 answer
  • What Is entered into the system as input?
    13·1 answer
  • How does Accenture help companies harness the power of data to achieve optimal business outcomes?
    9·2 answers
  • Consider a k=8 block cipher.
    10·1 answer
  • What are the two protocols used most often with iot devices? (select two. )
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!