1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
3 years ago
15

Which line of code in this program is MOST likely to result in an error

Computers and Technology
2 answers:
rjkz [21]3 years ago
7 0

Answer:

What are the choices?

Explanation:

ch4aika [34]3 years ago
4 0

Answer:

line 2 it needs quotation marks :D

Explanation:

You might be interested in
Connect research concepts to their definitions
stellarik [79]
Answer Research is defined as the creation of new knowledge and/or the use of existing knowledge in a new and creative way so as to generate new concepts, methodologies and understandings
8 0
2 years ago
Which security measure provides protection from IP spoofing?
anyanavicka [17]

Answer:

An SSL also provides protection from IP spoofing.

8 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
what do you do if someone you really love reads your message and doesnt reply? do I text them again or just ignore it?
crimeas [40]
If you really love someone and you text them but they don't text you back. You let it go because they aren't interested. I am sorry for saying that, but it could also mean that they are doing something at the moment and can't text back. I say, give it a day and if they don't text back, don't bother texting back.

3 0
3 years ago
Use the_____icon to insert a new record.<br><br> A. *<br> B. X<br> C. =<br> D. &amp;
morpeh [17]

Answer:

i think the answer is point C

8 0
3 years ago
Other questions:
  • You have inserted new slides based on a Word outline. How do you format these new slides to match the PowerPoint presentation fo
    9·2 answers
  • Select the correct answer from the drop-down menu. Which two technologies support the building of single-page applications? and
    11·1 answer
  • Use the STL class vector to write a C function that returns true if there are two elements of the vector for which their product
    14·1 answer
  • Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial
    5·1 answer
  • How ssd is better than normal sata and pata HDD​
    11·1 answer
  • Write some positive and negative impacts of computer in our daily life​
    5·1 answer
  • What was the strategy the company adopted for ERP implementation?
    12·1 answer
  • How are computers classified into different types? Explain ​
    6·1 answer
  • 13. You're doing research for a paper. When would you use an indirect citation?
    12·1 answer
  • A(n) ____ is a live internet presentation that supports interactive communications between the presenter and the audience.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!