1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
13

Im Gonna Give Brainly a Second Chance Everybody deserves a second chance

Computers and Technology
2 answers:
Nady [450]3 years ago
7 0

Answer:

ok I know it's not for me but for who?

Explanation:

Just asking. And yes everyone deserves a second chance. Even liars?

please don't take my question wrongly have an above average day!

frosja888 [35]3 years ago
5 0

Explanation:

Thanks but i have a question why u are on brainly

You might be interested in
The development methodology where each part of a project is done in order after each other is called:
Oksanka [162]

Bruh this a duplicate

8 0
3 years ago
What is an example of a situation in which you might use the append method? In what ways is the append method limited?
Oksanka [162]
If I had an array of the names of people who just walked in the door. I’d append the name of the person who came in next. To update the array.

The append method needs to be looped through to add multiple inputs
5 0
3 years ago
What are the basic problem that my pc can have?
Lena [83]
A virus, malware, unplugged, used too much storage, etc.
5 0
3 years ago
Does chell in portal SAY a single word
musickatia [10]

Answer:No

Explanation:Chel was supposed to say hi at the end of portal 2 but didn’t cuz of portal jumping

5 0
3 years ago
Which of the following are ways a vote thief could cast multiple votes in an online election? (check all that apply)
saveliy_v [14]

Answer:

All of the given options apply and are correct.          

Explanation:

a) The first option is correct because the intruder can use denial-of-service attack and by flooding the site with traffic to get the voter server unavailable. Then he can direct the voters to a fraud vote server.

b) The second options correctly applies too because the thief also buys the pass codes from the people who want to sell their right to vote and this way the thief can purchase multiple pass code and cast multiple votes.

c) The hackers can set up fake vote servers and then direct the voters to these servers or websites in order to collect pass codes of voters. These pass codes can then be misused by the thief to cast multiple votes in an online election.

d) Social engineering techniques can also be used to get pass codes from certain voters. By manipulating the targeted voters psychologically they can get their pass codes to cast multiple votes illegally.

3 0
3 years ago
Other questions:
  • How many bits do you need to count up to 30 help please
    14·1 answer
  • Which of the following rules should be used to keep the appropriate distance between your vehicle and the vehicle in front of yo
    10·2 answers
  • A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
    10·1 answer
  • When might be the best time to start saving for retirement?
    11·2 answers
  • When you print ____, the presentation is printed with one or more slides on each piece of paper?
    11·1 answer
  • You just bought a hard drive, you plan on using this a secondary storage, once installed, what needs to be done to the drive and
    6·1 answer
  • #Write a function called hide_and_seek. The function should #have no parameters and return no value; instead, when #called, it s
    7·1 answer
  • How to get fast frontend development online job as a beginner?​
    11·1 answer
  • What is the effect of flattening layers in image editing?
    14·2 answers
  • What are the different types of computer operating systems?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!