1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanya [424]
3 years ago
14

When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web

site?

Computers and Technology
1 answer:
Tanzania [10]3 years ago
8 0

you should not hack it is bad

You might be interested in
Propose a data structure that supports the stack push and pop operations and a third operation findMin, which returns the smalle
juin [17]

Answer: attached below

Explanation:

3 0
3 years ago
From the binary search algorithm, it follows that every iteration of the while loop cuts the size of the search list by half.
Colt1911 [192]

Answer:

True: In binary search algorithm, we follow the below steps sequentially:

Input: A sorted array  B[1,2,...n] of n items and one item x to be searched.

Output: The index of x in B if exists in B, 0 otherwise.

  1. low=1
  2. high=n
  3. while( low < high )
  4.  {      mid=low + (high-low)/2
  5.         if( B[mid]==x)
  6.          {
  7.             return(mid)  //returns mid as the index of x
  8.           }
  9.          else
  10.          {
  11.              if( B[mid] < x)      //takes only right half of the array
  12.               {
  13.                 low=mid+1
  14.               }
  15.              else               // takes only the left half of the array
  16.               {
  17.                high=mid-1
  18.               }
  19.           }
  20.  }
  21. return( 0 )

Explanation:

For each iteration the line number 11 or line number 15 will be executed.

Both lines, cut the array size to half of it and takes as the input for next iteration.

6 0
3 years ago
How do I write my name in binary code?
Galina-37 [17]

Answer:

qUE

wHAT CODE

Explanation:

4 0
3 years ago
Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message? Thi
ad-work [718]

Answer:

This is a notification message for a normal but significant condition

Explanation:

Syslog represents the standard for logging message, it sends messages through UDP port 514. Familiar syslog facilities includes IP, OSPF protocols, etc. The messages from syslog are both about facility and level.

A syslog server is a means through which network devices sends messages about events into a logging server which is called syslog server. Since a syslog protocol supports so many devices, it can also be used to log a good number of events.

8 0
3 years ago
Read 2 more answers
What does "bbl" mean? my friend uses text slang all the time and i can never understand it unless it's lol.? please help!
Mariana [72]
<span>It means be back later :)</span>
5 0
3 years ago
Other questions:
  • _____ provide the standards, syntax, statements, and instructions for writing computer software
    14·1 answer
  • Exterior brick veneers are used to support the entire weight of the roof structure
    12·2 answers
  • Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeopl
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • Where should Nolan go to change the font size of his message before printing it? A.the Paper tab in the Define Styles dialog box
    14·1 answer
  • This type of technology does not come with a keyboard or mouse for input
    11·2 answers
  • After reading passage “the incredible machine” why do you think the article has been titled so?
    13·1 answer
  • State 3 file formats explain them in an understanding manner apart from Microsoft word and PDF
    5·1 answer
  • In terms of object-oriented programming, after a class is defined,
    11·1 answer
  • What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!