1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
2 years ago
10

What do you call a collection of pre-programmed commands and functions used in programs?

Computers and Technology
1 answer:
densk [106]2 years ago
5 0
The answer is number 3.libary
You might be interested in
Which of these is not a feature of a CPU?<br><br>Multicore<br>64-Bit Processing<br>L1 Cache<br>DDR
Triss [41]

Answer:

DDR

Explanation:

DDR is a feature of memory. It means a double data rate and is a more sophisticated version of the SDRAM, which is a memory. And the rest like the Multicore, 64-bit processing, and the L1 cache are the features of the CPU. And hence, the correct option here is none other than DDR. Remember that the L1 cache is the memory bank, which is being built over the CPU chip. And we have 32 bit and 64-bit processing for the CPU. As well as CPU can be dual-core, quad-core and likewise.

4 0
3 years ago
Read 2 more answers
EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
Bond [772]

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

7 0
3 years ago
Match the network topology to its description. 1. bus data is certain to reach its destination 2. mesh no danger of data collisi
Ilya [14]

Answer:

3,1,2

Explanation:

6 0
2 years ago
Pls help!!!!!!!!!!!!
son4ous [18]

Answer:

i am 100% sure it is (B)

Explanation:

To delete offensive or irrelevant posts  

5 0
3 years ago
I - For any two points on the Internet, there exists only one path between the two points II - Routing on the Internet is fault
sukhopar [10]

Answer:

I - False

II -True

Explanation:

For any communication between two points on the Internet, routing is to choose an optimum path.

But routing is also fault tolerant and redundant, which means that there are <em>alternative</em> paths to deal with possible problems and provide security during transmission.

4 0
3 years ago
Other questions:
  • 7.8.1: Function pass by reference: Transforming coordinates. Define a function CoordTransform() that transforms the function's f
    6·1 answer
  • Which presentation software element can you use to create a model diagram with two concentric circles inside a triangle?
    10·2 answers
  • The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
    8·1 answer
  • System requirements that are important in determining if a software program will work on a computer are ____.
    8·1 answer
  • What are you required to verify before allowing a person to operate your pwc?
    8·1 answer
  • )In a graph represented by adjacency matrix u can find all the neighbours of a given vertices in ____Operations
    6·1 answer
  • Therapeutic services pays less than most other careers.<br><br><br> 1) True<br> 2) False
    12·2 answers
  • Pls help me<br> first one to answer correctly gets brainly points
    6·2 answers
  • Point giveaway and brainliest
    7·2 answers
  • The term for an operator that may not evaluate one of its subexpressions is
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!