1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
12

Please help will give brainliest

Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
5 0

Answer:

waterfall- google search

Explanation:

You might be interested in
This type of website, supporting collaborative writing, is designed to allow visitors to use their browser to add, edit, or dele
Daniel [21]
It would be Wiki......
8 0
4 years ago
What is the launching of a 3-D map called?
WARRIOR [948]

Answer:

A raised-relief map or terrain model is a three-dimensional representation, usually of terrain, materialized as a physical artifact.

Explanation:

<h2>P I E C K</h2><h2>_______</h2>
8 0
3 years ago
QUESTION 4
Kaylis [27]

Answer: 2, 3, 6, 8

Explanation:

i must tell you something very important.

in LISTS.... the FIRST thing is marked with a 0.

[0, 1, 1, 2, 3, 6, 8, 13, 21, 34]

[0, 1, 2, 3, 4, 5, 6, 7, 8, 9]

do you see how these line up with each other?

the output would be 2, 3, 6, 8

4 0
3 years ago
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
Assume that the "read/write file to hard disk" library is part of the kernel. Assume that this library uses 1MB of RAM. Assume t
scZoUnD [109]

Answer:

The Answer is 1 MB.

Explanation:

In order to replace the library it must write 0 MB to hard drive then only it can be replaced. Therefore 1 MB is the correct answer.

5 0
4 years ago
Other questions:
  • You are going to buy a computer but first you want to do some research to help you select the best model everfi answer
    11·1 answer
  • Under the advanced options screen, what startup option should be enabled in order to view what did and did not load during the b
    12·1 answer
  • Nick won a $1,000 lottery prize. He can't decide what he should spend the money on. For some time now, he has been planning to b
    5·1 answer
  • Who tryna play among us
    8·2 answers
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • Pleaseeeeeeeee I will give a brainliest
    7·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    12·1 answer
  • PLEASE PLEASE HELP pleeeeeeeeeaaaase
    12·2 answers
  • What is the minimum number of different résumé formats that an individual should have prepared?
    10·1 answer
  • Functions are used to reuse the codes number of times in program
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!