1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
2 years ago
13

. Many contemporary languages allow two kinds of comments: one in

Computers and Technology
1 answer:
larisa [96]2 years ago
7 0
Shabaka. Ajswvansja nakash a slaps alpaca sma sharkskin a jab .
You might be interested in
What pointer appears when pointing to a hyperlink
Leokris [45]
Your answer would be: a hand pointer.
6 0
3 years ago
Read 2 more answers
Write C++
crimeas [40]

Answer:

u can see the answer in this picture

5 0
2 years ago
Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp
laiz [17]

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


3 0
2 years ago
Read 2 more answers
The Soviet Union's satellite nations were united under (the) _____.
Softa [21]
The Warsaw Pact.
--------------------------
8 0
3 years ago
Read 2 more answers
Write the ARMv8 instructions for the following c code. Assume that the argumentsare stored in X0 onward in the order they are pr
klio [65]

Answer:

labelAdd:

add x0, x0, x1

mov pc, lr

Explanation:

  • Create a method called labelAdd.
  • Store the result in x0 by adding the value in the registers x0, x1.
  • Return to caller.
3 0
2 years ago
Other questions:
  • Where is the risk of someone intercepting another person’s online activity the greatest?
    11·1 answer
  • Which one cost more Broken bones or a Broken Computer? Explian ur answer
    12·2 answers
  • Can you help me correct a sentence?
    13·1 answer
  • _ effects determine how slide elements disappear
    11·1 answer
  • What is a 'balanced' dfd?
    5·1 answer
  • What is a data broker?
    6·1 answer
  • 3. The term integration refers to the ability to
    6·1 answer
  • Machu Picchu is located in modern day _______<br><br>​
    14·2 answers
  • A large software development company employs 100 computer programmers. Of them, 45 areproficient in Java, 30 in C, 20 in Python,
    9·1 answer
  • Need help with this, will give brainliest
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!