1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
3 years ago
10

I'm showing my friends brainly. Answer with anything so they can see how fast I can get answers.

Computers and Technology
2 answers:
katrin [286]3 years ago
8 0

Answer:

really fast

Explanation:

Hi everyone

masya89 [10]3 years ago
5 0

Answer:

yoo and people get answer pretty fast

Explanation:

You might be interested in
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,
balandron [24]

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
5 0
3 years ago
Read 2 more answers
Can you help me solve this challenging activity?
diamong [38]

Answer:

user_age = int(input())

if user_age > 17 and user_age != 25:

   print("Eligible")

else:

   print("Not eligible")

Explanation:

3 0
2 years ago
With _____, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data
Ket [755]

Answer:

D) Unsupervised Data mining

Explanation:

Unsupervised data mining also refered to as undirected data mining reveals hidden patterns in unlabeled data. In this method, there are no output variables to predict. The aim of an unsupervised data mining technique is to uncover patterns in data based on the relationship between the data points and each other

5 0
3 years ago
Yes, because it allows many users to get together and work to help project their services.
gregori [183]
Whats the question lmaoooooooooooooooooooooo
7 0
3 years ago
Write the name of the tab, command group, and icon you need to use to access the borders and shading dialog box.
Ilia_Sergeevich [38]

Answer:

Tab: Home Tab

Command group: Paragraph

Icon: Triangle

Explanation:

7 0
3 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • Checking the ___________ will reduce the possibility of having to rebuild or replace the engine.
    9·2 answers
  • What is the most recognized and widely used database of published nursing practice literature?
    15·1 answer
  • A function may return a pointer, but the programmer must ensure that the pointer:
    14·1 answer
  • ) What is the ""Phantom Inspector""? (
    12·1 answer
  • Which command button contains the following sub options as given in the picture?
    6·2 answers
  • I have lost the watch (that,which) you gave me​
    12·1 answer
  • Write the Q basic program to find the area of room.​
    10·1 answer
  • A Product Manager has been given responsibility for overseeing the development of a new software application that will be deploy
    5·1 answer
  • Which of the following statements is true about the code used for software development?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!