1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
2 years ago
10

Nnbnnb dfhhfhfbhfbhdffd ddbhfbhdhfbhdhf hhffudjbfbjkd dbhdfbhbfhdb

Computers and Technology
1 answer:
saveliy_v [14]2 years ago
6 0
Tahheuend
Thatgeheh
Thahyateg
Fascinating
:)
You might be interested in
. Why is it important to use Social Media responsibly? ANSWER NOW!!!
Alenkinab [10]

Answer:

Why is social media important? Social media is important because it allows you to reach, nurture, and engage with your target audience — no matter their location. When a business can use social media to connect with its audience, it can use social media to generate brand awareness, leads, sales, and revenue.

5 0
2 years ago
Read 2 more answers
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
Stages of reverse engineering
ivann1987 [24]

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:

5 0
2 years ago
In java write a program:A contact list is a place where you can store a specific contact with other associated information such
BigorU [14]

Answer:

import java.util.Scanner;

public class ContactInformation

{

public static String GetPhoneNumber(String[] nameVec, String[] phoneNumberVec, String contactName, int arraySize)  

{  

for(int i=0;i<arraySize;i++)

{

if(nameVec[i].equals(contactName))  

return phoneNumberVec[i];

}  

return "Contact doesn't exists!";

}

public static void main(String[] args)

{

int records;

Scanner sc = new Scanner(System.in);

System.out.print("Enter the size of contact List :");

records=sc.nextInt();

String[] contactNameList=new String[records];

String[] phoneNumberList=new String[records];

String contactName;

System.out.println("Enter the contact name and phone number :");

for(int i=0;i<contactNameList.length;i++)

{  

contactNameList[i]=sc.next();  

phoneNumberList[i]=sc.next();  

}  

System.out.println("Enter the name of the contact to be searched :");  

contactName=sc.next();

System.out.println(GetPhoneNumber(contactNameList,phoneNumberList,contactName,records));  

}  

}

Explanation:

In the following the function defined above for getting the contact

number on the basis of contact number provided we are checking the contact name list if we are able to find the contact name and if we did we return the contact number on the same index from the contact number list

which we found in the contact name list.

4 0
3 years ago
What has global css rulesets of an angular 8 project mcq.
love history [14]

In order to conserve the angular momentum, Angular speed (w) often increases. The 'none of the above' option has global CSS rulesets of an angular 8 project mcq.

  • The angular momentum of a rigid object is known as the product of the moment of inertia and the angular velocity.

Angular speed is described as how quickly an object rotates. it is seen as the change in the angle of the object per unit of time.

See full question below

What has global CSS rulesets of an angular 8 project mcq.

A. e2e

B. None of the above

C. App

D. node_modules

Learn more from

brainly.com/question/24336703

7 0
2 years ago
Other questions:
  • In what year did commercial use of the Internet become available? 1991 1996 1999 2001
    9·1 answer
  • What is the top folder of the file tree called
    5·2 answers
  • Which of the following best define grit
    13·1 answer
  • Write a method called printRange that accepts two integers as arguments and prints the sequence of numbers between the two argum
    6·1 answer
  • How do I make my own extension for chrome?
    7·1 answer
  • 22
    15·1 answer
  • Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correc
    9·2 answers
  • A circle surrounding the earth at the equator would consist of ___________ “degrees” of angular measurement.
    15·1 answer
  • You are sending Secret information to a colleague located at another office. You want to give him some background information an
    15·1 answer
  • 1. The NetworkManager or Systemd Networkd components must be installed on a Linux system in order to configure an IP address on
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!