1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
6

Which of the following is NOT one of the three main ways to control a program when writing code?

Computers and Technology
2 answers:
Karo-lina-s [1.5K]3 years ago
5 0
B. Derivative (Sorry If It’s Wrong)
Klio2033 [76]3 years ago
5 0
The answer would be Derivative. I’ve never heard of derivate programming
You might be interested in
What did Stalin hope the Western powers would do because of the blockade?​
Elodia [21]

Answer:

Stalin's plan was to cut western Germany off from its capital

Explanation:

Stalin's plan was to cut western Germany off from its capital so that the new government, based in Berlin, could not control its territory in western Germany. He hoped that this would prove that a divided Germany would not work in practice.

6 0
3 years ago
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
What letter names the drive where windows most commonly stores data and programs?
Jobisdone [24]

Windows holds most of its data in the C: drive

5 0
3 years ago
Is it important to study information systems
Reil [10]

Answer:

There is massive importance if you want to study information study.

It can help you understand the data, organize, and process the data, using which we can generate and share information.

Explanation:

It largely depends on your interest and requirement, but a better knowledge or clue about information systems may help analyze the data especially if you want to become a data scientist, machine learning, Artificial intelligence or deep learning, etc.

It can help you understand the data, organize, and process the data, using which we can generate and share information.

A great understanding of information systems may exponentially increase the productivity, growth, performance, and profit of the company.

Most Professions get exposed to information Systems no matter what their career objective is, as it may help in having better decision making based on the information they get through data.

So, yes!

There is a massive importance if you want to study information study.

3 0
3 years ago
Create a high-level plan to perform a gap analysis for Fullsoft Inc
mario62 [17]
It’s a Yes you’re right and I did this same question
7 0
3 years ago
Other questions:
  • Which of the following formats can algorithms NOT be written in:
    13·1 answer
  • How would I view the ruler on my document if it was not visible
    9·1 answer
  • Which of the operating systems listed below is not proprietary?
    8·1 answer
  • Which option allows you to view slides on the full computer screen?
    11·1 answer
  • What is a specific naming convention important in regards to your file management system<br> ?
    7·1 answer
  • If a memory reference takes 100 nanoseconds, how long does a paged memory reference take?
    6·1 answer
  • Complete the procedure for adding a contact by selecting the correct term from each drop-down menu.
    10·1 answer
  • These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by th
    9·1 answer
  • Video texted are an example of multimedia because<br>​
    6·1 answer
  • Create a new class MyArray_DE and copy and paste the previous program. Be sure to rename the class to MyArray_DE. Modify the pro
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!