1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
3 years ago
8

Pleaseee need help ASAP!! Will mark BRAINLIEST!! :)

Computers and Technology
1 answer:
torisob [31]3 years ago
6 0

Answer:

The correct option is Option B

Explanation:

We need to find examples of client-side code.

Client Side code: The part of code, that doesn't require server for performing specific task

SO, The correct option is Option B

Prompt for special characters in user name

Reason: We can use alert to generate prompt using JavaScript or through validation and it can be done on client side.

All other options, we need to hit the server to perform the task, So they are not client-side code.

You might be interested in
In the table below identify the data type that would be most suitable for the second field
marishachu [46]

Answer:

C.

Explanation:

The second field is Age. Age is expressed as a number so will most likely be stored in a number data type.

6 0
3 years ago
9.1.3: Printing vector elements with a for loop. Write a for loop to print all NUM_VALS elements of vector courseGrades, followi
svlad2 [7]

Answer:

The program to this question as follows:

Program:

#include <iostream> //defining header file

#include <vector> //defining header file

using namespace std;

int main() //defining main method

{

//defining integer variable NUM_VALS and i.    

int NUM_VALS = 4,i;//assign value in NUM_VALS variable

vector<int> courseGrades(NUM_VALS); //defining vector array

cout<<"Input values: "; //print message

for(i=0;i<NUM_VALS;i++) //loop for input value

{

//input value in verctor array    

cin>>courseGrades[i]; //input from user-end

}

for (i = 0; i < NUM_VALS; i++) //loop to print value

{

cout<<courseGrades[i]<< " ";//print value

}

cout << endl;//for new line

for (i = NUM_VALS-1;i >= 0;i--)//loop to print value in reverse order

{

//print value in reverse order

cout << courseGrades[i] << " "; //print value

}

cout << endl; //for new line

return 0;

}

Output:

Input values: 2

3

5

6

2 3 5 6  

6 5 3 2  

Explanation:

In the above-given code two integer variable "NUM_VALS and i" is declared, in which variable "NUM_VALS" assigns a value, that is 4, in the next step, a vector array "courseGrades" is defined, in which we take input from the user end.

  • In the next step two for loop is declared, in the first loop we simply print the value of the "courseGrades".
  • The second loop is also used to print the "courseGrades" value but, in the reverse order.
8 0
3 years ago
In ip address 202.54.15.178, 15.178 is ______ address.
Tpy6a [65]

Answer:

Network address--An IP address with a host portion that is all zeros. Octet--An 8-bit number, 4 of which comprise a 32-bit IP address. They have a range of 00000000-11111111 that correspond to the decimal values 0-255. Packet--A unit of data passed over a TCP/IP network or wide area network.

7 0
2 years ago
Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
Ahat [919]

CAVA’s Academic Integrity Policy refers to Calfornia Virtual Academic’s policy book for students of their schools, which are public charter schools in the state of California.

In the handbook, it is mentioned that students who commit plagiarism will be required to re-submit the assignment during the first offence; will receive a fail grade for the assignment during the second offence; and will be withdrawn from a course or even the school during the third offence.

Thus the answer to the question is (D) all of the above.

8 0
3 years ago
What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
Rufina [12.5K]

Answer:

A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN  encrypts a  frame with its own VPN key.

Explanation:

The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.

7 0
3 years ago
Other questions:
  • Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
    9·1 answer
  • Easy STEAM question :)
    15·2 answers
  • Why is self-esteem important in self-representation
    7·1 answer
  • Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
    6·1 answer
  • Celeste is writing a paper. However, two pages in, her computer shuts down unexpectedly. She never saved her paper, and all her
    12·2 answers
  • A ______ is an exact duplication of the hard drive, including data files, system files, and settings, application files, and the
    15·1 answer
  • I need help, whoever gets it correct will get brainliest
    7·1 answer
  • Please help with this coding question
    8·2 answers
  • What approach do you prefer to take when creating presentations for class projects? Would you rather use software or create pres
    12·2 answers
  • The startup routine runs,when machine boots up is known as​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!