1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
12

Gn guys have an Amazing day!

Computers and Technology
2 answers:
Tema [17]3 years ago
8 0
Brainliest please bc you are very awesome
Viktor [21]3 years ago
4 0

what???

just admit it

You might be interested in
Which type of software is created on user dimension​
Ratling [72]

Answer:

Application and system software is created on user dimension.

6 0
2 years ago
What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functio
serg [7]

Answer: Protocol

Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.

This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.

5 0
3 years ago
The user interface contains two types of user input controls: TextInput, which accepts all characters and Numeric Input, which a
Shtirlitz [24]

Answer:

Explanation:

public class Main

{

private static String val; //current val

public static class TextInput

{

public TextInput()

{

val= new String();

}

public void add(char c)

{

if(val.length()==0)

{

val=Character.toString(c);

}

else

{

val=val+c;

}

}

public String getvalue()

{

return val;

}

}

public static class NumericInput extends TextInput

{

Override

public void add(char c)

{

if(Character.isDigit(c))

{

//if character is numeric

if(val.length()==0)

{

val=Character.toString(c);

}

else

{

val=val+c;

}

}

}

}

public static void main(String[] args)

{

TextInput input = new NumericInput();

input.add('1');

input.add('a');

input.add('0');

System.out.println(input.getvalue());

}

}

4 0
2 years ago
Mila received a new DVD player that she is trying to connect to the back of her television by feel alone. The first stage of mem
irga5000 [103]

Answer:

The options for this question are the following:

a. iconic sensory memory

b. haptic sensory memory

c. short-term memory

d. long-term memory

The correct answer is b. haptic sensory memory.

Explanation:

Haptic memory has a capacity of 4 or 5 items, such as the iconic one, although the footprint is maintained for a longer time, about 8 seconds in this case. This type of sensory memory allows us to examine objects by touch and interact with them, for example to pick them up or move them properly.

It is believed that there are two subsystems that make up the haptic memory. On the one hand we find the cutaneous system, which detects the stimulation of the skin, and on the other the proprioceptive or kinesthetic, related to muscles, tendons and joints. It is appropriate to distinguish proprioception from interoception, which involves internal organs.

Haptic memory has been defined more recently than iconic and echoic, so that the scientific evidence available around this type of sensory memory is more limited than those that exist on the other two we have described.

Haptic memory depends on the somatosensory cortex, especially on regions located in the upper parietal lobe, which store tactile information. Likewise, the prefrontal cortex, fundamental for movement planning, also seems involved in this function.

5 0
3 years ago
A(n)_________ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its c
sertanlavr [38]

Answer:

LDAP Injection Attack

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being described in the question is called an LDAP Injection Attack. Like mentioned in the question LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Other questions:
  • Ben uses a table that has few columns. He knows about a particular value in the first column and wants to find the corresponding
    8·2 answers
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    8·1 answer
  • How do you change exposure to allow for greater DoF
    10·1 answer
  • A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibili
    5·1 answer
  • Is it necessary that every autonomous system use the same intra-AS routing algorithm? Why or why not?
    10·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Suddenly, though, just as the procedure was about to be relayed to the astronauts, the pressure . . . the temperature . . . drop
    5·2 answers
  • 50 points! ㅠㅠ does anyone speak korean or watch korean animes? 안녕 ㅋㅋ ㅇㅅㅇ How do people make animationsss.
    8·2 answers
  • Place the steps in order for creating a Custom Search Folder in Outlook 2016.
    9·2 answers
  • What can you use to make sure that you have no errors in Word Online?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!