1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
13

Lesson 2.7 Code Practice #2

Computers and Technology
1 answer:
scoundrel [369]3 years ago
5 0

Answer:

no se ve unu ........unu

You might be interested in
_____ interviews rely on scenarios and reflections to evaluate an applicant’s skill set.
ra1l [238]
I think its behavioral
4 0
3 years ago
Read 2 more answers
20 POINTS!!! I NEED HELPP
Cloud [144]

Answer:

Apple

Explanation:

5 0
3 years ago
Read 2 more answers
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
What would happen if you clicked on the Show Desktop icon on your computer screen? The system tray would appear. All open window
Sholpan [36]
<span> All open windows would be minimized</span>
7 0
3 years ago
Read 2 more answers
What are some other features of sending attachments in Outlook 2016? Check all that apply.
Elis [28]

Answer:

the answer is a, b,d on edg.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Select the correct answer.
    15·1 answer
  • What is an apprenticeship
    7·1 answer
  • Im being timed please help!!
    7·2 answers
  • To save and store data separate from a computer, it helps to have an
    15·2 answers
  • You have developed a prototype of a software system and your manager is very impressed by it. She proposes that it should be put
    5·1 answer
  • Finding information on the Web is easy thanks to _____________, which provide on-screen menus, making navigation of the web as s
    11·1 answer
  • the increase and decrease font button and the change text colour button (as shown in the picture )are include in which group ?​
    6·1 answer
  • In a PC, which of the following components stores the BIOS
    6·1 answer
  • Uh can somebody help me
    6·1 answer
  • Social media first became popular due to which development?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!