1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
3 years ago
13

Hey, can anyone please help me?

Computers and Technology
1 answer:
Serhud [2]3 years ago
7 0

Answer:

i think the answer is b not sure tho

Explanation:

mb for being rly late lol hopefully this helps :)

You might be interested in
Women make up 52 percent of the voting-age population and are more likely to vote, yet
NeX [460]
<span>Gender discrimination has been a prevalent issue that prevented a century of women not to participate.

Discrimination has become widespread nowadays ranging from gender discrimination, racial discrimination, work discrimination and many others.These types of discrimination are experienced by almost all people everyday without them even knowing it. Some discrimination lies behind a sweet smile and an accommodating eyes and in order to defend yourself against this discrimination you need to load up yourself of a lot of self confidence.</span>
3 0
3 years ago
Read 2 more answers
You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to
lions [1.4K]

Answer:

A Phishing Attack

Explanation:

The term "phishing" comes from the combination of the English term "fishing", which means to fish, with the term "phreak", often used to name the first telephony hackers.

It is a type of scam that uses technological mechanisms, usually based on messages, to persuade and deceive people, with a specific objective, which varies from attack to attack.

For example, sending you an email message with a link like a popular social media platform which is meant to trick you into submitting your login details thereby hacking into your account from the hacker's remote location.

3 0
3 years ago
Read 2 more answers
JAVA
musickatia [10]

Answer:

class Main {  

 public static void main(String args[]) {

   int a = 5;

   int delta = 5;

   for(int i=0; i<10; i++) {

       System.out.printf("%d, ", a);

       a += delta;

       delta += 2;

   }

 }

}

6 0
3 years ago
A/an<br> controls the flow of data between a computer and the network.
strojnjashka [21]

Answer:

The NIC (Network Interface Card)  is the computer network component that controls the flow of data between a computer and the network.

Explanation:

5 0
3 years ago
To execute a prepared SQL statement, you can use the _______ and execute methods of the PDOStatement object to set parameter val
goldenfox [79]

Answer:

To execute a prepared SQL statement, you can use the bindValue

Explanation:

In PHP, the bindValue () function is inbuilt and can be used to bind values and variables to a parameter, hence it is more versatile. In SQL, the bindValue () function ties value to question mark placeholder or corresponding named in order to adequately get the statement ready.

7 0
3 years ago
Other questions:
  • Type the correct answer in the box.
    7·1 answer
  • Each​ _____ in a relational database table is a unique record of something that users want to track.
    14·1 answer
  • How do you represent the decimal integer 50 in binary?
    14·1 answer
  • In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism b
    7·1 answer
  • How many license plates are there if a license plate contains 3 letters from the 26 available in the English alphabet followed b
    15·1 answer
  • Llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
    7·1 answer
  • What is the default return type of a method in Java language?
    9·2 answers
  • Identifying the Property for Setting Page Breaks
    8·1 answer
  • An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.
    9·1 answer
  • 2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!