1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
2 years ago
14

Cleo is new to object oriented programming. which type of action can be taken on on object?

Computers and Technology
2 answers:
Mrac [35]2 years ago
6 0
I’m sure it is method
pickupchik [31]2 years ago
4 0

Answer:

method

Explanation:

You might be interested in
How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?
Helen [10]
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

3 0
3 years ago
Read 2 more answers
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
Given an int variable n that has already been declared and initialized to a positive value , and another int variable j that has
Ugo [173]
While( n )  /*when n == 0, will fail*/
{
   putchar( '*' );  /*effectively print asterick*/
   n--;    /*post-decrement n*/
}
8 0
2 years ago
What occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely t
Luden [163]

Answer: Personalization

Explanation: Personalization technique in the websites is approach towards any individual in which he/she can describe their like or dislike and gets to know about the user's need by which they search for any particular fashion, their history of search etc.In this the person displays their liking and the websites starts to display those content which are appealing to the particular user.

5 0
2 years ago
Jason wants to add an animated image to his baseball team's web page. Which file format should he use?
Ksju [112]

Answer:

Gif

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • The most popular transmission media option for wired home ethernet networks is ________ cable. fiber-optic power-line unshielded
    15·1 answer
  • Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
    8·1 answer
  • Based on the Standards, the statement, "Competition for computer time during periods of high demand had become intense because o
    8·1 answer
  • Plagiarism occurs when writers
    14·2 answers
  • How can I change it to accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg on Inkscape?
    15·2 answers
  • Some web and mobile applications allow users to share pictures and videos, as well as chat and message. True False
    5·2 answers
  • What refrigerant has been approved for new household refrigerators and freezers
    14·1 answer
  • Which of the following is most likely to be considered plagiarism? a. Intentionally reporting the results of inaccurate statisti
    11·1 answer
  • In 1980, IBM's cheapest computer was more affordable than Apple's.<br><br><br> True<br><br> False
    10·1 answer
  • What was the strategy the company adopted for ERP implementation?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!