1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
9

What is modularity?

Computers and Technology
1 answer:
My name is Ann [436]3 years ago
8 0

Answer:

Option D

Explanation:

Modularity in general defines the flexibility of a system. It is the degree to which a system can be broken down into smaller segments and then rearranged or recombines into new groups. Modularity is determined for multiple disciplines each having their own drawbacks.

You might be interested in
Make a list of any four computer that were used in the history of computer.​
blondinia [14]

Answer:

ENIAC, UNIVAC, EDVAC and IMB 1401 are the list of computers used in history of computer

Explanation:

hope it helps

plz make it brainliest ans

7 0
3 years ago
What is an example of a source that is less likely to be copyrighted?
ella [17]
A, I would think. Tell me if I am wrong.
5 0
3 years ago
Read 2 more answers
Look at the file pathway below. What is the folder name that the document "chemlab1.doc" is stored in?
goldfiish [28.3K]

Answer:

chemlab1.doc stored in biology folder which stored in folder studies which stored in mydocs folder which is in C local disk

Explanation:

5 0
3 years ago
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
2 years ago
What is a database in access
aliya0001 [1]
Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. ... It can also import or link directly to data stored in other applications and databases.
6 0
3 years ago
Other questions:
  • The function below takes a single parameter number_list which is a list that can contain integers and floats. Complete the funct
    9·1 answer
  • .The process of capturing the requirements includes all ofthe following with the exception of:
    10·1 answer
  • According to the Modern Language Association (MLA) style guidelines, which citation is formatted correctly?
    8·2 answers
  • To edit the color of the text in presentation software, choose the Font color command Text Color in the ________ ribbon toolbar.
    15·2 answers
  • What can a person do to help increase their credit score?
    12·1 answer
  • A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and
    8·1 answer
  • 4. You are planning to buy a new couch for your family room. Before you leave for the furniture store, you measure the available
    11·1 answer
  • Here's a better picture of my pc mouse and keyboard​
    5·2 answers
  • what is the correct process for setting up a recurring project for the same client in qbo accountant?
    14·1 answer
  • Is orgenized maningful and useful data​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!