1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
3 years ago
7

The list blocks that allow for storing and accessing a list of numbers and strings is called.

Computers and Technology
1 answer:
Katarina [22]3 years ago
8 0

Answer:Array is the right option i have already answered in the same question which is available on brainly.

You might be interested in
Before posting a picture online, make sure to
chubhunter [2.5K]
You have to make sure that the site is safe to post to avoid phishing. There are some options available in social media that can help you customize the settings of your viewers. It can give you more control to choose whether you wanted it to be seen in public, by friends or just yourself.  
8 0
3 years ago
Communication of a message between two processes implies which of the following? (A) Synchronization (B) Atomic operation (C) Bl
solong [7]

Answer: Synchronization

Explanation:

In communication of messages between processes we have a mechanism called as the interprocess communication (IPC) using which it is required to achieve synchronization between the process. These synchronization helps to prevent collision of the processes for the shared resources. Examples can be of mechanism of producer consumer problem .

6 0
3 years ago
The data in a data warehouse have which of the following characteristics?
Marina CMI [18]
What are the options it says which of the following characteristics.
4 0
3 years ago
While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
Darina [25.2K]

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

4 0
3 years ago
What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
ale4655 [162]

Answer:

/etc/yum.conf

Explanation:

The absolute pathname for YUM is /etc/yum.conf. The configuration file For yum and related utilities can be found there. The file has one compulsory section, and this section can be used to place Yum options with global effect, it could also have one or more sections, that can enable you to set repository-specific options.

4 0
4 years ago
Other questions:
  • Two or more computers that transfer information between computers are called a
    7·1 answer
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • Select the strategies below that are likely to increase audience attention.
    14·2 answers
  • A superscope is a special type of scope that allows a dhcp server to service multiple ipv4 subnets on multiple physical networks
    7·1 answer
  • For each entity, select the attribute that could be the unique identifier of each entity.
    12·1 answer
  • Victor works for a telemarketing company that is on a very tight budget. He has been tasked with finding a method for the compan
    7·2 answers
  • Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals
    7·1 answer
  • An invisible path determining the way of travel from one place to another.
    10·1 answer
  • Describa la clasificación de los recursos educativos digitales abiertos. vea este video, para hacer eso
    11·2 answers
  • Ano ang humahati ng globo ng equdor
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!