1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
14

Fill in the blank with the correct response.

Computers and Technology
1 answer:
harina [27]3 years ago
6 0

Answer:

program

Explanation:

You might be interested in
What are the four levels of access rights?
Svet_ta [14]

Explanation:

Currently, there are four primary types of access control models: mandatory access control (MAC), role-based access control (RBAC), discretionary access control (DAC), and rule-based access control (RBAC). Each model

5 0
3 years ago
What type of firmware should you look for on a pc if you want the computer to support gpt partitions?
Ilia_Sergeevich [38]

Answer:

UEFI

Explanation:

7 0
1 year ago
What is Data validation? (in a simple definition)
dlinn [17]
Verify data, something like this

var username = document.getElementById("input1").value

var password = document.getElementById("input2").value

// this is the validation:
if ( username == "anime" && password == "Anime132" ){
alert("Correct login data");
} else {
alert("Wrong login data");
}
7 0
3 years ago
Read 2 more answers
Develop a crawler that collects the email addresses in the visited web pages. You can write a function emails() that takes a doc
Mars2501 [29]

Answer:

see explaination

Explanation:

import re

def emails(document):

"""

function to find email in given doc using regex

:param document:

:return: set of emails

"""

# regex for matching emails

pattern = r'[\w\.-]+at[\w\.-]+\.\w+'

# finding all emails

emails_in_doc = re.findall(pattern, document)

# returning set of emails

return set(emails_in_doc)

# Testing the above function

print(emails('random text ertatxyz.com yu\npopatxyz.com random another'))

5 0
3 years ago
When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in w
lesantik [10]

Answer:

Drive-by download

Explanation:

The unintentional download of malicious code onto a computer or mobile device that exposes users to different types of threats.

4 0
2 years ago
Other questions:
  • 20 Points!! Please hurry!!
    9·1 answer
  • The procedure call mystery(38) will yield which output? __________ a) 0 12 b) 12 0 c) 1 1 0 2 d) 1 1 1 1 e) 2 0 1 1 public void
    11·1 answer
  • The use of electronic media, information, and communication technologies to deliver instruction where students are not required
    8·1 answer
  • What is the best website to get a iphone
    11·2 answers
  • Which button should be utilized if a user is unsure whether or not they are the right person to reply to an email?
    6·2 answers
  • How can you tell the value of a purchase?
    7·1 answer
  • Please what do you guys think about this ?
    10·2 answers
  • Explain how communication facilitate cordination​
    14·1 answer
  • What do we call the software which programmers use to program?​
    6·1 answer
  • Mario is designing a page layout for a sports magazine, and he decides to add the image of a cyclist. Which principle of page la
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!