1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
6

What would a system unit that is integrated with the display and keyboard would be considered?

Computers and Technology
1 answer:
Slav-nsk [51]3 years ago
6 0

mmmmmmmhhhhhhhhhhhhhh

You might be interested in
Explain the function of different flags in the 8086<br>​
posledela

Answer:

A flag is a piece of fabric (most often rectangular or quadrilateral) with a distinctive design and colours. It is used as a symbol, a signalling device, or for decoration.8086 has 16-bit flag register, and there are 9 valid flag bits.The FLAGS register is the status register in Intel x86 microprocessors that contains the current state of the processor. This register is 16 bits wide. Its successors, the EFLAGS and RFLAGS registers, are 32 bits and 64 bits wide, respectively. The wider registers retain compatibility with their smaller predecessors.

5 0
3 years ago
Which of the following is FALSE? Select one: a. The fast-paced and collaboration-based business environment makes email less use
12345 [234]

Answer:

The Atos case demonstrates that it is possible to cut out e-mail entirely.

Explanation:

6 0
3 years ago
Backing up and synchronization are the same thing. <br><br>A.)True<br>B.) False​
Sholpan [36]

Answer: A.)true

Explanation: This is true for a number of reasons, the first being that synced files

3 0
3 years ago
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
3 years ago
Define a function SwapRank() that takes two char parameters passed by reference and swap the values in the two parameters. The f
faltersainse [42]

The program that takes two char parameters passed by reference and swap the values in the two parameters is illustrated below.

<h3>What is a program?</h3>

A computer program is a sequence of instructions in a programming language for a computer to execute.

The program is illustrated below:

void SwapGrade(char &g1, char &g2)

{

char t = g1;

g1= g2;

g2 = t;

}

Output

B

C

C B

Learn more about program on:

brainly.com/question/26642771

#SPJ1

3 0
2 years ago
Other questions:
  • A book of the Law was found in the Temple, which was being repaired, during what year of Josiah's reign.
    15·2 answers
  • For which punctuation symbol will you use the ring finger of your right hand?
    9·1 answer
  • What is the difference between the default constructor and the overloaded constructor?
    5·1 answer
  • The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet. When connected to a
    11·1 answer
  • Which of the following is an example of tangible property?
    5·1 answer
  • Software on your computer is taking a long time to load. What could help solve this problem?
    5·1 answer
  • What is a mod in programming?<br><br> Give more Java questions
    12·1 answer
  • What is communication barriers?​
    6·2 answers
  • 1) It is possible to email a document<br> directly from the Word application.<br> O FALSE<br> O TRUE
    10·1 answer
  • ¿por que hay peligros en internet?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!