1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
2 years ago
13

Evaluation of your strengths and weaknesses

Computers and Technology
1 answer:
kondor19780726 [428]2 years ago
7 0

いt  背lfまyべラテぇrべit is a lolololol idek ima just stop

You might be interested in
Help pls put them in order for me??
Natalija [7]

Answer: i can't see the hole thing?

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following best describes the difference between the domain and path of a URL?
Lana71 [14]

Answer:

the first choice

Explanation:

8 0
2 years ago
Under what circumstances does a multithreaded solution using multiple kernel threads provide better performance than a single-th
pshichka [43]

The best scenario is when a program suffers from frequent page faults. In the situations when a kernel thread experiences a page fault, another kernel thread can be switched in; something a single-threaded process will not be capable of doing. Another best circumstance is when a program has to wait for other systems events.






5 0
2 years ago
Scenario: 1. Victim opens the attacker's web site. 2. Attacker sets up a web site which contains interesting and attractive cont
Ann [662]

Answer :

These sort of attacks are known are Injected IFrame Attacks. The Injected IFrame Attacks are a common Cross Site Scripting or XCC attack that contains multiple or single iFrame tags implemented within a page which is not visible to user. User unintentionally enters his information which is posted to hacker’s server and information’s gets hacked.

5 0
3 years ago
How to help poeple on brainly
Neko [114]

Answer their questions and if you don't get their questions, make sure to ask them out it to clarify it

3 0
2 years ago
Other questions:
  • Write a function called printbackwards() that will work with a c++ string
    14·1 answer
  • Use the STL class vector to write a C function that returns true if there are two elements of the vector for which their product
    14·1 answer
  • A program that interacts with another piece of software as it if were a human user is known as a(n) ________.
    5·1 answer
  • You order a new personal computer. A representative from the store calls to ask if you need CD-copying software in your personal
    12·1 answer
  • A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provi
    7·1 answer
  • The ________ is an area where you can position fields to use for filtering the PivotTable and thereby enabling you to display a
    11·1 answer
  • What is not a benefit of exploring tabs and groups in Microsoft Word?
    9·2 answers
  • The valid call to the function installApplication is
    5·1 answer
  • 1. Write a program to input four numbers and store them in variables.
    6·1 answer
  • How can you make a search phrase more effective?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!