1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
5

1111111111111111111111111111

Computers and Technology
1 answer:
NISA [10]3 years ago
3 0

Answer:

in order to use correct codes, ensure the variables in loops are in brackets

You might be interested in
The hardware and software that must be implemented to support the applications that the primary activities use are a part of the
Contact [7]
The answer is infrastructure
7 0
2 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
Can you help me solve this challenging activity?
diamong [38]

Answer:

user_age = int(input())

if user_age > 17 and user_age != 25:

   print("Eligible")

else:

   print("Not eligible")

Explanation:

3 0
2 years ago
The U.S. continues to become more dependent on the global domain within the information environment consisting of the interdepen
cupoosta [38]

Answer:

cyberspace

Explanation:

It is the notional environment in which communication over computer networks occurs.

5 0
4 years ago
RSA encryption relies on
oee [108]

Answer:

the difficulty in factoring large numbers

 a public key that the server and the user’s computer know

 

the use of prime numbers

a private key that only the server knows

Explanation:

ege 2021

5 0
2 years ago
Other questions:
  • Which command can be used to manually add a package to the driver store?
    13·1 answer
  • Given positive integer num_insects, write a while loop that prints that number doubled up to, but without exceeding 100. Follow
    8·1 answer
  • 8. A pattern of being late for work or for appointments is usually
    12·1 answer
  • __ is/are the amount of blank space between lines of text in a paragraph
    7·2 answers
  • Program should allow for user to enter students name and his four test scores it should calculate and display the average and le
    7·1 answer
  • This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balance
    7·1 answer
  • Can web sites contain copyright material? <br> Yes <br> No
    10·2 answers
  • What is the most important for you to choose before you build a network?
    7·1 answer
  • How much would it cost to get the screen replaced on a Moto G7?
    10·1 answer
  • Laura is filming a scene in which the subject is sitting with a lit fireplace behind him. The only other source of light in the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!