1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
7

Choose the correct line of code.

Computers and Technology
1 answer:
Naddika [18.5K]3 years ago
5 0
Def_pow_(self,b): if not then I’m sorry
You might be interested in
_____ are the younger edge of gen y who have never lived without the internet or easy access to cell phones.
Sophie [7]

Generation Y are the people age 14-37, which means they are born 1977 - 2000.<span /><span>Tweens are the younger edge of gen Y who have never lived without the internet or easy access to cell phones.</span>
<span /><span>
</span>
8 0
3 years ago
Where can a user find out more information about a hardware or network failure that occurred on that particular pc?
dolphi86 [110]
In *nix the logs are usually in /var/log . They're usually restricted to privelidged access. In Windows, the Event Logs
7 0
3 years ago
What will be the code in CSS, to set
LUCKY_DIMON [66]

Answer:

font-family: Tahoma;

font-size: 7px;

text-decoration: underline;

Explanation:

As for the font-family, you can also specify the general font family to which the Tahoma font belongs.

4 0
3 years ago
I have a question involving do and for loops while using arrays.
larisa86 [58]

Answer:

i just got my new pc

Explanation:

5 0
3 years ago
Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp
laiz [17]

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


3 0
3 years ago
Read 2 more answers
Other questions:
  • A biologic reaction is produced by 4 Gyt of a test radiation. It takes 16 Gyt of 250-kVp x-rays to produce the same biologic rea
    11·1 answer
  • What are three responsibilities of an operating system? please answer quick!!!
    9·1 answer
  • Who is responsible for keeping your facility in compliance? A) Technicians B) Supervisors C) Owners D) All of the above
    11·1 answer
  • Why are computers useful for modeling situations?
    13·2 answers
  • Tech A states that modern vehicles use asbestos as the brake material. Tech B states that asbestos is no longer used in brakes.
    8·1 answer
  • ALSO PLZZZ HELP :P Suppose you are purchasing a game at a local retail store that comes on DVD. In order to install it on your l
    8·1 answer
  • Here's something random idc
    8·2 answers
  • PLS HELP) Early word processors ran on devices that looked like digital _______?
    10·2 answers
  • 9) Which date is assigned the serial number of 1?
    10·2 answers
  • A(n) ____ describes the structure, content, and access controls of a physical data store or database.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!