1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tatiana [17]
3 years ago
6

Please help coding assignments i will give brainliest :)

Computers and Technology
1 answer:
kozerog [31]3 years ago
4 0

Answer:

II and III

Explanation:

In the snippets of code provided the only ones that will evaluate to true will be conditions II and III. Condition one has and (&&) comparisons meaning that every single condition needs to be true in order for the overall condition to be true, if only two variables are guaranteed to be equal then the third variable could be different which would ultimately evaluate to false. Condition 2 has or (||) comparison meaning only one needs to be true in order for the overall condition to be true and since we are already told that at least two are equal then it will always evaluate as true. Condition 3 is an arithmetic problem that will always equal 0 because two of the variables are equal, meaning that when they subtract it will give 0, and anything multiplied by 0 will equal 0 as well. Therefore, evaluating to true.

You might be interested in
Please help me I just bought a camera and I really wanna shoot in manual mode but I have like the basics down Shutter speed is l
Irina-Kira [14]

Advise: I would say watch

7 0
3 years ago
Consider the information about the meaning of the word analog from paragraph 2 listed below. Which of the following phrases best
Reika [66]

Answer:

drzvkhy67re4d

Explanation:

Preciate u

3 0
3 years ago
______was developed as an interim management protocol with OSI as the ultimate network management protocol.
RSB [31]

Answer:

Simple Network Management Protocol

Explanation:

Simple Network Management Protocol otherwise referred to as SNMP is a form of computer protocol that is mainly used in obtaining and regulating information relating to connected gadgets. It is practically based on the internet and was originally planned as an interim protocol.

Hence, it can be concluded that the Simple Network Management Protocol was developed as an interim management protocol with OSI as the ultimate network management protocol.

4 0
3 years ago
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Als
nika2105 [10]

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

6 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
Other questions:
  • Edhesive coding practice 3.4​
    12·1 answer
  • Please Help ASAP! 30 Points! Will Mark Brainliest! Please Don't Waste Answers! It's Due In 40 Minutes Please Help Me!
    12·1 answer
  • Which is a benefit of getting information from a government website?
    15·2 answers
  • Write pseudocode for a function that translates a telephone number with letters in it (such as 1-800-FLOWERS) into the actual ph
    11·1 answer
  • Create a while loop to try making a video game turn based battle.
    9·1 answer
  • Marissa is designing a web page that features lessons on how to build cabinets. how can she make the page most engaging for the
    7·1 answer
  • How is unqualified assumptions a disadvantage of communication​
    14·1 answer
  • Apart from mATX and ATX what are the other form factors of power supply
    7·1 answer
  • What extra dimension do 3D objects have that 2D objects do not have?<br><br> help
    7·1 answer
  • Mr. stevens is the principal of a high school. why might he want to export data from a database of students’ exam scores? to cre
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!