1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
13

G i r l s o n l y j o i n id= ons jcuv jke

Computers and Technology
2 answers:
Scilla [17]3 years ago
5 0
At least 20 characters long
Katyanochek1 [597]3 years ago
4 0

Answer:

nooooooo

1.1431586352

You might be interested in
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub
stich3 [128]

Answer:

I don't speak english

I don't speak english

7 0
3 years ago
A binary search can be performed only on ____.
11Alexandr11 [23.1K]
A binary search can be performed only on a comparable lists
3 0
3 years ago
Your program is going to compare the distinct salaries of two individuals for the last 5 years. If the salary for the two indivi
kirza4 [7]

In python:

i = 1

lst1 = ([])

lst2 = ([])

while i <= 5:

   person1 = int(input("Enter the salary individual 1 got in year {}".format(i)))

   person2 = int(input("Enter the salary individual 1 got in year {}".format(i)))

   lst1.append(person1)

   lst2.append(person2)

   i += 1

if sum(lst1) > sum(lst2):

   print("Individual 1 has the highest salary")

else:

   print("Individual 2 has the highest salary")

This works correctly if the two individuals do not end up with the same salary overall.

4 0
3 years ago
⚠VERY IMPORTANT MESSAGE⚠
Wittaler [7]

Thank you for this message!

Whoever is reading this, please stay safe from those scammers.

このメッセージをありがとう!

これを読んでいる人は誰でも、それらの詐欺師から安全を守ってください。

이 메시지에 감사드립니다!

이 글을 읽는 사람은 사기꾼들로부터 안전을 유지하십시오.

Quien esté leyendo esto, manténgase a salvo de esos estafadores.

7 0
3 years ago
Read 2 more answers
Other questions:
  • The command for creating a PivotTable is found in the <br> tab.
    7·1 answer
  • Which of following allows you to share a file with someone that is too large to send via e-mail?
    5·1 answer
  • Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111
    12·1 answer
  • What is a short sequence of characters that appears at the end of a filename and is preceded by a period called __________
    5·1 answer
  • ? Question
    6·2 answers
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • Explain what led to the invention of lasers
    7·1 answer
  • Which is a linear presentation?
    10·1 answer
  • If you do a Find and Replace for a term, where will Word begin looking for the term?
    6·1 answer
  • before you start researching fleet management software, your first task is to clearly define the problem. this will help guide y
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!