1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
7

How do I do this??? (Im in 9th)

Computers and Technology
1 answer:
vlabodo [156]3 years ago
8 0

Answer:

No clue!

can I get brainliest tho-

You might be interested in
4.2.10: Multiplication Table: Create a program using a for loop which will print out the 4’s times table through 10.
nordsb [41]

I included my code in the picture below. Best of luck.

6 0
3 years ago
A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
drek231 [11]

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

4 0
4 years ago
__________ is a special place on the hard drive where items from memory can be temporarily stored for fast retrieval
andrew-mc [135]
The answer is swap file 
6 0
3 years ago
Read 2 more answers
30points!!!! Plz answer quickly
stich3 [128]

Answer:

center

Explanation:

that is the focal point

3 0
3 years ago
Read 2 more answers
A rookie programmer has just typed over 1000 lines code into the command line interpreter for a project that is due the next day
Kipish [7]

Answer:

I believe the answer is ''You have to remove all code from the interpreter before closing it'.

Explanation:

3 0
3 years ago
Other questions:
  • Due to the shift from host-based networks to microcomputer based networks, more than _____ percent of most organizations' total
    8·1 answer
  • Document creation is a key business function because:
    6·2 answers
  • This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
    12·1 answer
  • Write a program that Read first n lines of file
    8·1 answer
  • Write a program that grades the written portion of the driver's license exam. The exam has 20 multiple choice questions (answers
    10·1 answer
  • Which view allows you to make changes to the content of your presentation?
    13·1 answer
  • PLEASE HELP ME FIX THIS CODE.
    10·1 answer
  • Is it possible to see who logged in in youre Microsoft teams account
    11·2 answers
  • +<br>ii) MnO4 + H2S + H+​
    9·1 answer
  • The (blank) option will help determine the overall look of her presentation.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!