1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
13

"Welcome"; is an example of a _________ variable.

Computers and Technology
1 answer:
nekit [7.7K]3 years ago
5 0

Answer:

String

Explanation:

It is because we use double quotes (" ") in string variable.

in boolean we only use true or false.

in character we use single quotes

in char also we use single quotes.

<em>HOPE</em><em> </em><em>IT</em><em> </em><em>HELPS</em><em> </em>

<em>HAVE</em><em> </em><em>A</em><em> </em><em>NICE</em><em> </em><em>DAY</em><em> </em><em>:)</em><em> </em>

<em>XXITZFLIRTYQUEENXX</em><em> </em>

You might be interested in
What are the methods used in research methodology?
earnstyle [38]
Experiments. ...
Surveys. ...
Questionnaires. ...
Interviews. ...
Case studies. ...
Participant and non-participant observation. ...
Observational trials. ...
Studies using the Delphi method.
5 0
3 years ago
If ADD = 81, BAD = 49, and CAD = 64, then what is the value of ACA?
Digiron [165]

Answer:

its 72

Explanation:

i know it because i did it and thats how i know it

6 0
3 years ago
What is Accenture's role in Multi-party Systems?
Maslowich

Answer:

helping a single company develop a data ingress platform

Explanation:

Accenture's role in Multi-party Systems is "helping a single company develop a data ingress platform."

This is evident in the fact that Accenture formed a strategic alliance with Marco Polo Network in recent times. The purpose of the alliance is to create a single data ingress platform for many connections. That is those on the network can easily install, either on-prem or through the cloud such as the Marco Polo platform, and then later incorporates the data into the enterprise resource planning system.

7 0
3 years ago
In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
Alex787 [66]

Answer:

False

Explanation:

If your server has been hacked, accessed by Remote access domain, these are tips or recommendations:

- Disable the Remote Desktop service on the affected computer and close port 3389 on the router so that your server is not accessible by Remote Desktop from the Internet, as another hacker can re-access and encrypt more files or encrypt over those already encrypted. .

- Ensure that the virus is not active, to do this place some files to see if they are encrypted or not.

- Scan the server with an updated antivirus.

- Open Task Manager, view active processes, and end the encryption process, which is usually Payload.exe

- Change the passwords of all users of the computer.

- Install a good paid antivirus, we recommend these:

- Configure the antivirus with password protection, so hackers cannot uninstall or deactivate it.

- You can use a desktop blocking program such as Eusing Maze Lock.

- Use a network firewall and VPN connection to remotely access the computer.

- Never use direct connection by Remote Desktop without VPN.

- Set up an online backup or an appropriate backup policy.

6 0
3 years ago
Which goal of design theory can be described as the proper distribution
muminat
The answer is balance
7 0
3 years ago
Other questions:
  • Standards for all managers ethical responsibilities are covered in a company's
    7·2 answers
  • Create a program asks a user for an odd positive integer. If the user gives and even number or a number that is negative it prom
    7·1 answer
  • When a user logs on to a windows 7 computer using remote desktop, users that are logged on locally are unaffected.?
    10·1 answer
  • Citing the recent increase in earnings by several computer companies, economists feel that a cycle has begun in which personal c
    13·1 answer
  • vehicles power system is disabled as the result of a collision, can an ACN system using a paired cell phone work to notify a PSA
    7·1 answer
  • Two ways in which the media does not reflect the society you live in.
    9·1 answer
  • PLEASE HELP ILL GIVE BRAINIEST
    6·2 answers
  • Josh is learning about hackers know for finding loopholes in systems, without notifying the company or organization beforehand.
    13·1 answer
  • A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced,
    12·1 answer
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!