1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
8

What can you say about the different website that you used? do they have in common?​

Computers and Technology
1 answer:
Harrizon [31]3 years ago
8 0
They all have ads. Some have inappropriate ads while some have irrelevant ads with respect to the website your on.
You might be interested in
Modify the code below to do the following:
Kitty [74]

Answer:

The code is appropriately given below with comments for better understanding

Explanation:

#include <linux/init.h>

#include <linux/module.h>

#include <linux/kernel.h>

#include <linux/hash.h>

#include <linux/gcd.h>

#include <asm/param.h>

#include <linux/jiffies.h>

/* This function is called when the module is loaded. */

static int simple_init(void)

{

  printk(KERN_INFO "Loading Module\n");

  printk(KERN_INFO "These are the HZ: %d\n", HZ);

  printk(KERN_INFO "These are the jiffies: %lu\n", jiffies);

  printk(KERN_INFO "Golden Ratio is: %lu\n", GOLDEN_RATIO_PRIME);  

  return 0;

}

/* This function is called when the module is removed. */

static void simple_exit(void) {

  printk(KERN_INFO "Removing Module");

  unsigned long a = gcd(3300, 24);

  printk(KERN_INFO "Greatest Common Denominator between 3,300 and 24 is: %lu\n", a);

  printk(KERN_INFO "These are the jiffies: %lu\n", jiffies);

}

/* Macros for registering module entry and exit points. */

module_init( simple_init );

module_exit( simple_exit );

MODULE_LICENSE("GPL");

MODULE_DESCRIPTION("Simple Module");

MODULE_AUTHOR("SGG");

7 0
3 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
Zarrin [17]

Answer:

ayo fam

Explanation:

I dont think this is supposed to be here lol

5 0
3 years ago
Read 2 more answers
Move the Retro music text object to the Album Title layer.​
Daniel [21]
If anyone say to “click this link for the explanation” do not click IT A VIRUS!!! be safe.
6 0
3 years ago
Another name for the Office Button menu is the toolbar. Please select the best answer from the choices provided T F
Troyanec [42]

False is the answer for this question i just did a test on E2020 and it was false because it gave me the answer the other person is wrong just to let you know


6 0
3 years ago
Read 2 more answers
Other questions:
  • What are the three fundamental elements of an effective security program for information systems?
    11·2 answers
  • Which of the following statements is false? a. Each object of a class shares one copy of the class's instance variables. b. A cl
    11·1 answer
  • An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the comp
    12·1 answer
  • Why is it important to not get distracted while driving?
    13·2 answers
  • If you decide to get married, a trade-off would be that you have to give up being single.
    12·2 answers
  • You have a notebook computer and wish to connect to an IEEE 802.11n wireless network. The computer does not have a built-in wire
    11·1 answer
  • Which of the following could be a constructor for the public class MyClass? a. public MyClass() b. public void MyClass() c. publ
    7·1 answer
  • What do Business Analysis workers do? Check all that apply.
    15·2 answers
  • What does this function do in the code?
    5·2 answers
  • Can you predict what changes will come to data storage in the next decade? 
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!