1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
3 years ago
6

Is a list of instructions an arguments? Yes or No

Computers and Technology
2 answers:
grandymaker [24]3 years ago
7 0

Answer:

no actually. i think both are really different because instruction is a list of commands while arguments is a fight between two or more thoughts.

Bingel [31]3 years ago
5 0

Answer: yes

Explanation:

You might be interested in
What is the best wi-fi name you have ever seen?
elena-s [515]

Answer:

bill wi the science fi

Explanation:

8 0
3 years ago
The primary purpose of an ids is to detect intrusions, log suspicious events, and send alerts.
Kamila [148]

Hello, Mochacon, so to answer this question, we must understand what and ids is. A intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. So according to this definition, this statement is true since and ids does detect intrusions, detects suspicious events indeed, and sends alerts when intrusions happen.

Hope this helped!

3 0
3 years ago
Vocational schools are also called all of the following except:
Salsk061 [2.6K]
A vocational school can also be called all of the following except a certification school.
7 0
3 years ago
Read 2 more answers
Informs the network interface card to pass packets sent to that address to the ip stack so their contents can be read, and tells
Lesechka [4]
The answer to this question is Registration
Registration on the network interface will allow computer users all around the world to access a certain information stored within a certain address in that network which most people know as a website.
Today, to do a network registration, people just need to contact a hosting service that will take care of everything for us, and we just need to provide the content.


6 0
3 years ago
Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the
katrin [286]
False phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
6 0
4 years ago
Other questions:
  • You are doing research for a current event report on smartphone technology. You do a web search for information that includes se
    5·2 answers
  • Microsoft windows server and linux are examples? of:
    12·1 answer
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the
    15·2 answers
  • How can I, fill the application form for jobs. [such as Macdonal's jobs].?
    12·1 answer
  • Which sentence best describes the executive branches of state
    12·1 answer
  • You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customer
    13·1 answer
  • Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which ke
    10·1 answer
  • Question # 2 Multiple Choice Which finger presses the H key on the keyboard? index finger on the right hand index finger on the
    11·1 answer
  • Whats worth more in adopt me- A Mega Owl or a Mega Frost Dragon?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!