1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
7

Anyone who do bug bounty hunting ?​

Computers and Technology
1 answer:
olchik [2.2K]3 years ago
5 0

Answer:

No

Explanation:

I do not because it's working with skilled security researchers from all over the world is the key to identifying

You might be interested in
What command would you use to map a share to a drive letter on a computer?
natulia [17]
What are the options
4 0
4 years ago
Info, and Contact Us. She will create a hierarchy of page elements and revise the style sheets. In this case, the Home page cont
Alchen [17]

Answer:

link

Explanation:

3 0
3 years ago
How do you represent a 3D object with unusual curves in 2D space? CAN SOMEONE HELP PLEASE
levacccp [35]
You have to draw the extra lines out
7 0
3 years ago
Definition of blog? computer science
inysia [295]

Blogs are sites online owned by a person and or a group of people, usually containing things like videos, pictures and overall things that happened in their day. Blogs are updated daily and have explanations or an overall report on what their day was like.

7 0
4 years ago
What is true about client-side scripting?
Alexeev081 [22]

Answer:

A client-side script is a program that is processed within the client browser. These kinds of scripts are small programs which are downloaded , compiled and run by the browser. JavaScript is an important client-side scripting language and widely used in dynamic websites.

Explanation:

3 0
3 years ago
Other questions:
  • Write a method isMultiple that determines, for a pair of integers, whether the second integer is a multiple of the first. The me
    8·2 answers
  • The flowchart shape for input or output is an oval. <br> a. True <br> b. False
    6·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • If a business owner wanted to create a banner ad for his business on his webpage, he could use Java programming to develop a (n)
    7·2 answers
  • Which of the following would be an example of a loss of record integrity in a
    12·1 answer
  • 2 A_______<br> uses graphics or pictures to help the user navigate and<br> access programs
    14·1 answer
  • write an algorithm and draw a flowchart to calculate the sum of of the first 10 natural numbers starting from 1​
    13·1 answer
  • . . ........Sad + sad= very sad
    7·2 answers
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
  • Your task is to design a method int[] allMatches(int[] values, int size, int a, int b) that returns all values between a and b i
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!