1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
2 years ago
5

Match the following pls help

Computers and Technology
1 answer:
ziro4ka [17]2 years ago
5 0

Answer:

a.IIS→Web Server

b.ASP→Server side scripting language

c.VBScript→Default scripting language of ASP

d.DBMS→A software to manage data

Explanation:

not \: sure.....

You might be interested in
A shuffle of two strings X and Y is formed by interspersing the characters into a new string, keeping the characters of X and Y
levacccp [35]

Shuffle (A[1..m], B[1..n], C[1..m+n]):

Shuf[0, 0] ← True

for j ← 1 to n

Shuf[0, j] ← Shuf[0, j − 1] ∧ (B[j] = C[j])

for i ← 1 to n

Shuf[i, 0] ← Shuf[i − 1, 0] ∧ (A[i] = B[i])

for j ← 1 to n

Shuf[i, j] ← False

if A[i] = C[i + j]

Shuf[i, j] ← Shuf[i, j] ∨ Shuf[i − 1, j]

if B[i] = C[i + j]

Shuf[i, j] ← Shuf[i, j] ∨ Shuf[i, j − 1]

return Shuf[m, n]

The algorithm runs in O(mn) time.

3 0
3 years ago
PLEASE HELP ME HELP ME NO IM NOT OKAY AND ITS NOT EASY FOR ME.....Vladimir is reworking an old slideshow. He needs to delete som
Mandarinka [93]

Answer:

Outline view

Explanation:

This is a formatted window that shows all text, headers, and titles in a popup on the left side of the screen. Slide master shows all the slides but includes slide details such as inserted images and smart art.

7 0
3 years ago
Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
Virty [35]

Answer:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

C. All the part of a security incident should be logged.

Explanation:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

Explanation:

C. All the part of a security incident should be logged.

7 0
3 years ago
What is computer issue
ludmilkaskok [199]
There's MANY things that count as computer issues.
1) when your computer freezes.
2) When your computer runs slow.
3) when your computer takes hours to download, but never does.
4) Glitches (that can lead to crashes).
5) it could be an internal server error.

Need more or this good?
8 0
3 years ago
How do i set up a RAID 1 array?​
KiRa [710]

are you using windows? linux? mac?

3 0
4 years ago
Other questions:
  • The ________ occurs when the user presses the enter key without typing a value for an input operation.
    5·1 answer
  • You can use this effect to break a color into a percentage of its full strength.
    13·1 answer
  • A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private
    11·1 answer
  • class student_record { public: int age; string name; double gpa; }; Implement a void function that has five formal parameters: a
    15·1 answer
  • (1) Create three files to submit:
    8·1 answer
  • Which part of the computer stores and processes data?
    14·1 answer
  • It takes 2.5 yards of material to make a dress harleys clothing design estimates that they can produce 48 dresses each week.if t
    15·2 answers
  • What defines which part of the IP address is the Network ID and the Host ID?
    5·2 answers
  • What are some of the opportunities that the stem program offers?
    15·1 answer
  • Why do meteorologists use data such as temperature, wind speed, and air
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!