1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
8

The ______ Works on a single variable or constant. *​

Computers and Technology
1 answer:
lora16 [44]3 years ago
6 0

Answer:

man

Explanation:

You might be interested in
What is one similarity between compiled and interpreted programming languages? (5 points)
Rashid [163]

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, <u>the similarity between both languages is that they are high level languages and translate code for a computer to understand. </u>

8 0
2 years ago
When you save a Notepad file for the first time, you must also A. print a copy for your records. B. give it a name. C. check the
Kruka [31]
Answer: Give it a name
3 0
3 years ago
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
You can edit existing conditional formatting _____ from the conditional formatting rules manager dialog box.
Lera25 [3.4K]
I believe the term you're looking for would be "rules" 
send me a message if not true.
7 0
3 years ago
Carlie was asked to review a software prject for her company and determine what materials are needed. Whihc part of project mana
Helga [31]

Answer:

The answer is "Resources".

Explanation:

All services should definitely be reviewed through Carlie. However many Software Developers, Reviewers, and others are accessible are important to find out. Only then can Carlie find out because needed, the exact timelines. Because whenever establishing precise deadlines, she needs to take a look at the tools, that's why the above given choice is correct.

8 0
3 years ago
Other questions:
  • The Huntington Boys and Girls Club is conducting a fundraiser by selling chili dinners to go. The price is $7 for an adult meal
    8·1 answer
  • When the increment or decrement operator is placed before the operand (or to the operand's left), the operator is being used in
    6·1 answer
  • The biggest factor in determining the price of a mortgage is:
    14·1 answer
  • What software development model focuses on improving the product in small steps each time through the cycle?
    14·2 answers
  • Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
    6·2 answers
  • 7.5 Code practice Plz answer ASAP
    15·1 answer
  • ASAP BRAINLIEST!!!
    6·1 answer
  • Create a vector of structures experiments that stores information on subjects used in an experiment. Each struct has four fields
    12·1 answer
  • Make The PYTHON Code<br><br> print first 3 character of a string - given "Seattle" expected "Sea"
    14·1 answer
  • You are a software engineer at a company where management routinely encourages you and your colleagues to use pirated software.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!