1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pentagon [3]
3 years ago
7

How to run angular project from github.

Computers and Technology
1 answer:
sergiy2304 [10]3 years ago
6 0

Answer:

i have no ideaaaaaaaaaaaaaaaaaaaaaa

Explanation:

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa kill me

You might be interested in
When excel imports an access table, the data is placed in a worksheet _____?
ratelena [41]
Book is the answer!!!!!
3 0
4 years ago
The fraction 460/7 is closest to which of the following whole numbers?
Bess [88]
I don’t see any of “the following numbers”
3 0
3 years ago
Draw the hierarchy chart and then plan the logic for a program that calculates a person’s body mass index (BMI).
dusya [7]

Explanation:

I have attached the answer as an image. I can't upload the file as it requires a licensed product and I only used demo version. I can provide the file too if you can give me your vlsig file required to use full software. However, If you just copy along the images on your Visual Studio, you will easily create the files yourself. Answer is provided for both scenarios as part A and part B, one which stops after 1 iteration and the one which loops until 0 height is given.

8 0
3 years ago
write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
loris [4]

Answer:

1.....There is a standard structure for emails. Email contents are primarily classified as two, the header and the body. We are going to see the contents come under the two subparts. The email header gives us common details about the message such as the unique identity of the message.

Explanation:

2......a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.

its components are ....

A search engine normally consists of four components e.g. search interface, crawler (also known as a spider or bot),indexer, and database.

3.....Advantages Of eLearning

It is a very efficient way of delivering courses online. Due to its convenience and flexibility, the resources are available from anywhere and at any time. Everyone, who are part time students or are working full time, can take advantage of web-based learning.

hope this will help you ..

please like and mark as brilliant.

4 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
AysviL [449]

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

<em>Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. </em>

3 0
3 years ago
Other questions:
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
  • If you do not specify any criteria in a delete query, Access will delete all the records in the table. Truth or False
    11·1 answer
  • What are 3 important reasons to reconcile bank and credit card accounts at set dates?
    15·1 answer
  • What will you see on the next line?
    6·2 answers
  • Manuel owns a small business. He needs to calculate the amount each employee owes in Federal taxes. Manuel should
    11·2 answers
  • A desktop computer is a type of mobile device.<br><br> a. true<br> b. false
    5·1 answer
  • Assume there is a 30-byte heap. The free list for this heap has two elements on it. One entry describes the first 10-byte free s
    15·1 answer
  • When a company sends you recommendations of what to buy you know that :
    12·1 answer
  • The price of an item you want to buy is given in dollars and cents. You pay for it in cash by giving the clerk d dollars and c c
    6·1 answer
  • Two types of storage memory​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!