1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
2 years ago
9

_____ are fields that are used to personalize a mail merge document

Computers and Technology
1 answer:
Rzqust [24]2 years ago
8 0

Answer:

The answer is A; rows of a spreadsheet data source.

Explanation:

You might be interested in
Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6
Tanzania [10]

Answer:

Here the code is given as follows,

Explanation:

Code:-

#include <stdio.h>  

int isSorted(int *array, int n) {

   if (n <= 1) {

       return 1;

   } else {

       return isSorted(array, n-1) && array[n-2] <= array[n-1];

   }

}  

int main() {

   int arr1[] = {3, 6, 7, 7, 12}, size1 = 5;

   int arr2[] = {3, 4, 9, 8}, size2 = 4;  

   printf("%d\n", isSorted(arr1, size1));

   printf("%d\n", isSorted(arr2, size2));

   return 0;

}

Output:-

4 0
3 years ago
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
When dealing with perspective, _____ lines are used or implied.
iris [78.8K]

Answer:

I'm pretty sure the answer is vanishing lines.

Explanation:

7 0
3 years ago
PHP can be run on Microsoft Windows IIS(Internet Information Server):
Natali [406]

Answer:

True

Explanation:

PHP is supported on number of Web Server platforms. These include Apache 1.x, Apache 2.x, lighttpd and IIS.

IIS is supported on Windows platform for both x86 and x64 configuration.

The IIS or Internet Information Services is a web server developed by Microsoft for Windows platform. The initial release of IIS 1.0 was way back in 1995. The current available version of IIS is 10.x.

3 0
3 years ago
If your vehicle malfunctions, turn on your hazard lights
Dvinal [7]

Answer:the answer is not A

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a Python program to balance a checkbook. The main function needs to get the initial balance, the amounts of deposits, and
    5·1 answer
  • What are the benefits of maintaining your vehicle?
    5·2 answers
  • A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the
    8·1 answer
  • The Internet began when a large company wanted to sell products online. <br> True or flase?
    6·2 answers
  • People who enjoy working with their hands might enjoy a career as a/an
    9·1 answer
  • Complete the function to return the factorial of the parameter using recursion,
    10·2 answers
  • 11 Select the correct answer. Which external element groups items in a design?
    9·1 answer
  • List and briefly describe the major types of system in organization?​
    15·2 answers
  • What is the meaning of FTTH
    9·2 answers
  • Explain with examples what is software​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!