1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
2 years ago
15

You have a Mobile Legends account???Can I play with You???​

Computers and Technology
1 answer:
yulyashka [42]2 years ago
7 0

Answer:

yes oo you want to play with me

You might be interested in
Select the correct answer.
Naddika [18.5K]

Answer:

E

Explanation:

4 0
3 years ago
I need help please :((((<br> I need it in python
Bezzdna [24]
Take this one step at a time. Your teacher has given you the code for step 1. Now write step 2. Then 3, and so on.

For step 2: if you're using Python v2.x you'd use a line like

guess = int( raw_input( "Take another guess: " ) )

For Python v3.x it would be:

guess = int( input( "Take another guess: " ) )

Break it down into small pieces, it's not a complicated assignment.
7 0
3 years ago
The counting function uses only ___________________ arguments
rusak2 [61]

Answer:

The counting function uses only <em>the list of </em>arguments.

8 0
2 years ago
Write a function called middle(string str) that returns a string containing the middle character in str if the length of str is
jenyasd209 [6]

Answer:

Note: a) If the length of the string is odd there will be two middle characters.

Explanation:

b) If the length of the string is even there will be one middle character. There was a problem connecting to the server. Please check your connection and try running the trinket again.

3 0
2 years ago
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
juin [17]

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
5 0
3 years ago
Other questions:
  • What types of input and output devices would be ideal for a college student completing his or her coursework?
    8·1 answer
  • . Convert BAC4 from hexadecimal to decimal. Show your work.
    9·1 answer
  • Which statement demonstrates a conflict of interest in an organization?
    9·1 answer
  • Justify the need for branching and jump codes in the instruction set using real world scenarios
    6·1 answer
  • The enhanced for loop _____ Group of answer choices reduces the number of iterations necessary to visit all elements of an array
    12·1 answer
  • Type of file containing instructions that tell your computer how to perform ___
    9·1 answer
  • Antivirus is a program that detects error.True or False.​
    9·1 answer
  • What are the objectives of the computer communication with the surrounding world? ​
    11·1 answer
  • Collaboration, listening, and negotiating are considered __________ skills.
    11·1 answer
  • What component of a change management program includes final testing that the software functions properly
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!