1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
1 year ago
6

. When you ____________________ a word, you can use a single line, a double lines, a dotted line, or even a wavy line!

Computers and Technology
1 answer:
Serhud [2]1 year ago
7 0
Answe
That is the answer just had that
You might be interested in
Which type of data is presented on the y-axis?
den301095 [7]
For example, if I was foong a bar graph about the amounts of what was in different jars, the x-axis would have the items in the jars, and the y-axis woukd have the amount of items in the jars
6 0
2 years ago
Read 2 more answers
When using Internet explore what options will empty the log of Internet sites you have recently viewed
alexira [117]
I think it’s clear history
7 0
3 years ago
Give two logics how a computer is better then man ​
Alex_Xolod [135]

Answer:

Remember facts precisely without error or difficulty recalling.Perform repeated operations/actions without getting tired, bored, hungry or sleepy.Numeric calculations.Play certain games: AlphaGo Zero: Learning from scratch | DeepMindDo as they are told (though sometimes too precisely).

Explanation:

Hope it helps!!!

3 0
1 year ago
Operators allow you to compare values then make decisions (Scratch Coding)
patriot [66]

Explanation:

ok thnka

4 0
2 years ago
Read 2 more answers
What question for attack libraries help answer?
ch4aika [34]

Threat modellers should always look at threat modeling as a 4-step framework that should make sure that a system is safe. This 4-step framework consist of four questions that developers and threat modellers need to ask themselves


A: What are you building?

This is the first step in the 4-step framework. The threat modellers should figure out what they are building. By default, all software development projects consist of specifications and different types of documents. One of the simplest ways of getting an overview is by creating visual models of the system. By taking a look at such diagrams, the threat modellers should be able to get an idea of how extensive the system looks.


B: What can go wrong?

According to some practitioners, it is right to suggest a more detailed list of what can go wrong, instead of using STRIDE. STRIDE is too high level and abstract. Once we’ve looked at different models of the system, the threat modellers should be able to find possible attack patterns that may be a threat against the system.


C: What are you going to do about it or what should you do about those things that can go wrong?

This step consists of deciding what to do with every threat. It is in this step that the developers or the threat modellers need to make a calculated decision on which attacks to mitigate, and which attacks are hard to execute, so obscure, or not that damaging to the system. This step is where threats need to be addressed.


D: Did you do it right or did you do a decent job of analysis? After all possible threats have been considered as not damaging, it is time to re-evaluate the system design and implementation. Threat modeling is considered to be an iterative process. If the validation of a system fails, then the whole process needs to jump back to the first or the second step.




6 0
3 years ago
Other questions:
  • If you want to import text into a DTP application that was first created in a word processing program, what must you do?
    9·2 answers
  • What is the use of word art?
    10·1 answer
  • What does PRAM stand for?
    7·2 answers
  • A thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually und
    13·1 answer
  • What does aperture control? A)amount of light the image sensor captures when taking a photo. B)how sensitive the camera is to in
    10·2 answers
  • Who invented Leibnitz calculating machine ?
    12·1 answer
  • Write a program code to accept the names of 3 users and generate a user name as shown in the example. Accept the name of 3 user
    9·1 answer
  • Does anybody know the answer to 5.7.5: Factorial of Code HS? I can’t figure it out
    14·2 answers
  • The internet advertisement below is known as a __________. CSS tag web banner title sequence hotspot
    13·1 answer
  • Utilizando o padrão de medidas e unidades do National Institute of Standards and Technology, em que 1 KB é igual a 1.000 Bytes,
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!