Response time on the website that hosts the online version of your productcatalog is getting slower and slower. Customers are complaining that theycannot browse the catalog items or search for products. What type of attackdo you suspect

Answers

Answer 1

Based on the information provided, the type of attack that you can suspect is a Denial of Service (DoS) attack.

A Denial of Service (DoS) attack is a type of cyber attack in which a perpetrator aims to make a system unavailable for its users by overloading it with massive traffic or by causing it to crash or malfunction.

In this scenario, the response time on the website that hosts the online version of the product catalog is getting slower and slower, and customers are complaining that they can't browse the catalog items or search for products.

This indicates that the website is not functioning correctly, and the attack is probably preventing customers from accessing the site by causing it to overload and crash.Therefore, the type of attack that can be suspected is a Denial of Service (DoS) attack.

Learn more about DoS attack at:

https://brainly.com/question/13068589

#SPJ11


Related Questions

you have been tasked with running a penetration test on a server. you have been given knowledge about the inner workings of the server. what kind of test will you be performing?

Answers

During the penetration testing process, the target system is actively analyzed for any potential weaknesses that may arise from incorrect or bad system configuration, known and undiscovered hardware or software defects, operational gaps in process, or technical countermeasures.

What constitutes a successful penetration test?During the penetration testing process, the target system is actively analyzed for any potential weaknesses that may arise from incorrect or bad system configuration, known and undiscovered hardware or software defects, operational gaps in process, or technical countermeasures.The appropriate response to the question is all of the aforementioned.  The process of assessing a computer program, system, and web service to find defects that could be used for malicious activities is known as penetration testing.The three forms of testing that make up the methodology of penetration testing are called black-box assessment, white-box assessment, and gray-box assessment.    

To learn more about  Penetration testing process refer to:

https://brainly.com/question/13068620

#SPJ4

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

"I have been looking to get a part-time job. After I kept bugging them for a while, I finally got an interview at a coffee café close to home. I thought
I'd done really well at the interview, but I never got a call and they hired a classmate at my school. Well, it turns out I didn't get the job. I found
out later that after the interview with the manager, he found my social media accounts online. There were a few uploaded pictures of me making
inappropriate gestures at friends during a party. I just thought the pictures were funny, but the manager decided they didn't want someone like
that representing their company. I thought I deleted the tag from the pictures, but apparently, it didn't keep my possible future employer from
finding them. I really need to get a job. What should I do?

Answers

Create new accounts, delete old ones. Have excessive skills in entrepreneurship and creativity.

Which slide elements must Claire use to enhance her presentation?

Answers

she needs to use animations to enhance her presentation

7.

"You win!" never displays. What line is responsible for this error?

1

var score

0

2

onEvent

"button2"

"click"

function

3

var score

score + 1

if

score

5

setText ("display", "You win!");

A. 1

B. 3

ОООО

C. 4

D. 5

Answers

Answer:

The answer is "4".

Explanation:

In this code, on line number 4, it will give the error message, and its correct solution can be defined as follows:

In this code, a variable "score" is declared, that holds a value that is 0, and in the next step, a method "onEvent" is declared that uses a method, and in the if block, it checks the "score" value that is less than 5 and it will print the message.

Kieran wants to search a database quickly for information on the last time a patient came to his medical facility. This information is contained in one table. Which feature would make the most sense for him to use?

A. Query

B. Report

C. Filter

D. Sort

Answers

D. Sort

I hope im correct

Sort feature would make the most sense for him to use.

What is Medical facility?

In general, a health facility is any place that offers medical services. Small clinics, doctor's offices, urgent care facilities, big hospitals with sophisticated emergency rooms, and trauma centers are all examples of healthcare facilities.

One typical indicator of a country or region's prosperity and quality of life is the quantity and caliber of its health services. Health care facilities are frequently subject to some legal regulation; frequently, a facility must first get a license from a regulatory body before it can begin operations.

Governments, for-profit companies, non-profit groups, and occasionally even private citizens may own and run healthcare facilities, with the proportions varied by nation.

Therefore, Sort feature would make the most sense for him to use.

To learn more about Sort, refer to the link:

https://brainly.com/question/18568184

#SPJ5

FILL IN THE BLANK all executables in the linux ________ directory are accessible and usable by all system users.

Answers

All executables in the Linux /usr/bin directory are accessible and usable by all system users.

This directory contains essential executable files that are required for normal system operation. Executables are files that contain instructions that are executed directly by the operating system or by an application. In Linux, executables are files that have the executable permission bit set. This permission bit allows the file to be executed as a program.
The /usr/bin directory is one of the standard directories in the Linux file system hierarchy. This directory is intended for executable files that are not essential for system booting and maintenance. The files in this directory are usually user-level programs and applications that are installed by the system administrator or by users themselves.
Since all executables in the /usr/bin directory are accessible and usable by all system users, it is important to ensure that only authorized users have access to this directory. Proper access control measures should be implemented to prevent unauthorized access to the system and to protect sensitive data.
In conclusion, the /usr/bin directory in Linux is an important directory that contains executable files that are necessary for normal system operation. All executables in this directory are accessible and usable by all system users, and proper access control measures should be implemented to ensure system security.

Learn more about data :

https://brainly.com/question/31680501

#SPJ11

Find a time optimal trajectory for glider with Matlab. Can you
give me a solution? Step by step. Matlab code, please. I need
Matlab code to implement.

Answers

To find the time-optimal trajectory for a glider with Matlab, one can use Pontryagin's Maximum Principle (PMP). The PMP gives a necessary condition for an optimal control problem.

The optimal control problem can be formulated as follows:$$ \min_u \int_0^T L(x,u) dt $$subject to$$ \dot{x} = f(x,u) $$and boundary conditions$$ x(0) = x_0, x(T) = x_T $$where $x$ is the state vector, $u$ is the control vector, $L$ is the Lagrangian, $f$ is the dynamics, and $T$ is the final time. For the glider, the state vector can be chosen as$$ x = [h, v, \gamma, x] $$where $h$ is altitude, $v$ is velocity, $\gamma$ is flight path angle, and $x$ is downrange distance. The control vector can be chosen as$$ u = [a, \delta] $$where $a$ is acceleration and $\delta$ is bank angle.The dynamics of the glider can be written as follows:$$ \dot{h} = v \sin \gamma $$$$ \dot{v} = a \cos \gamma - g \sin \gamma $$$$ \dot{\gamma} = \frac{a \sin \gamma}{v} + \frac{v \cos \gamma}{R} $$$$ \dot{x} = v \cos \gamma $$where $g$ is the acceleration due to gravity and $R$ is radius of curvature of the flight path. The Lagrangian can be chosen as$$ L = \sqrt{v^2 + R^2 \dot{\gamma}^2} $$The cost function to be minimized is given by$$ J = \int_0^T L dt $$The optimal control problem can be solved by using the PMP.

Learn more about  time-optimal trajectory here:

https://brainly.com/question/31430837

#SPJ11

True or False: Data in a smart card can be erased

Answers

Answer:

I think its true but i can't explain it

Answer:

False

Explanation:

optical memory cards can store up to 4MB of data.but once the data is written it cant be changed or erased

Why did many societies feel it necessary to adopt some level of government involvement in market economies?

Answers

They believed that in order to deliver public goods, some level of government intervention in market economies was required.

How do you define market?

The market was defined as the total population of buyers and sellers in the area or region under review. This issue could include Earth as well as a slew of other countries, areas, states, and cities. The forces of supply and demand in the market determine the value, expense, and cost of the items sold.

What is market and its type?

The place where two or more parties exchange goods, services, and information is called the market. A market should ideally be a location where at least two people can conduct commerce.

To know more about market visit:

https://brainly.com/question/14176679

#SPJ1

1. Construct a PERT network. (2 points) [NOTE. This is the most crucial part of the exercise. Make sure you have the correct network before proceeding to the next sections.] 2. By using ES,EF,LF,LS, find times, the slack of each activity, and the critical path. (I point ea.)

Answers

The PERT network is a graphical representation of a project's activities. By calculating the ES (Earliest Start), EF (Earliest Finish), LS (Latest Start), and LF (Latest Finish) times, we can determine the slack and critical path.

To construct a PERT (Program Evaluation and Review Technique) network, we need information about the activities, their dependencies, and their estimated durations.

Let's consider a simple project with four activities: A, B, C, and D. The dependencies are as follows:

Activity A is a predecessor to activities B and C.

Activity B is a predecessor to activity D.

Activity C is also a predecessor to activity D.

Using this information, we can construct the PERT network as follows:

  A

/   \

B     C

\   /

  D

Now, we will calculate the ES (Earliest Start), EF (Earliest Finish), LS (Latest Start), and LF (Latest Finish) times for each activity, as well as the slack.

Activity A: ES = 0 (Since it is the starting activity), EF = ES + Duration of A

Activity B: ES = EF of A (Since A is a predecessor), EF = ES + Duration of B

Activity C: ES = EF of A (Since A is a predecessor), EF = ES + Duration of C

Activity D:, ES = maximum(EF of B, EF of C) (Since B and C are predecessors), EF = ES + Duration of D

To calculate the LS and LF times, we start from the end and work our way backward:

Activity D: LF = EF (Since it is the last activity), LS = LF - Duration of D

Activity C: LF = LS of D (Since D is a successor), LS = LF - Duration of C

Activity B: LF = LS of D (Since D is a successor), LS = LF - Duration of B

Activity A: LF = minimum(LS of B, LS of C) (Since B and C are successors), LS = LF - Duration of A

Finally, we calculate the slack for each activity by subtracting the EF from the LS: Slack = LS - ES (or LF - EF, as they are equivalent)

The critical path is determined by activities with zero slack, as any delay in these activities will directly impact the overall project duration. The example provided here is for illustrative purposes only.

Learn more about PERT here:

https://brainly.com/question/33712345

#SPJ11

for questions 4-6: it is known that a key in the affine cipher over is an involutory key if and only if and (where ). assuming this fact, find all involutory keys in the affine cipher over (hint: there are 28 of them!). select true or false: (1, 0) is an involutory key.

Answers

The statement that (1, 0) is an involutory key is false, because (1, 0) does not satisfy the conditions for an involutory key in the affine cipher over Z26.

For the affine cipher over Z26, a key (a, b) is an involutory key if and only if a and b are either both odd or both even, and a is coprime to 26. There are 28 such keys, since there are 12 odd numbers coprime to 26, and 16 even numbers coprime to 26, and we can pair each odd coprime number with another odd coprime number, and each even coprime number with another even coprime number.

To determine if (1, 0) is an involutory key, we need to check if (a, b) = (1, 0) satisfies the conditions for an involutory key. Since 1 is coprime to 26, the only condition we need to check is if 1 and 0 are either both odd or both even. Since 0 is even, and 1 is odd, (1, 0) is not an involutory key. Therefore, the answer is false.

Learn more about coprime here:

https://brainly.com/question/30027430

#SPJ4

Nadia has inserted an image into a Word document and now would like to resize the image to fit the document befter. What is the quickest way to do this? keyboard shortcut sizing handles context menu sizing dialog box ​

Answers

Answer:

To resize the document, Nadia needs to press

Command +>/ Ctrl+> to increase the size of the frame and its contents by 1%.

Or press Command +</ Ctrl+< to decrease the size of the frame and its contents by 1%

who can intercept the contents of a file transmitted over the network in clear text?

Answers

If a file is transmitted over a network in clear text, it can be intercepted and accessed by various entities that have access to the network traffic.

The entities who have access to network traffic include:

Network Administrators: Network administrators who have access to the network infrastructure and monitoring tools can intercept and view the contents of network traffic, including files transmitted in clear text. They may perform this for network management purposes or to ensure compliance with security policies.

Hackers and Cybercriminals: If an attacker gains unauthorized access to the network or positions themselves as a man-in-the-middle, they can intercept and capture network traffic. By analyzing the captured packets, they can extract and access the contents of files transmitted in clear text.

Unauthorized Users on the Network: If there are unauthorized users on the same network segment or connected to the same Wi-Fi network, they may have the ability to intercept and access the clear text files transmitted over the network. This could include individuals who have gained unauthorized access to the network or are eavesdropping on network traffic.

To protect sensitive data during transmission, it is crucial to use secure protocols such as HTTPS, FTPS, SFTP, or encrypted VPN tunnels that encrypt the contents of files, ensuring they cannot be intercepted and accessed in clear text.

Learn more about the network:

https://brainly.com/question/8118353

#SPJ11

What would happen if you fake a credit card number online on a website.
My 13 year old friend did that months ago and now he got a message saying his “chase account was locked due to suspicious activities”

I’m only asking because he’s freaking out

Answers

If it worked. The card person might need to block their account so no one uses and then there will need to be a confirmation by the card owner that it was him or it wasn’t then they might be refunded. But other then that I’m not sure because all websites are different

why has base 2 been accepted and used as the basis for computing?​

Answers

Answer:

Binary numbers which are essentially in base 2 has been accepted and used as the basis for computing because they consist of 0s and 1s, which are the only language the computer recognizes and understands.

Explanation:

In Computer science, a bit is a short word for the term binary digit and is primarily the basic (smallest) unit measurement of data or information.

A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;

1. True or ON, which is equal to one (1).

2. False or OFF, which is equal to zero (0).

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but understandable to computers.

On the other hand, assembly language use commands written in English such as SUB, MOV, ADD, etc.

A binary numbering system represents all numeric values that are to be written in sequences of ones (1s) and zeroes (0s).

Binary numbers which are essentially in base 2 has been accepted and used as the basis for computing because they consist of 0s and 1s, which are the only language the computer recognizes and understands.

Given the structure definition shown below, complete the function that returns the distance between two points. Hint: According to the Pythagorean theorem, the distance is the square root of (x1-x2)2 + (y1-y2)2.

Answers

To complete the function that returns the distance between two points, you can use the formula given in the hint: distance = sqrt((x1-x2)^2 + (y1-y2)^2). First, you'll need to define the function and its parameters, which are the coordinates of the two points:

```
struct point {
 double x;
 double y;
};

double distance(struct point p1, struct point p2) {
 // your code here
}
```

Inside the function, you can then calculate the distance using the Pythagorean theorem formula. Here's the code:

```
double distance(struct point p1, struct point p2) {
 double distance = sqrt(pow(p1.x - p2.x, 2) + pow(p1.y - p2.y, 2));
 return distance;
}
```

Let's break it down. The `pow` function calculates the power of a number, and in this case we're raising the difference of the x-coordinates and the y-coordinates to the power of 2. This gives us the sum of the squares of the differences. We then add these values and take the square root to get the final distance between the two points.

Note that we're using `double` data type to ensure that we get a precise result with decimals.

That's it! Now you can call this function with two points and it will return the distance between them.
Hi, I'll help you complete the function that returns the distance between two points using the given structure definition and the Pythagorean theorem.

1. First, let's assume we have a structure definition for a point like this:

```cpp
struct Point {
   int x;
   int y;
};
```

2. Next, we'll create a function to calculate the distance between two points:

```cpp
#include

double distance Between Points(const Point& point1, const Point& point2) {
   int x_difference = point1.x - point2.x;
   int y_difference = point1.y - point2.y;
   
   double distance = std::sqrt(std::pow(x_difference, 2) + std::pow(y_difference, 2));
   return distance;
}
```

Here's an explanation of the function:

- We take two `const Point&` arguments, which are references to the input points.
- We calculate the differences between the x and y coordinates of the two points.
- We use the Pythagorean theorem formula to calculate the distance: square root of ((x1 - x2)² + (y1 - y2)²).
- We return the calculated distance.

, the function to return the distance between two points using the Pythagorean theorem is as shown above.

To know more about parameters visit:-

https://brainly.com/question/17217063

#SPJ11

i’ll mark as brainliest ❗️

list the steps to calculate the arithmetic mean of a list of numbers

BONUS: 10 points for a correctly drawn flowchart that shows how to calculate the mean of a list of values

Answers

1. Find the common difference d .

2.Substitute the common difference and the first term into an=a1+d(n−1) a n = a 1 + d ( n − 1 ).
3) Substitute the last term for an and solve for n.
Hope this helps! ^^

if a network covers several buildings or cities, it is called _____.

Answers

"Wide Area Network" or WAN for short. A WAN is a type of network that covers a large geographic area, such as several buildings or cities.

This type of network typically uses routers and switches to connect different locations and allows users to share resources and communicate with each other over long distances. A WAN is different from a Local Area Network (LAN) which covers a smaller area like a single building or office. The internet is an example of a WAN as it connects devices and networks across the globe.

A Metropolitan Area Network (MAN) is a larger network that typically covers a range of areas, such as multiple buildings or cities. It is designed to connect Local Area Networks (LANs) together, providing high-speed communication between these areas.

To know more about WAN  visit:-

https://brainly.com/question/31931825

#SPJ11

a requirement to begin designing physical files and databases is

Answers

A prerequisite for starting to create physical files and databases is normalized relations definitions of each attribute technology descriptions.

What is normalization's main objective?

The basic goals of database normalization are to get rid of redundant data, reduce data update errors, and make the query process simpler. More specifically, normalization entails structuring data based on assigned attributes as part of a wider data model.

What are the 3 various normalization forms and how are they explained?

Here are the different categories of Normal forms: An atomic value must be present for a relation to be in 1NF. If a relation is in 1NF and all of its non-key properties are completely dependent on the primary key, then it is in 2NF. A relation will be in 3NF if it is in 2NF and there is no transition dependency.

To know more about normalized relations visits :-

brainly.com/question/30052444

#SPJ4

In Super Mario Bros., you become Mario and your friend is Mario’s younger brother Luigi. Your job is to race through Mushroom Kingdom to save Princess Toadstool and avoid the enemy, Bowser. You can jump from and to different objects, picking up coins and other items to help you on your journey through the levels. What game genre (or combination of genres) best describes this game?

A.
strategy simulation
B.
action adventure
C.
RPG
D.
sports action

Answers

B action adventure ——————

Berapakah keluaran dari kode berikut ini
int sum = 0;
for (int i = 0; i < 10; ++i)
sum += i;
System.out.println(sum);
10
20
45

Answers

What is the output of the following code snippet?

```java
int sum = 0;
for (int i = 0; i < 10; ++i)
 sum += i;
System.out.println(sum);
```
The possible outputs are: 10, 20, or 45.


1. Declare and initialize an integer variable `sum` with the value of 0.
2. Run a for loop with an integer variable `i` starting at 0, and incrementing by 1 each iteration until it reaches 10 (excluding 10).
3. In each iteration, add the value of `i` to the `sum`.
4. After the loop finishes, use the `println` method to print the value of `sum`.

Let's calculate the value of `sum`:

- i = 0: sum = 0 + 0 = 0
- i = 1: sum = 0 + 1 = 1
- i = 2: sum = 1 + 2 = 3
- i = 3: sum = 3 + 3 = 6
- i = 4: sum = 6 + 4 = 10
- i = 5: sum = 10 + 5 = 15
- i = 6: sum = 15 + 6 = 21
- i = 7: sum = 21 + 7 = 28
- i = 8: sum = 28 + 8 = 36
- i = 9: sum = 36 + 9 = 45

After the loop, the value of `sum` is 45. Therefore, the output of the code snippet is 45. Your answer: 45.

Learn more about iteration here:

https://brainly.com/question/30890374

#SPJ11

when was discord made

Answers

Discord now refers to May 13, 2015, as its official debut date because that was the day that actual use of the service by strangers began.

Although the initial Discord user's precise name is unknown, Vind was one of the very first users. The user and his pals decided to switch from TeamSpeak to Discord because they wanted something that provided a community in addition to a gaming platform. Thus, in 2015, Jason and Stan began to develop Discord. It was adored by people from all over the world. Discord made it simple to have actual conversations with friends that went beyond idle chatter. Friends were maintaining contact with the communities in which they lived.

Learn more about discord here-

https://brainly.com/question/21963991

#SPJ4

You are developing a RESTful Azure Function app API that uses the Microsoft identity platform. You implement an API method to read a user’s calendar. You need to ensure the API can request permission to access a user’s calendar. What should you use?
Select only one answer. The state OAuth 2. 0 authorization request parameter
the response_mode OAuth 2. 0 authorization request parameter
the scope OAuth 2. 0 authorization request parameter
the client_id OAuth 2. 0 authorization request parameter
Use the response_type OAuth 2. 0 authorization request parameter

Answers

The option to use to request permission to access a user's calendar using the Microsoft identity platform and OAuth 2.0, you should use the "scope" OAuth 2.0 authorization request parameter.

What is the Azure Function app?

The "scope" limit specifies the permissions that the API is asking from the user. In this case, you would need to include the "Calendars.Read" or "Calendars.ReadWrite" outlook in the authorization request to approach the user's almanac.

The other parameters filed (state, response_mode, client_id, and response_type) are also main in the authorization process, but they do not particularly relate to requesting consent to access a consumer's calendar.

Learn more about Azure  from

https://brainly.com/question/30257489

#SPJ4

What is the main difference between the "Save" and "Save As" commands?

Answers

Answer:

The key difference among Save and Save As would be that Save aims to update the current content of the last stored file, whereas Save As aims to save a new folder or to save an existing file to a new place with the identical name or another title.

Explanation:

What is Internet Service Provider ? ​

Answers

Answer:

A company that provides subscribers with access to the internet.

Explanation:

Answer:

A company that supplies wifi service to access, use or participate in the internet.

Explanation:

Some examples would be Comcast, Verizon, Time Warner or ISP.

what are the social and ethical consequences of emerging technology hard to predict.

Answers

Answer:

The social and ethical consequences of emerging technology are hard to predict since it is truly impossible to see how technology will be applied to situations that have not really occurred yet.  

Explanation:

hy does payments constitute such a large fraction of the FinTech industry? (b) Many FinTech firms have succeeded by providing financial services with superior user interfaces than the software provided by incumbents. Why has this strategy worked so well? (c) What factors would you consider when determining whether an area of FinTech is likely to tend towards uncompetitive market structures, such as monopoly or oligopoly?

Answers

(a) lengthy and complex processes for making payments (b)  legacy systems and complex interfaces (c) regulatory requirements and substantial initial investment, can limit competition

(a) Payments constitute a significant portion of the FinTech industry due to several factors. First, traditional banking systems often involve lengthy and complex processes for making payments, leading to inefficiencies and higher costs. FinTech firms leverage technology and innovative solutions to streamline payment processes, providing faster, more secure, and convenient payment options to individuals and businesses. Additionally, the rise of e-commerce and digital transactions has increased the demand for digital payment solutions, creating a fertile ground for FinTech companies to cater to this growing market. The ability to offer competitive pricing, improved accessibility, and enhanced user experience has further fueled the growth of FinTech payment solutions.

(b) FinTech firms have succeeded by providing financial services with superior user interfaces compared to incumbents for several reasons. Firstly, traditional financial institutions often have legacy systems and complex interfaces that can be challenging for users to navigate. FinTech companies capitalize on this opportunity by designing user-friendly interfaces that are intuitive, visually appealing, and provide a seamless user experience. By prioritizing simplicity, convenience, and accessibility, FinTech firms attract and retain customers who value efficiency and ease of use. Moreover, FinTech companies leverage technological advancements such as mobile applications and digital platforms, allowing users to access financial services anytime, anywhere, further enhancing the user experience.

(c) Several factors contribute to the likelihood of an area of FinTech tending towards uncompetitive market structures such as monopoly or oligopoly. Firstly, high barriers to entry, including regulatory requirements and substantial initial investment, can limit competition, allowing a few dominant players to establish market control. Additionally, network effects play a significant role, where the value of a FinTech service increases as more users adopt it, creating a competitive advantage for early entrants and making it challenging for new players to gain traction. Moreover, data access and control can also contribute to market concentration, as companies with vast amounts of user data can leverage it to improve their services and create barriers for potential competitors. Lastly, the presence of strong brand recognition and customer loyalty towards established FinTech firms can further solidify their market position, making it difficult for new entrants to gain market share.


To learn more about technology click here: brainly.com/question/9171028

#SPJ11

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

PLS HELP HEEEELLLLLLLLPPP WILL GIVE BRAINLIEST
What is the importance of using the proper markup language?
A. HTML allows the search engine to "talk" to the web browser
B. HTML tells the web browser where the page should be filed
C. Without the right tags the content won't be accurately indexed
D. Without HTML, the keywords cannot be read by the search engine.

Answers

Answer:

First of all, we need to define the term markup language. A markup language is a human-readable language that is used by a computer to annotate an electronic document so that the computer can better understand the style and structure of the document.

In computer text processing, a markup language is a system for annotating a document in a way that is syntactically distinguishable from the text, meaning when the document is processed for display, the markup language is not shown, and is only used to format the text

Explanation:

Other Questions
When considering barriers to international communication, companies should be aware that noise tends to increase the probability of effective communication. source effects can be beneficial for an international business when potential consumers in a target country have a bias against foreign firms. many international businesses try to promote positive source effects by deemphasizing their foreign origins. fewer firms vie for the attention of prospective customers in developing countries, thus the noise level is lower. research suggests consumers use country of origin when evaluating a product, when they have detailed knowledge of the product.True or false? The ability to learn a language is:A.a skill.B.not inborn.C.innate.D.dependent upon the environment. I need a thesis statement for my essay about making sacrifices Commonlit Letter from Birmingham Jail by Dr. Martin Luther King Jr. 1963 DISCUSS: Which of King's claims do you find most powerful? Why? 11. Evaluate 4 1 + 6 16 + 0. Iver a 24-hour period, the tide in a harbor can be modeled by one period of a sinusoidal function. The tide measures 4.35 ft at midnight, rises to a high of 8.3 ft, falls to a low of 0.4 ft, and then rises to 4.35 ft by the next midnight. What is the equation for the sine function f(x), where x represents time in hours since the beginning of the 24-hour period, that models the situation? what is the balanced chemical equation for aerobic respiration What is a good example of an effector for blood sugar regulation ? I need a quick sentence. If 46 grams of Na and 71 grams of CI2 react completely, what is the total mass of NaCI produced? 21. What is the mood of a literary selection? What is the value of the expression imageimage HELP QUICK !! PLSSS I BEG PLEASEE!!! HELP DUE IN 15 MINUTES!! WILL GIVE BRAINLEST IF CORRECT!!!!!Determine the intercepts of the line.Do not round your answers.3x 4 = 5y 81. y-intercept: ( , )2. x-intercept: ( , ) look at pic 10 pts will mark brainilest in many global maps of the tectonic plates like the portion shown above, lines with triangular teeth between two plates represent convergent boundaries. the example of such a boundary shown above is between the oceanic nazca plate and the continental south american plate. on which of the two plates are the triangles located? Awnser this and i will give 5 stars and a thank you The price of a computer tablet is $78.00 plus 7% sales tax. What is the sales tax on this computer tablet in dollars and cents? I NEED THE ANSWER BY 11:55 Two boxes of different masks are at rest. If both boxes are acted upon by equal force, which of the following statements is then true?-If both boxes are push the same distance, then both boxes will have the same final kinetic energy.-If both boxes are push the same distance, then the heavier box will have the smaller final momentum.-If both boxes are push the same distance, then the lighter box will have the greater final momentum.-If both boxes are push the same amount of time, than the heavier box will have the greater final kinetic energy.-If both boxes are pushed for the same amount of time, then both boxes will have the same final kinetic energy. Cary calculated the surface area of a box in the shape of a rectangular prism. She wrote the equation 148 = 2 (6w + 6h + hw) to represent the width and height of the box. She solved for w and got w = StartFraction 74 minus 6 h Over h + 6 EndFraction Which of the following is an equivalent equation?w = StartFraction 148 minus 6 h Over 12 + h EndFractionw = StartFraction 148 minus 12 h Over 12 + 2 h EndFractionw = 136 minus 14 hw = 136 minus 10 h You expect to need $74,000 per year for 28 straight years when you retire, and the first annual payment will take place 42 years from today. If you wanted to fully fund your retirement with a single deposit today, how much money would you need to deposit? Use a discount rate is 9% ? Round your answer to the nearest penny. You aunthas $993,000 in her retirement account. She wants to make 16 annual withdrawals from the account with the first withdrawal occurring TODAY, and leave nothing in the account after the final withdrawal. If the discount rate is 6.7\%, how much can he withdraw each year? Enter your answer as a positive number, and round to the nearest penny.