what are the features of dot net ???​

Answers

Answer 1

Answer:

1) interperability

2) portability

3) security

4) simplified deployment

5) base class library

6) language indepence


Related Questions

Write a python program to calculate the sum of numbers from 1 to 20 which is divisible by 3.

Answers

Answer:

Input : N = 5

Output : 7

sum = 3 + 4

Input : N = 12

Output : 42

sum = 3 + 4 + 6 + 8 + 9 + 12

Answer:Input : n = 2, number = 7

Output : 728

There are nine n digit numbers that

are divisible by 7. Numbers are 14+  

21 + 28 + 35 + 42 + 49 + .... + 97.

Input : n = 3, number = 7

Output : 70336

Input : n = 3, number = 4

Output : 124200

Explanation:

How many bits would be needed to count all of the students in class today? There are 40 students.

Answers

Answer:

You would need 8 bits.

Explanation:

pls mark brainliest

What kind/category of wallpapers do you prefer for your phone, tablet, or iPad??

Answers

Answer:

Overview of a place.

Explanation:

It has more meaning when you see an overview of a place. But it could be a thing too.

Answer:

Explanation:

It has more meaning when you see an overview of a place. But it could be a thing too.

0.3. Fill in the blanks,7marks
a. A smart____uses IoT to save electricity.
b._____are devices that can sense , store and analyse signals from the body and display the information on the gadget and an app.
c. The full form of CSS is_____.
d. The syntax of CSS is made of_____
and_____.
e._____CSS is used to beautify one particular tag.
f. Internet of Things makes use of connected devices, smartphones and_________.
g._____track the number of steps a person has walked in a day.​

Answers

Answer:

a) phone

b)

c) cascading style

an interface are connection point with hardware devices are joined​

Answers

Answer:

Explanation:

Networking hardware is the correct answer

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Answers

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

A device is a program that must be installed in order for the peripheral device to be able to
work with the computer or laptop.
O prompter
O connector
O driver
O assister

Answers

Hii ! Soooo I think the suitable option for this one would probably be connector and also I had to look up a connector and I really think it could be the answer! If not I am sooo sorry for wrong one aha

In most cases; for a peripheral to work properly, a software must be installed on the computer, the peripheral is to be connected to.

The software is called (c) device driver

Some peripherals (such as mouse, keyboards, external Bluetooth, joysticks etc.) require that the user of the computer installs device driver on the host system.

Without the device driver installed, the following are the possible effects

The peripheral will not work at allThe peripheral will not function properlyThe peripheral causes the computer not to function optimally

Hence, (c) driver is correct

Read more about device drivers at:

https://brainly.com/question/14308161

Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to include an additional subnet. Rachel has installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server. When she checks the server icon in the DHCP Management console, she notices the server has a down icon. The DHCP server service has started, but the server does not respond to DHCP lease requests. What should Rachel do to solve the problem

Answers

Answer: Ask a member of the Enterprise Admins group to authorize the server.

Explanation:

From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.

In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.

whats the recommended amount of dedodated wam
i can have in a server

Answers

Hi! The recommended amount of RAM that you should have is 6gb and above.

What does this mean? it is coming after i ask a question

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

Answer:

To my own opinion I think it means that when you're answering a question here in brainly I think they are referring that your message is rude but sometimes you are not rude but I don't know. Maybe it could be some difficult technical problems.

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet.

Answers

Answer:

The answer would be Spoofing

Name of the best Android keyboard
Pls I need it asap!! For educational purpose
I need your Ideologies​

Answers

I think Gboard is good, you can switch between languages quickly and you can translate in real time. Translation is not perfect, but it is the best translation available. Vocabulary and autocorrect is not bad too. You can change the background. It has some themes of its own, but you can always customise it with your own photo. It has instant gif, stickers and emoji options too. It also has a good collection of symbolic emojis like: *\0/*O_o(๑♡⌓♡๑)ᕙ( • ‿ • )ᕗ(☉。☉)!I cannot include all of them, they are in 100s.

But if you are looking for a solution for grammatical mistakes, then you may want to consider Grammarly.

[tex]\boxed{\underline{\bf \: ANSWER}}[/tex]

Well, just like the person before me has answered ; I prefer Gboard, a keyboard provided by Go.ogle over all the other options ones available while using android. As you can see in the attached picture, I use Gboard & have been using it for quite a lot of years now as well. Gboard provides smooth surface for typing & there's glide technology as well. There's an option to pin your clipboard (which I find really helpful) & tons of built-in emojis, emoticons (this feature is not available in many), GIFs & so on. Also you can customize your keyboard by changing themes (you can either select one of the many backgrounds they have or choose one you like; in my case I have a blue scenery clipart as my background which matches my phone's overall theme). You can also use Gboard if you prefer to text in more than 1 language (this feature is available in many other keyboards as well though).

Now moving on, I would suggest the Samsung Keyboard too (that is, of you are using Samsung gadgets). The only reason I prefer Gboard over this keyboard is because you can't customize Samsung Keyboard (you can only choose White/Dark mode). Also, emoticons aren't available.

Then at last, there's the Grammarly Keyboard. This keyboard is really good if you are looking for writing essays, paragraphs or speeches as it catches all your grammar errors. But at times, it can be a bit too much & the keyboard is not overall smooth to use (at least for me).

So there, these 3 are the best keyboards for Android users.

_____

Hope it helps.

RainbowSalt2222

4) Programming a) WAp to find the greatest number among any three numbers.​

Answers

def comp_num (num1, num2, num3):

try:

if num1 > num2 and num1 > num3:

print ( "{0} is the biggest".format(num1) )

elif num2 > num1 and num2 > num3:

print ( "{0} is the biggest".format(num2))

elif num3 > num2 and num3 > num1:

print ( "{0} is the biggest".format(num3))

except ValueError:

return "Invalid input"

num_1 = int (input (" Please enter a number: "))

num_2 = int (input (" Please enter a second number: "))

num_3 = int (input (" Please enter a third number: "))

print (comp_num (num_1, num_2, num_3))

Answer:

this is in qbasic programming

What is the difference between Packaged and tailored soft ware?​

Answers

Answer:

Package software is developed by computer technicians. modified or changed if there is need because these software are custom-built. Tailored Software- Tailored software is the software that is developed as per the specifications and requirements of the users.

Explanation:

hpithlps.

what is known as Ip address

Answers

Answer:

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network

Answers

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?

(Select two).

a. Use shared secret authentication

b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE

c. Configure devices to run in ad hoc mode

d. Use open authentication with MAC address filtering

e.  INSTALL A RADIUS SERVER AND USE 802.1X authentication.

 

What is computer system ?​

Answers

Answer:

a system that is a computer

Answer:

Invertebrates are animals that neither possess nor develop a vertebral column, derived from the notochord. This includes all animals apart from the subphylum Vertebrata. Familiar examples of invertebrates include arthropods, mollusks, annelid, and cnidarians

An ordinary office environment needs computers that have multiple user account settings where each user is allocated private data storage. What type of workstations would you build for this environment

Answers

Answer:build a thick client

Explanation:

When a statement within a try block causes an exception, the remaining statements in the try block Select one: a. are executed after the statements in the catch block b. are executed before the statements in the catch block c. aren't executed

Answers

In C++, 'Try block' comprises of a group of statements in which there is a probability of an exception to take place.

C). The statements that would be left in the try block in case a particular statement leads to an exception 'can't be executed.'

In case an exception takes place, the left statements in the try block fail to function. This is the primary reason for which a catch block immediately succeeds a try block in order to deal with the exception and help close that code to allow the statements to work. Thus, option C is the correct answer.

Learn more about 'Try block' here:

brainly.com/question/14186450

Why is Charles Babbage is known as the father of computer?​

Answers

Answer:

Charles Babbage is known as the father of computer because he invented a machine called Analytical Engine, which is a model of today's computers.

have a great dayyyy

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

write the function of storage unit​

Answers

Answer:

A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects. Storage devices can hold and store information both temporarily and permanently. They may be internal or external to a computer, server or computing device.

please mark me as brainliest

Select the correct answer for each question.
Which of the following ports offers a fast
connection that could be used to download and
watch your favorite TV shows?
O Etherne
O modem
O FireWire
O USB
DONE

Answers

Answer:

USB

Explanation:

it is a standard cable connection for consumers electronics devices.

What is AI? Differentiate between 1G and 2G computer.​

Answers

The simulation of human intelligence in machine that are programmed to think like humans and feel the emotions and mimic is called AI

It stands for Artificial Intelligence

1G use analog signal for communication

2G use digital signal for communication

I hope it helps and if you want to have good answers follow me ,believe me I will help you in every question ♥️♥️

Answer:

Artificial intelligence (AI) is intelligence demonstrated by machines, as opposed to the natural intelligence displayed by humans or animals.

It's difference is given below:

1. 1G stands for first generation. While 2G stands for second generation.

2. 1G uses circuit switching. While 2G circuit switching as well as packet switching.

3. In 1G, internet is not provided. While in 2G, internet is provided.

4. The voice signal of 1G is analog signal. While the voice signal of 2G is digital signal.

5. The data services in 1G are not provided. While in 2G, data services are provided except complex data(videos).

6. The channelization protocol in 1G is FDMA. While the channelization protocol in 2G are TDMA and CDMA.

7. 1G was launched in the year 1980. 2G was launched in the year 1993.

What does RoHS stand for and why is RoHS compliance important?

Answers

Answer:

It stands for Restriction of Certain Hazardous Substances.

Web search says it is important because,

RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.

Explanation:

please help me to solve this Question ​

Answers

Answer:

SHOPKEEPER$ = "Chocolate"

Explanation:

Kolom terakhir pada lembar kerja Excel 2019 adalah​

Answers

Answer:

Tahan CTRL dan tekan tombol panah kanan (tombol kursor) pada keyboard. Anda dibawa ke kolom paling kanan. Dalam versi Excel modern, ini adalah kolom XFD, yaitu 16.384 kolom. Di versi Excel yang lebih lama (2003 dan sebelumnya) kolom terakhir adalah IV yaitu 256 kolom.

in english

Hold down CTRL and press the right arrow key (cursor key) on the keyboard. You are taken to the right-most column. In the modern versions of Excel this is column XFD, which is 16,384 columns. In older versions of Excel (2003 and prior) the last column was IV which is 256 columns.

a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a

Answers

Answer:

where are the step number. I can't find any

What are the factors affecting the life of ballast? Explain.​

Answers

Answer:

When it's too hot or too cold.

Explanation:

When a bulb of the wrong size or voltage is used in the fixture, the ballast often overheats, causing the light to shut off. The bulbs and the fixture must also match in frequency, or the ballast becomes overworked and overheated.

Other Questions
(6) Mention the role of School Children to reduce nois Pollution List any five institutions or organizations that are combating against human trafficking . Write a success story of any one of them. Breast milk is naturally formulated to meet the nutritional needs of a growing infant.a. Trueb. False los tipos de historias Hello pls Asap plsssss The coastal ocean zone and estuaries are alike in that both are important as breeding and nesting areas for birds. True or fualse? The Junior class has raised4/7of the amount of money that is needed for the Junior-SeniorProm, and the Senior class has raised 3/11 of the amount of money that is needed. Estimatewhat portion of the money the two classes have already raised of the moneyA.1/4 of the moneyB.all of the moneyC.1/2 of the moneyD.3/4 of the money Please help me find what type of chemical reaction takes place from numbers 1-5. In which type of economy do the forces of supply and demand typically drive prices?A. a market economyB. a traditional economyC. a planned economyD. a command economy explain why USA and Russia were not part of the league complete explanation please Glucose is soluble in water. Why is cellulose, which is made up of glucose, insoluble in water? The equation of the line in this graph. how is the profession of the the gandharvas falling at risk ? suggest ways how it could be revived. What is the difference between glucose and ATP? (1 point)ATP is only a usable form of energy, but glucose can be used and stored.Glucose is only a storable form of energy, but ATP can be used and stored.ATP is a storable form of energy, while glucose is a usable form of energy.o Glucose is a storable form of energy, while ATP is a usable form of energy. what would the equation, slope, and point be for this graph? Gena wants to estimate the quotient of 21.87 divided by 4.79. Which expression shows the estimate using front-end estimation? Describe an English lesson that you reallyenjoyed.You should say:where and when it took placewho the teacher waswhat you did in the lessonand explain why you enjoyed it so much Why was adapting the Articles of Confederation difficult?A there was no Supreme Court B partisan differences made rulings difficult C there were not specific rules outlining how to making adaptationsD it required approval from each state What are the zeros of the polynomial function f(x) = x3 10x2 + 24x?