Answer:
top-down processing.
Explanation:
Discussion Topic 2 Using complete sentences post a detailed response to the following. How do you manage your online presence? What kind of sites are you most active on, and what steps can you take to manage your image on these sites better?
NEED HELP ASAP WILL GIVE BRAINIST TO BEST AWNSER
Answer:
bro
Explanation:
This is an opinion thing; you answer what you do! But if your search history takes a turn...
EDUCATIONAL SITES THAT HELP YOU UNDERSTAND TOPICS MORE
can you edit header or footer? if yes, how
Answer:
It depends on the type of document you are trying to edit, but normally you can edit the header/footer.
Explanation:
For docs, you just double click near the top/bottom of the page.
The storage capacity of Go ogle drive can be increased from ____________.
a. 5GB to 15 GB
b. 15GB to 1TB
c. 100GB to 30TB.
Answer:
c. 100GB to 30TB
Explanation:
Please mark me as brainliest and hope this helps :)
Answer:
The answer is C.
Explanation:
The storage capacity of Go ogle drive can be increased from 100GB to 30TB.
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.
That is calld a bruteforce attack
Study the graph and answer the questions. The numbers on the left side of the graph are in thousands.
The Past: In 1971, integrated circuits had about
transistors.
Answer:
2012 4,500,000,000
Explanation:
:) :P
Answer:
100 thousand
Explanation:
Which sentence describe internet safety precautions?
Which sentences describe Internet safety precautions? It is advisable to install anti-virus software on your computer. You should use strong passwords for your Internet accounts. In addition, you should avoid sharing personal information over the Internet.
#hope it helps ^_^
mark me as brainliest please
The sentence describe internet safety precautions are it is advisable to install anti-virus software on your computer. You should use strong passwords for your Internet accounts. In addition, you should avoid sharing personal information over the Internet. Therefore, option C, D and E are correct.
What are internet safety precautions ?Over the internet, your computer can be attacked in a variety of ways. Viruses and spyware can delete files and allow criminals to search your computer for sensitive information. Your computer could even be compromised.
It is recommended that you install anti-virus software on your computer. For your Internet accounts, you should use strong passwords. You should also avoid sharing personal information over the Internet.
Thus, option C, D and E are correct.
To learn more about the internet safety precautions, follow the link;
https://brainly.com/question/12276583
#SPJ2
The _____, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.
Answer:
I am pretty sure it is the RSA
Explanation:
In order to communicate over the Internet computers send small bits of data called ______ to eachother.
Answer:
communication
Explanation:
............
The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Enter global configuration mode, Enter interface configuration mode, Enable the interface, Verify the interface is disabled.
The appropriate configuration step and command to connect a workstation to the switch are:
Enter global configuration mode: config t.Enter interface configuration mode: int fa0/0.Enable the interface: no shut.Verify the interface is disabled: show interface statusWhat is a command?A command can be defined as a set of instructions that are typically used to configure a network device such as a switch, so as to enable it perform certain tasks automatically during network communication.
In Computer networking, commands can be used to ensure the interfaces (ports) on a switch are active and open for connections from other network devices such as:
WorkstationRouterRead more on switch here: https://brainly.com/question/13243868
Similarities between master file and reference file
Explanation:
What is a master file?
A collection of records pertaining to one of the main subjects of an information system, such as customers, employees, products and vendors.
What is a reference file?
A reference file is a type of overlay
Biometric authentication can’t be reset. TRUE or FALSE
Answer:
True
Explanation:
Once it's breached, it's breached forever
lmk if this helps
Which of the following tabs on the Ribbon contains the commands for adding tables, pictures and shapes into a publication? Question 19 options: Insert Page Design Home Mailings.
Answer:
it is insert
Explanation:
What is by far the most popular dns server software available?.
Answer:
I use the server
8.8.8.8
and
8.8.4.4
Explanation:
BIND (Berkeley Internet Name Domain) is by far the most popular DNS server software available.
What is the BIND?BIND(Berkeley Internet Name Domain) is open-source software that executes the Domain Name System (DNS) protocols for the internet. It is widely used on Unix-like operating systems, including Linux and macOS, as well as on Microsoft Windows.
BIND is developed and sustained by the Internet Systems Consortium (ISC), a nonprofit organization that encourages the development of the internet.
It is the most widely deployed DNS software in the world and is used by many internet service providers, businesses, and organizations to manage their DNS infrastructure.
Thus, BIND (Berkeley Internet Name Domain) is by far the most widely used DNS server software.
To learn more about DNS server software click here:
https://brainly.com/question/13852466
#SPJ12
Reggie is having trouble signing into his email account at work. He picks up the phone to call someone in IT, and then checks the phone list to see who to call. Which IT area should Reggie call
The IT area that Reggie should call is called; Information Security
What are the functions of an Information Technology Department?The IT department that Reggie should call is called Information Security department.
This is because Information security protects sensitive information from unauthorized activities such as inspection, modification, recording, and any disruption or destruction.
The aim of this department is to make sure that the safety and privacy of critical data such as customer account details, financial data or intellectual property are safe.
Read more about information technology at; https://brainly.com/question/25920220
The mouse, keyboard, and speakers are some of the things that would be plugged into _____ on the back of the system unit
Answer:
USB PORT are on the back on the system case
What symbol should you look for to determine who owns the intellectual property of a website? the logo the web address the domain suffix the copyright symbol.
Answer:
the answer is d
Explanation:
took the test
Answer:
d
Explanation:
edge2023
if the bookstore sold 8 books for $66 at that rate how much was one book
$8.25
Explanation:
To find the amount of money one book costs, we have to divide 66 by 8.
66÷8= 8.25
1 book costs $8.25
Answer:
8.25$ per book
Explanation:
So, $66 for 8 books and we can get the rate by dividing 66/8 which gives us 8.25$
One method to delete a worksheet is to right-click on a sheet _______ and select Delete from the shortcut menu.
One method to delete a worksheet is to right-click on a sheet tab (name) and select Delete from the shortcut menu.
Ways to Delete a worksheet?The ways to delete a worksheet is that:
First you have to Right-click the Sheet tab and then click select. Delete.You can also select the sheet, and then later select Home ,Delete and lastly select Delete Sheet.A worksheet is known to be a sheet that is often used in creating preliminary plans, auxiliary inputs, notes, etc.
Learn more about worksheet from
https://brainly.com/question/25130975
After creating a webpage with html code, what do you need to do so that others can access it on the internet?.
After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.
What is internet?The meaning of the internet is the climate of the information based on World wide web network.
There is large network of computers connected together in offices or organizations to explore the internet.
The webpage formed using HTML code has to be uploaded on AFS. AFS is the platform everyone can view the content whichever is uploaded.
Thus, After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.
Learn more about internet.
https://brainly.com/question/13308791
#SPJ2
The goal of the step of the etl process is to take the source data from all the various sources and convert it into a single format suitable for processing.
It should be noted that goal of the Transform step of the ETL process is to take the source data from all the various sources and convert it into a single format.
What is ETL?ETL, can be explained as data integration process which make use of data from multiple data sources into a single one.
It stands for;
extract transformload,It turns all the various sources and convert it into a single format.
Learn more about ETL at;
https://brainly.com/question/24313597
How do you flatten a 2D array to become a 1D array in Java?
Answer:
With Guava, you can use either
int[] all = Ints.concat(originalArray);
or
int[] all = Ints.concat(a, b, c);
Explanation:
Use GUAVA
Select the correct answer. If a = 4, what is the value of the expression 12 - a/4 ? A. 1/2 B. 4 C. 11 D. 12
Answer:
C)
Explanation:
Because if 4 = A, then we're doing 12 - 4/4.
4/4 is equal to 1/1, which is equal to 1 as a whole number, and 12 - 1 is 11.
Suppose you have a multithreaded program with 3 threads. One thread spends most of its time in a busy waiting loop. The other two threads are tightly coupled so that they one thread is often waiting on the other. What kind of threads would provide the most efficient execution
The kind of thread that will give the most efficient execution in this scenario is the tapered thread.
What is a tapered thread?It should be noted that a tapered thread simply means a thread that simply tapers along the thread profile.
In this case, since a thread spends most of its time in a busy waiting loop while the other two threads are tightly coupled, then the tapered thread is appropriate.
Learn more about threads on:
https://brainly.com/question/25004623
Credit sales to customers are: ____________
a) Recorded using a Create Invoices window
b) Recorded in a Credit Card Sales window
c) Recorded using the Create Sales Receipts window
d) Recorded using the Enter Bills window
Answer:
C. Recorded using a Create Invoices window
Explanation:
Credit sales refers to the purchases made by customers for which payment is delayed. A reasonable payment delay allows customers to make additional purchases as delayed payments allow customers to generate cash with the purchased goods which in turn can be used to pay back the seller.
These are purchases made by a customer that do not require a full payment at the time of purchase.
Credit sales to customers are recorded using a Create Invoices window.
________ has the ability to drag windows to the edges or corners of your screen and have them snap into place.
Answer:
Snap Assist
Explanation
Snap Assist lets you snap a window to one side of your screen without having to move it around and resize it manually.
____________________ uses an algorithm to encrypt a ciphertext document from a plaintext document, and when the information is needed again, the algorithm is used to decrypt the ciphertext back into plaintext.
The Advanced Encryption Standard (AES), is a symmetric encryption algorithm and one of the most secure.
Choose the best answer from the options below to complete the following sentence.
Storage is different from RAM because for storage, information is _________, even if power is turned off.
preserved
temporary
deleted
unsaved
Answer:
its A. the answer to your question is preserved. :)
Answer:
A
Explanation:
How to get the id of a document in firebase in react.
Answer:I don’t know
Explanation:yea I don’t know you can get caught
What is the purpose of a return statement?
a
to pass a value from inside a function to the main program
b
to print a value to the user
c
to go back to the beginning of a loop
d
to begin printing on a new line
What is the purpose of a return statement?
a - to pass a value from inside a function to the main program
How many bytes does it take to represent a color in the rgb color model?.
Answer: 3 bytes
Explanation: Hope this helps if not sorry.