Answer:
User interface.
Explanation:
Click the crown at the top of this answer if this helped ;)
which type of network is the internet? choose the answer
Answer:
WAN or wide area network
Explanation:
The Internet is the most basic example of a WAN. It is connecting all computers together around the world.
The computer components that enables a computer to send and receive data, instructions or information from one or more computers or mobile device are
Answer:
communications device
Explanation:
Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
a. Test Sandbox
c. Test Sandbox
c. Full Sandbox
d. Partial Sandbox
e. Developer Pro
Answer:
c. Full Sandbox
d. Partial Sandbox
e. Developer Pro
Explanation:
Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
a. Test Sandbox
c. Test Sandbox
c. Full Sandbox
d. Partial Sandbox
e. Developer Pro
From the question, we are informed that Universal Containers wants to use a sandbox with real data in it. In this case I will recommend Full Sandbox, Partial Sandbox and Developer Pro.
Sandboxes. In cybersecurity sandbox can be explained as security mechanism that is utilized to separate running programs, and this is an effort utilized to curb system failure as well as software vulnerabilities to disperse.
Sandboxes are crucial when executing suspicious code, it helps to do this so that the host device is is not put to risk of harm. Since, Containers wants to use a sandbox with real data in it then the three types of sandboxes can be use.
✓Full sandboxes allows performance testing as well as staging it can be regarded as copy of production org, and these can be objects attachment and others
✓Partial Copy Sandbox can be allows copying of configuration and part of one's data, in order to allow new configuration testing with one's real data.
Chang investigates ways to improve the interactivity of computer hardware. His job title is best described as ✓ Computer and Information Research Scientist. Shay writes programs to make operating systems easier for people to use. Her job title is best described as ✓ Software Developer, Systems Software.
Dayna writes code for computer programs that allow people to communicate with each other. Her job title is best described as ✓ Software Developer, Applications
Answer:
B, D, C
Explanation:
got it right
Answer:
b d c
Explanation:
Memory cards from your cameras (SD cards) and flash drives are examples of __________.
Answer:
I think it's the example of
Explanation:
Data Storage.
SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts. Which of the following features makes this possible?
a. It used TCP as the underlying protocol.
b. It uses community string that is transmitted in clear text.
c. It is susceptible to sniffing.
d. It is used by all network devices on the market.
Answer:
b. It uses community string that is transmitted in clear text.
d. It is used by all network devices on the market.
Explanation:
SNMP is an acronym for Simple Network Management Protocol and it is a standard protocol which allows network administrators to manage network devices and client computers remotely.
SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.
The SNMP agent on a network device such as a router authenticates any SNMP Get requests that are being received from the network management software (NMS) using either the read-write or read-only community string.
The features which makes this possible are;
I. It uses community string that is transmitted in clear text.
II. It is used by all network devices on the market.
PLEASE HELP IN A HURRY
Universal containers set the organization-wide defaults for cases to private. When a case is escalated, case ownership changes to Tier 2 support agent. (Included) How can a system administrator give the sales operation team read/write access to all escalated cases?
Answer:
Create an ownership-based sharing rule.
Explanation:
Workflow management systems can be defined as a strategic software application or program designed to avail companies the infrastructure to setup, define, create and manage the performance or execution of series of sequential tasks, as well as respond to workflow participants.
Some examples of the various types of workflow management systems used around the world includes YAWL, Windows Workflow Foundation, Apache ODE, Collective Knowledge, Workflow Gen, PRPC, Salesforce.com, jBPM, Bonita BPM etc.
In this scenario, Universal containers set the organization-wide defaults for cases to private and when a case is escalated, case ownership changes to Tier 2 support agent. Thus, the system administrator should create an ownership-based sharing rule so as to give the sales operation team read/write access to all escalated cases. An ownership-based sharing rule is essentially based on the owner of a record (record owner) rather than the values of the record.
Which of the following statements is true about DVI connectors? *
Answer:
I think u had forgot to mention the statements.
Answer: they are digital and analog!
Explanation:
When using a powder actuated tool, ______
II. MULTIPLE CHOICE (five points each)
6. Units on the mechanical scale are marked off in:
a. Fractions and millimeters
b. Feet and inches
c. Inches and fractions
7. Units on the architectural scale are marked off in:
a. Fractions and feet
b. Scales and measuring devises
c. Feet and inches
8. Units on the civil scales are marked off in:
a. Whole numbers and feet
b. Whole numbers and fractions
c. Decimals with no fractions
9. The number zero is:
a. The end of the metric scale
b. The middle of the scale
c. The beginning of all scale
10. The metric scale is marked off in:
a. Both inches and fractions
b. Architectural units and metric
c. Meters
computing to your daily life.
3. Research the trend of BYOD in workplaces. Compare the advantages to any potential disadvantages.
Do you think more companies should adopt this policy? Why or why not?
Answer:
The explanation of the scenario would be described in the description paragraph below.
Explanation:
BYOD focuses on bringing smart equipment to that same position during which staff members work in that industry, such as connectivity to the corporation's information, technologies, and so forth. Everything just is becoming more and more widely known throughout traditional working environments
Advantage:
Whenever a corporation would be associated with the BYOD entire organization, this should greatly reduce the cost including its machines as individuals don't have to consider buying the others. Throughout relation to the purchase of their whole machines, staff members are significantly more likely to do just that.Disadvantage:
As top executives use their work computers, and it is also indeed very harder to monitor data protection throughout their handheld device, this makes Security another of the greatest drawbacks including its BYOD programs.Throughout my personal view, bringing your someone else's target demographic wouldn't have been acknowledged by the corporations. After all, although the corporation is following a client set of policies that the customer should be doing the project for the service provider as well as the corporation has to save another customer from either the worker because several employees want to initiate their organization.
Why did they removed the watch video button to view answers?
Answer:
Umm I’m not sure
Explanation:
2. True or False: You can create a network with two computers.
a. True
b. False
You can create a network with two (2) computers: a. True.
A network can be defined as a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together.
In Computer networking, a network design is also known as network architecture and it refers to an iterative process that involves the planning, topological design and implementation of a computer network infrastructure.
Basically, a network can be created by two (2) or more computer systems. Thus, a network designer can create a network with at least two (2) computers by connecting them together through a wired or wireless connection.
Read more on networks here: https://brainly.com/question/8808883
Rewrite the following condition to avoid a possible arithmetic exception:
if (Math.sqrt(x) < 3 && x > 7)
Answer:
if (x > 7 && Math.sqrt(x) < 3)
Explanation:
The previous condition checks if the square root of x is less than 3, but this would raise an error if x is a value equal to or less than 0.
So, the condition checks for the value of x before evaluating the square root after the AND operation to prevent an arithmetic exception.
Linette works in software development. She usually starts her day by meeting with the project manager to discuss the overall progress of the software. After that, she holds a meeting with the team of developers to hand out work based on upcoming deadlines and then goes on to help with overall development problems. Linette tries to end each day by sending an encouraging email to her team to remind them how appreciated they are. What is MOST likely Linette's job title?
A. Project Manager
B. Systems Designer
C. Lead Developer
D. Quality Assurance Specialist
Answer:
C
Explanation:
Lead developer.
What are the Edhesive 3.4 lesson practice answers
Answer:
import time
# Input yellow #
yellow = input("Enter yellow: ")
# If yellow #
if yellow == "yellow":
print("Correct")
else:
print("Nope")
Explanation:
How can injection attacks be prevented? Check all that apply
By Input validation and data sanitization injection attacks can be prevented. The correct options are a and d.
What is injection attack?Untrusted inputs or illegal code are "injected" into a programme during an injection attack and are then understood to be a query or command. As a result, the programme is changed and directed toward a malicious end.
enables an attacker to submit code to a web application that the web server will then locally execute.
This kind of attack takes advantage of the web application's inability to filter user-provided data before it is inserted into a server-side interpreted HTML file.
Injection vulnerabilities are often caused by insufficient user input validation. Attacks on data injection can be avoided by using input validation and data sanitization.
Thus, a and d are the correct options.
For more details regarding injection attack, visit:
https://brainly.com/question/15685996
#SPJ2
Your question seems incomplete, the missing options are:
Input validation
Flood guards
Log analysis systems
Data sanitization
What are two valid assignee options, when configuring case assignment rules?
a. User
b. Queue
c. Case team
d. Public Group
Answer:
a. User
b. Queue
Explanation:
Cases can be created manually or automatically. The case assignment rules assign cases regardless of how the case was created. It is used to determine how cases are assigned to users or put into a queue.
What type of technology we need to use in order to make sure that users can freely room from one room to another one without wi-fi being disconnected
Write a program to test the class LinkedBag. For example create a bag by asking the user for few names then 1.Put those names in the bag. 2. ask the user for a name and delete it from the bag. 3. ask for a name and check whether it is in the bag or not 4. print all names in the bag.
Answer: lolllllllllllllllllllllllllllllllllllllllllllllllllllllllll
Which of the following statements adds 21 days to the date in the dueDate variable below? var dueDate = new Date();?
a. dueDate = dueDate + 21;
b. dueDate = dueDate.getDate() + 21;
c. dueDate.setDate(21);
d. dueDate.setDate( dueDate.getDate() + 21 );
Answer:
dueDate.setDate(dueDate.getDate() + 21);
Explanation:
Given
The following declaration (in JavaScript):
var dueDate = new Date();
Required
Add 21 days to dueDate
Assume the date object is [mydate], the syntax to add [n] number of days to [mydate] in JavaScript is:
[mydate].setDate([mydate].getDate() + n);
In this question:
The variable is dueDate and the number of days is 21
Going by:
[mydate].setDate([mydate].getDate() + n);
The correct option is:
dueDate.setDate(dueDate.getDate() + 21);
Harlequin frogs are an endangered species that live in a small area of Costa Rica. The reasons for the species' decline is unknown. Scientists want to create a computer simulation of the frogs' environment and determine how best to protect the frogs.
Which of the following is NOT true about the scientists' simulation?
a. The scientists must be careful of how many variables they include in their simulation so they do not cause further harm to the frogs.
b. The scientists can try a variety of different simulations and analyze the data to see which one is the most effective.
c. Based on the results of the simulation, scientists can develop a plan to save the Harlequin frogs before they become extinct.
d. The scientists can incorporate other factors, such as square footage of protected land, in the simulation.
Answer:
a. The scientists must be careful of how many variables they include in their simulation so they do not cause further harm to the frogs.
Explanation:
It is not statistically accurate to assume that the number of variables included in the simulation would cause further harm to the frogs because we need to remember that a simulation is simply a computerized imitation of a real situation, which is usually not totally alike with a real process.
So in no way from a statistical standpoint, does the scientists' decision on the number of variables causes direct harm to the frogs.
Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N : Lather and rinse." num_cycles times, where N is the cycle number, followed by "Done.".
Answer:
Following are the code to the given question:
def shampoo_instructions(num_cycles):#defining a method shampoo_instructions that accepts num_cycles as a parameter
if num_cycles < 1:#defining an if block that num_cycles value is less than 1
print('Too few.')#print message
elif num_cycles > 4:#defining elif block that checks num_cycles is greater than 4
print('Too many.')#print message
else:#defining else block
N= 1;#defining N variable that holds a value 1
for N in range(N, num_cycles+1):#defining for loop that check value in range
print(N , ": Lather and rinse.")#print message
print('Done.')#print message
shampoo_instructions(2)#calling the method
Output:
1 : Lather and rinse.
2 : Lather and rinse.
Done.
Explanation:
In this code, a method "shampoo_instructions" is defined, that accepts a variable "num_cycles" in its parameter, and in the next step, the multiple conditional statements have used that check the "num_cycles" values which can be defined as follows:
The if the block checks the parameter value is less than 1, and it prints the value as the message. In the next step, the elif block is used that checks parameter value is greater than 4, and it prints the value as the message. In the else block, it uses the for loop that checks the value in the range and prints its value and calling the method.The cost to ship a package is a flat fee of 75 cents plus 25 cents per pound. 1. Declare a const named CENTS_PER_POUND and initialize with 25. 2. Get the shipping weight from user input storing the weight into shipWeightPounds. 3. Using FLAT_FEE_CENTS and CENTS_PER_POUND constants, assign shipCostCents with the cost of shipping a package weighing shipWeightPounds.
#include
using namespace std;
int main() {
int shipWeightPounds;
int shipCostCents = 0;
const int FLAT_FEE_CENTS = 75;
/* Your solution goes here */
cout << "Weight(lb): " << shipWeightPounds;
cout << ", Flat fee(cents): " << FLAT_FEE_CENTS;
cout << ", Cents per lb: " << CENTS_PER_POUND;
cout << ", Shipping cost(cents): " << shipCostCents << endl;
return 0;
}
Answer:
Replace /* Your solution goes here */
with
const int CENTS_PER_POUND = 25;
cout << "Weight(lb): ";
cin >> shipWeightPounds;
shipCostCents = FLAT_FEE_CENTS + CENTS_PER_POUND * shipWeightPounds;
Explanation:
This line declares and initializes CENTS_PER_POUND as constant integer to 25
const int CENTS_PER_POUND = 25;
This line prompts user for weight of shipment
cout << "Weight(lb): ";
This line gets weight from the user
cin >> shipWeightPounds;
This line calculates the cost of shipment
shipCostCents = FLAT_FEE_CENTS + CENTS_PER_POUND * shipWeightPounds;
In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:
So we can see that in the attached image we find the code that corresponds to the answer to this question.
Are analyzing the code informed in the question we can say that:
This line declares and initializes CENTS_PER_POUND as continual number to 25, the code that we have is:
const int CENTS_PER_POUND = 25;
cout << "Weight(lb): ";
cin >> shipWeightPounds;
shipCostCents = FLAT_FEE_CENTS + CENTS_PER_POUND * shipWeightPounds;
See more about computer at brainly.com/question/950632
Ann, a user, reported to the service desk that many files on her computer will not open or the contents are not readable. The service desk technician asked Ann if she encountered any strange messages on boot-up or login, and Ann indicated she did not. What is MOST likely occurred on Ann's computer?
Answer:
The computer has been infected with crypto-malware
Explanation:
From the question, we are informed about Ann, a user, reported to the service desk that many files on her computer will not open or the contents are not readable. The service desk technician asked Ann if she encountered any strange messages on boot-up or login, and Ann indicated she did not. In this case, What is MOST likely to occurred on Ann's computer is that the computer has been infected with crypto-malware.Crypto-malware can be regarded as one of the malware threats that very common, and very insidious compare to some malware because it can't be easily detected. It is known as one of the malware that steal data and can hide in background for long mining there
What is beryllium oxide?
a potentially toxic chemical found in thermal grease used for the processor’s heatsink
a nontoxic chemical found in the glass of cathode ray tube monitors
a potentially toxic chemical found in the plastic used to make a computer case
a nontoxic chemical used in the manufacturing of computer batteries
Answer: a potentially toxic chemical found in thermal grease used for the processor’s heatsink
Explanation:
Exposure to Beryllium oxide can lead to it being inhaled which can cause irritations to the nose, lungs and throat. If this exposure is prolonged, a more serious condition known as Berylliosis which can lead to lung damage. This makes it a potentially toxic chemical.
Beryllium oxide is useful in electronic production due to it having good thermal conductivity whilst also possessing good insulation properties in relation to electricity. This enables it to be used as a filler in thermal grease.
List 4 types of Data in excel
Answer:
four types of data in Excel are;
IntegerBoolean Character StringWhich type of books contains snapshots of steps that help to perform an activity?
Α. .
textbooks
B. online books
C. library books
D.
DIY books
E.
handbooks
Answer:
online book,,.........,.
All cells in row 2 through 5 are referred as 2:5 true or false
Explanation:
BRAINLIEST PLSSSSSSSSSSSSSSSSSSS