Answer: library
Explanation:
A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.
It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.
An item that contains both data and the procedures that read and manipulate it is called a(n) ________.
Answer:
Object
Explanation:
An item that contains both data and the procedures that read and manipulate it is called an object.
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
Answer:
metasploit.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.
Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.
which one will be the correct answer
pls tell
Answer:
option c clean boot. it is correct.
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced
it.
True
Оr
False
Answer:
False
Explanation:
Digital learning tools are nowadays used In Education. Countries like Japan, China, India and Korea use computers and internet in their educational system.
Hope it helps!
Elabora un argumento sobre como nuestras acciones impactan en la calidad del aire y promueven acciones a favor del cuidado del ambiente y la salud
AYUDAAAAA!!!!!!!!
Reduzca la cantidad de viajes que realiza en su automóvil. Reduzca o elimine el uso de chimeneas y estufas de leña. Evite quemar hojas, basura y otros materiales. Evite el uso de equipos de jardín y césped que funcionen con gas.
#CarryOnLearningA company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used
Answer:
Hybrid cloud
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Infrastructure as a Service (IaaS).
2. Software as a Service (SaaS).
3. Platform as a Service (PaaS).
Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.
The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.
Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).
Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.
These are the different types of Platform as a Service;
1. Private PaaS.
2. Public PaaS.
3. Open PaaS.
4. Mobile PaaS.
5. Communications PaaS.
6. Hybrid PaaS.
A hybrid cloud combines both the features of a private and a public cloud to provide cloud-related services to the end users.
In this scenario, a company runs sensitive technologies locally while it entrusted technologies that are less sensitive to a broader user base.
Hence, the cloud delivery model which is being used here is a hybrid cloud.
The DuPage Freight Shipping Company charges the following rates: Weight of Package Rate per Pound 2 pounds or less $1.10 Over 2 pounds, but not more than 6 pounds $2.20 Over 6 pounds, but not more than 10 pounds $3.70 Over 10 pounds $3.80 Design a program that does the following: asks the user to enter the weight of a package and displays the shipping charges. 1. Prompt the user for the weight of a package 2. Determines the rate per pound in a getRate module 3. Calculates and displays the total shipping charge in a getTotal module Hint - you may want to use a global variable for this! Please submit three things:
Answer:
The program in Python is as follows:
def getRate(weight):
if weight<=2.0:
rate = 1.10
elif weight>2 and weight<=6:
rate = 2.20
elif weight>6 and weight<=10:
rate = 3.70
else:
rate = 3.80
return rate
def getTotal(weight,rate):
total = weight * rate
print("Total: ",total)
weight = float(input("Weight: "))
rate = getRate(weight)
getTotal(weight,rate)
Explanation:
This defines the getRate function
def getRate(weight):
The following if conditions determine the corresponding rate based on the value of weight passed to the function
if weight<=2.0:
rate = 1.10
elif weight>2 and weight<=6:
rate = 2.20
elif weight>6 and weight<=10:
rate = 3.70
else:
rate = 3.80
This returns the rate back to the main method
return rate
The getTotal module begins here
def getTotal(weight,rate):
This calculates the total charges
total = weight * rate
This prints the calculated total
print("Total: ",total)
The main begins here
This gets input for weight
weight = float(input("Weight: "))
This gets the rate from the getRate function
rate = getRate(weight)
This passes values to the getTotal function
getTotal(weight,rate)
Which type of attack cripples the network and prevents legitimate users from accessing network resources
Answer:
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.
Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.
1
What is a DDoS attack?
1.1 – Understanding a DDoS Attack
The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.
1.2 – What is the Goal Behind a DDoS Attack?
The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:
The website can become slow to respond to legitimate requests.
The website can be disabled entirely, making it impossible for legitimate users to access it.
Determine whether the phrase below is a sentence or a fragment.
While we were in Greece, we ate a lot of feta cheese.
a.
Sentence
b.
Fragment
what is computer engineering
Answer:
Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.
Explanation:
Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.
Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.
In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology
What is the ghosted text or picture behind the content on the page?
Answer:
Watermark
Explanation:
This is actually called a Watermark. It is usually used as a way of showing the name or logo of the author who owns the content that is underneath the watermark. This is done so that individuals cannot steal the owner's work and use it as their own. Usually, the owner has the original version of the content without any watermark, as well as individuals that have purchased the content or a licence to use the content for personal or commercial usage.
Write down the name of two attributes used along <img> tag.Single line text.
Answer:
SRC: it specifies the URL of the image
ALT: it specifies an alternate text for an image
Which is the most viewed vdo in YT ever?
Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system to support automated services, and __________ are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. A. contingent IDs, system accounts B. system accounts, contingent IDs C. systems administrator accounts, contingent IDs D. control partners, system accounts
Answer: B. system accounts, contingent IDs
Explanation:
Aside from human user types, there are non human user groups. Known as account types, (system accounts) are implemented by the system to support automated services, and contingent IDs are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. The system account is refered to as the user account which the operating system creates during installation.
Therefore, the correct option is B.
B2B partners often connect to each other on the Internet through special __________ designed to facilitate information exchanges and transactions. search engines web masters web portals web routes gatekeepers
Answer:
web portals
Explanation:
B2B (business-to-business) is a marketing strategy that deals with meeting the needs of other businesses, by selling products or services to the organizations for resale to other consumers, used in production of goods or for the operation of an organisation.
B2B (business-to-business) model focuses on facilitating sales transactions between businesses.
Under the B2B, the producer sells its products directly to other businesses such as wholesalers or retailers and not the end consumers.
B2B partners often connect to each other on the Internet through special web portals that are designed to facilitate exchange of information and simplified business transactions.
Additionally, a popular application of the seller-side marketplace model, which is a major business-to-business (B2B) e-commerce model, is e-procurement of goods through the use of web portals over the internet and as such eliminating the option of physical buying or procurement.
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?
Answer:
Explanation:
In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.
The Curtis Publishing Company's early marketing research efforts mainly had to do with _____. people who drove automobiles people who bought books people who read books people who bought automobiles
Answer:
people who bought automobiles
Explanation:
Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.
Cyrus H. K. Curtis was a publisher that founded and established the Curtis Publishing Company as a news magazine in 1891.
The Curtis Publishing Company's early marketing research efforts mainly had to do with people who bought automobiles in the United States of America.
plz help me to do 4 number
Answer:
A is an abbaccus. B is Blaze Pascal. C is The Jacquard Loom. D is Charles Babbage. E is The Manchester Baby.
Explanation:
when files on storage are scattered throughout different disks or different parts of a disk, what is it called
Answer:
File Fragmentation or Fragmented Files
open accomplishing your task I was able to
Answer:
WTH KINDA QUESTION IS THIS !
I DON'T UNDERSTAND DUDE
Why does a computer need programs?
application software can run without the presence of system software true or false
Answer:
false
...........
.....
Select all that apply: Our primary objectives in functional programming are: Group of answer choices Functions should be as pure as possible following a pattern of Input->Processing->Output To model algorithms in a state-machine like format Removing state from programming Modeling data into a fact-base to be queried Raising our abstraction towards math Code free of side effects Modeling data into classes/objects that intercommunicate to solve software issues
Answer:
Functions should be as pure as possible following a pattern of Input->Processing->Output
To model algorithms in a state-machine like format
Code free of side effects
Explanation:
Functional programming is a popular concept in most popular programming languages such as Lisp that makes use of functions in separating code that aims to define and solve a particular problem which is part of a bigger problem. Functional programming focuses on what to solve, ie what is the problem rather than how do we solve it. It divides up code in meaningful blocks that makes it a lot more understandable, allowing big problems to be solved in tiny bits and not an overwhelming whole. Functional programming adopts the state-machine like format as it makes use of input and alters state as necessary(not hard coded). It also removes side effects issues that may be experienced when a function affects or mutates variables(global variables) that may be outside its block.
Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community cloud in another province. She is investigating using the community cloud to supplement her private cloud workload during end-of-month processing. What operation is she going to perform
Answer:
The appropriate response is "Cloud bursting".
Explanation:
A strategy for the implementation of a program in a proprietary cloud or network infrastructure that explodes onto a public cloud if availability or production for computational power increases, could be considered Cloud bursting.It enables extra cloud capabilities throughout cases where additional facilities have been required.what is the term used to describe the situation when a derieved class provides a function already provided in the bae class
Answer:
The right approach is "Overriding".
Explanation:
The overriding function seems to be a programming application that enables a classroom as well as children to successfully implement some technique that's been given by another one of their parents or super classes.The overriding method must be named, signed, and parameter-like inside your parent process throughout the child one.Thus the above is the correct answer.
A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?
Answer:
Key escrow
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In conclusion, the option which the company should use is a key escrow.
Which practices promote efficient keyboarding? Check all that apply.
curving your fingers a little when you rest them lightly on the home keys
returning to the home key after you have typed another key
keeping your eyes on your hands when typing
working at a comfortable pace when typing
using your thumbs for the space bar
never using a shortcut
Answer:
Curving your fingers a little when you rest them lightly on the home keys returning to the home key after you have typed another key
Explanation:
It is important to position the fingers on the keyboard in such as way that they are prepared to move when selecting keys. The fingers should be slightly curved and the hands should be down
At the start of typing, the left fingers should be placed on the A, S, D, and F keys, while the right fingers should be placed on the J, K, J, and ; keys
Answer: both thumbs should be on the spacebar
Explanation:
If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the ____________________.
Answer:
attack vector
Explanation:
If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the attackvector.
A sponsored link was delivered 100 times, and 10 people clicked on it. Calculate the click-through rate.
Answer:
10%
Explanation:
100 / 10 = 10
You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal
Answer:
Answer would be, PSTN (public switched telephone network)