Answer: Data and Insights
Explanation:
Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.
Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions
"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.
Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.
⇒ There are two kinds of Buffer overflow attacks such as:
Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.Thus we can say that the correct answer is a Buffer overflow.
Learn more about Buffer overflow here:
https://brainly.com/question/4952591
What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?
Answer:
The file changes its location within your hard drive while the file itself remains unchanged
Explanation:
The file's location will change from C:\Users\username\Documents to
C:\Users\username\Pictures
You install Windows 10 on a new computer. You update the video card driver and restart the computer. When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result. You need to configure the video card driver. What should you do first
3. Remove the screws holding the GPU in on the rear bracket. ...
4. Unlock the PCI-e slot clip.
5. Remove the GPU by lightly pulling on the card.
6. Hover the GPU over PCI-e slot.
7. Push down on the GPU to slide the connector into the slot.
8. Ensure the secure lock clicks into place.
9. Screw the rear bracket down to secure the card to the chassis.
10. Connect any required PSU cables.
11. Reattach the side panel,
Now, all you need to do is to plug in the display connectors on the rear of the case, whether they're DisplayPort, HDMI, DVI, or VGA. After that, hit the PSU power switch and boot up Windows. If the PC does not turn on or no signals get sent to the monitor, we'll need to double-check that all cables are connected correctly (both inside and on the rear of the PC), and the GPU is seated properly in the PCIe slot.A team of architects is designing a new AWS environment for a company which wants to migrate to the Cloud. The architects are considering the use of EC2 instances with instance store volumes. The architects realize that the data on the instance store volumes are ephemeral. Which action will not cause the data to be deleted on an instance store volume
Answer:reboot
Explanation:
An objective of the __________ is to provide a standardized set of I/O interface routines to user processes. Select one: a. working directory b. file management system c. indexed file allocation d. file directory Clear my choice
Option b (file management system) is used to provide a set of input/output interface.
A software package that focuses on providing numerous user-friendly features including productivity applications as well as file manipulations, respectively, would be termed as the file management system.
The other given alternatives such as:
Option a (Working directory) - The directory users are functioning in at present.Option c (Indexed file allocation) - The techniques of assignment dictate how documents have been saved on a disc.Option d (File directory) - A file storage place on your desktop.These options are not connected to the given question. Thus the above answer is the correct one.
Learn more about the file directory here:
https://brainly.com/question/2170165
write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this
Answer:
The algorithm is as follows:
1. Start
2. bottles = 0
3. While bottles != 500
3.1 Create bottle
3.2 bottle = bottle + 1
4. Switch off machine
5. Stop
See attachment for flowchart
Explanation:
This begins the algorithm
1. Start
This initializes bottles to 0
2. bottles = 0
The loop is repeated until 500 bottles is created
3. While bottles != 500
This creates a new bottle
3.1 Create bottle
This increments the number of bottles by 1
3.2 bottle = bottle + 1
This switches of the machine after all bottles are created
4. Switch off machine
End algorithm
5. Stop
ou need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. Which type of wireless antenna should you use on each side of the link
Answer:
High-gain and directional wireless antenna.
Explanation:
WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.
This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. Generally, the standard range or distance covered by WiFi is about 50 meters (160 feet).
Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver through the use of an antenna.
In this scenario, you need to implement a wireless network link between two buildings on a college campus, which are 100 meters apart.
A high-gain antenna is an electromagnetic device that typically has a gain rating of 12dBi or sometimes higher. Also, a highly directional antenna can only receive radio signals from a specific direction and it compresses the radio waves that are being transmitted from a sender in to a very narrow beam.
Hence, the two (2) type of wireless antenna you should use on each side of the link are a high-gain antenna and a directional wireless antenna.
Câu 1: Đất trồng là môi trường?
A. Cung cấp chất dinh dưỡng, ôxy
B. Giúp cây đứng vững
C. Cung cấp chất dinh dưỡng, ôxy, nước
D. Câu B và C
Answer:
D
Explanation:
It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.
Answer:
Communication.
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.
Generally, the linear model of communication comprises of four (4) main components and these are;
1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.
2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.
3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.
4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.
Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.
Answer:
Lets us take k, m = 10, 40
q = 0
i = k
while i <= m:
if int(i*0.5)*2 == i:
q += 1
i += 1
The "muscles" of a computer are called the Central Processing Unit (CPU).
O True
O False
Answer:
false
Explanation:
What are the 4 similarities of CUI and GUI
Answer:
letter U and I.
Three Letters
1 consonant and 2 vowel
All are capital letters
PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!
can someone help me please?
Answer:
see below picture
Explanation:
You can work your way through the formula from the inside out, mapping every operation to a gate.
whats the recommended amount of dedodated wam
i can have in a server
Software that tries to monitor and track the way you use your computer.
Explanation:
that's called a virus, and it can do much harm to your softwares
From a dictionary, the literal meaning of virus is "a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data." Therfore, the answer is clearly virus.
Hope this helps! Have a great day!
what allows an individual or company to share a post with an audience however they are designed to be used with mobile devices and limit the size of posts
Answer:
Explanation:
The sending of messages via the Internet is known as e-mail. It is one of the most often utilised functionalities for sending text, files, pictures, and other attachments across a communications network.
A podcast lets a person or corporation to share articles with an audience, but it is geared for usage on mobile devices and has a capacity restriction.
Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comparisons between different values and not just relative comparisons. (c) the values being displayed have different units or very different magnitudes. (d) the reader need not differentiate the columns and rows.
Answer: (c) the values being displayed have different units or very different magnitudes
Explanation:
A table is refered to as an arrangement of data in rows and columns. Tables are used in research, communication, and data analysis.
Tables are used in the organization of data which are too complicated or detailed to describe and the use of table give a clearer description. Tables should be used when the values being displayed have different units or very different magnitudes. Tables can also be used in highlighting patterns or trends.
array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.
user_in = str ( input ("Please enter a phrase: " ))
def reverse_str (string):
e = 0
for e in range (len (string)):
x = -1
print string[x]
x += (len (string))
plz help me I need help
Answer:
false
because it was used for the local people to have a fast calculation skill. An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame. The abacus itself doesn't calculate; it's simply a device for helping a human being to calculate by remembering what has been counted.
(a) Rewrite the following using if else statement:
int x;
String s=(x%3=0)? “Divisible by 3" : "Not divisible by 3";
System.out.println(s);
Answer:
int x;
String s;
if ((x%3) == 0) {
s = "Divisible by 3";
} else {
s = "Not divisible by 3";
}
System.out.println(s);
Explanation:
A : B ? C generally translates to if (A) { B } else { C }.
Note the == to compare to 0. The single = in the original expression is a mistake.
what is the right thing to do when you spot fake news
Answer:
to tell the truth
Explanation:
l mean there is no reason to keep it secret
(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));
Answer:
Computer Applications
true
Answer:
Computer Applications
Explanation:
true
How should you behave in an online academic environment?
Answer:
as u want lol
I think it's funny
Answer:
Maintain discipline
Ask questions
Try not to crack jokes
dress smartly
be friendly
don't underestimate anyone each person have their own unique skills
Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!
Gently type on the keyboard.
Download software from the Internet without permission.
Turn the power off on the computer before shutting down.
Wash your hands thoroughly before using the computer.
Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.
Gently type on the keyboard.
Download software from the Internet without permission.
Turn the power off on the computer before shutting down.
Wash your hands thoroughly before using the computer.
Set your water bottle on a table that is away from hardware.
Answer
Wash your hands thoroughly before using the computer.
Gently type on the keyboard.
Set your water bottle on a table that is away from hardware.
Explanation:
List 10 different products made from timber
Answer:
Bath towels.
Toothpaste.
Nail polish.
Makeup.
Disinfecting wipes.
Medications.
Paints.
LCD screens.
Houses
Buildings
Explanation:
PLEASE ANSWER ASAP
Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].
Answer:
ENQUIRE database.
Explanation:
I am not sure but I guess this is the answer.
What does this mean
Don't use such phrases here, not cool! It hurts our feelings :(
Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
queries
forms
procedures
subroutines
Answer:
subroutines
Explanation:
subroutines is used in access to locate and retrieve data
The attacker sent data that was able to manipulate the return address that is reserved to store expected data
Complete Question:
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?
Answer:
A buffer overflow.
Explanation:
In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).
In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.
For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.
In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.
What defines interactive media? The user must play a role in writing the content of the media. The user must do something that determines what happens next. The user must help design the overall look and feel of the presentation. The user must provide feedback after using the media.
Answer:
What Is Interactive Media?
Interactive media is a method of communication in which the program's outputs depend on the user's inputs, and the user's inputs, in turn, affect the program's outputs. Simply put, it refers to the different ways in which people process and share information, or how they communicate with one another. Interactive media allows people to connect with others—whether that's people or organizations—making them active participants in the media they consume
Answer:
The user must do something that determines what happens next.
It is B.