Answer:
Select the arrow next to the bullet list option in the Paragraph group.
Explanation:
This allows you to decide what shape of bullets you would like to have.
Hope this helps!
Note: I personally recommend using stars :)
please help me with this this is Computer chapter Advanced HTML of class 8th
Answer:
ok let me try
It stands for
Hypertext Markup Language
Image result for html stands for
HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario
Answer:
Social Engineering Attack
Explanation:
The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.
read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering
Lmk if this helps! :)
16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.
Answer:
A) A function can hold multiple return statements, but only one return statement executes in one function call
Explanation:
This is because each function can only return one value, whether it be an integer, String, or other object.
However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.
Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.
Hope this helps!
The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.
The following information should be considered:
This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.Therefore, we can conclude that option A is correct.
Learn more about the function here: brainly.com/question/12431044
When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class
Answer:
provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified
Explanation:
I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.
Encryption is a process
i. To hide the massage
ii. To decipher the massage
iii. To delete the massage
iv. None of them
Answer:
answer is i
Explanation:
jjgjnyjghjhkgukhi
Answer:
Encryption is a process by which we can conceal the original message (effectively hiding it)
Explanation:
We typically apply some kind of algorithm to encrypt a message. By doing this we are effectively hiding the original contents of the message so only the people with the appropriate secret key or knowledge of the algorithm can decipher it.
What is the purpose of requirements gathering and analysis?
Answer:
The purpose of Requirements Analysis is to discover unknown requirements, i.e., to turn unknown requirements into known requirements. Users' needs that were not expressed during requirements gathering and elicitation can be uncovered through Requirements Analysis.
Explanation:
what do you mean by automation and diligence with respect to a computer??
Answer:
Delegince computer without any motion resists
A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:
Answer: Computer's BIOS
Explanation:
Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.
The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.
How can computer be beneficial in agriculture and tourism
The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.
this help me please.
Answer:
1) 1011010
2) 1100100
3) 1010101
4) 23
5) 22
6) 24
You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem
Answer:
Key escrow.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.
Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.
Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe
Answer:
Backdoor
Explanation:
Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level
The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts
What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?
Answer and Explanation:
Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.
Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.
What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>
Explanation:
the output password is isalpha()
20 points!!!!! Plz answer quickly
Answer:
other words are not clear
Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT
The CPU is responsible for?
The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .
Ron is an electrician. He loves to work with wires and switches. What type of input does Ron carry when called for fixing an electric problem?
(Correct answer only)
A. tools
B. information
C. capital
D. people
E. power
Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.
Answer:
True
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.
If anyone knows how to use Access, how would I create a table like this one? (Add the fields in Table 2-29 Into the table and set field properties.)
Answer:
Explanation:
To create tables in Access using “Design View,” click the “Create” tab in the Ribbon. Then click the “Table Design” button in the “Tables” group. A new table then appears in the tabbed documents area. Type the name of a field into the “Field Name” column.
how are the computer classified into different types
Answer:
Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.ways you will use to reach all pupils who are living at a
disadvantaged area
Answer:
?
im confused
Explanation:
The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
Answer:
True.
Explanation:
A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.
Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.
Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.
Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.
1. .……............. can be considered as raw data.
(a) Sithum’s G.C.E. (O/L) examination results
(b) Z-Score of G.C.E. (O/L) examination results
(c) The average marks of students of G.C.E. (O/L) examination
(d) The top ten total marks of students of G.C.E. (O/L) examination
Answer:
(a) Sithum's G.C.E. (O/L) examination results
Explanation:
Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete
Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.
What is a monitor?
i can ask everyone
Answer:
a screen which displays an image generated by a computer.
Explanation:
A monitor is a piece of computer hardware that displays the video and graphics information generated by a connected computer through the computer's video card. Monitors are similar to TVs but usually display information at a much higher resolution. Also unlike televisions, monitors typically sit atop a desk rather than being mounted on a wall.
write a program in python to make the figure:-
*
**
****
********
****************
********************************
The first and correct answer will be marked as brainliest......
Answer:
Halo mateeeee
look it will be hard to explain the code and steps to you so just refer this video. .
it will help a lott
( *cries* Serena left Ash In pokemon s19 with a k I s s)
https://youtu.be/rUy_Nq9DHTs
If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?
Answer: be nice no matter how mean or rude the person is.
Explanation: because if you’re not you can get in big trouble or fired.
Answer:
remain calm during the conversation
You make a purchase at a local hardware store, but what you've bought is too big to take home in your car. For a small fee, you arrange to have the hardware store deliver your purchase for you. You pay for your purchase, plus the sales taxes, plus the fee. The taxes are 7.5% and the fee is $20. (i) Write a function t(x) for the total, after taxes, on the purchase amount x. Write another function f(x) for the total, including the delivery fee, on the purchase amount x. (ii) Calculate and interpret (f o t)(x) and (t o f )(x). Which results in a lower cost to you
Answer:
[tex]f(x) = 1.075x[/tex]
[tex]t(x) = x + 20[/tex]
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]
[tex](t\ o\ f)(x) = 1.075x + 20[/tex]
Explanation:
Given
[tex]Tax = 7.5\%[/tex]
[tex]Fee = \$20[/tex] -- delivery
Solving (a): The function for total cost, after tax.
This is calculated as:
[tex]f(x) = Tax *(1 + x)[/tex]
Where:
[tex]x \to[/tex] total purchase
So, we have:
[tex]f(x) = x * (1 + 7.5\%)[/tex]
[tex]f(x) = x * (1 + 0.075)[/tex]
[tex]f(x) = x * 1.075[/tex]
[tex]f(x) = 1.075x[/tex]
Solving (b): Include the delivery fee
[tex]t(x) = x + Fee[/tex]
[tex]t(x) = x + 20[/tex]
Solving (c): (f o t)(x) and (t o f)(x)
[tex](f\ o\ t)(x) = f(t(x))[/tex]
We have:
[tex]f(x) = 1.075x[/tex]
So:
[tex]f(t(x)) = 1.075t(x)[/tex]
This gives:
[tex]f(t(x)) = 1.075*(x + 20)[/tex]
Expand
[tex]f(t(x)) = 1.075x + 21.5[/tex]
So:
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]
[tex](t\ o\ f)(x) = t(f(x))[/tex]
We have:
[tex]t(x) = x + 20[/tex]
So:
[tex]t(f(x)) = f(x) + 20[/tex]
This gives:
[tex]t(f(x)) = 1.075x + 20[/tex]
We have:
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex] ---- This represents the function to pay tax on the item and on the delivery
[tex](t\ o\ f)(x) = 1.075x + 20[/tex] --- This represents the function to pay tax on the item only
The x coefficients in both equations are equal.
So, we compare the constants
[tex]20 < 21.5[/tex] means that (t o f)(x) has a lower cost
What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?
groups
tabs
sections
properties
Answer:
tabs
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.
The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.
A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.
Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.
Answer:
B, tabs
Explanation:
edge 2021
Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?
Answer:
The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT
Explanation:
The negative impacts of Internet of Things IoT devices on users are
1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices