Answer:
she is right or he :)
Explanation:
Answer:
well its somthing
Explanation:
Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.
Answer:
Use an encryption algorithm
Explanation:
An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.
Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.
Which computer can be used where there is no regular electricity?
Answer:
A mechanical computer
Explanation:
Created from gears and levers
ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use
Server and network is 2 different things, just put the server on a different network. ;) duh
Explanation:
What contains programming statement written in VB?
Answer:
A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.
Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone
write a c program to display the series: 1,8,27,64,125
num_list = [1, 8, 27, 64, 125]
for x in range ( len( num_list) ) :
print (num_list[x])
describe in detail what each step would look like if you ran into a software error.
Answer:
First you have to identify the problem.
Second Gather information.
Third iterate through potential solutions.
Fourth Test your solution.
Explanation:
There are many different ways to handle errors in software but this is the way I do it.
Hope this helps :)
After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.
Software ErrorA software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.
You can learn more about software errors here https://brainly.com/question/18497347
#SPJ6
You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.
Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients
configure network access policies on the RADIUS server
Explanation:
1. Answer the following questions: a. What are the different types of number system? Name them.
Answer:
binary,decimal, hexadecimal and octal number system
full form of ip ........?
Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)
A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.
The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.
What is resolution?Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.
When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.
Thus, the correct option is A. Some image resolution was lost while uploading it.
To learn more about resolution, refer to the link:
https://brainly.com/question/15189307
#SPJ5
Plz help help help
What was the first electromechanical digital computer?
For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me
Explanation:
For your kind information the answer of the question is MARK I.
Answer:
What was the first electromechanical digital computer?
=⟩ Mark I was the first electromechanical digital computer.
Hope it helpful to you
why the internet is not policed
Answer:
The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work
A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade
Answer:
A. Microsoft Office Remote Code Execution
Explanation:
From the given options, we have;
The web server having a SQL injection is infrequently use
The information on the website having SSL/TLS not used is promotional
The location of the server having a TLS downgrade is on a development network
The location of the Microsoft Office Remote Code Execution is on a human resource system test server
Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE, cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.
PLS HELP ME WITH MY PYTHON HW
Answer:
name=input('What is your name?')
age=input('What is your age?')
school=input('What is your school?')
print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')
age=int(input('What is your age?'))
if age > 10:
print('You are a teenager')
for x in range(10):
print(name)
country='United States or America'
print(country[17:24])
a_list = [0, 2, 4, 8]
maximum = max(a_list)
print(maximum)
minimum = min(a_list)
print(minimum)
numbers = [1, 3, 4, 2]
numbers.sort()
print(numbers)
Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings.
Answer:
memo
Explanation:
Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings
Helpppppppppppppphuhuh
Answer:
B
Explanation:
You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.
If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.
Your disaster recovery plan calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the least amount of backup media, but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the disaster recovery plan
Answer:
Perform a full backup once per week and a differential backup the other days of the week.
What does this mean? it is coming after i ask a question
Don't use such phrases here, not cool! It hurts our feelings :(
Answer:
To my own opinion I think it means that when you're answering a question here in brainly I think they are referring that your message is rude but sometimes you are not rude but I don't know. Maybe it could be some difficult technical problems.
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do
Answer:
log off of his account and log back in
Explanation:
The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.
tiền tệ ra đời là kết quả
bruuh, wht is this man saying
Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason
What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online
Answer:
any program designed to do harm.
Explanation:
Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.
What does RoHS stand for and why is RoHS compliance important?
Answer:
It stands for Restriction of Certain Hazardous Substances.
Web search says it is important because,
RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.
Explanation:
which of the following would not transmit signals from one point to another? a. telephone line. b. modem. c. fibre optics. d. coaxial cable
Answer:
b
modem
Explanation:
modem is used to receive signals not transmit
if ur computer is runing slowly what is most likey to slove the problem
Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END
Answer:
full and then I would like this
You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.
Answer:
I will choose a option tin best
Answer: Install a WorkGroup to allow each device to control what is shared and with whom.
Explanation:
What is the role of memory in a computer
Answer:
Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.
4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,
Answer:
[tex]\sigma_x = 5.68[/tex]
Explanation:
Given
[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]
Required
The standard deviation
First, calculate the mean
[tex]\bar x =\frac{\sum x}{n}[/tex]
So, we have:
[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]
[tex]\bar x = \frac{64}{8}[/tex]
[tex]\bar x = 8[/tex]
The standard deviation is:
[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]
So, we have:
[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]
[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]
[tex]\sigma_x = \sqrt{32.2857}[/tex]
[tex]\sigma_x = 5.68[/tex]