Answer:
a) Application software
d) Lady Augusta Ada Lovelace
b) (it may be versatility
You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem
Answer:
Key escrow.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.
Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.
Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
4) Programming a) WAp to find the greatest number among any three numbers.
def comp_num (num1, num2, num3):
try:
if num1 > num2 and num1 > num3:
print ( "{0} is the biggest".format(num1) )
elif num2 > num1 and num2 > num3:
print ( "{0} is the biggest".format(num2))
elif num3 > num2 and num3 > num1:
print ( "{0} is the biggest".format(num3))
except ValueError:
return "Invalid input"
num_1 = int (input (" Please enter a number: "))
num_2 = int (input (" Please enter a second number: "))
num_3 = int (input (" Please enter a third number: "))
print (comp_num (num_1, num_2, num_3))
Answer:
this is in qbasic programming
What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>
Explanation:
the output password is isalpha()
what do you mean by automation and diligence with respect to a computer??
Answer:
Delegince computer without any motion resists
What is the Sparklines group for in Excel? to place charts in individual cells working with hyperlinks selecting font styles or themes formatting the appearance of the cells or tables
Answer:
A sparkline is a tiny chart in an Excel worksheet cell that provides a visual representation of data.
An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?
Answer:
Data and Insights
Explanation:
In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.
Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.
Thus the answer is 'data and insights'.
What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?
Answer and Explanation:
Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.
Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.
A transition is ________.
Answer:
the process or a period of changing from one state or condition to another.
Explanation:
"students in transition from one programme to another"
20 points!!!!! Plz answer quickly
Answer:
other words are not clear
Bruce frequently works with a large number of files. He is noticing that the larger the files get, the longer it takes to access them. He suspects that the problem is related to the files being spread over the disk. What utility can be used to store the files contiguously on the disk
The utility that could be stored for the files is disk defragmenter.
The following information related to the disk defragmenter is:
In the case when the program saved the file on the disk so here the file should be put onto the empty space. It considered all the parts & pieces on each and every file and the same should be stored in one place.Also, the programs should be kept in one place, and the space that is not used should be on the hard disk.Therefore we can conclude that The utility that could be stored for the files is disk defragmenter.
Learn more about the disk here: brainly.com/question/12656426
Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?
Answer:
The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT
Explanation:
The negative impacts of Internet of Things IoT devices on users are
1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices
16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.
Answer:
A) A function can hold multiple return statements, but only one return statement executes in one function call
Explanation:
This is because each function can only return one value, whether it be an integer, String, or other object.
However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.
Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.
Hope this helps!
The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.
The following information should be considered:
This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.Therefore, we can conclude that option A is correct.
Learn more about the function here: brainly.com/question/12431044
Portable computer, also known as laptop computer, weighing between 4 and 10 pounds is called a. Internet b. Scanner c. Printer d. Notebook computer
Explanation:
portable computer also known as laptop computer weighting between 4 to 10 pounds is called a Notebook computer.
A java program is composed of data members and functions.
true or false ?
Answer:
true
Explanation:
You make a purchase at a local hardware store, but what you've bought is too big to take home in your car. For a small fee, you arrange to have the hardware store deliver your purchase for you. You pay for your purchase, plus the sales taxes, plus the fee. The taxes are 7.5% and the fee is $20. (i) Write a function t(x) for the total, after taxes, on the purchase amount x. Write another function f(x) for the total, including the delivery fee, on the purchase amount x. (ii) Calculate and interpret (f o t)(x) and (t o f )(x). Which results in a lower cost to you
Answer:
[tex]f(x) = 1.075x[/tex]
[tex]t(x) = x + 20[/tex]
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]
[tex](t\ o\ f)(x) = 1.075x + 20[/tex]
Explanation:
Given
[tex]Tax = 7.5\%[/tex]
[tex]Fee = \$20[/tex] -- delivery
Solving (a): The function for total cost, after tax.
This is calculated as:
[tex]f(x) = Tax *(1 + x)[/tex]
Where:
[tex]x \to[/tex] total purchase
So, we have:
[tex]f(x) = x * (1 + 7.5\%)[/tex]
[tex]f(x) = x * (1 + 0.075)[/tex]
[tex]f(x) = x * 1.075[/tex]
[tex]f(x) = 1.075x[/tex]
Solving (b): Include the delivery fee
[tex]t(x) = x + Fee[/tex]
[tex]t(x) = x + 20[/tex]
Solving (c): (f o t)(x) and (t o f)(x)
[tex](f\ o\ t)(x) = f(t(x))[/tex]
We have:
[tex]f(x) = 1.075x[/tex]
So:
[tex]f(t(x)) = 1.075t(x)[/tex]
This gives:
[tex]f(t(x)) = 1.075*(x + 20)[/tex]
Expand
[tex]f(t(x)) = 1.075x + 21.5[/tex]
So:
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]
[tex](t\ o\ f)(x) = t(f(x))[/tex]
We have:
[tex]t(x) = x + 20[/tex]
So:
[tex]t(f(x)) = f(x) + 20[/tex]
This gives:
[tex]t(f(x)) = 1.075x + 20[/tex]
We have:
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex] ---- This represents the function to pay tax on the item and on the delivery
[tex](t\ o\ f)(x) = 1.075x + 20[/tex] --- This represents the function to pay tax on the item only
The x coefficients in both equations are equal.
So, we compare the constants
[tex]20 < 21.5[/tex] means that (t o f)(x) has a lower cost
What method is used to prevent the random number generator from always starting with the same number?
seed()
random()
randint()
initialize()
Answer:
seed()
Explanation:
Since computer random isn't actually random, and is a predetermined sequence of numbers, seed() allows us to create different sequences of numbers, and thus more randomized numbers.
Hope this helps!
Answer:
the answer is seed()
Explanation:
i took the assignment
If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?
Answer: be nice no matter how mean or rude the person is.
Explanation: because if you’re not you can get in big trouble or fired.
Answer:
remain calm during the conversation
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario
Answer:
Social Engineering Attack
Explanation:
The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.
read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering
Lmk if this helps! :)
write any five main features of fourth generation of computer?
write a program in python to make the figure:-
*
**
****
********
****************
********************************
The first and correct answer will be marked as brainliest......
Answer:
Halo mateeeee
look it will be hard to explain the code and steps to you so just refer this video. .
it will help a lott
( *cries* Serena left Ash In pokemon s19 with a k I s s)
https://youtu.be/rUy_Nq9DHTs
please help me with this this is Computer chapter Advanced HTML of class 8th
Answer:
ok let me try
It stands for
Hypertext Markup Language
Image result for html stands for
HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.
You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing
Explanation:
denial of service attacks (dos)
Based on the above, the kind of attack the person is most likely experiencing is known as jamming.
What is Electronic jamming?This is known to be a kind of electronic warfare that is the use of jammers that shows interfering signals toward an enemy's system and thus it often blocks the receiver.
Therefore, Based on the above, the kind of attack the person is most likely experiencing is known as jamming.
Learn more about jamming from
https://brainly.com/question/17488276
#SPJ9
Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT
¿Cuál es la ventaja principal de una tabla dinámica?
Explanation:
Ventajas de las tablas dinámicas de Excel:
Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.
What is a monitor?
i can ask everyone
Answer:
a screen which displays an image generated by a computer.
Explanation:
A monitor is a piece of computer hardware that displays the video and graphics information generated by a connected computer through the computer's video card. Monitors are similar to TVs but usually display information at a much higher resolution. Also unlike televisions, monitors typically sit atop a desk rather than being mounted on a wall.
How to execute python code in command prompt *window*?
Iam using sublime text 3 and want to execute my python code in command prompt.
This is my current build system:
{
"cmd": ["python", "$file"],
"selector": "source.python",
"file_regex": "^\\s*File \"(...*?)\", line ([0-9]*)"
}
But I want my program to open in command prompt window and show the result there. I dont want to see the result in sublime text. Please help.
Answer:
Open Command Prompt and type “python” and hit enter. You will see a python version and now you can run your program there
It is used to select specific menu options, drag and drop options and to draw something on screen.
Answer:
A mouse.
Explanation:
An input device can be defined as any device that is typically used for sending data to a computer system.
Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.
Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).
Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.
A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.
The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
Answer:
True.
Explanation:
A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.
Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.
Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.
Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.
When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class
Answer:
provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified
Explanation:
I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.
How can computer be beneficial in agriculture and tourism
The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.