Answer:
A and B
Explanation:
A. The CPU is bad
B. the CPU is not supported by the BIOS
there are 2048bytes in4megabytes true or false
Answer:
FALSE IS THE ANSWER.
I HOPE IT IS HELPFUL
An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this.
What is the mostly likely way the attacker has been able to modify the price?
A. By using SQL injection
B. By changing hidden form values in a local copy of the web page
C. By using cross site scripting
D. There is no way the attacker could do this without directly compromising either the web server or the database
Draw an electic bettle and label 3.
Explanation:
hope it helps thank you❤
Which of the following is the BEST example of the principle of least privilege? Correct Answer: Wanda has been given access to the files that she needs for her job. Correct Answer: Mary has been given access to all of the file servers. Correct Answer: Jill has been given access to all of the files on one server. Correct Answer: Lenny has been given access to files that he does not need for his job.
Answer: Wanda has been given access to the files that she needs for her job.
Explanation:
The principle of least privilege is when a user is only given the minimum level of permissions that he or she needs to perform a particular job function. This helps in reducing the risk of attackers having access to data.
The best example of the principle of least privilege is Wanda has been given access to the files that she needs for her job. Given access to all of the file servers or access to all of the files on one server is incorrect.
Answer:
Wanda
Explanation:
Reason being is that least privilege gets only the things you need for the job, nothing more or less.
who was dobri dobrev?
Answer:
Dobri Dimitrov Dobrev, better known as Grandpa Dobri, Elder Dobri or The Saint of Bailovo, was a Bulgarian ascetic who walked over 20 kilometres each day to sit or stand in front of the Cathedral of Alexander Nevsky in Sofia to collect money for charitable causes.Answer:
He was bulgarian ascetic who walked over 20 kilometres each day to sit or stand in front of the Cathedral of Alexander Nevsky in Sofia to collect money for charitable causes. Elder Dobry has been raising money for decades to restore churches throughout Bulgaria.Dobrev donated all the money he collected to charities, orphanages, churches, and monasteries.
(101101+10110) /110
101101-11001/101 please I need help
Answer:
000000000000000000000000000001111111111111111111
What should Iris obtain from the client in order to display the work in her portfolio?
Answer:
depends on the laws of the country in which you are working
Explanation:
This is very vague and usually depends on the laws of the country in which you are working. In some cases, Iris would need permission from the client in order to display the work. In other cases, Iris would not need anything because she is the original creator of the content. This mostly depends on the laws of the country and whether or not a specific contract was created between Iris and the client, stating if the content rights where transferred or not.
Write a HTML code for displaying the following
i need an answer urgently
Answer:
Following are the code to the given question:
Explanation:
<html>
<body>
<p align="center" >VOCATIONAL SUBJECT</p>
<table align="center" border="2">
<tr>
<td rowspan="2">YEAR</td>
<td colspan="5">Vocational course</td>
</tr>
<tr>
<td rowspan="1">IT</td>
<td rowspan="1">CS</td>
<td rowspan="1">EL</td>
</tr>
<tr>
<td colspan="1">2016</td>
<td colspan="1">66</td>
<td colspan="1">68</td>
<td colspan="1">60</td>
</tr>
<tr>
<td colspan="1">2017</td>
<td colspan="1">77</td>
<td colspan="1">78</td>
<td colspan="1">80</td>
</tr>
<tr>
<td colspan="1">2018</td>
<td colspan="1">60</td>
<td colspan="1">67</td>
<td colspan="1">70</td>
</tr>
</table>
</body>
</html>
Two uses of mortise chisel
Answer:
Two uses of the mortise chisel are;
1) Mortise chisel are used for cutting across the grain of the wood directly and also
2) To lever waste materials out of the cut area and smoothen the cut area
Explanation:
A mortice is a recessed hole created in a part that is meant to accommodate a complementary projection part, which will enable the fastening of the two parts together
A mortise chisel are chisels used for the chopping out mortise joints, and are designed such that the heavy impact of a mallet
A Python keyword ______________.
can be user defined
cannot be used outside of its intended purpose
can only be used in the comments section
can be used anywhere in a Python program
Answer:
cannot be used outside of its intended purpose.
Explanation:
In many programming languages, keywords are special and reserved words that are used for specific and specified purposes. They have special meanings and cannot be used outside their intended purposes.
Keywords cannot be used as variable names, identifiers or functions.
In Python, some of such keywords include;
i. True
ii. False
iii. for
iv. while
v. break
vi. continue
vii. if
viii. else
ix. def
x. pass
what are the other way of getting website static
Answer:
Explanation: Jekyll. Jekyll is far and away the most popular static site generator. ...
Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites
and Hugo
I hope this help =D
Answer:
Ten Static Website Generators
Jekyll. Jekyll is far and away the most popular static site generator. ...
Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites. ...
Hugo. ...
Octopress. ...
Pelican. ...
Brunch. ...
Middleman. ...
Metalsmith.
The step-by-step procedure to solve any problem is called an
Answer:
Algorithm
Explanation:
Name the function for output in python.
Answer:
We use the print() function to output data to the standard output device (screen). We can also output data to a file, but this will be discussed later. An example of its use is given below.
Answer:print()
Explanation:As said above. Print is what we use in python (:
To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on the Arduino board.
Answer bobobobobobobobo
¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?
Answer:
Asimétrica
Explanation:
Los algoritmos de encriptación sirven para que solo el destinariario y receptor de los datos logren acceder a la información, es decir que inmediatamente que es enviada la información, solo puede ser legible para quien tenga un código de acceso, al mismo quien envía necesita una clave diferente para enviar lo datos. es un algoritmo asimétrico porqué el emisor y el receptor usan claves diferentes de encriptación.
write an algorithm and draw a flowchart to count the digits present in the given integer.
Answer:
The algorithm is as follows:
Input number
count = 0
while(number not equal 0)
number = number / 10
count = count + 1
end
Print count
Explanation:
This gets input for the integer number
Input number
This initializes count of digits to 0
count = 0
The following loop is repeated while number is not 0
while(number not equal 0)
This performs integer division of the number by 10; the resulting division is saved in variable number
number = number / 10
The count variable is incremented by 1
count = count + 1
The loop ends here
end
This prints the count of integers
Print count
See attachment for flowchart
PLEASE READ ( if you want ) Before i used to have over 30 brainliest and i was just trying to earn points so i could get to ace, and people went through my profile and reported a ton of the things i answered so all of them got deleted. Now i only have 8 brainliest and i need 15. What am i supposed to do? It's causing me to lose points and brainliest. Ive lost 22 BRAINLIEST. its so annoying D: what do i do
Answer:
Rip! Do you have any idea why they're doing it? Are there things wrong with your answers or are people purposefully targeting you? And if so have you tried reaching out to staff?
What are the best editing apps?
Answer:
Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt.
Explanation:
Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt are the best editing apps. Some of the apps are present as free while some of them are not available without paying money for it. These are the top best editing apps so you can use it anyone of it. Snapseed is free on iOS and Android whereas Lightroom needs $5 per month for full access. Adobe Photoshop is also free on iOS and Android.
Answer:
After effects or alight motion on mobile are pretty good
Explanation:
can you help me here please
Explanation:
1) ethiCal : he is a good person to be socialized .
unethical : he should not trust the people so easily that he have never met and gave the password to them
2) ethical: she is a good girl to login in time and kepp only respected points
unethical : she should have Ateach her friends that they should not fight and discuss the right answer correctly
What are the uses of DVD Ram
Answer:
Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.
It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.
Answer:
A. after you've created the presentation.
Explanation:
A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.
Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.
Steeler corporation is planning to sell 100,000 units for 2.00 per unit and will break even at this level of sales fixed expenses will be 75,000 what are the company's variable expenses per unit
Answer:
1.25 per unit
Explanation:
Number of units to sell = 100,000
Price per unit = 2
Fixed expense = 75000
At break even point :
Revenue = total expenses
Total expenses = fixed cost + variable cost
Let variable cost = x
Revenue = units to sell * price per unit
Revenue = 100,000 * 2 = 200,000
Hence,
Fixed cost + variable cost = Revenue
75000 + x = 200,000
x = 200, 000 - 75000
x = 125,000
Variable cost = 125,000
The variable expense per unit is thus :
Variable expense / number of units
125,000 / 100,000 = 1.25 per unit
i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?
Answer:
In theory yes it is gonna be pretty hard but it is very possible
¿Cómo sobrevivirían las personas, sin gas, agua, luz, teléfono, ni internet?
Eles nao tinham Condiçoes de vida e sem a agua nao consiguem Sobreviver porque agua é tudo e a agua é metade da nossa vida
IT technicians are setting up a new file server for a school. Describe the benefits and
drawbacks of using a command line interface (CLI) rather than a graphical user interface
(GUI) to set up a new file server.
Answer:
The benefits of using the command line interface for setting up a file server are;
1) The command line interface (CLI) is faster than other interfaces and can easily handle tasks which are repeating such as creating folders for users on the server
2) The CLI requires less time for processing with the CPU, and it takes up less memory such that the file Server is not slowed down during the file setup process
3) The system resources required are few
The drawbacks are;
1) The CLI is confusing to those who are not exposed to programming as the commands the user needs to learn to before they can setup setup the new file server
2) The users needs to be very accurate in terms of spelling errors as that will lead to failure of the program, there are no spell check, and a mistype can lead to the entire coding process being restarted from the beginning
Explanation:
The cultivation in mountain areas, with their scattered plots of usable land at various altitudes with different climates, landscapes and little margin for mechanization, are managed by family farms in the most efficient and effective way.
Answer:
Mountain farming
Explanation:
Mountain farming is done in hilly areas of the mountains. It is mainly family farming. The mountain farming is mainly done in the mountains where the paddy fields are scattered and the limited use of the usable lands are available.
It is cultivated in different types of climatic conditions or landscapes with limited use of mechanization or machines. The mountain farming is maintained by the family farms in an effective way.
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the unshielded twisted pair patch cable runs 75 feet from the wall outlet and then passes through the ceiling and over several florescent light fixtures before reaching the client system.
Which of the following is the MOST likely cause of the connectivity problem?
A. Crosstalk.
B. EMI interference.
C. Failed patch cable.
D. The UTP cable does not support transmission distances of 75 feet without signal regeneration.
E. Attenuation.
Answer:
D. The UTP cable does not support transmission distances of 75 feet without signal regeneration.
is the most likely cause of the connectivity problem.
Explanation:
hope it will help you
what do you mean by professional education? explain with examples.
Answer:
prfesssional education is any programs that improve the knowledge,skills and attitudes.
Example include; educational course and training to become a teacher,nursing course,aeronautics engineering,etc.
Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.
Answer:
They are inappropriate
fallouts: Access denial and data theft
Explanation:
Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.
Access denial and data theft are the fallouts associated with DOS and DDos attacks
Use______ to format cells when they meet a certain criteria.
data calculations
conditional formatting
data formatting
data input