....................................................................................................

....................................................................................................

Answers

Answer 1

Answer:

......................

..............

......

....

...

..

.


Related Questions

HELP ME PLEASE

explain 2 threats to data that can arise when a pc is not connected to the Internet​

Answers

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.


[tex]{\huge{\underline{\bf{\pink{Question}}}}}[/tex]

: Given a matrix, we need to count all paths from top left to bottom right of MxN matrix. You can either move down or right.​

Answers

Answer:

[1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

Based on the information given, the correct option will be [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

A matrix simply means a set of numbers that are laid out on rows and columns. The numbers in matrix can represent either data or mathematical equations

It should also be noted that matrix can be used as way of providing quick approximation of calculations.

In conclusion, the correct option is [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

Learn more about matrix on:

https://brainly.com/question/1821869

Match each type of option on the left with a corresponding function on the right.

Answers

Answer:

yes. the above is correct

Explanation: q posted

Answer: Anwer is correctly shown!!!!!!!!

Explanation:

HOPE IT HELPS Y'ALL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

In the program to evaluate passwords, you gradually built a message to display to the user. What did you add to the end of each message string to start each message on a new line?

message = message + "Your password needs an uppercase letter. _____ "

\endline

\e

\n

\newline

Answers

You need to add \n to start a new line

The option that one need to add to the end of each message string to start each message on a new line is \n.

What is a message string?

This is known to be a kind of running aspect of text messages that relates to one topic or any question.

Based on the program written above, the option that one need to add to the end of each message string to start each message on a new line is \n as it is the one that will give the best result.

Learn more about program  from

https://brainly.com/question/1538272

#SPJ2

what is Q-Basic statement​

Answers

A statement (for the QBASIC) is a set of instructions written by using keywords or commands of QBASIC. Every programming language uses keywords as a statement with certain syntax. The statements are the first stored in the memory and executed only when the RUN command is given

what hash format are modern windows login passwords stored in?

Answers

User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.

What are the windows?

Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.

A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.

Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.  

Learn more about the windows, refer to:

https://brainly.com/question/13502522

#SPJ5

What does

mean in computer science

Answers

Answer:

i think the answer is a character or characters that determine the action that is to be performed or considered.

Explanation:

hope this helps

a data visualization tool that updates in real time and gives multiple outputs is called

Answers

Answer:

A data dashboard

Explanation:

A data visualization tool that updates in real time and gives multiple outputs is called data dashboard.

Why is data dashboard required?

A data dashboard is a tool that many businesses use to monitor, examine, and present data—typically to acquire understanding of the general health of an organisation, division, or particular procedure.

Businesses utilise an interactive analytical tool called a data dashboard to analyse and monitor the effectiveness of their plans using high-quality KPIs.

These tools give businesses access to real-time data so they can extract useful insights and guarantee ongoing growth.

Making it simpler for data analysts, decision-makers, and everyday users to understand their data, acquire deeper insights, and make better data-driven decisions is the main goal of a data analytics dashboard.

Data dashboard is a term used to describe a real-time updating, multi-output data display tool.

For more details regarding a data dashboard, visit:

https://brainly.com/question/29854747

#SPJ6

Y’all got your tickets for Spider-Man No Way Home? I do

Answers

Answer:

IS IT THE NEW MARVEL MVOIE

Explanation:

The WordPress Widgets submenu is located where on the WordPress site?


Themes

Appearances

Background

Customize

Answers

Answer:

Appearances

Explanation:

In your dashboard, click on Appearance → Customize → Widgets. Choose the location where you'd like to place the widget on your site. Common options here include the Footer and Sidebar, but this may be different depending on your theme..

Go to Appearance > Widgets in the WordPress Administration Screens. Choose a Widget and either drag it to the sidebar where you wish it to appear, or click the widget, (select a destination sidebar if your theme has more than one) and click the Add Widget button.

[ RevyBreeze ]

what types of activities are ideal for a robot to perform?

Answers

The type of activities that are ideal for a robot to perform are; Repetitive tasks

Robots are machines that are programmable by a computer which have the capacity of automatically carrying out a complex series of actions.

Now, robots are used in a wide array of industries which include manufacturing, assembly and packaging, transport, earth and space exploration, e.t.c.

The most common use are found primarily in the automobile industry where they are used to carry out repetitive tasks and those that are difficult or hazardous for humans.

Read more about robots at; https://brainly.com/question/9145476

what is control structure write it's types​ .

Answers

Answer

Defination-:

A control statement is a statement and a statement whose execution its control.

Types-:

Selection StatementIteration StatementUnconditional branching Statement

algorithm to find the difference between two numbers second number is greater than first
Plzzz solve this problem ​

Answers

Answer:

You should concentrate yourself

Explanation:

1=x

2=y

x<y

hence proved solved thank me later

I'm confused as to if subclasses can call the supers without any implementation and what the right answer is

Answers

Answer:

E

Explanation:

Since Example1 and Example2 inherit from Example0, all classes have the method doNothing() at their disposal, so you can call it from e0, e1 and e2.

However, the arguments of this method are Example1 and Example2, so you cannot pass Example0 as a first argument, and you cannot pass Example0 or 1 as a second argument. That only leaves answer E.

You can call the inheritance relation an "is a kind of" relation. So Example1 is a kind of Example0, and Example2 is a kind of Example1, but also Example2 is a kind of Example0.

Now you can understand why e2 can be passed as an argument for Example1, because e2 is a kind of Example1.

What is the maximum possible value of num after the code has been run?

Answers

Answer:

the maximum value from the first line is 20 - 0 = 20

and from the second 20-5 and 20+5 so the maximum is 25

Where are 'if' and 'else' statements shown when printing a document in a word processor?

Answer the question and then your task is to:

Write an algorithm or sequence of instructions that include the IF statement for the document being printed.

Answers

Explanation:

cpt price

given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list. do not modify play_list.

Answers

Answer:

new_list = play_list[0:4]

Explanation:

new_list = play_list[0:4] is an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list.

What do you mean by an expression?

A syntactic item in a programming language that may be evaluated to discover its value is known as an expression in computer science. Statement, a grammatical construct that has no meaning, is frequently contrasted with expression.

It is a grouping of one or more constants, variables, functions, and operators that the programming language interprets and calculates (in accordance with its own principles of precedence and association). For mathematical expressions, this procedure is known as evaluation.

In straightforward contexts, the outcome is typically one of several primitive kinds, such as a complex data type, a complex data string, a complex data Boolean type, or another type.

A function, and hence an expression that contains a function, may have side effects in many programming languages. Normally, a side effect-containing phrase lacks referential transparency. Expressions can be converted into expression statements in various languages by adding a semicolon (;) at the end.

Learn more about expression, here

https://brainly.com/question/16804733

#SPJ5

Why there should be laws against using phones and

driving?

Answers

Answer:

There should be laws against using phones & driving because you can get into an accident & you are not paying attention to the road & it's surroundings.

Explanation:

It is for your safety & other peoples safety around you.

What are some of the restrictions to muscle wire?

Answers

Answer:

Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.Although thin and lightweight, one of the most amazing things about Muscle Wire is that they can lift many times their weight and are able to do 100 times more work per cycle than the human muscle. This material is easy to use, small in size, operates silently, has a high strength-to-weight ratio, and is easily activated using AC or DC power. This technology is ideal where mechanics require minimization, such as electronic textiles projects, robotics or nano-applications.Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.

Q44. Cell A20 displays an orange background when its value is 5. Changing the value to 6 changes the background color to green. What type of formatting is applied to cell A20

Answers

The type of formatting that is applied to cell A20 is called conditional formatting.

Conditional formatting in Excel Sheet enables an easier method of highlighting noteworthy cells or ranges of cells, displaying data by employing data bars, color scales, and icon sets that match particular variations in data.

A conditional format modifies the look of cells based on the conditions you set. The cell range will be formatted provided that the conditions are true; if otherwise, it will be false and the cell range will not form.

Learn more about conditional formatting here:

https://brainly.com/question/25051360

what is the full form of BASIC​

Answers

Answer:

BASIC, in fullBeginner's All-purpose Symbolic Instruction Code, computer programming language developed by John G.

Not every design choice in your game interface requires having a thought process behind it.
True
False

Answers

Answer:

true

Explanation:

cause every design have it's own thought process and we also have our choice

Answer:

true

i agree with the person that answerd

Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.

Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.

How should Jacob format the Notes Master so it will be most helpful to his audience?

Do not include a slide image, leaving the maximum room to take notes.
Do not include a notes pane because graphics do not need to be annotated.
*Make the slide image large so the charts can be seen clearly.
Make the text pane large so the audience can draw their own charts.

Answers

Answer:

C. Make the slide image large so the charts can be seen clearly.

Explanation: Edg

What is my mistake on this code? (Python)

Answers

Answer:

Explanation:

bakugo;sup shoto i didnt know you go on here too

the coding has no problems just go and get deki kaminary

Draw truth table for the following logic circuit:

(Please I really need help with this)

Answers

Keep Scrolling! :D

[tex] \rule{999pt}{66646pt}[/tex]

PLEASE ANSWER (CODING IN PYTHON)


Ask what kind of pet the user has. If they enter cat, print “Too bad...”, if they enter

dog, print “Lucky you!" (You can change the messages if you like). Once this works,

add other pets. (Iguana, Pig, Rabbit...)

Answers

Answer:

Explanation:

a = input("what kind of pet the user has")

if a == 'cat':

  print("Too bad")

elif a == 'dog':

   print("Lucky you!")

The program based on the information is given below.

What's the program about?

def main():

   pet = input("What kind of pet do you have? ").lower()

   if pet == "cat":

       print("Too bad...")

   elif pet == "dog":

       print("Lucky you!")

   elif pet == "iguana":

       print("That's interesting!")

   elif pet == "pig":

       print("Oink oink!")

   elif pet == "rabbit":

       print("Hop hop!")

   else:

       print("I'm not familiar with that pet.")

if __name__ == "__main__":

   main()

Learn more about program

https://brainly.com/question/26642771

#SPJ2

Which string method returns true if the character is a numeric character?
letter = input("Enter a letter: ")

A. isDigit(letter)
B. isdigit(letter)
C. letter.isDigit()
D. letter.isdigit()

Answers

Answer:

It is D. letter.isdigit()

Explanation:

reason being is that there is only very few scenarions that require a capital letter in them and most of those that have scenarions are to input a operation into the program.

In the given options, the method that will return true when an input charater is a numeric is optionC. letter.isDigit()

Methods In Programming

Basically what this function does it to check whether the input variable letter is a numeric character, if true then the function returns true.

Hence, the functions input parameter is a string and it returns and boolean

it should be noted that there is a sligth difference between and method and a function in programming.

Learn more about programming here:

https://brainly.com/question/1538272

The voltage/potential difference in a circuit is 12 volts, calculate the current that is flowing through the circuit if the resistance is 48 Ohms.

Answers

Current (I) = 0.25 ampere (A)

Power (P) = 3 watt (W)

Current (I) = 0.25 ampere (A) Power (P) = 3 watt (W) Steps: I = V R = 12 volt 48 ohm =  0.25 ampere (A) P = V2 R = (12 volt)2 48 ohm =  3 watt (W)

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

Can someone plss help me!!

Answers

Answer:

HTML elements are delineated by tags, written using angle brackets.

Explanation:

Tags such as <img /> and <input /> directly introduce content into the page.

Other Questions
What is the equation of a line that is perpendicular to the line y = - 1/2 x + 1 and passes through the point (8, - 1)? A y = 1/2 x + 8 B y = 2x - 17 C y = 1/2 x 2 D y = 2x - 1 Q). A man x. He gave half of it to his wife, 1/4th to his son and 1200 of his daughter. Form an equation and also find x. A block has 73 kg is being pushed and accelerated at rate of 10 m/s. what force is being applied to the block?730 N7.3 N7300 N730 Kg What message is the film The Birth of a Nation trying to convey? Choose the angle which is represented by the name.RUN and NUG what causes did abolitionists support besides ending slavery? solve similar triangles (advanced) Which graph represents the solution of the inequality |3x+12| 3? DOMThe weight of a car is modeled with the polynomial 3x2 25x + 204. The weight of a truck is modeled with the polynomial x + 17x + 40What polynomial represents the total weight of the car and truck? How do you find the slope of a line given any 2 points on the line What is the area of 2.4 Read the following paragraph: "People with disabilities are worried about the push to ban plastic straws. Non-plastic straws pose a number of problems for disabled users. Metal ones are too rigid for people who have trouble moving their head or hands, Metal straws can also damage the teeth of anyone with limited control of their jaws. Paper straws fall apart, especially in hot beverages, which makes them impractical for people who have to drink slowly." Which choice below is the topic sentence? Metal ones are too rigid for people who have trouble moving their head or hands. Metal straws can also damage the teeth of anyone with limited control of their jaws. Paper straws fall apart, especially in hot beverages, which makes them impractical for people who have to drink slowly. Non-plastic straws pose a number of problems for disabled users. Which signs need an AGENT marker? Help me solve these Gas grills are on sale 20% off. The sale price of the grill that I like is $399.20. What was the original price of the grill? 30 points She's only filled with an old blind wish.It isn't even hers but came to herin the rainor the soft wind,which is a gate through which her life keepswalking.She can't seeherself apart from the rest of the worldor the world from what she must doevery spring.Crawling up the high hill,luminous under the sand that has packedagainst her skin.she doesn't dreamshe knowsshe is a part of the pond she lives in,the tall trees are her children,the birds that swim above herare tied to her by an unbreakable string.The Turtle,Mary OliverIn your poem, you should use visual elements to separate ideas. Which three visual elements does this excerpt of The Turtle include? Check all that apply.capital letters to start each sentencea break between stanzaslines that are all the same lengthpunctuation such as periods and commaslines that each contain a complete sentence read the excerpt from harrison bergeron. a police photograph of harrison bergeron was flashed on the screenupside down, then sideways, upside down again, then right side up. this excerpt is an example of satire because it humorously: Fill out the 8 questions thanks! Which of the following resulted in the acceptance of Christianity?Christians stopped meeting secretly in Rome.Christians began worshiping the gods of Rome. Constantine converted to the religion before becoming the emperor of Rome.The bishop of Rome became seen by many people in the West as the head of the religion. why do the noble gases have relatively low electron affinities?