If you see or hear of information in the media or on the internet that you suspect is classified, what should you do?
Answer:
Do not comment on the information or discuss with unauthorized recipients.
Explanation:
As a rule, it is pertinent to have the knowledge that when working with information that are sensitive, one has to be very careful to know and understand what information to share , what not to share and who the recipient should be.
Unauthorized disclosure is when classified information are transfered to unauthorized persons or recipients. Classified information are information not meant for public knowledge which if disclosed, could undermine national security. To be a recipient of classified information, there must be an execution of approved non disclosure agreement, certification of favorable eligibility must be obtained and also possession of the need to know for the classified information.
What are the common operations performed on character strings?
•concatenation
• scanning
• substringing
• translation
• verification
if you want to remember means csstv;-)Brainly account. How to open?
Help me with this digital Circuit please
A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.
Thus, These circuits receive input signals in digital form, which are expressed in binary form as 0s and 1s. Logical gates that carry out logical operations, including as AND, OR, NOT, NANAD, NOR, and XOR gates, are used in the construction of these circuits.
This format enables the circuit to change between states for exact output. The fundamental purpose of digital circuit systems is to address the shortcomings of analog systems, which are slower and may produce inaccurate output data.
On a single integrated circuit (IC), a number of logic gates are used to create a digital circuit. Any digital circuit's input consists of "0's" and "1's" in binary form. After processing raw digital data, a precise value is produced.
Thus, A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.
Learn more about Digital circuit, refer to the link:
https://brainly.com/question/24628790
#SPJ1
How can we work together to fix problems with our websites?
i think this is or what hihi
Explanation:
The value proposition, or mission statement, tells the visitor what you do and why you do it.
Put your value proposition on your home page, in your headline if possible. Add it to your blog or about page. Let the visitors know exactly what they will be getting if they hire you, buy your product, subscribe to your newsletter or read your blog.
the documents created in ms-excel is call what?
Answer:
It is called a Spreadsheet
The documents created in MS-excel are called a workbook that is stored in the computer.
What is a workbook?A workbook in Microsoft Excel is a grouping of one or more spreadsheets, also known as worksheets, in a single file. The spreadsheet "Sheet1" from the Excel workbook file "Book1" is an example below.
The "Sheet2" and "Sheet3" sheet tabs are likewise present in our example and are a part of the same worksheet. It may include both worksheets and chart sheets, among other types of sheets.
A blank spreadsheet is shown along with the Excel Starter beginning screen. A spreadsheet is known as a worksheet in Excel Starter, and worksheets are kept in a file known as a workbook.
Therefore, workbooks are the name given to the documents created in Microsoft Excel and kept on the computer.
To learn more about the workbook, refer to the link:
https://brainly.com/question/18273392
#SPJ2
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Luke is setting up a wireless network at home and is adding several devices to the network. During the setup of his printer, which uses 802.11g standard, he finds that he can't connect to the network. While troubleshooting the problem, he discovers that his printer is not compatible with the current wireless security protocol because it is an older version of hardware.
What wireless network security protocol can Luke implement on the WAP so that the printer can connect to his wireless network?
Answer:
WPA2
Explanation:
The best wireless network security protocol for Luke would be WPA2. This is the latest security protocol version which brings with it extra encryption for a more secure connection. Aside from this WPA2 is backwards compatible with devices made for WPA. Therefore, it makes WPA2 the best solution for connecting the printer wirelessly to the network since it allows for 802.11g standard connection, the same as the printer.
1. What are the first tasks the Team Leader (TL) must perform after arriving at the staging area?
O A. Assign volunteers to specific positions and prioritize response activities.
OB. Gather and document information about the incident.
O C. Take the team to the most pressing need.
O D. Communicate with emergency responders to let them know the CERT is in place.
a software development management tool that easily integrates into his business’s enterprise software/information system
Answer:
Enterprise software/system
Explanation:
Enterprise software which is also known as Enterprise Application Software (EAS) is computer software that its primary function is to meet the needs of an organization rather than that of an individual.
EAS or Enterprise System is the software development management tool that easily integrates into a business' enterprise software system.
In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year
Answer:
In Python:
tuition = 7180
year = 2019
rate = 0.035
for i in range(2019,2027):
print(str(year)+": "+str(round(tuition,2)))
tuition = tuition * (1 + rate)
year = year + 1
Explanation:
This initializes the tuition to 7180
tuition = 7180
This initializes the year to 2019
year = 2019
This initializes the rate to 3.5%
rate = 0.035
This iterates through years 2019 to 2026
for i in range(2019,2027):
This prints the year and tuition
print(str(year)+": "+str(round(tuition,2)))
This calculates the tuition
tuition = tuition * (1 + rate)
This increments year by 1
year = year + 1
A developer is creating an application to track engines and their parts an individual part can be used in different types of engines. What data model should be used to track the data and to prevent orphan records?
Answer:
C
Explanation:
An orphan record are records that have been left out of the new system when a company changes its model of operation since they have no transition path. Therefore the best way to prevent this would be to create a master-detail relationship to represent the one-to-many model of engines to parts. This would allow these records to be captured and reprocessed into the new system that the company has moved to in order for them not to be left out.
where do you think data mining by companies will take us in the coming years
In the near future, the practice of companies engaging in data mining is expected to greatly influence diverse facets of our daily existence.
What is data miningThere are several possible paths that data mining could lead us towards.
Businesses will sustain their use of data excavation techniques to obtain knowledge about each individual customer, leading to personalization and customization. This data will be utilized to tailor products, services, and advertising strategies to suit distinctive tastes and requirements.
Enhanced Decision-Making: Through the use of data mining, companies can gain valuable perspectives that enable them to make more knowledgeable decisions.
Learn more about data mining from
https://brainly.com/question/2596411
#SPJ1
Which of these describes the majority of our space observations humans have utilized over the history of human space exploration?
A) Gamma ray telescope
B) Radio wave telescopes
C) Ultraviolet telescopes
D) Visible light observations
Answer:
D) visible light observatories
Visible light observations have guided our observations for thousands of years. All of the other technologies are much newer.
Explanation:
program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values
The followng program is capable or configuring a macro in excel
Sub MacroExample()
Dim A As Integer
Dim B As Integer
Dim C As Integer
' Set initial values
C = 0
A = 0
' Check if B is different from C
If B <> C Then
' Assign values to A
A = B
End If
' Display the values of A and C in the immediate window
Debug.Print "A = " & A
Debug.Print "C = " & C
End Sub
How does this work ?In this macro, we declare three integer variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.
If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed in the immediate window using the Debug.Print statements.
Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1
In cell D15, enter a formula using a counting function to count the number of cells in the Billable? column
The formula that could be entered as a counting function to count the number of cells would be COUNTA.
What formula can be used in cell D15?If you want to count the number of cells that are not empty in the Billable column, you can go to cell D15 and type in =COUNTA(.
After that, you highlight the entire Billable column from D2 to D14 and then close the formula and press enter. It will return the number of cells that are not empty.
Find out more on the spreadsheet functions at https://brainly.com/question/1395170.
Write a function to calculate the distance between two points Distance( x1, y1,x2.2) For example Distance(0.0,3.0, 4.0.0.0) should return 5.0 Use the function in main to loop through reading in pairs of points until the all zeros are entered printing distance with two decimal precision for each pair of points.
For example with input
32 32 54 12
52 56 8 30
44 94 4439 6
5 19 51 91 7.5
89 34 0000
Your output would be:__________.
a. 29.73
b. 51.11
c. 55.00
d. 73.35
e. 92.66
Answer:
The function in Python3 is as follows
def Distance(x1, y1, x2, y2):
dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5
return dist
Explanation:
This defines the function
def Distance(x1, y1, x2, y2):
This calculates distance
dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5
This returns the calculated distance to the main method
return dist
The results of the inputs is:
\(32, 32, 54, 12 \to 29.73\)
\(52,56,8,30 \to 51.11\)
\(44,94,44,39\to 55.00\)
\(19,51,91,7.5 \to 84.12\)
\(89,34,00,00 \to 95.27\)
You are reviewing the IP address associated to an alert generated by Microsoft Defender for Endpoint.
You need to identify the number of managed devices that successfully connected to the IP address during the previous 30 days.
Which section of the Microsoft 365 Defender portal can you use to identify the device?
The section of the Microsoft 365 Defender portal that can be used to identify the device is "Device inventory".
To identify the number of managed devices that successfully connected to the IP address during the previous 30 days, the device should be verified and traced. It is possible to determine the identity of the devices from which the alert was generated and to see their recent activity from the Microsoft 365 Defender portal.
The section of the Microsoft 365 Defender portal that can be used to identify the device is "Device inventory". Device inventory helps to understand the devices in your environment and any associated risk level.
Devices that are enrolled in a device management solution like Microsoft Intune or Configuration Manager, or that are running Windows 10 and later, can be viewed with the Microsoft 365 Defender portal. This helps to locate the assets that are most important to the organization and track their compliance.
The Device inventory section helps to track information such as device health, policies and configurations, vulnerability assessment results, and compliance level. This will help to know if the managed devices that are being monitored are meeting the compliance and security requirements of the organization.
In conclusion, the Device inventory section of the Microsoft 365 Defender portal can be used to identify the number of managed devices that successfully connected to the IP address during the previous 30 days.
For more such questions on Microsoft 365, click on:
https://brainly.com/question/30612299
#SPJ8
What does NOT match with Agile Manifesto?
Select the correct option(s) and click Submit.
Processes and tools over individuals and interactions
Working software over comprehensive documentation
Responding to change over following a plan
ent...
ed!
e Ai...
Contract negotiation over customer collaboration
Answer:
yes
Explanation:
James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. What can James use to wipe the data clean?
a. Zero-fill utility
b. Format the drive
c. ATA Secure Erase
d. Smash the USB drive
Answer:
C. ATA Secure Erase
D. Smash the USB drive
Explanation:
Zero fill utility is a specialized way of formatting a storage device particularly secondary storage such as hard disk, flash drive e.t.c. In this process, the disk contents are overwritten with zeros. Once this has been done, undoing is essentially hard but possible. In most cases, this might just mean that the data content is corrupt and as such might still be recovered, maybe not in its pure entirety.
Formatting the drive on another hand does not essentially mean cleaning the drive and wiping off data. It just means that operating systems cannot see those data contents anymore. They are still present in the drive and can be recovered.
ATA Secure Erase is actually a way of completely and permanently erasing the content in a drive. Once the function has been done, undoing is not possible. Both the data content and even the data management table will be completely gone.
Smashing the USB drive is the surest way of cleaning data as that will permanently destroy the working components of the drive such as the memory chip. And once that happens then there's no drive let alone its contents.
1) What is Database? List its Uses.
Answer:
a database stores a large sum of data
Explanation:
its used to keep track of things like student names bank accounts and other things
If a set of routers response to change in state of network slowly, then their routing table must be?
Explanation:
if its happen then i will wait for network
Explain why the scenario below fails to meet the definition of competent communication with a client about
website design.
Situation: Jim, an owner of a small business, wants a website to expand his business.
Web designer: "Jim, you have come to the right place. Let me design a website, and then you can tell me if it meets
your needs."
Answer:
The scenario fails to meet the definition of competent communication with a client about website design because the web designer does not engage in a proper dialogue with Jim, the client. Competent communication involves actively listening to the client, asking questions to understand their needs, and working collaboratively to develop a website that meets those needs.
In this scenario, the web designer is assuming that they know what Jim wants without seeking his input. Instead of having a conversation with Jim to identify his business goals, target audience, and design preferences, the web designer is proposing to create a website on their own and then ask Jim if it meets his needs.
This approach does not take into account Jim's unique needs and preferences, and it could result in a website that does not align with his business objectives. Competent communication requires a partnership between the web designer and the client, where both parties work together to create a website that meets the client's specific needs and goals.
Explanation:
______ is defined as the level of power and control that an individual has over their learning.
A.
Student agency
B.
E-Learning
C.
Educational agency
D.
Independence
Answer:
B, E-Learning
Explanation:
A standard method for labeling digital files is called a file-labeling what? Question 5 options: protocol tool setting configuration
Answer:What is the file-labeling protocol (standard method for labeling files)--protocol
Explanation:
Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N : Lather and rinse." num_cycles times, where N is the cycle number, followed by "Done.".
Answer:
Following are the code to the given question:
def shampoo_instructions(num_cycles):#defining a method shampoo_instructions that accepts num_cycles as a parameter
if num_cycles < 1:#defining an if block that num_cycles value is less than 1
print('Too few.')#print message
elif num_cycles > 4:#defining elif block that checks num_cycles is greater than 4
print('Too many.')#print message
else:#defining else block
N= 1;#defining N variable that holds a value 1
for N in range(N, num_cycles+1):#defining for loop that check value in range
print(N , ": Lather and rinse.")#print message
print('Done.')#print message
shampoo_instructions(2)#calling the method
Output:
1 : Lather and rinse.
2 : Lather and rinse.
Done.
Explanation:
In this code, a method "shampoo_instructions" is defined, that accepts a variable "num_cycles" in its parameter, and in the next step, the multiple conditional statements have used that check the "num_cycles" values which can be defined as follows:
The if the block checks the parameter value is less than 1, and it prints the value as the message. In the next step, the elif block is used that checks parameter value is greater than 4, and it prints the value as the message. In the else block, it uses the for loop that checks the value in the range and prints its value and calling the method.Why is it important to mark a starting point when checking reading rate?
to see how many lines were read
to count the number of words read
to review how many pages were read in one minute
to document how many minutes it took to read the paragraph
Answer:
B. To count the number of words read.
Explanation:
Reading speed is calculated by counting the number of words read on the page. The formula for calculating the reading speed is dividing the number of words in two lines by two. Then count the number of lines on the page and multiply by the number of words per line. Then calculate how long you read in sixty seconds.
It is important to mark a starting point when checking the reading rate to count the number of words read. Therefore, option B is correct.
Answer:
lol im just trying to pass LMOA
Explanation:
yo momma and B
explain the steps to adding a password in Smart Art
Answer:
To add a password to a SmartArt graphic in Microsoft PowerPoint, follow these steps:
Open the PowerPoint presentation containing the SmartArt graphic that you want to add a password to.
Select the SmartArt graphic by clicking on it.
In the ribbon at the top of the window, click the "Format" tab.
In the "Format" tab, click the "Security" button.
In the "Security" dialog box that appears, click the "Password" tab.
In the "Password" tab, enter a password in the "Password" field.
Re-enter the password in the "Confirm password" field to confirm it.
Click the "OK" button to save the password.
Save the presentation. The SmartArt graphic will now be protected with the password that you set. You will need to enter the password to edit or modify the SmartArt graphic.
PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
________________________________________
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses. ________________________________________
Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.
Write your pseudocode here:
________________________________________
Part 2: Code the Program
Use the following guidelines to code your program.
1. Use the Python IDLE to write your program.
2. Using comments, type a heading that includes your name, today’s date, and a short description.
3. Set up your def main(): statement. (Don’t forget the parentheses and colon.)
4. Conclude the program with the main() statement.
5. Include at least two print statements and two variables.
6. Include at least four input prompts.
7. Use concatenation to join strings.
8. Follow the Python style conventions regarding indentation in your program.
9. Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.
Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE.
When you submit your assignment, you will attach this Python file separately.
________________________________________
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.
btw don't talk unless you are answering the question
Answer:
i can only give you pseudocode my fren
Explanation:
# information about me
def main():
MyName = “malaki”
print(myName)
myInfo = “I was born in wichita, Kansas U.S. I live in japan. I love hotdogs.”
print(myInfo)
main()
sorry if this did not help :( i tried
In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.
What is pseudocode?Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.
Pseudocode is a description of the steps in an algorithm using simple or everyday language. In essence, a pseudocode uses straightforward (concise) words and symbols to summarize the steps taken during a software development process.
Consequently, the following are some characteristics of a pseudocode as the Pseudocode needs to be clear, Pseudocode ought to be ending. Executable pseudocode is required.
Therefore, In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.
Learn more about language on:
https://brainly.com/question/20921887
#SPJ2
What device that will have the most network ports.
Answer:
switch device
Explanation:
because its purpose is to connect many devices.
Answer: SWITCH DEVICE
Explanation: