_____ can be lost or stolen by cybercriminals. Select 2 options.Computer networksAntivirus softwareFree WiFiComputer devicesPortable devices

Answers

Answer 1

Answer:

Free WiFi

Computer networks

Explanation:

They cant really take your stuff they can only take virtual objects.


Related Questions

A pointing device used mainly for computer games is known as
A.stylus
B.Digitizer
C.joystick

Answers

Answer: Joystick is the only one that makes sense, a stylus and digitizer are both used on drawing tablets, not computer games.

A luxury can be defined as something that is an indulgence, rather than a necessity. Most people in the world would view items such as food, shelter, and water as necessities. In the United States, many would likely add electricity and indoor plumbing to that list. Today, many individuals are beginning to view Internet access as a necessity. But is it really a necessity—that is, essential for existence? If so, what about the individuals who do not have Internet access or those who choose not to use it? How might the perception of Internet access being or not being a necessity affect the growth of e-commerce?

Answers

Answer:

To improve the growth of e-commerce, internet access is a necessity.

Explanation:

The internet is an important tool for education and entertainment. It is a global network of thousands of computer networks connected to communicate and share information.

The concept of internet access as a necessity is majorly for remote workers, online education, bill payment and other e-commerce activities. This means that internet access is a necessity based on life-style choices.

Write a version of insertion sort where the in se rt function uses binary search. More precisely, to insert a value V in an array A where the part A[ : i] is sorted, the insert function will: - use binary search to find the position in A [ : i+1] where V needs to be inserted . move elements from that position one place to the right and insert v What is the complexity of this version of insertion sort: 0(n2) or Oinlogn)?

Answers

Insertion sort is a simple sorting algorithm that works by iteratively inserting elements into a sorted sub list. The basic version of insertion sort has a time complexity of O(n^2), where n is the number of elements in the array.


In the version of insertion sort where the insert function uses binary search, the process is slightly modified. Instead of comparing and shifting elements one by one to find the correct position for the new element, binary search is used to efficiently determine the correct position.

In summary, the version of insertion sort where the insert function uses binary search has a complexity of O(n*log(n)). This version can be more efficient than the basic version when dealing with large arrays, as the binary search step reduces the number of comparisons and shifts required.

To know more about Insertion visit:

https://brainly.com/question/33548077

#SPJ11

An expert system used on a medical website accepts an input illness from the user and produces a list of possible symptoms. What type of function is the interface engine performing?
A.
backward chaining
B.
production unit
C.
production rule
D.
forward chaining
E.
knowledge base

Answers

The answer is froward chaining

Answer:

The correct answer would be:

D.

forward chaining

#PLATOFAM

Have a nice day!

write a program in c language to generate following series :

1) 999 , 728, 511,.......upto 10th term

thank you​

Answers

Answer:

that is above the attachment

:)))

write a program in c language to generate following series :1) 999 , 728, 511,.......upto 10th term thank

In this exercise we have to have knowledge in computational language in C to write the requested code.

The code is found in the attached image.

We can write the code in a simpler way like:

#include<stdio.h>

#include<conio.h>

int main()

{

   int N, i;

   printf("Enter the value of N (limit): ");

   scanf("%d", &N);

   printf("\n");

   for(i=1; i<=N; i++)

   {

       if(i==N)

           printf("%d", i);

       else

           printf("%d,", i);

   }

   getch();

   return 0;

}

See more about C language at brainly.com/question/19705654

write a program in c language to generate following series :1) 999 , 728, 511,.......upto 10th term thank

Your ISP connects to the core routers of the Internet via a O backbone O satellite O cable mode Ospine​

Answers

Answer:

The ISP connects to the core routers of the backbone

one of the most common digital networks, it uses the full radio frequency spectrum to define channels

Answers

The digital network which uses the full radio frequency spectrum to define channels is referred to as Spread Spectrum.

What is Spread Spectrum? Spread Spectrum is a technique for spreading a signal over a wider bandwidth than that required for signal transmission. Spread spectrum is also used to prevent signal jamming and eavesdropping. Spread spectrum is used in a variety of communication applications, including military, personal communications, and cell phone networks, among others.

The purpose of spread spectrum is to enable the transmission of data over a wider range of frequencies, increasing the probability of successful transmission and minimizing the risk of data loss due to interference or other factors. It works by spreading the signal across a range of frequencies, rather than using a single frequency, allowing the signal to be transmitted over a wider area and at higher power levels than would otherwise be possible.

To know more about Spectrum visit:

brainly.com/question/32342688

#SPJ11

Which graphic file format would you choose if you needed to make an animated graphic for a website?

ai

png

gif

py
please help

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for this question is gif.

Gif is a series of images that are used as animated graphics for a website. A gif is the file format of an animated image. You may have seen many animated images on websites like stickers etc.

other options are not correct because:

ai: is adobe illustrator file format

png: png is an image file format but not for an animated image

py: py is a file extension of the python file.

Answer:

gif

Explanation:

what type of network hardware should you implement to prevent this from happening again?

Answers

I need to implement  network hardware called firewall. Firewall provide a barrier between your organization's network and public networks such as the Internet. It also prevent unauthorized access to an organization's private network.

What is network hardware and its types?

Network hardware, also known as network equipment or computer network devices, is the electronic devices required for communication and interaction between devices on a computer network. Specifically, it mediates data transfers in computer networks.

What are basic network hardware devices?

Routers, hubs, switches, and bridges are examples of network hardware devices. Basic device of a computer network is modem that allows your computer to connect to  Internet through a telephone line.

Network hardware that amplifies network signals is called amplifier. 

To learn more about Network hardware visit:

https://brainly.com/question/28040336

#SPJ4

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the Internet to provide users with Internet access. Since doing so, it has became to your attention an intruder has invaded your network from the Internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again?

Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which principal of programing should Alice review?

Hand coding
Line coding
Planning & Analysis
Sequencing

Answers

Answer:

Sequencing

Explanation:

I have taken the test

Authentication is concerned with determining _______.

Answers

Authentication can be described as the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology serves us to access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

There are three basic kind of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.

You can learn more about authentication at https://brainly.com/question/28398310

#SPJ4

What should be included in a publication or website after obtaining the right to use a graphic, text, or other item found on the Internet

Answers

Based on computer and media applications, the thing that should be included in a publication or website after obtaining the right to use a graphic, text, or other item found on the Internet is known as Reference

What is a Reference?

Reference is the act or action of mentioning it alluding to something. Usually, reference to literary or artistic work is considered a source to the origin of the work.

References do not cover unauthorized access. However, when a right to use work like publication, text, graphics, etc., is given, it is expected that the individual should provide references to the sources.

Hence, in this case, it is concluded that the correct answer is "Reference."

Learn more about Reference here: https://brainly.com/question/6260792

Theo would like to apply formatting to record data based on values in comparison with values in other fields. Which option should he use?

Conditional Formatting
Access Rules
Expression Builder
Field Validation Rules

Answers

Answer:

Conditional Formatting

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data when required or needed.

Conditional formatting is a feature found in a lot of spreadsheet software applications such as Microsoft Excel and it avails end users the ability to apply specific formatting options to cells based on certain defined criteria.

Basically, it is used for highlighting, emphasize, comparing or differentiating between data (information) stored in a spreadsheet document i.e data values that are lesser than or greater than a specificied value.

In this scenario, Theo would like to apply formatting to record data based on values in comparison with values in other fields. Thus, the option he should use is conditional formatting.

Answer:

A

Explanation:

ou are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. the students use the computers to search the internet for research paper content. the school budget is limited. which content filtering option would you choose?

Answers

The school budget is limited - Restrict content based on content categories

What is budget?
A budget is a calculating plan, typically financial but not always, for a specific time frame, typically one year or one month. Predicted sales and revenue amounts, resource quantities (such as time, costs, and expenses), environmental impacts (such as greenhouse gas emissions), other impacts, assets, liabilities, and cash flows are all possible inclusions in a budget. Budgets are a quantitative way for businesses, governments, families, and other groups to articulate their strategic plans of action. In a budget, intended expenses are expressed together with suggestions for how to fund them. A budget can show a surplus of resources for later use or a deficit if expenses are greater than income or other resources.

To learn more about budget
https://brainly.com/question/8647699
#SPJ4

what is a platform as a service paas quizlet

Answers

Platform as a Service (PaaS) is a cloud computing model that provides a platform and environment for developers to build, deploy, and manage applications without the complexity of infrastructure management.

On Quizlet, PaaS refers to a set of services and tools offered by cloud providers that enable users to develop, test, and deploy applications seamlessly.

PaaS offers a complete development and deployment environment, including infrastructure, runtime, and middleware components, allowing developers to focus on writing code and building applications rather than managing the underlying infrastructure. It provides a scalable and flexible platform for application development, offering features such as development frameworks, databases, operating systems, and web servers.

With PaaS, users can easily collaborate, integrate various services, and deploy applications across multiple platforms. It allows for efficient and rapid application development, reducing the time and effort required for infrastructure setup and configuration.

In summary, PaaS on Quizlet refers to the cloud-based platform and services that enable developers to build, deploy, and manage applications efficiently and effectively.

To learn more about Web servers - brainly.com/question/32142926

#SPJ11

Name the functional arms of MSDE.

Answers

Answer:

It is aided in these initiatives by its functional arms – National Skill Development Agency (NSDA), National Skill Development Corporation (NSDC), National Skill Development Fund (NSDF) and 33 Sector Skill Councils (SSCs) as well as 187 training partners registered with NSDC.

IM in high school (freshmen) and I started using brainly when I was in middle school, haven't made much friends but im ok with who I have! Anyways question is abt career management!
In Stage 2, the Thinking stage, John would probably:

Research ways to quit smoking.
Switch over to nicotine gum or e-cigs.
Blame it on pollution in the air
Admit he has a problem, but put off doing anything.

Answers

Answer:

My Spring 2018 Sabbatical Project was to study techniques and ideas of classroom management. The result was a set of documents and resources that I am placing here in blog format to easily share with my colleagues and any other interested party.

Comments and questions are welcome, and I will respond as time allows. Feel free to share these posts.

Sincerely,

Tracy Johnston

Palomar College Mathematics Department

Answer:

The more sane thing that he should do is to research ways to quit smoking.

Explanation:

Smoking is not good for you, nor are e-cigs

Nicotine gum is just as addictive and is quite expensive

There really isn't much pollution in the air, mostly allergens

You gotta do something, you'll die if you keep smoking/vaping or whatever he is doing

The base 10 number 18 is equal to which base 16 number?

10

12

14

16

Answers

Answer:

1 2 base 16

Explanation:

To convert to base 16 you divide the number with 16. 18/16=1 remainder 2;1 divide by 16 is =1

From bottom to top :1 2

helppppppppppp pleaseee​

helppppppppppp pleaseee

Answers

Answer:

Its a Printer

Explanation:

A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.5" by 11" sheets of paper. Printers vary in size, speed, sophistication and cost. ... The best-known non-impact printers are the inkjet printer and the laser printer.

This image clearly is a Printer

Please give brainliest

Answer:

Printer

Explanation:

Hi there!

We can see the paper in the bottom of the device, suggesting that it is a printer.

I hope this helps!

The two types of adjustments to net income for the indirect method are adjustments for.

Answers

components of net income that do not affect cash. changes in operating assets and liabilities during the period that affected cash and were not in the same income.

Spreadsheet functions are____
that perform specific calculations. Formulas are always preceded by ___

Spreadsheet functions are____that perform specific calculations. Formulas are always preceded by ___

Answers

Spreadsheet functions are pre-written formulas that perform specific calculations. Formulas are always preceded by an equal sign (=).

What is a Spread Sheet?

A spreadsheet is a computer program that allows you to compute, organize, analyze, and save data in tabular form. Spreadsheets were created as electronic counterparts to paper accounting spreadsheets. The software runs on data entered into table cells.

Spreadsheets are a vital tool in business and accountancy. They can be of varying complexity and used for a variety of purposes, but their fundamental function is to organize and categorize data into a logical structure. Once you've placed this information into the spreadsheet, you may utilize it to help manage and expand your business.

Learn mroe about SpreadSheet:
https://brainly.com/question/10509036
#SPJ1

A(n) ____________________ is a special character that can stand for any other character or, in some cases, a group of characters.

Answers

The answer is wildcard

When downloading a large file from the iniernet Alexis interrupted the download by closing ber computer, Later that evening she resumed tbe download and noticed that the file was bowniosding at a constant rate of change. 3 minutes since resaming the download 7440 total MegaBytes (MB) of the file had been downloaded and 6 mintues siace resuming the download 13920 total MesaBytes (MB) of the file had been donstoaded A. From 3 to 6 minutes after she resumed downlooding, how many minutcs elapod? misules b. From 3 to 6 minutes after she resumed downloading, how many total MB of the file were dowaloaded? MB c. What is the consuant rate at which the file downloads? MegaByes per minule d. If the file continues downloadisg for an additional 1.5 minner (after tbe 6 mimutes afts she feramed downloading). 4. How many aditipeal MB of the flie were downloaded? MIB 14. What is the new total number of MB of the file Bhat have been downloaded? MEI

Answers

a) From 3 to 6 minutes after resuming the download, 3 minutes elapsed.

b) From 3 to 6 minutes after resuming the download, 6,480 MB of the file were downloaded.

c) The constant rate at which the file downloads is 2,160 MB per minute.

d) If the file continues downloading for an additional 1.5 minutes, an additional 3,240 MB of the file will be downloaded.

e) The new total number of MB of the file that have been downloaded will be 17,160 MB.

a) From the given information, we can determine the time elapsed by subtracting the starting time (3 minutes) from the ending time (6 minutes), resulting in 3 minutes.

b) To calculate the total MB downloaded, we subtract the initial downloaded amount (7,440 MB) from the final downloaded amount (13,920 MB). Therefore, 13,920 MB - 7,440 MB = 6,480 MB were downloaded from 3 to 6 minutes after resuming the download.

c) The constant rate at which the file downloads can be found by dividing the total MB downloaded (6,480 MB) by the elapsed time (3 minutes). Therefore, 6,480 MB / 3 minutes = 2,160 MB per minute.

d) If the file continues downloading for an additional 1.5 minutes, we can calculate the additional MB downloaded by multiplying the constant rate of download (2,160 MB per minute) by the additional time (1.5 minutes). Hence, 2,160 MB per minute * 1.5 minutes = 3,240 MB.

e) The new total number of MB of the file that have been downloaded can be found by adding the initial downloaded amount (7,440 MB), the MB downloaded from 3 to 6 minutes (6,480 MB), and the additional MB downloaded (3,240 MB). Thus, 7,440 MB + 6,480 MB + 3,240 MB = 17,160 MB.

In summary, Alexis resumed the download and observed a constant rate of download. By analyzing the given information, we determined the time elapsed, the total MB downloaded, the rate of download, the additional MB downloaded, and the new total number of MB downloaded. These calculations provide a clear understanding of the file download progress.

Learn more about constant rate

brainly.com/question/32636092

#SPJ11

You listened to a song on your computer. Explain in 3-5 sentences if you used hardware or software.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

When you have listened to music on your computer. You used both computer hardware and software. You used a hard drive as a hardware device that stored your song. And, software such as s media player that you used to play the song.    

I hope this answer helps you.

Which statement supports the benefits of computer-aided design (CAD)?
Privacy is increased.
Designers do not have to be creative.
O Businesses have more control over their designers.
Time and materials are saved.

A. privacy is increased
B. designers do not have to be creative
C. businesses have more control over their designs
D. Time and materials are saved

Answers

Answer:

The correct statement that supports the benefits of computer-aided design (CAD) is "time and materials are saved."

Explanation:

CAD allows designers to create and modify designs quickly and easily using a computer, rather than having to create physical prototypes or drawings. This can significantly reduce the time and materials needed to create and revise designs, as changes can be made digitally rather than having to create new physical models or drawings.

Option A ("privacy is increased") is not a benefit of CAD.

Option B ("designers do not have to be creative") is incorrect because CAD does not replace the need for creativity and design skills.

Option C ("businesses have more control over their designs") is a potential benefit of CAD, but it is not the primary benefit of the technology.

. . ........Sad + sad= very sad

Answers

Answer:

very true.. this is well said

Answer: Welcome to 2021, i understand love. stay strong im in this w u <3

Explanation:

These questions are from the sql database query,


Find the highest rated apps with a user rating of at least 4. 6, have at least 1000 reviews, and does not have a content rating of ‘Everyone’.


Find the total number of apps for each of the 6 content rating categories.


Find the top 3 highest rated apps in the category of ‘TOOLS’ that have more than 225,000 reviews. Also, include at least 1 positive review for each of the top 3 apps in the visualization

Answers

To find the highest rated apps with a user rating of at least 4.6, have at least 1000 reviews, and does not have a content rating of ‘Everyone’, you would need to have access to the app store or platform where the apps are listed.

From there, you would need to filter the apps based on their user rating and the number of reviews they have received. Then, you would need to further filter the apps based on their content rating to exclude those with a rating of ‘Everyone’.

To find the total number of apps for each of the 6 content rating categories, you would need to have access to the app store or platform where the apps are listed. From there, you would need to group the apps based on their content rating and count the number of apps in each group.

To find the top 3 highest rated apps in the category of ‘TOOLS’ that have more than 225,000 reviews, you would need to have access to the app store or platform where the apps are listed. From there, you would need to filter the apps based on their category and the number of reviews they have received. Then, you would need to rank the remaining apps based on their user rating and select the top 3. Finally, you would need to find positive reviews for each of the top 3 apps and include them in a visualization.

Learn more about apps here brainly.com/question/11070666

#SPJ4

What job does a front-end developer perform?

Answers

Answer:

They manage making websit/es beautiful. Basically how brainly is setup? The layout is nice? Front end developers are responsible for why webpages look pretty or nicely done. fun fact, my dream job is a front end developer!

What is exactly meant by the term coding in context of computer science?

Answers

Answer:

writing instructions for the computer that the computer can interpret

Explanation:

which type of report identifies data outside of a normal condition?

Answers

An Exception Report identifies data outside of a normal condition, highlighting significant deviations from expected patterns to indicate errors, anomalies, or opportunities for improvement. Used in quality control, finance, and risk management.

An exception report is the sort of report that identifies data outside of a typical circumstance. Data that is missing, wrong, or out of range are examples of data that is outside of a typical or anticipated state and can be found in an exception report. It is employed to draw attention to notable departures from normative or predicted patterns, which may point to mistakes, oddities, or areas in need of improvement. Exception reports can be prepared manually by analysts or automatically by computer systems that scan data for anomalous patterns or outliers. They are frequently used in risk management, financial analysis, and quality control to spot possible concerns before they become serious ones.

learn more about Report identifies here:

https://brainly.com/question/30266829?

#SPJ11

Other Questions
Angle ABC is taken by a dilation with the center P and scale factor 3 to angle A'B'C'The measure of angle ABC is 21 degrees. What is the measure of angle A'B'C'? O16 mA. h = 12 m, v = 1,024 mWhat's the answer yo?B. h = 15 m, v = 1,920 m17 mOC. h = 15 m, v = 1.280 mD. h = 12 m, v = 1.536 m16 m Data ___________ means all applications are able to access the same data, which is ___________ by databases. please someone help me quickkkkk 1:How do temperature, humidity, and pressure vary within an air mass?a. Humidity makes the pressure in an air mass increase.b. Temperature and humidity vary, but pressure does not.c. Temperature, humidity, and pressure are basically the same all through an air mass.d. Temperature at the border of an air mass is always higher than in the middle.2: Which kind of weather does tropical continental air bring in summer?a. cool and cloudyb. hot and cloudyc. vd. What as one result of northern whites' fears of racial equality?A. Race riotsB. Plessy v. FergusonC. literacy testsD. Poll Taxes what is the term for infection control measures that use barrier protection and work practice controls to prevent contact with infectious body Why does the author allude to floodgates in the passage? OA, to show that Ginsburg's work increased the number of equal rights cases in the legal system OB. to show that most of the cases Ginsburg became involved in were not successful OC. to show that a slow and steady stream of equal rights cases developed for Ginsburg OD. to show that there were many people involved in trying each equal rights case T/F emotive words are words that sound as if theyre describing something but are really announcing the speakers attitude toward it. Carlos planted 4 flowers in 9 minutes. At this rate, how many flowers can Carlos plant in 36 minutes? when two sides of an international conflict possess such enormous arsenals of nuclear missiles that each has the ability to destroy the other in the event of war, it is called Write a story about temperatures that this expression could represent: 27 + (11) A rectangular pyramid has a volume of 56 m. Thedimensions of the base are 3 m by 7 m. Find theheight of the pyramid. a new crew of painters takes two times as long to paint a small apartment as the experienced crew together both crews can paint the apartment in 6 hours how many hours does it take the experienced crew to paint the apartment we want to put a satellite into a circular orbit about the earth with a radius equal to twice the radius of the earth. that, is the radius of the orbit is 2re where re is the radius of the earth. a) what energy due we need to give to the probe to put it into this orbit? note: you might want to use the virial theorem. b) what would be the velocity of the satellite just after launch? c) what would be the velocity of the satellite when it is in orbit? d) determine at what angle with respect to the vertical the satellite should be launched so that it goes into a circular orbit. ignore effects due to the rotation of the earth . What pressure will be exerted by 0.7 mol of a gas at 23 C when contained in a vessel whose volume is 1.1 L? How does the judicial branch demonstrate the idea of federalism? A2The distance ABrounded to thenearest tenth = [?]-1022-Hint: Use the distance formula:d= (x2 x1)2 + (72- y)2Enter eory.According to cell theory, which of the following aremade of cells? Check all that apply.O flowersrocksbloodwaterbacteriasugarskinRETRY Use the rounding strategy to estimate the diffrence9,955-1,123A.8,000B.9,000C.10,000