Explain briefly the FIREWALLS

Answers

Answer 1

Answer:

Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!

Explanation:


Related Questions

How could you use a spreadsheet you didn't like to simplify access also the problem

Answers

Answer:

Explanation:

......

What do you call the parts of the motor that do not move?.

Answers

Answer:

The stator..?

Explanation:

Stators are the stationary parts of motors. Dunno if I'm right lol

what are the reason of making computer virus.​

Answers

Answer:

Some computer experts create computer viruses to prove certain a process will work

Explanation:

What kind of variable is measured using 2 different values

Answers

A variable that is measured using two different values can be classified as a categorical variable or a binary variable.

Depending on the nature of the values, a variable can be classified as:

1)Categorical Variable: If the two different values represent distinct categories or groups, the variable is considered categorical. In this case, the variable can take on only one of two possible values.

Examples include gender (male/female), presence/absence of a certain trait, yes/no responses, or any other classification with mutually exclusive categories.

2)Binary Variable: If the two different values represent two distinct outcomes or states, the variable can be classified as a binary variable. Binary variables are often used in statistics, machine learning, and hypothesis testing.

Examples include success/failure, true/false, 1/0, or positive/negative results.

It's important to note that the distinction between categorical and binary variables lies in the nature of the values and the underlying meaning they convey.

Categorical variables can have more than two categories, while binary variables specifically refer to variables with only two possible values.

For more questions on variable

https://brainly.com/question/28248724

#SPJ8

During an investigation, a security manager receives notification from local authorities that company proprietary data was found on a former employees home computer. The former employee's corporate workstation has since been repurposed, and the data on the hard drive has been overwritten. Which of the following would BEST provide the security manager with enough details to
determine when the data was removed from the company network?
A. Properly configured hosts with security logging
B. Properly configured endpoint security tool with darting
C. Properly configured SIEM with retention policies
D. Properly configured USB blocker with encryption

Answers

The option that would best provide the security manager with enough details to determine when the data was removed from the company network is Properly configured SIEM (Security Information and Event Management) with retention policies.The correct answer is option C.

A properly configured SIEM collects and analyzes security event logs from various sources within the network, such as firewalls, intrusion detection systems, and servers. It provides a centralized view of security events and allows for the correlation of events across multiple systems.

By having retention policies in place, the SIEM would retain security event logs for a specific period of time. This would enable the security manager to review the logs and identify any suspicious activities or indicators of data exfiltration.

In the given scenario, the security manager can examine the SIEM logs to determine if there were any unusual or unauthorized activities associated with the former employee's account.

They can identify if the employee accessed the company network or transferred data during a specific timeframe. This information can help narrow down when the data was removed from the network.

It is important to note that properly configuring the SIEM and setting appropriate retention policies is crucial for effective incident response and investigation.

Without proper configuration and retention policies, the SIEM may not have the necessary data or the ability to correlate events accurately, limiting the security manager's ability to determine when the data was removed.

Therefore,The correct answer is option C.

For more such questions data,click on

https://brainly.com/question/29621691

#SPJ8

1. State three modules in HansaWorld and briefly describe what each is used for. (6)
2. With an example, explain what settings are used for. (3)
3. What is Personal Desktop and why is it good to use? Mention two ways in which an
entry can be deleted from the personal desktop. (6)
Describe how you invalidate a record in HansaWorld (3)
Briefly explain what specification, paste special and report windows are used for. (6)
How many reports can you have on the screen at once? How many reports does
HansaWorld have? (4)
4.
5.
6.
7.
8.
9.
Describe any two views of the Calendar and how you can open them (4)
Describe three (3) ways in which records can be attached to Mails. (6)
Describe the basic SALES PROCESS where there is no stock involved and how the
same is implemented in HansaWorld. (12)

Answers

Three modules in HansaWorld and their uses:
Financials: this module is used for accounting and financial management, including accounts receivable, accounts payable, general ledger, and budgeting.
Logistics: this module is used for managing inventory and supply chain, including purchase orders, sales orders, stock control, and manufacturing.
CRM: this module is used for managing customer relationships, including sales and marketing activities, customer service, and support.
Settings are used to configure various aspects of the system, such as user preferences, system defaults, and module settings. For example, a user can set their default currency, language, and font size. Settings can be accessed and modified through the "Settings" menu or through the relevant module's settings window.
Personal Desktop is a customizable dashboard that displays relevant information and provides quick access to frequently used functions. It is good to use because it can increase productivity and efficiency by allowing users to access important data and functions quickly. Two ways to delete an entry from the personal desktop are by right-clicking on the entry and selecting "Delete" or by dragging the entry to the trash can icon.
To invalidate a record in HansaWorld, the user can either delete the record or mark it as inactive. To mark a record as inactive, the user can go to the "General" tab of the relevant record and uncheck the "Active" checkbox.
Specification windows are used to define criteria for filtering data or generating reports. Paste Special windows are used to copy and paste data between different parts of the system or to import data from external sources. Report windows are used to view and print reports generated by the system.
The number of reports that can be on the screen at once depends on the user's screen size and resolution. HansaWorld has a large number of built-in reports for each module, but users can also create custom reports using the Report Designer.
Two views of the Calendar in HansaWorld are the Day view and the Month view. The Day view displays a detailed view of the events for a single day, while the Month view displays a calendar grid for a whole month. To open the Day view, the user can click on a specific date in the Month view, or they can select "Day" from the View menu. To open the Month view, the user can select "Month" from the View menu.
Three ways in which records can be attached to Mails are:
Drag and drop: the user can drag a record from the relevant module and drop it onto the Mail window.
Copy and paste: the user can copy a record from the relevant module and paste it into the Mail window.
Link: the user can insert a hyperlink to the record in the Mail window.
The basic sales process where there is no stock involved typically involves the following steps:
The customer requests a quote or makes a purchase order.
The salesperson creates a sales order based on the quote or purchase order.
The salesperson generates an invoice based on the sales order and sends it to the customer.
The customer pays the invoice.
The salesperson records the payment and closes the transaction.
In HansaWorld, this process is implemented through the Sales module. The salesperson can create a quote, sales order, and invoice in the relevant windows, and record the payment in the Payments window. The system can also generate reports and provide real-time updates on inventory levels, pricing, and other relevant data.

Relation between training and occupation with examples in points . Plz tell fast

Answers

Answer:

Follows are the relation between training and occupation:

Explanation:

Training:

This method includes several steps that are systematically practiced to have an efficient training course. It is a structured activity carried out to improve an employee's skills, attitudes, and behavior.  

Occupation :

Profession, industry, occupation, corporation, trade, and business are also the things you actively participate in, especially your daily work or lifestyle. Its general word occupational is now a fun or cozy job.  

Relation:  

Training allows a person to acquire new knowledge and abilities but also build their professions by becoming independent. It enables competence to improve. All employees are highly inspired by training.

An onsite technician at a customer site installed a PERC 10 card in an R630 server. The first time the server booted, the customer was unable to see the drives. The customer restarted the server a second time. This time, the server is not booting at all. An issue with the installation of an unsupported PERC card is suspected. What is the next best step to take?

Answers

The next best step to take in the situation above is to remove the failed card from the system and one can use a replacement card to see if the same issue will arise.

What is an IL PERC card?

PERC is a term that connote  Permanent Employee Registration Card. If a person holds this card, it is a card that shows that one have undergone some specific state and federal background checks and fingerprinting to function as a security guard in Illinois.

The Potential employers of security guards is one that needs applicants to have a PERC card and when the card fails, it may be due to the machine or faulty card or corrupt card.

Learn more about installation  from

https://brainly.com/question/17506968

Create Task for AP computer science principles python

Answers

The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Thus, The more comprehensive of the two courses, AP Computer Science Principles teaches students the fundamentals of computer science while emphasizing teamwork.

Although computer science is a useful subject to study, is the exam challenging to pass.

For aspirant AP Computer Science Principles students, it's a good thing that the subject isn't ranked in the top 10 most challenging AP courses. But that doesn't make it any less difficult. Visit our AP Computer Science Principles resource page.

Thus, The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Learn more about AP program, refer to the link:

https://brainly.com/question/3121467

#SPJ1

Many companies use telephone numbers like 555-GET-FOOD so the number is easier for their customers to remember. On a standard telephone, the alphabetic letters are mapped to numbers in the following fashion: A, B, and C = 2 D, E, and F = 3 G, H, and I = 4 J, K, and L = 5 M, N, and O = 6 P, Q, R, and S = 7 T, U, and V = 8 W, X, Y, and Z = 9 Write a program that asks the user to enter a 12-character telephone number in the format: XXX-XXX-XXXX. Acceptable characters (X's) are A-Z and a-z. Your program should check for: The length of the phone number is correct. The dashes are included and are in the correct positions. There are no characters in the illegal characters in the string. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. If the input string is not entirely correct then you should print an error message. For example, if the user enters 555-GET-FOOD the program should display 555-438-3663. If the user enters 123-456-7890, the program should display 123-456-7890. Rules: You must have one function (in addition to main()) that converts an alphabetic character to a digit. Or you can have one function that coverts all characters to digits. You can make your own function or use a built-in function if one exists.

Answers

Answer:

The program in Python is as follows:

def convertt(phone):

splitnum = phone.split ('-')

valid = True  

count = 0  

err = ""  

numphone = ""

if len(phone) != 12:

 err = "Invalid Length"  

 valid = False  

elif phone[3] != '-' or phone[7] != '-':

 err = "Invalid dash [-] location"  

 valid = False  

while valid== True and count < 3:

 for ch in splitnum[count]:

  if ch.isdigit():

   numphone += ch  

  elif ch.upper()in 'ABC':

   numphone += '2'  

  elif ch.upper()in 'DEF':

   numphone += '3'  

  elif ch.upper()in 'GHI':

   numphone += '4'  

  elif ch.upper() in 'JKL':

   numphone += '5'  

  elif ch.upper()in 'MNO':

   numphone += '6'  

  elif ch.upper()in 'PQRS':

   numphone += '7'  

  elif ch.upper()in 'TUV':

   numphone += '8'  

  elif ch.upper()in 'WXYZ':

   numphone += '9'

  else:

   valid = False

   err = "Illegal character in phone number"  

 if count!=2:

  numphone += '-'  

 count += 1  

if valid == False:

 print (err)

else:

 print ("Phone Number", numphone)

phone = input("Phone number: ")

convertt(phone)

Explanation:

See attachment for complete source code where comments are used for explanation

Write a program HousingCost.java to calculate the amount of money a person would pay in renting an apartment over a period of time. Assume the current rent cost is $2,000 a month, it would increase 4% per year. There is also utility fee between $600 and $1500 per year. For the purpose of the calculation, the utility will be a random number between $600 and $1500.
1. Print out projected the yearly cost for the next 5 years and the grand total cost over the 5 years.
2. Determine the number of years in the future where the total cost per year is over $40,000 (Use the appropriate loop structure to solve this. Do not use break.)

Answers

Answer:

import java.util.Random;

public class HousingCost {

public static void main(String[] args) {

int currentRent = 2000;

double rentIncreaseRate = 1.04;

int utilityFeeLowerBound = 600;

int utilityFeeUpperBound = 1500;

int years = 5;

int totalCost = 0;

System.out.println("Year\tRent\tUtility\tTotal");

for (int year = 1; year <= years; year++) {

int utilityFee = getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);

int rent = (int) (currentRent * Math.pow(rentIncreaseRate, year - 1));

int yearlyCost = rent * 12 + utilityFee;

totalCost += yearlyCost;

System.out.println(year + "\t$" + rent + "\t$" + utilityFee + "\t$" + yearlyCost);

}

System.out.println("\nTotal cost over " + years + " years: $" + totalCost);

int futureYears = 0;

int totalCostPerYear;

do {

futureYears++;

totalCostPerYear = (int) (currentRent * 12 * Math.pow(rentIncreaseRate, futureYears - 1)) + getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);

} while (totalCostPerYear <= 40000);

System.out.println("Number of years in the future where the total cost per year is over $40,000: " + futureYears);

}

private static int getRandomUtilityFee(int lowerBound, int upperBound) {

Random random = new Random();

return random.nextInt(upperBound - lowerBound + 1) + lowerBound;

}

}

Product reviews are written by:
OA. people with specialized knowledge.
B. clever advertising copywriters.
C. consumers who may use the product.
OD. people on social networking sites.

Answers

Product reviews can be written by all of the above. People with specialized knowledge, clever advertising copywriters, consumers who may use the product and people on social networking sites can all write product reviews.

How to isolate a single heartbeat in audio using the Librosa library?


We have collected various samples of heartbeat data with different cardiovascular diseases. Some examples of our dataset are uploaded here.


We would like to use Librosa to identify the starting/ending point of each heartbeat in the file. The goal, in the end, is to create a program that will take in a heartbeat file, and and output just one beat. What would be the best way to go about it?

Answers

Answer:

To isolate a single heartbeat in audio using the Librosa library, you can follow these steps:

Load the audio file into memory using the librosa.load() function. This function returns a tuple of the audio data as a NumPy array and the sample rate of the audio.

Use the librosa.onset.onset_detect() function to detect the onsets (i.e., the starting points) of the heartbeats in the audio data. This function returns a NumPy array of frame indices where onsets were detected.

Use the librosa.frames_to_samples() function to convert the frame indices to sample indices. This will give you the sample indices in the audio data where the heartbeats start.

Identify the sample indices where the heartbeats end by finding the difference between the starting indices of successive heartbeats. You can do this by subtracting the starting indices of the heartbeats from one another.

Use the NumPy slicing operator (i.e., []) to extract the samples corresponding to a single heartbeat from the audio data. For example, to extract the samples corresponding to the first heartbeat, you can use the following code:

To isolate a single heartbeat in audio using the Librosa library, you can follow these steps:

Load the audio file into memory using the load function. Use the onset detect function to detect the onsets (i.e., the starting points) of the heartbeats in the audio data. Use the frames to sample function to convert the frame indices to sample indices. Identify the sample indices where the heartbeats end by finding the difference between the starting indices of successive heartbeats. Use the slicing operator to extract the samples corresponding to a single heartbeat from the audio data.

What is a heartbeat?

A heartbeat is a two-part pumping action that lasts approximately one second.

The load function returns a tuple of the audio data as a  array and the sample rate of the audio.

The onset detect function returns a  array of frame indices where onsets were detected.

The frames to samples() function will give you the sample indices in the audio data where the heartbeats start. Then, you can identify the sample indices by subtracting the starting indices of the heartbeats from one another.

Therefore, the process of isolating a single heartbeat in audio using the Librosa library is described.

To learn more about heartbeat, click here:

https://brainly.com/question/13833121

#SPJ2

i dont know the answer

i dont know the answer

Answers

Answer:

Explanation:

Me too.

how to write a simple bash script in linux

Answers

Writing a simple bash script in Linux involves a few steps to create a script file, define its execution permissions, write the desired commands, and save the file. Bash scripts allow for automating tasks and executing multiple commands sequentially.

Choose a text editor: Select a text editor of your preference, such as nano, vi, or gedit, to create and edit the script file.

Create a new file: Open the text editor and create a new file with a .sh extension. For example, you can use the command nano script.sh to create a new file named "script.sh" using the nano editor.

Define the shebang: Start the script file with a shebang line, which tells the system the interpreter to use. The most common shebang for bash scripts is #!/bin/bash. It indicates that the script should be executed using the Bash shell.

Write script commands: In the script file, write the desired commands that you want to execute. For example, you can use basic commands like echo, if statements, loops, or other Linux commands to perform various tasks.

Save the file: Save the script file after writing the commands. In the nano editor, you can press Ctrl + O to save the file and Ctrl + X to exit the editor.

Set execution permissions: Make the script file executable using the chmod command. For example, you can use chmod +x script.sh to give execute permissions to the owner of the script file.

Execute the script: Run the script by entering its filename preceded by "./". For example, if your script file is named "script.sh", you can run it using ./script.sh. The script will execute the commands written in it.

Test and modify: Run the script and verify its functionality. If needed, make modifications to the script file and repeat the testing process until you achieve the desired results.

By following these steps, you can create a simple bash script in Linux. Bash scripting allows you to automate tasks, execute commands sequentially, and perform various operations in a convenient and efficient manner.

For more such questions on Linux, click on:

https://brainly.com/question/12853667

#SPJ8

Q Search Based on the diagram, host A sends a packet to server B. The two serial links use HDLC, while the rest are Ethernet. How many times does a router re-encapsulate the original IP packet into a new data link frame? O O 5 4 3 6 R2 R1 A $1/0 $1/0 R3 99+ S1/1 S1/0 R4 R5 D ENG IN A​

Answers

Based on the diagram,there are three routers between   host A and server B (R1, R3, R4). Each router will re-encapsulate the original IP packet into a new data link   frame as the packet traverses the network. Therefore, the answer is 3 times. (Option C)

How  is this so?

In the given network diagram, the packet sent from host A to server B passes through three routers (R1, R3, R4).

As the packet travels through each router, it is re-encapsulated into a new data link frame specific to the respective link type (HDLC or Ethernet). This process occurs three times in total.

Learn more about network at:

https://brainly.com/question/1326000

#SPJ1

I NEED HELP I'LL GIVE BRAINLEST

Direction can be applied to animations but not transitions.


True

False

Answers

Answer: True

Explanation: direction can be applied only to animations. direction can be applied only to transitions. direction can be applied to both animations and transitions.

Answer:

I think it's true but I'm not 100% sure.

What feature allows a person to key on the new lines without tapping the return or enter key

Answers

The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap

How to determine the feature

When the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.

In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.

This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.

Learn more about word wrap at: https://brainly.com/question/26721412

#SPJ1

Which symbol is at the beginning and end of a multiline comment block?

Answers

The beginning of a block comment or a multi-line comment is marked by the symbol /* and the symbol */ marks its end.

A video game character can face one of four directions

Answers

Really
I didn’t know that:)

Bruno is a network engineer who is tasked with adding a separate layer of protection to the control plane of a router. He wants messages with a bps (bits per second) rate below the threshold 7000 to be transmitted and the messages with a threshold above 7000 to be dropped. Analyze which of the following commands Bruno should use in pmap configuration mode in this scenario.

Answers

A network engineer has the duty of protecting a network from external or internal attacks that wants to compromise the integrity of the network.

What is Control Plane Policing?

This refers to one of the ways of protecting the control plane by policing the traffic coming into it.

The use of control plane policing is the feature that Bruno is making use of as he wants messages with a bps (bits per second) rate below the threshold of 7000 to be transmitted and the messages with a threshold above 7000 to be dropped.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

#SPJ1

Read more about network security here:

https://brainly.com/question/25720881

Infringement Less than 13km/h over the speed limit At least 13km/h but not more than 20km/h over the speed limit More than 20km/h but not more than 30km/h over the speed limit More than 30km/h but not more than 40km/h over the speed limit More than 40km/h over the speed limit Penalty amount $177 $266 $444 $622 $1.245 Demerit points 1 3 4 6 8 Note: the way the government website has written this (and we've copied it) is NOT efficient in terms of decision structures. This written for each condition to stand alone (if, if, if) but we can tell its mutually exclusive and so know a better tool for the job don Avoid a 6-month suspension by writing a program to ask for the user's: • speed and the • speed limit
program in python?​

Answers

The example of the program in Python to help one to calculate the penalty amount as well as the demerit points based on the speed and speed limit provided by the user is given in the code below

What is the program?

python

def calculate_penalty(speed, speed_limit):

   penalty_amount = 0

   demerit_points = 0

   if speed <= speed_limit:

       return penalty_amount, demerit_points

   overspeed = speed - speed_limit

   if overspeed <= 13:

       penalty_amount = 177

       demerit_points = 1

   elif overspeed <= 20:

       penalty_amount = 266

       demerit_points = 3

   elif overspeed <= 30:

       penalty_amount = 444

      demerit_points = 4

   elif overspeed <= 40:

       penalty_amount = 622

       demerit_points = 6

   else:

       penalty_amount = 1245

       demerit_points = 8

   return penalty_amount, demerit_points

# Get user input

speed = int(input("Enter the recorded speed (in km/h): "))

speed_limit = int(input("Enter the speed limit (in km/h): "))

# Calculate penalty and demerit points

penalty, points = calculate_penalty(speed, speed_limit)

# Display the results

print("Penalty amount: $", penalty)

print("Demerit points: ", points)

Read more about python here:

https://brainly.com/question/30113981

#SPJ1

For the equation y = 5 + 6x, what does y equal when x is 4?
A.
29

B.
15

C.
19

D.
23

Answers

Answer:

y = 29

Explanation:

y = 5+6x

What is y when x = 4

Substitute x with 4 :

5 + 6(4)

5 + (6×4)

5 + 24

29

y = 29

Hope this helped and have a good day

Answer:

y=29

Explanation:

y=5+6x

y=5+6(4)

y=5+24

y=29

Write a program that reads two numbers from the user, and proceeds as follows: If the input numbers are equal, the program displays: both numbers are the same. Otherwise, the program logs all the integers in the range of the input numbers from the smaller value to the larger value in the console. For example, if the user enters 22 and 16, the program displays: 16 17 18 19 20 21 22. Note that all the numbers are displayed in one line separated by a single space. . If any of the input values are invalid, the program displays an error message and terminates.​

Answers

import sys

x = input("enter number 1: ") #ask for user input

y = input("enter number 2: ")

output = "" #the output string

try: #try integering them (this also has error message and will check if input is valid)

 x = int(x)

except:

 print("error! number 1 was not a number :(")

 sys.exit() #leave

try:

 y = int(y)

except:

 print("error! number 2 was not a number :(")

 sys.exit()

if x == y: #check they are not the same

 print("both numbers are the same")

else: #do the thing

 if y > x: #otherwise swap the order

   for i in range (x, y + 1): #+1 for inclusive

     output = (output + str(i) + " ")

 else:

   for i in range (y, x + 1):

     output = (output + str(i) + " ")

 print(output) #so it's all in one line

You are developing an Azure App Service web app that uses the Microsoft Authentication Library for .NET (MSAL.NET). You register the web app with the Microsoft identity platform by using the Azure portal.

You need to define the app password that will be used to prove the identity of the application when requesting tokens from Azure Active Directory (Azure AD).

Which method should you use during initialization of the app?

a. WithCertificate
b. WithClientSecret
c. WithClientId
d. WithRedirectUri
e. WithAuthority

Answers

Answer: b. WithClientSecret

Explanation: This method sets the application secret used to prove the identity of the application when requesting tokens from Azure Active Directory. WithCertificate is used to set the certificate that is used for the app to authenticate with Azure AD. WithClientId is used to set the client ID of the application, WithRedirectUri is used to set the redirect URI of the application and WithAuthority is used to set the authority to be used for the app's authentication.

7.2.5 height in meters

Can someone tell me what’s wrong and the correct code please

7.2.5 height in meters Can someone tell me whats wrong and the correct code please

Answers

Answer:

Hello! You have a close(but not open) parentheses on line 10. Let me know if you get another error! Hope this works!

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

.............................................is the vertical distance between successive lines of the text​

Answers

Answer:

Line spacing is the vertical distance between successive lines of the text​.

Explanation:

Hope this helps you. :)

what is the importance of file management and how do you control files over time?\

Answers

Answer:

File management improves productivity by lowering the amount of time employees spend looking for documents. It also cuts down on the time it takes to recreate files when an employee can't find the original.

To control files over time, here are some tips.

-Delete unnecessary files

-Take immediate action on files you encounter

-Consolidate files when possible

-Have less folders as possible

It is essential to make computer professional more responsible towards society and culture

Answers

Yes it is essential because Computers benefit the business and personal world by being able to do the following more efficiently: buying and selling products, communicating throughout the world, enhancing our knowledge, job influences, entertainment, research, and paying bills.


Hope this helps. ^v^
Other Questions
which format is best for photos?JPEGDOCGIFWav 5.2.PS-16 Question Help A teacher kept track of what students consumed at a school picnic. For three grades, the ratios of the amount of water consumed to the amount of fruit juice consumed were equivalent. Complete the table. Grade Water (gallons) Juice (gallo 5th 3 5 6th 18 7th 12 Water Juice Grade (gallons) (gallons) 5th 3 5 6th 18 Enter your answer in the answer box and then click Check Answer. Check ANSWE Clear All 1 pant remaining Next Back Review progress Question 5 of 12 Fuses and circuit breakers are generally employed for circuit protection, and ____ are used to protect the motor.overload relays write a account writing Who was the first person to observe cells? Consider the following hypothesis test.H0: = 20Ha: 20A sample of 167 items will be taken and the population standard deviation is 9.31.Compute the p-value for the following if the sample means.mean is:a. 18.0b. 21.8c. 21.3 Zozan Corp. manufactures Hydrogen engines automobiles. Recently 450 new orders placed by customers requesting credit. The variable cost is $35,000 per unit, and the credit price is $43,000 each. Credit is extended for one period, and based on historical experience, payments for 20% of the orders are never collected. The required return is 4% per period.Assuming a repeat customer, should it be filled by the firm? The customer will not buy if credit is not extended Why was there an increased interest in the 1990s to explore if false memories could be created?. On Dec 1, 2019 ABC purchases a piece of equipment with a total cost of $[YOUR NUMBER] * 1000. The equipment is expected to have a 8 year or 50,000 mile useful life and a $10,000 salvage value at the end if its useful life. ABC drives the equipment 1,000 miles in 2019 and 12,000 miles in 2020. If ABC uses straight line depreciation, What depreciation expense should ABC record in 2019 What is the name of the document that should be attached to theprimary technical document when it is external to an organization?Give an example of use. The angles of elevation to an airplane from two points A and Bon level ground are 55 and 72, respectively. The points A and Bare 2.8 miles apart, and the airplane is east of both points in thes Are these two expressions equivalent?5(3+2) and 5.3 + 5.2 a mother with type a blood has a son with type o blood. identify the genotype that the father must have in order to produce this child. A recent forest fire near Littleville destroyed four-fifths of the trees in Bigtree National Forest. Theforest covers 4920 km2. There is now about 30 tons of salvageable wood per km2 in the burned area. Thepart of the forest that was not destroyed by fire will not be open to the salvagers. Assuming the trees areevenly distributed throughout the park, about how long will it take to remove all the salvageable wood ata rate of 53 1/2 tons per day? Round your answer to the nearest whole number. At an advertising agency, a team is in charge of creating a new commercial. Team members are respectful and honest when discussing which ideas are promising and which ones probably will not work. Team members support one another and help one another. What quality is this team showing?A. confusionB. causationC. correlationD. cohesion What (if any) are the same feature requirements that might be found in server software/OS environments Workout 5.4/0.03(its division) I need it ASAP!!! Explain why insider movements often speak of implanting the gospel rather than planting churches. an independent hardware retail store 100 miles from the nearest city of more than 5,000 people but providing needed supplies for area ranchers would most likely buy its plumbing and electrical supplies through a a. What are the positive or negative externalities related to sport schools for children in Almaty? Name at least three positive or negative externalities. [4 points] b. On a graph, show the marginal private benefit (MPB), marginal social benefit (MSB), marginal private cost (MPC), and marginal social cost (MSC) and label them accordingly on your graph. [2 points] c. On your graph, show the private market equilibrium quantity and the social optimum quantity of sports classes. [2 points] d. Propose measures to make the sports schools affordable to all parents. Explain how the proposed by you measures will affect the market price and quantity of sports schools' services.