Answer:
a manual device used for calculation that consists in its simple form of a ruler and a movable middle piece which are graduated with similar logarithmic scales.
Explanation:
^
I need answer ASAP. Place the box’s in the correct places
Answer:
This is the order:
customer
order
accept order
notify kitchen
inventory kitchen
order
customer
i think, i'm sorry
What are the two main types of ad formats you can leverage for your Display campaign?
The two main types of ad formats for Display campaigns are image ads and video ads. Image ads include static images or animated graphics, while video ads include short videos promoting a product or service.
Image ads are a cost-effective way to create visually appealing and informative ads that can be used to convey a brand message. They come in various sizes and can be placed in different positions on a webpage. On the other hand, video ads are more engaging and can tell a story that can resonate with viewers. They offer a more immersive experience and can be effective in building brand awareness and driving engagement. However, they can be more expensive to produce and may not be suitable for all products or services. Ultimately, the choice between image and video ads depends on the campaign objectives and target audience.
learn more about campaign here:
https://brainly.com/question/14770924
#SPJ11
true/false. In this attack, WLANs are detected either by sending probe requests over a connection or by listening to web beacons. An attacker who discovers a penetration point can launch further attacks on the LAN. Some of the tools that the attacker may use to perform wardriving attacks are KisMAC and NetStumbler.
True. In a wardriving attack, WLANs are detected either by sending out probe requests over the air or by listening for web beacons.
What is WLANs?WLANs (Wireless Local Area Networks) are computer networks that use radio waves to provide a wireless connection between different devices. WLANs can be used to connect computers, tablets, smartphones, and other devices to each other, to the internet, and to peripherals such as printers.
An attacker who discovers a weak point within the network can then launch further attacks to gain access to the LAN. Common tools used to perform wardriving attacks are KisMAC and NetStumbler.
To learn more about WLANs
https://brainly.com/question/12929109
#SPJ4
Which wireless protocols would provide the fastest connection with the longest range?
The wireless protocols that would provide the fastest connection with the longest range are Wi-Fi 6 and 5G.
What is Wi-Fi 6?Wi-Fi 6 is the most recent Wi-Fi standard, which also known as 802.11ax. Wi-Fi 6 technology delivers faster wireless networking speeds, lower latency, and higher data capacity while also requiring less power than earlier Wi-Fi versions.
It also has the advantage of extending wireless range.What is 5G?5G stands for "fifth generation" wireless technology, which provides lightning-fast speeds and minimal latency. It offers download speeds of up to 20 Gbps, which is around 20 times faster than 4G.
It also allows more simultaneous connections without impacting speed, which means that several people in the same area can use it without slowing down the connection. It has a greater range, which allows it to transmit data over greater distances with minimal attenuation.
Learn more about WIFI at:
https://brainly.com/question/32117578
#SPJ11
which of these is not a capability of the advanced filter tool? a) filter in place b) copy selected records to a new location c) provide pop up filters d) specify the list range
Pop-up filters cannot be made with the complex filtering tool. A pop-up is a graphical user interface (GUI) display area that appears suddenly in the foreground of a visual interface. It is often a small window.
Which program generates pop-ups on the computer?Adware, a type of malicious spyware, frequently bombards you with pop-up adverts. It can also track your web activity, record everything you type, and bother you by compiling personal data about you. This essay will go into adware in great detail., a type of malicious spyware, frequently bombards you with pop-up adverts. It can also track your web activity, record everything you type, and bother you by compiling personal data about you. This essay will go into adware in great detail.
A popup is a specific kind of educational or marketing offer that displays above your content and is designed to quickly attract the attention of your visitors. Popups typically include a call to action in an effort to urge your visitor to do the action you desire.
Ad pop-ups are also referred to as pop-ups. Pop-up forms appear on the page at the precise time and location that you specify in advance, as they claim to do. To maximize the form's conversion potential and drive more leads down the funnel, the objective is to capture leads at the most advantageous time feasible by focusing on both timing and placement.
Therefore the correct answer is option c ) provide pop up filters
To learn more about pop up filters refer to :
https://brainly.com/question/30032577
#SPJ4
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they view the bright images on the page. Which design principle is Cathy using?
Hey there!
I would say the answer to this question is Movement.
If you look at the principles of design the definition of Movement is Movement is the path the viewer's eye takes through the work of art, often to focal areas.
In Cathy's design, it states that when viewers view her website their eyes first fall on the brand name, and then they view the bright images on the page.
Based on the information given you can conclude that the design principle that Cathy used was Movement.
I hope this helps,
Have a great day!
What is the term that is used to mean ensuring that data are not altered during transmission across a network or data storage
The term that is used to mean ensuring that data are not altered during transmission across a network or data storage is called data integrity.
Data integrity refers to the accuracy, reliability, and consistency of data over its entire lifecycle. The concept of data integrity means ensuring that data is complete, accurate, and consistent throughout its life cycle. This requires controlling the modification of data through data storage and transmission.A data integrity breach can occur if a single bit is missing or altered, causing the entire data set to be corrupt. The purpose of data integrity is to make sure that information remains accurate, complete, and reliable throughout its lifecycle. It's necessary to ensure that data is secured and maintained in a way that reduces risks such as data loss, data breaches, or unauthorized changes.The importance of data integrity can’t be overstated, as it is fundamental to many vital functions of a business such as decision making and business intelligence. Any organization must take necessary measures to maintain data integrity, whether through the use of encryption, backup and recovery procedures, or regular security updates.
To know more about data visit:
brainly.com/question/28346249
#SPJ11
how drone technology can impact recreation and entertainment
Drones are become more advanced than ever before. Are now, they are starting to impact recreation. They are small, light, and can maneuver incredibly fast. They are being used in movies, skits, short films, and even high-end videos. Here are some ways drones are changing entertainment:
- Providing high-quality filming, even from 200 feet in the air.
- Reaching spaces where bulky helicopters cannot fit into safely
- Laser shows, where drones shine lights and lasers.
Right now, if you tried to hold your phone still to capture a video, you would not be able to do it. Upon checking the footage, you would see the camera shaking, even if it's just tiny bit. While you can lean it on a surface to fix this, it simply cannot be done in the air to capture. Not to worry, though, you've got drones. They can shoot a steady shot 200 feet in the air. The only thing that could rival drones are expensive, bulky choppers. The drones are cheaper and are mass produced.
However, drones are not only being used to filming movies and films. They are also being used for a different kind of entertainment: Shows. Drones move in formation and shine lights in the night sky, like we saw in the Winter Olympics. They are truly stunning(pics attached).
How would be the human life in the absence of technology
Answer:
Horrible!
Explanation: this is because all of our food would go bad firstly. Refridegerators wouldn't work. Also NO social medie taking away social media is like cutting off your O2 supply. No phones, no TV, no computers etc... but also our planet would be a better place. No pollution, no batteries harming the enviornment .
Check all of the file types that a Slides presentation can be downloaded as.
.JPEG
.doc
.xls
.PDF
.pptx
.bmp
Answer:
.JPEG
.pptx
General Concepts:
Explanation:
If we go into File, and then under Download, we should be able to see which file types that a Slides presentation can be downloaded as.
Attached below is an image of the options.
select the name, creaturetype, creaturesubtype, gender, and appearance from litcharacters for creatures who have made 5 or more appearances (this includes characters that have made 5 appearances). order ascending by the character id. what is the first entry?
I'm sorry, but as an I don't have access to a specific database or its data. Therefore, I cannot retrieve the first entry from the "litcharacters" table as requested.
To obtain the first entry from the "litcharacters" table with the given conditions, you would need to execute a SQL query on the database that contains the table. The query would look something like this:
SELECT name, creaturetype, creaturesubtype, gender, appearance
FROM litcharacters
WHERE appearance >= 5
ORDER BY character_id ASC
LIMIT 1;
Executing this query on the appropriate database would give you the first entry from the "litcharacters" table that meets the criteria of having 5 or more appearances.
Learn more about database here
https://brainly.com/question/24027204
#SPJ11
you plan to deploy the following azure web apps: webapp1, that uses the .net 6 runtime stack webapp2, that uses the asp.net v4.8 runtime stack webapp3, that uses the java 17 runtime stack webapp4, that uses the php 8.0 runtime stack you need to create the app service plans for the web apps. what is the minimum number of app service plans that should be created?
Since you need to create the App Service plans for the web apps, the minimum number of App Service plans that must be created is option A-1.
How does Azure webapp work?Without needing to deploy, set up, and maintain your own Azure VMs, you may create an app in Azure using the platform offered by Azure Web Apps. The ASP.NET, PHP, Node. js, and Python may all be used to create web applications. Additionally, they incorporate well-known coding environments like GitHub and Visual Studio.
Microsoft developed and maintains Azure Web Apps, a platform for hosting websites based on cloud computing. It is a platform as a service that enables the publishing of Web apps using several frameworks and different programming languages, including proprietary ones from Microsoft.
Therefore, You can support up to 10 Web Apps by creating one App Service Plan. Any additional use of the other resources is unnecessary and not specified as a prerequisite.
Learn more about azure web apps from
https://brainly.com/question/28813133
#SPJ1
See full question below
You plan to deploy the following Azure web apps:
WebApp1, which uses the .NET 5 runtime stack
WebApp2, which uses the ASP.NET V4.8 runtime stack
WebApp3, which uses the Java 11 runtime stack
WebApp4, which uses the PHP 8.0 runtime stack
You need to create the App Service plans for the web apps.
What is the minimum number of App Service plans that must be created?
A-1
B-2
C-3
D-4
The library is purchasing Argus TL2530P All-In-One Thin clients. What does it mean that the thin clients are 802.3at compliant?
In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.
1. Server providing data storage will possess database applications.
2. Print server will have applications to provide print capability.
The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.
The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.
Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.
Learn more about server on:
https://brainly.com/question/29888289
#SPJ1
[4]
) Describe what is involved in the clearing of bank cheques which the bank has collected in the
course of the day.
Plz any answer need it quickly help me if you know
Answer:
The clearing process begins with the deposit of a cheque in a bank. ... The cheque is passed for payment if the funds are available and the banker is satisfied about the genuineness of the instrument. The cheques that are unpaid are returned to the presenting bank through another clearing called the Return Clearing.
hopes this helps you?????????
Explanation:
Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site?
a. a cookie
b. a wiki
c. an antivirus
d. a bookmark
The option which is a small file that is placed on the computer hard drive of visitors to an organization's site is called "Cookie" Opton A)
How does a cookie work ?A cookie is a small file that is placed on a visitor's computer hard drive when they access a website.
It is used to store information about the visitor's interactions with the websiteand can be accessed by the website during subsequent visits.
Users can choose to accept or reject cookies,delete existing cookies, or configure their browser to prompt for cookie acceptance on each website visit.
Learn more about Cookie at:
https://brainly.com/question/14252552
#SPJ1
Janae started an essay on the computer at school. She would like to work on it when she gets home, but she does not have a flash drive. What technology would allow her to work on the essay on any device as long as there is internet access?
Answer:
The answer is "Cloud Computing".
Explanation:
The term, cloud computing also is known as accessible on-demand, it uses central computer services through specific active user management, especially for cloud services.
It is used to define storage systems accessible through the Internet for several users. It offers rapid innovation, scalable resources, or advantages of scale to computing resources, that's why she uses cloud computing technology.Is the computer a device that calculates and has the independence and initiative for the actions it performs?
Answer:
The answer is "True".
Explanation:
In this question, the given statement is true because the computer is a device that receives information as input, analyzes information utilizing a program that provides relevant information for the processed data, and in this, it performs numerous calculation and all the calculation will be store in its memory, which is used in the future for collect data on hard drives.
tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard
Answer:
Option C, or the CPU.
Explanation:
The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.
Imagine that you just received a summer job working for a computer repair shop. One of your first tasks is to take apart a computer that is having trouble and identify the problem. Identify and describe several main components that you will find once you open the computer. Do you think all computing devices have these components? Once you fix the problem and put the computer back together again, how will software help the computer turn on?
Identify main components of a computer, discuss their presence in computing devices, and describe how software helps the computer turn on after a repair.
What is computer?
A computer is an electronic device that can be programmed to accept and process data into information according to a set of instructions. It consists of hardware components such as the CPU, memory, storage devices, input/output devices, and software components such as the operating system and applications.
As a computer repair technician, some main components to identify when opening a computer are the motherboard, CPU, RAM, hard drive, power supply, and cooling system; not all computing devices have the same components. Software such as the BIOS and operating system will help the computer turn on and function properly.
To know more about software visit:
brainly.com/question/1022352
#SPJ1
Please help quick i only have 45 minutes left on this test
Answer choices :
radio link protocol
Bob's fingers
laptop
phone company
radio waves
fire trucks
electric current
dispatcher
sound waves
Answer: phone company, radio link protocol, electric current, sound waves
Explanation: if something is wrong, I'm very sorry
Dumas, who has excellent mechanical aptitude, owns a computer with two hard drives. One
drive is used for the operating system and the other drive is used for his personal files. He
decides to install a third disk in a RAID 1 configuration to protect the disk with his files
against data loss. He is not too concerned about data loss on the disk with the operating
system because he could easily reinstall the OS, so that disk is not included in the RAID
configuration. When he is done, he powers up his computer, no error messages are displayed,
yet he is distraught because all his data is lost. Why would this happen?
O The new drive was smaller than the original drive so the data from the original did not
fit.
O He didn't back up his data. When RAID is configured all data on participating drives is
lost.
O The RAID expansion card is not seated properly so the RAID drives are not being
detected.
Since the new drive had no data, and RAID 1 mirrors data, it erased the data on the
original.
Answer:
He didn't back up his data. When RAID is configured all data on participating drives is lost.
Explanation:
because i'm asian
He didn't back up his data. When RAID is configured all data on participating drives is lost would this happen. Hence, option B is correct.
The operating system is the most important piece of software that operates on a computer. It manages the computer's memory, processes, software, and hardware. Using this technique, you can communicate with the computer even if you don't comprehend its language.
Examples of operating systems include Apple macOS, Microsoft Windows, g's Android OS, Linux, and Apple iOS.
All of the hardware and software are under the direction of the computer's operating system. It performs core tasks such handling input and output, controlling files, memory, and processes, and controlling peripheral devices like disk drives and printers.
Thus, option B is correct.
For more information about operating system, click here:
https://brainly.com/question/6689423
#SPJ2
Write a brief reflection paper on Slideshare. What and how will you put it to use in the future? What kind of resources do they have that could help you? Would you ever think about uploading your own resources to Slideshare? How can Slideshare benefit you professionally? How could it benefit you personally?
SlideShare is a popular online platform where users can upload, share, and view presentations, documents, and videos. It offers a range of resources that can be beneficial both personally and professionally.
In the future, I would put Slideshare to use by utilizing its vast collection of presentations and documents to enhance my understanding of various topics. It provides access to valuable educational materials and expert insights, making it a valuable learning resource.Personally, Slideshare can benefit me by expanding my knowledge and helping me stay updated with the latest trends and developments in different fields. Professionally, it can be useful for creating and sharing presentations that showcase my skills and expertise, establishing credibility within my industry.
SlideShare's resources can help me with research, studying, and gaining insights into different subjects. It also allows users to upload their own resources, which could be a great opportunity to share my knowledge and contribute to the platform's content. By doing so, I can establish myself as an expert in my field and potentially gain recognition from a wider audience.
In conclusion, Slideshare is a valuable platform that offers a wide range of resources that can benefit me both personally and professionally. Its vast collection of presentations, documents, and videos can enhance my learning and provide opportunities for sharing my own knowledge. By utilizing SlideShare, I can stay updated, expand my expertise, and connect with a larger community of learners and professionals.
Learn more about PowerPoint Presentation:
brainly.com/question/14498361
#SPJ11
Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP and ARP b. IPv4 and IPv6 c. TCP and UDP d. BGP and OSPF.
The two protocols that manage neighbor discovery processes on IPv4 networks are ICMP and ARP.
Explanation:
ICMP (Internet Control Message Protocol) and ARP (Address Resolution Protocol) are two protocols used to manage neighbor discovery processes on IPv4 networks.
ICMP is used to diagnose network problems and send error messages. It is also used to discover the IP address of a device on the network.
ARP is used to map an IP address to a MAC address. When a device wants to send a packet to another device on the network, it needs to know the MAC address of the device. ARP resolves the MAC address of a device based on its IP address.
Together, ICMP and ARP manage the neighbor discovery processes on IPv4 networks. ICMP helps devices discover each other's IP addresses, while ARP helps devices map those IP addresses to MAC addresses.
To get similar answer on ICMP (Internet Control Message Protocol):
https://brainly.com/question/27961582
#SPJ11
An ethical hacker is running an assessment test on your networks and systems. The assessment test includes the following items:
•Inspecting physical security
•Checking open ports on network devices and router configurations
•Scanning for Trojans, spyware, viruses, and malware
•Evaluating remote management processes
•Determining flaws and patches on the internal network systems, devices, and servers
Which of the following assessment tests is being performed?
A. Active assessment
B. Passive assessment
C. Internal assessment
D. External assessment
Answer: Internal assessment
Explanation:
Based on the assessment performed such as the inspection of the physical security, checking open ports on network devices and router configurations and the scanning for Trojans, spyware, viruses, and malware etc, it can be infered that these are related to an internal assessment.
An internal assessment is the finding and the exploitation of vulnerabilities based on the perception of an inside attacker whom possesses a login to the network.
Which statement best describes network security?
Answer:
B.network security means all personal information is kept safe the network is not compromised and only authorized users had access Im pretty sure they
Explanation:
network security means all personal information is kept safe the network is not compromised and only authorized users had access Im pretty sure they
what is the name of the dark strip along the bottom of the windows environment?
a. navigation bar
b. toolbar
c. taskbar
d. shortcuts menu
The taskbar is a small strip of icons that appears at the bottom of a computer screen and indicates which windows are open at any one time.
What does a computer taskbar do?A minimized application is still accessible from the taskbar since it is still displayed on the desktop. They have what is known as desktop presence. Users may see the open primary programs and some auxiliary windows on the computer and rapidly switch between them by using the taskbar.
How come it's called a taskbar?The phrase "taskbar" in computing refers to the program desktop bar that is used in Windows Xp 95 and later revisions to start and monitor apps. Similar interface components can be found in other desktop environments as well.
To know more about taskbar visit:
https://brainly.com/question/4908632
#SPJ4
What is a software routine that collects information about the devices operation?
Network management agent is a software routine that collects information about a device’s operations.
Network management is a process that monitors, configures, and manages network performance. As network complexity grows its ability to operate effectively depends upon the quality of network management. A network management agent is software that collects information from the network, network devices like routers and switches can also be used to access information.
Some benefits of effective network management include network visibility, performance optimization, and downtime detection. Network management is very important to ensure service delivery, reliability, and overall performance.
You can learn more about network management at
https://brainly.com/question/27961985
#SPJ4
Question # 10
Dropdown
Complete the sentences describing a computer innovation.
Software and technology that allow people to work together on a task are known as BLANK.
A. game-based learning
B. augmented reality
C. collaboration tools
HELP ME!
Answer:collaboration tools
Explanation:
Which of the following is NOT a method for applying the SDLC model?
ITIL
Lean
IPO
Agile
Answer:
IPO is not a mehod for applying the SDLC .