When designing a laptop, the three things that designers think about include:
A. The balance between space, cost, and speed when processing data.
B. How increasing the computer's speed increases its power consumption.
D. Whether to include a hard drive with greater storage capacity.
How to explain the informationDesigners should prioritize the balance between space, cost, and speed when processing data to ensure that the laptop is optimized for performance and affordability.
They should also consider how increasing the computer's speed can affect its power consumption, as this can impact the battery life and overall energy efficiency of the device.
Learn more about laptop on
https://brainly.com/question/16045385
#SPJ1
PLEASE HELP!!! THIS IS DUE TODAY! WILL MARK BRAINLIEST!
Five Rules of Digital Citizenship and provide one example for each rule
please help me! i'm begging you!!
Answer:
-be nice
-be respectfull
-dont bully
-if u see somthing say somethung
-dont use same password for everything
Explanation:
Create lookup functions to complete the summary section. In cell I6, create a formula using the VLOOKUP function to display the number of hours worked in the selected week. Look up the week number in cell I5 in the range A17:G20, and return the value in the 2nd column. Use absolute references for cell I5 and the range A17:G20.
Answer:
The vlookup formula is given below
(Vlookup,I5,A17:G20,9,1)
Please mark brainliest
Explanation:
In cell I6 write this formula (=Vlookup,I5,A17:G20,9,1)
While writing the formula press tab to select vlookup then select the value you want to look then add a comma then select the range of the data you want to look in then add comma then write the number of the column number you want the data from then add comma then there will be a choice of approximate or exact, select 1 or 2 accordingly and press enter.
does applying creativity to your product or service important?
Explanation:
Applying creativity to your product or services will serve as your edge in attracting customers or consumers. When you are able to deliver a sevice or product that has a strong appeal brought about by creativity, you are able to hold the market's attention and make them want to try whatever you're selling or offering.
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center ___________ layer.
Answer:
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center aggregation layer.
Explanation:
Consider the given information.
A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center aggregation layer.
the bearing of point p from A
Answer:
can you please give a correct question next time or please make the question clear for the answerer.
thank you
Explanation:
hope you will adhere to my advice
Hi there! I need a bit of help on my computer's assignment. Question is below!
\(\underline{\large\text{Question}}\)
Selena would like go back to a page that she visited recently. She should use the _____.
A) links in the display window
B) scroll bar to scroll up through the pages
C) back button in the navigation bar
D) click on the back button in the display window
\(\underline{\large\text{Exceptions:}}\)
The answer must:
- Be correct.
- Be well explained
The answer must not include:
- Spams
- Incorrect answers
- Incomplete explanation
Good luck :)
Answer:
The back button of the navigation bar
Explanation:
The back and forward buttons are standard on the many web browsers. The navigation bar is the same place where you type your URLs. In this case, Selena would use the back button to go back to an active window she had previously visited. It helps you move backward in the same order you previously made your visits.
_______ reality allows physical and virtual elements to interact with one another in an environment; it is not a fully immersive experience because it maintains connections to the real world.
Answer:
Mixed Reality
Explanation:
You are joining a new software development team and you learn that they are very big fans of Unit Testing. In fact, all of the automated testing in their code base is Unit Testing. They also tell you that they have a very high testing coverage. More than 90% of the lines of code in their project are covered by at least one unit test.
Required:
What kinds of bugs would you expect this code to be well-guarded against?
The unit testing is a software testing technique in which individual units or components of a software system are tested individually to validate their functionality.
Here is the answer to the question, what kinds of bugs would you expect this code to be well-guarded against if the software development team is a big fan of Unit Testing:Due to the high coverage of the code by unit testing, it would be well-protected from a range of bugs. Here are some of the bugs that would be well-guarded against by the unit tests
1. Logic errors: These are bugs that arise as a result of an incorrect sequence of logic. They could manifest themselves as an infinite loop or an incorrect output. Unit tests, on the other hand, assist in catching logic errors by evaluating the functionality of the individual component in isolation from other components.
2. Boundary value errors: Bugs like these occur when a component is not working properly at its boundary values. These values could be the maximum or minimum acceptable input, or the point at which the component transitions from one state to another. Unit tests would detect and correct these types of bugs by running a test suite that examines all feasible input and output combinations.
3. Integration errors: These bugs arise when the interaction between two or more components is incorrect. This can occur when there is a communication error or when the expected result of one component is not achieved. The majority of these problems can be detected through unit tests that verify each component's interaction with others.
4. Performance issues: These are faults that are caused by an application's inefficient or ineffective code. Unit tests can detect and correct these problems by assessing the functionality of each component and optimizing the code.5. Run-time errors: These are issues that arise while the program is running. Unit tests can detect these types of problems by exercising each component with different inputs and verifying that no exceptions are thrown.These are some of the kinds of bugs that the code would be well-guarded against if the software development team is a big fan of Unit Testing.
To know more about software testing technique visit:
https://brainly.com/question/14449181
#SPJ11
What does the router on the WAN owned by your internet service provider do
with any packet it receives?
A. The router reads the packet and sends it to another router on the
internet.
B. The router sends the packet to a central computer in a secret
location.
C. The router sends the packet directly to individual devices all over
the world.
D. The router stores the packet in an electromagnetic cloud for easy
access.
The router on the WAN owned by an internet service provider (ISP) does the following with any packet it receives: option A.
What is a router?A router is a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.
In Computer networking, the router on the WAN owned by an internet service provider (ISP) is designed and developed to read the packet and then send it to another router on the internet.
Read more on router here: brainly.com/question/24812743
#SPJ1
Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.
Here is a suggested infographic on internet safety practices using Microsoft Word:
[A Word document shows the following infographic:]
Staying Safe Online
Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.
Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.
Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.
Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.
Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.
Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.
Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.
Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.
Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!
Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.
A brief overview of some important internet safety practices that you can include in your infographic using the Word Processing Software is given.
How to explain the informationUse strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.
Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.
Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.
Learn more about Word Processing on
https://brainly.com/question/985406
#SPJ1
Which of the below would provide information using data-collection technology?
Buying a new shirt on an e-commerce site
Visiting a local art museum
Attending your friend's baseball game
Taking photos for the school's yearbook
The statement that would provide the information through the utilization of data-collection technology is as follows:
Buying a new shirt on an e-commerce site.Thus, the correct option for this question is A.
What is meant by Data-collection technology?Data-collection technology may be defined as a type of technology that significantly deals with the process of collecting data for use in business decision-making, strategic planning, research, and other purposes.
According to the context of this question, visiting a local art museum represents the collection of information in real form, while buying a new shirt on an e-commerce site is the collection of data and information in virtual form.
Other options like attending your friend's baseball game and taking photos for the school's yearbook do not involve any sort of technology based on data collection.
Therefore, the correct option for this question is A.
To learn more about Data collection technology, refer to the link:
https://brainly.com/question/25633523
#SPJ1
How is cropping different from scaling?
Answer:
Scaling changes the size of the whole image by resampling it(duplicating the pixels). in cropping you only get a part of the original image/ remove the outer area of it .
Explanation:
during the planning phase of designing a web site, what might be included? in this phase, html is used to create site content, while css provides elements of design such as typography, color, and layout. it involves specifying the updates and tasks necessary to keep the site fresh, functioning, and useable. this phase lasts until the web site is removed or undergoes another overhaul. it includes looking for related web sites to get a sense of typical design characteristics. in this phase, designers may offer suggestions to their clients about how to keep the site running smoothly.
During the planning phase of designing a web site, several components are taken into consideration. This phase is crucial as it sets the foundation for the rest of the web design process.
Identifying the purpose of the website: It's essential to determine the site's primary objective and what it intends to achieve. The primary aim may be to provide information, to sell products, to gain more leads, or to improve online visibility.
Creating a sitemap: A sitemap aids in the structuring of the website. It includes all of the website's pages and demonstrates how they are connected to one another.
Defining the website's target audience: Understanding the target audience and what they want is critical in web design. Designers may research target audiences to understand their needs and tailor the website accordingly
Learn more about website at:
https://brainly.com/question/23200040
#SPJ11
What makes these Pokémon special?
-Charizard
-Blastoise
-Charmander
-Ivysaur
-Missingno
First one to get it right gets Brainliest! If you get it right in the comments, I'll thank you on your profile!
Answer:
Charizard is a fire type dragon that is orange Blastoise is a big turtle that's water type Charmander is a fire type dinosaur the first evolution of Charizard Ivysaur is a grass type Turtle looking thing and the last one is a glitch
Answer:
i believe they are all based off of real amphibians and reptiles.
Explanation:
i really need brainliest if i got it wrong give me another try. i named my chameleon charmander so i really do love pokemon this is just such a specific question.
Scrie un program care citind varstele a 2 copii afiseaza care dintre ei este cel mai mare si cu cat. Exemplu: Pentru varstele 5 si 9 se va afisa "al doilea copil e mai mare cu 4 ani"
Answer:
primul_copil = int(input("Introduceți vârsta primului copil: "))
aldoilea_copil = int(input("Introduceți vârsta celui de-al doilea copil: "))
def copilmai_mare(varsta1, varsta2):
if varsta1 > varsta2:
diferenta = varsta1 - varsta2
print("copilul mai mare este varsta1 cu diferența de vârstă de: ", diferenta )
else:
diferenta = varsta2 - varsta1
print("copilul mai mare este varsta2 cu diferența de vârstă de: ", diferenta )
copilmai_mare(primul_copil, aldoilea_copil)
Explanation:
Programul python de mai sus definește o funcție "copilmai_mare" care ia două argumente "varsta1" și "varsta2". Diferența dintre vârstele copiilor este comparată, iar cel mai mare copil și diferența sunt tipărite pe ecran.
Which is an example of a variable name written in camelcase?
Song Name
songName
song Name
SongNAME
Answer: songName
-DoggyMan5
hy does payments constitute such a large fraction of the FinTech industry? (b) Many FinTech firms have succeeded by providing financial services with superior user interfaces than the software provided by incumbents. Why has this strategy worked so well? (c) What factors would you consider when determining whether an area of FinTech is likely to tend towards uncompetitive market structures, such as monopoly or oligopoly?
(a) lengthy and complex processes for making payments (b) legacy systems and complex interfaces (c) regulatory requirements and substantial initial investment, can limit competition
(a) Payments constitute a significant portion of the FinTech industry due to several factors. First, traditional banking systems often involve lengthy and complex processes for making payments, leading to inefficiencies and higher costs. FinTech firms leverage technology and innovative solutions to streamline payment processes, providing faster, more secure, and convenient payment options to individuals and businesses. Additionally, the rise of e-commerce and digital transactions has increased the demand for digital payment solutions, creating a fertile ground for FinTech companies to cater to this growing market. The ability to offer competitive pricing, improved accessibility, and enhanced user experience has further fueled the growth of FinTech payment solutions.
(b) FinTech firms have succeeded by providing financial services with superior user interfaces compared to incumbents for several reasons. Firstly, traditional financial institutions often have legacy systems and complex interfaces that can be challenging for users to navigate. FinTech companies capitalize on this opportunity by designing user-friendly interfaces that are intuitive, visually appealing, and provide a seamless user experience. By prioritizing simplicity, convenience, and accessibility, FinTech firms attract and retain customers who value efficiency and ease of use. Moreover, FinTech companies leverage technological advancements such as mobile applications and digital platforms, allowing users to access financial services anytime, anywhere, further enhancing the user experience.
(c) Several factors contribute to the likelihood of an area of FinTech tending towards uncompetitive market structures such as monopoly or oligopoly. Firstly, high barriers to entry, including regulatory requirements and substantial initial investment, can limit competition, allowing a few dominant players to establish market control. Additionally, network effects play a significant role, where the value of a FinTech service increases as more users adopt it, creating a competitive advantage for early entrants and making it challenging for new players to gain traction. Moreover, data access and control can also contribute to market concentration, as companies with vast amounts of user data can leverage it to improve their services and create barriers for potential competitors. Lastly, the presence of strong brand recognition and customer loyalty towards established FinTech firms can further solidify their market position, making it difficult for new entrants to gain market share.
To learn more about technology click here: brainly.com/question/9171028
#SPJ11
Which of the following candidates would most likely be hired as a graphic artist?
o a visual design artist with seven years of experience in advertising
a multimedia artist with five years of experience in multimedia design
O a recent college graduate with a degree in multimedia design
O a recent college graduate with a degree in film design
Answer:
a multimedia artist with five years of experience in multimedia design
Explanation:
Give three reasons why service desks chronically underperform.
There are several reasons why service desks may chronically underperform due to inadequate training,poor communication, lack of resources.
The three possible explanations are :
1. Inadequate training: Service desk employees require thorough training to be able to handle different types of customer inquiries efficiently.
If the training provided is insufficient or not updated regularly, the employees may not be equipped with the necessary skills and knowledge to handle complex issues.
This can lead to long wait times, frustrated customers, and a decrease in overall performance.
2. Poor communication: Effective communication is essential in ensuring that the service desk is functioning at its best. When communication is lacking between the service desk and other departments, customers may receive inconsistent or incomplete information, leading to confusion and delays.
This can also result in a lack of coordination between different teams, further exacerbating the problem.
3. Lack of resources: A service desk that is understaffed, under-resourced or overworked is likely to underperform. Without enough personnel to handle customer inquiries, the service desk may be forced to prioritize certain issues while neglecting others, leading to a backlog of problems that eventually become unmanageable.
Similarly, without adequate tools, technology, or infrastructure, the service desk may struggle to provide prompt and effective service.
By addressing these issues, service desks can improve their performance and provide better customer service. This may involve investing in more comprehensive training programs, improving communication channels, and increasing staffing levels or resource allocation.
For more questions on service desks
https://brainly.com/question/29240431
#SPJ11
1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze
The tool that you can use to find duplicates in Excel is c. Conditional Formatting
b. the first real row of datac. analyze, data, and programsWhat is Conditional Formatting?Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.
Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.
Read more about Conditional Formatting here:
https://brainly.com/question/30652094
#SPJ4
Isabela wants to edit a presentation for her science class. she is in the main view of the powerpoint application. how can she access her presentation? go to the backstage view, and click options. click the file tab, and click the open option. click the quick access toolbar, and click the open option. type in the name of the file in the search field, and click open.
The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.
What is power point presentation?Power point presentation is a softwere which display the data with the help of collection of slides.
Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.
Form the main view to access her presentation, Isabela need to follow the following steps-
Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.
Learn more about the power point presentation here;
https://brainly.com/question/24653274
Answer: It’s B, Click the File tab, and click the open option
Explanation:
just got it right on edge
(20 points) our favorite program runs in 8 seconds on computer a, which has a 2 ghz clock. we are trying to help a computer designer build a computer, b, that will run this program in 4 seconds. the designer has determined that a substantial increase in the clock rate is possible, but this increase will affect the rest of the cpu design, causing computer b to require 1.3 times as many clock cycles as computer a for this program. what clock rate should we tell the designer to target?
We can advise the computer designer to target a clock rate of 5.2 GHz for computer B in order to run the program in 4 seconds with 1.3 times as many clock cycles as computer A.
Clock Rate is the number of clock cycles a CPU (Central Processing Unit) can perform in one second. It is measured in GHz (Gigahertz). The clock rate of a computer is used to determine how many instructions it can process in one second.
To determine the target clock rate for computer B in order to run the program in 4 seconds with 1.3 times as many clock cycles as computer A, we can use the following steps:
Find the clock cycles required for computer A to run the program:Given:
Time taken by computer A to run the program = 8 seconds
Clock rate of computer A = 2 GHz
We can use the formula:
Clock cycles = Time taken * Clock rate
Substituting the values:
Clock cycles for computer A = \(8 * 2 = 16\) billion cycles
Determine the desired clock cycles for computer B:Since computer B requires 1.3 times as many clock cycles as computer A, we can multiply the clock cycles of computer A by 1.3 to get the desired clock cycles for computer B:
Desired clock cycles for computer B = 1.3 * Clock cycles for computer A
Substituting the value of clock cycles for computer A:
Desired clock cycles for computer B = \(1.3 * 16\) billion cycles
Calculate the target clock rate for computer B:Given:
Time taken by computer B to run the program = 4 seconds (as per the requirement)
Desired clock cycles for computer B (calculated in step 2)
We can rearrange the formula used in step 1 to solve for the target clock rate for computer B:
Clock rate for computer B = Desired clock cycles / Time taken
Substituting the values:
Clock rate for computer B = \(\frac{(1.3 * 16)}{4}\)
Calculating the value:
Clock rate for computer B = 5.2 GHz
So, in order to complete the programs in 4 seconds with 1.3 times as many clock cycles as computer A, we can advise the computer designer to set a target clock rate of 5.2 GHz for computer B.
Learn more about clock rate
brainly.com/question/12950625
#SPJ11
Which of the following is a set of security controls designed to protect payment account security such as a credit card transaction?
CIS Critical Security Control
ONIST Framework
OPII Framework
Payment Card Industry Data Security Standard (PCI DSS)
Write a program in Java that asks the user to enter four weighted assessment grades, calculate the average, then display the average with the message: "Student Pass" if the average is greater than or equal 60 or the message "Student Fail" otherwise. The details of the assessments and weights are as follow: Homeworks: 20% Labs: 15% Midterm: 25% Final: 40%
Answer:
Explanation:
In order to calculate the weighted average, the grade itself is multiplied by the percentage of the category and then these values are summed. This sum is then divided by the total percentage of the portfolio.
import java.util.Scanner;
class Main {
public static void main(String[] args) {
double sumOfWeights = 100;
Scanner in = new Scanner(System.in);
System.out.println("Please Enter Homework Grade: ");
double homework = in.nextDouble() * 20;
System.out.println("Please Enter Labs Grade: ");
double labs = in.nextDouble() * 15;
System.out.println("Please Enter Midterm Grade: ");
double midterm = in.nextDouble() * 25;
System.out.println("Please Enter Final Grade: ");
double finals = in.nextDouble() * 40;
double average = (homework + labs + midterm + finals) / sumOfWeights;
System.out.println("The Average of these Weighted Grades is " + average);
}
}
What is unique about a dual-axis chart
Answer:
B: Data is charted by two different types of data.
Explanation:
Got it correction edge.
Answer: B: Data is charted by two different types of data
Explanation:
i just answered it on edge
a cloud platform for automating and sharing analysis of raw simulation data from high throughput polymer molecular dynamics simulations
The cloud platform that can be used for automating and sharing analysis of raw simulation data from high throughput polymer molecular dynamics simulations is called Molecular Dynamics Simulation (MD Simulation) Cloud Platform.
Explanation:
1. Molecular Dynamics Simulation (MD Simulation): It is a computational method used to study the behavior of atoms and molecules over time. In the context of polymer systems, MD simulations are used to understand the dynamic behavior of polymer chains.
2. Raw simulation data: This refers to the data generated during the MD simulations, which includes information about the positions, velocities, and forces acting on the atoms in the system at each time step.
3. High throughput polymer molecular dynamics simulations: High throughput simulations involve running a large number of MD simulations in parallel or in quick succession to explore a wide range of parameter space or generate large amounts of data.
4. Cloud platform: A cloud platform refers to a virtual environment that allows users to access and use computational resources (such as processing power, storage, and software) remotely over the internet.
The Molecular Dynamics Simulation Cloud Platform provides the following features:
- Automation: It allows users to automate the analysis of raw simulation data, eliminating the need for manual data processing and analysis.
- Sharing: It provides a platform for researchers to easily share their raw simulation data and analysis results with collaborators or the wider scientific community.
- Scalability: The cloud platform can handle high throughput simulations by leveraging the scalability of cloud computing resources, enabling efficient analysis of large datasets.
- Data management: It offers tools for organizing, storing, and retrieving simulation data, ensuring easy access and traceability of results.
- Visualization: The platform may include visualization tools to aid in the analysis and interpretation of simulation data.
In conclusion, the Molecular Dynamics Simulation Cloud Platform is a cloud-based solution that enables the automation and sharing of analysis of raw simulation data from high throughput polymer molecular dynamics simulations.
To know more about Simulation visit
https://brainly.com/question/30353884
#SPJ11
Why does Sidi Mention Butterflys?
they serve as a metaphor or symbolic representation for a certain concept or idea being discussed. The context of the conversation would help clarify the exact reason for the mention of butterflies by Sidi.
Metaphors are commonly used in engineering to help describe complex concepts and phenomena in a more easily understandable way. For example, the concept of a "system" in engineering can be compared to the human body, where each component or part plays a specific role in the overall function of the system.
Metaphors can also be used to illustrate the behavior of materials or systems under certain conditions. For instance, a spring can be used as a metaphor for elastic materials, as it stores energy when compressed and releases it when expanded.
Metaphors can be particularly helpful in communicating technical information to non-experts, such as clients, stakeholders, or members of the public. They can also help engineers to visualize and conceptualize their designs, and to explore potential solutions to engineering problems in a creative and innovative way.
Learn more about metaphor here:
https://brainly.com/question/31712467
#SPJ11
You cannot remember the address of Kayah’s website. What type of tool will help you
locate/find it by typing in keywords to look for it?
Answer:
A search engine
Explanation:
View the pdf
Which of the following are provided by most
professional organizations? Check all of the boxes
that apply.
uniforms
a code of conduct
Olegal representation
a network of professionals
skills validation
DONE
a code of conduct
a network of professionals
skills validations
In which phase of the ethical hacking methodology would a hacker be expected to discover available targets on a network
Answer:
Scanning and enumeration.
Explanation:
In the scanning and enumeration phase of the ethical hacking methodology, a hacker would be expected to discover available targets on a network.
The scanning and enumeration phase of the ethical hacking follows the reconnaissance phase and it typically involves discovering available targets on a network for informations such as username, password, IP address etc.