which of the following activities poses the greatest personal cybersecurity risk? which of the following activities poses the greatest personal cybersecurity risk? entering your password to login to a web site encrypted over https emailing your bank account number to an online vendor to purchase a product from them downloading a free text editor program on the internet providing your email address when taking an online survey

Answers

Answer 1

Among the given options, entering your password to login to a website encrypted over HTTPS poses the greatest personal cybersecurity risk.

How to identify the greatest personal cybersecurity risk?

Entering your password to login to a website encrypted over HTTPS is considered the greatest personal cybersecurity risk among the provided options. While HTTPS ensures a secure connection between your device and the website, the risk lies in potential vulnerabilities at the website's end or during data transmission.

Even though the connection is encrypted, if the website itself is compromised or has poor security measures, your password could still be exposed to attackers.

Cybercriminals may exploit vulnerabilities in the website's infrastructure, such as outdated software or weak authentication systems, to gain unauthorized access to user data.

Furthermore, there is always a possibility of phishing attacks where attackers create malicious websites that mimic legitimate ones, tricking users into entering their passwords.

These fake websites may use HTTPS to give a false sense of security, making it harder for users to detect the deception.

While other activities listed may also pose risks, such as email interception or malicious software downloads, entering your password on a potentially compromised website poses the greatest immediate threat to your personal cybersecurity as it directly exposes sensitive login credentials.

Therefore, it is crucial to remain vigilant and ensure that websites you interact with have proper security measures in place, regardless of the encryption used.

Learn more about cybersecurity

brainly.com/question/30409110

#SPJ11


Related Questions

match the tools to the appropriate benefit of computer skills

match the tools to the appropriate benefit of computer skills

Answers

Answer:

i hope this helped A LOTTTTTTT

Explanation:

match the ljufhgsde and the saw together you'll see the answer

simple basic program

Answers

Answer:

Bionary

Explanation:

explain the all types of commands. off DDl and DML​

Answers

Here is your Answer:-

DDL Commands:- DDL means Data Definition Language. It is used to create and modify the structure of database objects in SQL.

DML Command:- DML Command in SQL database stands for Data Manipulation Language. DML commands are used to retrieve, store, Modify, delete, insert and update data in database.

Answer:

Structured Query Language(SQL) as we all know is the database language by the use of which we can perform certain operations on the existing database and also we can use this language to create a database. SQL uses certain commands like Create, Drop, Insert, etc. to carry out the required tasks.

These SQL commands are mainly categorized into four categories as:

DDL – Data Definition Language

DDL – Data Definition LanguageDQl – Data Query Language

DDL – Data Definition LanguageDQl – Data Query LanguageDML – Data Manipulation Language

DDL – Data Definition LanguageDQl – Data Query LanguageDML – Data Manipulation LanguageDCL – Data Control Language

Though many resources claim there to be another category of SQL clauses TCL – Transaction Control Language. So we will see in detail about TCL as well.

DDL (Data Definition Language):

DDL or Data Definition Language actually consists of the SQL commands that can be used to define the database schema. It simply deals with descriptions of the database schema and is used to create and modify the structure of database objects in the database.DDL is a set of SQL commands used to create, modify, and delete database structures but not data. These commands are normally not used by a general user, who should be accessing the database via an application.

List of DDL commands:

CREATE: This command is used to create the database or its objects (like table, index, function, views, store procedure, and triggers).

DROP: This command is used to delete objects from the database.

ALTER: This is used to alter the structure of the database.

TRUNCATE: This is used to remove all records from a table, including all spaces allocated for the records are removed.

COMMENT: This is used to add comments to the data dictionary.

RENAME: This is used to rename an object existing in the database.

DQL (Data Query Language):

DQL statements are used for performing queries on the data within schema objects. The purpose of the DQL Command is to get some schema relation based on the query passed to it. We can define DQL as follows it is a component of SQL statement that allows getting data from the database and imposing order upon it. It includes the SELECT statement. This command allows getting the data out of the database to perform operations with it. When a SELECT is fired against a table or tables the result is compiled into a further temporary table, which is displayed or perhaps received by the program i.e. a front-end.

List of DQL:

SELECT: It is used to retrieve data from the database.

DML(Data Manipulation Language):

The SQL commands that deals with the manipulation of data present in the database belong to DML or Data Manipulation Language and this includes most of the SQL statements. It is the component of the SQL statement that controls access to data and to the database. Basically, DCL statements are grouped with DML statements.

List of DML commands:

INSERT : It is used to insert data into a table.

UPDATE: It is used to update existing data within a table.

DELETE : It is used to delete records from a database table.

LOCK: Table control concurrency.

CALL: Call a PL/SQL or JAVA subprogram.

EXPLAIN PLAN: It describes the access path to data.

DCL (Data Control Language):

DCL includes commands such as GRANT and REVOKE which mainly deal with the rights, permissions, and other controls of the database system.

List of DCL commands:

GRANT: This command gives users access privileges to the database.

REVOKE: This command withdraws the user’s access privileges given by using the GRANT command.

Though many resources claim there to be another category of SQL clauses TCL – Transaction Control Language. So we will see in detail about TCL as well. TCL commands deal with the transaction within the database.

List of TCL commands:

COMMIT: Commits a Transaction.

ROLLBACK: Rollbacks a transaction in case of any error occurs.

SAVEPOINT:Sets a savepoint within a transaction.

SET TRANSACTION: Specify characteristics for the transaction.

Can somebody smart help me

Can somebody smart help me

Answers

Answer:

i think it is End tag,A

Consider the following C++ code: string str1, str2; char ch; int pos; cin >> str1 >> str2 >> pos; ch = str1[pos]; str1[pos] = str2[pos]; str2[pos] = ch; cout << str1 << " " << str2 << endl; Answer the following questions. (a) What is the output if the input is Summer Vacation 1? (b) What is the output if the input is Temporary Project 4? (c) What is the output if the input is Social Network 0?

Answers

Vaeation". This is because the program takes the strings "Summer" and "Vacation" as inputs for str1 and str2 respectively, and then takes the integer 1 as input for pos. The program then swaps the characters at position 1 in str1 and str2, resulting in the outputs "Smmmer Vacation" and "uummer Vaeation".

(a) The output would be "Sumber Vaccation" and "Vummer Sasation" because the code swaps the characters at position 1 in both strings.
(b) If the input is "Temporary Project 4", the output will be "Tempoarry Project" "Tempoeray Porjct". This is because the program takes the strings "Temporary" and "Project" as inputs for str1 and str2 respectively, and then takes the integer 4 as input for pos. The program then swaps the characters at position 4 in str1 and str2, resulting in the outputs "Tempoarry Project" and "Tempoeray Porjct".

(c) If the input is "Social Network 0", the output will be "Nocial Network" "Sosial Networke". This is because the program takes the strings "Social" and "Network" as inputs for str1 and str2 respectively, and then takes the integer 0 as input for pos. The program then swaps the characters at position 0 in str1 and str2, resulting in the outputs "Nocial Network" and "Sosial Networke".

Learn more about Vaeation here

https://brainly.com/question/14499619

#SPJ11

When assigning a literal to a variable of the byte type, if the literal is too large to be stored as a byte value, it _________

Answers

When assigning a literal to a variable of the byte type, if the literal is too large to be stored as a byte value, it receives a compile error.

What is a compile error?

Compilation error is known to be one that connote the  state at which a compiler is known to have failed to put together a piece of computer program source code, and this can be due to errors in the code, or others.

Hence, When assigning a literal to a variable of the byte type, if the literal is too large to be stored as a byte value, it receives a compile error.

Learn more about byte value from

https://brainly.com/question/15981925

#SPJ1

A _____ is a block of code containing standard SQL statements and procedural extensions that is stored and executed at the DBMS server.

Answers

Answer:

Persistent Stored Module (PSM).

Explanation:

Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.

Answers

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

The __________blank is the group that, in the absence of a clearly identified author, is responsible for the content of a document on the internet.
a) Webmaster
b) Moderator
c) Editorial board
d) Internet Service Provider

Answers

Correct option is c:  Editorial board. The editorial board is the group that, in the absence of a clearly identified author, is responsible for the content of a document on the internet not the ISP. When no author is specified, it is the responsibility of the editorial board to ensure the accuracy of the content in the publication.

The Webmaster, Moderator, and Internet Service Provider are all important roles in managing online content.

The Webmaster is responsible for the maintenance of a website. They oversee the design, development, and functionality of the website. A Webmaster's job includes uploading content, ensuring that the website is running properly, and responding to any technical issues that arise.

The Moderator is responsible for managing the discussions on a website. They review posts, comments, and feedback from users to ensure that they comply with the website's guidelines. They may delete posts that are inappropriate, offensive, or irrelevant.

ISP (Internet Service Provider) provides the Internet connection to their users. They offer different types of internet services, including DSL, cable, and fiber optic connections. They have control over which sites can be accessed and which cannot. ISPs may also provide additional services such as email accounts, web hosting, and cloud storage facilities.

Learn more about Editorial Board:

https://brainly.com/question/4296219

#SPJ11

how graphical representation of spreadsheet data can be helpful in business

Answers

Answer: Business graphs are visual aids used to analyze data. They can make comparing multiple sets of data much easier, as sometimes trends and relationships are easily identified on the chart or graph. They also help to show the audience the data in a way that is easy to understand and remember.

Explanation:

What is output by the following code?
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)

Answers

Answer:

if the code is like this, theres an indent on the print(sum)

c = 1

sum = 0

while (c < 10):

   c = c + 2

   sum = sum + c

   print (sum)

the output would be:

3

8

15

24

35

or

if the code look like this, it has no indent on print(sum)

c = 1

sum = 0

while (c < 10):

   c = c + 2

   sum = sum + c

print (sum)

the output would be:

35

Colors in graphics are represented by a ____________ data type.

Answers

Answer: Colors in graphics are represented by a ( string) data type.

Colors in graphics are represented by a string data type. Thus, option C is correct.

What is graphics?

The major benefit of someone using graphics for this intent is the utmost and highly desired high accuracy and simplicity we have from such drawings for the secured fabrication. Computer graphics is quite often used only for developing, altering, and creating various parts of machines as well as the entire contraption itself.

Alphanumeric data is represented as a string. This implies that a string may contain a variety of letters, all of which are treated as text, even if they really are integers.

The most popular data type for storing information is a sequence of characters. A string could also contain numbers and symbols, although they are always regarded as text.

Therefore, option C is the correct option.

Learn more about graphics, here:

https://brainly.com/question/11764057

#SPJ2

The question is incomplete, the complete question will be:

a data type. O Integer O String O Randonm O Float.

PROJECT PRACTICAL Manufacturing Facilities Design You are required to choose any freeware facilities design software package, or any of the following paid software packages; Excel, Microsoft Visio, AutoCAD/SolidWorks/ or any other CAD/CAM software, Arena/SIMIO or any other layout simulation package to design a manufacturing facility for a Motorcycle of your choosing. The Motorcycle can be of any engine capacity and be powered by any type of fuel source. In the event of opting for a freeware facility design software package then state the application name and provide a download link for the freeware you used. In your design consider, address the following minimum requirements: 1. An exhaustive product design with constituent components and dimensions. 2. Part list of what will be required to build your product. 3. Draw a precedence diagram clearly indicating the processes involved to build the product. 4. Detailed machine and other equipment specifications. 5. Draw a comprehensive computer-based plant layout of your manufacturing facilities, with proper dimensions and scale, including support facilities and all other features required for a fully functional and operational optimal manufacturing facility. 6. Clearly and systematically outline your decision process (e.g. how you decided on location of support functions, how you arrived at the number of workstations and workers required, etc.) 7. Outline a Capital Budget Breakdown for your envisaged manufacturing facilities 8. Give a breakdown of the expected manufacturing running costs of your plant for the first six months of operation. 9. Convert your assignment into a pdf file and submit electronically via Unisa.

Answers

The facilities design process involves optimizing manufacturing efficiency and productivity. AutoCAD was used to design the motorcycle and the manufacturing facility layout, while the other minimum requirements were met. The decision-making process was also systematically outlined, and a Capital Budget Breakdown and expected manufacturing running costs were provided.

Facilities design refers to the process of designing the layout of a manufacturing facility to optimize efficiency and productivity. In this project practical, we were tasked with designing a manufacturing facility for a motorcycle of our choosing. The following minimum requirements were specified:

1. Exhaustive product design with constituent components and dimensions.

2. Part list of what will be required to build your product.

3. Draw a precedence diagram clearly indicating the processes involved to build the product.

4. Detailed machine and other equipment specifications.

5. Draw a comprehensive computer-based plant layout of your manufacturing facilities, with proper dimensions and scale, including support facilities and all other features required for a fully functional and operational optimal manufacturing facility.

6. Clearly and systematically outline your decision process (e.g. how you decided on the location of support functions, how you arrived at the number of workstations and workers required, etc.)

7. Outline a Capital Budget Breakdown for your envisaged manufacturing facilities.

8. Give a breakdown of the expected manufacturing running costs of your plant for the first six months of operation.We used the AutoCAD software to design the manufacturing facility.

We began by designing the motorcycle, determining its components, dimensions, and parts list. We then created a precedence diagram, outlining the processes involved in building the product.We then created detailed machine and equipment specifications and used them to design the manufacturing facility layout. We considered the location of support functions and arrived at the number of workstations and workers required. The decision-making process was systematically outlined.We then prepared a Capital Budget Breakdown for the manufacturing facilities and gave a breakdown of the expected manufacturing running costs for the first six months of operation.

To know more about AutoCAD visit:

brainly.com/question/30242226

#SPJ11

Complete the sentence about mobile apps.
Some mobile apps use an
platform.
in the drop down menu it says blueberry xml and ios

which is the answer

Answers

Certain mobile apps require the aid of an integrated development platform (IDP) to produce and handle their software. Of these IDPs, Blueberry XML and iOS are two available for mobile app creation.

What is the best choice?

An adaptable choice among developers is Blueberry XML owing to its cross-platform IDP property - making it conducive for several programming languages.

In contrast, iOS is more specialized in creating apps solely designed for Apple's mobile operating system. Both IDPs offer accessible tools aiding developers to craft interfaces that are user-friendly, code-writing and app-testing for a seamless finish; ultimately delivering ideal mobile experiences for users.

Read more about mobile apps here:

https://brainly.com/question/30143420
#SPJ1

which tool uses arrows and shapes to define key points to help programmers when designing a program

Answers

The tool that uses arrows and shapes to define key points and assist programmers when designing a program is commonly known as a flowchart. A flowchart is a visual representation that uses different symbols, arrows, and shapes to depict the flow of control, decision points, and steps involved in a program's logic. It helps programmers visualize and plan the structure and flow of their code before implementing it.

After the Afton family dies what animatronics do their souls posses. Michael Afton dose not posses an animatronic but what dose Michael become and what is his animatronic "friend". UwU

Answers

Answer:

Michael becomes Golden Freddy.

Explanation:

I hate I know this and I know it's a joke but here we go

In theory, they all become -

Mrs. Afton - Ballora

Elizabeth - Circus Baby

William Afton - Doesn't really become anyone but he is inside Springtrap

The Crying Child - Theorised to be Golden Freddy

Michael Afton - Doesn't become anyone at all, but does have robot spaghetti of all the Sister Location animatronics// his friend is Eggs Benedict but no one knows for sure.

Caroline is collaborating with several writers who are creating multiple documents. There is a single list of content that must be eventually covered by all the documents, and Caroline needs a way to “flag” which writer is covering which content; all writers will be looking at the exact same online version of the list. Describe how Caroline could quickly use colors in Word to show which content goes with which writer; be specific about which Word tool she should use and how that tool operates.

Answers

A Word document can be shared with multiple users by selecting the File menu at the top ribbon and then select Share from the drop down menu

Several writers can work together on Microsoft Word by using the co-authoring, sharing, and co-editing features in MS Word

In order to co-author the content list, Caroline, should

1. Create the content list document

2. Click on Share icon on the top right corner of the document

3. Ensure to save the document in OneDrive

4. Input the email addresses of the other writers who are working on the list

5. Enter a message to the writers to add the title of the content they are working on in the list

When the other writers open the link to the document sent to them in the email they receive, and they open the document in a web browser, by selecting Edit Document > Edit in Browser

The presence of a writer and their real time changes to the content list document, showing the content they are working on are shown by colored flags that has the author (writer) name next to the content they are working on

Learn more about collaboration in Word here:

https://brainly.com/question/1877453

Write the removeevens() function, which receives a vector of integers as a parameter and returns a new vector of integers containing only the odd numbers from the original vector. the main program outputs values of the returned vector. hint: if the original vector has even numbers, then the new vector will be smaller in length than the original vector and should have no blank element. ex: if the vector passed to the removeevens() function is [1, 2, 3, 4, 5, 6, 7, 8, 9], then the function returns and the program output is: [1, 3, 5, 7, 9] ex: if the vector passed to the removeevens() function is [1, 9, 3], then the function returns and the program output is: [1, 9, 3]
main.py 1 def remove evens(nums): 2 # Type your code here. 3 4 if __name__ ==' ___main___':
5 nums = [1, 2, 3, 4, 5, 6, 7, 8, 9] 6 result = remove_evens(nums) 7 8 print(result)

Answers

Answer:

def remove_evens(nums):

# Create an empty list to hold the odd numbers

odds = []

# Loop through the input list and check if each number is odd

for num in nums:

if num % 2 != 0:

odds.append(num)

# Return the list of odd numbers

return odds

if __name__ == '__main__':

nums = [1, 2, 3, 4, 5, 6, 7, 8, 9]

result = remove_evens(nums)

print(result)

Explanation:

In this implementation, we first create an empty list called odds to hold the odd numbers. We then loop through the input list nums, checking if each number is odd using the modulus operator (%). If the number is odd, we append it to the odds list.

Finally, we return the odds list, which contains only the odd numbers from the input list. In the main program, we pass the input list [1, 2, 3, 4, 5, 6, 7, 8, 9] to the remove_evens() function, and print the resulting list [1, 3, 5, 7, 9].

Specialty devices like ipods, video game consoles, and television set-top boxes typically do not need an operating system. true false

Answers

False. Specialty devices like iPods, video game consoles, and television set-top boxes do require an operating system.

An operating system is responsible for managing the hardware and software components of a device, allowing it to function properly. While the operating systems on these specialty devices may be simpler and more specialized compared to those found on general-purpose devices like computers or smartphones, they still play a crucial role in facilitating the device's functionality. The operating system helps control the user interface, manage memory and storage, handle input and output, and enable software applications to run smoothly. In conclusion, specialty devices do need an operating system to perform their intended functions effectively.

To know more about operating system visit:

brainly.com/question/29532405

#SPJ11

When first designing an app, all of the folldwing are important EXCEPT
A. debugging
B. determining how a user would interact with the app.
C. determining the purpose of the app
D. identifying the target audience

Answers

Answer:

B

Explanation:

Determining how the user could interact with the app varies person to person, the others are essential to creating apps though.

What should document creators keep in mind regarding the use of color in visuals?.

Answers

The main points that document creator should keep in mind regarding the use of color in visuals are color wheel, saturation and contrast.

What are the key points about use of color in visuals?

1. The Color Wheel: Use the color wheel to create matching color schemes that are monochromatic, analogous, complementary, split complementary, triadic, and/or tetradic.

2. Four or Fewer: In most cases, create your design using a color scheme of four or fewer colors.

3. Emotion-Saturation: Use dark, desaturated colors to express serious and professional. Use bright, desaturated colors to express friendly and professional. Use fully saturated colors to grab attention or to appeal to children.

4. Color Psychology: Know how people and cultures respond to colors; use color to show caution, danger, happy, jealous, scary, acceptable, and other related emotions and experiences.

5. White is Nice: Treat white as a color. Use white to communicate clarity, sophistication, cleanliness, professional, and even, in some cases, expensive.

To know more about color in visual,

https://brainly.com/question/15198444?referrer=searchResults

#SPJ4

Question 33 Consider the following code segment. String letters - ("A", "B", "C", "D"), ("E", "P", "G", "1"), ("I", "J", "K", "L"}}; for (int col = 1; col < letters[0].length; col++) for (int row - 1; row < letters.length; row++) System.out.print(letterstrow][col] + " "); System.out.println(); What is printed as a result of executing this code segment?

Answers

This code segment initializes a 2D array of strings called "letters" with three rows and four columns. It then uses two nested for loops to print out each element of the array. The outer loop iterates over the columns, starting at index 1 and going up to the length of the first row of the array. The inner loop iterates over the rows, starting at index 0 and going up to the length of the array.

For each iteration of the outer loop, the code prints out the element of the array at the current row and column, followed by a space. After the inner loop completes for that column, the code prints out a newline character.

So the output of this code segment will be:
B P J
C G K
D 1 L

Note that the first column is not printed, because the outer loop starts at index 1. Also note that there is an error in the code as it should be "letters[row][col]" instead of "letterstrow][col]".

To know more about code segment visit:-

https://brainly.com/question/30353056

#SPJ11

why there is a need to "think before you click"?

Answers

Answer:

what are you saying is this a question

"think before you click"

"think before you click"It's the saying for Social Media Users.

We don't know what's there behind a particular post,tweet, comment,message.

And when you react to some of it by Commenting on it you maybe right or maybe wrong because if you comment to one saying 'Yeah I think this person is truly sincere' but the reality behind him is he is an abuser or a rude person in the public's view.

But you said he is sincere then People will asume you as them like a bad person supporting bad ones so thats The example of it "think before you click"

And

"Think before you leap"

is for think,say,react, before knowing the reason.

or

Take steps with precautions and carefully

may this helps you

bye

What woman ran for president on the National Equal Rights Party, receiving 4,149 votes in 6 states in 1884?

Answers

Answer:

The american attorney, politician, educator and author BELVA ANN LOCKWOOD

What are a set of instructions that a computer can follow

What are a set of instructions that a computer can follow

Answers

Answer:

.b

Explanation:

HURRY!!!!!!!!!!!!!
Suppose you have a pictorial drawing of a playground design. How would you represent the length of a slide that is 12 feet long?

Answers

Answer:

You make use of a scale (See Explanation)

Explanation:

Given

Length = 12 feet

Required

How would you represent this on drawing.

Knowing that a length of 12 feet can't be drawn on drawing, the best way to do this is to make use of a scale measurement.

The scale to use depends on you and the size of paper at your disposal.

Assume you adopt a scale of 1 inch: 1 feet

This means that a length of 12 feet will be represented by 12 inches in drawings

Thirty-two bit ------------addresses of the source and destination station are added to the packets in a process called encapsulation.

Answers

Thirty-two bit Media Access Control (MAC) addresses of the source and destination station are added to the packets in a process called encapsulation.

Encapsulation is a process in computer networking where headers, trailers, and other data are added to the original data to create a packet. In this case, MAC addresses of the source and destination station are added to the packet, which is then sent over the network.

The MAC address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment. The use of MAC addresses allows the network to identify and deliver packets to specific devices on the network.

You can learn more about MAC (Media Access Control) at

https://brainly.com/question/13842614

#SPJ11

Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it easily when it is needed? O A. Computer systems administrators O B. Systems analysts O C. Network support personnel O D. Database support personnel ​

Answers

Option D is correct. If we want multiple users to access data, we will organise that data in Database we can then be accessed whenever needed.

The information system personnel who organize the information for the user access are database support personnel. Thus, option D is correct.

What is the role of information systems personnel?

The information systems personnel are the professionals that perform the task of managing the hardware and the software to be test, built, repaired, and maintained for the access from multiple location.

The organization of the information over the database enables the easy access from multiple location.  Thus, the database support personnel are responsible for managing the easy access and organization of information. Thus, option D is correct.

Learn more about information system, here:

https://brainly.com/question/13081794

#SPJ2

Janelle wants to research information about a local politician's recent public appearances. Which tool should she use for this?
A printed newspaper with a local news section.
A digital library that has a section on politics.
A physical library where the politician has appeared.
Search engines filtered to only show news sites.

Answers

Answer:

Search engines filtered to only show news sites.

Explanation:

A printed newspaper could have come from any time

A digital library barely gets updated

I'm pretty sure I saw those same books 3 years ago

Yeah you get the jig

Which of the following statements are true of
software engineers? Check all of the boxes that
apply.
They are responsible for writing programming
code.
They are usually strong problem-solvers.
They spend most of their work hours running
experiments in a laboratory.
They must hold advanced degrees in
computer science.

Answers

Answer:

Option A - They are responsible for writing programming

Option B - They are usually strong problem-solvers

Explanation:

A software engineer needs to be a strong problem solver and he/she must be able to write program/code. He/She is not required to conduct experiments in labs and also it is not essential for them to hold masters degree as even the non computer science or IT background people are working as software engineer.

Hence, both option A and B are correct

Answer:

A & B

Explanation:

Other Questions
Can you help I need help Identify 3 of the 6 components of a wellness model for healthy long term weight management and write 2 to 3 senstences students telling about each of them executive order 9981 signed by harry truman. equality of treatment and opportunity of all persons in the armed services. Is this relation a function?y7654H32111-2 -11 2 3 4 5X6 7 8-11-2h The budget line shift that moves the consumer's equilibrium from point A to point B suggests: Group of answer choices Increase in demand for X Decrease in demand for X No change in demand for X X is an inferior good A 64-inch board is cut into two pieces. One piece is three times the length of the other. Find the length of the shorter piece. PLEASE HELP , WILL GIVE BRAINLIEST. In Mendels first experiment, he crossed tall plants with short plants and found tall plants were dominant to short plants. Draw a Punnett square to describe this experiment and list the genotypes and phenotypes of the offspring. A shipping container will be used to transport several 120-kilogram crates across the country by rail. The greatest weight that can be loaded into the container is 24500 kilograms. Other shipments weighing 12300 kilograms have already been loaded into the container. What is the greatest number of 120-kilogram crates that can be loaded into the shipping container? Suppose you deposit $1,682.00 into and account 4.00 years from today into an account that earns 5.00%. How much will the account be worth 18.00 years from today George's total points is 5 less than susan's total points. Does geroge need more points or fewer susan points? A. The pendulum would accelerate to the leftB. The pendulum would accelerate downwardC. The pendulum would accelerate to the rightD. The pendulum would accelerate upward Of the variables in the Black-Scholes OPM, the __________ is not directly observable. Group of answer choices variance of the underlying asset return risk-free rate of interest price of the underlying asset time to expiration 10 teaspoons is how many milliliters?Hint: 1tsp4.9mLRound your answer to the nearest tenth. 1. Did the gas bubbles come from the water, or when the bath bomb is put in the water. Which program has a budget that Congress can change significantly eachyear?A. Social SecurityB. EducationC. MedicarecD. MedicaidIS One of the ways the ancient Hebrews gave Tzedakah (helping the poor) was byA. not cutting away the edge of their fields so that strangers and poor could pick the fruit/vegetablesB. Cooking them a whole bunch of foodC. Giving them 13 bulls, 2 rams, and other animals a rectangular gasoline tank can hold 51 kg of gasoline (petrol) when full. what is the depth of the tank if it is 0.6-m wide by 0.9-m long? why was the oregon trail established? What is the conflict at the heart of the heros life as they know it and their eventual destiny? how do frodo baggins and katniss everdeen exemplify this stage of the heros journey? cite evidence from the text to explain. Data analysis and probability please awnser, and tell me how you got that awnser just cause i dont know how to get it Closed-loop control has to be synthesised for a plant having nominal model G(s) = -s+4 (s+1)(s+4) To achieve the following goals: Zero steady state errors to a constant step reference input Zero steady state errors for a sine-wave disturbance of frequency 0.25 rad/sec A bi-proper control transfer function Use the pole placement method to obtain a suitable controller C(s). b) Consider a closed loop feedback system for a nominal plant B(s) 2 G(s) = A(s) (s+1)(s+2) And the desired closed loop pole locations are located at u = -2+ j2.24 U=-2-j2.24 13 = -8 Find a bi-proper controller C(s) using the pole assignment method.