Malwares are intentional attacks on a system with the intent to do harm.
Cyberthreats may be intentional like a virus or unintentional like a fire or human error
Hope that helps!
Explain two protocols to enhance cellular networks capacity?
Notes:
- You need to cite used references in your submission.
The mobile network capacity can be improved by increasing the radio spectra or also increasing the re-utilization of a given spectrum.
What is mobile network capacity?The mobile network capacity refers to the final volume of information (data) that can be transferred to a particular customer.
A mobile wireless system refers to a given network where the connection to and from customers consists of wireless technology.
The mobile network capacity is usually improved in a given area by increasing the radio spectra or increasing the re-utilization of the spectrum.
Learn more about mobile wireless systems here:
https://brainly.com/question/1763761
What happens if the accepted distance limitation of a 1000BASE-T Ethernet connection is ignored and frames are sent down a Cat5e cable segment of 300 meters
If the accepted distance limitation of a 1000BASE-T Ethernet connection is ignored and the frames are sent over a 300 meter Cat5e cable segment, the transmission speed will drop considerably.
What is UTP CAT5e cable?Cat 5e utp cable models are manufactured for infrastructure applications; they provide the networks that use them with the ability to transfer data securely, without packet loss and without any loss of speed during operations.
What is the difference between the two cables?Both specify Ethernet communication but 1000BASE-T at 1 Gb/s and both are designed to run on four-pair, 100 ohm impedance twisted-pair cables, up to 100 meters.
From these information, we can conclude that if the accepted distance limitation of a 1000BASE-T Ethernet connection is ignored and the frames are sent over a 300 meter Cat5e cable segment, the transmission speed will drop considerably.
Learn more about 1000BASE-T in brainly.com/question/10053170
A flowchart is a useful visual that can __________.a. be used to show spatial relationships.b. be used to show frequency or distribution of parts in a whole.c. be used to show trends in one or more variables.d. be used to illustrate processes or procedures.
Explanation:
in my book flowchart is a graphical symbolic representation of computer
B. State True or False: 1. 'Date within' option allows you to search an email within a specified date range.
Answer + Explanation:
his topic describes the email and document properties that you can search for in email items in Exchange Online and documents stored on SharePoint and OneDrive for Business sites by using the Content Search feature in the Security & Compliance Center. You can also use the *-Compliance Search cmdlets in Security & Compliance Center PowerShell to search for these properties
Please have a great day <3
The page that appears when you first open your Internet browser is the _____.
opening page
opening page
launch page
launch page
home page
home page
first page
first page
Answer:
launch page
Explanation:
You can change your launch page in settings.
Your launch page will be launched as soon as you reopen a browser.
Answer:
Launch page
Explanation:
How to use proptypes in react functional component
Answer:
React components use a special property named propTypes to set up type checking
Explanation:
This is your answer.
How do you find binary?
Answer:
To convert integer to binary, start with the integer in question and divide it by 2 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero. Then just write out the remainders in the reverse order.
Explanation:
A security event popped up, alerting security of a suspicious user gaining access to, and copying files from, the %systemroot%\ntds\ file path on a server. what is the user trying to do?
There are different kinds of event. What the user trying to do is to gather employee login credentials.
What is a credential harvester?
Credential Harvesting is a term that is also called Account Harvesting. This is known to be a type of MITM attacks, DNS poisoning, phishing, etc.
It is often used to gather a lot of high numbers of credentials (such as username /or password combinations) and it is done mainly for reuse.
Learn more about security event from
https://brainly.com/question/25720881
Which practice enables recovery of accidental deletions in data records?
Answer: Data backup
Explanation:
Explanation: Data backup is the practice of keeping files in case of any accidental deletions for restoration
Which device is used to direct the flow of data on a computer network?
Answer:
If you like my answer you can mark it as Brainliest.
Explanation:
A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
What makes an operating system the master controller
Answer:
An operating system is a master control program, which controls the functions of the computer system as a whole and the running of application programs. All computers do not use the same operating systems.
Explanation:
Driving is a ____
business.
a) safe
b) daring
c) boring
Driving is a daring business.
Driving is a daring business. Thus the correct answer is B.
What is a business?Business is referred to as an activity of an economy in which trading of goods and services will be done. Trading of goods means buying and selling goods from one country to another with the process of export and import.
Driving is considered a daring busines because it is considered as an adventurous activity in which a driver has to ride the vehicle from various locations having certain difficulties faced challenges.
This difficulty includes conditions of the roads, areas like mountains, and slopes, and weather conditions, as fog where visibility is quite low which, may result in a lack of concentration on driving.
The poor condition of roads and adverse weather conditions create great risk while driving. It may cause a threat of life while driving if it causes any type of injury or accident.
Therefore, option B daring is appropriate.
Learn more about Driving, here:
https://brainly.com/question/10648228
#SPJ5
Provide a written response that: describes in general what the identified procedure does and how it contributes to the overall functionality of the program write your response here explains in detailed steps how the algorithm implemented in the identified procedure works. Your explanation must be detailed enough for someone else to recreate it. Write your response here provide a written response that: describes two calls to the selected function. Each call must pass different arguments that cause a different segment of code in the algorithm to execute
These exercises are about a descriptive essay or a descriptive text. The purpose of a descriptive text is to:
Inform; and guide the reader's precision.What is a Descriptive Text?As with every essay or text, your document must have the following:
An introduction (where you state the purpose of the text)The body (where the major description takes place)The conclusion (where you summarize and highlight cautionary instructions).Usually, it helps to itemize, label, and number instructions.
Examples of Descriptive Texts are:
Standard Operating ManualsCar Manuals.Learn more about Descriptive Texts at:
https://brainly.com/question/3530147
These activities are about writing a descriptive essay or text. A descriptive text's objective is to, Instruct and direct the precision of the reader.
What is the Definition of Descriptive Text?The document, like any other essay or literature, must include the following:
a brief overview (where you state the purpose of the text)The body (where the major description takes place)The final word (where you summarize and highlight cautionary instructions).It is often beneficial to itemize, label, and number instructions. Descriptive texts include the following:
Car Manuals and Standard Operating Procedures
Visit to learn more about Descriptive Texts:
brainly.com/question/3530147
#SPJ4
What's better, adventure time or regular show?
i would have to say regular show
is climate change really caused by human activities introduction
Yes, climate change is mainly caused by human activities. While there are other factors, people are by far the leading cause. Factories and vehicles pump harmful gasses into the atmosphere on a daily basis, depleting the ozone layer. The land and ocean are littered with trash and waste. To build homes and stores, more and more forests are cut down that bring homes to other animal and oxygen into the atmosphere.
Blake is on the fast track and hopes to get a promotion soon. he wants to make sure that he is always able to
work at peak proficiency on the job. he has done a great deal of work and has numerous essential files that are
crucial to his job. he uses this utility to make sure these files are saved on the office's external hard drive.
a.remote control
b.firewall
c.file compression
d.backup
Answer:
D
Explanation:
the term used to describe a memory location whose value changes during the program execution is
Answer:
variable
Explanation:
A variable is used to store data and can be changed throughout your program.
One new and creative method companies are using to advertise is:
A. stealing people's identities and pretending to be their friend.
B. promoting their products in television advertisements.
c. advertising products on the websites people visit the most.
O D. awarding prizes to users who follow them on social media.
SUBMIT
Answer:
c. advertising products on the websites people visit the most.
Explanation:
08. Consider the following four binary numbers.
11100111
10101010
11110000
11001100
Which of the following displays the numbers in ascending order?
(A) 10101010, 11001100, 11100111, 11110000
(B) 11110000, 11100111, 11001100, 10101010
(C) 11100111, 10101010, 11110000, 11001100
(D) 10101010, 11001100, 11110000, 11100111
Which one of the following document types would you not use the Microsoft Excel program to create?
I would say letters.
Explanation:
I hope this helps you
4.which pre-defined feature is known as functions in Excel?
a.formula
b.property
c. data
Answer:
I think formula?
Explanation:
what is the importance of saving a web page
Answer:
to see it later and remember it
______________ refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts while the ______________ refers to an inventory management technique where an incoming train unloads materials directly into outbound trucks.
Safety stock inventory management refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts.
What is Safety stock inventory?Safety stock inventory management is known to be a kind of more or extra inventory that is said to have been ordered way above the expected demand.
Note that this technique is often used to stop or hinder any form of stockouts that is said to have been caused by incorrect forecasting or unforeseen events in customer demand.
Learn more about Safety stock inventory form
https://brainly.com/question/26954616
How to give the the crown?
Can show a video if you can or photos!
Answer:
The crown is called the Brainliest award. If two people had given you answers then there is a option of mark as Brainliest. Click there in the option of mark as Brainliest in which you like the answer most. If any one person has given answer then after some days you will a notification to mark his/her answer as Brainliest. By this you can mark an answer as Brainliest.
Please have a great day, and have fun giving people Brainliest answers <3
How dose computers it use the information to solve problems
Answer:
A programmer's job is to find solutions. They break down problems into easy steps for a computer.
Explanation:
hope I'm helping you!
What is the name of the general ledger that tracks all bitcoin transactions?.
Answer:
The Name of the General Ledger that Tracks all Bitcoin Transactions is Called the Blockchain.
A Blockchain is a Growing List of Records, known as Blocks, that are linked together using Cryptography. Each Block in a Blockchain contains a cryptographic Hash of the Previous Block, a timestamp, and also the transaction Data.
Social media tools allow you to connect with people anywhere in the world who share your interests evaluate your interactions with people living outside the United States using various Social media tools how his influences how do you break cultural stereotypes and discover the local activities career aspirations in sports preferences of people from other cultures what is a social media tools that you used to form these connections explain how these connections have been influenced you, providing specific examples
The social media tools that you used to form these connections are:
Buzz Sumo. Go ogle Trends. Buffer Publish.Can va. Un splashWhat are social media tools?Social media tools are known to be key tools that are used for the running of business so as to handle important ways in their Digital Marketing routine.
The social media tools are important because it helps one to plan ahead and also ensure that a person post the type of content needed to reach your goals and grow one's business.
Learn more about social media from
https://brainly.com/question/3653791
The math function ceil(x) returns the smallest integer that is greater than or equal to x. True False
Answer:
Hello the answer is True.
Hope this helps!✌
The math function ceil(x) returns the smallest integer that is greater than or equal to x. The statement is false.
what is integer ?
An integer which is a number consist of 0, positive numbers, and negative numbers, be noted that an integer can not be a fraction, a decimal or a per cent, for example 1, 3, 4, 8, 99, 108, -43, -556, etc
These are the group of counting numbers such as positive and negative, and zero, that can be written without a fractional component. All natural numbers are integers which can start from 1 and end at infinity.
All whole numbers are integers, starting from 0 and ending at infinity, it can be of two types such as Positive Numbers and Negative Integer
In the number system, there are various types of numbers under the integer category such as Whole numbers, Natural numbers, Odd and Even integers, Prime and composite numbers
For more details regarding integer, visit
https://brainly.com/question/28513507
#SPJ2
Mateo wants the words "it’s snowing!" to appear in the output box and typed print (it’s snowing). this didn’t work. what needs to be added to the code?
a.
quotation marks
b.
a backslash
c.
a period
d.
a functional code
Answer:
a Quotation marks
Explanation:
In python, to print something it needs to have parenthesees and quotation marks.
a. Quotation marks
What problem does computer science solve in dance?
Answer:
Computer science, your able to make websites that might have videos on teaching you dance techniques.