an error occurred while loading a higher quality version of this video

Answers

Answer 1

Answer:?

Explanation:?


Related Questions

why does messenger keep saying waiting for network

Answers

you prob need to fix your data or redownload it again

did someone really hang themselves on wizard of oz

Answers

i think so the cast is def scary

Which of the following behaviors does not harm a company if your employment is terminated?

getting a copy of word-processing software before leaving

selling trade secrets to competing companies or to your future employer

creating a username and password so you can access company information after you have left

notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Answers

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.

Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.

If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.

The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.

Answer:

D. Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

A pennant-shaped sign means you are in a _____ zone.

Answers

Answer:

The pennant-shape is only used as a road sign to signal a no-passing zone. No passing zones are stretches of roadway where drivers are not allowed to move into the adjacent lane to pass a vehicle in front.

Hey is anyone else getting this? Don't mind the answer.

Answers

Answer:

Getting what? I don't get what you mean.

Maybe the dog is in heaven…therefore it’s infinity miles while the other has a certain number of miles because it is alive and on the earth..??


Not 100% sure but I think that’s why.

1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments

Answers

Answer:

free money

Explanation:

scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either

What types of games became popular in the 90s? List three games and how they had evolved from their successful 80s video game rivals.

Answers

Answer:

Doom (1993) Half Life (1998) Super Mario 64 (1997)

Explanation:

Doom and Half-Life were PC games.

Doom was an early 90s PC shooter that was "3d" it wasn't actually 3d but it used a unique rendering system to make it look 3d. It was a level to level shooter that also included secrets

Half-Life was a Actual 3D game and required quite a beefy Graphics card in your computer at the time to run it smoothly, It was a long story-driven game

Super Mario 64 was one of the first "True 3D" games on Home console because it was a launch title for the brand new N64 It utilized the hardware for a brand new experience for console players.

Most 80s games were even more primitive and were either Hosted in arcade cabinets at your local Arcade Such as Outrun (1986) (Btw great soundtrack!) or the NES that allowed you to play the Original few Mario games that were all 2D.

So one of the biggest Evolutions in 80s to 90s gaming is the introduction of 3D titles being able to run on good computers in the early 90s and home consoles could also run 3D titles at the end of the 90s

Pls, mark Brainliest I put my heart and soul into this. Very fun Question!!!

excuse me i am going into my A levels and i need help in picking what further pure mathematic units i need to pick since i am studying ICT.

Answers

Answer:

i dont know bout math units but subjects for ict include

microcomputer technology, and systems resource management ,computer systems organization.

Explanation:

What appealed to people and especially kids of the 70s and 80s about gaming?
What parts of early gameplay, and which aspects of the games are still relevant today?
What are the major aspects in which gaming has improved since then?

Answers

question 1- it appealed as the ultimate playthings and competed to master them and set the high score, or the record for longest time playing.

question 2- Gameplay is arguably the most important aspect of a game. You can have breathtaking graphics and an enthralling storyline, but if the main game mechanics the player will be performing aren't fun, your project may as well have been a movie.

question 3- Gaming is really a workout for your mind disguised as fun. Studies have shown that playing video games regularly may increase gray matter in the brain and boost brain connectivity. (Gray matter is associated with muscle control, memories, perception, and spatial navigation.)

hope this helps :)

one Q what will be the answer?

Answers

Answer: a computer system that has one function within a large system

Explanation:

the key word here is EMBEDDED which means WITHIN SOMETHING ELSE

what is the difference between internal and external css?

Answers

Answer:

Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file.

External CSS is that we can write in a separate file than the HTML code i.e the HTML file is separate like(index.html) the CSS file is separate like(style.css).

Explanation:

Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use

Answers

PKI trust model that should be used, is a distributed trust model.

A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

https://brainly.com/question/14837773

Who, in 1937 tried to build a computer with no gears, cams, belts, or
shafts?

Answers

Answer:

But we're getting ahead of our story. One of the earliest attempts to build an all-electronic (that is, no gears, cams, belts, shafts, etc.) digital computer occurred in 1937 by J. V. Atanasoff, a professor of physics and mathematics at Iowa State University.

Explanation:

hope this will help you

have a great day

please mark me as the brainliest

Answer: Atanasoff

Explanation: he was a doctor whom tried to built a computer to test the capacity of storing data

Just take points, this website is so weird because of all the reporting and I didn't do any thing

Answers

Answer:

I agree with you! And thank you for the points

Explanation:

I answer educational questions and ask one of my own regarding math and it gets reported

Someone asked if their art was good and how they can improve it and it gets reported

But the only questions they don’t report are free po!nts

For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???

Answer:but this is free ponts so it is safe uggg

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

the most important keyboard instrument of the romantic period was the

Answers

Answer:

piano

Explanation:

Describe the type of gameplay seen during early video games

Answers

Answer:

2d?

Explanation:

It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.

Answer: Arcade Machines

The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.

Which device do you think is the most important in the development of human civilization

Answers

Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.

Explanation:

Your welcome :)

which nims component includes the incident command system

Answers

Answer:

The NIMS Command and Management component

Explanation:

After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities

Answers

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

https://brainly.com/question/15899195

aaron has started a food blog on which he wants to post his recipes. he wants to place a high-quality image next to each cooking step. which file format should he use so that users do not experience a lag when loading the high-quality images on the website?

Answers

The picture format which should be embraced on Aaron's blog in other to ensure that customers have smooth viewing experience while also preserving the quality of uploaded images is the JPEG format.

File format refers to the manner in which files are encoded. Picture files have several encoding types such as JPEG, JPG, GIF, PNG and so on.

Since, Aaron is considering images which loads quickly without lagging, then he'll need to compress the size of the uploaded images so that they have smaller file sizes.

In other to preserve image quality while working down the size of the image, the JPEG image format, produced good quality images with smaller file sizes compared to other file formats.

Therefore, the file format which should be adopted by Aaron ls the JPEG picture format.

Learn more :https://brainly.com/question/24941137

An HTML sitemap provides a list of internal links on a website accessible to users

Answers

The answer is true edg 2025 The distinction between XML and HTML sitemaps is that XML sitemaps are written for search engines, whereas HTML sitemaps are written for humans. An XML sitemap is designed especially for search engine spiders. An HTML sitemap helps lost human users locate the page they’re searching for on your website. SEO Site Checkup’s sitemap tool is a fast and simple one to try – simply enter your URL and let them see if they can locate your sitemap. Second, you could try crawling your website with Spotibo by creating a free account. Then, to see if you have a sitemap, you’d have to search at just the XML file forms

most file managers include a way to create a folder through the save dialog box. true or false?

Answers

Answer:

false because most of the file managers just keep Everything organized by dates, years, and everything like that

Explanation:

What is LinkedIn?

A job search website
A virtual job fair
A recruiter website

Answers

Answer:

A job search website.

Explanation:

in classification problems, the primary source for accuracy estimation of the model is ________.

Answers

Answer:

In classification problems, the primary source for accuracy estimation is the confusion matrix (or classification matrix or contingency table)

what is the name of the method of problem solving that breaks a problem imto smaller problems​

Answers

Answer:

The first thing that came to mind was when my parents tell me "Take it one step at a time" I hope this helps

Explanation:

did someone actually hang themselves on the wizard of oz set

Answers

No - its a rumour started since the films 50th anniversary in 1989.

____ is the state of not sharing information with or being observed by others.

Answers

Answer:

Privacy(guessed ,not really sure about it).

True or False: Visual Studio is not a part of Unity. You could use a different code editor to edit your C# scripts if you wanted to.

Answers

Answer:

True

Explanation:

Visual Studio and Unity are two different things. Visual Studio is an IDE developed by Microsoft, and Unity is a game engine developed by another company. Visual Studio is the default editor in Unity, but you are able to use something different.

Source: https://docs.unity3d.com/Manual/ScriptingToolsIDEs.html

There are different kinds of true statement.  Visual Studio is not a part of Unity is a true statement.

Is Visual Studio a part of Unity?Visual Studio is known to for  Mac Tools and also for Unity is said to be part of  the installation of Visual Studio for Mac.

You can verify the type of Visual Studio differs for Mac and other product.

Learn more about Visual Studio from

https://brainly.com/question/4925305

cookies that remain on your device indefinitely are called

Answers

Answer:

Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.

Explanation:

I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D

Cookies that remain on your device indefinitely are called persistent cookies.

What are persistence cookies?

Cookies that remain on your device indefinitely are called persistent cookies.

These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.

We have,

Persistent cookies:

It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.

However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.

Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.

Users can also use browser extensions or privacy tools to control how cookies are used on their devices.

Thus,

Cookies that remain on your device indefinitely are called persistent cookies.

Learn more about persistent cookies here:

https://brainly.com/question/29608733

#SPJ5

Other Questions
Which of the following is not considered as human resource development?a) Health care b) Increasing humansc) Both a and b d) None of these Write 5 in complete sentences Would you rather have super sensitive taste buds or super sensitive hearing? I need help pls and thx The best way to get the sugar out of a sugar-water solution is to __________. In which stage of the design process does the designer analyze problems in the design and try to fix them? PLEASE PLEASE HELPReferring to the Fig. in Question #31, the spinner is divided into equal parts. If you spin the spinner 100 times, how many times do you expect it to stop on a number less than 10? Which of the following statements is not true? QUESTION IN PIC CORRECT ANSWER GETS BRAINEST Two trains leave towns 840 miles apart at the same time and travel toward each other. One train travels 20 mi/h slower than the other. If they meet in 5 hours what is the rate of each train? QUESTION 14The sides of a small rectangular box are measured to be 1.75 +/- 0.01 cm, 7.25 +/- 0.02 cm, and 8.5 +/- 0.1 cm long. Calculate the uncertainty in its volume in cubic centimetersA) 1.2x10^-3 cm^3B) 0.13 cm^3C) 2 cm^3D)0.02 cm^3 What mass of H2O is produced by the combustion of 1.00 mol of CH4?CH4(g) + 202(g) CO2(g) + 2H2O(e) [tex]x > 5[/tex]inequality in one variable please help me with this please BY which rule are these triangles congruent? Select the correct texts in the passage. In the adapted excerpt from Herman Melvilles short story "The Lightning-Rod Man," which three parts best support the view that the narrator equates the salesman with an evil entity? Who has empowered you, you Tetzel, to peddle round your indulgences from divine ordinations? The hairs of our heads are numbered, and the days of our lives. In thunder as in sunshine, I stand at ease. False negotiator, away! See, the scroll of the storm is rolled back; the house is unharmed; and in the blue heavens I read in the rainbow, and will not make war on man's earth." "Impious wretch!" foamed the stranger, blackening in the face as the rainbow beamed, "I will publish your infidel notions." The scowl grew blacker on his face; the indigo-circles enlarged round his eyes as the storm-rings round the midnight moon. He sprang upon me. I seized it; I snapped it; I dashed it; I trod it; and dragging the dark lightning-king out of my door, flung his elbowed, copper scepter after him. But spite of my treatment, and spite of my dissuasive talk of him to my neighbors, the Lightning-rod man still dwells in the land; still travels in storm-time, and drives a brave trade with the fears of man. A toy truck has a mass of 8kg. If it is moving at a velocity of 3m/s, what is it'smomentum? Which statement best explains how point of view affects a piece of literature? It shapes the reader's understanding by including specific descriptions. It shows the reader which information is important and which is not. It determines how much information the reader has access to. It helps the reader to build trust in the character who narrates the story. Find the equation of the line passing through the points (-3,8) and (3,-4). Write theequation in slope-intercept form. Can someone please help me with a Mid topic assessment please? f(x)=3x+10f(5t)=