Answer:?
Explanation:?
why does messenger keep saying waiting for network
you prob need to fix your data or redownload it again
did someone really hang themselves on wizard of oz
Which of the following behaviors does not harm a company if your employment is terminated?
getting a copy of word-processing software before leaving
selling trade secrets to competing companies or to your future employer
creating a username and password so you can access company information after you have left
notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave
Answer:
Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.
Explanation:
Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.
Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.
If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.
The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.
Answer:
D. Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.
Explanation:
A pennant-shaped sign means you are in a _____ zone.
Answer:
The pennant-shape is only used as a road sign to signal a no-passing zone. No passing zones are stretches of roadway where drivers are not allowed to move into the adjacent lane to pass a vehicle in front.
Hey is anyone else getting this? Don't mind the answer.
Answer:
Getting what? I don't get what you mean.
1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments
Answer:
free money
Explanation:
scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either
What types of games became popular in the 90s? List three games and how they had evolved from their successful 80s video game rivals.
Answer:
Doom (1993) Half Life (1998) Super Mario 64 (1997)
Explanation:
Doom and Half-Life were PC games.
Doom was an early 90s PC shooter that was "3d" it wasn't actually 3d but it used a unique rendering system to make it look 3d. It was a level to level shooter that also included secrets
Half-Life was a Actual 3D game and required quite a beefy Graphics card in your computer at the time to run it smoothly, It was a long story-driven game
Super Mario 64 was one of the first "True 3D" games on Home console because it was a launch title for the brand new N64 It utilized the hardware for a brand new experience for console players.
Most 80s games were even more primitive and were either Hosted in arcade cabinets at your local Arcade Such as Outrun (1986) (Btw great soundtrack!) or the NES that allowed you to play the Original few Mario games that were all 2D.
So one of the biggest Evolutions in 80s to 90s gaming is the introduction of 3D titles being able to run on good computers in the early 90s and home consoles could also run 3D titles at the end of the 90s
Pls, mark Brainliest I put my heart and soul into this. Very fun Question!!!
excuse me i am going into my A levels and i need help in picking what further pure mathematic units i need to pick since i am studying ICT.
Answer:
i dont know bout math units but subjects for ict include
microcomputer technology, and systems resource management ,computer systems organization.
Explanation:
What appealed to people and especially kids of the 70s and 80s about gaming?
What parts of early gameplay, and which aspects of the games are still relevant today?
What are the major aspects in which gaming has improved since then?
question 1- it appealed as the ultimate playthings and competed to master them and set the high score, or the record for longest time playing.
question 2- Gameplay is arguably the most important aspect of a game. You can have breathtaking graphics and an enthralling storyline, but if the main game mechanics the player will be performing aren't fun, your project may as well have been a movie.
question 3- Gaming is really a workout for your mind disguised as fun. Studies have shown that playing video games regularly may increase gray matter in the brain and boost brain connectivity. (Gray matter is associated with muscle control, memories, perception, and spatial navigation.)
hope this helps :)
one Q what will be the answer?
Answer: a computer system that has one function within a large system
Explanation:
the key word here is EMBEDDED which means WITHIN SOMETHING ELSE
what is the difference between internal and external css?
Answer:
Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file.
External CSS is that we can write in a separate file than the HTML code i.e the HTML file is separate like(index.html) the CSS file is separate like(style.css).
Explanation:
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use
PKI trust model that should be used, is a distributed trust model.
A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums. With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.Conclusively, we can say that PKI trust model that should be used is a distributed trust model.
Learn more from:
https://brainly.com/question/14837773
Who, in 1937 tried to build a computer with no gears, cams, belts, or
shafts?
Answer:
But we're getting ahead of our story. One of the earliest attempts to build an all-electronic (that is, no gears, cams, belts, shafts, etc.) digital computer occurred in 1937 by J. V. Atanasoff, a professor of physics and mathematics at Iowa State University.
Explanation:
hope this will help you
have a great day
please mark me as the brainliest
Answer: Atanasoff
Explanation: he was a doctor whom tried to built a computer to test the capacity of storing data
Just take points, this website is so weird because of all the reporting and I didn't do any thing
Answer:
I agree with you! And thank you for the points
Explanation:
I answer educational questions and ask one of my own regarding math and it gets reported
Someone asked if their art was good and how they can improve it and it gets reported
But the only questions they don’t report are free po!nts
For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???
Answer:but this is free ponts so it is safe uggg
________ is the use of information technology to support the sharing of content among networks of users.
Answer:
The social media is the use of IT to support the sharing of content among network of users.
the most important keyboard instrument of the romantic period was the
Answer:
piano
Explanation:
Describe the type of gameplay seen during early video games
Answer:
2d?
Explanation:
It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.
Answer: Arcade Machines
The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.
Which device do you think is the most important in the development of human civilization
Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.
Explanation:
Your welcome :)
which nims component includes the incident command system
Answer:
The NIMS Command and Management component
Explanation:
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities
grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities
A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.Conclusively we can therefore say that the hacker was a gray hat hacker.
Learn more from
https://brainly.com/question/15899195
aaron has started a food blog on which he wants to post his recipes. he wants to place a high-quality image next to each cooking step. which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
The picture format which should be embraced on Aaron's blog in other to ensure that customers have smooth viewing experience while also preserving the quality of uploaded images is the JPEG format.
File format refers to the manner in which files are encoded. Picture files have several encoding types such as JPEG, JPG, GIF, PNG and so on.
Since, Aaron is considering images which loads quickly without lagging, then he'll need to compress the size of the uploaded images so that they have smaller file sizes.
In other to preserve image quality while working down the size of the image, the JPEG image format, produced good quality images with smaller file sizes compared to other file formats.
Therefore, the file format which should be adopted by Aaron ls the JPEG picture format.
Learn more :https://brainly.com/question/24941137
An HTML sitemap provides a list of internal links on a website accessible to users
most file managers include a way to create a folder through the save dialog box. true or false?
Answer:
false because most of the file managers just keep Everything organized by dates, years, and everything like that
Explanation:
What is LinkedIn?
A job search website
A virtual job fair
A recruiter website
Answer:
A job search website.
Explanation:
in classification problems, the primary source for accuracy estimation of the model is ________.
Answer:
In classification problems, the primary source for accuracy estimation is the confusion matrix (or classification matrix or contingency table)
what is the name of the method of problem solving that breaks a problem imto smaller problems
Answer:
The first thing that came to mind was when my parents tell me "Take it one step at a time" I hope this helps
Explanation:
did someone actually hang themselves on the wizard of oz set
No - its a rumour started since the films 50th anniversary in 1989.
____ is the state of not sharing information with or being observed by others.
Answer:
Privacy(guessed ,not really sure about it).
True or False: Visual Studio is not a part of Unity. You could use a different code editor to edit your C# scripts if you wanted to.
Answer:
True
Explanation:
Visual Studio and Unity are two different things. Visual Studio is an IDE developed by Microsoft, and Unity is a game engine developed by another company. Visual Studio is the default editor in Unity, but you are able to use something different.
Source: https://docs.unity3d.com/Manual/ScriptingToolsIDEs.html
There are different kinds of true statement. Visual Studio is not a part of Unity is a true statement.
Is Visual Studio a part of Unity?Visual Studio is known to for Mac Tools and also for Unity is said to be part of the installation of Visual Studio for Mac.You can verify the type of Visual Studio differs for Mac and other product.
Learn more about Visual Studio from
https://brainly.com/question/4925305
cookies that remain on your device indefinitely are called
Answer:
Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.
Explanation:
I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D
Cookies that remain on your device indefinitely are called persistent cookies.
What are persistence cookies?Cookies that remain on your device indefinitely are called persistent cookies.
These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.
We have,
Persistent cookies:
It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.
However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.
Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.
Users can also use browser extensions or privacy tools to control how cookies are used on their devices.
Thus,
Cookies that remain on your device indefinitely are called persistent cookies.
Learn more about persistent cookies here:
https://brainly.com/question/29608733
#SPJ5