Answer:Encryption
Explanation:I took my test for CIS 110 and guessed and got this question right.
1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Current configuration d. Backup configuration
Answer:
1. The running configuration is also known as the b. working configuration
c. current configuration
Explanation:
hopes this help (:
83\2+58+3^3+95*2/10
it's computer pls help
Answer:
145.5
Explanation:
I was unsure what you needed done, but if it was a math equation then that is your answer :)
Hope this helped <3 Brainliest please? :)
which changes the angle of a picture skew or select or find
Answer:
This article discusses about some very basic and generalized techniques for detecting image skew. Definitely there are much advanced algorithms to detect skew, but those will not be covered in this article.
Explanation:
A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network
Answer:
server or supercomputer
Explanation:
In flowcharts, the parallelogram shape is used to indicate either an input or output statement.
A. True
B. False
Answer:
True
Explanation:
A parallelogram represents data in a flowchart. Data is either input a process requires or an output that the process hands off to the next step.
How is distributed ledger technology (DLT) used in a blockchain?
A. To change the ownership of assets in blockchains
B. To encrypt transactions into blocks of information
O c. To store assets in different financial institutions
O D. To keep records of transactions in different places
Answer:
I believe the answer is D. To keep records of transactions in different places.
Explanation:
It is against the law for drivers ____________ to use a wireless communication device while operating a motor vehicle.
Answer:while operating a motor vehicle
Explanation:
Can someone please help me? My Brainly isn't working correctly and I need help. I can't see the home page... all I can see is in the pic... Please help me!!!
Answer:
ok. If you refeshed then now click this
Explanation:
Discuss what is an embedded system. Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS.
Answer:
An embedded system is a computer system a combination of a computer processor, computer memory, and input/output peripheral devicesthat has a dedicated function within a larger mechanical or electronic system.
Advantage
Simple to deliver higher creation.
Less costs for per bit of resultant.
It has not many interconnections.
It has Better steady and Higher speed.
It has Higher dependable.
To use for one errand.
Disadvantage
Once configured, these systems cannot be changed. ...
They are hard to maintain. ...
Troubleshooting is difficult for embedded systems. ...
Because these systems are made for specific tasks, hardware is limited
User inserts 10 numbers. Write a program that will show if there are more positive or negative numbers among the entered numbers.
Here is a basic program that I wrote. This will check how many positive/negative numbers are in the table and then prints the amount..
Using Python
# list of numbers
list1 = [10, -21, 4, -45, 66, -93, 1]
pos_count, neg_count = 0, 0
# iterating each number in list
for num in list1:
# checking condition
if num >= 0:
pos_count += 1
else:
neg_count += 1
print("Positive numbers: ", pos_count)
print("Negative numbers: ", neg_count)
is an amount paid based on the volume of products or services that a salesperson sells
Answer:
should be commission
Explanation: i took this class a while back, hope this helps man
While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks. How should you reply
The way a person should reply the client is that An enterprise network will have more sensitive and confidential information.
What are sensitive and confidential information?Sensitive and confidential information are known to be any kind of information that a person or any business organization do not want to disclosed such as trade secrets.
Note that telling or convincing a client that An enterprise network will have more sensitive and confidential information will help them make the right choice.
See options below
How should you reply?
The devices required for access control can only be afforded an enterprise
An enterprise network will have more sensitive and confidential information
Access controls can only be configured by security admins
Enterprises attract more business when using access control.
Learn more about client from
https://brainly.com/question/25385643
Which xxx completes the code to read every integer from file "data. txt"? fileinputstream inputstream = null; scanner infs = null; int total = 0; inputstream = new fileinputstream("data. txt"); infs = new scanner(filebytestream); while(xxx){ total = total + infs. nextint(); } system. out. println("total: " + total); group of answer choices inputstream. hasnextint( ) total != 0 infs. hasnextint( ) infs. eof( ) == false
Answer:
total+ infs . nex (xxx){total}
Explanation:
this is correct theres nothing wrong
Do network packets take the shortest route?
Answer:
The packet will take a shorter path through networks 2 and 4
Answer:The packet will take a shorter path through networks 2 and 4, but networks 1, 3, and 5 might be faster at forwarding packets than 2 and 4. These are the kinds of choices network routers constantly make.What is shortest path routing in computer networks?
The goal of shortest path routing is to find a path between two nodes that has the lowest total cost, where the total cost of a path is the sum of arc costs in that path. For example, Dijikstra uses the nodes labelling with its distance from the source node along the better-known route.
Explanation:
Help!! When was technology made?
Answer:
3.3 million years ago, if you mean technology in general, if you mean computer technology, then 1837 should be your answer.
Answer:
3.3 million years ago the first tools were made but technology is older than our specis itself
Explanation:
well even the use of rocks as wepons are technology
which country do you live in?
I live in the USA
Hope this helps!
Answer:
Ghana
Explanation:
because I'm an African
What are enterprise messaging solutions most often used by business teams
for?
A. Cataloging and printing shipping labels for product deliveries
B. Sorting through and deleting a large number of company emails
C. Working on projects and communicating with each other to stay
updated
D. Distributing and tracking the use of computers in the workspace
Answer:
C. Working on projects and communicating with each other to stay updated
Explanation:
Working on projects and communicating with each other to stay
updated. Therefore, the correct answer is option C.
An corporate Messaging System (EMS) is a system that allows "program-to-program" messaging across corporate applications and systems.
Company messaging is typically used to integrate several company systems. It is a software interface that allows one programme to send loosely connected asynchronous data (messages) and store it in a message queue until the receiving programme can process it.
Typically, enterprise messaging falls under two categories:
Enterprise Messaging is classified into two types: promotional and transactional.
Bulk SMS messages are used to market a company's products and services. Bulk uploads, templates, phonebooks, scheduling messages, viewing delivery reports, and importing text and excel files are all common capabilities.Transactional SMSs: The SMS is typically sent by the sender's name (brand name) and is available 24 hours a day, seven days a week.Advantages of deploying an EMS:
Secure Messaging - The secure transmission of critical information and files to smartphones or feature phones.Notifications, reminders, and alerts are delivered globally.Two-way interactive SMS is commonly used for appointment confirmation, business process automation, surveys, and voting campaigns.Campaign Control/Management - Marketing programmes can be readily managed and measured in terms of performance.Delivery Assurance - Access to detailed message delivery can be gained.Customer preferences can be used to create customised messaging programmes using intelligent analytics and reporting.Therefore, the correct answer is option C.
Learn more about the enterprise messaging solutions here:
https://brainly.com/question/32271386.
#SPJ3
Imagine that you’re partner in a business firm that sells computers and other electronic goods. As part of your business organization’s Corporate Social Responsibility drive, you have to present a slide show to the retailers (and the general public) about how to dispose of end-of life electronic goods in an eco-friendly manner. Perform online research and describe available media options to present the slide show.
The best way to dispose of electronic goods is by recycling raw materials and correctly disposing of the remaining hazardous materials.
What does eco-friendly disposal imply?This implies using disposal practices that have a low negative impact on the environment.
How do you dispose electronic goods?The best way to do this is:
Appropiately collect electronic goods that cannot be used anymore.Identify the materials or parts that can be recycled as this reduces the number of new parts that will be manufactured.Separate the recycling materias from those that cannot be recycled.Dispose of the remaining materials in the best way depending on the material as some of these are hazardous and require special disposing practices.Learn more about recycling in: https://brainly.com/question/11861824
Flowcharting is another tool that programmers use to design programs?
A. True
B. False
Answer:
True
Explanation:
Flowcharts are diagrams that are used to represent a program's steps or process.
Choose the answer.
The ____ ... meeting is a great way to bring everyone involved together to discuss
the project. Some topics of this meeting include project vision, roles and
responsibilities, team buildings, team commitments, and rules.
3. Which symbol shows one character in criteria for query:
(a) <
(b) >
(c)?
Answer:
The answer is A
Explanation:
A ( which is a less than sign) is used for all smaller values.
Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information
Not naming countries or people, but its mostly Nation State Actors / Hactivits. Eh, not sure about hactivits but mostly Nation state actors.
O B. the bulk of a person's income.
a
C. a person's excess income.
Those taking illegal drugs, or using a prescription drug without a medical need, are likely ...
A. to be making a calci
im confused by the formatting of this- maybe type it again ;-;
HELP PLEASEE!!
True or False. The POP is a bank of switches that allows many users to connect to the ISP at the same time.
Answer:
yes it is true. the pop is a bank of switches that allows many users to connect to the ISP at the same time.
The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as _____.
The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as context.
What is webpage context?The web page context is known to be a kind of special ID that is is formed with all the new page load event.
The context of a website is known to be the point or place where a person can show their visitors that one care. It gives a kind of website's aesthetic appeal and the functional look.
Learn more about website design from
https://brainly.com/question/25941596
List and describe in detail any four power management tools that were developed by atleast two manufacturers to prevent and/or reduce the damage of processors from theprocess of overclocking
Some power management tools to reduce damage to processors by the overclocking process are:
CPU TwakerMSI AfterburnerIntel Extreme Tuning UtilityAMD Ryzen MasterWhat is overclocking?It is a technique that allows you to increase the power and performance of various computer hardware. That is, this process increases the energy of the components and forces the pc to run at a higher frequency than determined by the manufacturer.
Therefore, there are several power management models and manufacturers to reduce and prevent physical damage to pc components.
Find out more about overclocking here:
https://brainly.com/question/15593241
The semantic network model predicts that the time it takes for a person to retrieve information about a concept should be determined by:.
Answer:
the distance that must be traveled through the network.
Explanation:
The semantic network model predicts that the time it takes for a person to retrieve information about a concept should be determined by the distance that must be traveled through the network. The correct option is B.
What is semantic network model?In the late 1960s, Allan Collins and Ross Quillian developed the network model of semantic memory organization.
According to this network model, information nodes (categories) are linked to one another via strong and weak links. Priming enables our memory to prepare related information for retrieval.
A semantic network is a type of knowledge structure that shows how concepts are related to one another and how they connect.
Semantic networks mine data, connect concepts, and draw attention to relationships using artificial intelligence (AI) programming.
According to the semantic network model, the time it takes a person to retrieve information about a concept is determined by the distance that must be traveled through the network.
Thus, the correct option is B.
For more details regarding semantic network model, visit:
https://brainly.com/question/29317050
#SPJ2
Your question seems incomplete, the probable complete question is attached below:
Which sentence contains an error?
(Not about technology but about journalism. Answer fast please. Thank you)
Answer:
The correct answer is A
Explanation:
All the rest of them make sense but letter A so your correct answer is A
Good Luck
You are consulting with a medium-size company about endpoint security solutions. What advantages does a cloud-based analytics platform have over an on-premises solution that relies on signature updates
The advantage of cloud-based analytics platform is known to be backed up by machine learning that can use a lot of efficient behavioral-based monitoring and alerting system in its work.
What is cloud data analytics platform?Cloud analytics is a term that connote the use of analytic algorithms in the services in cloud against data in a private or public cloud which is often used to send or deliver a data/ result that one needs
Cloud analytics is good because it uses Advanced persistent threat (APT) malware and other techniques to overcome signature-based detection. The platform is known to be backed up with machine learning, which uses an efficient behavioral-based monitoring system.
Learn more about cloud-based analytics from
https://brainly.com/question/17273521
Windows is a GUI Operating System, what is the other type?
Answer:
If you are looking for a different type of GUI operating system then :
Linux or mac
if you are looking for a different type of operating system (non-GUI):
Command-line interface
Explanation: