Someone help me please i need to finish this

Someone Help Me Please I Need To Finish This

Answers

Answer 1

Answer:

My digital life is like a adventure because there is so much to discover.

Hope this help please give the brainliest award.


Related Questions

Most people have unexpected expenses at some time. Yes. No.

Answers

Answer:

Yes

Explanation:

You must configure a certificate authority on your network to use EFS. True or False?
a. True
b. False

Answers

You do not need to configure a certificate authority on your network to use EFS.

EFS is the short form for Encryption File System. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using logon authentication and NTFS file permissions), EFS allows to add another layer of security to data.

To encrypt and decrypt data files and folders in EFS, a certificate authority (CA) could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, EFS will generate its own certificate if none does not exist.

The following are other things to note about EFS

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: https://brainly.com/question/10410730

Take the midterm, quiz, and final exam of 5.1 million points, and the average score is 1) A if it is 90 or higher, 2) B if it is less than 90 and 80 or higher, 3) C if it is less than 80 and 70 or higher, 4) Write a program that outputs D if less than 70 and more than 60, 5) F if less than 60.

Answers

Answer:

B

Explanation:

Not so sure

What type of classroom enable students to attend lectures without being physically present with the teacher?

Answers

The answer is online learning since the virus happens alot of schools have been swtiching to online learning. It doesn't require anyone to be pychically present in class and there alot of platforms to do online learning.

Research on a latest advancement in computing and discuss its potential or how will it impact our lives in the future

Answers

Answer:

hqiauahhwbbwbwbbssbbs

When working with a shared worksheet, how do you know it's shared?
The word "Shared is saved in the name of the file.
The email in which you received the file says "Shared."
The word "Shared" appears after the workbook title in the title bar.
The word "Shared" appears at the bottom next to the worksheet tabs.

Answers

Answer:

The Word shared appers in the email and appears next to the worksheet tab

Explanation:

Hope this answers your question :)

Answer:

C

Explanation:

hope this helps :)

which of the following statements describes the general idea of an assistive media​

Pasagot po plssss

Answers

Answer:

What statmentssssssssss

The general idea of assistive media is described by C) Technology or tools designed to aid individuals with disabilities in accessing information and interacting with the world.

We have,

Assistive media refers to various technologies or tools that are specifically developed to assist people with disabilities.

These tools are designed to enhance their ability to access information, communicate effectively, and interact with their environment.

Assistive media can take many forms, such as screen readers for individuals with visual impairments, communication devices for those with speech disabilities, adaptive keyboards or switches for individuals with motor impairments, and more.

The main purpose of assistive media is to level the playing field and provide individuals with disabilities the means to participate fully in various aspects of life, including education, communication, work, and social interactions.

Thus,

The general idea of assistive media is described by C) Technology or tools designed to aid individuals with disabilities in accessing information and interacting with the world.

Learn more about assistive media here:

https://brainly.com/question/29891210

#SPJ3

The complete question:

Which of the following best describes the concept of assistive media?

A) A form of social media that helps people connect with friends and family.

B) A type of entertainment media, such as movies or music.

C) Technology or tools designed to aid individuals with disabilities in accessing information and interacting with the world.

D) Media coverage of events and news happening globally.

if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?

Answers

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake. TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functionalWith TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

https://brainly.com/question/14739766

Question 5 / 15
What does clicking and dragging the fill handle indicated by the cursor below do?
077
Х
✓ fx
=0.08*B77
B.
с
76
Sales
Tax
77
$794
$64
78
$721
79
$854
80
$912
81
$1,020

Answers

Answer:

$1,020 that is my answer because it will be that one

The value that would be returned based on the formula [=COUNTIF(A43:A47, "NP*")] in cell A49 is 4.

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., so as to avail its end users the ability to analyze and visualize spreadsheet documents.

In Microsoft Excel, there are different types of functions (predefined formulas) and these include:

Sum functionAverage functionMinimum functionMaximum functionCount function

A count function is typically used to to calculate the number of entries in a cell or number field that meets a specific (predefined) value set by an end user.

In this scenario, "NP*" is the specific (predefined) value that was set and as such the value that would be returned based on the formula in cell A49 is 4 because A43, A44, A45 and A46 contain the value "NP."

Read more on Excel formula here: https://brainly.com/question/25219289

#2 i
Write -0.312 as a fraction in simplest form.
-0.312 =
-
What’s the answer

Answers

Answer: 39/125

Explanation:

9. These particular machines can be decentralized.

A) Risograph
B) Photocopier
C) Desktop computer
D) Printers

__and__??

Answers

Answer:

A, B

Explanation:

Because the desktop computer and the printers are decentralized, they're connected with another noce in a company.. So I suppose that the Risograph and photocopier isn't decentralized.

Describe about abacus​

Answers

An abacus is a calculation tool used by sliding counters along rods or grooves, used to perform mathematical functions. In addition to calculating the basic functions of addition, subtraction, multiplication and division, the abacus can calculate roots up to the cubic degree.

Answer:

An abacus is a calculation tool used by sliding counters along rods or grooves, used to perform mathematical functions. In addition to calculating the basic functions of addition, subtraction, multiplication and division, the abacus can calculate roots up to the cubic degree.

Which platforms are used for mobile apps? Select 4 options.
BlackBerry
Bluetooth
iOS
Android
Windows

Answers

Answer:

- Blackberry

- iOS

- Android

- Windows

Explanation:

On Edge, it states, "There are two main operating systems used on mobile phones, Android and iOS (the Apple platform). There are also apps for Windows and BlackBerry."  (correct on Edge)

I hope this helped!

Good luck <3

Platforms used for mobile apps are

BlackBerryiOSAndroidWindowsWhat are Mobile Apps?On the mobile app, there are two main platforms namely iOS and Android.An application platform is defined as a framework of services that application programs on for standard operations. An application platform operates in five principal areas and they are development tools, execution services, data services, operating systems (OSes), and cloud services.Three mobile apps are Native Mobile AppsHybrid Mobile AppsWeb AppsReact Native is the most used cross-platform mobile app development framework.

To learn more about Mobile apps refer to:

https://brainly.com/question/20366434

#SPJ

Please please help I don’t understand this

Answers

Answer:

Yes and yes

Explanation:

It’s is this because yes and yes

Who is the best Attack on Titan Character?

A.) Levi
B.) Eren
C.) Armin
D.) Mikasa
E.) Other​

Answers

Answer:

Levi

Explanation:

Levi is just a massive W of a character

Levi
Tbh just a hige w

PLEASE HELP I WILL GIVE BRAINLYEST

Answers

Answer:

I am guessing photoshop

Explanation:

Photoshop is also under the Adobe company of graphics designs

List 2 positive impacts of cybersecurity.




**Answer and I will give you brainiliest**​

Answers

Answer:

Protection for your business and Increased productivity

Explanation:

This is because it ensures your employees aren't at risk from potential threats and, since there no virus, the computers will work well (not slow down)

These operating systems were referred to as command-based.

Android and MS-DOS
iOS and Windows
LINUX and UNIX
MS-DOS and UNIX

Answers

[tex]{\underline{\boxed{\bf{MS - DOS \: and \: UNIX}}}}[/tex]

It is Linux and Unix!

what is true of open source software

Answers

Answer:

lo que es cierto del software de código abierto?  

opera con los principios subyacentes de la producción de iguales y la colaboración masiva, creando un desarrollo de software más sostenible para los usuarios finales.

Explanation:

Project light with a system of lenses used for projecting slides or film into a screen.

Answers

Answer:

Optical system. An overhead projector works on the same principle as a slide projector, in which a focusing lens projects light from an illuminated slide onto a projection screen where a real image is formed.

Explanation:

What type of computer is IBM 1401 ?

Answers

Answer:

The IBM 1401 is a variable-word length decimal computer that was announced by IBM on October 5, 1959.

List 2 negative impacts of cybersecurity.



Answer and I will give you brainiliest ​

Answers

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

Is this correct just need somebody to check my answer plz and use your honest answer

Answers

Answer:

your answer looks correct

what type of information system would more be likely to be used by schools?
commercial
scientific data processing
information retrieval and management
automation

Answers

Answer:

probably

informaition retreival

Explanation:

Type the correct answer in the box. Spell all words correctly. Karen is a famous hair stylist in New York and caters to big names. A few weeks ago, two hair stylists from South East Asia joined her team. They are shy by nature and hardly communicate with the rest of the members in Karen's team. Which strategy might Karen use to ensure people from minority backgrounds open up and contribute to group communications? Karen might use the strategy to encourage people from minority backgrounds to contribute to group communications​

Answers

Answer: To open them up emotoinally from a personal level then build up to group disscosiuns or counseling

Explanation:

Answer:

inclusion strategy

Explanation:

i got it right on plato

What are the different ways computers can process information?

Answers

To determine what to do with the instructions, the CPU goes through 4 steps to make sure the program runs without errors. The 4 steps are fetch, decode, execute and writeback.

Input, process, output, and storage are the the different ways computers can process information.


What is a computer?

A computer is a piece of computer components used to handle information or files. Data can be stored, retrieved, and processed by it. Maybe may already be aware of the fact you are able use a desktop to surf the Internet, send emails, type articles, and play online games.

The software directs but really the hardware actually does the information to output execution. Input, process, output, and storage are the four important information processing operations needed for a computerized system to operate.

Input, processing, as well as output are really the three phases of the computer. These stages are carried out by a computer "running" a code. A program comprises a set of detailed instructions that specify how the computer should process input to generate the desired result.

Learn more about computers, here:

https://brainly.com/question/21080395

#SPJ2

How many times will the loop body execute:
for i in range(5,9)
A) 1
B) 2.
C) 3
D) 4



I think it’s a But I don’t know

Answers

I’d also say B, which is 2

Explain what is the difference between a "Mode Switch" and a "Process Switch".

Answers

Answer:

The main difference between mode switch and process switch is that mode switch changes the process privilege between modes like user mode and kernel mode while process switch changes the process state between different states. These processes then load into the main memory for the CPU to execute them.

Explanation:

With working from home now becoming a norm what is an effective network for an organization to secure its internal resources access by employees working from home

Answers

Answer:

Always encrypt data never store anything in plain text someone could use wireshark to pull out a data packet and if the data is not encrypted, expect things to happen.

it's urgent. I will mark you brainliest. is it legal to share your internet connection with your neighbors? explain in three paragraphs.​

Answers

Answer:

It mostly depends (IF YOU ARE COPY-PASTING GO TO EXPLANATION)

Explanation:

It mostly depends, are any of your passwords alike? If so, that can be dangerous, even if you "trust" your neighbor. Your computer could also be infected with malware. The neighbor could make security mistakes, etc. Really think about how much you can trust them.

It can be hard to give them updates on new security such as new passwords. Also, not everyone is completely aware of why you would put the amount of security you do, (more or less than they think should be there) and you could get complaints from them on YOUR security.

It would be best to just politely decline, or get a guest network. Guest networks are safer, but some complications are still there, such as the ones in my second paragraph. So, safest and best option for both parties would be to decline.

Other Questions
what is the symbolism of the new cloak in this excerpt? How does a seller maximize profit at marginal revenue being equal to marginal cost? A number is multiplied by 3. Next, 6 is added to the product. Then, the sum is divided by 8. If the result is 6, what is the number? solve for t: 2-16t=6(-3t+2) The 200 bones in the skeleton work together and are pulled by which of the following? (1) Prissy Baker was in Oscar Miller's store New Year's morning, buying matches for New Years was not kept as a business holiday in Quincy when her uncle, Richard Baker, came in. He did not look at Prissy, nor did she wish him a happy New Years she would not have dared. Uncle Richard had not been on speaking terms with her or her father, his only brother, for eight years.(2) [While in the store, Prissy overhears her uncle Richard explain that he is on his way to a neighboring town, Navarre, and that he has no one to make his New Year's dinner. Prissy decides to go to his house, make a surprise dinner for him, and leave before he returns. She acts on her plan, cooking a dinner at his house. As she prepares to dish it out, she suddenly hears a voice behind her.](3) Well, well, what does this mean?(4) Prissy whirled around as if she had been shot, and there stood Uncle Richard in the woodshed door!(5) Poor Prissy! She could not have looked or felt more guilty if Uncle Richard had caught her robbing his desk. She did not drop the turnips for a wonder; but she was too confused to set them down, so she stood there holding them, her face crimson, her heart thumping, and a horrible choking in her throat.(6) "I I came up to cook your dinner for you, Uncle Richard," she stammered. "I heard you say in the store that Mrs. Janeway had gone home and that you had nobody to cook your New Year's dinner for you. So I thought I'd come and do it, but I meant to slip away before you came home."(7) Poor Prissy felt that she would never get to the end of her explanation. Would Uncle Richard be angry? Would he order her from the house?(8) "It was very kind of you," said Uncle Richard dryly. "It's a wonder your father let you come."(9) "Father was not home, but I am sure he would not have prevented me if he had been. Father has no hard feelings against you, Uncle Richard."(10) "Humph!" said Uncle Richard. "Well, since you've cooked the dinner you must stop and help me eat it. It smells good, I must say. Mrs. Janeway always burns pork when she roasts it. Sit down, Prissy. I'm hungry."(11) They sat down. Prissy felt quite giddy and breathless, and could hardly eat for excitement; but Uncle Richard had evidently brought home a good appetite from Navarre, and he did full justice to his New Year's dinner. He talked to Prissy too, quite kindly and politely, and when the meal was over he said slowly:(12) "I'm much obliged to you, Prissy, and I don't mind owning to you that I'm sorry for my share in the quarrel, and have wanted for a long time to be friends with your father again, but I was too ashamed and proud to make the first advance. You can tell him so for me, if you like. And if he's willing to let bygones be bygones, tell him I'd like him to come up here with you tonight when he gets home and spend the evening with me."(13) "Oh, he will come, I know!" cried Prissy joyfully. "He has felt so badly about not being friendly with you, Uncle Richard. I'm as glad as can be."(14) Prissy ran impulsively around the table and kissed Uncle Richard. He looked up at his tall, girlish niece with a smile of pleasure.(15) "You're a good girl, Prissy, and a kind-hearted one too, or you'd never have come up here to cook a dinner for a crabbed old uncle who deserved to eat cold dinners for his stubbornness. It made me cross today when folks wished me a happy New Year. It seemed like mockery when I hadn't a soul belonging to me to make it happy. But it has brought me happiness already, and I believe it will be a happy year all the way through."(16) "Indeed it will!" laughed Prissy. "I'm so happy now I could sing. I believe it was an inspiration my idea of coming up here to cook your dinner for you."(17) "You must promise to come and cook my New Year's dinner for me every New Year we live near enough together," said Uncle Richard.(18) And Prissy promised.Describe the storys resolution. Add a comment to explain how the resolution of the plot affects the characters. what is 4x5=2+3(x3) i need some help Change each of the mixed numbers below into a fraction 1 3/8 Hey can someone please help me!!??? Find the length of segment AB if A (4, 1) and B(1,3). Round to the nearest hundredth, if needed.AB = _ units Which of these objects has the properties of a solid?A.deskB.waterC.rainD.milk The American culture values ________________ over reflection.Immersive Reader(1 Point)actionattituderespect none of the above The juice was like pop without the fizz." what figurative language is this? what are the four factors underlying the free enterprise system? Shannon says that the lines y=-3x-4, y = -x + 6, y = -4x - 5, and y=-x-5 could represent the sides of a rectangle. Explain Shannon's error. 8th grade math!! need to get a good grade! vesicles formed from phagocytosis often fuse with a common cellular organelle. based on your knowledge of cellular biology, what organelle is this? A box with a square base and no top is to be made from a square piece of carboard by cutting 3 in. squares from each corner and folding up the sides. The box is to hold 972 in3. How big a piece of cardboard is needed? Your answer is:__ in. by___ in. show your work a teacher has 7 pack of 12 pencils and 2 packs of 54 pencils.the teacher shares these pencils out into 8 pencil pot.how many pencils with be in each pot? Please help! Very easy!