Answer:
The most suitable format for logo is PNG
Explanation:
PNG stands for portable network graphics. It is an improved version of gif. The best thing in png is that it is lossless compression and the background is not visible. Both 24 and 32 bit Colour can be used in png. PNG became ISO standard in sixteen years ago in 2004.
write passage on computer virus
Answer:
A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.
hope it helpsWhat are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g
Answer:
Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.
Explanation:
The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.
SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.
Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable.
Public class Employee
{
Private String empID;
Private boolean hourly;
) . .
_______
{
Hourly = isHourly;
}
}
A) public void setHourly(String isHourly)
B) public void getHourly()
C) public boolean getHourly()
D) public boolean setHourly(boolean isHourly)
Answer:
A)
Explanation:
In this code example the missing piece of code would be...
public void setHourly(String isHourly)
This piece of code is creating a function called setHourly which takes in one String variable as it's parameter. Based on the rest of the code, the function takes that parameter variable and places it into an instance variable called Hourly which can be used when the function is called.
Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?
Answer:
This is not true
Explanation:
The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.
The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;
= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits
This would be the same for both cases.
The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.
Drag the tiles to the correct boxes to complete the palrs.
Match the types of letters with their descriptions.
letter of interest
cover letter
thank you letter
letter of recommendation
discusses how you meet job requirements
>
reiterates why you're the best candidate for the job
>
tells more about your character and who you are
expresses your interest in working for a company
Answer:
Letter of interest> tells you more about your character and who you are expresses your interest in working for a company
Letter of recommendation> reiterates why you're the best candidate for the job
Cover letter> discusses how you meet job requirements
Hope this helped!
Answer:
Discusses how you meet job requirements = Cover Letter
Expresses your interest in working for a company = Letter of Interest
Tells more about your character and who you are = Letter of Recommendation
Reiterates why you're the best candidate for the job = Thank You Letter
Bluetooth uses this medium to connect two devices.
Select one:
a. microwave signals
b. fiber optics
c. infrared light
d. radio signals
Answer:
D
Explanation:
Bluetooth is the wireless technology which allows for the exchange of the data between different devices. It uses wavelength to transmit information and generally works with short rage devices.
Due to Bluetooth relies on the range of devices and hence it depends on the UHF radio waves. These have a range of 2.4 to 2.5 Ghz. Such that the devices can talk to each other. The usage is control automation system.Hence the option D is correct.
Learn more about the uses this medium to connect two devices.
brainly.in/question/5681178.
In C 11, the ________ tells the compiler to determine the variable's data type from the initialization value.
Answer:
auto key word
Explanation:
the auto keyword in c++11 can be regarded as one of the features of
“Type Inference” . It should be noted that in In C ++11, the auto key word tells the compiler to determine the variable's data type from the initialization value.
FELLING GENEROUS GIVING AWAY POINTS:)
Who plays Lol btw (league of legends)
ADD me ign : Davidoxkiller (euw server)
Answer:
thanksssssssss
Please have a look at the screenshot below
To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as appropriate image dimensions and
resolution.
magnification.
orientation.
colors.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The given options to this question are:
resolution. magnification. orientation. colors.The correct option to this question is 1. i.e.
Resolution.
The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.
While other options are not correct because:
Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.
Answer:
B C E
A web page is taking too long to load. It contains only a small amount of text and two images. Choose all items that represent possible causes.
large font size
images do not use a compressed format like JPG
image resolution too high
image resolution too low
image dimensions too large
Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when many developers may be working on the same code. Support your answer with an appropriate visual that you find from the internet.
Answer:
Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.
Explanation:
Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.
list any three importance of computer
Answer:
here is the answer
Explanation:
1) accurate
2) fast
3) can accomplish tasks more effencily
Which tools can Object Drawing Mode be applied to?
Line tool
Rectangle Tool
Oval Tool
Pencil tool
Pen Tool
Brush Tool
Answer:
• Line Tool
• Rectangle Tool
• Oval Tool
• Pencil Tool
• Brush Tool.
Explanation:
When people want to animate when using the Adobe Animate CC, it is vital for them to know how to draw shapes like squares, lines, ovals, rectangles, and circles. This is to enable such individuals understand how to draw objects as it can be difficult if they do not know how to draw these shapes.
The tools that Object Drawing Mode be applied to include:
• Line Tool
• Rectangle Tool
• Oval Tool
• Pencil Tool
• Brush Tool.
When the tool is being selected, it should be noted that the option for the drawing mode will be shown in the Property Inspector panel or it can also be seen in the tools panel.
write the code that writes access granted if the correct password, swordfish is entered and access denied! otherwise
In python 3.8:
if input("Enter password: ") == "swordfish":
print("access granted")
else:
print("access denied!")
It is always better to get at least 3 times the amount of b-roll needed
True
False
Answer:
true
Explanation:
What is one feature that differentiates social media information systems (SMIS) from Web site applications? A user has to login to a Web site to use the special features. SMIS do not use browsers. A user can comment on a Web site. SMIS has more users than a Web site. SMIS has connection data
Answer:
A user has to login to a Web site to use the special features.
Explanation:
This is true because, even though website could be able to give the required information needed at that particular point in time, in order to use the special features found in the website, there is need to login into the website.
For example, Brainly which is a website needs the students to login in-order to ask his or her questions where not clarified with an expected answer gotten from the website.
One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files
Which statement is true?
1)A deque is a type of collection,
2)A collection is a type of deque.
3)A list is a type of deque.
4)A deque is a type of list.
Answer:
1. A deque is a type of collection.
Explanation:
The statement that is true is as follows:
A deque is a type of collection.Thus, the correct option for this question is A.
What is Deque?Deque may be defined as an ordered and systematic collection of items similar to the queue. It is also known as a double-ended queue. It consists of two ends, a front, and a rear, and the items remain positioned in the collection.
According to the context of this question, a deque is a kind of collection that holds data and information identical to a queue. From here, elements can be added to or eliminated from either the front or back very efficiently.
It is also often called a head-tail linked list. Though properly this signifies specific data with appropriate structure that has been the implementation of a deque.
Therefore, a deque is a type of collection that is a true statement. Thus, the correct option for this question is A.
To learn more about Deque, refer to the link:
https://brainly.com/question/16750037
#SPJ2
what is meant by resources of computer
How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either the string 'RXS' or string 'ZU' in the 7 characters string?
Answer:
Following are the solution to this question:
Explanation:
In the following forms, RXS can appear:
[tex]R X S \_ \_ \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
[tex]\_ R X S \_ \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
[tex]\_ \_ R X S \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
[tex]\_ \_ \_ R X S \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
[tex]\_ \_ \_ \_ R X S[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
And we'll have a total of [tex]24 \times 5 = 120[/tex] permutations with both the string RXS.
In the following forms, UZ can appear:
[tex]U Z \_ \_ \_ \_\ _[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ UZ \_ \_ \_ \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ \_ U Z \_ \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ \_ \_ U Z \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ \_ \_ \_ U Z \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ \_ \_ \_ \_ U Z[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
There may be [tex]120 \times 6 = 720[/tex] ways of complete permutations.
Documenting findings, actions, and outcomes of network troubleshooting calls is an essential part of the troubleshooting process. List the reasons why documentation is critical, and discuss the form that this documentation could take (e.g. blogs, wikis, professional document management software, etc). Include a detailed description of what information would need to be saved.
Answer:
The main purpose of documentation is for future reference on the cost, materials, procedures, and techniques used in a task. It can be in form of a video log, report, digital text document or software, etc.
Explanation:
Documentation is an important practice of taking notes of events during a process. It could in the process of creating or discovering new ideas or repair or management of existing processes. It holds the time, cost, technique, event name, measures-taken, etc, that would totally describe the event.
Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.
Answer:
An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)
Explanation:
Many electronic devices use a(n) integrated circuit which contains all the circuit parts in a miniature form.
The use of integrated circuit is known to be a kind of a single, miniature circuit that has a lot of electronically connected parts that are designed onto a small piece of silicon or semi conductive material.
A lot of electronic components are known to be capacitors, inductors, resistors, diodes, transistors and others.
Learn more about electronic devices from
https://brainly.com/question/11314884
What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer among the given options to this question is:
Knowledge of HTML is not required.
Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”) editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”) automatically inserts the HTML for the form and button on a website page.
While other options are not correct because:
Using the WYSIWYG (“what you see is what you get”) editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”) website templates are mostly used and modified using WYSIWYG editor.
Answer:
(C):Knowledge of HTML is not required.
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
Explanation:
Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major advantage of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main disadvantage of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.
In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. A major advantage of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), a disadvantage.
Advantage:
Because the content is contained throughout a non-secure file, the above strategy decreases the chance of an assault on classified info.Disadvantage:
This approach has the disadvantage that concealed information might be able to retrieve if somehow the documents have been changed or deleted as of a non-secure file.Once again to encrypt as well as decode information, symmetric encryption employs a unique key, but asymmetric encryption utilizes two different keys, something for encryption as well as someone else for decryption.
Advantage:
One such approach is superior to steganography throughout the level of protection.Disadvantage:
Because distinct keys have been needed to get access, such techniques of asymmetric encryption are considerably slower.Thus the approach above is correct.
Learn more about steganography here:
https://brainly.com/question/15187715
How might use of computer and knowledge of technology system affect personal and professional success
Answer:
social media
Explanation:
For things like school, you should have a more serious:
Answer:
who and what do you mean
Explanation:
Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them
Answer:
A, template specifics, such as horizontal or vertical menu layout
Explanation:
Answer:
D. who will be using the site and the design theme selected for them
Explanation:
I am doing the exam right now.
An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)
Answer:
polynomial-bounded algorithms
Explanation:
There are two algorithm complexities and they are time and space complexities. They can be denoted with the big-O notation. The big-o notation for a time and space complexity gets the worst-case time and space respectively.
The time complexity gets the measure of the execution time of an algorithm. When the time function is a polynomial ( k^n + k^n-1 ...) then the algorithm is said to be a polynomial-bounded algorithm.
Question #3
Multiple Choice
Which statement is true?
O A collection is a type of deque.
O A list is a type of deque.
O A deque is a type of list.
O Adeque is a type of collection.
Answer:
D. A deque i a type of collection
Explanation:
I do computer science too ;3
While your hands are on home row, both of your thumbs are on _____.
Answer:
While your hands are on home row, both of your thumbs are on Space-barI know this will definitely help✍️✍️✍️