Answer:
B
Explanation:
The reason I say "D" is not the answer because I put the answer in and it was wrong.
You are performing digital forensics in an enterprise that recently experienced a security breach. You successfully retrieved all volatile data, and your next focus is hard drives. How should you collect evidence from the hard drives without tainting any evidence
How should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.
What is mirror image backups?Mirror image backups can be defined as a type of backup that enables you to backup all the document or items that you have on your computer hard drive.
Mirror image backup is vital because it enables you to have the same copy of all the data or information that is store on your hard drive.
Therefore how should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.
Learn more about Mirror image backups here:https://brainly.com/question/21465714
How would a user ensure that they do not exceed the mailbox quota?
The user can select a mailbox that does not have a quota.
The user can flag the items as Junk Mail.
The user can just move items to the Deleted Items folder.
The user must empty items from the Deleted Items folder or Archive items.
Answer:
I don't know about this one
What will her profit be is she sells her CDs at this price?
One way to check if a website is secure is to look for a/an
in the address bar.
Answer:
One such sign to look for is in the URL of the website. A secure website's URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server.
T - True. One way to check if a website is secure is to look for a padlock icon in the address bar.
How does this work?This padlock indicates that the website is using a secure HTTPS connection. HTTPS encrypts the data transmitted between the user's browser and the website, ensuring that sensitive information such as login credentials or financial details remains private and protected from unauthorized access.
Additionally, a secure website's address will start with "https://" instead of "http://". Users should always verify these security indicators before entering any personal or sensitive information on a website to safeguard their online privacy and security.
Read more about websites here:
https://brainly.com/question/28431103
#SPJ2
define a touch-sensitive pad and state one use
Answer:
A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.
Explanation:
Which tab can help start a query? Create External Data File Home
The Create, External Data, File and Home tabs are in Microsoft Office Access
The Create tab can help to start a query
How to determine the tab?
There are several tabs in Microsoft Office Access.
Of all these tabs, the Create tab is used to help the user to start a query and return the required data of the query.
The other tabs such as file and home are used to perfom other tasks which include open files, save query, etc.
Read more about database at:
https://brainly.com/question/518894
Answer:
Its A Your Welcome
Explanation:
what is alternative name of home page
Answer:
In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for home page, like: web page, web site, website, webpage and homepage.
write a program to calculate sum of first ten natural numbers
Answer:
Explanation:
total = 0
i = 0
while i<=10:
total = i +total
print(total)
How to change notification sounds for different apps.
Digital censorship is _____. Select 3 options.
used to free people
used to control people
subtle and often hidden
open and visible
a global problem
Digital censorship can be used by government or private individual to control people.
What is Digital censorship?Digital censorship can be described as the controlling or suppression of the access to information on the Internet.
It can be carried out by governments or by private organizations and serves as a means of regulations.
Learn more about Digital censorship at;
https://brainly.com/question/26152499
Answer:
- used to control people
- subtle and often hidden
- a global problem
Explanation:
Digital censorship is the act of filtering out information and hiding it from the masses. This can be used in order to control and manipulate the public. It's a global problem that is very subtly accomplished. (correct on Edge)
I hope this helped!
Good luck <3
FOR loops are considered to be which of the following:
A. primarily pretest conditional loops
B. used for conditional statements
C. counter controlled loops
D. post test conditional loops
Answer:
C. counter controlled loop
Explanation:
A counter controlled loop, is a loop that repeats a specific number of times. If it is known how many times a loop must repeat or perform a certain task, it is a count controlled loop (for loop).
- It must initialize a counter variable to a starting value.
- It must test the counter variable by comparing it to a maximum value. When the counter variable reaches its maximum value, the loop terminates.
- It must update the counter variable during each iteration. This is usually done by incrementing the variable.
Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 KB, 4 KB, 20 KB, 18 KB, 7 KB, 9 KB, 12 KB, and 15 KB. Which hole is taken for successive segment request of
Answer:
um uwu
Explanation:
Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?
a. Each person needs to send email with his/her part of the project individually every day
b. Each person should be on a cloud folder and sync their files as they are working through their project
c. Each person needs to send a group email to the team as soon as any updates are completed
d. Each person should post their updated information on a team website so it is available for anyone to see
The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.
What is cloud computing?Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.
In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.
Read more on cloud computing here: https://brainly.com/question/19057393
what is the impact of ict on school policy
Answer:
It improves the effectiveness of education. It aids literacy movements. It enhances scope of education by facilitating mobile learning and inclusive education. It facilitates research and scholarly communication.
Explanation:
Answer:
Hello FluffyStrawberry here~
Your answer is
It improves the effectiveness of education. It aids literacy movements. It enhances scope of education by facilitating mobile learning and inclusive education. It facilitates research and scholarly communication
hope it’s helps you
Explanation:
~FluffyStawberry
What would be considered a benefit of using simulation in the education field?
Simulation can reduce the costs of books.
Simulation can increase the cost of materials.
Simulation can reduce the number of teaching jobs.
Simulation can reduce the amount of homework for students.
Answer:
books cost
Explanation:
the books cost will go down, as they are to become digital, thus, making physical copies cheaper
Answer:
A
Explanation:
Did test
Complete the sentence.
When sensitive information is sent over the internet, it should be
.
Answer:
encrypted
Explanation:
to prevent others from viewing it
Answer:
Your answer is encrypted
Explanation:
This will keep your information secure whilst sending it.
This means to:
convert (information or data) into a cipher or code, especially to prevent unauthorized access
So your info is safe
Pls mark brainliest <3
Hope this helps :)
`
`
`
Tori
nums = [30, 10, 30, 14, 10, 3, 9, 7]
print(nums)
nums.extend([24, 3, 21, 19])
print(nums)
What is output by the second print statement in the code above?
Group of answer choices
[30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]
[30, 10, 30, 14, 10, 3, 9, 7]
[24, 3, 21, 19]
[24, 3, 21, 19, 30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]
The range function must have two parameters is False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.
What is program?A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.
On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.
Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.
Learn more about program on:
brainly.com/question/30613605
#SPJ3
which of the following phase change when heat is removed form the material
A. sublimation
B. vaporization
C. Melting
D. Freezing
Answer:
It will be D.Freezing
Explanation:
If heat is removed from a substance, such as in freezing and condensation, then the process is exothermic. In this instance, heat is decreasing the speed of the molecules causing them move slower (examples: liquid to solid; gas to liquid). These changes release heat to the surroundings.
GOOD LUCK
The most popular productivity suite in the world is microsoft office. please select the best answer from the choices provided t f
Statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).
What is productivity suite?productivity suite is a collection of programs desgined for the computer whcih has a word processor, presentation creater and spreadsheet creater.
Types of productivity suite-
Computer based productivity suite- This type of productivity suite are need to be installed the program on the computer, which can be work offline mode too.Online productivity suite- Online productivity suite are availeble on the internet and can be use whenever required without preinstallation.Microsoft office 365 is the best and the oldest productivity suite. Most of the people are familier with this suite and it is most popular productivity suite in the market.
Thus, the statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).
Learn more about the productivity suite here;
https://brainly.com/question/2764685
Which three steps might be included in an algorithm for a digital thermostat?
✓ A. The thermostat uses the resistance detected to calculate the
temperature.
B. The thermostat sends an electrical signal to either the air
conditioner or the heater.
C. The thermostat measures electrical resistance with its thermistor.
O D. The thermostat automatically installs itself by wiring itself to the
house's electrical system.
Answer:
Explanation:
It certainly isn't D. It would cost a fortune to make that happen. It's not impossibe. Just impractical.
It's not A. Resistance is a floating physical thing present in the air.
B could be correct, but there is a better answer.
The answer is C. A thermistor is a resistance that is temperature sensitive.
Dose brainly give you notifications on you're phone when you go into the site
Answer:
Yep it does ^_^
which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website
Edhesive Assignment 8: Personal Organizer.
I keep getting a bad input message on my line 52. Any tips on how to fix this?
I've included photos of my code.
In this exercise we have to use the knowledge in computational language in python to write the following code:
What is input?Python's input function takes a single parameter which is a string. This string is often called a prompt because it contains informational text that tells the user to type something. For example, you can call the input function as follows:
So in an easier way we have that the code is:
eventName = []
eventMonth = []
eventDay = []
eventYear = []
def addEvent():
userEventName = input("What is the event: ")
userEventMonth = int(input("What is the month (number): "))
userEventDay = int(input("What is the date: "))
userEventYear = int(input("What is the year: "))
userEventMonth = validateMonth(userEventMonth)
userEventDay = validateDay(userEventMonth, userEventDay, userEventYear)
eventName.append(userEventName)
eventMonth.append(userEventMonth)
eventDay.append(userEventDay)
eventYear.append(userEventYear)
def validateMonth(month):
if month >= 1 and month <= 12:
return month
else:
return 1
def validateDay(month,day,year):
if day < 1 or day > 31:
return 1
if month == 2:
isleap = False
if year%4 == 0:
if year%100 == 0:
if year%400 == 0:
isleap = True
else:
isleap = True
if isleap:
if day <30:
return day
else:
return 1
else:
if day < 29:
return day
else:
return 1
if month in [1,3,5,7,8,10,12]:
return day
if month in [4,6,9,11] and day < 31:
return day
else:
return 1
def printEvents():
print("EVENTS")
months = ['January', 'February', 'March', 'April', 'May', 'June', 'July', 'August', 'September', 'October', 'November', 'December']
for index in range(len(eventName)):
print(eventName[index])
print("Date: "+months[eventMonth[index] -1]+ " " + str(eventDay[index]) + ", " + str(eventYear[index]))
userChoice = "yes"
while userChoice.upper() != "NO":
addEvent()
userChoice = input("Do you want to enter another event? NO to stop: ")
printEvents()
See more about python at brainly.com/question/18502436
difference between local technology and model technology with example
Differentiate between
Operating system and
language translator
Packet analysis can also help _____ understand protocol and application behavior to see how routines behave, as well as help determine if it is the application OR the network that is causing slow response times.
Packet analysis can also help developers to understand protocol and application behavior to see how routines behave.
What is the Packet analysis about?Packet analysis is known to be a tool that can help a lot of developers to be able to have a lot gains from understanding protocol and application behavior to see how routines behave.
Conclusively, Packet analysis can be used to know or determine when an application or a given network is having or leading to slow response times.
Learn more about packet analysis from
https://brainly.com/question/6962155
#SPJ1
Time machine could not create a local snapshot to back up from
Answer:
Time machine could not create a local snapshot to back up from Disk Error.
You are pricing out a new laptop for a user. You decided to go with a traditional hard disk that has a cache of flash memory. Which type of disk are you purchasing
Answer:
A hybrid drive
Explanation:
Its called a hybrid drive because it combines two different kinds of storage, SSD and HDD. SSD is a solid state drive and it has no moving parts. It is much faster than a HDD and is more reliable but these benefits come at a trade off of a higher price per gigabyte. HDD is a hard disk drive and works by reading a spinning disk to get information. This kind of disk is usually used because of its low price/gb. This makes it an excellent option for getting lots of storage at a cheap price. A hybrid drive combines the best of both worlds by using a small SSD as a boot drive to start up a computer because it is much faster, and uses an HDD as the main storage drive with lots of space.
29. The startup configuration file is stored in ________________ a. ROM b. NVRAM c. Flash Memory d. RAM
Answer:
The start configuration is stored on the nonvolatile random-access memory aka NVRAM for the vast majority of systems.
25 points for this answer
Unethical uses of computer devices include _____. Select 3 options.
financial theft
surfing websites
identity theft
media piracy
downloading videos
Answer:
financial theft
identity theft
media piracy
Unethical uses of computer devices include the following:
Financial theft.Identity theft.Media piracy.What is an unethical use of a computer?The unethical use of a computer can be defined as the unauthorized and illegal (illegitimate) use of a computer system to perpetrate cyber crimes and other criminal inclined practices.
In Cybersecurity, unethical uses of computer devices by a hacker include the following:
Financial theft.Identity theft.Media piracy.Read more on computer crime here: https://brainly.com/question/13109173
#SPJ2