Answer:
The network address can be the reason. You need to modify it so you can have access.
what is an indication that malicious code is running?
Answer:
If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.
please give brainliest
what does a exponent do in excel ?
Answer:
Exponents in Excel are one of the oldest concepts in Mathematics and are a very powerful one as you have to deal with powers. They are basically a shorthand notation for repetition or to depict how many times a number is getting multiplied to itself.
Explanation:
Difference between batabse and database management system
Answer:A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ... The data can then be easily accessed, managed, modified, updated, controlled, and organized.
Explanation:A database could be grades that students get at school and to manage it we can use a spreadsheet program like excel
Easy Question I will make you brainless Just answer this 10 question!!.
Answer:
Utility knife - basket
Old newspaper - basket
Strong scissor-Sc
Clean soda can-Sc
Stapler - B
Scissor-basket
Push pin - Sc
Masking tape - Sc
Pin black-Sc
Glue-basket
What language do programmers use to communicate with a computer?
Input code
Linguistic code
Programming code
Virtual code
Answer:
I would say programming code
Explanation:
Since its a system of rules written in a particular programming language
The language that programmers use to communicate with a computer is called "Programming code".
The correct option is C.
Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.
Programming languages can be divided into two categories: low-level and high-level.
Low-level languages are closer to the binary code that computers use to execute instructions.
High-level languages are more abstract and easier for humans to understand and use.
Examples of high-level languages include Python, Java, JavaScript, and C++.
Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.
Know more about programming language,
https://brainly.com/question/23959041
#SPJ3
Language modeling incorporates rules of __. Select all that apply.
A. story structure
B. grammar
C. dictionary definitions
D. pronunciation patterns
Language modeling incorporates rules of grammar and pronunciation patterns
Language modeling is simply known to use rules of grammar, known pronunciations, and other patternsIt seeks to know the given probability distribution of all linguistic units such as words, sentences. is main work is to predict the next word that is to come in a document.It makes use of grammar principles and the various forms of pronunciation in its task.
Conclusively, we can say that Language modeling incorporates rules of grammar and pronunciation patterns
Learn more from
https://brainly.com/question/6214562
Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version
Answer: D Version control document
Explanation: right on cs
A version control document keeps track of the version numbers of an application and what changes were made in each version.
What is version control?Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.
In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.
Read more on version control here: https://brainly.com/question/22938019
#SPJ2
The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen
Answer:
cursor or pointer
Explanation:
beacause the main js crom the algorithm
Why is the Game Design Document called a ""living"" document AND why is this important?
Answer:
documentation
Explanation:
Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important
Consider the following declarations:
class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration
Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?
Answer:
12, 5, 2, 3
bagType
Explanation:
I just did it
What refers to the place you drag and drop blocks to create instructions in Scratch?
A.
playground
B.
sprite
C.
editor
D.
environment
Answer:
It is called the editor script area, hence the name is where you create and edit code.
Hope this help please give the brainliest award.
computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
write down the steps to start computer.
Answer:
To start a Desktop PC:
Ensure the PC is plugged in.
Press the power button.
Let the computer start.
When prompted, insert the password if you have one set.
To start a laptop:
Press the power button.
Let the laptop start.
When prompted, insert the password if you have one set.
what does your dns server might be unavailable mean?
Answer:
flush your dns
Explanation:
1. Define the term Intranet.
2. List three advantages of the intranet.
3. List three disadvantages of the intranet.
4. Briefly define the term extranet. 2marks
5. List three advantages of the extranet.
6. List two disadvantages of the extranet.
Answer:
1.a local or restricted communications network, especially a private network created using World Wide Web software.
2.Enhanced employee engagement.
Increased productivity.
Better connection and collaboration of distributed employees.
Streamlined communication of change management.
Establishing and reinforcing a strong company culture.
Efficient time management.
3.Costly and timely implementation. Intranet can be very costly and time-consuming to implement.
Complexity and heavy admin burden.
Poor user experience.
Low user adoption.
Time-consuming information search.
Internal use only.
Lack of employee advocacy.
Hard to measure success and effectiveness.
4.An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
5.Information sharing is simple. Without a client extranet, you're likely sharing files with outside parties via email.
Documents are safe and secure.
Project management is easy.
Setup and training require little to no IT involvement.
Professional branding makes a great impression.
6.Cost. It is no doubt that extranet involves direct expenses such as hardwares, softwares and training of employees.
Maintenance. Both extranet implementation and maintenance is made expensive within an organization.
Dependency.
System Protection.
Communication Delay.
User Friendliness.
Explanation:
Consider the plain text ALLTHEBEST with key values 4,19,3,2,3,4,12,5,11,4 what will be the cipher text after applying vigenere cipher.
hi bae systems applied to the relationship
I will make you brainless Just answer this question!!!!
A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on...
Answer:
6, 8,5,3,4,1,9,2,7
Explanation:
Just like that
Answer:
6, 8, 1, 3, 4, 2, 9, 5, 7
you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?
When one is typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.
Computer data storage can be regarded complex system, immediately a data is saved then; The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers, The hardware will record this saved numbers inside the computer. These numbers are then organized and transferred to temporary storage which be manipulated by programs, or software.Therefore, data are been stored as 1s and 0s in the computer.
Learn more at:https://brainly.com/question/21571591?referrer=searchResults
what is the most common type of storage device for transferring files from one computer to another?
Answer:
USB flash drives is the most common type of storage device for transferring files from one computer to another
Which of the following best describes the original meaning of the term hacker?
Skilled computer user
Dangerous cybercriminal
Beginning computer programmer
Computer virus developer
Answer:
Dangerous cybercrimina
Explanation:
Answer:
Skilled computer user and computer virus developer
Explanation:
a modem is required for ________________ internet access.
an error occurred while loading a higher quality version of this video
Answer:?
Explanation:?
Which of the following are advantages of using meaningful names for variables when writing a program? Select two answers.
1. Less variables will be required as the existing ones can be renamed throughout the program.
2. It is easier for a person reading the code to identify the purpose of a variable and follow the logic of the program.
3. It is simpler for the compiler to compile the program, meaning wait times and errors are reduced.
4. The programmer is less likely to make a mistake and use a variable for the wrong purpose.
Answer:
The answer is 2 and 4, please give brainliest award.
what safety do you need to have ready to start a device repair?
Answer:
Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.
n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each of which is an n- bit predictor. A two-level local predictor works in a similar fashion, but only keeps track of the past behavior of each individual branch to predict future behavior.There is a design trade-off involved with such predictors: correlating predictors require little memory for history, which allows them to maintain 2-bit predictors for a large number of individual branches (reducing the probability of branch instructions reusing the same predictor), while local predictors require substan- tially more memory to keep history and are thus limited to tracking a relatively small number of branch instructions. For this exercise, consider a (1,2) correlating predictor that can track four branches (requiring 16 bits) versus a (1,2) local pre- dictor that can track two branches using the same amount of memory. For the fol- lowing branch outcomes, provide each prediction, the table entry used to make the prediction, any updates to the table as a result of the prediction, and the final mis- prediction rate of each predictor. Assume that all branches up to this point have been taken. Initialize each predictor to the following:
Answer:
a
Explanation:
Match the letter with the corresponding Workspace Area
Options :
-workspace settings
-options bar
-menu bar
-toolbar
The workspace areas described are editing tools of the photoshop program
The options described below are part of the Adobe Photoshop program for image and photo editing.
Workspace settings: It is a bar to configure the general aspects of the workspace in which an image is going to be edited or created.
Options bar: It is a bar located in the upper part (second row) of the document in which we have different options depending on the tool of the toolbar that we choose.
Menu bar: It is the bar located at the top (first row) in which we find different options such as:
FileEditionImageCapTextSelectionFilter3DViewWindowHelpToolbar: It is the bar located on the left side of the screen where we find different editing tools for our file, such as:
MoveMagnetic loopTrimDropperBrushDraftDegradedFeatherNote: This question is incomplete because the information is incomplete. However, I can answer based on my previous knowledge.
Learn more in: https://brainly.com/question/24964958
based on mla guidelines, what is the correct margin width?
Answer:
Leave 1 inch margins on each side.
Which options are available in the Conditional Formatting dialog box?
Answer:
all but b are correct.
Explanation:
the superclass javax.servlet.http.httpservlet was not found on the java build path
Answer:
follow this link https://stackoverflow.com/questions/22756153/the-superclass-javax-servlet-http-httpservlet-was-not-found-on-the-java-build
Explanation:
nice
____ describes the period of time in a twenty-four-hour period that is spent at work.
I believe "Work-Shift" should be in the blank