sorry bro...,......................................
Why should you pay your full credit card balance by the due date every month?
Answer: to avoid late fees and interest
Explanation:
You are in charge of setting up a network for a small office and ensuring its security. Describe how you will set up a small network.
hi there!
Answer:
setting up a small office network can be done with a LAN connection using a router, switch and some cables then we can connect all devices to the router through the switch using cables and it's done.
hope this helps.
_____ is the dynamic storage allocation algorithm that results in the largest leftover hole in memory.
Answer: Worst fit
Explanation:
List three (3) features of first generation computer
Answer:
features are
the first generation computer were based on vacuum tube technology
they were very large in size,very slow in speed and very low in capacity
they used to get heat very soon
x = 9 % 2if (x == 1): print ("ONE")else: print ("TWO")
Answer:
ONE
Explanation:
It prints one because % is modulus, which is remainder division. It divides the numbers provided and returns the remainder of the division. 9 / 2 = 4 with 1 remainder, which leads us to our answer.
What is data communication..
Hope this helps you❤!!
While on vacation, Joe receives a phone call from his identity alert service notifying him that two of his accounts have been accessed in the past hour. Earlier in the day, he did connect a laptop to a wireless hotspot at McDonald's and accessed the two accounts in question.
Which of the following is the most likely attack used against Joe?
A. Unauthorized association
B. Honeyspot access point
C. Rogue access point
D. Jamming signal
The most likely form of cyber attack that was used against Joe during his vacation is: B. Honeyspot access point.
A honeyspot access-point refers to a network system that appears to be legitimate but fraudulent because it is usually set up to capture wireless transmissions, especially by eavesdropping on the sensitive information that are being transmitted by cyber attackers and hackers.
This ultimately implies that, it is usually set up as decoy to lure unsuspecting cyber attackers and hackers, in order to detect, deflect and study their attempt to gain unauthorized access to the network.
In this scenario, a honeyspot access-point was used against Joe during his vacation because he connected to a wireless hotspot at McDonald's.
Read more: https://brainly.com/question/5660386
_______________ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.
Answer:
account recovery
Explanation:
account recovery, provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.
A multinational pharmaceutical company used a saffron trident in a promotional campaign for one of its drugs in India. The saffron trident, a religious symbol in India, was meant to indicate the three levels of efficacy of the drug but mistakenly conveyed a religious message to Indians. This miscommunication indicates a problem associated with which step of the international communications process?
i. information source selection
ii. media channel selection
iii. encoding
iv. noise cancellation
v. message transmission
Based on the given information, This miscommunication indicates a problem associated with the encoding step of the international communications process. Thus the correct option is 3.
What is communication?Communication is referred to the exchange of information between two individuals in the form of conversation, opinion, suggestion, or advice with the help of medium or direct interaction.
In the given case, it is explained that during a marketing campaign for one of its medications in India, a multinational pharmaceutical company utilized a saffron trident to represent the drug's three degrees of efficacy.
The method used to transform thoughts into communication is called encoding. The communicator must start decoding in order to communicate meaning in the form of symbols that stand in for concepts or thoughts.
Therefore, option 3 is appropriate.
Learn more about Communication, here:
https://brainly.com/question/22558440
#SPJ6
If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference
Answer:
wireless interference
Wireless interference is the term given to this type of interference.
What is wireless devices?Any gadget that has the ability to communicate with an ICS net via microwave or infrared light, often to gather or maintain the data but occasionally to managing different set - point. Mobile nodes are any gadgets that communicate via RF signals. These gadgets include phone, baby monitors, and mechanical door openers, to name a few.
An intervention in communications occurs when a signal is altered in a disruptive way while it passes along one transmission medium in between the source and recipient. The phrase is frequently employed to refer to the addition of undesirable information to a signal that is otherwise good. Common illustrations include: electric sabotage (EMI).
Learn more about wireless devices, Here:
https://brainly.com/question/9979629
#SPJ5
9. Which of the following is a disadvantage of cloud storage? * Accessibility (offline/without internet) Reduction of storage cost to organization, Increased possibility for disaster recovery, Efficient management of stored Data
Answer:
Accessibility offline
Explanation:
When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive.
When you first purchase a notebook, make sure you have a RECOVERY CD. It enables the restoration of the notebook computer.
A recovery disc is a disc that enables to restore the computer to the same condition when it was bought.
Moreover, a recovery drive refers to a separate partition in the notebook that must contain the required files to restore the device if the system becomes unstable.
A recovery disc can be considered as a drive used to keep a backup of the files (e.g., images) and other types of restoration data.
Learn more about recovery disc here:
https://brainly.com/question/14217813
3.) The primary storage device that holds the data currently being processed by the computer is
Answer:
I personally think its a hard drive or something like that,im not a computer expert to be honest
The process of sending and receiving messages with words defines _____. A. Verbal communication b. Nonverbal communication c. Open communication d. Empty communication Please select the best answer from the choices provided A B C D.
The process of sending and receiving messages with words defines: A. Verbal communication.
Communication can be defined as a process which involves the transfer of a message from an individual (sender) to another (receiver or recipient), through the use of words, semiotics, symbols and signs, that are mutually understood by both the sender and the receiver.
In English language, there are different types of communication and these include:
Visual communicationNon-verbal communicationWritten communicationListening communicationVerbal communicationVerbal communication is also referred to as oral communication and it refers to the process of sending and receiving messages from one individual to another through the use of words.
Read more: https://brainly.com/question/14810228
Answer:
its a
Explanation:
yw
if a granola bar has 5.7 grams of protein in it how many centigrams of protein does it contain?
A. 57
B. 0.57
C. 570
D. 5,700
Need Some Photography help
solve each of the following a. 3x=27
Answer:
3^(x)=27 x=3
Explanation:
3x3x3 27
:)
3ˣ = 27
Factorise 27.
27 = 9 × 3
27 = 3 × 3 × 3
27 = 3³
So,
3ˣ = 27
=》ˣ = ³
3³ = 27
_____
Hope it helps ⚜
According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.
Answer:
a hypothesis that forms into a question.
Explanation:
Using PowerPoint or Impress guarantees that your presentation will do which of the following? stay on schedule and end on time be clear and understood keep your audience engaged and excited none of the above.
Answer: it will be none of the above
Explanation: i just took this test. the key word is "guarantees" so yeah.
Using PowerPoint or Impress guarantees that your presentation will: D. none of the above.
A presentation can be defined as an act of speaking formally to an audience, in order to explain an idea, piece of work, project, or product, especially with the aid of multimedia resources or samples.
Generally, a speaker can use either PowerPoint or Impress during the process of a presentation to share vital information with his or her audience.
However, none of the aforementioned software applications can guarantee that your presentation will:
Stay on schedule and end on time.Be clear and understood.Keep your audience engaged and excited.Read more: https://brainly.com/question/10657795
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
Answer:
Virusus
Explanation:
-
Hope that helps
_______________: a group of people working together to achieve specific goals.
a.
Grapevine
b.
Compatible
c.
Lateral
d.
Organization
Please select the best answer from the choices provided
A
B
C
D
Answer:
Organization
Explanation:
The other words have unrelated definitons to the definition given.
Answer:
organization
Explanation:
edge 2021
What commands does SuperKarel know that regular Karel does not?
turnleft() and jump()
O
turnRight() and jump()
O
turnAround() and turnRight()
O
turnAround() and jump ()
Answer:
turnRight and turnaround
Explanation:
The regular karel does not know these commands
The command that SuperKarel know that regular Karel does not is turnAround() and turnRight(). The correct option is C.
What is Karel?Richard E. Pattis created Karel, an educational object-oriented programming language, to help teach programming to his Stanford University students.
Through simple object-oriented commands, the student learns to program by instructing Karel, a robot, to move, pick up a beeper, place a beeper, and turn off.
KAREL was developed as an educational tool to teach programming language elements to students studying robotics.
KAREL has since evolved into the primary FANUC programming language for robots and robot controllers. This powerful CNC programming language is extremely versatile.
SuperKarel understands two commands that regular Karel does not: turnAround() and turnRight ().
Thus, the correct option is C.
For more details regarding KAREL, visit:
https://brainly.com/question/13278951
#SPJ5
Pls help me plsssss
Answer: drawright(30)
Explanation:
which subunit of a heterodimeric cdk is the regulatory subunit?
A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of customers in their forties (ages 40 to 49).
What is the missing line of code?
customerAges = [33, 23, 11, 44, 35, 25, 35, 68, 51]
count40s = 0
for item in customerAges:
_____;
count40s = count40s + 1
print("Forties:", count40s)
if 40 > item > 49
if 40 < item < 49
if 40 <= item <= 49:
if 40 >= item >= 49
Answer:
if 40>= item >=49
Explanation:
Wikis are designed for ________, which is allowing people to contribute more than just posting a response
Answer:
collabirations
Explanation
Wikis are designed for collabirations, which is allowing people to contribute more than just posting a response.
Which of the following is true regarding computer science careers?
A. There are a limited number of jobs in this field.
B. There are not different job types in this field.
C. The number will increase over the next several years.
D. You must be a programmer to work in this field.
(WILL MARK BRANLIEST IF CORRECT)
Answer: There are several different job types in this field.
Explanation: did the test and got it right
Answer:
A or C!
Explanation:
Im pretty sure its one of those answers. I think its C though! If I'm wrong, please tell me! I just did the test and I forgot if I got it right or not. It wont let me go back in-
- A FLVS student with a 99.91 percent in computer science (Totally not bragging!)
How many passes will it take to find 16 using a binary search?
2, 4, 6, 8, 10, 12, 14
3
4
2
1
Answer:
1
Explanation:
Binary search is a useful approach for reducing a list of items. It divides the section of the list that might contain the item in half repeatedly until there is only one viable position left. Thus, option D is correct.
What using a binary search?Recursive and iterative methods. The main distinction between the two approaches is that the recursive approach utilizes O(logN) space complexity, whereas the iterative approach uses O (1).
On sorted arrays, binary search operates.The binary search process begins by comparing a middle-of-the-array member to the desired value.
Therefore, It is necessary to locate element 59 in a 10-digit array. The index of the elements ranges from 0 to 9. The array's centre is now calculated. To do this, divide the index's leftmost and rightmost values by two.
Learn more about binary search here:
https://brainly.com/question/12946457
#SPJ2
8.3.7: Exclamat!on Po!nts
Write the function exclamation that takes a string and then returns the same string with every lowercase i replaced with an exclamation point. Your function should:
Convert the initial string to a list
Use a for loop to go through your list element by element
Whenever you see a lowercase i, replace it with an exclamation point in the list
Return the stringified version of the list when your for loop is finished
Here’s what an example run of your program might look like:
exclamation("I like music.")
# => I l!ke mus!c.
The function is an illustration of loops.
Loop instructions are used to repeat operations
The function in Python, where comments are used to explain each line is as follows:
#This defines the function
def exclamation(myStr):
#This iterates through the string
for i in range(len(myStr)):
#This checks if the current character of the string is "i"
if myStr[i] == "i":
#If yes, this converts the string to a list
s = list(myStr)
#This replaces i with !
s[i] = '!'
#This gets the updated string
myStr = "".join(s)
#This returns the new string
return myStr
Read more about similar programs at:
https://brainly.com/question/22444309
12. In Justify the text is aligned both to the right and to the left margins, adding extra space between words as necessary *
Maybe
False
True
[tex]\blue{<><><><><><><><><><><><><}[/tex]
[tex]\green{<><><><><><><><><><><><><}[/tex]
Answer:
FalseExplanation:
Because, aligment the tex are aligned in the centre of the page.[tex]\pink{<><><><><><><><><><><><><}[/tex]
[tex]\red{<><><><><><><><><><><><><}[/tex]