Answer:
Dangerous cybercrimina
Explanation:
Answer:
Skilled computer user and computer virus developer
Explanation:
what is the answer ??
= Option b Minicomputer ..........
Answer:
Minicomputer answer The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Bro please follow me we should help each other
rocks created from compaction and cementation of sediments are called:
Answer:
Sedimentary Rocks
Explanation:
Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.
Answer:
A sedimentary
Explanation:
hope this helps please mark as brainliest
Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever
Bàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2
a) Tim Max, Min của dãy số
c) Sắp xếp dãy số thành dãy không tăng
d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k
b) Sắp xếp dãy số thành dãy không giảm
Answer:
Bàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2
a) Tim Max, Min của dãy số
c) Sắp xếp dãy số thành dãy không tăng
d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k
b) Sắp xếp dãy số thành dãy không giảm
Bàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2
a) Tim Max, Min của dãy số
c) Sắp xếp dãy số thành dãy không tăng
d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k
b) Sắp xếp dãy số thành dãy không giảmBàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2
a) Tim Max, Min của dãy số
c) Sắp xếp dãy số thành dãy không tăng
d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k
b) Sắp xếp dãy số thành dãy không giảm
Explanation:
Bàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2
a) Tim Max, Min của dãy số
c) Sắp xếp dãy số thành dãy không tăng
d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k
b) Sắp xếp dãy số thành dãy không giảmBàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2
a) Tim Max, Min của dãy số
c) Sắp xếp dãy số thành dãy không tăng
d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k
b) Sắp xếp dãy số thành dãy không giảm
what is an indication that malicious code is running?
Answer:
If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.
please give brainliest
_____ selling is used when a product is sold from one business to another .
Answer: cross-selling
Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.
Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way? Check all of the boxes that apply.
checking social media networks during working hours
surfing the Internet during working hours for what to do on the weekend
downloading a favorite band’s latest album from a file-sharing service
Answer:
All of the above.
Explanation:
You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading anything from anywhere is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.
What refers to the place you drag and drop blocks to create instructions in Scratch?
A.
playground
B.
sprite
C.
editor
D.
environment
Answer:
It is called the editor script area, hence the name is where you create and edit code.
Hope this help please give the brainliest award.
What is LinkedIn?
A job search website
A virtual job fair
A recruiter website
Answer:
A job search website.
Explanation:
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities
grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities
A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.Conclusively we can therefore say that the hacker was a gray hat hacker.
Learn more from
https://brainly.com/question/15899195
in this code how many times will it repeat? for(i = 0; i < 8; i++) {forward();}
Answer:
It will repeat 8 times. because in the statement above the variable i has to be more then 8, so until the variable i has the value of it it will repeat. So it will repeat 8 times .
What types of games became popular in the 90s? List three games and how they had evolved from their successful 80s video game rivals.
Answer:
Doom (1993) Half Life (1998) Super Mario 64 (1997)
Explanation:
Doom and Half-Life were PC games.
Doom was an early 90s PC shooter that was "3d" it wasn't actually 3d but it used a unique rendering system to make it look 3d. It was a level to level shooter that also included secrets
Half-Life was a Actual 3D game and required quite a beefy Graphics card in your computer at the time to run it smoothly, It was a long story-driven game
Super Mario 64 was one of the first "True 3D" games on Home console because it was a launch title for the brand new N64 It utilized the hardware for a brand new experience for console players.
Most 80s games were even more primitive and were either Hosted in arcade cabinets at your local Arcade Such as Outrun (1986) (Btw great soundtrack!) or the NES that allowed you to play the Original few Mario games that were all 2D.
So one of the biggest Evolutions in 80s to 90s gaming is the introduction of 3D titles being able to run on good computers in the early 90s and home consoles could also run 3D titles at the end of the 90s
Pls, mark Brainliest I put my heart and soul into this. Very fun Question!!!
You have a 7 GHz dual core processor. How many decisions can the processor
make in one second? *
PLEASE HELP 10 points
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Answer:
Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.
Explanation:
Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her
Explanation:
A lot of people with dyslexia can relate to Stephanie.
Which hacking technique uses network monitoring devices?
Sniffing
Shoulder surfing
Physical security threat
Wire tapping
Answer:
The answer is sniffing, because sniffing is a process that captures all the data packets, when the network is mentioned.
Please please help ASAP please
Answer:
he say yes would i do so way 2 be hey i oh peepo
Explanation:
what is bitcoin??????
Answer:
a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.
Explanation:
aaron has started a food blog on which he wants to post his recipes. he wants to place a high-quality image next to each cooking step. which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
The picture format which should be embraced on Aaron's blog in other to ensure that customers have smooth viewing experience while also preserving the quality of uploaded images is the JPEG format.
File format refers to the manner in which files are encoded. Picture files have several encoding types such as JPEG, JPG, GIF, PNG and so on.
Since, Aaron is considering images which loads quickly without lagging, then he'll need to compress the size of the uploaded images so that they have smaller file sizes.
In other to preserve image quality while working down the size of the image, the JPEG image format, produced good quality images with smaller file sizes compared to other file formats.
Therefore, the file format which should be adopted by Aaron ls the JPEG picture format.
Learn more :https://brainly.com/question/24941137
List 2 differences between routing messages and broadcasting messages
Answer:
Hub is an example of a broadcast device.
Switch is an example of a multicast device
which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?
The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."
A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.
A device driver is a form of software file that ensures hardware device functions as designed.
Several types of device drivers include:
BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.Hence, in this case, it is concluded that the correct answer is Device Driver.
Learn more here: https://brainly.com/question/19473613
You have a computer that has four DDR2 memory slots. Currently, there are two 512 MB memory modules installed. You check the motherboard documentation and find that the system has a 4 GB memory limitation. You want to add more memory to this system. By adding new memory modules, and without replacing the existing memory modules, what is the maximum total amount of usable RAM you can have in this system
Answer:
2048 MB / 2 GB.
Explanation:
Without removing the other modules you can add two more 512 MB modules for a total of 2048 MB.
The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.
Answer:
ZOO WEE MAMA
Explanation:
ZOO WEE MAMA 23
algorithm to convert Fahrenheit temperature into celsius temperature
Lets use python
[tex]\\ \tt F=(float(input("Enter\:temperature\:in\:Fahrenheit:")))[/tex]
[tex]\tt C=(F-32)*5/9[/tex]
[tex]\tt print("Temperature\:in\:Celsius\:is",C°C)[/tex]
Output:-
[tex]\tt Enter\:temperature\;in\:Fahrenheit:32[/tex]
[tex]\tt Temperature\:in\:Celsius\:is\:0°C[/tex]
Answer:
Using c++ variable names
double c;
double f;
//set f to some temperature value or pass the value to the function
c=f-32;
c=f*(5/9);
//c is now the temp in celcius
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use
PKI trust model that should be used, is a distributed trust model.
A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums. With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.Conclusively, we can say that PKI trust model that should be used is a distributed trust model.
Learn more from:
https://brainly.com/question/14837773
Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they view the bright images on the page. Which design principle is Cathy using?
Answer:
dominance
Explanation:
i just took it and got it right
I will make you brainless Just answer this question!!!!
A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on...
Answer:
6, 8,5,3,4,1,9,2,7
Explanation:
Just like that
Answer:
6, 8, 1, 3, 4, 2, 9, 5, 7
which device allows you to convert sounds into digital format to be used on the computer
You can open an HTML document only in ________.
A. Internet Explorer
B. M.S Excel
C. Note Pad
D. None of these
please solve it fast its urgent
Answer:
You can open a HTML document in internet explorer usually browsers can open HTML files.
What language do programmers use to communicate with a computer?
Input code
Linguistic code
Programming code
Virtual code
Answer:
I would say programming code
Explanation:
Since its a system of rules written in a particular programming language
The language that programmers use to communicate with a computer is called "Programming code".
The correct option is C.
Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.
Programming languages can be divided into two categories: low-level and high-level.
Low-level languages are closer to the binary code that computers use to execute instructions.
High-level languages are more abstract and easier for humans to understand and use.
Examples of high-level languages include Python, Java, JavaScript, and C++.
Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.
Know more about programming language,
https://brainly.com/question/23959041
#SPJ3