Answer:
Use TACACS+. IT IS THE BEST
Explanation:
IT IS THE BEST
Answer: Use SAML
Explanation:
Give one of user responsibility of the internet you should follow in cyberethics.
**Answer and I will give you brainiliest**
Answer:
One of the user responsibility is to use appropriate language when talking to others, mind you behavior and make sure to stay out of trouble, like hacking someone computer without permission and never send any malware to anyone without consent of the user.
what is a "for loop" that will produce the following output:
1+2 = 3
2+3 = 5
4+5 = 9
8+9 = 17
16+17 = 33
32+33 = 65
64+65 = 129
any help would be very appreciated
Answer:
128+129= 257
Explanation:
128+129= 257
Answer:
1+2= 3
loop for all interger
PLZ HELP I WILL GIVE BRAINLYEST
Answer:
software program and application software
in that order
Write a predicate function called same_ends that accepts a list of integers and an integer (n) as arguments. Return True if the first n numbers in the list are the same as the last n numbers in the list, and False otherwise. For example, if the list was [1, 2, 3, 4, 99, 1, 2, 3, 4], the function would return True if n is 4 and False if n is 3. Assume that n is between 1 and the length of the list, inclusive. Solve It!
Answer:
5=5
Explanation:
2+2 is 4
Below is the required Python code for the program.
PythonProgram code:
# Starting the code
# Defining a function
def same_ends(lst, n):
# Starting a loop
if lst[:n] == lst[-n:]:
return True
else:
return False
# Testing the function
lst = [1, 2, 3, 4, 99, 1, 2, 3, 4]
# Printing the values
print(same_ends(lst,4))
print(same_ends(lst,3))
Explanation:
Starting the code.Defining a function.Starting a loop.Testing the function.Printing the values.End up a code.Output:
Find below the attachment of the code output.
Find out more information about python here:
https://brainly.com/question/26497128
3. Find the best.
Write a program that will allow an instructor to enter a series of exam scores. After the last score, the instructor should enter a negative number as a signal that there is no more input. Print the average of all the scores and the highest score entered.
Do this with beginner c programming.
Example output:
Exam Average Program
Enter the scores when prompted, negative number to quit.
> 1
> 10
> 5
> -1
Average Score = 5.3333, best = 10
Answer:
1. is the answer
Explanation:
mark me as brainlestThese operating systems were referred to as command-based.
Android and MS-DOS
iOS and Windows
LINUX and UNIX
MS-DOS and UNIX
[tex]{\underline{\boxed{\bf{MS - DOS \: and \: UNIX}}}}[/tex]
What important role is being described?
Completes the Action Item form.
Answer:
A sponsor is a member of congress who is willing to introduce and back the legislation. Explanation:
Pls help me to answer this question ASAP
Project: Current Event: Cyber Bullying
Using the Internet, your local paper, or other resources, find a recent article on cyber bullying
(published in the last two years). Write an article review that includes:
1. a description of the article (was it a case of cyber bullying or ways to prevent cyber bulling?);
2. list five key points and describe how they apply to you and your use of social media;
3. make a suggestion of two important things that you think the article should have, but did not
cover; and
4. include the URL to the article or a copy of the article.
Sending, posting, or disseminating unfavorable, hurtful, or malicious content about someone else is considered cyberbullying. It can also involve disclosing sensitive or private information about another individual in a way that causes embarrassment or humiliation.
What are the research paper's impacts on cyberbullying?The current study contributes to the expanding corpus of research on the effects of being a victim of cyberbullying on depressive symptoms and bad thoughts in adolescents and young adults. According to our research, those who experience cyberbullying are more likely to have sadness and bad thoughts. Cyberbullying occasionally veers into illegal or criminal action.
Teenagers who experience cyberbullying report more severe bodily symptoms, anxiety, loneliness, and depression symptoms. Cyberbullying perpetrators are more likely to admit to abusing drugs, acting aggressively, and engaging in delinquent behavior.
To know more about the Cyber Bullying visit;
https://brainly.com/question/1460915
#SPJ1
What is one still image in a film or video called?
unit
frame
stand
selection
Answer:
frame
Explanation:
the answer is frame ;)
Answer:
Frame
A still frame is a single static image taken from a film or video, which are kinetic (moving) images. Still frames are also called freeze frame, video prompt, preview or misleadingly thumbnail, keyframe, poster frame, or screen shot/grab/capture/dump
Explanation:
Pls mark as brainliest
Describe how reflection can be used to achieve team improvement.
Answer:
Explanation:
Research also proves that encouraging your team to adopt a reflective process is likely to improve job performance, especially when reflection is coupled with an examination of the strategies .
Electronic payment system is a——–.
a. An informal report.
b. Not having legal sanction.
c. Always a statistical report.
d. Formal report.
[tex]\huge \mathcal \fcolorbox{cyan}{black}{ \blue{AnSweR}}[/tex]
Electronic payment system is a Formal report.Assume that two students are trying to register for a course in which there is only one open seat. What component of a database system prevents both students from being given that last seat?
Answer:
Transaction isolation
Explanation:
The student that has initiated the transaction before the other one will be given the seat. The database will be locked for the second student during the period of transaction of the first student. The transaction isolation level is a state within databases that specifies the amount of data that is visible to a statement in a transaction, specifically when the same data source is accessed by multiple transactions simultaneously.
The component of the database that prevents both students from getting the last seat is: transaction isolation
Data that enters the database are expected to maintain accuracy and also be consistent with the database structure.
So, when both students request for the last seat, the possibilities are:
Student A gets the seatStudent B gets the seatThe following is not a possibility
Both students get the seatNone of the students gets the seatThe above highlights means that, only one of the students would get the seat.
This is possible because of the concept called transaction isolation.
The transaction isolation ensures that the data requested by a user is complete and such data maintains competency.
So, when a student gets the last seat, the next student would not get the same seat (or any other seat), because a transaction has already been completed.
Read more about transaction isolation at:
https://brainly.com/question/13030145
Ctrl+Home moves the cell pointer to the cell__________MSExcel.
Answer:
key stroke
Explanation:
Ctrl+Home moves the cell pointer to the cell___key stroke_______MSExcel.
The answer will be
[tex]key \: \: \: \: stroke[/tex]
Hope it helps.
ray4918 here to help
What type of computer is IBM 1401 ?
Answer:
The IBM 1401 is a variable-word length decimal computer that was announced by IBM on October 5, 1959.
8. This machine is used for high speed, high volume printing l. Can print about 1000 papers at one point in time.
A) Scanner
B) Printer
C) Risograph
D) Photocopier
Answer:
Risographs can produce up to typically 150 pages per minute. So I'm guessing its c.
Explanation:
Technician A says that long hair should be secured to avoid entanglement. Technician B says that hairnets are NOT an effective means to secure hair. Who is correct? Select one: a. Technician A b. Technician B c. Both A and B Or d. Neither A nor B
Answer:
technician A if you use the net it still saves the hair than letting it long and exposed
Project light with a system of lenses used for projecting slides or film into a screen.
Answer:
Optical system. An overhead projector works on the same principle as a slide projector, in which a focusing lens projects light from an illuminated slide onto a projection screen where a real image is formed.
Explanation:
a paragraph about the different types of college degrees
Answer:
There are four major categories of degrees available for postsecondary students. These college degrees in order of complexity are associate, bachelor's, master's, and doctoral degrees. Earning one of these degrees can take 2-8 years, depending on the level of the degree and field of study. Graduate-level university degrees may require students to complete one or more undergraduate programs prior to enrollment. When comparing different degrees, students can consider which program best fits their career goals and academic interests. Keep in mind that all college degrees require completion of a high school diploma first.
Explanation:
_________is a type of bullying that occurs when a person continuously pursues another and gives
unwanted attention
Answer:
stalking ?
Explanation:
Answer:
stalking
Explanation:
Which of the following is an example of an output device on a smartphone?
the speaker
the microphone
the battery
the memory card
Answer:
The speaker
Explanation:
Speakers are output devices because the audio is taken from the app or website and playing it towards the speakers.
highlight and detail two ways that you can use excel to make you more efficient as a college student
MS excel is a office program and is quite commonly used in day to day business. The application is easy to use and have various advantages, as it can be used for statistical and scientific purposes.
The application can be made easy and presented in numerous ways. In order to highlight the importance of this software as a college student one can show the methods to interpret the data. Making worksheets and visualizing large amounts of data. Use of shortcuts for formula and use graphics to enhance presentations.Learn more about the detail two ways that you can use excel to make you.
brainly.com/question/24325415.
List 2 negative impacts of cybersecurity.
Answer and I will give you brainiliest
Answer:
Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.
name of the people associated with the development of computer briefly explain thier contribute
________(fill in the blank)in online education is intrinsically related to equity.
Accessibility
Communication
Professionalism
someone pls help me!!!
Answer:
I think it’s really cool. You don’t have to find someone’s Gm ail and then write a subject and whatever else. You can just send it like a message. I love how it has the call option because it means that you don’t have to have a number to call your friends or family. And you can do business em ail while messaging whoever you need to instead of going back and forth.
You can promote your business. You can also promote your video and share your screen. It is also a good way to talk to customers to discuss what you need to. A bunch of people have emails and it’s fairly simple to just add your friend and text them.
It might be hard to figure out at first. But when you get used to it it’s fairly simple. It can also shut down due to a bug and stop working, which makes it even more complicated. You can also get creeps that can hack into your Gm ail and read all of your information.
Explanation: heres a better one with no typos
PYTHON: Define a function calc_pyramid_volume() with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. calc_pyramid_volume() calls the given calc_base_area() function in the calculation.
Relevant geometry equations:
Volume = base area x height x 1/3
(Watch out for integer division).
Sample output with inputs: 4.5 2.1 3.0
Volume for 4.5, 2.1, 3.0 is: 9.45
def calc_base_area(base_length, base_width):
return base_length * base_width
''' Your solution goes here '''
length = float(input())
width = float(input())
height = float(input())
print('Volume for', length, width, height, "is:", calc_pyramid_volume(length, width, height))
I've been trying all morning but I can't seem to figure this one out. I might be overthinking it, but I haven't been able to get it to work.
Answer:
def calc_pyramid_volume(base_length,base_width,pyramid_height):
base_area=base_length*base_width
volume=base_area*pyramid_height*(1/3)
return volume
Explanation:
Here you go, fellow cs 105 student. Copy and paste it all into the box.
identifica clases de técnicas que se emplean para el desarrollo y emplean empleo de las cosas que nos rodean hechos para satisfacer la necesidad del ser humano.
AYUDA ES PARA HOYY
Y PORFAVOR EXPLÍQUENME EN ESPAÑOL
Answer:
HEY I SAID PHYSICS NOT COMPUTER STUFF
Explanation:
I CAN'T EVEN READ IT
LANGUAGE IS PYTHON PLEASE HELP.
Write a while loop that repeats while user_num ≥ 1. In each loop iteration, divide user_num by 2, then print user_num.
Sample output with input: 20
10.0
5.0
2.5
1.25
0.625
Compare Ethernet frames to other frames.
•Most frames use CRC, but Ethernet does not. •Most frames use a protocol called CSMA/CD.
•Ethernet frames generally do not have stop frames.
•Ethernet frames have more parts in their frame footers.