The employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data with end-to-end encryption.
How document be protected?
There are many ways a computer file can be protected. The ways to protect the document are,
Using the cloud based secure file sharing sites.The protected view can be used to secure the contents of the document sending to another country.When the file is end-to-end encrypted between the employee and co worker, then no one can be seen the file in between.Thus, the employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data end-to-end encryption.
Learn more about the data protection here;
https://brainly.com/question/4219149
#SPJ2
You are researching a topic online. You follow a link on a science association's website, but the webpage will not load. What is the most reasonable hypothesis for this problem
The most reasonable hypothesis for this problem is that the domain name or uniform resource locator (URL) is invalid.
What is a website?A website is a collective name for a series of webpages that are interconnected with the same domain name, so as to provide certain information to end users.
In this scenario, since the Internet is active, the most reasonable hypothesis why the webpage will not load is that the domain name or uniform resource locator (URL) is invalid.
Read more on websites here: https://brainly.com/question/26324021
#SPJ1
You are an application developer. You are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability? RIP TCP IP TFTP UDP
2
In the 1940s, computers were programmed using punch cards, or pieces of paper that had holes in them that represented binary code. Ifa
ebstake was made using this type of primitive propamming, which of the following BEST describes what would need to be done to correct the
problema
OA The entire proagam of punch cards had to be re-punched.
OB. The entire preagamn of punch cards had to be loaded again and started over,
OC The entire prensam needed to be rewritten and a different set of punch cards were used.
OD. The entire progam could be fored by adding or remoanga card for the existing stack of papers.
Reset
Nest
rights reserved
If any mistake was made using this type of primitive programming, the entire program of punch cards had to be re punched again. The correct option is A.
What is punch card?A punch card is a card on which data is able to be recorded in the form of punched holes.
Whenever a mistake is done, the punched card is scrapped and made anew one for same programming.
Thus, if any mistake was made using this type of primitive programming. The entire program of punch cards had to be re punched again. The correct option is A.
Learn more about punch card.
https://brainly.com/question/27476988
#SPJ1
how do you unblock sites on your computer
Answer:
you can't if it's a school computer you'd have to buy new parts for it
Explanation:
The FitnessGram Pacer Test is a multistage aerobic capacity test that progressively gets more difficult as it continues. The 20 meter pacer test will begin in 30 seconds. Line up at the start. The running speed starts slowly but gets faster each minute after you hear this signal *signal sound*. A sing lap should be completed every time you hear this sound. ding Remember to run in a straight line and run as long as possible. The second time you fail to complete a lap before the sound, your test is over. The test will begin on the word start. On your mark. Get ready!… Start.
Answer: you cant if your are on a school cumputer but if you are not just make a new profile with out any restrictions.
Explanation:
True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow students directly from your online course in blackboard.
Answer:
TRUEExplanation: please mark me brainliest
An administrator at cloud kicks wants to deactivate a user who has left the company. what are two reasons that would prevent a user from being deactivated
A reason that would prevent a user from being deactivated by an administrator is assigning the user in a workflow email alert.
The role of an administrator in a cloud network.In Cloud computing, an administrator has the privilege and express authority to either activate, deactivate or suspend the account of an end user that is registered on his or her Cloud services platform.
However, there are two (2) reasons that would prevent an administrator from deactivating an end user and these include the following:
The end user is located in a Cloud's Custom hierarchy field.The end user has been assigned in a workflow email alert.Read more on cloud computing here: https://brainly.com/question/19057393
#SPJ1
What words are familiar to people involved with computers? printer network, mouse and monitor screen software
The words that are familiar to people involved with computers are network, mouse and monitor screen.
What is a computer?A computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information), which could be used by an end user to perform a specific task through the use of the following:
KeyboardNetworkMonitor screenMouseIn Computer technology, we can logically infer that network, mouse and monitor screen are the words that are familiar to people involved with computers.
Read more on computer here: brainly.com/question/959479
#SPJ4
Answer:
B
Explanation:
network, mouse and monitor
Amelia wants to create a website using the Python computer language to code her site. She will also use CodeSkulptor3 to help her. CodeSkulptor3 is an example of a(n):
A.
browser-based code editor.
B.
online coding tutorial.
C.
code repository.
D.
web page hosting site.
Amelia wants to create a website using the Python computer language to code her site. She will also use CodeSkulptor3 is an example of browser-based code editor. The correct option is A.
What is python?Python is a programming language generally used to make websites and software. Automated tasks and data analysis are also carried out using python.
CodeSkulptor3 is also a browser-based Python interpreter. It has implemented a subset of Python 3.
Thus, CodeSkulptor3 is an example of browser-based code editor. The correct option is A.
Learn more about python.
https://brainly.com/question/19045688
#SPJ1
Car.py The Car.py file will contain the definition of a Car class. The Car class will hold information about the cars (make, model, year, and price). We will define the Car attributes as follows: make - string value representing the brand of the car (eg. Nissan, Tesla, Toyota, Ferrari). Your program must store this attribute in uppercase characters model - string value representing the model of the car (eg. Electra, Model3, Prius, Portofino). Your program must store this attribute in uppercase characters year - integer value representing the year of the car (eg. 2010, 2000, 1963) price - integer value representing the price value of the car (eg. 20000, 30000, 25000) You will write a constructor that allows the user to construct a Car object by passing in values for the make, model, year, and price. __init__(self, make, model, year, price) In addition to the constructor
The Car.py program is an illustration of constructors and classes in Python
Constructors are used to create the instant of objects
The program in PythonThe program written in Python is as follows:
class Car:
make = ""
model = ""
year = 0
price = 0
def __init__(self, make, model, year, price):
self.make = make.upper()
self.model = model.upper()
self.year = year
self.price = price
def display(self):
print("Make = " + str(self.make.upper()))
print("Model = " + str(self.model.upper()))
print("Year = " + str(self.year))
print("Price = " + str(self.price))
Read more about Python programs at:
https://brainly.com/question/26497128
#SPJ1
Write the text of the program in Python.
Answer:
wow its quite long ill send it to you in a couple of days
what would be the effect of an addition or a deletion of one of the bases in a codon?
Answer: When a nucleotide is wrongly inserted or deleted from a codon, the affects can be drastic. Called a frameshift mutation, an insertion or deletion can affect every codon in a particular genetic sequence by throwing the entire three by three codon structure out of whack.
Explanation:
Distinguishing elements of your data visualizations makes the content easier to see. This can help make them more accessible for audience members with visual impairments. What is a method data analysts use to distinguish elements
It is a method data analysts use to distinguish elements data visualizations may be a powerful manner to talk about complicated statistics units by presenting a visible illustration of statistics via charts.
What is Data visualizations,?Data visualizations, which include statistical charts, diagrams, and maps, are an powerful manner to represent, analyze, and discover statistics in addition to discovering and talking insights.
The number one techniques for statistical evaluation are qualitative statistics evaluation strategies and quantitative statistics evaluation strategies. These statistics evaluation strategies may be used independently or in aggregate with the alternative to assist enterprise leaders and decision-makers collect enterprise insights from exclusive statistics types.
Read more about the visualizations :
https://brainly.com/question/1822923
#SPJ1
In deviation detection, new data is compared with a set of data called (blank) data. before data mining, it is important to remove (blank) data from databases.
In deviation detection, Predictive analysis is used to know future results using past data while Descriptive analysis is used to see or find patterns in existing data.
What is deviation detection?This is known to be a Data mining work where one build a model that tells about the most vital changes in the data from previously used or normative values.
Therefore, In deviation detection, Predictive analysis is used to know future results using past data while Descriptive analysis is used to see or find patterns in existing data.
Learn more about deviation detection from
https://brainly.com/question/22257149
#SPJ1
Answer: in deviation detection, new data is compared with a set of data called training data. before data mining, it is important to remove noisy data from databases.
Explanation: plato
PLEASE HELP! ITS A COMPUTER MCQ
The character that is displayed at the end of the code for continuation.
a. :
b. ;
c. .
d. ,
Answer:
b. ;
Explanation:
PLEASE MARK ME AS BRAINLIEST
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward the computers away from the network source. Which devices should Fern employ to strengthen the signal? A. hubs B. switches C. repeaters D. gateways
Answer:
Repeaters
Explanation:
As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source. Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.
in multi-channel funnel reports, how are default conversions credited?
The Multi-Channel Funnels reports are generated from conversion paths, the sequences of interactions (i.e., clicks/referrals from channels) that led up to each conversion and transaction. In the reports, channels are credited according to the roles they play in conversions—how often they assisted and/or completed sales and conversions.
Python
write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. the input begins with an integer indicating the number of integers that follow. if the input is: 5 2 4 6 8 10 then the output is: all even if the input is: 5 1 3 5 7 9 then the output is all odd if the input is: 5 1 2 3 4 5 then the output is: not even or odd your program must define and call the following three functions. def getuservalues(). getuservalues reads in, creates, and returns the list of integers. def islisteven(mylist). islisteven returns true if all integers in the list are even and false otherwise. def islistodd(mylist). islistodd returns true if all integers in the list are odd and false otherwise.
def is_list_even(my_list):
for i in my_list:
if(i%2 != 0):
return False
return True
def is_list_odd(my_list):
for i in my_list:
if(i%2 == 0):
return False
return True
def main():
n = int(input())
lst = []
for i in range(n):
lst.append(int(input()))
if(is_list_even(lst)):
print('all even')
elif(is_list_odd(lst)):
print('all odd')
else:
print('not even or odd')
if __name__ == '__main__':
main()
True or false computers are an application of the on-off principle
Answer: True.
Explanation:
Computer circuits are binary in concept, having only two possible states. On or off. We cannot put them into a half awake half sleeping state like humans can be in. Therefore the answer is true.
6. After you add the printer, you need to install a utility software that allows the computer to communicate with the printer so that you can control print jobs. What is this software called
Answer:
Printer Driver
Explanation:
a printer driver or a print processor is a piece of software on a computer that converts the data to be printed to a format that a printer can understand.
Which sentence will be parsed by the following CFG?
s a NOUN VERB
ОА.
cats walk
ОВ.
a cat walks
Ос.
A cat walks
OD. cat walking
When you are framing the questions you will use data analytics to answer, what is the key to how you frame your questions?
When you are framing the questions you will use data analytics to answer, the key to frame the question is make it more specific to get a specific reply.
What are analytics questions?Analytical questions are the questions that are asked about the person, the questions can be asked in an interview.
Analytical questions are where you have worked?, what you think about yourself, etc.
Thus, the key to frame the question is to make it more specific to get a specific reply.
Learn more about analytics questions
https://brainly.com/question/3988337
#SPJ1
What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usage make the world better?
A world have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.
What is internet?Internet is the system uses the Internet protocol suite (TCP/IP) and interconnected computer networks that communicate between two or more individuals.
Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task is not possible without it. Even a simple task can be done using internet.
Learn more about internet.
https://brainly.com/question/13308791
#SPJ1
Display network involves (select one):_________
a. Advertisers coordinating their display ads to show up on various websites at the same time
b. Advertisers that want to pay to display their ads coordinating with websites wanting to display those ads
c. Advertisers that want to increase display ad effectiveness working with search engines on maximizing webpage placement
d. Advertisers coordinating display ad campaigns to align with other advertising efforts such as search advertising
Display network involves Advertisers that want to pay to display their ads coordinating with websites wanting to display those ads.
What is a display advertising network?This is known to be a group of websites, videos and apps where a person ads can appear and it is one that has a lot of Internet users worldwide.
Note that Display network involves Advertisers that want to pay to display their ads coordinating with websites wanting to display those ads.
Learn more about Display network from
https://brainly.com/question/2780939
#SPJ1
Which of the following indicate a problem with the laptop battery? • The laptop running slowly • Some applications will not run ● The laptop gets switched off when mains switch is off The laptop doesn't boot ●
Answer:
The correct answer would be D, (or the last one).
The option that indicate a problem with the laptop battery is the laptop gets switched off when mains switch is off.
What causes a laptop not to switch on?The main reason is that the laptop has a faulty power supply or when the battery is faulty or there is a failed hardware.
Note that The option that indicate a problem with the laptop battery is the laptop gets switched off when mains switch is off.
Learn more about laptop from
https://brainly.com/question/16045385
#SPJ2
What is the newest code language?
Answer:
Python 3
Explanation:
The language's latest iteration, Python 3.9, was released on October 5, 2020. It includes even more new features such as relaxed grammar restrictions, flexible function and variable annotations, and new string methods to remove prefixes and suffixes.
New Programming Language 1: Python 3
The language's latest iteration, Python 3.9, was released on October 5, 2020. It includes even more new features such as relaxed grammar restrictions, flexible function and variable annotations, and new string methods to remove prefixes and suffixes.
Which authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users and can be used together on the same network
The authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users are:
TACACS+RADIUSWhat is TACACS and RADIUS?RADIUS is known to be a service that is set up so as to be able authenticate and log in any person who is a remote network user.
Note that TACACS+ is used in the area of administrator access to network devices such as routers and switches.
Therefore, The authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users are:
TACACS+RADIUSLearn more about authentication service from
https://brainly.com/question/14699348
#SPJ1
Help me with this question asap please
Answer:
Parameter
Explanation:
The function's scope is truly local. The () brackets at the end execute the function -- the enclosing brackets are to disambiguate what is being executed.
Select the correct answer.
Which file size of the image is most appropriate to save an image for the web?
A.
54 KB
B.
745 KB
C.
1.1 MB
D.
2.5 MB
Answer:
The correct answer should be C, 1.1 MB : )
1. What is a blog?Explain its use.
2. List any 5 websites that provide blog service.
3. Difference between web page and website.
4. What do you mean by publishing a post?
Answer:
A blog is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order.WordPress.com – Best for Free Blogs. ...WordPress.org – Best for Self-Hosted Blogs. ...Web.com – Best for Small Business Owners. ...Wix.com – Best for Small Websites. ...Joomla.com. ...The webpage is a single document on the web using a unique URL, while a website is a collection of multiple webpages in which information on a related topic or another subject is linked together under the same domain address. Learn more about what is the difference between a website and webpage from the table below.to submit (content) online, as to a message board or blog: I published a comment on her blog post with examples from my own life. They publish a new webcomic once a month. to announce formally or officially; proclaim; promulgate.Using logic gates, design an active low chip select for the memory a 256
k memory device starting at address 48000016 in a 16 megabyte memory space
Answer:
Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.
Explanation:
Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.