HELP ASAP 50 POINTS!!!!
Are all digital footprints bad? Why?

Answers

Answer 1

Answer:

No

Explanation:

Because jobs and pretty much everyone that works on higher level ends can see those footprints. Once you leave a bad reputation, some jobs may not want you. other jobs may just not even contact you. it’s important for your future to keep a positive attitude and footprint on the internet


Related Questions

write a statement that declares a reference variable e suitable for holding a reference to an exception object

Answers

A statement that declares a reference variable e suitable for holding a reference to an exception object: Exception e;

What do Java reference types do?

Reference types in Java include classes, interfaces, arrays, enumerations, and annotations. In Java, reference types' objects and values are stored in reference variables. Null values may also be stored in reference variables. By default, reference variables will keep a null value if no object is supplied to them.

What does a JavaScript reference variable do?

A reference variable is a variable that contains an object's reference. A value of any type can be held in a variable during the execution of a programme. Reference variables are those that hold an object type; non-reference variables are those that hold primitive types (such as int, float, etc.).

To learn more about Java visit:

brainly.com/question/12974523

#SPJ4

malicious code passed in otherwise unused flag fields in the tcp header is considered to be using a covert information channel. true false

Answers

Malicious code passed in otherwise unused flag fields in the tcp header is considered to be using a covert information channel is false

How is harmful software created?

The "language" that hostile parties "speak" to control computer systems into risky activities is called malicious code. It is made by writing modifications or additions to the existing infrastructure, data, and programming of computer applications.

Therefore, Like any other sort of software, malicious code is implemented as a collection of instructions that are carried out by a computer and can be configured to produce a wide range of various effects. Malicious code can steal confidential data, prevent access to crucial information or functionality, or accomplish other things.

Learn more about Malicious code from

https://brainly.com/question/29549959
#SPJ1

i want to group the data in a query by a certain column. for example, i want a count of the movies each actor has been in. which clause would be helpful?

Answers

I want to use specific columns in a query to group the data. For instance, I'd like to know how many films each actor has appeared in. Structured Query Language is known as SQL.

What is Structured Query Language?

The instructions needed to interface with a database in order to carry out operations, functions, and queries on data are known as SQL commands. The database can be searched using SQL commands, and they can also be used to create, add data to, change, and drop tables, among other things. To choose words with specific values at the word's end We can utilise pattern matching in SQL.

Users can look for specific patterns in the data using a pattern matching algorithm. In SQL, the LIKE operator is used to do that. To match a pattern, the query employs wildcard characters.

To learn more about Structured Query Language from given link

brainly.com/question/29636807

#SPJ4

Data ___________ means all applications are able to access the same data, which is ___________ by databases.

Answers

Answer:

independence; maximized

When you sign up for phone, tv, or internet service, the provider is likely to check your credit report. Why would they do this even though you’re not borrowing money from them?.

Answers

Answer:

If you are paying for it they are gonna make sure your gonna pay them monthly or weekly that's why they check your credit report

Explanation:

Hope this helps :)

Games only recently became a part of human life—in about 1100 CE. A. True B. False

Answers

Modern video games are built on the foundation of historical ideas and concepts that date back thousands of years.

What Games only recently became a part of human life?

In the course of human history, only recently—around 1100 AD—have games become a part of daily life. It can be mental, emotional, or even physical when we relate to a story.

This game was created by the Assyrians more than 5000 years ago. It was a board game where players moved pieces around a board that represented a course. This game has been preserved at a London museum.

Therefore, it is false that games only recently became a part of human life—in about 1100 CE.

Learn more about games here:

https://brainly.com/question/3863314

#SPJ1

How can you stop a slide show?

Press the right arrow
Press escape
Press left arrow
Press delete

Answers

You press escape to stop a slide show.

What term means users cannot change or update the data in data warehouses or data marts?
a. integrated
b. nonvolatile
c. consistent
d. relational

Answers

Answer:

b. nonvolatile

what should be the value of integer tolerance in order to find the guaranteed optimal integer solution?

Answers

In order to locate the assured optimal integer solution, the value of Integer limitation is set to "0."

Define  integers :

An integer, pronounced "IN-tuh-jer," is a whole amount that can also be great, negative, or zero and is not a fraction. Examples such integers include -5, 1, 5, 8, 97, and 3,043. 1.43, 1 3/4, 3.14, and other numbers that do not constitute integers are some examples.

Is the number 10 an integer?

Any positive or a negative number without fractions or decimal places is known as an integer, often known as a "flat number" or "whole number." For instance, the numbers 3, -10, and 1,025 all seem to be integers, while the numbers 2.76, 1.5, and 3 12 are not.

Briefing :

The default tolerance for relative optimality is 0.0001. The final integer answer is ensured to be in 0.01% of the ideal value at this tolerance.

To know more about Integer visit :

https://brainly.com/question/28454591

#SPJ4

_____ is the name of an approach to building applications and services specifically for a cloud computing environment.

Answers

Answer:nat

Explanation:

What action will help make a social media campaign successful? (5 points) Group of answer choices Avoid challenging the audience Create a big goal Avoid using personal stories Show others how to get involved

Answers

You need interesting content if you want to succeed on social media. More clients are drawn to visual content these days than to notes or paragraphs regarding your goods or services.

What social media campaign successful?

Creating engaging content with a message that appeals to your target audience is essential to the success of your media strategy. For the social media sites you'll be using, and for your target, your material should be customized.

Therefore, As an illustration, you can see that I also share visual information on social media platforms, and it is really effective.

Learn more about social media here:

https://brainly.com/question/27588046

#SPJ1

which permission does a user need to set security permissions for a folder that exists on an ntfs partition?

Answers

If a folder exists on an NTFS partition, the permission which a user need to set security permissions on the folder is: 2) full control.

what is a folder?

A folder is a document that is often used to store and organize a file on a computer system, according to computer technology.

NTFS: What is it?

The term "NTFS" stands for "new technology file system," and it is one of the file systems that Windows 10 computer systems advocate using on a local hard disk because it provides a high level of security by restricting unauthorized access to data based on a set of permissions.

To sum up, an end user would require full control access in order to be given the ability to set security permissions on a folder that already exists on an NTFS disc.

your question is incomplete, but most probably the full question was

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

1)read

2)full control

3)execute

4)write

Find out more about NTFS here: brainly.com/question/12212187

#SPJ4

when the cli is used to configure an isr for a site-to-site vpn connection, what is the purpose of the crypto map command in interface configuration mode?

Answers

The crypto map command in interface configuration mode is to apply the specified VPN security policies to the interface.

What is VPN?

A virtual private network (VPN) is a type of private network that uses a public network, such as the internet, to connect remote sites or users together. VPNs are designed to provide secure, encrypted connections for transmitting data between networks or devices.

This allows users to access remote network resources, such as files or applications, as if they were directly connected to the private network, even when they are physically located outside of the network.

VPNs are often used by businesses or organizations to enable remote employees to securely access the company's internal network and resources, or to connect multiple geographically-separated locations together over a single, secure network.

VPNs can also be used by individuals to protect their internet traffic and increase their online privacy and security.

To Know More About VPN, Check Out

https://brainly.com/question/29432190

#SPJ1

What game is an ancestor to chess?

A.
Chaturanga
B.
Mancala
C.
Othello
D.
The Royal Game of Ur

Answers

Answer:

a. chaturanga

Explanation:

it is...

pls mark brainliest

Answer:

A. Chaturanga

Explanation:

Chaturanga is an ancestor to chess. Chaturanga is an ancient Indian game that is considered to be the ancestor of modern chess. It is believed to have originated in the 7th century and was played by the ruling classes of the Indian subcontinent.

In contrast, Mancala, Othello, and The Royal Game of Ur are not ancestors to chess. Mancala is a group of ancient African board games that involve moving and capturing stones or seeds. Othello is a modern board game that involves placing discs on a board to capture the opponent's pieces. The Royal Game of Ur is an ancient Mesopotamian board game that involves moving pieces along a board. These games are not related to chess and are not its ancestors.

Write a program that accept a whole number a input, mutiplie that number by 21, and then output the product

Answers

Answer:

while True:

   try:

       whole_number = int(input("Enter a whole number: "))

       break

   except ValueError:

       print("That is not a whole number. Try again.")

product = whole_number * 21

print("The product is", product)

Explanation:

using while true and except ValueError to make sure the user enters a whole number

A manager is using the organization’s erp software to generate a report that links its human resources data to its overall financial performance. What is one type of hr data that the erp accounting module could factor into this report?.

Answers

It is to be noted that if a manager is using the organization’s ERP software to generate a report that links its human resources data to its overall financial performance. The one type of HR data that the ERP accounting module could factor into this report is: "Employees' Reason for Leaving"

What is the relationship between Employees Leaving and the company's financial performance?

According to research, firms with high employee engagement outperform in customer satisfaction, productivity, operational efficiency, and profitability, with the added benefit of safer, healthier employees with decreased absenteeism and attrition.

Employees that are overworked face significant levels of stress, which reduces their efficacy and production. Poor financial performance are closely tied to low productivity. As a result, staff turnover is frequently linked to poor financial performance.

Learn more about ERP Software:
https://brainly.com/question/15504006
#SPJ1

Select the correct answer. Improving the way you communicate to others by your actions, is to improve which area of effective communication? A. Your speaking skills B. Your listening skills C. Your body language D. None of the above - your actions do not matter when communicating

Answers

It can be inferred that improving the way you communicate with others, through your actions, is improving your body language. The correct option is C.

What is communication?

Communication is generally understood as the transmission of information. In this context, a message is transmitted from a sender to a receiver through a medium such as sound, paper, body movements, or electricity.

To communicate successfully, it's important to understand your body language. It is also beneficial to understand the differences in communication styles for face-to-face encounters, phone conversations, and digital communications such as email and social media. Through your body language, the other person can know if you don't want to take to them.

In conclusion, the correct option is C.

Learn more about communication at:

https://brainly.com/question/12141060

#SPJ1

Write a program that prints the following pattern. You must use a loop to do this and you may not output the pattern manually using print statements. You should use at max 2 print statements. write code for python

Answers

Answer:

there a two loops,

1. for loop

2. while loop

using a for loop

for i in range(6):

   print("* " * i)

for i in range(4, 0, -1):

   print("* " * i)

using a while loop

i = 0

while i < 6:

   print("* " * i)

   i += 1

while i > 0:

   print("* " * i)

   i -= 1

hope this helps!

what is source code? group of answer choices any proprietary software licensed under exclusive legal right of the copyright holder. any software whose source code is made available free for any third party to review and modify. contains instructions written by a programmer specifying the actions to be performed by computer software. consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate.

Answers

It is to be noted that a source code is "any proprietary software licensed under the exclusive legal right of the copyright holder." (Option A)

Why is source code important?

Source code meets the requirements of businesses that have procedures in place that they want to keep independent of the program deployed. Some businesses view source code as a means to ensure that the software evolves as their business's demands change in the future.

There are several forms of source code. Proprietary software is software that is licensed under the copyright holder's exclusive legal right, and the source code for this sort of software is often not made available to the public. Open-source software, on the other hand, is software whose source code is made freely available for any third party to inspect and alter.

Learn more about Source Code:
https://brainly.com/question/14879540
#SPJ1

your ip address is 192.168.8.34, and your subnet mask is 255.255.0.0. what part of the subnet mask represents the subnet id?

Answers

The part of the subnet mask that represents the subnet id is the last two octets of the subnet mask, 0.0. The correct option is C.

What is a subnet mask?

An IP address is divided into network bits, which identify the network, and host bits, which identify the host device connected to that network, by a subnet mask, which is a 32-bit address.

Each octet in the IP address is distinguished by a 32-bit number. For instance, 255.255.0.0 is a typical Class B subnet mask because the first two bytes (network) and the last two bytes (zeros) are all ones.

Therefore, the correct option is C. The last two octets of the subnet mask, 0.0.

To learn more about subnet masks, refer to the link:

https://brainly.com/question/29507889

#SPJ1

The question is incomplete. Your most probably complete question is given below:

The first two octets of the subnet mask, 255.255

192.168.0.254

The last two octets of the subnet mask, 0.0

255.255.0.1

Implement a sorting algorithm and sort the vocab list (found below) by the length of the strings. For this question, sort the list directly: do not define a sort function or a swap function. Print the vocab list before and after it is sorted.

Note 1: Only swap the elements at index a and index b if the string at index a is a greater length than the string at index b.

Note 2: You should implement a sorting algorithm similar to the one from the lessons.

vocab = ["Libraries", "Bandwidth", "Hierarchy", "Software", "Firewall", "Cybersecurity","Phishing", "Logic", "Productivity"]

Expected Output
['Libraries', 'Bandwidth', 'Hierarchy', 'Software', 'Firewall', 'Cybersecurity', 'Phishing', 'Logic', 'Productivity']
['Logic', 'Software', 'Firewall', 'Phishing', 'Hierarchy', 'Bandwidth', 'Libraries', 'Productivity', 'Cybersecurity']

HELP (This is Project Stem, aka edhesive 2022 edition, send help)

Answers

Using the knowledge in computational language in python it is possible to write a code that Implement a sorting algorithm and sort the vocab list (found below) by the length of the strings.

Writting the code:

def bubble_sort(ls):

   swapped = True

   while swapped:

       swapped = False

       for i in range(len(ls) - 1):

           if ls[i] > ls[i + 1]:

               # Swap the elements

               ls[i], ls[i + 1] = ls[i + 1], ls[i]

               swapped = True

   return ls

def nest(ls):

   ls2 = {}

   res = []

   for i in ls:

       if i in ls2:

           ls2[i] += 1

       else:

           ls2[i] = 1

   i = 0

   while i<len(ls):

       res.append([ls[i]]*ls2[ls[i]])

       i+=ls2[ls[i]]

   return res

print(nest(bubble_sort(['apple', 'grape', 'orange', 'orange', 'apple', 'grape', 'apple'])))

See more about python at brainly.com/question/18502436

#SPJ1

Write a loop that inputs words until the user enters DONE. After each input, the program should number each entry and print in this format:

#1: You entered _____
When DONE is entered, the total number of words entered should be printed in this format:

A total of __ words were entered.

Answers

Answer:

word = input("Please enter the next word: ")

   count = 0

   while word != "DONE":

       count += 1

       print("#{}: You entered the word {}".format(count, word))

       print("A total of {} words were entered.".format(count))

       word = input("Please enter the next word: ")

   print("A total of {} words were entered.".format(count))

fix the code below so it does not leave the loop too early. try the codelens button to see what is going on. when should you return true or false?

Answers

You can use CodeLens to keep working while investigating what went wrong with your code without leaving the editor. Code references, code modifications, connected bugs, work items, code reviews, and unit tests can all be found here.

What codelens button to see what is going on?

In Navigation History lists in Visual Studio Code, we can view the history of files that have been traversed. By just hitting Ctrl + Tab, you can get this window from the “Goto-> Navigation History” menu. This will provide a list of all files that have been previously visited in Visual Studio Code.

With the aid of a special visualization tool, you can also run Python code in addition to active code. You can direct a program's step-by-step execution with the codelens tool.

Therefore, Additionally, it enables you to view all variable values as they are generated and changed.

Learn more about codelens here:

https://brainly.com/question/29918362

#SPJ1

what is the likely error messages that will appear if the bios/uefi cannot find a windows boot manager or cannot turn over operations to the boot manager?

Answers

If the BIOS/UEFI is unable to locate a Windows Boot Manager or transfer control to the boot manager, the Invalid partition table error message is likely to appear.

When it states that BIOS/UEFI is not detected, what does that mean?

These and other similar alerts show that your operating system's startup files cannot be found by the motherboard's BIOS or UEFI firmware chip.

What causes a computer to maybe not boot into the BIOS?

The following are some rationales that might apply: In the boot order (BIOS/UEFI), a media-containment drive that isn't bootable is listed first. The system drive of the machine is incorrectly identified in the BIOS or UEFI. Internal hard drive to motherboard data or power cables are faulty or loose (hardware).

To learn more about booting visit:

brainly.com/question/14356249

#SPJ4

what type of signature is created when a person signs his or her name on a pen pad and the signature is automatically converted and affixed to a computer document?

Answers

A digital signature is created when a person signs his or her name on a pen pad and the signature is automatically converted and affixed to a computer document.

What is a document?

Generally speaking, a document is a permanent record of information that a user may access at a later time. In a document storage system, a full document or specific sections of it can be regarded as distinct data elements. Here are some typical illustrations of documents: letters.

Which four types of documents are there?

Tutorials with a learning focus are one of the four categories of documentation.

how-to manuals with a purpose.

conversations that focus on understanding.

informational sources of reference.

To know more about the document visit:

https://brainly.com/question/20696445

#SPJ4

The process of buying and selling products and services through computer networks is called _____.
the global village
social networking
the World Wide Web
e-commerce

Answers

Answer:

The process of buying and selling products and services through computer networks is called e-commerce.

Explanation:

E-commerce means electronic commerance is used for buying or selling products through computer networks

which it profession prepares, plans, and implements web-based software applications?

Answers

A web developer is an IT professional who prepares, plans, and implements web-based software and applications.

Web-based applications and software refer to any computer programs that are accessed over a network connection using HTTP or Hyper Text Transfer Protocol, rather than existing within the memory of a device. Web-based applications mostly run inside a web browser. A Web developer is a type of programmer who specializes in the development of web-based applications. A Web developer designs web-based applications using associated programming languages such as  C#, HTML/CSS, Ruby, and PHP to name a few.

You can learn more about web developer at

https://brainly.com/question/25941596

#SPJ4

If the variable x has the original value of 3.4, what is the value in x after the following?
cout << static_cast < int > (x);

Answers

Answer:

3

Explanation:

In the capgemini iot industry 4. 0 case, what dimension focuses on the way that smart products are equipped with computing power that enables autonomous decision-making and self-learning processes based on algorithms?.

Answers

Intelligent dimension focuses on the way that smart products are equipped with computing power that enables autonomous decision-making and self-learning processes based on algorithms.

What is self-learning process?

Self-Learning Systems or Artificial intelligence are pieces of software that use machine learning techniques to enable computers to learn from and make decisions based on data without the need for explicit programming instructions.

The ability for a system to learn based on experience, make inferences from disparate signals, and then take action in response to new or unexpected events is the fundamental building block of self-learning systems. Self-Learning Systems must be able to constantly evolve, develop, and learn in order to adapt to a dynamically changing environment.

Creating self-learning systems necessitates the application of a wide range of techniques from machine learning to evolutionary computation, image processing, audio/video processing, and so on.

Learn more about Artificial intelligence

https://brainly.com/question/25523571

#SPJ1

_____ support local control, whereas ____ support central control.
a. data marts ; data warehouses
b. data warehouses; data marts
c. data warehouse; data dictionaries
d. data marts; data dictionaries

Answers

Answer:

a. data mart; data warehouse

Other Questions
SAMPLE Reviews must include a thoughtful examination of the events and/or characters in the film from a psychological perspective,THE PRINCE OF TIDES? PLEASE HELP!!!! Which graph is linear? Why did the expansion of voting rights in the early 1800s benefit AndrewJackson?OA. Jackson was popular among women and ethnic minorities.O B. Jackson opposed the unpopular institution of slavery.O C. Jackson drew most of his support from poor voters.D. Jackson refused to offer political favors to his supporters. how has Wyoming and the organisms that live there changedthe answer is: Wyoming was once covered with water so many sea creatures lived there now land animals and plants live there.have a good day :D "Use the formula A=P(1+r/n)t to solve the compound interest problemFind how long it takes for $ 900 to double if it is invested at 6 % interest compounded monthly.The money will double in value in approximately years." The particle accelerator with a circular path that smashes together particles to make new atoms and particles is called aQuestion 28 options:synchrotron.mass spectrometer.cyclotron.linear particle accelerator. two dry cleaners are considering what special offer to do this week. their payoff's in the form of profits are given in the game matrix below. pls help me, i need this done very soon. the nurse is working as charge on a medical-surgical unit and is working with a graduate nurse who has been on orientation for the past 4 weeks. which client should the charge nurse assign to the new nurse? Find the constant of variation and the missing value when y varies directly with x.If y = 35 when x = 7, find x when y = 49. student added 2 ml 2 ml of 0.1 m c a c l 2 0.1 m cacl2 to 2 ml 2 ml of 0.1 m n a 2 c o 3 0.1 m na2co3 in a test tube. he observed a white precipitate form. which of the following is the identity of the precipitate? while towns and cities were centers of trade and industry in northern colonies, which locations in southern colonies were the primary areas of economic activity? The base of parallelogarm is 13 yards and the height is 10 yards what is the area reuben's coffee shop makes a blend that is a mixture of two types of coffee. type a coffee costs reuben $4.10 per pound, and type b coffee costs $5.35 per pound. this month's blend used four times as many pounds of type b coffee as type a, for a total cost of $586.50. how many pounds of type a coffee were used? numberofpoundsoftypeacoffee: Help I do not understand this problem. 1/5 of this number is 2/5 What are some of the disadvantages of electron microscopy?Explain Which option would complete the statement?for row in range(0,3): line = ""; for col in range(0,5): line += "*"; print(line);A. outer loopB. inner loopC. while loopD. Reverse loop (not real im pretty sure) can someone answer this How did Bob became the heads in the story leader Black cowboys wild horses my college is the name of the central piedmont system that is the main point of access for online registration, financial aid resources, looking up your gpa, reviewing your class schedule and planning your degree.