Answer:
provides a graphical design or representation of solution with symbols.
Explanation:
Communication models help identify and understand the components and relationship of the communication process being studied. Models represent new ideas and thought on various aspects of communication which helps us to plan for effective communication system.
Answer: D
Explanation:
Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.
Answer:
Vulnerability of.
Explanation:
In this scenario, your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a vulnerability of the network software.
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Which device listed below is NOT a storage device?
ROM
RAM
SSD
Removable FLASH drive
Naseer has inserted an image into his document but needs the image to appear on its own line.
Which option should he choose?
•Top and Bottom
•Tight
•Through
•In front of text
Answer:
Top and Bottom
Explanation:
took the test
Answer: A
Explanation:
Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a characteristic is necessary for successful completion of the job? Answer by writing a paragraph of two to three sentences.
Employing someone based on gender is unlawful because, it is the skill which matters to get the required job done and skills are not based on gender. There is no evidence that this particular gender cannot do this job and this particular gender can do. Everyone who posses the required skillsets are eligible to get employed irrespective of gender.
===============================================
I tried my best
Which of these is NOT a desktop computer operating system?
iOS
Linux
macOS
Windows
Answer:
IOS
Explanation:
IOS is used for mobile devices
IOS is not a desktop computer operating system. The correct option is A.
What is an operating system?A computer's operating system is a piece of software that enables users to run other programs on the system. Almost all programs are created to operate on an operating system in order to be independent of the hardware design and are not typically intended to communicate directly with the hardware.
The main function of an operating system are:
Control the central processing unit, memory, disk drives, and printers of a computer.Create a user interface to make human-computer interaction easier.Run software programs and offer related services.Apple Inc. conceived and developed the mobile operating system known as iOS specifically for its hardware. Many of the company's mobile devices, notably the iPhone, run on this operating system.
Therefore, IOS is a mobile operating system.
To know more about an operating system follow
https://brainly.com/question/22811693
#SPJ2
Which of the following is NOT an advantage to using inheritance?
a. Code that is shared between classes needs to be written only once.
b. Similar classes can be made to behave consistently.
c. Enhancements to a base class will automatically be applied to derived classes.
d. One big superclass can be used instead of many little classes.
Answer:
D)One big superclass can be used instead of many little classes.
Explanation:
Inheritance could be described as getting new class on another existing class with almost same execution,
inheritance allows codes to be re-used. It should be noted that inheritance bring about the code sharing among class.
The advantages of using inheritance includes but not limited to
✓ Code that is shared between classes needs to be written only once.
✓Similar classes can be made to behave consistently.
✓ Enhancements to a base class will automatically be applied to derived classes.
A major disadvantage of inheritance is that child/children classes depends on parent class, hence a change in the parent class will affect the child class, therefore option C is the correction option.
Inheritance is a type of programming concept where by a class (Child) can inheritance methods, properties of another class (Parent).
Inheritance allows us to reuse of code, one advantage of Inheritance is that the code that is already present in base class need not be rewritten in the child class.
The different types of Inheritance are:
Single Inheritance.Multiple Inheritance.Multi-Level Inheritance.Hierarchical Inheritance.Hybrid Inheritance.Learn more:
https://brainly.com/question/4560494
What is the outside of an iPhone called?
Sam card tray is the answer
What are language standards? At this point in your study of programming, what do they mean to
you?
What is the Internet address of the speech you listed to?
Answer:
To get the address of a website page, check the URL address at the top of the browser window.
Explanation:
The internet is global interconnection of multiple networks. All devices in the network must have a web address to communicate in the network. The IP version 4 and 6 are two concepts of addressing devices on the internet. The DHCP and DNS internet protocols are used to assign address and map addresses to string-like URLs respectively.
What are three ways that you can protect and care for your camera? Why is taking care of your camera important?
Answer in 1-3 sentences.
avoid dirt and sand, touching your camera lense, and any type of liquid. be careful when cleaning dirt and sand off of your camera lense, as not doing so could scratch lense.
The _____ is the size of the opening in the camera that the light passes through.
Shutter
Lens
Aperture
Sensor
Answer:
now you can give them brainlist by clicking on the crown on their answer! :)
Explanation:
Create a datafile called superheroes.dat using any text-based editor, and enter at least three records storing superheroes’ names and main superpower. Make sure that each field in the record is separated by a space.
Answer:
Open a text-based editor like Microsoft word, notepad, libraoffice, etc, type the name of the super hero on the first field and the main power on the second field. Then click on the file menu or press ctrl-s and save file as superheroes.dat.
Explanation:
The file extension 'dat' is used to hold data for programs, for easy access. The file above holds data in fields separated by a space and has multiple records.
What will be the result from running the following program? print grades print 92 print 80print total print 92+80
Answer:
Grades
92
80
Total
92 + 80
Explanation:
When utilizing quotations, you enable to code to print what wrote, as it is. So, instead of adding the 92 + 80, it's printed out.
I hope this helped!
Good luck <3
10010010 + 01100010 =
The problem above is called an _________. It means that there are more ________ than can be stored in a byte, or eight bit number.
Answer:
1. binary number or 8 bit
2. bits
Explanation:
can someone explain to me what coom means? kekw
If it is espanish it is como and it means how.
Answer:
Outside of referring to the image and meme, Coomer, often lowercased as coomer, is used online as a general insult for an overshrexed young man. The term implies such a person is a sleazy loser, obsessed with masturbatling to pronography because he can't find shrexual partners.
Choose all of the items that represent functions of the operating system kernel.
memory management
process management
user interface
system input and output (I/O) management
file creation and management
Answer:
A. memory management
B. process management
D. system input and output (I/O) management
E. file creation and management
Answer:
1,2,4,5
Explanation:
E2020 - Intro to Information Technology
Where is the video card located in a computer?
Input a double and print the first two digits after the decimal point with a space between them. Sample run: Please input a decimal number: 57.8934 Answer: 8 9 Hint - to complete the second coding activity in lesson 5 you had to learn how to get individual digits from an int value. You can reuse this method once you convert the user input to an appropriate int value (you will need both multiplication and casting for this).
Answer:
number = float(input("Please input a decimal number: "))
number = int (number * 100)
second_digit = number % 10
first_digit = int(number / 10) % 10
print("Answer: " + str(first_digit) + " " + str(second_digit))
Explanation:
Ask the user to enter a decimal number (number = 57.8934)
Multiply it by 100 (number = 5789.34) and typecast to int (number = 5789)
Use the module to get the second digit (9)
Divide the number by 10 (578.9), typecast to int (578) and use module operator to get the first digit (8)
Print the numbers as requested
The code is:
int main(){
double n;
int v, d;
scanf("%lf\n", &n);
n = n*10;
v = (int)n;
d = v%10;
printf("The first digit is %d\n", d);
n = n*10;
v = (int)n;
d = v%10;
printf("The second digit is %d\n", d);
return 0;
}
----------------------
To get each decimal digit, we multiply by 10 until the digit, then calculate the remainder of the operation(mod) of the integer part relative to 10.For example:57.8934 x 10 = 578.934
The integer part is 578.
The remainder of the division of 578 by 10 is 8.
Now, we have to generalize it, thus:
int main(){
double n;
int v, d;
scanf("%lf\n", &n); -> Reads the double;
/*First digit*/
n = n*10; -> Multiplies by 10.
v = (int)n; -> Casts the integer part
d = v%10; 0 -> Remainder relative to 10 to get the first digit.
printf("The first digit is %d\n", d);
/*Second digit -> Does the same thing*/
n = n*10; -> Multiplies by 10.
v = (int)n; -> Casts the integer part
d = v%10; 0 -> Remainder relative to 10 to get the first digit.
printf("The second digit is %d\n", d);
return 0;
}
A similar problem is given at https://brainly.com/question/18340665
PowerPoint Presentation on What type of device will she use to display her presentation and explain it to the rest of the children in her class?
Input Device
Output Device
Processing Device
Storage Device
Answer:
Output device
Explanation:
The screen/projector puts out data (in this case the presentation) for viewers.
Property Tax
Madison County collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a house is valued at $158,000, its assessed value is $94,800. This is the amount the homeowner pays tax on. At last year's tax rate of $2.64 for each $100 of assessedvalue, the annual property tax for this house would be $2502.72.
Write a program that asks the user to input the actual value of a piece of property and the current tax rate for each $100 of assessed value. The program should then calculate and report how much annual property tax the homeowner will be charged for this property.
Answer:
sorry i really dont know
Explanation:
Answer:
Here is the C++ program
====================================================
#include <iostream>
#include <iomanip>
using namespace std;
int main(){
const double ASSESS_VALUE_WEIGHT = 0.60;
double houseValue, assessedValue, taxRate, tax;
cout<<"Enter the actual value of property: ";
cin >> houseValue;
cout<<"Enter the current tax rate for every $100: ";
cin >> taxRate;
assessedValue = houseValue * ASSESS_VALUE_WEIGHT;
tax = assessedValue * taxRate / 100;
cout<<setprecision(2)<<fixed<<showpoint;
cout<<"Annual property tax: $ " << tax;
return 0;
}
Explanation:
What is the purpose of application software policies?
a. They define boundaries of what applications are permitted.
b. They use a database of signatures to identify malware.
c. They take log data and convert it into different formats.
d. They serve to help educate users on how to use software more securely
Answer:
d. They serve to help educate users on how to use software more securely.
Explanation:
A software policy can be defined as a set of formally written statements that defines how a software application or program is to be used.
The purpose of application software policies is that they serve to help educate users on how to use software more securely. It must be easy to read, learn and understand by the end users.
The purpose of application software policies is that they serve to help educate users on how to use software more securely. Thus, option D is correct.
A software policy can be defined as a set of formally written statements that defines how a software application or program is to be used.
The purpose of application software policies is that they serve to help educate users on how to use software more securely. It must be easy to read, learn and understand by the end users.
Therefore, The purpose of application software policies is that they serve to help educate users on how to use software more securely.
Learn more about software on:
https://brainly.com/question/32393976
#SPJ6
as future software developer what is the difference between
1. Are we developing the software right?
2. Are developing the right software?
Answer:
Well There are alot of different softwares so thats where "Are developing the right software?" Starts But Sometimes Its easy to mix up! Now, "Are we developing the software right?" Get the code and enter it into google docs, it will show your mistakes. Your welcome.
Verified By Al ✔️
Hulu suggestions? I just got it and I wanna know what's good :)
Answer:
I love hulu almost everything is good but I recommend Zoey's Extrordinary playlist
Explanation:
What is 10X Profit Sites?
Answer:
Wow! That's amazing!
Explanation:
Why do I have two random warnings?
Answer:
bc of katie
Explanation:
Does the submission include the file "SuperPower.java"? Does the file include a public class called "SuperPower"? Does the class include a public method called "main"? Is the "main" method static? Does the main method have a String assignment statement that uses "JOptionPane.showInputDialog"? Does the main method have a statement that uses "JOptionPane.showMessageDialog"? Does the program convert the String from "JOptionPane.showInputDialog" using the "toUpperCase" method? Does the submission include a screenshot that shows an Input dialog that asks, "What is your superpower?" Does the submission include a screenshot that shows a Message dialog stating " TO THE RESCUE!", where "" is the input converted to upper case?
Answer:
Here is the program fulfilling all the requirements given:
import javax.swing.JOptionPane;
public class SuperPower{
public static void main(String[] args) {
String power;
power = JOptionPane.showInputDialog("What is your super power?");
power = power.toUpperCase();
JOptionPane.showMessageDialog(null, power);} }
Explanation:
Does the file include a public class called "SuperPower"
See the statement:
public class SuperPower
Does the class include a public method called "main"? Is the "main" method static?
See the statement:
public static void main(String[] args)
Does the main method have a String assignment statement that uses "JOptionPane.showInputDialog"
See the statement:
power = JOptionPane.showInputDialog("What is your super power?");
Does the main method have a statement that uses "JOptionPane.showMessageDialog"?
See the statement:
JOptionPane.showMessageDialog(null, power);
Does the program convert the String from "JOptionPane.showInputDialog" using the "toUpperCase" method?
See the statement:
power = power.toUpperCase();
Does the submission include a screenshot that shows an Input dialog that asks, "What is your superpower?" Does the submission include a screenshot that shows a Message dialog stating " TO THE RESCUE!", where "" is the input converted to upper case?
See the attached screenshots
If the program does not let you enter an exclamation mark after "to the rescue" then you can alter the code as follows:
import javax.swing.JOptionPane;
public class SuperPower{
public static void main(String[] args) {
String power;
power = JOptionPane.showInputDialog("What is your super power?");
power = power.toUpperCase();
JOptionPane.showMessageDialog( null, power+"!");} } // here just add an exclamation mark which will add ! after the string stored in power
Define the P0 and P1 indicators and explain what they mean?
Answer: The headcount index (P0) is used to measures the proportion of the population which are poor.
The poverty gap index (P1) is used measure the extent to which individuals fall below the poverty line.
Explanation:
The headcount index (P0) like the name suggests is used to measure or know the proportion of a population which are poor, this does not indicate or show us how poor, the poor people in that society are.
The poverty gap index (P1) is used measure the extent to which individuals fall below the poverty line. This is used or compared to a poverty line already created. To know how far below individuals are under the poverty line system.
Which of these is an example of gathering secondary data?
searching for a chart
drafting a map
collecting soil samples
interviewing experts
Answer:
searching for a chart
Explanation:
:)
Answer:a
Explanation:
took the quiz
What is the name of a shortcut you can click to access other websites? A. A post B. A key C. HTML D. A link
Answer:
D. A link
Explanation:
I hope this helps.
Answer:
A LINK
Explanation:
I just did the test
What is the difference between an IP address and an IP Packet?
Answer:
The IP address is a numerical number assigned to a device when connected to the internet for better identification. Whereas, the IP packet is the packet which contains the total information of the content that is carried over the network from host to destination and vice versa.
Explanation:
I hope this helped and plz give brainliest!