Question #1
Dropdown
Complete the sentence.
[_____] are essentials for the hearing impaired.

Answers

Answer 1

Answer:

The answer is Transcripts

Explanation:

I just got it wrong in Edge so I know trust me dude :)

Answer 2

Cybercrime is the illegal use of the internet, computers, or other digital technologies to harm or exploit individuals.

What is Cybercrime?

Cybercrime is illegal to use of computers, the internet, and other digital technology in order to harm or take advantage of people, businesses, or governments.

In the given case, the context is missing so the answer is written in a generalized manner by describing Cybercrime.

Serious repercussions from cybercrime can include monetary loss, damage to reputation, and legal accountability. People are becoming more concerned about it, and law enforcement organizations are concentrating more on looking into and investigating cybercrime incidents.

Cybersecurity is a precautionary practice that involves instructing users and commercial organizations' end users in order to safeguard their devices from potential threats to servers, networks, software, and sensitive data.

Read more on cybersecurity here:

brainly.com/question/14286078

#SPJ7


Related Questions

what are backup storage device of computer ?​

Answers

Sd/ external hard drives
A backup storage device is used to make copies of data that is actively in use. Backup machines provide redundancy of data residing on primary storage. Should the storage medium, such as a hard disk drive (HDD), fail or become corrupted, the original data is recovered from copies on the backup hardware.

advantages and disadvantages of algorithm​

Answers

Answer:

\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\

Explanation:

It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program

Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.

What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.

Answers

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.

What type of hackers are motivated by social or political issues?

Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated  aim or reason.

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.

Learn more about Hacktivism from

https://brainly.com/question/5483494

#SPJ1

Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would mitigate the risk of future data disclosures?(A) FDE(B) TPM(C) HIDS(D) VPN

Answers

Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

What is FDE in security?

Full disk encryption (FDE) is known to be a kid of a security measures that is often taken so as to help in the protection of all data saved on a hard drive from any kind of unauthorized access through the use of disk-level encryption.

Therefore, Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

Learn more about Remote workers from

https://brainly.com/question/26512743

#SPJ1

What does Fees, Risk Assessment and Returns mean?

Answers

Answer:

The term return refers to income from a security after a defined period either in the form of interest, dividend, or market appreciation in security value. On the other hand, risk refers to uncertainty over the future to get this return. In simple words, it is a probability of getting return on security.

Explanation:

The Western Siberian Plain is __________ in some places because it has poor natural draining systems.

Answers

The Western Siberian Plain is marshy in some places because it has poor natural draining systems.

What is a Drainage system?

A Drainage system may be defined as the complete process to exhaust the water in the soil to improve crop production in an area. It eliminates the water through the surface of the earth.

The complete question is as follows:

The Western Siberian Plain is __________ in some places because it has poor natural draining systems.

subtropicalhumidmarshyarid

Therefore, the correct option for this question is C, i.e. marshy.

To learn more about the Drainage system, refer to the link:

https://brainly.com/question/908462

#SPJ1

a. What is this age called?

Answers

Answer:

The Information Age (also known as the Computer Age, Digital Age, or New Media Age) is a historical period that began in the mid-20th century, characterized by a rapid epochal shift from traditional industry established by the Industrial Revolution to an economy primarily based upon information technology.

OR

Age, epoch, era, period all refer to an extent of time.

Explanation:

can i have brainliest pls?

Why online fraud rose 79% in UK after they switched to the chip and PIN system in the first three years?

Answers

Answer:

TBH I HAVE NO FREAKING IDEA BUT I NEED POINTS BC IM DOING AN EXAM AND HAVE NO MONEY SORRY

Which VPN protocol provides encryption but does not support IP multicast traffic?

IPsec
PPTP
L2TP
SSL VPN

Answers

Answer:

this?

Explanation:

multiple choice?

Give three reasons why it is important to have hci-based software programs.

need this soon

Answers

The three reasons why it is important to have HCI-based software programs As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

What is HCI and why is it important?

The Role of Human Computer Interaction withinside the Workplace. Human Computer Interaction (HCI) and User Experience (UX) are interdisciplinary fields that draw on human-focused disciplines like psychology and sociology to layout and increase technological merchandise that meet human needs.

As its call implies, HCI includes 3 parts: the user, the pc itself, and the methods they paint together.HCI is vital on account that it'll be important for items to be extra successful, safe, helpful, and functional. It will make the users revel in extra fun withinside the lengthy term. As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

Read more about the software programs:

https://brainly.com/question/1538272

#SPJ1

HELPP!!! 50 POINTS WHOEVER GETS IT RIGHT
David has gone to the Niagara Falls with his camera. He wants to click photos of the people around him and also the distant sights. If he can have just one lens with him, which lens would it be?

David can take__ lens with him.

it ISN’T standard, normal, telephoto or wide lens i’ve already tried

Answers

Since David has gone to Niagara Falls with his camera. He wants to click photos of the people around him and also the distant sights. If he can have just one lens with him, the lens would be a zoom lens.

What is Photography?

This refers to the act and process of taking pictures with the use of a camera with the help of lenses.

This is because the telephoto lens is perfect and great for taking shots that are both distant and close and gives the best focal length and zoom as they are amazing for bringing distant scenes and subjects closer

Hence, we can see that the zoom lenses are the best as they can be manually adjusted for David for taking close pictures and distant shots too.

This helps David to take close photos and also distant sights and zoom lenses would help him do this.

Read more about zoom lenses here:

https://brainly.com/question/13874733

#SPJ1

Northern trail outfitters has the case object set to private. the support manager raised a concern the reps have a boarder view of data than expected and can see all cases on their groups dashboards. what could be causing reps to have inappropriate access to data on dashboards

Answers

The option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.

What is a Dynamic dashboards?

Dynamic dashboards is known to be a tool that helps all user to be able to view the data they are known to have access to.

Note that in the case above about Northern trail outfitters, the option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.

see options below

Northern Trail Outfitters has the Case object set to private. The support manager raised a concern that reps have a broader view of data than expected and can see all cases on their group's dashboards.

What could be causing reps to have inappropriate access to data on dashboards?

A. Public Dashboards

B. Dashboard Subscriptions

C. Dynamic Dashboards

D. Dashboard Filters

Learn more about Dashboards from

https://brainly.com/question/1147194

#SPJ1

A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.

Answers

A user view is often developed by identifying a form or report that an end user needs on a regular basis.

What is a database?

A database can be defined as an organized and structured collection of factual data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), a user view is often developed by a software developer through an identification of a form or report that an end user needs on a regular basis.

Read more on data here: brainly.com/question/13179611

#SPJ1

ANSWERS FOR PLATO!!!

What does the second element in a pair of HTML tags contain?

ANSWER: /

when would you use the code snippet <input...(randome code stuff)...> American?

ANSWER: while inserting a RADIO BUTTON

assume you are creating a website for school... yada yada,

ANSWER: <img>

Why is it preferable to code web pages in HTML format?

ANSWER: to display properly as search results in all browsers

drag tiles, somthinf about creating a web page and wich dose the html tags define


new paragraph ---> <p>

define a term ---> <dd>

define single line break ---> <br>

define heading ---> <h3>


HOPE THIS HELPS GUYS YOU GOT THIS KEEP ON KEEPING ON <3<3<3<3 #platogang #edementumegang​

Answers

The thing which the second element in a pair of HTML tags contain is "/" and is known as the Closing Tag.

What is an HTML Tag?

This refers to the keywords that are used in the building block of a website to indicate how a web browser would interpret and display the content.

Hence, we can see that in HTML tags, there are always the Opening and Closing Tags that are used to enclose lines of code and when paired together are known as container tags.

Read more about HTML elements here:

https://brainly.com/question/9069928

#SPJ1

The ________ is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. Group of answer choices world wide web Internet of Things Cloud solid state of things

Answers

Answer:

Internet of Things (IOT)

The Internet of Things (IoT) is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet.

The Internet of Things (IoT) refers to the network of physical objects or "things" embedded with sensors, software, and other technologies that enable them to connect and exchange data with other devices or systems over the Internet.

These objects can be everyday items such as household appliances, wearable devices, industrial machines, vehicles, and much more.

IoT allows these objects to collect and transmit data, interact with their environment, and even respond to certain events or conditions without requiring direct human intervention.

The data generated by IoT devices can be analyzed and utilized to make informed decisions, improve efficiency, enhance convenience, and create new services and applications.

IoT has the potential to transform various industries, including healthcare, agriculture, transportation, manufacturing, and more.

It is an essential component of the ongoing development of the Internet, as it expands the scope of connected devices beyond traditional computers and smartphones.

Hence the correct answer is: Internet of Things (IoT).

Learn more about Internet of Things click;

https://brainly.com/question/29767247

#SPJ3

What version of bluetooth is installed on the yaesu ft-5dr?.

Answers

Answer:

version 4.2

Explanation:

write an algorithm to print the first 100 odd numbers​

Answers

Answer:

ALGORITHM :

Step 1: Start

Step 2: Declare variable c of integer type

Step 3: Set c=0

Step 4: Repeat step 4.1 to 4.3 while (c<=100)

Step 4.1: if (c%2 != 0)

Step 4.2: then print c

Step 4.3 : c=c+1

Step 5: Stop

FLOWCHART:

Explanation:

Which device performs the function of determining the path that messages should take through internetworks?.

Answers

Answer:

A router

Explanation:

write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000

Answers

Using the computational language in C++ it is possible to write a code that uses the salary values ​​of the employees of a company dividing between the number of employees.

Writing the code in C++ is possible:

#include<stdio.h>

#inc1ude<conio.h>

void main()

{

int i, n, count = 0;

Long int salary[25];

clrscr();

printf(“\n Input salary of 25 persons:- ");

for(i=0;i<25;i++)

scanf("%ld", &salary[i]);

for(i=0;i<25;i++)

{

if(Salary[i]>30000 && salary[i]<40000)

count++;

}

printf("There are %d persons whose salary is in between 30000 and 40000",count);

getch();

}

See more about C++ code brainly.com/question/17544466

#SPJ1

The which command _________________. a. can only be used to search for executables b. searches for a file in all directories starting from the root c. is not a valid Linux command d. searches for a file only in directories that are in the PATH variable

Answers

Answer: D. Searches for a file only in the directories that are in the path variable

Which longstanding restaurant chain closed its last location in lake george, new york?.

Answers

It’s Howard Johnson

Drag each label to the correct location on the image.
Match each item to check for while reconciling a bank account with the document to which it relates.

Answers

The matchup are:

Balancing check register has:

Interest earned.Deposit in transit.

Balancing statement account has:

NFS FeesBank Error

What is bank reconciliation?

Bank Reconciliation is known to be a process in accounting where firms are said to match their bank statements to their various transactions that are known to be recorded in their general ledger.

A statement of account is known to be one that list all the financial transactions that took place when two or businesses make different transaction over a period of time.

Note that Balancing your checkbook is a way of verifying that the records you have matches with that of the bank's.

Learn more about bank reconciliation  from

https://brainly.com/question/15525383

#SPJ1

Choose the correct numbers in order to have the following output.

3 1
3 2
4 1
4 2

for numx in [3,
]:
for numy in [1,
]:
print (numx, numy)

Answers

Answer:

4, 2

Explanation:

for numx in [3, 4]:

   for numy in [1, 2]:

       print (numx, numy)

make sure to indent properly

The correct numbers, in order to have the following output, are 4, 2. The correct option is d.

What are the outputs of coding?

A programmer may decide to incorporate outputs to keep the user updated on what is happening inside the program. Here, the user is presented with the program's data either visually (on the screen) or physically (as printouts or signals, for example).

The communication between an information processing system, such as a computer, and the outside world, which may include a human or another information processing system, is known as input and output, or I/O. The system's inputs are the signals or data it receives, and its outputs are the signals or data it sends.

for numx in [3, 4]:

  for numy in [1, 2]:

      print (numx, numy)

Therefore, the correct option is d. 4 2.

To learn more about the outputs of coding, refer to the link:

https://brainly.com/question/28992006

#SPJ2

Define special computer​

Answers

Answer:

A computer designed from scratch to perform a specific function. Contrast with general-purpose computer. See ASIC.

Answer:

Special computer is the computer designed for a particular type of application only. It is defined as a stored program digital computer, whose architecture is oriented towards one or more applications.

True or False. It is OK for students to find answers to questions on the Internet and submit those answers during a test.

Answers

Strange question, but I would say false. FALSE

how can you use Upload Files & Folders View when designing A website.

Answers

In the process of designing a website, an end user can upload files and folders by navigating to Site Tools > Site > File Manager.

What is a website?

A website simply refers to a collective name which connotes a series of webpages that are linked together (interconnected) with the same domain name, so as to provide specific information to end users.

In Computer technology, an end user can upload files and folders when designing a website by navigating to Site Tools > Site > File Manager.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

Write an algorithim and flowchart to check it the temperature is more than 25°. If it more than 25°C switch fan on else off.​

Answers

Answer:

write the sly flowchart

Explanation:

#stdlib.etc

main()
{

    int temp;
    bool fan = false;

    print("enter the frigin temperature: ");

    read(temp);

    if (temp > 25)

     {
         fan = true;
         print("the fan is on");
     }
     else
      {

           print("the fan is off");

      }

      return 0;

}

are tigers and goldfish related

Answers

Yes, they are by law of America

Maria is developing an online gaming website. She is working on an interactive game that has a central character guiding visitors through the game. Which element of multimedia is most suitable for this type of website?

Answers

Answer:

The answer is animation. This question has been answered already.

Source:

https://brainly.com/question/12414395

What are two benefits of defining a function?

A. It can be reused in multiple spots throughout the program. B. It keeps code smaller by reducing the number of blocks. C. It allows custom functions to appear as an option for all sprites D. It decreases the computer's processing speed

Answers

The two benefits of defining a function are:

It keeps code smaller by reducing the number of blocks. It can be reused in multiple spots throughout the program.

What is this function about?

A function is defined based on the link that exist between a set of inputs having one output each.

Note that  a function is  simply a relationship that exist between inputs where each input is linked to one specific  output.

Therefore, The two benefits of defining a function are:

It keeps code smaller by reducing the number of blocks. It can be reused in multiple spots throughout the program.

Learn more about  function from

https://brainly.com/question/23897143

#SPJ1

Other Questions
Select all that apply. The Great Schism was between the: Greek Orthodox Church Greek Christian Church Roman Protestant Church Roman Catholic Church NEXT QUESTIONREAD NEXT SECTION Explain how social science perspectives could be used to process information The word guilt is a word for a feeling.O TrueO False What is the component form of the vector whose tail is the point (-3,2) and whose head is the point (1, -6)? Which option below demonstrates the correct interval notation for acontinuous set of all numbers between 5 and 6, including 5, but not including6?OA. (5,6]OB. (5,6)O C. [5, 6)OD. (5, 6} can someone help me here NONSENSE=REPORT Read the excerpt from "A Genetics of Justice by Julia Alvarez.Perhaps because she had innocently revered him, my mother was now doubly revolted by this cold-blooded monster. He became something of an obsession with herliving as she was by then in exile with my father, isolated from her family who were still living on the Island. As my sisters and I were growing up, Trujillo and his excesses figured in many of my mothers cautionary tales.Which details does the author include to support the central idea about how her mother felt about the dictator? Select three options.doubly revoltedobsessionin exileisolatedcautionary tales it takes 1 hour to travel from new york to Washington dc by air and 4 hours by train The airfare is 200 and the train fare is 85If a traveler wishes to minimize the total cost of making this trip, which mode of transportation should be selected if the travelers opportunity cost of time spent in transit is $15 per hour? Which interpretation makes the most sense for Eudoo strengthen her argument, Eudora must explain how drawing on the traditional roles that inspired the characters of Ellie and Kari affect their purpose in the plot.Misha, who is extremely shy, moves to a new school mid-year. The girls at the new school ignore Misha. Misha even suspects that Ellie and Kari are making jokes behind her back. She feels so frustrated by her situation that she decides to join several clubs, try out for cheerleader, and run for class president. She finds friends everywhere she looks as a result of putting in such a big effort.Which interpretation makes the most sense for Eudora to include in her essay? A. The characters Ellie and Kari suggest that Misha is not the only shy character. B. The characters Ellie and Kari cause Misha to doubt herself and feel frustrated. C. The characters Ellie and Kari show just how misguided some young people can be. D. The characters Ellie and Kari spur Misha to positive action by causing her frustration. Witch part of the us constitution allows for the amendment process? Which lines from Ovids "Pyramus and Thisbe" establish setting?a.)The house of Pyramus and that of Thisbestood side by side within the mighty cityb.)Theirs didindeed they wanted to be wed,but marriage was forbidden by their parentsc.)They had no confidantand so used signs:with these each lover read the other's mind:d.)Just so, one night, they wished each other well,and each delivered kisses to the wall She speaks in a strange accent.Neither I nor my sister(understand) her .( Write correct form of verb in the bracket) Find the volume of the cone . Round your answer to the nearest tenth. Use 3.14 for 8 in. 4 in. Which sentence correctly compares the two numbers 5.395 and 5.385?5395 = 5.3855.385>5.3955.395 "the new colossus," a sonnet by american poet emma lazarus , was inscribed on the bronze plaque that was mounted inside the statue of liberty to . How is childbirth an example of apositive feedback mechanism?A. The fetus of a human grows and as it growslarger the uterus of the mother grows larger.B. The release of oxytocin leads to increasedcontractions which produces more oxytocin.C. The fluid in the placenta begins to be filteredout so the baby falls lower.D. A chemical is released at fertilization thatstimulates the growth of the fetus that releasesmore. HELP ME PLEASEEEEEEE I LOVE YOU SO MUCH.....Find the mean for the set of data { 6, 12, 22, 16} Please Help I Don't Understand! Write and adjective to describe the following nouns:A skunk A Snake A Cat Please answer the following questions asap please