Answer:
MP4
Explanation:
for jhoantm please don't answer
Answer:
its been a month, i dont think hes going to answer
Explanation:
A(n) ___________________ is a broad term that applies to a wide range of systems used to manage information security.
Answer:
Information Security Management System -
Avoid useing suggestive
The Internet is much more anonymous than the real world. People can hide their identities or even pretend to be someone they're not. This can sometimes present a real danger to children and teens who are online. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves. Therefore, it's important to teach your kids to be on their guard whenever they're online.
Teens are generally more at risk from predators. Because they are curious and want to be accepted, they may talk to a predator willingly, even if they know it's dangerous. Sometimes teens may believe they are in love with someone online, making them more likely to agree to a face-to-face meeting.
Hope it helps :)!~ (Sorry if you get it wrong or if I got it wrong-)
~The Confuzzeled homan
Which of the following could be a method for an object-oriented class called Student?
Group of answer choices
1.startCar
2.pages
3.teacher
4.printGrades
A method for an object-oriented class called Student could be: 4. printGrades.
What is a class?In object-oriented programming (OOP) language, a class can be defined as a user-defined blueprint (prototype) or template that is typically used by programmers (software developers) to create objects and define the data types, categories, and methods that should be associated with these objects.
Additionally, an object class In object-oriented programming (OOP) language represents the superclass of every other classes when a programming language such as Java is used.
In conclusion, printGrades could be a method for an object-oriented class called Student.
Read more on object-oriented class here: brainly.com/question/20264183
A feature that allows you to quickly apply the contents of one cell to another cell or range of cells selected.
O auto fill
O auto sum
O fill down
O fill right
Answer:
Auto fill
Explanation:
I took the test!
Which of the following least illustrates inequity caused by the digital divide?
Leslie’s parents put a big dry-erase board on the refrigerator and let the kids write suggestions for how to organize and assign household chores. Which step of problem solving does this situation illustrate?
A. Define the problem
B. Evaluate the solution
C. Determine possible solutions
D. State and check assumptions
Answer
determine possible solutions
Explanation:
im assuming
ty for the thanks
What tool should you use to extend network services beyond the demarc.
Punchdown tool is the tool should you use to extend network services beyond the demarc.
What is a punchdown tool?The punch down tools are known to be set of tools that one can use to stop wires into punch down patch panels and bring down keystone jacks.
Note that a tool head blade is often employed to push a wire conductor into a IDC terminal slot and as such this Punchdown tool can help you to extend network services beyond the demarc.
Learn more about network services from
https://brainly.com/question/3521925
does anyone know how to by pass this pls help?
Answer:
Yeah all you Gotta do is press download file
Explanation:
mark me brainliest!!
what is the full form of icimod?
Answer:
International Centre for Integrated Mountain Development
Explanation:
you're welcome
The TechWorld goes on a fast pace, what do you think would be the solution to the growing amount of data being collected by the software applications to have a fully sustainable usage for customers like us?
The solution to the growing amount of data in software applications to have fully sustainable usage for customers is;
Development of a sustainable model for the future now requires data storage that is engineered to be lower power requirements, lower cooling requirements, and lower waste production.Sustainable data storage and usageThe objective of Sustainable Data Storage Initiative is to spread awareness of the solutions that can reduce the environmental impact of high waste producing data centers.
The environmental impact of data infrastructure is growing as data workloads increase. Hence, building a sustainable model for the future now requires data storage that is engineered to be lower power requirements, lower cooling requirements, and lower waste production.
Read more on Sustainable data storage and usage;
https://brainly.com/question/24882256
40 points!!! Which of the following is a disadvantage of outsourcing?
A) The contracting company may not be able to preform the task.
B) Outsourcing does not allow business to focus on important tasks.
C) Outsourcing has higher costs.
D) It is harder to communicate with an outside company
Answer:
C.
Explanation:
All the other options are obtainable.
That which can be considered as a disadvantage of outsourcing is; D) It is harder to communicate with an outside company
What is Outsourcing?Outsourcing refers to the act of assigning work to contracted employees. This is a very good measure that can be used to help the business save costs and focus on more important tasks.
The money that would have been used in maintaining the staff is used to pay the outsourced company for an agreed period of time.
Usually, the contracted company is specialized in the aspect of the business for which they receive the contract.
The option that qualifies as a disadvantage of outsourcing is that it is harder to communicate with outside companies.
Linguistics with foreign organizations might not be as smooth as with employees.
Learn more about outsourcing here:
https://brainly.com/question/4456416
1. An auto repair shop charges as follows. Inspecting the vehicle costs $75. If no work needs to be done,
there is no further charge. Otherwise, the charge is $75 per hour for labour plus the cost of parts, with a
minimum charge of S120. If any work is done, there is no charge for inspecting the vehicle. Write a program
to read values for hours worked and cost of parts (cither of which could be 0) and print the charge for the job.
Answer:
charge = 0
hours_worked = int(input("Enter the hours worked: "))
cost_of_parts = float(input("Enter the cost of parts: "))
if hours_worked == 0:
charge = 75
else:
charge = 120 + (75 * hours_worked) + cost_of_parts
print("The charge is $" + str(charge))
Explanation:
*The code is in Python.
Initialize the charge as 0
Ask the user to enter the hours_worked and cost_of_parts
Check the hours_worked. If it is 0, that means there is no inspecting. Set the charge to 75
Otherwise, (That means there is an inspecting) set the charge to 120, minimum charge, + (hours_worked * 75) + cost_of_parts
Print the charge
>>> password = "sdf345"
>>> password.isalpha()
>>>
Answer:
False
Explanation:
just took this on edge. have a good one!
Answer:
The answer is False because the first number isn't capitalized.
Explanation:
Have a great day today, and be safe
Commands under menu bar in a computer
Answer:
File, Edit, and View
Explanation:
These are the standard ones that come with the software.
Question: 7 What is a Distributed Denial of Service (DDoS) attack?
A: An attempt by a government to deny Internet access to its citizens
B: An attempt to deny access to a website by flooding the website's servers with millions of requests from different computers
C: An attempt by one user to deny service to another user by posting malicious material on a social network
D: An attempt by an Internet user to access private information stored in a private database Nuesti
answer B
Answer:
B
Explanation:
your answer B is correct because it is Distributed meaning it is not just from one user or one government, but a network of computers flooding a server and denying the service offered by the server
An exception thrown from outside a try block:_________. a. will cause the program to terminate execution b. will be caught outside the catch block c. will be caught inside the catch block d. will remain inside the throw block None of these
The presentation programs' basic commands are found in ____.
Answer:
taskplane
Explanation:
Write a program that asks the student for his name and the month in which he/she was born. Students are then divided into sections, according to the following: Section A: Name starts between A - E Born between months 1 - 6 Section B: Name starts between F - L Born between months 1 - 6 Section C: Name starts between M - Q Born between months 7 - 12 Section D: Name starts between R - Z Born between months 7 - 12 Section E: All others
The program is an illustration of loops and conditional statements
What is a loop?A loop is a program statement that is used to perform repetitive operations
What is a conditional statement?A conditional statement is a statement that is used to make decisions
The main programThe program written in Python, where comments are used to explain each line is as follows:
#This creates an empty list for the sections
A = []; B = []; C = []; D = []; E = []
#This gets input for the number of students
count = int(input("Number of students: "))
#This iterates count times
for i in range(count):
#This gets the name of each student
name = input("Name: ").upper()
#This gets the birth month
month = int(input("Month: "))
#The following if conditions determine the section of the student
if name[0] in ['A','B','C','D','E'] and (month >= 1 and month <=6):
A.append(name)
elif name[0] in ['F','G','H','I','J','K','L'] and (month >= 1 and month <=6):
B.append(name)
elif name[0] in ['M','N','O','P','Q'] and (month >= 7 and month <=12):
C.append(name)
elif name[0] in ['R','S','T','U','V','W','X','Y','Z'] and (month >= 7 and month <=12):
D.append(name)
else:
E.append(name)
#This prints the students in each section
print(A,B,C,D,E)
Read more about loops and conditional statements at:
https://brainly.com/question/24833629
True or False: Data in a smart card can be erased
Answer:
I think its true but i can't explain it
Answer:
False
Explanation:
optical memory cards can store up to 4MB of data.but once the data is written it cant be changed or erased
how the changes to the engines of the aircraft have made it more aerodynamic
Explanation:
Winglets are devices mounted at the tip of the wings. Winglets are used to improve the aerodynamic efficiency of a wing by the flow around the wingtip to create additional thrust. They can improve airplane performance as much as 10% to 15%.
_____ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).
a) The motherboard
b) The control unit
c) Main memory
Answer:
A register
Explanation:
Registers are small memory used to store data or values and supply them to the processor as and when needed. These register hold the data temporarily and hold small units of program instructions. So whenever the CPU wants to work on data they have to be made available through the registers. Even after a arithmetic operation the registers serve as buckets for holding the value.
There are different types of registers such as register A, B, C etc and these registers lie in close proximity to the CPU so that we could provide the data immediately and much faster when asked by the CPU.
Therefore we can say that registers are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).
Is this statement true or false?
Electric currents flow easily through materials that are conductors and through materials that are insulators.
True
False
John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless access point with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat? Group of answer choices Evil twin Evil networking Evil attacker Evil access control
Answer:
evil attacker or evil control
The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03.
The correct word for the blank space about the given header that starts with the given hexadecimal and the given offset bytes is; XIF header
What is the computer header?The correct answer is the XIF Header also called the EXIF (Excahangeable Image File format header).
EXIF file format is the same thing as JPEG file format. The EXIF inserts some of image information data and thumbnail image to JPEG in order to achieve conformity to the JPEG specification.
Finally, this XIF header starts with hexadecimal 49 49 2A and has an offset of four bytes.
Read more about headers at; https://brainly.com/question/12435434
Which student is demonstrating the most effective time-management skills?
Answer:
Carlo sticks to a regular study schedule.
Explanation:
I did this already.
When a client PC is booted, it broadcasts a __________________________ message over the network to locate DHCP servers on the same subnet.
When a client PC is booted, it broadcasts a Dhcpdiscover message over the network to locate DHCP servers on the same subnet.
What is a Dhcpdiscover message?The Dhcpdiscover message is known too be a message that has a kind of an identifier that is specific to a client (such as the MAC address).
This message is one that also has some other requests, such as:
Requested options e.g subnet mask, domain name server, etc.Note that if client PC is booted, it shares a Dhcpdiscover message over the network to locate DHCP servers on the same subnet.
Learn more about network from
https://brainly.com/question/1167985
A storeowner rents movies to customers. How can a database help the store owner?
The database can help the store owner as it will help them to monitor the movies, customers, orders, and movie suppliers for their single movie rental store.
What is database?A database is known to be a kind of organized composition of structured information, or data, that are said to be stored electronically in a computer system.
Conclusively, An example are MySQL, SQL Server, MongoDB, etc. These modern databases are managed by DBMS.
Learn more about database from
https://brainly.com/question/518894
The telephone, invented in 1876, converted acoustic sound to electric signals. However, the audio production industry began using the electrical recording system only in 1925. Why was there a delay in using this technology in audio production? The missing piece of technology that prevented the audio production industry from using the electrical recording system earlier was a device that could the electric signal. The device that made this possible was the .
Answer:
The missing piece of technology that prevented the audio production industry from using the electrical recording system earlier was a device that could amplify the electric signal. The device that made this possible was the Audion valve
Explanation:
The telephone system in the passage is able to convert sound to electronic signals in a crude manner, without amplification. The electrical recording system, whereby a microphone converted sound into amplified electrical signals was, made possible by the invention of the electronic valve, known as the Audion triode vacuum tube by Lee De Forest in 1906. Electrical sound systems were built based on the Audion tube before transistor-based audio equipment became commercially available in the 1950s.
What will be the output of the following code?int p = 3,ch = 2;switch(ch){case 1: System. Out. Println("The square is: " + p*p);break;case 2: System. Out. Println("The cube is: " + p*p*p);break;default: System. Out. Println("No Output Value");}