Answer:
Here are some steps you can take to make sure your network is secure:
Take physical precautions. ...
Make sure all of your server's security features are enabled. ...
Use both hardware and software firewalls. ...
Install the latest version of your server's software. ...
Guard passwords. ...
Be Wi-Fi savvy.
Explanation:
PLEASE MARK ME AS BRAINLIEST
2) What are two reasons we analyze algorithms?
a) make decisions about what algorithms to use
b) ease of coding
c) sorting data
d) predict performance
Answer:
Make decisions about what algorithms to use
Explanation:
Andrew likes to purchase his school supplies online. What are two advantages of doing so?

A.
It is possible for his information to be accessed or stolen by a third party.

B.
All his personal information is sent digitally and does not change when transmitted.

C.
Because the information is sent digitally, there are an infinite number of different signals possible.

D.
Because the information is sent quickly, he can receive his order more quickly.
Answer:
bd
Explanation:
Answer:
The answer is B.All his personal information is sent digitally and does not change when transmitted. And D.Because the information is sent quickly, he can receive his order more quickly.
Explanation:
I took AP EX quiz.
write an article for publication on why every student should be computer literate
Answer:bankrupt
Explanation: no money on your card lol i hope you haveing a great day and i want you to know that you got this babe like is life is good then great but if not then it will get better beause you will make it get better
Please help I’m not trying to fail
Answer:
a
Explanation:
how was banking in the 1950s
Answer:
Diners Club launches the national charge card industry. Previous credit cards had been limited in use to one retail establishment or chain. 1950: Wider Acceptance
Explanation:
Complete the statement below using the correct term.
One problem with _____
is that often many copies of the same document are made.
Help please not trying to fail
Answer:
B. Everywhere CFCI is not
Site specific situation wherein you have to write “Shortage Notations?
Answer:
Shortage Notations and the situation where you have to write down the Shortage Notations is explained below in complete detail with the situation.
Explanation:
Shortage Notations: If a portion of the shipment is missing, record the number of items shipped on the delivery slip and circle it. Then record down the number of articles missing and remark them as "short." The acquiring person is accountable for demanding the carrier to investigate the damaged goods and packaging.
It should be noted that a shortage notation occurs when the products delivered on a ship are incomplete when the ship gets to its destination.
It should be noted that shortage notation simply means when a portion of a shipment is missing, then an individual should record rte number of the items that are shipped on the delivery slip and then circle it.
Then, in such a situation, the owner of the good can then file a shortage claim later. This happens when the packaging isn't intact.
Learn more about shipping on:
https://brainly.com/question/758860
1. lesa __________
2. didalna _______________
3 .rpeyr etlyr _____________
4. etrpoy _____________
5. rkyo ewn _____________
6. amya loagneu _____________
7. zfeorn___________________
8. msal etopry ________________
9. reyve nda gsni filt ________________________
10. tehreat lopoal ______________________
11. getas htgfir _______________
12. telsa __________________
13. diovc _____________
14. engilaenri _____________
15. atsfdofo ____________
16. rgwo pu i nhew ____________
17. tbulatyir lipcoe _______________
18. smjniae ncpiesrs __________________
19. migna ______________
20. dnaniai rgya
Which of the following are advantages of automatic updates?
Answer:
I think maybe b or d
Explanation:
Answer:
It's A, B, and D
Explanation:
A vending machine that serves coffee pours a varying
why is it important to make sure link is from a trusted source?
Answer:
So to make sure itś true not false
Explanation:
Answer:
so you know that the information is trusted and correct. Take Wikipedia as a example people can edit any passages thingy's. Or it can cause you to have viruses and stuff
Explanation:
hope this help !!:):
Every finger has a key it should be resting on when you are not typing
1. False
2. True
Answer:
true.
Explanation:
your point fingers should always be
your left should rest on F
your right should rest on J
Call your function from Example 1 three times with different kinds of arguments: a value, a variable, and an expression. Identify which kind of argument is which.
Answer:
Example 1:
def function(num):
print(num*2)
Example 2:
function(5)
num = 2
function(num)
function(3-1)
Explanation:
Given:
See attachment for complete question
To start with Example (1)
def function(num):
print(num*2)
Note that; the above code segment which doubles the parameter, num could have been any other code
In Example (1), the parameter is num
For example (2):
We can call the function using:
#1. A value:
function(5)
In #1, the argument is 5; a value
#2. A Variable
num = 2
function(num)
In #2, the argument is num; a variable
#3. An Expression
function(3-1)
In #3, the argument is 3-1; an expression
if i want a word to be keyed in all capital letters, which is the correct proofreader's mark?
Why should you delete files from your computer?
so that you will have less work to do
because only one hundred files can be saved in a directory
to increase the computer's efficiency
to improve your productivity
to increase the computer's efficiency
Explanation
The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.
hope it helps!
Answer:
To increase the computer's efficiency.
Explanation:
Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.
I hope this helps :)
You are 18 years old and need to write an email for the first time to a woman in her 40s( you can tell her age based on when she graduated college via he LinkedIn profile). How do you address her in the email? A. (First name) B. Hi(First name), C. Hi Ms.(Last name), D. Hi Mrs.(Last name) E. None of the above
Word processing software is used primarily by schools rather than businesses.
True or false
Answer:
False.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.
Generally, the Microsoft Word software is used by various businesses for processing and formatting text-based documents.
In Microsoft Word, formatting refers to the appearance of texts in a document.
Formatting a text involves performing tasks such as, bold, underline, italics, font-size, font-types, color etc. The commands to perform the above tasks are mainly found in the format menu of the Home tab.
Formatting a document is important and necessary because it makes the word document clear and easy to read.
Hence, Word processing software such as Microsoft Word, Notepad, etc., is used primarily by businesses rather than schools because most businesses deal with the creation and transfer of documents from one department to another or to other businesses.
This ultimately implies that, business firms or organizations are more inclined to use Word processing software to create paper documents for the day-to-day business activities they conduct unlike a school who rarely does.
why is it important to make sure link is from a trusted source? can't we just click and if it's not what we want or
through it would be just go back?
Answer:
First... you don't want to have to click on a million different sites
Second.... some sites have viruses, and they activated when you click on a certain source.
Explanation:
Hava great day!
Answer:
They say that it has to be from a trusted source because, you will be needing the correct and trustworthy information. Like take wikipedia for example anyone can go on there and change the information to something fake and then you have fake info in what you are writing.
Explanation:
What does perseverance mean?
A. an interest in discovering the unknown
B. helping someone recover from an injury
C. a willingness to keep trying
D. an ability to communicate with others
Select the correct answer.
Which output returns the Boolean value FALSE?
A.3
B.2
C.1
D.0
Answer:
your answer would be D.0
Explanation:
1. Is the function void or return
a. void
b. return
2. What is the result of the following expression: int r = 3; r%2 == 0;
a. it evaluates as true
b. it evaluates as false
c. nothing happens
Answer:
(a) void
(b) Nothing happens
Explanation:
Solving (a): void and return
A function that returns no value is referred to as a void function.
On the other hand, a void can not be return or named return.
So, the function is void
Solving (b):
r = 3
Required
The result of r%2 == 0
Substitute 3 for r in r%2 == 0
3%2 == 0
3%2 is 1.
So, we have:
1 == 0
Hence, the equivalent of r%2 == 0 is 1 == 0.
However, nothing will happen because there is no instruction attached to the statement (i.e. r%2 == 0;)
Ok for whoever answers this, Ill wager 20 points...
Consider the following procedures.
PROCEDURE math (ans1, ans2)
{
a ← INPUT()
b ← INPUT()
c ← math2(a, b)
e ← a + ans1
f ← b + ans2
g ← math2(e, f)
h ← c + g
DISPLAY(h)
}
PROCEDURE math2 (res1, res2)
{
d ← res1 + res2
RETURN(d)
}
What is displayed as a result of executing the following program, if when prompted, the user enters a = 3 and b = 4?
math(1, 2)
Answer:
The display will be 17.
Explanation:
Tracing through the program:
At first, math is called and sent 1 and 2 - so 1 is stored to ans1 and 2 is stored to ans2.
If the user inputs 3 for a and 4 for b, the program then calls function math2 and passed values of 3 and 4.
So now inside of math2, 3 is stored to res1 and 4 is stored to res3. Inside of this function, res1 and res2 are added together - so then 7 is stored to d and then returned back to the original function.
So now 7 was stored back to the variable c. Then a and ans1 are added together (3 + 1 = 4) and b and ans2 are added together (4 + 2 = 6). Each of these values are stored back to e and f.
Then those values, e and f (4 and 6) are again sent to math2, which simply adds the values together and returns it back to the function. So 10 is sent back to math and stored to the value of g.
Then c (7) and g (10) are added together and displayed.
Which of the following file formats allows you to share and save documents without a designated application? Ο
Α. HTM
B. PDF
C. JPG
D. MP3
Answer:
B. PDF
Explanation:
For online fax service, fax documents are usually in PDF, TIFF or plain text formats.
Answer: PDF
Explanation:
a p e x
What are three primary reasons for asking others to review and comment on a presentation?
O to document feedback, edit images, or share credit for the presentation
O to review content for accuracy, suggest improvements, or document feedback
O to suggest improvements, maintain record keeping, or review images for accuracy
O to maintain record keeping, share credit for the presentation, or suggest improvements
Answer:
to review content for accuracy, suggest improvements, or document feedback
Explanation: answer is b
The first photo in the collage is what I should make a copy of, anyone has any knowledge on how to add the numbers apart of the spreadsheet and the letters?
Explain the difference between undecidable problems and unreasonable time algorithms. Be specific.
One for which no algorithm can ever be written to find the solution is an unsolvable problem. An undecidable problem is one for which no algorithm can ever be written that will always provide any input value with a correct true/false option.
An insoluble issue is one for which there is no algorithm that can ever be constructed to locate the solution. Undecidable problems are those for which there is no method that will ever be developed that can consistently return a true/false answer for any input value.
What is time algorithms?If the value of an algorithm is constrained by a value that is independent of the amount of the input, the algorithm is said to be constant time sometimes written as time. For instance, accessing any individual element in an array requires a constant amount of time because just one operation is required to find it.
We employ a technique known as "Big O notation" to describe how time-consuming a method is. We employ a language called the Big O notation to express how time-consuming an algorithm is.
Therefore, we would argue that the insertion sort's best-case time complexity is O. (n). Linear complexity is another name for O(n) complexity.
Thus, An insoluble issue is one for which there is no algorithm.
For more information about time algorithms, click here:
https://brainly.com/question/14635830
#SPJ6
7. Peter is a tennis player. Suggest one advantage and one disadvantage of him using a
T-shirt made from polyamide to play tennislin. (2)
In your opinion which of the following is the most convenient way to create a bootable USB flash drive? Why?
Answer:
here
Explanation:
Plug the USB drive into your computer’s USB port.
Search for the “cmd” application in the Windows start menu, right-click on the item, and select “Run as administrator” from the context menu. This opens a small window with white text on a black background.
Type the command “diskpart” and confirm your input with the enter key (you’ll also do this after every other entered command). This starts the storage device manager.
Enter the command “list disk” to display all available storage devices.
You can recognize your USB by its storage capacity, and it’s usually listed as “disk 1”. In the system partition, “disk 0” is usually your PC, so a hard drive or solid state drive in your computer.
Based on the assumption that your USB has the label “disk 1”, enter the command “sel disk 1” to select it (or the corresponding “disk 2”, etc.).
Enter then command “clean” to delete all files from the USB.
Enter the command “create partition primary” to create a main partition.
Enter the command “list par” and select the newly created main partition with “sel par 1”.
Activate the partition with the command “active”.
Format the USB with the command “format fs=FAT32 label=“WINDOWSUSB” quick override” (in place of “WINDOWS USB” you can also choose another label, so long as it doesn’t contain any spaces or special characters. The drive will later be displayed under this name if you plug into a running Windows computer). Formatting may take a while. You can track its progress in the percentage bar.
As soon as the process is finished, enter the command “assign” to automatically assign a drive letter (for example “G:”) to your USB.
Enter “exit” to close DiskPart, and then “exit” again to close the command prompt
How do ACLs work on a router?
Answer:
An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.
Explanation:
PLEASE MARK ME AS BRAINLIEST