Answer:
2/3, 0, -7
Explanation:
If you are insured with third party insurance, it will cover which costs?
A. business losses due to a denial-of-service attack
B. loss of data in your laptop because of a coffee spillover
C. ransomware attack on your laptop
D. costs related to lawsuits, and penalties due to a cyberattack
Answer:
c.
Explanation:
Answer: D (costs related to lawsuits, and penalties due to a cyberattack)
Explanation: Third Party insurance covers the liabilities of policyholders to their clients or customers. Regulatory: It covers the cost related to legal affairs, lawsuits and penalties due to a cyberattack.
jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.
Answer:
I'm a little confused...
Explanation:
Can you reword this please?
Which factor distinguishes IOT devices from standard computing devices such as laptops and smart phones?
Answer:
PLS help me I'm tried
Haa plsssssss
While all pages use HTML code, not all pages are written in
Answer:
Code Form
Explanation:
Number the steps to describe how Tristan can complete
this task.
Cut the Television and related equipment row.
Paste the Television and related equipment row.
Click the plus sign on the left side of the table between
the last two rows.
Answer:
Cut the Television and related equipment row.Click the plus sign on the left side of the table between the last two rows.Paste the Television and related equipment row.Explanation:
In order to move the row, Tristan should first select the row and then cut it. This will ensure that the row will be moved completely instead of copied.
Tristan should then hover with the mouse between the last two rows and click on the plus sign on the left side. It will add a new row to the sheet. between the last two rows.
Tristan should then select the topmost cell and click paste. The television row will be pasted there and Tristan would have successfully moved it.
Answer:
2 3 1 Your Welcome
Explanation:
how does such editing affect courtrooms where visual evidence is often presented?
12. But not parallelism, it is achievable to have concurrency in operating system threading?
Answer:
Yes, it is possible to have concurrency but not parallelism. Concurrency: Concurrency means where two different tasks or threads start working together in an overlapped time period, however, it does not mean they run at same instant.
When someone refers to "space" on a computer or device, they are usually referring to _____, which allows the user to save a file for future use, even after the computer has been turned off. secondary storage the central processing unit (CPU) software primary memory
Answer:
it could either be the R.A.M or the hard drive
Explanation:
Answer:
Secondary Storage
Explanation:
Secondary storage is permanent, therefore, it fits the context of what the question is asking for.
Explain what an IM is,
Answer: Stands for "Instant Message." Instant messaging, or "IMing," as frequent users call it, has become a popular way to communicate over the Internet
Explanation:
6
Suppose the following formula is inputted into Excel:
=MROUND(1/4,100)
The output in the cell will be:
0
0.25
0.2500
1
Answer:
the output in the cell will be 0,2500
what is a software house
Answer: a company whose primary products are various forms of software, software technology, distribution, and software product development. They make up the software industry.
this should be the answer
hoped this helped
What is the name for the part of a camera which can block light when it's closed, and let light in when it's open?
Pixel
Lens
Focus
Shutter
What are the vertical areas of the spreadsheet?
a
Verticies
b
Ventricals
c
Columns
d
Rows
Answer:
Columns
Explanation:
A spreadsheet may a explained as a tabular arrangement or arrays of cells which allows users to enter both numeric and string data for storage, manipulation and analysis. The spreadsheet program has both the vertical and horizontal cell arrangement with the vertical areas being reffered to as THE COLUMN which are labeled using alphabets arranged from A - AZ, AA - AZ, and so on to make up a total of 16384 columns on the Microsoft Excel spreadsheet program. Cells are located using a combination of column and row address. With row representing the horizontal area of the spreadsheet and labeled with digits. Therefore cells are usually refereed to as A1, (column A row 1) and so on.
Programming a computer to win at chess
has been discussed since the
A. 1940's
B. 1950's
C. 1960's
Answer:
B.
Explanation:
Can two computers be assigned to one IP address
Answer:
two computers cannot have the same public (external) IP address unless they are connected via the same router. If they are connected via the same router, then they can have (share) the same public IP address yet have different private (local) IP addresses
Explanation:
Answer: maybe
Explanations: two computers cannot have the same public (external) IP address unless they are connected via the same router. If they are connected via the same router, then they can have (share) the same public IP address yet have different private (local) IP addresses.
Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply.
David has the physical strength to lift products on high shelves.
Alessandra analyzes and interprets information she gathered from surveys.
Eve is good at presenting and explaining information to others.
Franklin is a strong leader who is able to motivate others.
Gene is very organized and tracks information accurately and carefully.
Claire is confident and persuasive, which makes her good at selling products.
Answer:
2,3,5
Explanation:
Answer: the answer is 2 3 and 5
Explanation:
What type of information is best suited for infographies?
Answer:
All varieties of information, from bullet pointed text to numerical tables
Explanation:
Answer:
All varieties of information, from bullet pointed text to numerical tables
Explanation:
my code get an input of 1900 and it should output not a leap year but it fails first line of code. It should output not a Leap any number with 1500 not divisble by 4 with/out a remainder should output (not a leap year. )
input_year = int(input())
if input_year % 4 == 0: #fails on this step, 1900 should be false
print(input_year, "- is Leap Year")
elif input_year % 100 == 0:
print(input_year, "- leap year")
elif input_year % 400 ==0:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
Answer:
Explanation:
The code does not fail on the first step since 1900 divided by 4 is actually 475 and has no remainder, meaning that it should return True. The code won't work because the if statements need to be nested in a different format. The correct algorithm would be the following, which can also be seen in the picture attached below that if we input 1900 it would output is not a leap year as it fails on the division by 400 which gives a remainder of 0.75
input_year = int(input())
if input_year % 4 == 0:
if input_year % 100 == 0:
if input_year % 400 == 0:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
else:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
A user has a computer with a single SSD, and the entire drive contains one partition. The user wants to install a second OS on the computer without having to reinstall the current OS. The user wants to be able to select which OS to use when booting the computer. Which Disk Management tools should the user utilize to accomplish this task?
Answer:
The correct approach is "Shrink partition". A further explanation is given below.
Explanation:
Shrinking partition shrinks or decreases this same disc size as well as unallotted disc space, unallotted space could be utilized to mount a secondary Operating system to operate as a double operating system.Whilst also diminishing everything into neighboring volatile memory on another disc, this same space required for area as well as drives could also be reduced.Thus the above is the correct answer.
Three reasons Why we connect speakers to computers
Answer:
we connected speakers with computers for listening voices or sound .. because the computer has not their own speaker..
Explanation:
briefly explain 5 software which is either free or fee
Answer:
65
Explanation:
Answer:
65
Explanation:
Suppose Alice downloads a buggy browser that implements TLS incorrectly. The TLS specification says that, during the handshake, the browser should send a random 256-bit number RB. Instead of picking RB randomly the browser always sends all zeros. Describe an attack that is possible against this buggy browser and how to update the browser so that this attack is no longer feasible.
Solution :
It is given that Alice downloads the buggy browser which implements a TLS incorrectly. The specification of a TLS states that during a handshake, the browser sends a 256 bit number of RB randomly.
So in this case, a man-n-the-middle attack is possible. It can compromise the confidentiality of Alice. Updating the browser by visiting the website and checking its latest version of the browser or installing some other browser which has a more trust in the market for its security features.
Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
numA = 0
for count in range(3):
answer = input ("Enter a number: ")
fltAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Thanks in advance!
:L
Answer:
17.0
Explanation:
I ran it for you. You could also try that (go to replit).
how do i work this out? does anyone do programming?
Write a program that asks the user to enter an international dialing code and then looks it up in the country_codes array (see Sec 16.3 in C textbook). If it finds the code, the program should display the name of the corresponding country; if not, the program should print an error message. For demonstration purposes have at least 20 countries in your list.
Answer:
Explanation:
The following code is written in Python, it prompts the user for a country code, look it up and if found prints out the corresponding country name. If not it prints out an error message stating "Code not found"
country_codes = {"Argentina": 54, "Bangladesh": 880,
"Brazil": 55, "Burma (Myanmar)": 95,
"China": 86, "Colombia": 57,
"Congo: Dem. Rep. of": 243, "Egypt": 20,
"Ethiopia": 251, "France": 33,
"Germany": 49, "India": 91,
"Indonesia": 62, "Iran": 98,
"Italy": 39, "Japan": 81,
"Mexico": 52, "Nigeria": 234,
"Pakistan": 92, "Philippines": 63,
"Poland": 48, "Russia": 7,
"South Africa": 27, "South Korea": 82,
"Spain": 34, "Sudan": 249,
"Thailand": 66, "Turkey": 90,
"Ukraine": 380, "United Kingdom": 44,
"United States": 1, "Vietnam": 84}
user_code = int(input("Enter Country code: "))
keys = list(country_codes.keys())
vals = list(country_codes.values())
if user_code in vals:
print(keys[vals.index(user_code)])
else:
print("Code not found")
This unit is used to print the picture on a paper
Answer:a printer
Explanation:
It prints things
What are
the rules for giving
variable name ?
Answer:
Rules for naming variables:
- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.
- All variable names must begin with a letter of the alphabet or an underscore ( _ ). For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.
- After the first initial letter, variable names can also contain letters and numbers. No spaces or special characters, however, are allowed.
- Uppercase characters are distinct from lowercase characters. Using all uppercase letters is used primarily to identify constant variables.
- You cannot use a C++ keyword (reserved word) as a variable name.
Which step should you follow to copy a worksheet after clicking Format in the Cells group?
O Under Arrange Sheets, click Cut or Copy Sheet.
O Under Organize Sheets, click Move or Copy Sheet.
O Under Arrange Sheets, click Select and Move Sheet.
O Under Organize Sheets, click Arrange and Copy Sheet.
Answer:
Under Organize Sheets, click Move or Copy Sheet should you follow to copy a worksheet after clicking Format in the Cells group.
Explanation:
What is the proper order for the fetch-execute cycle?
Control Unit – controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle as follows:
Fetch – gets the next program command from the computer’s memory
Decode – deciphers what the program is telling the computer to do
Execute – carries out the requested action
Store – saves the results to a Register or Memory
Arithmetic Logic Unit (ALU) – performs arithmetic and logical operations
Register – saves the most frequently used instructions and data
Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which option should he configure?
Answer:
show archive in folder list
Answer:
d
Explanation: