Answer:
1. Center Text
2. Justify Text
3. Bullet Points
4. Decrease Indent
5. Increase Indent
6. Line Spacing
Hope this helps:)
What are the process of hacking computers
Answer:
Reconnaissance- Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.
Scanning- Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.
Gaining Access- Then according to information gathered from the above two phases, we plan and implement our attack.
Maintaining Access- After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.
Clearing tracks- The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.
Explanation:
Have a great day!
Show the stages of running Shellsort on the input 8, 9, 7, 5, 4, 6, 3, 2, 1 using increments {1, 3, 7}.
Create a program using python pseudo code
You are a manager of a Wally's Training Gym and you encourage your trainers to enroll new members. Input is the trainer's last name and the number of new enrollees. Output is the number of trainers who have enrolled members in each of three categories: 0-5 new members, 6-10 new members, and 11 to 15 new members. Write an application that allows the user to enter 15 names and the number of new members they have enrolled into an array. Output is to display the number of trainers who are in each category. Use good programming techniques that you have learned throughout the course. Use appropriate variable names, use an array to store the names and number of new enrollees, and use prompts for the input and labels with the display.
The program uses a loop and conditional statements.
Loops are used for iterations, while conditional statements are used to implement conditions
The program in Python, where comments are used to explain each line is as follows:
#This creates a list for the trainer's last names
lastName = []
#This creates a list for the members enrolled by each trainer
membersEnrolled = []
#The next three lines initialize counter variables to 0
count0to5 = 0
count6to10 = 0
count11to15 = 0
#The following loop is repeated 15 times
for i in range(15):
#This prompts the user for the trainer's last name
name = input("Trainer's last name: ")
#This prompts the user for the members' enrolled
member = int(input("Members Enrolled: "))
#This appends the last name to the list
lastName.append(name)
#This appends the members enrolled to the list
membersEnrolled.append(member)
#This counts the number of members enrolled in each group
if member >=0 and member<=5:
count0to5+=1
elif member >=6 and member<=10:
count6to10+=1
elif member >=11 and member<=15:
count11to15+=1
#The next three lines print the counter variables
print(count0to5,"enrolled 0 to 5 members")
print(count6to10,"enrolled 6 to 10 members")
print(count11to15,"enrolled 11 to 15 members")
Read more about similar programs at:
https://brainly.com/question/13246781
Which of the following statements describe encryption? Check all of the boxes that apply.
It turns data into cipher text.
It makes data unreadable without a decryption key.
It makes using a computer difficult.
It helps secure data.
It shares files with other computers.
Answer:
It turns data into cipher text, It makes data unreadable without a decryption key, It helps secure data.
Explanation:
I hope this helps
Answer:
A)
B)
D)
Explanation:
Edge 2022
Need help with these plss correct answers
Explain the difference between linear and non-linear motion. What are examples of each kind of motion?
Imagine that an animated film is going to show a character who, although frightened, climbs a narrow mountain trail. What is one of the 12 principles of animation that you learned about in this unit that the animator might want to use in this scene?
Describe how you would use the principle of “staging” in a scene in an animated film that shows a triumphant moment in a soccer game played in a large stadium.
Describe a situation where an animator might choose to intentionally violate the principle of “slow in and slow out.”
Imagine that you had been given the task of animating a crab walking along the seashore. How would you use the animation principle of secondary action to make the scene appear more realistic?
Answer: The only thing i could find was this I hope this helps you out
Timing and Spacing: The number of frames between two poses, and how those individual frames are placed.
Squash and Stretch: The flexibility of objects to exaggerate or add appeal to a movement.
Anticipation: The setup for an action to happen.
Ease In and Ease Out: The time for acceleration and deceleration of movement.
Follow Through and Overlapping Action: The idea that separate parts of the body will continue moving after a character or object comes to a full stop, and the idea that parts of the body will move at different times.
Arcs: The principle that smooths animation and moves action in a realistic way.
Exaggeration: The pushing of movement further to add more appeal to an action.
Solid Drawing: The accuracy of volume, weight, balance, and anatomy.
Appeal: The relatability (or charisma) of a character.
Straight Ahead Action and Pose to Pose: The spontaneous and linear approach to creating an action using many in-between poses along with the main poses, and the more methodical approach to creating an action using only a few poses.
Secondary Action: The actions that emphasize or support the main action of the animation.
Staging: The setting up of the scene, from placement of characters to the background and foreground elements, to how the camera angle is set up, the lighting and shadows, and more.
Explanation:
Answer:
1. Linear motion is motion in a straight line. Non-linear motion is motion that is not in a straight line. For example when you move your pen in a line it is linear.
2. They might use something to show the mountain and show how big it is. Using effects like this can bring out certain parts and bring out what really is trying to be shown in a movie.
3. The camera angle of the soccer game and the follow with the ball being shown can give a staging looking for what is coming or what is important in that time.
4. You can use it to show how fast a car is going or to show where a person is at on a map in a 3rd person view
5. I would use Arcs because it smooths out the image or video to make whatever your trying to make look more realistic.
In cell G5, enter a formula without using a function that subtracts the actual dollars billed from the estimated amount to determine the remaining amount of the estimate for general administrative services
Using the appropriate excel syntax, the formula which calculates the actual amount from estimated amount is : =C10 - D10
Using the cells thus :
Actual dollar billed = C10Estimated amount = D10Using the cell values defined above ; the required excel syntax is as follows :
=C10 - D10Note : All excel formulas begin with the equal to sign.
Learn more : https://brainly.com/question/25644130
CASE STUDY # 1
WELCOME TO MOBILE BANKING
Discussion Questions
1. Would you be comfortable using mobile banking for transferring funds, paying bills, and checking
balances? Why or why not?
2. How might mobile banking attract the attention of hackers? Are the precautions discussed in this
article enough to keep hackers at bay?
Answer:
1 would you be comfortalbe
We have noted that there can be no input queuing if the switching fabric is n times faster than the input line rates, assuming n input lines all have the same rate. Explain why this is the case.
Consider the given data:
Assume packet length=n
Maximum queuing delay= (n–1)D
All packets are of the same length, n packets arrive at the same time to the n input ports, and all n packets want to be forwarded to different output ports.
a) The maximum delay for a packet for the memory = (n-1)D
b) The maximum delay for a packet for the bus = (n-1)D
c) The maximum delay for a packet for the crossbar switching fabrics= 0
Interface elements include but are not limited to:
Question 3 options:
A. Navigational components, containers, interaction design
B. Input controls, navigational components, visual design
C. Input controls, informational components, containers
D. Input controls, informational components, visual design
E. Navigational components, informational components, visual design
Interface elements include but are not limited to: C. Input controls, informational components, containers.
A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and it can be defined as a programming tool that avails programmers the ability to develop software programs (applications) through the use of graphical elements and figures rather than texts alone.
Interface elements refers to the graphic tools that are used by programmers in the design of a user interface on a software program.
In Computer programming, some of the interface elements used include the following:
Input controls: it comprises buttons, radio buttons, list boxes, dropdown lists, checkboxes, text fields, toggles, date field, etc.Informational components: these are progress bar, icons, notifications, tooltips, modal windows, message boxes, etc.Containers: they are made up of accordion.Navigational components: these are slider, search field, slider, tags, pagination, breadcrumb, icons, etc.Read more: https://brainly.com/question/19341134
Which operating system might cause the desktop background to change unexpectedly?
A.) boot failure
B.) startup loop
C.) malware
D.) incompatibility
Answer:
C.) Malware
A boot failure would not load the desktop, same with a startup loop and incompatibility.
Which character is midway between the 3rd character from left and 6lh character from rights
a. 2
b. 3 ANS
c. 8
d. Y
Answer:
D
Explanation:
____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.
Head pointers
Screen magnifiers
Tracking devices
Zoom features
Answer: screen magnifiers
Explanation: got it right on edgen
When replacing a defective switch, what is a necessary characteristic of the new switch?
Select one:
a. Greater number of poles and throws than the original switch
O b. The same number of positions as the original switch
C. Identical cover plate as the original switch
O d. Greater current ratings than the original switch
Answer:
Socratic app
Explanation:
it will help you
Why is it good to be a computer programmer?
Answer: With programming, you have more freedom than with other jobs. The majority of programming job openings are remote, giving you plenty of freedom to complete your duties.
Explanation: You can work wherever you want with programming jobs, especially if you have a good reputation.
Write a class number which has Following
N - integer
Methods
Default constructor
Argument constructor
setN method to change the value of N
isprime() to check that N is a prime number isarmstrong to check N is Armstrong iseven() to check if N is even or odd these method should also work for given numbers
class should have provision to know the count of objects
The Python program implementing the required features of the class number is lengthy. So, it is attached to the answer as an image
First, two attributes are defined in the class:
A class attribute called count_instances that is incremented anytime an instance is created. Thus, it keeps count of the number of instances created.An instance attribute called N that stores the numberPython does not allow operator overloading by default. To implement default and argument constructors, use default/optional arguments. Though there are other ways, this is the simplest approach for the purposes of this problem.
The isPrime method checks if the constructed number is a prime number. The for loop runs from 2(since this is the first prime number) to int(sqrt(N)), and checks which of these numbers divides N. If none divides N, then N is prime, and it returns true, else it returns false.
isArmstrong checks if the number is an Armstrong number. To easily get the order of the number, the number is converted to a string and the number of characters is gotten.
The number is an Armstrong Number if
[tex]abc...=a^n+b^n+c^n+...[/tex]
where
[tex]n=\text{order of the number, or, number of digits in the number}\\a,b,c,...=\text{the individual digits of the number}[/tex]
See another example on Prime numbers here: https://brainly.com/question/20379340
Which group on the Note Master tab contains the command to add footers to the notes pages?
Answer:
Place Holders
Explanation:
a. In cell K11, create a formula using the DCOUNT function to count the number of projects with final costs of more than $100,000, using the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10
Answer:
the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10
Mackenzie just graduated with a degree in game design and has been working on designing her first video game outside of the classroom. What is one of the first questions that Mackenzie should consider while working on this game?
Question 8 options:
"How much should I sell my game for?"
"What marketing strategy will I use for my game?"
"What should my game title be?"
"What player perspective should I use?"
Answer:
what marketing strategy will I use for my game?
Why is it important to keep software up to date? Select 3 answers that are correct.
A.) fix bugs
B.) download malware
C.) add features
D. ) limit personal use
E. ) patch security holes
Answer:
It is important to keep your software up because (A) it fixes bugs, (C) adds features, and (E), it patches your security holes.
To put it in short, your answers is A, C, and E.I hope this helped at all.
John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered
Asymmetric cryptography is often regarded as Public-key cryptography. It often uses pairs of keys. The process that Alex should use along with asymmetric cryptography so that John can be sure that the received document is real is Digital signature algorithm.
In asymmetric cryptography, the both pair has a public key and a private key.The Digital Signature Algorithm is simply known to be a Federal Information Processing Standard for digital signatures.
DSA as it is often called is gotten from the Schnorr and ElGamal signature schemes.
It often used for digital signature and its verification and thus shows authenticity.
Learn more from
https://brainly.com/question/13567401
Write a statement that declares an anonymous enumerated type with the enumerators SMALL, MEDIUM, and LARGE.
Enumerated data types are simply data types that contains a set of named values called enumerators.
The required statement is enum {SMALL, MEDIUM, LARGE} ssize;
The syntax of the anonymous enumerated type is:
enum {List of enumerators} name of variable;
From the question, the enumerators are SMALL, MEDIUM, LARGE.
The name of the variable could be ssize
Hence, the anonymous enumerated type statement is:
enum {SMALL, MEDIUM, LARGE} ssize;
Read more about enumerated data types at:
https://brainly.com/question/15518342
What is data?........
[tex]\huge\bold\green{Data\ :- }[/tex]
In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.
Why is it important to know the measurement of the component of the computer?
why are computers refered to as
mordern technology
computer are called modern technology because in like earlier generations they didn’t have computes.
안녕 또 나야 난 너에게 미래의 메시지를 전하러 왔어 01100011 01101111 01101101 01101111 00100000 01111001 00100000 01101100 01101111 00100000 01101101 01100101 01101110 01110011 01101001 01101111 01101110 01100101 00100000 01101100 01100101 01110011 00100000 01110100 01110010 01101001 01100111 01101111 00100000 01110101 01101110 00100000 01101101 01100101 01101110 01110011 01100001 01101010 01100101 00100000 01100100 01100101 01101100 00100000 01100110 01110101 01110100 01110101 01110010 01101111 00100000 01110110 01100101 01101110 01100111 01101111 00100000 01100100 01100101 01101100 00100000 01100001 11000011 10110001 01101111 00100000 00110010 00110000 00110011 00110000 00100000 01110011 01101111 01101100 01101111 00100000 01110110 01101001 01101110 01100101 00100000 01100001 00100000 01100001 01100100 01110110 01100101 01110010 01110100 01101001 01110010 01101100 01100101 01110011 00100000 01110011 01101111 01100010 01110010 01100101 00100000 01101100 01100001 00100000 01100100 01100101 01110110 01100001 01110011 01110100 01100001 01100011 01101001 01101111 01101110 00100000 01100100 01100101 01101100 00100000 01110000 01101100 01100001 01101110 01100101 01110100 01100001 00100000 01110011 01101111 01100010 01110010 00100000 01100101 01101100 00100000 01100011 01101111 01110110 01101001 01100100 00100000 00110001 00111001 00100000 01110011 01100101 00100000 01100001 01100011 01100001 01100010 01101111 00100000 01100101 01101110 00100000 01100101 01101100 00100000 01100001 11000011 10110001 01101111 00100000 00110010 00110000 00110010 00110011 00100000 01100101 01110011 01100101 00100000 01100101 01110011 00100000 01101101 01101001 00100000 01101101 01100101 01101110 01110011 01100001 01101010 01100101 00100000 01110000 01100001 01111010
Answer:
i think its 01100001
Explanation:
미래에서 온 메시지를 전하려는 경우 코로나가 종료되면 알려주십시오.
How does an organization comply with data-usage clauses within data protection regulations such as GDPR or the Data Protection Act?
Answer:
How does an organization comply with data security clauses in data protection regulations such as GDPR or the Data Protection Act? ... By ensuring all data storage is publicly accessible to guarantee fairness. By only sharing collected personal data with partners and third-party channels.
Write a function that takes a word less than 25 characters long and returns the letter that word starts with (in capital letters)
The function that takes a word less than 25 characters long and returns the letter that word starts with in capital letters is as follows:
def first_letter(x):
if len(x) < 25:
for i in x:
return x[0].upper()
else:
return "Your text should be less than 25 characters"
print(first_letter("brainly"))
The code is written in python.
We declared a function named first_letter with the parameter x.
If the length of the word is less than 25 characters, we loop through it and return the first letter in uppercase.
Else if the word is not less than 25 character we ask the user to input a word less than 25 characters.
Finally, we call the function with a print statement.
The bolded portion of the code are python keywords.
read more: https://brainly.com/question/14603294?referrer=searchResults
Have you ever written a program, saved a version, then later saved a different version and wish you could tell what changed
Answer:YES
Explanation:
Y
What device do e-learning applications usually use to help users with visual
impairment read digital content?
Cloud computing brings the ability to scale both technologically and business-wise using a pay-as-you-go paradigm, allowing the users to concentrate more resources and time on their ideas (Edlund & Livenson, 2011). Please write a technical report about the opportunities and challenges on adoption of cloud computing in a real or fictional business case.
The opportunities that can be gotten from the adoption of cloud computing include:
More resources will be available for data protection.More data security.More employment opportunities.The challenges that can be gotten from the adoption of cloud computing include:
Separation failure.Data transfer bottlenecks.Public management interface issues.It should be noted that cloud computing means the delivery of different services through the internet. Such resources include applications and tools such as data storage, databases, servers, etc.
Cloud computing is vital as it helps in enhancing data security and job opportunities. The challenges include data transfer bottlenecks, separation failure, etc.
Read related link on:
https://brainly.com/question/25532807