There's a tool designed to collect data. It allows you to specify which counters you want to collect data for by clicking on the plus sign and adding the counters you want. What's the name of this tool

Answers

Answer 1

Answer:

social engineering is a way to collect data

Explanation:


Related Questions

what is cyber crime? is hacking is cyber crime ​

Answers

Answer:

Crime committed using computer networks.

Explanation:

well I don't think sooo..........

HOPE IT HELPS.......

Answer:

Cyber crime means the crime done through the means of internet.Using others account without permission,Leaking others personal information,etc.are example of it.

Yes,hacking is a cyber crime.

explain about cyber terrorism​

Answers

Explanation:

cyber terrorism is type of hacking group with give the country that are to illegal group

Helppppppp pleaseeeewweeweee

Answers

Answer:

D

Explanation:

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets

Match each tool or feature to the task it completes.

Answers

Answer:

the screenshot order is correct.

Explanation:

the gray one’s are right he just got them wrong before

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

A(n) _______________ is a network organization that centralizes user accounts, passwords, and access to resources.

Answers

Answer:

A router

Sentence:

A(n) router is a network organization that centralizes user accounts, passwords, and access to resources.

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))

Write a function that will receive 5 numbers from a user (inputted one at a time-- use reassignment!) and will count then print how many of the numbers are odd.

Answers

The program is an illustration of loops.

Loops are used to perform repetitive operations

The function in Python where comments are used to explain each line is as follows:

#This defines the function

def count_odd(mylist):

   #This initializes the count variable to 0

   count = 0

   #This iterates through the list

   for i in mylist:

       #This checks if the current list element is not even

       if not i%2 == 0:

           #If yes, this increments the count variable by 1

           count+=1

   #This returns the count of odd numbers

   return(count)

Read more about similar programs at:

https://brainly.com/question/18269390

1.* Parents can now buy GPS tracking devices for their children. This allows them to monitor
their child's location at any time.
Discuss the impact of tracking children with GPS devices.
In your answer, you might consider the impact on:
Cultural issues
Ethical issues

Answers

Answer:

well...

Explanation:

it will help with any issues really, the parents just want to be able to find their children if they get hurt, lost, or kidnapped, so I don't see how it can be a cultural or an ethical issue

What is the purpose of formatting charts?
changes the data set used for creating the chart
changes the look and feel of the display
changes the values in the data set
changes the type of chart used
Intro
Don

Answers

Answer:

Changes the look and feel of the display

Explanation:

Because you don't change the data nor the values in the char

And it does not change the type of chart.

what was your first pokemon game


if you have not played one just comment don't answer

Answers

Answer:

FireRed & LeafGreen

Explanation:

so if it's mobile games then Pokémon go
but if it's Nintendo games then probably sword and shield cos you can catch pretty much every Pokémon.

your iphone is not configured to allow calls using this mac

Answers

Answer:

Make sure you have an iCloud account and that your computer is logged into that account.

Explanation:

The USGS and National Weather Service have many sensors collecting data about natural events.

That data can be used to create a weather map.

Identify the parts of the Input-Process-Output model for each step.


(output, input, process): weather map displayed on a web page


(output, input, process): determination of color to be used on the map


(output, input, process): sensors collect temperature and precipitation data

Answers

Answer:

Explanation:

Throughout many regions on the chart, a standard plotting code demonstrates air currents speed and direction, average temperature and relative humidity, barometric pressure and its change over the previous hours, the number and variety of clouds, the weather type, including visibility restrictions, and the amount and type of precipitation.

USGS and National Weather Service

As per the question, the USGS  and National weather services are mapping out the region to collect the data for the natural events. The data is collected in the form of maps and is used for the identification of the input and the output model steps.

The answer is precipitation data, visibility data.

The NWS is a federal agency of the united stated that is tasked to prove the forecasts and for the formation of hazardous weather events and warns the public of the related events.

Learn more about the National Weather Service

brainly.com/question/17774978.

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

to determine the highest number in a range of numbers, click insert function box in the formula bar to display the insert function dialog box, then select ____.

Answers

Functions in Excel are used to perform several arithmetic and logical operations.

The text that completes the statement is MAX

From the question, we understand that you want to determine the highest number in a given range of numbers.

This is done using the MAX function.

i.e. after the insert function box has been selected, the formula to use is the MAX function.

Hence, the complete statement is:

Click insert function box in the formula bar to display the insert function dialog box, then select MAX.

Read more about Excel functions and formulas at:

https://brainly.com/question/20497277

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

What is one of four key principles of Responsible Artificial Intelligence (AI)?

Answers

Answer:

Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.

One of the four key principles of Responsible Artificial Intelligence (AI) is the decision-making process should be transparent and understandable. The correct option is A.

What is Artificial Intelligence (AI)?

Artificial intelligence is the process of giving a machine the capacity to reason and make decisions. The most sophisticated branch of computer science is artificial intelligence, which involves creating a mind in which a computer can think—a computer brain that can reason similarly to humans.

The creation of intelligent machines, particularly intelligent computer programs, is the science and engineering of artificial intelligence, according to John McCarthy, the founder of machine intelligence.

This results in the creation of a computer system or robotic system that attempts to function using the same logic as the human brain.

Therefore, the correct option is A. Decision-making process should be transparent and understandable.

To learn more about Artificial Intelligence (AI), refer to the link:

https://brainly.com/question/23824028

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A. Decision-making process should be transparent and understandable.

B. Accountability for decisions ultimately lies with the computer algorithms

C. Companies are not reliable for violations of the law that result from the actions of AI

D. Any biases that may arise from AI processing are justifiable if they are backed by data

_______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi

Answers

Wireless fidelity (Wi-Fi) is known simply as a wired LAN that does not have cables. Wifi is a medium-range wireless network.

WiFi configuration is made of of transmitter with an antenna. It is the wireless access point because it connects to a wired LAN or to satellite dishes that gives an Internet connection.

Wi-Fi is the mostly used type of medium-range wireless communication system.

Medium-range Wi-Fi signal can take about 100 meters and they also not take as far as cellular signals.

Learn more from

https://brainly.com/question/20812811

Apple computers ship their computer parts to India to be made, and station their tech support in India. This is an example of a:

Answers

Companies are known to set up different branches. This is an example of a Global assembly line.  

An assembly line is known to be a production process that breaks down the manufacture of goods into different steps that are completed in a known sequence.

These lines are often used method in the mass production of products as they reduce labor costs.

Global Assembly Line  is simply known as distributed manufacturing method that entails the product research and development in wealthy countries and assemblage in poorer countries.

Learn more from

https://brainly.com/question/2954967

Answer:

Shipping?

Explanation:

No options sooo

What contribution did ada byron make to computing?

Answers

Answer:

Around 1843, she described the first computer principles, later built by Charles Babbage in the form of a mechanical calculator.

Ada Byron was a writer and mathematician known for her work on Babbage's early mechanical general-purpose computer. She helped to write the first algorithm intended to be processed by a machine.

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

who plays pokemon shield or sword

Answers

Answer: I haven’t played but i wanna

Explanation:

Answer:

no

Explanation:

i don't

The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.

Answers

Twitch is an online service that comprises original content in the form of live or recorded streams and it is typically focused on showing various individuals that are playing video games.

Twitch is an online (web) service that was launched in June 2011 and it derived its name from twitch gaming such as video games that are mainly about fast action and the use of reflexes by the game players.

The main purpose of Twitch is to avail game players the opportunity to stream or show live or recorded videos of themselves playing video games.

Read more: https://brainly.com/question/21694571

more Or less?

Pick one and be rewarded!!!!!!!

Answers

Answer:

More

Explanation:

hope this is helpful

which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization

Answers

Answer:

Confidential Information

Explanation:

It is predicated on the idea that a person who receives information in confidence should not use or divulge that knowledge without permission. Unauthorized use or disclosure of confidential information may lead to a breach of trust suit.

Confidentiality clauses, often known as "NDA's", are intended to protect and consider important business information. Like as production processes, proprietary formulas, client lists, know-how, concepts, business strategies, and technical information.The unauthorized revelation of this type of material could reasonably be expected to harm our national security.

Therefore, the final answer is "Confidential Information".

Learn more about types of information:

brainly.com/question/13079191

how do viruses spread from one computer to another computer?​

Answers

Answer:Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.

It is most commonly used for self-running presentations.
A. Slide Transition
B. Hyperlink
C. Action Buttons
D. Animation​

Answers

Answer:slides

Explanation: because in the slide you can make a presentation

What is an FPS? Describe the acronym as it applies to video games and explain two games popular in the 2000s that flourished in this game category.

Answers

1. Short for frames per second, fps is a measure of how many full screen, still images are captured or displayed in one second of video recording/playback or video game play.

A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Answers

Answer:

An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Does anyone know who this man issss?

Answers

Kaeya Should be the correct answer

Other Questions
Sensory perceptions that are not directly attributable to environmental stimuli are called ____. Which statement would the author of the passage most likely agree with? The Patriot Act is essential to the United States efforts to combat terrorism. The Patriot Act is essential to the United States efforts to combat war. The Patriot Act is needed to help the United States protect privacy rights. The Patriot Act is needed to help the United States protect suspects rights. Find TWO activities commonly seen or around Veterans Day that take place The Northwest Territory was located... Question 3 options: north and west of the Ohio River, including present day Ohio in the present-day Northwest region, including the states of Oregon and Washington south and east of the Louisiana Purchase in present day Canada Which one of the quotients is correct? what are three positive aspects about dating Please solve this quickly. The question is below. Which one do I choose? Please answer correctly Please help!!!!!!!!!!!!!!!! Find the scale factor for the side lengths PLEASE HELP VERY EAAASY VERY!!! 4 Fe + 3 O2 ----> 2 Fe2O3How many moles of iron(III) oxide, Fe2O3 , will be produced if 4 moles of iron, Fe, are consumed. A single bout of resistance exercise training increases muscle protein synthesis by as much as ______% above resting levels A swimming coach needs to choose a team for a relay race. The coach must select 4 of 6 available swimmersand put them in a strategic sequence.How many unique ways are there to arrange 4 of the 6 swimmers? Which of the following is a natural event that is part of the long-term carbon cycle? (1 point)A. Earthquakes B.Tsunamis C.Blizzards D. Volcanic eruptions Read this quote from the Strange Case of Dr. Jekyll and Mr. Hyde. "It can make no change. You do not understand my position," returned the doctor, with a certain incoherency of manner. "I am painfully situated, Utterson; my position is a very strangea very strange one. It is one of those affairs that cannot be mended by talking." Based on this information what is the best definition of incoherency?A. Something that is unimportant.B. Something that is unclear.C. Something that is rude or unfavorable.D. Something that is suspicious. what are all the square numbers that are greater than 10 but less then 40 which was the first state to allow women to voteeven before the constitution was amended? Decide if the following sentence is grammatically CORRECT or INCORRECT. ste son nuestros carros. Correct Incorrect. Which conclusion about proposed changes in transportation doboth speakers support?AChanges would affect citizens' health.. Changes would increase with federal grants.. Changes would improve economic conditions in thecity.OD. Changes would decrease traffic congestionthroughout the city