Answer:
Extremes is the answer for the blank.
Explanation:
________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. (1pts) Question 5 - ________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing
Answer:
Hey there!
Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing
Hope this helped! :)
Why is RAM considered as a volatile memory?
RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......
if you are continuously working with the same range, then you may give a name to the range using _____ option in the data menu open office.
a define data.
b define range.
c define reference.
d define addres
Answer : B. Define Range
If you are continuously working with the same range, then you may give a name to the range using define range option in the data menu open office. The correct option is b.
What is a range?In computer programming, range refers to the interval that includes the upper and lower bounds of an array's variable values. The interval between data points is referred to as the range in statistics.
The domain of a function is the set of values that can be plugged into it. This set contains the x values in a function like f. (x).
A function's range is the collection of values that the feature can take. This is the set of values that the function returns after we enter an x value.
If you are constantly working with the same range, you can give it a name by selecting the define range option from the data menu in Open Office.
Thus, the correct option is b.
For more details regarding range, visit:
https://brainly.com/question/28135761
#SPJ6
What is the most likely reason for protecting a worksheet?
to track all changes made by editors to a worksheet
to stamp the worksheet with an individual’s information
to prevent email programs from sending the worksheet
to prevent unauthorized users from modifying the worksheet
Answer: D, to prevent unauthorized users from modifying the worksheet.
Explanation:
Answer:
D. to prevent unauthorized users from modifying the worksheet
Explanation:
hope this helps :)
The ___________ method returns the length of an array.
append
input
add
len
Answer:
d
Explanation:
The length() method returns the number of characters present in the string.
what is thisssssssss please answer
Answer:
first of all, are you a snake? And also that is a spotlight.
Explanation:
How can she change that value so it is reflected in the chart in her presentation?
Answer:
She can change the value in the mini- spreadsheet for the chart in PowerPoint.
Explanation:
Answer:
What she said above or below me
Explanation:
When setting up a project timeline for a computer lab, which of the following should not be taken into consideration?
time to install software
time to set up the network
time to purchase items
time for maintenance
Answer: It depends on where you are how far the place where you are going to purchase the items and also it depends if your a fast builder or not
but if you are quick it shouldnt take so long just depends on you.
Explanation:
Can you predict what changes will come to data storage in the next decade? 
Answer:
Explanation:
More data storage will become available currently there are kilobytes (KB), megabytes (MB), gigabytes (GB) and terabytes (1TB) of storage but in the future maybe there will be tetrabytes
Which one of the following is not an advantage of using networks?
Ability to share files
Technical knowledge needed
Central maintenance and support
Easier to back up files
Answer:
sorry i don know
Explanation:
pretty sure nones gonna do this but please do it would gelp alot of my exams irs gonna bring me like 10 marks :(
Which insert image option allows a user to compile, modify, and add captions to images?
Answer:
c. Photo Album is correct
Explanation:
According to the C&M Technology Competitor View, while Accenture leads in Consulting and SI, which are our two major competitors in large deals?
Even though Accenture leads in Consulting and SI, its major competitors include McKinsey and Bain & Co. Inc.
Accenture is a multinational professional technology service company that provides digital, tactical, strategic, and consulting services for its clients.
Accenture was formerly known as Arthur Anderson LLP. It's regarded as one of the top accounting firms in the world. Some of its major competitors in large deals include McKinsey, Bain & Co. Inc., Boston Consulting Group, Inc.
Read related link on:
https://brainly.com/question/25740331
Lists can not hold strings and numbers in the same list.
True
False
People who connect one network to another within the company or even across organizations are A. central connectors. B. boundary spanners. C. external specialists. D. peripheral specialists.
People who connect one network to another within the company or even across organizations are boundary spanners.
People who serve as ambassadors to linking information and communications on informal networks within different department in an organisation and with other organisations or personnel far and near for the good of their organisation are called Boundary Spanners.
The importance of Boundary spanning in organisation includes
Exchange of expertise informationNurturing of connections with people from different part s of the world.Improved innovation in businessesSee more here: https://brainly.com/question/14728967
Which browser feature will delete your history, cache, and cookies the moment you close the special window
Answer:
Private Browsing
Explanation:
Stuff like DuckDuckGo or Brave
A presenter selects multimedia materials primarily based on their ability to organize data. Distract the audience. Introduce information. Emphasize a point.
Multimedia materials encompass video, audio and pictorial elements of a presentation. These materials are useful extremely useful when emphasizing a point.
In other to establish importance, emphasis has to be laid on the key points of a lesson, teaching or information. With multimedia tools, the important points could be aired verbally, diagrammatically with annotations or using live visuals to establish the proposed points.Learn more : https://brainly.com/question/25682762
Which of these statements is true about text superimposed over a photograph on a
slide?
It should never be done.
It should always be done.
It should have high color contrast.
O It should have low color contrast.
Answer:
It should have high color contrast.
Discuss the importance of an operating system as it relates to computer hardware and software. Provide at least one example of a service that operating systems provide.
Answer:
An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language.
Examples:
1. User Interface.
2. Program Execution.
3. File system manipulation.
4. Input / Output Operations.
5. Communication.
6. Resource Allocation.
7. Error Detection.
8. Accounting.
How to fix common problem of a computer system?
Rohan has 50,000 that he wants to invest in two mutual funds for one year. Func low risk fund with 18% interest rate and Fund B is a higher risk fund 1% interest rate. Which feature of spreadsheets (Calc) will be help him to decide } Solver (b) Subtotal (c) Linking sheets d) Macros
The feature of spreadsheets that will help Rohan decide where to invest his money is;
Option A; Solver
Since he wants to find where to invest his funds for one year between the two fund types. This means in excel, he will make of what we call "IF function".
The "IF" function helps in making logical comparisons between a particular value and what you will expect and as a result, it implies that the "IF" statement can have two results. The first result of the IF function will be the one to show that the comparison is True while the second is to show the comparison is False.Now, in Microsoft Excel, we make use of an add-in program called "SOLVER" that is used for what-if analysis.
Solver is used to find the maximum or minimum value for a formula in the objective cell which is subject to constraints, on the values of other formula cells in that particular worksheet.
Read more at; https://brainly.com/question/15032995
PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.
Answer:
ecmascrip is how Javascript can be implemented I think I'm very sry if it's wrong
Answer:
JavaScript can be implemented using JavaScript statements that are placed within the ... HTML tag
Explanation:
(thanks for all the points)
Electronic evidence on computer storage media that is not visible to the average user is called ________.
Answer:
Electronic evidence on computer storage media that is not visible to the average user is called ambient data.
Which of the following can be termed “application software”? *
1 point
a) DOS
b) Linux
c) Defragment
d) Internet Explorer/ Microsoft Edge
The answer option which can be described as an application software is: d) Internet Explorer/ Microsoft Edge.
A software can be defined as a set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.
In Computer and Technology, software applications (programs) are broadly classified into three (3) main categories and these are;
System softwareUtility softwareApplication softwareAn application software refers to a type of software applications (programs) that is typically designed and developed for the performance of a specific task rather than the operation of a computer system. Some examples of application software include the following:
1. Internet Explorer/Microsoft Edge
2. Notepad
3. Windows media player
Find more information: https://brainly.com/question/14379808
How do i add a picture on a computer? Its a random question but i dont know how to do it. It needs to be a very detailed description.
why are extensions necessary in scratch programming as a whole?
Scratch extensions are vital for scratch to interface with the external hardware and information.
Scratch simply means a free programming language where an individual can create their own interactive stories.
It's simply the world's largest coding community for children. Scratch extensions are vital for scratch to interface with the external hardware and information.
Read related link on:
https://brainly.com/question/15418798
Q10: ____ server maintains a database of hostnames and their corresponding IP addresses and performs the translations automatically.
A web server is designed to maintain a database of hostnames and their corresponding IP addresses while also performing the translations of hostnames to an IP address automatically.
A server can be defined as a specialized computer system that is designed and configured to store, maintain, and provide specific remote services for its end users (clients), especially on a request basis.
In Computer and Technology, the different types of server include:
Virtual serverProxy serverApplication serverPrint serverDatabase serverFile serverWeb serverA typical function of a web server is the maintenance of a database comprising hostnames and internet protocol (IP) addresses, as well as performing the translations of hostnames to an IP address automatically.
Read more: https://brainly.com/question/21078428
Helpppppp meeeeeeeeeeeee pleaseeeeee
Answer:
B
Explanation:
PATA drives, also known as ATA, ATAPI, or Integrated Drive Electronics (IDE), are the type of drives that were generally used in workstations until recently. PATA drives typically have a maximum transfer rate of 150MBps.
Cloud storage is a cloud computing model in which data are stored on remote servers accessed from the Internet, or “cloud.” For most PACS manufacturers, the cloud storage is primarily utilized as a long-term storage solution only.
Methods that set values are called ____ methods. Group of answer choices modifier mutator creator access
Answer:
modifier methods.
Explanation:
Suppression of politically or socially unacceptable co
O backlinks
O compress
O forum
O censorship
Answer:
censorship
Explanation:
censorship means to block out something that is against the rules, to silence some sort of message/comments. so the answer is censorship