Answer:
cpu
Explanation:
what are worms ? this question is from computer from chapter virus;
Answer:
A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
Explanation:
Identify the eight unique features of e-commerce technology and explain how these features set e-commerce apart from more traditional ways of conducting commercial transactions.
The eight unique features of e-commerce technology are
UniversalityHas a global reach.Universal standardsVery richHas interactivityIt has full information densityIt has personalization featuresIt is a social technologyWhat are the features of e-commerce technology about?Universality is known to be a term that is also called Ubiquity. It is known to be a feature of the e-commerce technology where the use of internet/web tech is known to be readily available everywhere. Market is said to be made and as such shopping can take place anywhere.
In regards to Global reach, it is known to make use of technology to be able to reaches all of the national boundaries that tends to makes marketspace to make billions in profits.
In terms of its Universal Standards, there has been found to be some group of tech standards, such as internet standards. Richness is seen in its contents such as Video, audio, and tech messages and others.
Therefore, based on the above, The eight unique features of e-commerce technology are
UniversalityHas a global reach.Universal standardsVery richHas interactivityIt has full information densityIt has personalization featuresIt is a social technologyLearn more about e-commerce technology from
https://brainly.com/question/516165
#SPJ1
What is shoulder browsing? A. accessing someone else’s computer without permission B. deceptively observing people type in personal information C. distributing illegal software D. using internet search engines for information
Answer:
b
Explanation:
Which of the following is not described in Chapter 6 as a strategy to maintain network security?
Select one:
a. firewall
b. bring your own device (BYOD) policy
c. computer-user policies
d. virtual private network (VPN)
In Chapter 6, Bring your own device (BYOD) policy is not described as a strategy to maintain network security. Option B.
Network security involves protecting the network and the devices connected to it from unauthorized access, misuse, modification, destruction, or improper disclosure. It includes various strategies, such as authentication, authorization, encryption, firewalls, antivirus software, intrusion detection and prevention systems, virtual private networks (VPNs), computer-user policies, and so on.
In Chapter 6, computer security strategies are described to maintain network security, including firewalls, virtual private networks (VPN), and computer-user policies. But Bring your own device (BYOD) policy is not described as a strategy to maintain network security.
Hence, the right answer is option B. Bring your own device (BYOD) policy
Read more about BYOD at https://brainly.com/question/32968386
#SPJ11
virtual conections with science and technology. Explain , what are being revealed and what are being concealed
Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.
What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.
To learn more about technology
https://brainly.com/question/25110079
#SPJ13
What is tahe difference between a cone and a prism
prism is (geometry) a polyhedron with parallel ends of the same size and shape, the other faces being parallelogram-shaped sides while cone is (label) a surface of revolution formed by rotating a segment of a line around another line that intersects the first line.
When was Microsoft released to public schools?
Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service
Answer:
C. user accounts
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.
Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.
In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.
Answer:
user accounts
Explanation:
When you rehearse timings you should
Answer:
i tink is slide
Explanation:
Answer:
is this the question? sorry im just confused it looks like you typed it wrong or sum
Explanation:
Mathematical foundations of computer science
The result set of the following SQL query would contain how many rows? Do not count either the column headings or the table heading as rows.
SELECT * FROM PartNeeds WHERE Supplier = 31 OR Project = 1
PartNeeds
Supplier PartNumber Project
23 1092 1
23 1101 3
23 9048 4
31 4975 3
31 3477 2
32 6984 4
32 9191 2.
33 1001 1
The result set of the SQL query would contain 4 rows.
How many rows would the result set contain for the given SQL query?
The given SQL query retrieves rows from the "PartNeeds" table based on the specified conditions.
The conditions state that the "Supplier" column should have a value of 31 OR the "Project" column should have a value of 1.
Looking at the provided table, we can see that there are two rows where the "Supplier" column has a value of 31 and two rows where the "Project" column has a value of 1.
we don't count the column headings or the table heading as rows, so we only consider the actual data rows in the result set.
Learn more about SQL query
brainly.com/question/31663284
#SPJ11
Which of the following RAID types would be best for an array of 4TB Nearline-SAS drives?
a. RAID6
b. RAID0
c. RAID5
d. RAID1
The RAID types that are recommended for an array of 4TB Nearline-SAS drives are RAID6. This is option A
RAID 6 is also known as block-level striping with double distributed parity. It's a kind of RAID that may tolerate up to two drive failures while still being able to function. RAID 6, like RAID 5, employs striping with distributed parity. However, it does so with an extra parity block.
RAID 0, which is also known as disk striping, is one of the first RAID types to be created. It's a sort of RAID that stripes data across a series of disks with no parity or mirroring.
So, the correct answer is A
Learn more about RAID level at
https://brainly.com/question/32874652
#SPJ11
when you go to download (what looks like a perfectly normal) music file for a song you can't get out of your head, you quickly realize that the file isn't as safe as you once thought it was. your computer begins to act buggy and you become worried. you log onto your bank account and notice that all the money in it has been pulled from your account. this is an example of a(n
This is an example of cybercrime. In the case of the example above, the person has fallen victim to a type of cybercrime known as identity theft.
The Dangers of CybercrimeCybercrime is a growing problem in today's world. With the rise of the internet and the increasing use of computers, more and more people are falling victim to cybercrime.
This type of crime can take many different forms, from identity theft and fraud to malware and phishing attacks. In the case of the example above, the person has fallen victim to a type of cybercrime known as identity theft.
Identity theftThis is where someone is able to gain access to your personal information, such as your bank account details, and use it to their own advantage. This can be a very frightening experience, and can have a serious impact on your life.
Learn more about Identity theft at: https://brainly.com/question/12432985
#SPJ4
the way information from my computer is given back to the user is called
Answer:
Add answer???
Explanation:
Write long answer to the following question. a. Define microcomputer. Explain the types of microcomputers in detail.
Answer:
Microcomputer, an electronic device with a microprocessor as its central processing unit.
Explanation:
There are three types of microprocessors namely, CISC, RISC, and EPIC. ... A microprocessor is basically the brain of the computer. We can also call it simply a processor or CPU. Furthermore, a microprocessor is basically a computer processor that is mounted on a single IC (Integrated Circuit).
Uses transistors for more registers: Transistors are used for storing the complex instr...
RISC: CISC
Fewer registers are used: It requires more number of registers
Answer:
A microcomputer is defined as a small PC having a microprocessor that works as a central processor. A small handheld device that looks like a smartphone with a central microprocessor is an example of a microcomputer.
Types of microcomputers
Desktop Computer Mini Tower Microcomputer Full Tower Microcomputer Laptop Notebook Smartphone Tablet PDAs ServersDesktop Computer:
A desktop computer is a personal computer that handles complex operations and fit easily on your desk. This computer is heavyweight having components such as a separate screen, CPU, Keyboard & Mouse connected to the main unit via wires having USB connectors. The size of Desktop computers is larger than notebooks and laptops. Desktop microcomputers are cheaper and more reliable than notebooks or laptops and can be repaired easily.
Laptop
A laptop microcomputer is a laptop that is much smaller than a desktop computer powered by a battery and designed for low power consumption. A laptop looks like a briefcase and can easily fit on your desk or your lap.
Although laptops and desktop computers have the same functionality there is a great difference between them.
A laptop comes in one unit, with a thin display screen, keyboard touch, and touchpad used for navigation. Speakers are mounted into the unit. A laptop is a multi-tasking computer that is able to perform complex operations just like a desktop computer.
Notebook Computer
Notebook computer just like a physical notebook having ultra-mobile3 inches thick screen with 3.5 pounds weight. This microcomputer can be great for commuters as they are powerful and lightweight. It is easy to carry a notebook computer from one place to another place as it fits easily into your briefcase. You can connect Notebook to the Internet by using a cable or Wi-Fi.
Smartphone
A smartphone is a cell phone that works like a computer and enables you to do much more than just making phone calls and send text . The smartphones are built up with very advanced technology that allows you to browse the Internet and run software programs like a computer.
A smartphone is a Multi-purpose phone that uses a touch screen for input. It is a Multi-tasking phone that can run thousands of smartphone apps including games, personal-use, and business-use programs.
The New generation Smartphone is used to send E-mails, Listening Music, take pictures, and use social media
Tablet
A tablet is a wireless, portable personal computer just like a Mobile Device with a touchscreen interface. The tablet is smaller than a notebook computer but bigger than a Smartphone.
A tablet has the same features as a smartphone such as a Touch screen display, a power full Battery as well as run apps, snipping pictures, and much more.
PDAs
PDAs stands for Personal Digital Assistants, are very small networked computers that can easily fit inside the palm of your hand. The PDAs are much powerful as they are often used as a replacement for desktop or laptop computers. Most of the PDAs have converged into smartphones such as Apple iPhone and Blackberry smartphone.
Mini Tower Microcomputer
The main unit of a mini-tower microcomputer is designed like a small tower. Its elegant design allows you to place it on your desk with less space consumption than a desktop computer. Similar to a desktop computer, wires are the source of connection to peripheral components.
Full Tower Microcomputer
A full tower is a bigger version of the mini-tower microcomputer, wider and higher in size. The basic components of the full tower model include the motherboard, storage device, graphics card, and power supply mounted into a cabinet design.
It also allows you to add additional parts such as drive bays to enhance the speed and functionality of the computer. You can easily fix it underneath your desk or place it on the floor.
Hope you got it
If you have any question just ask me
If you think this is the best answer please mark me as BRAINLIEST
allows you to put text and/or graphic objects anywhere on a page without the objects nearby
wsyiwig
threading
independent placement
grid lines
20) which one of the following statements is not true? a) the internet backbone is owned by the federal government in the united states. b) icann manages the domain name system. c) the iab establishes the overall structure of the internet. d) the internet must conform to laws where it operates. e) w3c determines programming standards for the internet.
The statement that the internet backbone is owned by the federal government in the United States is not true. In fact, the internet backbone is owned by multiple Tier 1 ISPs around the world. No one owns the whole internet backbone and the internet itself is free for everyone.
The internet backboneThe internet is a global network of computers. Its core is the internet backbone, the largest and fastest network linked together with fiber-optic cables around the world. The traffic of the global internet runs here connecting all locations around the globe. This backbone infrastructure is owned by multiple ISP companies.
Learn more about the internet https://brainly.com/question/2780939
#SPJ4
A combination of the three main services in cloud computing
Answer:
: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).
Explanation:
Cloud computing can be broken up into three main services: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). These three services make up what Rackspace calls the Cloud Computing Stack, with SaaS on top, PaaS in the middle, and IaaS on the bottom.
This is an example of what type of formula?
=(D1+D17)
The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function
What are functions in excel?There are different ypes of formula functions in excel such as;
SUMCOUNTCOUNTAIFTRIMMAX & MINNow, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.
Read more about Excel Functions at; https://brainly.com/question/14042837
Please label the parts its urgent Best answer receives a brainliest and 20 points please i need it :) :)
Answer:
B: Floppy Drive
C: Power Button
D: Power Indicator
E: USB Port
F: Headphone port
Answer:
A. hard disk
B. floppy disk
C. power button
D. reset button
E. USB ports
F. mic port
Explanation:
hope it helps .
Our text describes the social network as a significant source of power. Social networking tools such as www.linkedin.com are increasingly leveraged to create and maintain power. Visit the linkedin.com site (create an account if you would like to it is free) and identify the features offered by Linkedln that support the social networking roles (central connectors, boundary spanners, peripheral specialists) discussed in chapter 13 of our text. Finally review the individual exercise "Map your social network" that appears at the end of chapter 13 and reflect on how Linkedln contributes to this process. Post the results of your research.
LinkedIn provides features that support social networking roles discussed in the text.
How is this so?It allows users to connect with a wide range of professionals, acting as central connectors.
The "Groups" feature enables interactions across boundaries, benefiting boundary spanners.
Peripheral specialists can showcase expertise through skills endorsements and publishing content. LinkedIn also aids in mapping social networks by visualizing connections.
Thus, LinkedIn empowers individuals to build and maintain their professional networks while facilitating role-specific activities mentioned in the text.
Learn more about social networking at:
https://brainly.com/question/30918688
#SPJ4
Check the peripherals that are needed to hear music on your computer.
Answer:
speaker and sound card
edge 2021
Draw a flow chart to access the marks of three students. calculate the total avarage and display the result
Answer:
Here, we know that the the total distance is 10m and the total time is 5s . so the avg. speed is 10m5s=2m/s .
Explanation:
what line do you start with to show that what follows after that line consists of html tags
The main answer in one line is: The DOCTYPE declaration signals that the following content consists of HTML tags.
What line signifies that the content following it consists of HTML tags?To indicate that what follows after a specific line consists of HTML tags, you typically start with the DOCTYPE declaration, which defines the version of HTML being used.
The line that indicates the following content consists of HTML tags is the DOCTYPE declaration.
It is usually the first line in an HTML document and specifies the HTML version being used.
The DOCTYPE declaration helps the browser interpret and render the HTML correctly by indicating the specific set of rules and standards to follow.
For example, a commonly used DOCTYPE declaration for HTML5 is `<!DOCTYPE html>`.
Learn more about declaration signals
brainly.com/question/30122799
#SPJ11
Which function would you insert to organize large or complex sets of information that are beyond the capabilities of lists?.
The function that you would insert to organize large or complex sets of information that are beyond the capabilities of lists is known as table.
What is the function of table in database?All of the data in a database is stored in tables, which are database objects. Data is logically arranged in tables using a row-and-column layout akin to a spreadsheet. Each column denotes a record field, and each row denotes a distinct record.
A user-defined function that returns a table is known as a table function (also known as a table-valued function, or TVF). Anywhere a table may be used, so can a table function. Although a table function can take parameters, it behaves similarly to views.
Note that one can use tables to put together large or complex group of information, that are beyond the power of lists.
Learn more about Table function from
https://brainly.com/question/3632175
#SPJ1
HELP ASAP PLEASE!!!
Answer:
Click and drag the mouse to select the cells
Explanation:
if the marks of sani in three subjects are 78, 45 and 62 respectively (each out of 100), write a program to calculate his total marks and percentage marks.
Using the knowledge in the computational language in JAVA it is possible to write a code that writes a program to calculate his total marks and percentage marks.
Writing the codeA potent general-purpose programming language is Java. It is utilized to create embedded systems, big data processing, desktop and mobile applications, and more. Java is one of the most widely used programming languages, with 3 billion devices running it globally, according to Oracle, the company that owns Java.
Class ANS public static void main(string []args); Int.doubleval=("78+45+62"*(100%)/100));float calc(int x, int y, int z){ int Total;float percentage;Total= x + y+ z;percentage= total/100;cout<<” Percentage: “ << percentage << “ Total Marks: “ << Total;return percentage;}System.out.printIn(??)public static void main(String[] args) { double percentage=(78 + 45 + 62)/3; System.out.println(percentage);}
See more about JAVA at
https://brainly.com/question/26642771
#SPJ1
A typical day in programming and software development would involve
Answer:
software development would involve
Explanation:
Any help would be greatly Appreciated! :)
I think the answer is A or E.
Please help I have errors codes and don’t know that they are.
Please help thank You.
which group on the home tab contains the command for changing the fill color of a cell?
The group on the home tab that contains the command for changing the fill color of a cell is called the Styles group.
This group is usually located near the middle of the "Home" tab and contains commands related to formatting cells and ranges in Excel.
The command for changing the fill color of a cell is typically represented by a paint bucket icon, and it can be found in the Styles group. When you click on the icon, a color palette will appear and you can choose the color you want to use to fill the cell. You can also use the "More Colors" option to select from a wider range of colors.
Additionally, you can also access the fill color option by right-clicking on the cell and selecting "Format Cells" from the context menu. Then, in the Format Cells dialog box, navigate to the "Fill" tab.
It's worth noting that this group and its commands may vary depending on the version of Excel you are using. But in general, the Styles group contains commands related to formatting cells and ranges, including the fill color.
Learn more about Styles group at:
brainly.com/question/2986242
#SPJ4