what is a sensitive compartmented information program

Answers

Answer 1

Answer:

cpu

Explanation:


Related Questions

what are worms ? this question is from computer from chapter virus;​

Answers

a computer worm is a stand-alone malicious program which can spread itself to other parts of any device. However, one similarity is that both virus and worms are a subcategory of malware.

Answer:

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

Explanation:

Identify the eight unique features of e-commerce technology and explain how these features set e-commerce apart from more traditional ways of conducting commercial transactions.

Answers

The eight unique features of e-commerce technology are

UniversalityHas a global reach.Universal standardsVery richHas interactivityIt has full information densityIt has personalization featuresIt is a social technology

What are the features  of e-commerce technology about?

Universality is known to be a term that is also called Ubiquity. It is known to be a feature of the  e-commerce technology where the use of internet/web tech is known to be readily available everywhere. Market is said to be made and as such shopping can take place anywhere.

In regards to Global reach, it is known to make use of technology to be able to reaches all of the national boundaries that tends to makes marketspace to make billions in profits.

In terms of its Universal Standards, there has been found to be some group of tech standards, such as internet standards. Richness is seen in its contents such as Video, audio, and tech messages and others.

Therefore, based on the above, The eight unique features of e-commerce technology are

UniversalityHas a global reach.Universal standardsVery richHas interactivityIt has full information densityIt has personalization featuresIt is a social technology

Learn more about e-commerce technology from

https://brainly.com/question/516165

#SPJ1

What is shoulder browsing? A. accessing someone else’s computer without permission B. deceptively observing people type in personal information C. distributing illegal software D. using internet search engines for information

Answers

B. Deceptively observing people type in personal information.

Essentially, think of it as someone standing behind you, looking over your shoulder, watching everything you do on a computer.

Answer:

b

Explanation:

Which of the following is not described in Chapter 6 as a strategy to maintain network security?
Select one:
a. firewall
b. bring your own device (BYOD) policy
c. computer-user policies
d. virtual private network (VPN)

Answers

In Chapter 6, Bring your own device (BYOD) policy is not described as a strategy to maintain network security. Option B.

Network security involves protecting the network and the devices connected to it from unauthorized access, misuse, modification, destruction, or improper disclosure. It includes various strategies, such as authentication, authorization, encryption, firewalls, antivirus software, intrusion detection and prevention systems, virtual private networks (VPNs), computer-user policies, and so on.

In Chapter 6, computer security strategies are described to maintain network security, including firewalls, virtual private networks (VPN), and computer-user policies. But Bring your own device (BYOD) policy is not described as a strategy to maintain network security.

Hence, the right answer is option B. Bring your own device (BYOD) policy

Read more about BYOD at https://brainly.com/question/32968386

#SPJ11

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

What is tahe difference between a cone and a prism

Answers

prism is (geometry) a polyhedron with parallel ends of the same size and shape, the other faces being parallelogram-shaped sides while cone is (label) a surface of revolution formed by rotating a segment of a line around another line that intersects the first line.

When was Microsoft released to public schools?

Answers

April 4
1975...$.$.$.........&.$.$.$....................

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup

Answers

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

Answer:

user accounts

Explanation:

When you rehearse timings you should

Answers

Answer:

i tink is slide

Explanation:

Answer:

is this the question? sorry im just confused it looks like you typed it wrong or sum

Explanation:

Mathematical foundations of computer science
The result set of the following SQL query would contain how many rows? Do not count either the column headings or the table heading as rows.
SELECT * FROM PartNeeds WHERE Supplier = 31 OR Project = 1
PartNeeds
Supplier PartNumber Project
23 1092 1
23 1101 3
23 9048 4
31 4975 3
31 3477 2
32 6984 4
32 9191 2.
33 1001 1

Answers

The result set of the SQL query would contain 4 rows.

How many rows would the result set contain for the given SQL query?

The given SQL query retrieves rows from the "PartNeeds" table based on the specified conditions.

The conditions state that the "Supplier" column should have a value of 31 OR the "Project" column should have a value of 1.

Looking at the provided table, we can see that there are two rows where the "Supplier" column has a value of 31 and two rows where the "Project" column has a value of 1.

we don't count the column headings or the table heading as rows, so we only consider the actual data rows in the result set.

Learn more about SQL query

brainly.com/question/31663284

#SPJ11

Which of the following RAID types would be best for an array of 4TB Nearline-SAS drives?
a. RAID6
b. RAID0
c. RAID5
d. RAID1

Answers

The RAID types that are recommended for an array of 4TB Nearline-SAS drives are RAID6. This is option A

RAID 6 is also known as block-level striping with double distributed parity. It's a kind of RAID that may tolerate up to two drive failures while still being able to function. RAID 6, like RAID 5, employs striping with distributed parity. However, it does so with an extra parity block.

RAID 0, which is also known as disk striping, is one of the first RAID types to be created. It's a sort of RAID that stripes data across a series of disks with no parity or mirroring.

So, the correct answer is A

Learn more about RAID level at

https://brainly.com/question/32874652

#SPJ11

when you go to download (what looks like a perfectly normal) music file for a song you can't get out of your head, you quickly realize that the file isn't as safe as you once thought it was. your computer begins to act buggy and you become worried. you log onto your bank account and notice that all the money in it has been pulled from your account. this is an example of a(n

Answers

This is an example of cybercrime.  In the case of the example above, the person has fallen victim to a type of cybercrime known as identity theft.

The Dangers of Cybercrime

Cybercrime is a growing problem in today's world. With the rise of the internet and the increasing use of computers, more and more people are falling victim to cybercrime.

This type of crime can take many different forms, from identity theft and fraud to malware and phishing attacks. In the case of the example above, the person has fallen victim to a type of cybercrime known as identity theft.

Identity theft

This is where someone is able to gain access to your personal information, such as your bank account details, and use it to their own advantage. This can be a very frightening experience, and can have a serious impact on your life.

Learn more about Identity theft at: https://brainly.com/question/12432985

#SPJ4

the way information from my computer is given back to the user is called​

Answers

Answer:

Add answer???

Explanation:

Write long answer to the following question. a. Define microcomputer. Explain the types of microcomputers in detail.​

Answers

Answer:

Microcomputer, an electronic device with a microprocessor as its central processing unit.

Explanation:

There are three types of microprocessors namely, CISC, RISC, and EPIC. ... A microprocessor is basically the brain of the computer. We can also call it simply a processor or CPU. Furthermore, a microprocessor is basically a computer processor that is mounted on a single IC (Integrated Circuit).

Uses transistors for more registers: Transistors are used for storing the complex instr...

RISC: CISC

Fewer registers are used: It requires more number of registers

Answer:

A microcomputer is defined as a small PC having a microprocessor that works as a central processor. A small handheld device that looks like a smartphone with a central microprocessor is an example of a microcomputer.

Types of microcomputers

Desktop Computer Mini Tower Microcomputer Full Tower Microcomputer Laptop Notebook Smartphone Tablet PDAs Servers

Desktop Computer:

A desktop computer is a personal computer that handles complex operations and fit easily on your desk. This computer is heavyweight having components such as a separate screen, CPU, Keyboard & Mouse connected to the main unit via wires having USB connectors. The size of Desktop computers is larger than notebooks and laptops. Desktop microcomputers are cheaper and more reliable than notebooks or laptops and can be repaired easily.

Laptop

A laptop microcomputer is a laptop that is much smaller than a desktop computer powered by a battery and designed for low power consumption. A laptop looks like a briefcase and can easily fit on your desk or your lap.

Although laptops and desktop computers have the same functionality there is a great difference between them.

A laptop comes in one unit, with a thin display screen, keyboard touch, and touchpad used for navigation. Speakers are mounted into the unit.  A laptop is a multi-tasking computer that is able to perform complex operations just like a desktop computer.

Notebook Computer

Notebook computer just like a physical notebook having ultra-mobile3 inches thick screen with 3.5 pounds weight. This microcomputer can be great for commuters as they are powerful and lightweight. It is easy to carry a notebook computer from one place to another place as it fits easily into your briefcase. You can connect Notebook to the Internet by using a cable or Wi-Fi.

Smartphone

A smartphone is a cell phone that works like a computer and enables you to do much more than just making phone calls and send text . The smartphones are built up with very advanced technology that allows you to browse the Internet and run software programs like a computer.

A smartphone is a Multi-purpose phone that uses a touch screen for input. It is a Multi-tasking phone that can run thousands of smartphone apps including games, personal-use, and business-use programs.

The New generation Smartphone is used to send E-mails, Listening Music, take pictures, and use  social media  

Tablet

A tablet is a wireless, portable personal computer just like a Mobile Device with a touchscreen interface. The tablet is smaller than a notebook computer but bigger than a Smartphone.

A tablet has the same features as a smartphone such as a Touch screen display, a power full Battery as well as run apps, snipping pictures, and much more.

PDAs

PDAs stands for Personal Digital Assistants, are very small networked computers that can easily fit inside the palm of your hand. The PDAs are much powerful as they are often used as a replacement for desktop or laptop computers. Most of the PDAs have converged into smartphones such as Apple iPhone and Blackberry smartphone.

Mini Tower Microcomputer

The main unit of a mini-tower microcomputer is designed like a small tower. Its elegant design allows you to place it on your desk with less space consumption than a desktop computer. Similar to a desktop computer, wires are the source of connection to peripheral components.

Full Tower Microcomputer

A full tower is a bigger version of the mini-tower microcomputer, wider and higher in size. The basic components of the full tower model include the motherboard, storage device, graphics card, and power supply mounted into a cabinet design.

It also allows you to add additional parts such as drive bays to enhance the speed and functionality of the computer. You can easily fix it underneath your desk or place it on the floor.

Hope you got it

If you have any question just ask me

If you think this is the best answer please mark me as BRAINLIEST


allows you to put text and/or graphic objects anywhere on a page without the objects nearby

wsyiwig
threading
independent placement
grid lines

allows you to put text and/or graphic objects anywhere on a page without the objects nearbywsyiwigthreading

Answers

B. Threading (the second one)

20) which one of the following statements is not true? a) the internet backbone is owned by the federal government in the united states. b) icann manages the domain name system. c) the iab establishes the overall structure of the internet. d) the internet must conform to laws where it operates. e) w3c determines programming standards for the internet.

Answers

The statement that the internet backbone is owned by the federal government in the United States is not true. In fact, the internet backbone is owned by multiple Tier 1 ISPs around the world. No one owns the whole internet backbone and the internet itself is free for everyone.

The internet backbone

The internet is a global network of computers. Its core is the internet backbone, the largest and fastest network linked together with fiber-optic cables around the world. The traffic of the global internet runs here connecting all locations around the globe. This backbone infrastructure is owned by multiple ISP companies.

Learn more about the internet https://brainly.com/question/2780939

#SPJ4

A combination of the three main services in cloud computing

Answers

Answer:

: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).

Explanation:

Cloud computing can be broken up into three main services: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). These three services make up what Rackspace calls the Cloud Computing Stack, with SaaS on top, PaaS in the middle, and IaaS on the bottom.

This is an example of what type of formula?
=(D1+D17)

Answers

The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function

What are functions in excel?

There are different ypes of formula functions in excel such as;

SUMCOUNTCOUNTAIFTRIMMAX & MIN

Now, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.

Read more about Excel Functions at; https://brainly.com/question/14042837

Please label the parts its urgent Best answer receives a brainliest and 20 points please i need it :) :) ​

Please label the parts its urgent Best answer receives a brainliest and 20 points please i need it :)

Answers

Answer:

B: Floppy Drive

C: Power Button

D: Power Indicator

E: USB Port

F: Headphone port

Answer:

A. hard disk

B. floppy disk

C. power button

D. reset button

E. USB ports

F. mic port

Explanation:

hope it helps .

Our text describes the social network as a significant source of power. Social networking tools such as www.linkedin.com are increasingly leveraged to create and maintain power. Visit the linkedin.com site (create an account if you would like to it is free) and identify the features offered by Linkedln that support the social networking roles (central connectors, boundary spanners, peripheral specialists) discussed in chapter 13 of our text. Finally review the individual exercise "Map your social network" that appears at the end of chapter 13 and reflect on how Linkedln contributes to this process. Post the results of your research.

Answers

LinkedIn provides features that support social networking roles discussed in the text.

How is this so?

It allows users to connect with a wide range of professionals, acting as central connectors.

The "Groups" feature enables interactions across boundaries, benefiting boundary spanners.

Peripheral specialists can showcase expertise through skills endorsements and publishing content. LinkedIn also aids in mapping social networks by visualizing connections.

Thus, LinkedIn empowers individuals to build and maintain their professional networks while facilitating role-specific activities mentioned in the text.

Learn more about social networking at:

https://brainly.com/question/30918688

#SPJ4

Check the peripherals that are needed to hear music on your computer.

Check the peripherals that are needed to hear music on your computer.

Answers

Answer:

speaker and sound card

edge 2021

Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​

Answers

Answer:

Here, we know that the the total distance is 10m and the total time is 5s . so the avg. speed is 10m5s=2m/s .

Explanation:

what line do you start with to show that what follows after that line consists of html tags

Answers

The main answer in one line is: The DOCTYPE declaration signals that the following content consists of HTML tags.

What line signifies that the content following it consists of HTML tags?

To indicate that what follows after a specific line consists of HTML tags, you typically start with the DOCTYPE declaration, which defines the version of HTML being used.

The line that indicates the following content consists of HTML tags is the DOCTYPE declaration.

It is usually the first line in an HTML document and specifies the HTML version being used.

The DOCTYPE declaration helps the browser interpret and render the HTML correctly by indicating the specific set of rules and standards to follow.

For example, a commonly used DOCTYPE declaration for HTML5 is `<!DOCTYPE html>`.

Learn more about declaration signals

brainly.com/question/30122799

#SPJ11

Which function would you insert to organize large or complex sets of information that are beyond the capabilities of lists?.

Answers

The function that you would insert to organize large or complex sets of information that are beyond the capabilities of lists is known as table.

What is the function of table in database?

All of the data in a database is stored in tables, which are database objects. Data is logically arranged in tables using a row-and-column layout akin to a spreadsheet. Each column denotes a record field, and each row denotes a distinct record.

A user-defined function that returns a table is known as a table function (also known as a table-valued function, or TVF). Anywhere a table may be used, so can a table function. Although a table function can take parameters, it behaves similarly to views.

Note that one can use tables to put together large or complex group of information, that are beyond the power of lists.

Learn more about Table function from

https://brainly.com/question/3632175

#SPJ1

HELP ASAP PLEASE!!!

HELP ASAP PLEASE!!!

Answers

Answer:

Click and drag the mouse to select the cells

Explanation:

if the marks of sani in three subjects are 78, 45 and 62 respectively (each out of 100), write a program to calculate his total marks and percentage marks.

Answers

Using the knowledge in the computational language in JAVA it is possible to write a code that writes a program to calculate his total marks and percentage marks.

Writing the code

A potent general-purpose programming language is Java. It is utilized to create embedded systems, big data processing, desktop and mobile applications, and more. Java is one of the most widely used programming languages, with 3 billion devices running it globally, according to Oracle, the company that owns Java.

Class ANS public static void main(string []args); Int.doubleval=("78+45+62"*(100%)/100));float calc(int x, int y, int z){ int Total;float percentage;Total= x + y+ z;percentage= total/100;cout&lt;&lt;” Percentage: “ &lt;&lt; percentage &lt;&lt; “ Total Marks: “ &lt;&lt; Total;return percentage;}System.out.printIn(??)public static void main(String[] args) {    double percentage=(78 + 45 + 62)/3;    System.out.println(percentage);}

See more about JAVA at

https://brainly.com/question/26642771

#SPJ1

A typical day in programming and software development would involve

Answers

Answer:

software development would involve

Explanation:

Any help would be greatly Appreciated! :)​

Any help would be greatly Appreciated! :)

Answers

I think the answer is A or E.

Please help I have errors codes and don’t know that they are.
Please help thank You.

Please help I have errors codes and dont know that they are.Please help thank You.

Answers

Refresh, power off and repeat
Yeah ummmm about that

which group on the home tab contains the command for changing the fill color of a cell?

Answers

The group on the home tab that contains the command for changing the fill color of a cell is called the Styles group.

This group is usually located near the middle of the "Home" tab and contains commands related to formatting cells and ranges in Excel.

The command for changing the fill color of a cell is typically represented by a paint bucket icon, and it can be found in the Styles group. When you click on the icon, a color palette will appear and you can choose the color you want to use to fill the cell. You can also use the "More Colors" option to select from a wider range of colors.

Additionally, you can also access the fill color option by right-clicking on the cell and selecting "Format Cells" from the context menu. Then, in the Format Cells dialog box, navigate to the "Fill" tab.

It's worth noting that this group and its commands may vary depending on the version of Excel you are using. But in general, the Styles group contains commands related to formatting cells and ranges, including the fill color.

Learn more about Styles group at:

brainly.com/question/2986242

#SPJ4

Other Questions
for a uniform object, we can assume that any torque due to the weight of the object acts as if all the mass of the object is concentrated at the object's center of mass (or center of gravity). T/F a. Find an equation in the form V() = Vo(1+r) 'where Vo is the value of the diamond in dollars in June 2005, r is the average annual growth rate, t is the time in years since June 2005, and V() is the value of the diamond in dollars at time t. solve the equation show your solution x plus 12 equals 7 when giving a speech, it is suggested that you should ______ to scope out the environment and see which factors you can control and which you will have to adjust to. Hello! My Spanish isnt good. May someone please help me out? Its urgent!I just need number 4 What is the mode of 1 1 2 2 3 3 4 4? What is the method of cooking chicken by browning in hot fat and then covering and cooking in the oven? If the Gini Coefficient in Kennesania is .43 in 1976, .47 in 1982, 41 in 1987 and 49 in 1990, which year has the highest level of income Equality? A. 1976 . C. D. 1982 1987 1990 Si tuvieras la posilibidad de sobrevolar el ecenario donde aparecioel ser humano como lo describirias Using the following model and corresponding parameter estimates, predict the (approximate) value of y variable when x=1 : y=+lnx+u The parameter estimates are 1=2 and 2=1 [Parametes estimates are given in bold font] a. 1b. 2c. 3d. 4 PLEASE HELP THIS IS FOR FINALS PLEASE I BEG PLEASE HELP MENO LINKS PLEASEWithin the worlds oceans, high salinity values are usually found _________________ coastlines due to _______________________.anorth of , the lower temperature of the ocean waterbsouth of , the higher temperature of the ocean watercfar from , the lack of an influx of fresh waterdnear to , fresh water deposition Many college graduates who are employed full-time have longer than 40-hour work weeks. Suppose that we wish to estimate the mean number of hours, H,worked per week by college graduates employed full-time. We'll choose a random sample of college graduates employed full-time and use the mean of thissample to estimate . Assuming that the standard deviation of the number of hours worked by college graduates is 6.30 hours per week, what is the minimumsample size needed in order for us to be 90% confident that our estimate is within 1.4 hours per week of ?Carry your intermediate computations to at least three decimal places. Write your answer as a whole number (and make sure that it is the minimum wholenumber that satisfies the requirements).(If necessary, consult a list of formulas.)CheckX3Submit AssignmSave For Later2022 McGraw Hill LLC. All Rights Reserved Terms of Use Privacy CenterUSDec 5 1. Discussion (5 Points) Although many argue that the gig economy has opened up opportunities for individuals to be self-employed in ways that complement their lifestyle, the investments that gig giant Uber is making suggest a different kind of future for the ubersuccessful taxi substitute. What do you think Uber has in mind? 2. Discussion (5 Points) What are some of the potential applications for fleets of self-driving vehicles? What role might this kind of infrastructure play in towns and cities in the future? How might Uber leverage these kinds of assets to generate a profit? Do you see a way for Uber to be successful while still employing human drivers? How? 3. Problem Solving (10 Points) You've been hired on by Uber's CEO Dara Khosrowshahi as the chief financial officer and asked to address the issue of huge quarterly losses, despite massive sales revenues. The Uber fleet is not likely to be "self-driving" for at least another five years, and it isn't clear whether the current model will be sustainable until then, particularly given increasing competitive pressures to raise drivers' rates from companies such as Lyft. What steps could you take to address these competing pressures - market pressures to raise rates and the need to generate profits? 4. Further Research (5 Bonus Points) Look into some of the more well-known gig companies currently making headlines in the financial press. Are any of these companies generating a profit? What factors are at work here? How have these profitable companies organized to become profitable? Are any of these companies moving toward models that remove the "human factor"- - that mechanize in the way that it looks like Uber could be seeking to mechanize? How are the financial values of some of these gig companies being determined? In light of the huge losses experienced by some gig economies, what factors are likely playing a role in these financial evaluations? Are people speculating on an unknown future? Victor is an information security professional investigating an incident. Which service can he use to identify the user that made the api call when an amazon ec2 instance is terminated? To which outcome competency is the tenet about enhancing communication through ethnically sensitive, nonsexist social work practice most directly related?a. Evaluationb. Engagementc. Policy Practiced. Communication What would you do if someone took away your rights? Myster Co purchased equipment for $25 000. Originally it had an estimated useful life of 4 years and a residual value of $5000. At the beginning of the 4th year of the equipments life the estimated useful life was extended by a further three years and the residual value was reduced to zero. Myster Co uses the straight-line method to depreciate its equipment. At the end of year 4, how much depreciation should be recorded for the computer?a.$5,000b.$4,000c.$1,250d.$2,500 Which statement is correct Which of the following fractions is equivalent to -84 in the least common terms? -190 Electric field lines can never cross. What would crossed electric field lines indicate?a field pointing in two directionsan attractive force on a chargea nonuniform area of the fielda place where the field strength is zero