Issues in plagiarism and copyright when blogging can be prevented. True or false​

Answers

Answer 1

Answer:

It’s false

Explanation:

I can’t explain it’s too confusing


Related Questions

which of the following is not a benefit of aws cloud computing​

Answers

Answer: High latency, temporary and disposable resources are not the benefits of AWS cloud computing.

Explanation: AWS is the most reliable and broad platform that offers a wide range of feature services to individuals globally.

Hope this helps (:

of what is famous Ted Nelson?​

Answers

Answer:

Nelson proposed a system where copying and linking any text excerpt, image or form was possible.

Explanation:

Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.

How I know:

I goggle it.

Please help ASAP! will mark brianliest! 30 points!
Which popular VPN protocol allows segment access for users?

IPsec
PPTP
L2TP
SSL VPN

Answers

Answer:

SSL VPN

Explanation:

Secure Sockets Layer, or SSL VPN, is the second common VPN protocol.

A big plus for SSL VPNs is that they can allow segmented access for users. For example, users can be limited to checking email and accessing shared drives rather than having access to the entire network.

SSL VPNs come in two types, SSL portal and SSL tunnel.

SSL Portal VPNs

SSL Portal VPNs allow a user to securely access the web from a browser once the user logs into the VPN’s online portal using a specified method of authorization.

This type of SSL VPN gets its name because of how the user accesses it – through a single web page, or portal. The page acts as a single gateway to the other services available on the secured network.

SSL Tunnel VPNs

SSL Tunnel VPNs allow the user to not only access the web securely, but to also use applications and other network services that aren’t based on the web.

Due to their sophisticated segmentation capabilities, SSL VPNs often require more skill to implement.

VPNs are not a cure-all

Of course, what you could do is circumvent the entire debate around VPN SSL vs IPSEC. Our Gatekeeper offering is an enhanced alternative to VPN with no client, that still offers two-factor authentication to secure remote access.

Wherever you land between VPN SSL vs IPSEC, of if you join #TeamGatekeeper, having one of these tools to protect web traffic is a great way to help secure information, but it’s not an end-all be-all security solution.

After all, a VPN won’t protect your employees from social engineering attacks such as email phishing.

(hope this helps can i plz brainlist it will make my day :D hehe)

In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address and the last address of this block? Find the number of addresses in the block?
Hint: if your roll no is 33 then your ip address will look like this: 33.33.33.33/20

Answers

Answer:

If there’s one topic that trips people up (both new and experienced) in the networking industry, it is that of Subnetting.

One of the reasons this happens is that one has to perform (mental) calculations in decimal and also binary. Another reason is that many people have not had enough practice with subnetting.

In this article, we will discuss what Subnetting is, why it came about, its usefulness, and how to do subnetting the proper way. To make this article as practical as possible, we will go through many examples.

Note: While subnetting applies to both IPv4 and IPv6, this article will only focus on IPv4. The same concepts explained here can be applied to IPv6. Moreover, subnetting in IPv6 is more of a want rather than a necessity because of the large address space.

IP address network

For example, any traffic with a destination IP address of 192.168.1.101 will be delivered to PC1, while traffic addressed to 192.168.1.250 will be delivered to SERVER.

Note: This is an oversimplification of things just for understanding sake and refers to Unicast (one-to-one) IPv4 addresses. Traffic sent to Multicast (one-to-many) and Broadcast (one-to-all) IP addresses can be delivered to multiple devices. Also, features like Network Address Translation (NAT) allow one IP address to be shared by multiple devices.

To help your understanding of IP addresses and subnetting, you need to resolve the following fact in your head: Computers think in binary, that is, 0s and 1s. Therefore, even though we see an IP address represented like 192.168.1.250, it is actually just a string of bits – 32 bits in total for IPv4 addresses.

To make them more readable for humans, IPv4 addresses are represented in dotted decimal notation where the 32 bits are divided into 4 blocks of 8 bits (also known as an octet), and each block is converted to a decimal number.

For example, 01110100 in binary is 116 in decimal:

A unicast IPv4 address such as 192.168.1.250 can be divided into two parts: Network portion and Host ID. So what does this mean? Well, IPv4 addresses were originally designed based on classes: Class A to Class E. Multicast addresses are assigned from the Class D range while Class E is reserved for experimental use, leaving us with Class A to C:

Class A: Uses the first 8 bits for the Network portion leaving 24 bits for host IDs. The leftmost bit is set to “0”.

Class B: Uses the first 16 bits for the Network portion leaving 16 bits for host IDs. The two leftmost bits are set to “10”.

Class C: Uses the first 24 bits for the Network portion leaving 8 bits for host IDs. The three leftmost bits are set to “110”.

Note: The range of Class A is actually 1-126 because 0.x.x.x and 127.x.x.x are reserved.

With these classes, a computer/device can look at the first three bits of any IP address and determine what class it belongs to. For example, the 192.168.1.250 IP address clearly falls into the Class C range.

Looking at the Host ID portion of the classes, we can determine how many hosts (or number of individual IP addresses) a network in each class will support. For example, a Class C network will ideally support up to 256 host IDs i.e. from 00000000 (decimal 0) to 11111111 (decimal 255). However, two of these addresses cannot be assigned to hosts because the first (all 0s) represents the network address while the last (all 1s) represents the broadcast address. This leaves us with 254 host IDs. A simple formula to calculate the number of hosts supported

Explanation: Final answer is Start address: 192.168.58.0 + 1 = 192.168.58.1

End address: 192.168.58.16 – 2 = 192.168.58.14

Broadcast address: 192.168.58.16 – 1 = 192.168.58.15

Help fast

When comparing and what is the main difference?
O The first symbol is for reviewing text and the second for enlarging text.
The first symbol is for spacing and the second for sizing.
O The first symbol is for viewing text and the second for inserting text.
O The first symbol is for inserting text and the second for viewing text.

Answers

Answer:

The first symbol is for inserting text and the second for viewing text

Explanation:

If you wanted to use the numeric key pad to multiply 8 and 5 and then divide by 2, you would type
1. 8/5*2
2. 5/2/8
3. 8*5*2
4. 8*5/2

Answers

Answer:

Option 4 would be your best answer

Explanation:

The * means multiply

And the / means Divide

Hope this helps :D

4) 8*5/2 would be the correct answer to your question

compared to EMT, IMC is?​

Answers

When compared to EMT, IMC (intermediate metal conduit) is a thinner and also have a lighter-weight .

What is the comparison in IMC vs. EMT

Note that EMT  is one that cannot be threaded and is not set up for strong connections like IMC and RMC.

In regards to residential wiring, IMC is known to be the one that is said to be often and usually limited to service entrance assemblies as well as exposed and it often  runs to and fro.

Therefore, When compared to EMT, IMC (intermediate metal conduit) is a thinner and also have a lighter-weight .

Learn more about metal conduit from

https://brainly.com/question/5023977

#SPJ1

i need help with this ​

Answers

Answer:

Answer is D

Explanation:

cameras did not use disks until the late 1990s  :D

edit: sorry my previous answer was wrong, I apoligize for the mishap :(

Name a type of malware designed to provide unauthorized , remote access to a user's computer

Answers

This is called Remote Access Trojan.

HELP PLS
Which technologies have made global communication instant and more effective? Choose THREE answers.

social media
wireless devices
smart phones
automobiles
printed newspapers

Answers

Answer:

(1). social media

(2). wireless devices

(3). smart phones

Explanation:

The three technologies that have made global communication instant and more effective are social media, wireless devices, and smart phones.

Here,

Social media platforms have revolutionized the way people communicate globally. They allow individuals to connect, share information, and communicate with others in real-time, regardless of geographical location.

Wireless devices, such as laptops, tablets, and smartwatches, have eliminated the need for physical connections like cables and wires. They allow users to access the internet and communicate with others from virtually anywhere with a wireless signal.

Smartphones combine the features of a mobile phone with advanced computing capabilities. They provide instant communication through voice calls, text messages, emails, and various messaging apps.

Smartphones also allow users to access social media platforms and use wireless internet, making global communication more convenient and efficient.

Know more about communication technologies,

https://brainly.com/question/33037966

#SPJ6

Audio texts use:

A. Sound and music
B. More than a medium
C. Media that activates all the senses
D. Color and Images

Answers

Answer:

a

Explanation:

are used for mechanical power transmission over long distances
A. Spur Gears
B. Helical Gears
C. Planetary Gears
D. Chain and Sprockets

Answers

Answer:

D. Chain and Sprockets

Explanation:

Chains and sprockets are power transmission tools. The roller chain is connected to a toothed wheel which is the sprocket. The combination provides mechanical power to the wheels of vehicles.

An advantage they possess is their ability to transmit mechanical power over both short and long distances. They have a high degree of efficiency but they require constant lubrication. They also produce noise during operation.

IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?

Answers

Answer:

Sweden or Wales maybe?

Explanation:

Hope this helps!

Answer:

America if you play in secret

Explanation:

V. Write a program in python for the following:
[10]
a) Jennifer wants to carpet her new room with pink carpet. Create a program that will ask the user for the two
dimensions of a room (length and width) and then calculate the area of the room, (length x width), before
finally displaying the answer​

Answers

Answer:

length = input("length of room:  ")

width = input("Width of room:  ")

Area = float(length) * float(width)

print("Area of room is: ", Area)

Use three or more sentences to explain to someone why they might need to use a virtual machine.

Answers

Answer:

Benefits of Virtualization

Reduced capital and operating costs.

Minimized or eliminated downtime.

Increased IT productivity, efficiency, agility and responsiveness.

Faster provisioning of applications and resources.

Greater business continuity and disaster recovery.

Simplified data center management.

what percent of records are temporary, if you are not in the OSD?​

Answers

Answer:

Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.

Explanation:

What episode and Season of Simpsons is this

Answers

Answer:

season 9 episode 23.65 and the bases it 12

PLZZ HELPP MEE!!

What projects would Excel best be used for? Be sure to say the name of the project and how you would go about creating it.

Answers

In my opinion, I believe Excel would be best used for any project really. But it will be most helpful when it comes down to reports and finance data and things like that. I would do something like how much income will I receive over the next few months to a year. And I will create a graph sowing my income for each month. But like I stated earlier, Excel is mainly used for graphs and almost every project has a graph so, it would actually be good for all things.

Hope this helps! :))

Need help ASAP. Will mark brainliest!
Which of the following is assigned to every network device?

Digital address
Logical address
MAC address
Personal address

Answers

A feature which is assigned to every (all) network device is: C. MAC address.

What is a MAC address?

MAC address is an abbreviation for media access control address and it can be defined as a unique identifier that is generally assigned by manufacturers to a network interface controller (NIC) of every (all) network device, especially for use as a network address when the device is communicating with other network devices within a network segment.

This ultimately implies that, media access control address (MAC address) is a feature which is assigned to every (all) network device by the manufacturers.

Read more on MAC address here: https://brainly.com/question/25246068

Answer: MAC Address

Explanation: Took the test and it was right :)

Please hellppp,is a yr 9 question

Answers

Answer:

See picture below.

2. As a student (now or in college) name a way you can use Excel. How can that help you as a student?
3. What are some of the important rules to remember when using formulas in Excel? (ex. formulas always
begin with an '- sign)
Ahsteh

Answers

Answer:

The more you try some simple Excel tips and tricks, the more comfortable you’ll be using advanced Excel tricks moving forward. In addition to helping you in college, these Excel tips and tricks can help you secure and retain a job after you graduate. In 2013, IDC published a white paper which was originally commissioned by Microsoft Corporation.

Explanation:

PLEASE HELP ME WITH THIS i will mark you brainlist

Answers

Answer: you have to check your email and click on the microsoft email they sent you and enter the code in the email.

Explanation: plz mark brainliest

A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of data?

Answers

Answer:

Line graphs allow us to see overall trends such as an increase or decrease in data over time. Bar graphs are used to compare facts.

Mrs. Toma is preparing a marksheet of Final term using Excel. She needs to 1
add a new subject title in the worksheet. Now, which component does she
need to add in her marksheet?

Answers

Answer:

a

Explanation:

What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
A. 0.067
B. 0.533
C. 8
D. 15

Answers

Answer:

8

Explanation:

Gear reduction = driven gear teeth / driving gear teeth

First stage reduction :

Driven gear teeth = 36

Driving gear teeth = 12

36 /12 = 3

Second stage reduction :

Driven gear teeth = 60

Driving gear teeth = 12

60 /12 = 5

First stage + second stage

3 + 5 = 8

Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of a mailbox for storage.
Creating an Outlook data file
data files in storage on a computer.

Answers

Answer:

Archiving data files manages the size of a mailbox for  

local

storage.

Creating an Outlook data file  

protects

data files in storage on a computer.

Explanation:

Because its right.

Answer:

an increase in cloud computing

Explanation:

The ‘rect()'block has two inputs that
control where it's drawn - the x and y position. If
you wanted these commands to draw different
sizes of rectangles, what additional inputs would
you need to give the blocks?

Answers

Answer is yes beacause

The w and h, which are the width and height respectively, are additional inputs that should be given to the block to draw rectangles of different sizes.

In the Drawing drawer of the Game Lab toolbox, the rect() command is used for drawing a rectangle. It takes in four inputs as arguments. These arguments are;

i. x - the x-coordinate of the point relative to the top-left corner of the display area where the shape will begin from. This is the first argument.

ii. y - the y-coordinate of the point relative to the top-left corner of the display area where the shape will begin from. This is the second argument.

iii. w - the width of the rectangle to be drawn. This is the third argument. It is measured in pixels.

iv. h - the height of the rectangle to be drawn. This is the fourth argument. It is measured in pixels.

For example, to draw a rectangle with a height of 50px, width of 60px and starting at point (x, y) = (40, 40), the command rect() will be called as follows;

rect(40, 40, 60, 50)

Take a look at another example: To draw a rectangle with a width of 120px, height of 60px and starting at point (x, y) = (30, 50), the command rect() will be called as follows;

rect(30, 50, 120, 60)

Therefore, the width and height inputs should be specified in order to draw different sizes of rectangles.

If we use 6 bits for representing positive and negative numbers using 2's
complement methods, what is the value of 11100?

Answers

Answer:

-4


Explanation:
In binary, 11100 is 28
But in the two’s complement method, it will equals = (-4).
the last number always represents negative number.
In other words, if this (101010) with 6 digits. Without using two’s complement method, it would be 42 in binary. But with two’s complement method, it would ( - 22)


I hope this helps. Please don’t hesitate to ask if u concerning my answer
Yeeeeeeeeeeeeeeeeeeeeeeee

When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comprised of computing time and the overhead time required for locked critical sections and/or to send data from one processor to another. Assume a program requires t = 100 s of execution time on one processor. When run p processors, each processor requires t/p s, as well as an additional 4 s of overhead, irrespective of the number of processors. Compute the per-processor execution time for 2, 4, 8, 16, 32, 64, and 128 processors. For each case, list the corresponding speedup relative to a single processor and the ratio between actual speedup versus ideal speedup (speedup if there was no overhead).

Answers

I only need points for my questions

I need help also this counts as my second giveaway and last for today
Btw I give tons of points so you wanna answer Don't steal points

Answers

Answer: Visual Card

Explanation: Because it’s graphics, it means the visual of the game

Other Questions
Please help! This is for a science project.How do I turn this sentence into my own words?The ability to roar has an anatomical basis, often involving modifications to the larynx and hybrid bone and enlarged internal air spaces for low frequency acoustic resonace. Name the smallest state (by area) in the United States. What is this states nickname? Student was identifying the formula of 1 mole of unknown powder. When it was placed on a scale, it was reading 399.91 g/mol. Which ofthe following compounds can it be?A AI(NO3)3B. C3H8C. Fe2(SO4)3D. CaCl2 5(-2k-3)+2k5(2k3)+2k5, left parenthesis, minus, 2, k, minus, 3, right parenthesis, plus, 2, k equals Here It Go :) I Need Help On This A soccer player tears the synovial membrane near his knee. How will this affect the membrane's ability todo its job?A. There will be more friction when the bones in the joint try to move.B. The space between the bones will solidify.C. The tissue that connects bone to bone will no longer be protected.D. The knee will fill with blood and become unmovable. Plz help i will give the first person with the correct answer branliest (show work) A person invested $7,900 in an account growing at a rate allowing the money todouble every 8 years. How much money would be in the account after 5 years, to thenearest dollar?I need answers fast "The people are evidently taking every preparations for resistance. They are taking every means to provide themselves with arms"-Frederick Mackenzie 1775This quote is from a British officers diary. To whom is this officer referring?A. British soldiersB. the militias of BostonC. the Continental congressD. British loyalists Water is a renewable resource that is constantly generated through the water cycle. The ocean contains most of the Earth's available water, but it is undrinkable because it contains salt. All but one of the reasons listed are reasons why desalination is not a popular option to have clean, drinkable water. it is expensive to desalinate water. B It could possibly affect the marine ecosystems. Transporting the water to water scarce regions is difficult. D) Since evaporation is involved in deselination, the drinking water is too hot for consumption. Jonas has 3 more than two times the number of video games that Amber has. Amber has 12 games. How many does Jonas have? To solve this problem using algebra, which of the following is one step that you will take? Please help ASAP!!!!What kind of activities did jack Dempsey do in the 1920s?*Must be 4 to 6 sentences* Which common characteristic of planets do Saturn and Earth share?? 14 - 3c + 8 + c ???? A letter to the chairman of your local government area requesting some amenities in your area.Not less than 350 words A line includes the points (8,5) and (9, 5). What is its equation in point-slope form? Photosynthesis+ carbon sunlightdioxide+oxygensugar +water +Cellularrespiration+ energy how many grams are in 7.4 moles of HgS? Find X. Round to nearest tenth. Use pic [-1+(2-56)](-5+2)+1