Answer:
1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.
2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.
3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got sc/mmed it might apply to this question
What would you classify anti-malware software as?
SaaS
enterprising
cloud
security
Answer:
enterpriseing is the answer
A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the administrator making the spreadsheet, adds an image of his company’s logo, he realizes it would fit and look best if turned to read sideways.
How can Kyle change the image to make it fit in such a way?
He can select the image and hold down on the green handle above it while sliding the mouse.
He can select the image and hold down Control while sliding the scroll bar to the right.
He can press the PivotTable button and select “Rotate 90 degrees” and then click OK.
He can click on the Pictures Tool tab and select press Artistic Effects to access the rotate option
Answer:
On a spreadsheet application including MS Excel;
He can select the image and hold down the rotation handle above it while sliding the mouse
Explanation:
Manual rotation of a picture or a text box can be performed by selecting the image or text box in MS Word or a spreadsheet application such as MS Excel. With the mouse select the rotation handle of the picture and drag in the direction desired, left or right.
So as to limit the rotation to 15 degrees hold down the shift button while dragging the rotation handle by clicking on it with a mouse and dragging in the desired direction
Opportunity and Spirit, NASA's Mars Exploration Rovers, were the first scientific instruments able to collect samples directly from the surface of Mars. One of the mission's goals was to determine the likelihood that life ever existed on Mars. How were Spirit and Opportunity best able to supply evidence that in the distant past Mars may have had an environment favorable to life?
Answer:
The rovers sent images of cross beds, centimeter-scale areas in rock layers, that could indicate whether water once flowed on Mars.
Explanation:
What is the web page path on the web server for the URL:
http://www.mydomain.com/main/index.html?
O http://
O www.mydomain
O main/index.html
O index.html
Answer:
C: main/index.html
Explanation:
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? a. Use mail merge for steps 1 and 2 and a word processor for step 3. b. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c. Use a word processor for steps 1 and 2 and a graphics software for step 3. d. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Answer:
1: Word Processor
2: Graphics Software
3: Mail Merge
Explanation:
Given
1. Create a list of invitees
2. Design an invitation card
3. Personalize the card
Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.
So task 1 requires a word processor
An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.
So task 1 requires a graphics software
Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.
(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?
Answer:
a trade mark is something where someone owns the rights to something in a specific country
HELPPPP KOKICHI IS OUT TO KILL ME
Answer:
rest in piece :(
Explanation:
Many applications ask, "Why did you leave your previous position?" Choose the best answer out of the examples below.
We can't see the examples therefore we can't help you try asking the question again with a picture of the examples
can you help me with my homework what should i do
Answer:
what is matter and two examples
technically a coding question utilizing python how would one calculate a square root
Answer:
import math
math.sqrt( x )
Explanation:
The basic code that can be written to calculate the square root of a number is as follows
import math
math.sqrt( x )
adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf
Answer:
this belongs on r/ihadastroke
Explanation:
Answer: ok
Explanation:
You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5
Answer:
Explanation:
The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.
import java.util.Scanner;
class Brainly
{
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
int[] person = new int[5];
System.out.println("Enter age of individual 1: ");
person[0] = in.nextInt();
System.out.println("Enter age of individual 2: ");
person[1] = in.nextInt();
System.out.println("Enter age of individual 3: ");
person[2] = in.nextInt();
System.out.println("Enter age of individual 4: ");
person[3] = in.nextInt();
System.out.println("Enter age of individual 5: ");
person[4] = in.nextInt();
int youngest = person[0];
for (int x = 0; x < person.length; x++) {
if (person[x] < youngest) {
youngest = person[x];
}
}
double discount = 1 - (((double)youngest) / 100);
double output = 50 * discount;
System.out.println("Total Price: " + output + " the youngest is " + youngest);
}
}
Select the correct answer from each drop-down menu.
Complete the following sentences.
_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.
Options for the first box are: managers, A teams, an individuals
Options for the second box are:internal, specific, external
Answer:
First, A teams, Second ,Specific
Explanation:
select all the correct answers
which two programming languages are most commonly used to write web based software programs?
1. Python
2. C
3. PHP
3. Ada
Answer:
PythonPHPExplanation:
Plato Correct!
The two programming languages most commonly used to create software for websites are Python and PHP.
We have,
Python is known for being easy to understand and read, which makes it popular for building web applications.
It has tools and frameworks that help developers create websites quickly.
PHP is a language specifically designed for web development.
It is used to write code that runs on the server and helps create interactive websites.
Many popular websites and content management systems, like WordPress, are built with PHP.
While the C language can also be used for web development, it is not as commonly used as Python and PHP in this context.
Ada is a programming language mainly used in specialized industries like aerospace and defense.
It is not commonly used for creating websites.
Thus,
The two programming languages most commonly used to create software for websites are Python and PHP.
Learn more about programming languages here:
https://brainly.com/question/23959041
#SPJ4
Identify the characteristics of syntax errors. Choose all that apply.
programmer did not follow the program language conventions
may be highlighted while writing the program
can be caused by mistyping or misspelling while writing the program
does not cause an error message
Answer:
Explanation:
Identify the characteristics of syntax errors. Choose all that apply.
programmer did not follow the program language conventions
may be highlighted while writing the program
can be caused by mistyping or misspelling while writing the program
Answer:
Its A B C i got it right
Explanation:
write examples of hacking in internet?
Answer:
Although hacking is very bad, it can be found everywhere and anywhere.
Examples: Phishing, password checking, and keyloggers
Explanation:
Explanation:
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.
To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.
the advantages and disadvantages of internet
What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0]; for (int i = 1; i < numbers.length; i++) { if (numbers[i] < value) value = numbers[i]; } The value variable will contain the highest value in the numbers array. The value variable will contain the sum of all the values in the numbers array. The value variable will contain the average of all the values in the numbers array. The value variable will contain the lowest value in the numbers array.
Answer:
The value variable will contain the lowest value in the numbers array.
Explanation:
Given
The given code segment
Required
The result of the code when executed
The illustration of the code is to determine the smallest of the array.
This is shown below
First, the value variable is initialized to the first index element
int value = numbers[0];
This iterates through the elements of the array starting from the second
for (int i = 1; i < numbers.length; i++) {
This checks if current element is less than value.
if (numbers[i] < value)
If yes, value is set to numbers[i]; which is smaller than value
value = numbers[i];
Hence, the end result will save the smallest in value
Consider the following code.
public void printNumbers(int x, int y) {
if (x < 5) {
System.out.println("x: " + x);
}
if (y > 5) {
System.out.println("y: " + y);
}
int a = (int)(Math.random() * 10);
int b = (int)(Math.random() * 10);
if (x != y) printNumbers(a, b);
}
Which of the following conditions will cause recursion to stop with certainty?
A. x < 5
B. x < 5 or y > 5
C. x != y
D. x == y
Consider the following code.
public static int recur3(int n) {
if (n == 0) return 0;
if (n == 1) return 1;
if (n == 2) return 2;
return recur3(n - 1) + recur3(n - 2) + recur3(n - 3);
}
What value would be returned if this method were called and passed a value of 5?
A. 3
B. 9
C. 11
D. 16
Which of the following methods correctly calculates the value of a number x raised to the power of n using recursion?
A.
public static int pow(int x, int n) {
if (x == 0) return 1;
return x * pow(x, n);
}
B.
public static int pow(int x, int n) {
if (x == 0) return 1;
return x * pow(x, n - 1);
}
C.
public static int pow(int x, int n) {
if (n == 0) return 1;
return x * pow(x, n);
}
D.
public static int pow(int x, int n) {
if (n == 0) return 1;
return x * pow(x, n - 1);
}
Which of the following methods correctly calculates and returns the sum of all the digits in an integer using recursion?
A.
public int addDigits(int a) {
if (a == 0) return 0;
return a % 10 + addDigits(a / 10);
}
B.
public int addDigits(int a) {
if (a == 0) return 0;
return a / 10 + addDigits(a % 10);
}
C.
public int addDigits(int a) {
return a % 10 + addDigits(a / 10);
}
D.
public int addDigits(int a) {
return a / 10 + addDigits(a % 10);}
The intent of the following method is to find and return the index of the first ‘x’ character in a string. If this character is not found, -1 is returned.
public int findX(String s) {
return findX(s, 0);
}
Which of the following methods would make the best recursive helper method for this task?
A.
private int findX(String s) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s);
}
B.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else return s.charAt(index);
}
C.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s, index);
}
D.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s, index + 1);
}
Is this for a grade?
Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.
Release
Planning
Design
Coding
You might create algorithms and flowcharts during the Design phase of software development.
What is the algorithms about?In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.
Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.
Learn more about algorithms from
https://brainly.com/question/20543449
#SPJ1
Telecommunications, outsourcing, flextime, teamwork, and diversity are workplace trends adopted to
O True
O False
Answer:
False
Explanation:
Outsourcing and telecommuting are the trends related to presence of growing technology within the economy allowing various services to be outsourced to people who are more of an expert when it comes to handling those procedures.
HELPPP ME PLEASEEE!!
You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group
Answer: Add the Managers group to the GPO's discretionary access control list (DACL).
Deny the apply Group Policy and read permissions to the Managers group.
Explanation:
To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).
Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.
one day when rahul went to his computer lab and saw that all the computers were connected to a single printer and whoever is giving a command to print, the print out comes from that printer. can you name the concept of communication? class 8 computer one word answer..
Explanation:
you can connect multiple PCs to the wireless printer and print your documents from each one of them as long as the printer can be connected to the same network . You need the disc that came with the wireless printer to install the correct drivers on your computers and laptops.
hope it helps ( brainleist please )
What are good components to preorder a PC with that are cheep? It would be my first PC by the way.
Answer:
Good Components
.CPU AMD Threadripper 3960X Amazon
.CPU cooler NZXT Kraken X63 (280mm AIO liquid cooler) Overclockers
.GPU Zotac Gaming GeForce GTX 1660 6GB CCLonline
.Memory 32GB Corsair Dominator Platinum RGB 3200MHz Scan
Explanation:
Which of the following images illustrates safe driving?
Answer:
bottom left
Explanation:
Answer:
keep your eyes on the road!!!!
This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info
Answer:
contact their support
Explanation:
What programs are always running when your computer is turned on? Enter the names of the programs in the space provided. Click the Submit button when you are finished to view the suggested response.
Answer:
open your task manager
Explanation
right click the toolbar below and click on task manager and you will see what programs are running on your pc
Answer:
Items commonly found in the system tray include antivirus settings; battery status; and volume. Sometimes e-mail programs, printers, or faxes are also present. Your computer may have other items in the system tray too.
Explanation:
I just took a test on edguenity and that was the correct answer hope this helps
Kevin is scanning old images from his college library. He might use these scanned images in the college magazine. He might also use them on the college website. What is the best practice for Kevin to follow when scanning the images?
A.
scan the images with 72 DPI
B.
scan only the images that are ideal for a website
C.
scan the images with 150 DPI
D.
scan the images with 600 DPI
E.
scan the images that are ideal for a magazine
Answer: D. Scan the images with 600 DPI
Explanation:
Answer: D. Scan the images with 600 DPI
Explanation: Correct for Plato/Edmentum
What is the purpose of using a tripod when filming?
Answer:
It helps with the camera movement to get different angles and directions. Sometimes to keep it safe from falling out of grasp.
Explanation:
Answer:
it steadys the camera and can hold it in place for accurate shots.
Explanation: