Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
Explanation:
A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
The most common thing to share in Outlook is the calendar.
The Publish Online option is for users outside an organization.
Changing calendar permissions only changes what a user can see.
Publishing a calendar online will allow anyone in the world to see it.
The Share option opens an email message that sends the calendar link.
O Calendar sharing options include Email, Share, Publish Online, and Delegate.
Answer:
The characteristics of calendar sharing options in Outlook 2016 are;
1) The most common thing to share in Outlook is the calendar
2) The Publish Online option is for users outside an organization
4) Publishing a calendar online will allow anyone in the world to see it
5) The Share option opens an email message that sends the calendar link
6) Calendar sharing options include Email, Share, Publish Online, Delegate
Explanation:
1) Sharing is used mostly by a group of people working on a given project
Items commonly shared in Microsoft Outlook includes email Folders calendars and address books (contacts)
Therefore, for people working on a project together, the most common thing to share in Microsoft Outlook 2016 is the calendar
2) The Publish Online option allows a user to make a calendar available to people outside the organization
3) The calendar sharing permissions are;
a) Who can view the date and time marked as busy
b) Who can view the location and titles of appointments
c) Who can view all the calendar details
d) Who can edit
e) Who can delegate
Therefore, changes in calendar permissions does not only change what the user can see
4) When publishing a calendar, a special URL is created that can be shared to people outside of an organization
A published calendar can be viewed by everyone that has the calendar link
Therefore, publishing a calendar online will allow anyone in the world to see it
5) When a calendar is shared, the person with which the calendar is shared will receive an invitation email for the invitee to accept with an "Open this Calendar" button
Therefore, the Share option opens an email message that sends the calendar link
6) Calendar sharing options includes
a) Sharing the calendar within the organization
b) Publishing a calendar to the web to share the calendar
c) A calendar can be shared in an email
d) Authority can be delegated to a particular calendar
Therefore, calendar sharing options include Email, Share, Publish Online, Delegate
1, 2, 3, 5
just did it
About C header files of C programming
Answer:
A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.
Suppose cell C5 contains the formula =B$6+C1.
Match each formula with its respective cell if you copied it.
=A$6+B4 =B$6+C6 =C$6+D2 =D$6+E1
Thank you, have a great week.
Answer:
=A$6+B4 will be in B8
=B$6+C6 will be in C10
=C$6+D2 will be in D6
=D$6+E1 will be in E5
Explanation:
$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.
As formulars are copied, the references change respectively.
With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.
As we move left and right, the column alphabet will also experience change like the rows did.
Only the absolute reference won't change no matter the direction.
Hence,
=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8
=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10
=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6
=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5
Use the drop-down menus to match each description with the part of a report where it is located.
named moons in the solar system:
page number printed at the bottom of page 1:
page number printed at the bottom of page 20:
group of data titled “Hawks” in a report on species of migrating birds:
report titled “Technology in the Workplace”:
calculation printed beneath a group of data:
date of a report printed at the top of pages 2–100:
Answer:
1) Detail
2) Report footer
3) Page footer
4) Group Header
5) Report header
6) Group footer
7) Page header
Explanation:
I just did the assignment
What is an "Expert System"?
If you can’t answer pls leave It
Answer:
program that use artifical intelligents
Explanation:
Expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires human expertise.
Hardware refers to programs and protocols used on a computer system.
True
False
Answer:
False
Explanation:
Answer:
false
Explanation:
i JUST took the quiz
David plays racing games on his way to work. He uses the analog stick to navigate his vehicle through other artificial intelligence-controlled
opponents. On what platform is he playing the game?
A.console
В.personal computer
C.mobile
D.handheld
Answer: David is most likely playing on Handheld.
Explanation: You can infer that he is playing on a handheld due to the fact that he is playing this game on his way to work, and the fact that he is controlling the game using an analog stick. Because of this, you can assume that what he is playing on needs to be portable, making it likely he is using a handheld.
Answer:
d - handheld
Explanation:
PLATO
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Answer:
Sistemas de autenticación y seguridad de la información.
Explicación:
La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.
Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.
soak testing.
stress testing
load testing
spike testing
Answer:
load testing
Explanation:
to see if the activity can handle under performance
PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS ALSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)
Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *
Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.
Software used for professional print publications such as posters, books, and email newsletters is called a: *
Professional software
Word processing software
Desktop program
Desktop publishing software
Which of the following criteria does NOT determine the credibility of a source? *
How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author
The process of finding a solution to a difficult or complex issue to make it easier is known as *
problem
problem-solving
input
A series of actions taken in order to solve a particular problem is known as the____________ *
process
problem
input
output
A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *
problem
output
algorithm
input
Which is the third step in the problem-solving process? *
Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem
A list of sources you used when writing a scholarly article on a specific subject is known as a: *
intellectual-property
credibility
bibliography
trademark
Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter
Which of the following is NOT a writing style format for academic purposes? *
Times New Roman
American Psychological Association
Modern Language Association
The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *
plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *
SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.
say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.
Answer: 1 Definition of the problem
2 Desktop publishing software
3 The gender of the author
4 problem-solving
5 input
6 algorithm
7 Select the most effective solution
8 credibility
9 All of the above
10 American Psychological Association
11 copyright
12 agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
Explanation:
What is the danger of open-source software when it comes to military robotics?
Answer:
The issue with open source software is that it is usable (and editable) by anyone. When it comes to military robotics, the software that is used to run the robots must remain confidential. If it is not, anyone could take the software that the military is using to make their robots function and replicate it, which could be extremely dangerous.
Explanation:
Open source software is available to the general public.
Feel free to copy and paste this or put it into your own wording. Have a nice day!
Who is Carl Thompson?
What is Polymorphism in programming? Explain in your own words with examples.
Answer:
A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.
Explanation:
Answer:
Polymorphism is a feature of object-oriented
programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.
Explanation:
hope it helps
Which language paradigm interacts well with database systems in business environments that use SQL?
A) logic-based
B) fourth-generation
C) data-oriented
D) aspect-oriented
top secret mission lolz
Answer:
whats the mission about??
Explanation:
~evita
A computer is set up to copy DVDs overnight and have them ready the next morning when employees come into work. This would be an example of _____.
buffering
link-loading
multitasking
batch processing
Answer:
batch procressing
Explanation:
This is when something is scheduled to be done.
In this example, the computer is scheduled to copy DVD's and have them ready the next morning.
Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. Which information system will he use in the unit to keep track of the deliveries?
Answer:
E. Transaction processing system
Explanation:
Explanation: He will need a transaction processing system to know the amount of logistics available daily and how many to ship and how many to order. Transaction processing system will make him keep track of what transactions take place during the various days to help him give a good report.
ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT
Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?
List three ICT tools that are commonly used in the education system?
Identify two ways in which ICT has impacted the education sector?
Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)
Explanation:
A radio and communications security repairer is responsible for both radio and satellite communication systems.
True
False
Answer:
The answer is true
Explanation:
I got it correct on the quiz
write any two reasons why files are stored in folders
Answer:
Explanation:
The answer is The tree structure suggests the main benefit of folders: to organize your files. You can create folders to store and organize your pictures, your documents, your videos, and so on. Folders are also used to separate the files created by different users.
Answer:
Putting files into folders can help you stay organized and keep your files seperated. Having seperate place for different files make them easy to find. Having folders for your files also make them easier to move, for example, if you are moving your information to a new device, it is faster and more efficient because your files are placed in folders, so you don't have to move each indviual file.
I hope this was helpful! =)High-level programming languages are (5 points)
O a
closer to human languages
Ob
less time consuming to run
ос
much more in control over the hardware
Od
similar to native machine code
You are taking a college class. The textbook costs over $150, but you find a PDF of it online for free. If you download the PDF, you are almost certainly guilty of:
breach of contract.
patent violations.
copyright infringement.
data integrity violations.
Answer:
Copyright infringement.
Answer:
copyright infringement
Explanation:
Which of the following is a programming language that translates code one line at a time? (5 points)
a
C:
b
Java
с
Machine
d
Python
Answer:
Python!
Its the only programming language that is an interpreted language
Hope it helped <3
A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *
so the word your looking for is Properties so it would be
A style sheet consists of CSS Properties that specify the layout and format properties to apply to an element. *
scav
test unit 8 edhesive answers
9.5 Code Practice edhesive
Answer:
a = [[34,38,50,44,39],
[42,36,40,43,44],
[24,31,46,40,45],
[43,47,35,31,26],
[37,28,20,36,50]]
sum=0
for r in range(len(a)):
for c in range(len(a[r])):
sum = sum + a[r][c]
print("Sum of all values: " + str(sum) + "\n\n")
print("Average of all values: " + str(sum / (len(a) * len(a))))
Explanation:
I got 100%.
Answer:
a = [[34,38,50,44,39],
[42,36,40,43,44],
[24,31,46,40,45],
[43,47,35,31,26],
[37,28,20,36,50]]
sum=0
for r in range(len(a)):
for c in range(len(a[r])):
sum = sum + a[r][c]
print("Sum of all values: " + str(sum) + "\n\n")
print("Average of all values: " + str(sum / (len(a) * len(a))))
Explanation:
Sum of all values: 949
Average of all values: 37.96
Complete the sentence with the correct response.
If you were to create a mobile app and wanted to create it on an operating system that would allow the users to personalize preferences within the operating system, you would use the operating system.
Answer:
You would use the Android operating system.
Explanation:
Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Many application developers prefer it due to its many customization options.
Corinne would like to click on the link at the bottom of a Web page but she only sees the top portion of the page. She should _____. A.click twice on the status bar
B.use the scroll bar to scroll down to the bottom of the page
C.click on the back button
D.click on the display window and drag it up
Answer:
B
Explanation:
from 3dg3
Answer:
D.click on the display window and drag it up
You read an article about someone who leaves USB sticks in college libraries so that people will pick them up, insert them into their laptops, and download malware. This is an example of:
phishing.
eavesdropping.
wiretapping.
social engineering.
Answer:
social engineering
Explanation:
The above scenario of USB use is an example of social engineering.
What is Social Engineering?This is known to be when a person gets phishing email via any method known as social engineering.
Conclusively, Social Engineering is a term that connote non-technical intrusion that depends on human linkage and it I one where a person is been tricked into breaking normal security means. It often makes use of USB drive for its purpose.
Learn more about social engineering from
https://brainly.com/question/26072214
What is the difference between electrical and electronic devices?
Answer:
A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.
Answer:
the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.
Explanation:
i hope it helps ;)