Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.

Answers

Answer 1
Hello!

The answer would be: firewall.

I hope that this helps you!

Related Questions

A subquery whose return value depends on the row being returned in a main query is called a(n) _____ query.

Answers

Answer:

correlated

Explanation:

A correlated subquery is a method of reading each row of a table and comparing the values in each row to related data. It's utilized when a subquery has to deliver a different result or collection of results for each candidate row that the main query considers. I hope this helps! ^-^

Why are telephoto lenses known for creating a pincushion effect on images?

A. because the shrinking of the image decreases on the edges of the frame

B. because the magnification of the image decreases on the edges of the frame

C.
because the shrinking of the image increases on the edges of the frame

D. because the magnification of the image increases on the edges of the frame

Answers

Answer:

D is the correct answer.

Answer: d because the magnification of the image increases on the edges of the frame

Explanation:

_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data

Answers

Answer: Encryption

Explanation:

I did computer science as my major :)

If a Windows system crashes or has a corrupted OS, it can be restored to its previous state from a previously created _______________.

Answers

“Screenshot” or backup
Screenshot means a backup in this scenario, but I’d go with backup as your answer to this question

Question 5 of 10
Which step might be included in an algorithm for a self-driving car?
A. Ask another driver for help
B. Analyze data from the car's external cameras.
O C. Look up directions.
D. Read a physical map of the streets.

Answers

Hello!

Answer:
B. Analyze data from the car’s external cameras.

I hope that this helps you!

Answer:

B.

Explanation:

7.5.5: Contains a Vowel how do I do it?
# Ask the user for a string
word = input("Enter a string:")



# Check for lowercase vowels: a, e, i, o, or u and print
if "a" in word or "e" in word or "i" in word or "u" in word:



print "Contains a lowercase vowel!"


else;

print "Doesn't contain a lowercase vowel!"

Answers

The code that checks if a user input has a vowel can be done by looping the users input and check if the users input has a vowel in it.

x = input("kindly, input your string: ")

vowels = ['a', 'e', 'i', 'o', 'u']

length = 0

for i in x:

    if i in vowels:

         length += 1

if length >= 1:

    print("Contains a lowercase vowel!")

else:

    print("Doesn't contain a lowercase vowel!")

Code explanation

The code is written in python

The first line of code ask the user for an input.The vowels are stored ina variable called "vowels".The variable "length" is initialise to zero.Then, we loop through the value in the users input.If the users input contain any vowel the length is incremented by 1.Finally if the length is greater or equals to 1 we print a message "Contains a lowercase vowel"Else we print "Doesn't contain a lowercase vowel!"

learn more on python code here: https://brainly.com/question/15114317

How to connect two monitors to a laptop with one hdmi port?.

Answers

Answer:

If you have a USB or USB-C port in your laptop, I would suggest getting a USB/USB-C to hdmi adapter to plug into your laptop and use it with one of your monitors.

Explanation:

What actions might contribute to recommendations you see online?

Answers

Answer: what you search up

What is it called when a programmer includes a step in an algorithm that lets
the computer decide which group of steps to perform?
Alteration
B. Selection
OC. Sequencing
OD Storage

Answers

Selection is the step in algorithm that let's the computer decide which group of steps to perform.

What is Algorithm?

This can be defined as set of instructions which are used for solving a problem or accomplishing a task.

Selection happens when there are one or more options are available in which the computer decide which group of steps to perform.

Read more about Algorithm here https://brainly.com/question/11302120

Answer:

its A

Explanation:

which wares are the most important to a computer operator​

Answers

hardware

software

humanware

User
Application Software
Operating System
Hardware

Assignment #1
•Explain the meaning of this graphics organizer base on what you have learned from this lesson.

• Is an "app" same in meaning with "application"? ​

Answers

This graphics organizer base talks about Software and how it is divided into two groups such as the operating systems and application software.

What are Software?

Software are said to be often shared into  two categories such as:

The operating systems The application software.

Note that the Operating systems functions by helping the hardware and produce a kind of interface between the hardware and its user while the Application software is said to be a stage of a programs that help the user to do anything meaningful just as seen in the diagram.

Conclusively, The word "app" has the in meaning with "application". It is known to be the short form of application.

Learn more about Application Software from

https://brainly.com/question/1538272

What is the main advantage of using templates and other presentations to create a new presentation?

A. They allow you to include more slides in a presentation.

B. They give you access to additional slide layouts that you cannot create in a blank presentation.

C. They save you time designing slides and allow you to focus more on the content.

D. They automatically fill-in content and allow you to spend more time on designing slides.

Answers

C. They save you time designing slides and allow you to focus more on the content.

hope this helps you!

Which specific type of attack occurs when a threat actor redirects network traffic by modifying the local host file to send legitimate traffic anywhere they choose

Answers

The specific type of attack that occurs when a threat actor redirects network traffic by modifying the local host file is DNS Poisoning.

What is DNS poisoning?

DNS poisoning is known to be a type of attack where the  hacker uses a method that alters some seen vulnerabilities that are found in the domain name system (DNS).

Conclusively, The type of attack that takes place when a threat actor redirects network traffic by modifying the local host file is DNS Poisoning as it alters it and change it to what they want thereby redirecting users elsewhere.

Learn more about attack from

https://brainly.com/question/76529

#SPJ1

A __________ constant is a name that references a value that cannot be changed while the program runs.

Answers

Answer:

Explanation:

A constant is a name that references a value that cannot be changed while the program runs

Example in Javascript:

const x = 5;

cannot be reassign x

wronged: x = 10; (will throw an error try to assign value to constant variable)

You watch a movie where a secret agent puts a small device on a telephone line so that they can
listen to conversations between two other people. This is an example of:
O snooping.
O social engineering.
O wiretapping
O data confidentiality.

Answers

Answer:

wiretapping

have a good day :)

Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client’s desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. What is the issue with the client’s computer?
a. Spam
b. Corrupt hard drive
c. Bad hard drive driver
d. Computer virus

Answers

There are different kinds of virus. The  issue with the client’s computer is Computer virus.

What is computer virus?

A computer virus is known to be a kind of computer program that, when used, can recopy itself by modifying other computer programs and putting its own code.

The Examples of computer viruses are:

Worms Trojans , etc.

The issue with the system that Lane is working on is virus and it can be worked on by using Anti-virus.

Learn more about Computer virus from

https://brainly.com/question/20407534

Write a function that can find the largest item in the array and returns it. The function takes the array as an input. From the main function, send initial address, type and length of the array to the function. You can use registers to send the data to the function. Also return the largest item in the array using EAX register. You can use the following array for this problem. Array DWORD 10, 34, 2, 56, 67, -1, 9, 45, 0, 11

Answers

Answer:

var newArray = array.OrderByDescending(x => x).Take(n).ToArray();

Explanation:

Write the find_index_of_largest() function (which returns the index of the largest item in an array). Eg: a = [1 3 5 2 8 0]; largest = find_index_of_largest ( a ); largest = 5; Question: Write the

please help I need to turn this in by 8 pm but it's not working it's almost 6

Answers

Answer:

You can re-open your browser and refresh the page. Clear your browser's cache and cookies. Turn off any plugins and extensions then reload the page. Try opening the page using another browser.




Explanation:

Have a great rest of your day
#TheWizzer

A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?.

Answers

Answer:

drive-by-download

Explanation:

HTML Downloads
Explaintion:
Clicking a web page can sometimes download suspicious malware on the computer.

You have a small network that has only two route possibilities. You want to control the flow of traffic to a specific route. Which routing approach would be the BEST choice

Answers

The routing approach would be the best choice for the above scenario is Static routing.

What is Static routing?

This is known to be the best or ideal routing that is good in small networks where only a one or few routes can be seen or in networks where full control of routing is needed.

Note that static routing has some demerit that can make it difficult and hard to handle in large environments and as such it can only be useful in small  areas.

Learn more about network from

https://brainly.com/question/12110831

A practice to ensure threads finish a required method before another thread starts is to use the _____ keyword in the method header.

Answers

A practice to ensure threads finish a required method before another thread starts is to use the synchronized keyword in the method header.

What is Synchronized keyword in terms of Java?

This is known to be the act of giving room for only a single thread to be able to access the shared data or resource at a given timeframe.

Note that it often help users to be able to protect their data from being access by different threads and as such, a practice to ensure threads finish a required method before another thread starts is to use the synchronized keyword in the method header.

Learn more about keyword from

https://brainly.com/question/2960292

In binary, what would be the largest number 2^9 would allow?

Answers

Answer:

511

Explanation:

(2 ^ 9)  - 1 = 511

We first have 2 ^ 9 which is 512, but we subtract 1 becuase while it can hold 512 values, it starts at 0.

A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.

Answers

Answer:

completeness

Explanation:

Who designed the apple i computer in 1976?

steve wozniak

richard stallman

paul allen

konrad zuse

Answers

Steve Wozniak

An Apple 1 at the Computer History Museum, Mountain View. demonstrated the first Apple Computer that he designed and hand-built at the Homebrew Computer Club in Menlo Park, California in July 1976

Answer:

Steve Wozniak

Explanation:

It said the computer is made by apple, Which was started by Steve Jobs and Steve Wozniak,

Paul Allen helped start Microsoft

Richard stallman worked for MIT

Konrad Zuse started Zuse KG

Name two utility programs included in an operating system:

Answers

Answer:

A file management system and a disk defragmenter

Explanation:

A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim of ____.

Answers

A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim of quick start behavior.

What is Quick Start Behavior Guide?

The Quick Start Behavior guide is known to be a fast introduction to the use of Class Charts behavior management software.

A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim of quick start behavior as he or she is in haste and thus did a bypass.

Learn more about documentation from

https://brainly.com/question/25534066

Although fun and entertainment are the primary functions of video games, they have other uses, as well. An
accidental experiment in pandemics was performed in 2005 in the virtual reality game, World of Warcraft, and
The University of Washington released an interactive game, Foldit, that allowed users to solve problems or find
solutions to various puzzles. Choose one of these scenarios and explain how the situation helped scientists
learn. What is another problem that you think could be addressed by using video games?

Answers

The problem that you think could be addressed by using video games is financial  management skills.

What problem does gaming handles?

A lot of Scientific research have seen that video games improve people's creativity and also their skill in terms of problem-solving skills.

Note that it can also help to improve financial management skills and also make people to have stable jobs and good source of income.

Learn more about video games from

https://brainly.com/question/8870121

you want to search for a certain value and then return the index of that
value, which section of MakeCode Arcade's toolbox would you use?
A. Modify
O B. Operations
C. Read
D. Create

Answers

The  section of MakeCode Arcade's toolbox would you use is to Modify.

What is Microsoft MakeCode?

The Microsoft MakeCode is known to be a type of an app or tool that is  free and it is also an open source platform.

It is often used in forms engaging computer science learning experiences that aids a progression way or method into real-world programming.

Learn more about MakeCode from

https://brainly.com/question/26995556

Answer: Read

Explanation:

took the test

How should a team have quality built into its deliverables?

Answers

Answer:

According to the question, the answer is option "A) By having a separate quality assurance team for testing the quality of deliverables". The reason for this answer is because there are many things regarding quality assurance should be taken care of, in order to make the product deliverable to customers.6 May 2019

Why do you need to put your phone on airplane mode.

Answers

Pilots claim that active cell phones could interfere with their navigation equipment.
Other Questions
whihc statement about charles ives is FALSE: he was born in the south, where he was deeply moved by afrcan american music 10 identical copies of a movie will be stored on 40 computers such that each computer has at most 1 copy. How many different ways can the 10 copies be stored Write a paragraph telling how you use the computerand other technological gadgets.Given Brainly Find the surface area of each solid. The tornado came through my neighborhood and scattered _______ and other items everywhere.A. ZealB. Debris C. KindleD. Dispel A susbtance has an empirical formula of CrO2 and a molecular weight of 168 g/mol. determine the molecualr formula for this substance Why was military force necessary to allow students to attend their university opportunity cost is:a) another term for supply and demand b) the paradox of value c) the price of good and servicesd) the cost in money, time, or other value when one makes a choiceHELP ME!!! MY ASSIGNMENT IS DUE TOMORROW AND I JUST NEED THIS QUESTION!! :(( Given that the mathematics score of a subject is between 600 and 690, what is the probability that the subject is male? can anyone help me find x for #7? Most often cited as the causative factor for acid deposition. A particle moving on a straight line has acceleration a = 5-3t, and its velocity is 7 at time t = 2. If s(t) is the distance from, the origin, find s(2)-S(1). 1. Find the value of X and Y:2. Find the value of X: In Chapter 14 of Frankenstein, the creature conveys the story of the cottagers, specifically how Felix met and fell in love with Safie. Based on the actions Felix took to free Safies father, what can you infer about Felix? Provide implicit and explicit evidence from the text to support your inferences, explaining how this evidence validates your responses 1 What do the characteristics of electromagnetic radiation include?A. characteristics of particles onlyB. characteristics of waves onlyC. characteristics of both waves and particlesD. characteristics of neither waves nor particles2 Which equation correctly relates the energy of electromagnetic radiation to its frequency?A. E=h/vB. E=hvC. E=vD. E=h3 What causes electrons in atoms to emit energy after absorbing it?A. being ripped off their atomsB. returning to their ground energy statesC. losing massD. becoming electromagnetic radiation4 What observation led scientists to postulate the existence of photons?(1 point)A. electrons in atoms emitting energy only in certain amountsB. seeing photons through powerful microscopesC. discovering that electrons can have varying amounts of energyD. electrons in atoms emitting energy across the electromagnetic spectrum As a 13 year old, I want to look for a job but I can't seem to find one for me. I don't want to work as a babysitter or anything like that, but would prefer a job like a library assistant or typist, only on the weekends. I was wondering if anybody had any recommendations to jobs, or where I can find one? Consider the following system of equations. 1. 75x + 1. 25y = 2. 757x + 5y = 9What is the solution to the system?Since 11 9, there is no solution. Since 0 = 0, there are infinitely many solutions. There is one solution, x = 0 and y = 0. There are two solutions (11, 0) and (0, 9) The volume of a cone-shaped hole is 147 pi ft3 If the hole is 9 ft deep, what is the radius of the hole?Please help!! ______ is defined as the immediate care given to the victim of an injury untiprofessional care arrives.a. Emergency responseb. First aidc. Triaged. None of the above Find the surface area of the figure. Be sure to show all of your work and steps in solvingfor your answer.Please show me the steps and solutions not just answers pls pls pls help me, tysm!!