Answer:
Q10. Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what applications and tools? Answer:----------- Assessment tools, firewall applications Q11. Refer to the PCI DSS Self-Assessment
Explanation:
Freeze column A and rows 1 through 3 in the worksheet
The question tells us that we are dealing with an Excel Worksheet task.
The most popular workbooks are:
"MS Excel" and "G-Sheets"The purposes of this question we will consider both.
Columns in either of the two types of worksheets mentioned above refer to the Vertical Grids which run through the sheets.
Rows on the other hand refer to the Horizontal Grids which run through the sheets. Both Columns and Rows comprise Cells.
Freezing in this sense refers to the act of ensuring that regardless of which direction the worksheet is scrolled, the frozen parts remain visible on the screen.
How to Freeze Column A and Rows 1 to 3
In "MS Excel":
Open Microsoft Excel Click on Blank WorkbookClick on Cell B4 to highlight itOn the ribbon above, click on view to display its sub-functionsselect Freeze PanesThis action will freeze the entire column A as well as Row 1 to 3. To increase the number of rows from 1-3 to 1 to 5 for instance, you'd need to return to the View Function, Unfreeze the Panes, select Cell B6 then select Freeze Panes.
In "G-Sheets"
Ensure that your computer is online, that is, connected to the internetOpen "G-Sheets"Place your mouse cursor on cell B3 and click to highlight itWith your click on View in the ribbon above. This will display the Freeze function in "G-Sheets" along with its subfunctionsSelect the "Freeze + Up to row 3". This action will freeze Rows 1 to 3.Next, click anywhere in Column ACarry out step 4 above and select "Freeze + Up to column A"For more about Freezing Work Sheets click the link below:
https://brainly.com/question/17194167
Define the following solider
What soldier can you show me a picture?
a. In cell K11, create a formula using the DCOUNT function to count the number of projects with final costs of more than $100,000, using the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10
Answer:
the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10
calculate the speed when given the amount of 1TB to be transfer in 5hrs.
Answer:
Data transfer rate is the speed that a certain amount of data is transferred over a given period of time. You might want to know the transfer rate if you’re downloading something online or transferring data from one source to another. First, convert your units so the file size and transfer speed are in either bits or bytes with the same prefix (kilo, mega, giga, or tera). Then, plug your numbers into the equation S = A ÷ T in which A is the amount of data and T is the transfer time to solve for S, the speed, or rate, of transfer. You can also determine the amount of data or the transfer time if you know one of the variables plus the speed of transfer.
Explanation:
in microsoft word, level 1 is automatically formatted as
Answer:
Level 1 is the highest or main level of heading, Level 2 is a subheading of Level 1, Level 3 is a subheading of Level 2, and so on through Levels 4 and 5. Headings are covered in Sections 2.26 and 2.27 of the APA Publication Manual, Seventh Edition.
Explanation:
Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state). The analyst wants to combine the two columns into a single column named location, with the city and state separated by a comma. What code chunk lets the analyst create the location column
The programing language, R has a unite unite function in the tidyr package. Hence, the code chunk which let's the analyst create the location column is; unite (stores, "location”, city, state, sep=",")
The syntax for the unite function is ; unite(data,col,..., sep)data = dataframe from which data is to be extracted `; stores col = name of the new column ;" location"... = dataframes to be merged ; city, statesep = seperator ; ","Hence, the required syntax goes thus :
unite (stores, "location”, city, state, sep=",")Learn more : https://brainly.com/question/25534959
Interface elements include but are not limited to:
Question 3 options:
A. Navigational components, containers, interaction design
B. Input controls, navigational components, visual design
C. Input controls, informational components, containers
D. Input controls, informational components, visual design
E. Navigational components, informational components, visual design
Interface elements include but are not limited to: C. Input controls, informational components, containers.
A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and it can be defined as a programming tool that avails programmers the ability to develop software programs (applications) through the use of graphical elements and figures rather than texts alone.
Interface elements refers to the graphic tools that are used by programmers in the design of a user interface on a software program.
In Computer programming, some of the interface elements used include the following:
Input controls: it comprises buttons, radio buttons, list boxes, dropdown lists, checkboxes, text fields, toggles, date field, etc.Informational components: these are progress bar, icons, notifications, tooltips, modal windows, message boxes, etc.Containers: they are made up of accordion.Navigational components: these are slider, search field, slider, tags, pagination, breadcrumb, icons, etc.Read more: https://brainly.com/question/19341134
What are the main approaches for dealing with deadlock?
Answer:
Deadlock ignorance
Deadlock prevention
Deadlock avoidance
& Detection and recovery
Hope This Helps!!!
rearrange the following procedures in there proper order. use numbers (1-8) to indicate their order of precedence.
.___________crimp
.___________strip cable end
.___________test
.___________untwist wire ends
.___________trim wires to size
.___________check
.___________arrange wires
.___________attach connector
Answer:
6 - crimp
1 - strip cable end
8 - test
2 - untwist wire ends
4 - trim wires to size
7 - check
3 - arrange wires
5 - attach connector
Explanation:
Step 1. Strip cable by inserting into the stripping tool. Rotate the cable in a smooth and even motion to create a clean cut and pull away towards the end of the wire to remove the sheathing.
Step 2. Untwist wire ends. Separate the twisted wires and straighten them out to easily sort in the right order.
Step 3. Arrange wires. Put the wires in the correct order so they can be properly crimped.
Step 4. Trim wires to size. Use the cutting section of the crimping tool to cut them into an even line.
Step 5. Attach connector. Insert the connector so that each of the small wires fits into the small grooves in the connector.
Step 6. Crimp. Insert the connector in the crimping tool. Squeeze the handles to crimp the connector and secure the wires.
Step 7. Check. Take the connector our of the tool and look at the pins to see that they're all pushed down.
Step 8. Test. Lightly tug at the connector to make sure it's attached to the cable.
1. A is printed at the bottom of each page.
Answer:
b is also printed at both page
Explanation:
I need to do because c can also pri Ted at all side
hope its help you
please mark as brainliest
Which syntax is used to output the line "Hello" and move to a new line?
Answer: System.out.println("Hello")
WHAT DO YOU KNOW?
Why would you want to change your Table
Properties?
read the slides ; Table Properties are the way the table appears or looks.
A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would best meet the architects objectives
a. trusted platform module
b. IaaS
c. HSMaaS
d. PaaS
Answer:
a. trusted platform module
i thinks it will help you
Explanation:
TRUE OR FALSE:
To make an object "active", you click on the picture,
image, or object and it shows the bounding box.
Answer:
True
Explanation:
I just know the answer because I'm a genius hehe
We have noted that there can be no input queuing if the switching fabric is n times faster than the input line rates, assuming n input lines all have the same rate. Explain why this is the case.
Consider the given data:
Assume packet length=n
Maximum queuing delay= (n–1)D
All packets are of the same length, n packets arrive at the same time to the n input ports, and all n packets want to be forwarded to different output ports.
a) The maximum delay for a packet for the memory = (n-1)D
b) The maximum delay for a packet for the bus = (n-1)D
c) The maximum delay for a packet for the crossbar switching fabrics= 0
What device do e-learning applications usually use to help users with visual
impairment read digital content?
Ms. Miller recently performed a little experiment for her photography class. She dressed a model in a generic outfit and asked two different photographers to photograph her using the same set and lighting. The students observed that the images produced by each photographer were vastly different likely due to artistry; however, one student mentioned that something else might be at play here. What other factor MOST LIKELY caused these images to turn out so differently?
A.
the instructions Ms. Miller gave to each photographer
B.
the communication and feelings each photographer was able to evoke in the model
C.
the level of education and how much experience each photographer has
D.
time and stress levels of each photographer
Answer:
C. the level of education and how much experience each photographer has.
Despite some having degrees in film, visual art, or design, the majority of photographers are self-taught. As you earn more and more XP, you can advance through the eight levels of photography
What experience do you need to be a photographer?There are no formal educational qualifications to become a professional photographer. Despite some having degrees in film, visual art, or design, the majority of photographers are self-taught. Many photojournalists hold journalism degrees or have a wealth of practical experience.
As you earn more and more XP, you can advance through the eight levels of photography. According to the video, the phases you'll move through as you level up are as follows: (0) Just Starting, (1) Keyboard Photographer, (2) Gear Geek, (3) The Student, (4) The Casual Snapper, (5) Hobbyist, (6) Online Legend, and (7) The Pro.
Therefore, the correct answer is option C. the level of education and how much experience each photographer has
To learn more about the level of education refer to:
https://brainly.com/question/19475756
#SPJ2
Create a raptor program that asks to user to enter 10 numbers into an array. Then display all the numbers, the smallest and the largest. Be sure to add prompts and labels to your input and display.
This is the raptor program written in Python 3.8:
########################################################
ten_numbers = [ ]
# get the ten numbers
print("Enter 10 numbers")
for i in range(1, 11):
num = int(input("[{ }] (Enter number and press enter to accept): ".format(i)))
ten_numbers.append(num)
# get the smallest and the largest
smallest = min(ten_numbers)
largest = max(ten_numbers)
# display the results
print("The list of numbers is: { }".format(ten_numbers))
print("The smallest number in the list is { }, and the largest is
{ }.".format(smallest, largest))
########################################################
The raptor program
Uses a for loop to get the 10 numbers into a list. Then, it uses the in-built Python min and max functions to get the smallest and largest numbers in the list.Learn more about Python lists here: https://brainly.com/question/24941798
An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?
There are different ways of management. To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.
Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.
It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.
Learn more from
https://brainly.com/question/13438921
Need help with these plss correct answers
Explain the difference between linear and non-linear motion. What are examples of each kind of motion?
Imagine that an animated film is going to show a character who, although frightened, climbs a narrow mountain trail. What is one of the 12 principles of animation that you learned about in this unit that the animator might want to use in this scene?
Describe how you would use the principle of “staging” in a scene in an animated film that shows a triumphant moment in a soccer game played in a large stadium.
Describe a situation where an animator might choose to intentionally violate the principle of “slow in and slow out.”
Imagine that you had been given the task of animating a crab walking along the seashore. How would you use the animation principle of secondary action to make the scene appear more realistic?
Answer: The only thing i could find was this I hope this helps you out
Timing and Spacing: The number of frames between two poses, and how those individual frames are placed.
Squash and Stretch: The flexibility of objects to exaggerate or add appeal to a movement.
Anticipation: The setup for an action to happen.
Ease In and Ease Out: The time for acceleration and deceleration of movement.
Follow Through and Overlapping Action: The idea that separate parts of the body will continue moving after a character or object comes to a full stop, and the idea that parts of the body will move at different times.
Arcs: The principle that smooths animation and moves action in a realistic way.
Exaggeration: The pushing of movement further to add more appeal to an action.
Solid Drawing: The accuracy of volume, weight, balance, and anatomy.
Appeal: The relatability (or charisma) of a character.
Straight Ahead Action and Pose to Pose: The spontaneous and linear approach to creating an action using many in-between poses along with the main poses, and the more methodical approach to creating an action using only a few poses.
Secondary Action: The actions that emphasize or support the main action of the animation.
Staging: The setting up of the scene, from placement of characters to the background and foreground elements, to how the camera angle is set up, the lighting and shadows, and more.
Explanation:
Answer:
1. Linear motion is motion in a straight line. Non-linear motion is motion that is not in a straight line. For example when you move your pen in a line it is linear.
2. They might use something to show the mountain and show how big it is. Using effects like this can bring out certain parts and bring out what really is trying to be shown in a movie.
3. The camera angle of the soccer game and the follow with the ball being shown can give a staging looking for what is coming or what is important in that time.
4. You can use it to show how fast a car is going or to show where a person is at on a map in a 3rd person view
5. I would use Arcs because it smooths out the image or video to make whatever your trying to make look more realistic.
which one is larger in size. a word document file or a pdf file?
Answer:
Pdf file is larger than document file
Explanation:
.
John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered
Asymmetric cryptography is often regarded as Public-key cryptography. It often uses pairs of keys. The process that Alex should use along with asymmetric cryptography so that John can be sure that the received document is real is Digital signature algorithm.
In asymmetric cryptography, the both pair has a public key and a private key.The Digital Signature Algorithm is simply known to be a Federal Information Processing Standard for digital signatures.
DSA as it is often called is gotten from the Schnorr and ElGamal signature schemes.
It often used for digital signature and its verification and thus shows authenticity.
Learn more from
https://brainly.com/question/13567401
By using ONLY the language of C++,
How many times the loop will be executed?
int odd = 1, sum = 2, count = 9;
do {
sum = sum + odd;
odd = odd + 2;
cout >> sum
count = count + 1;
}
while (count < 10)
}
MCQs:
A) 1
B) 2
c) 0
d) 3
Answer:
0
Explanation:
Answer: Syntax error. So it would be 0.
After correcting syntax it would be 1
Explanation:
Braces never started in beginning but put in the end after while loop
vA student found a book on the library bookshelf last week, and recorded the source information.
Book title: My Traitor’s Heart Author: Rian Malan
Publication date: 1990 Publisher: Bodley Head Publication city: London
Use the drop-down menus to indicate how the student should format this source on a works-cited list.
My Traitor’s Heart.
London:
Answer:
3,1,2,1
Explanation:
got it right on edge
have a nice day
:)
Answer:
1. Malan, Rian
2. London:
3. Bodley Head, 1990
4. Print
Explanation:
did it
What is considered a relatively new science that is being developed?
O targeting advertising to number of downloads
O targeting advertising to demographics
O targeting advertising to geography
O targeting advertising to adolescents
Answer:
b
Explanation:
Targeting advertising to demographics is considered a relatively new science that is being developed. Option (b) is correct.
What do you mean by Geography?The study of places and the interactions between people and their environs is known as geography. Geographers study the surface of the Earth and the various human societies that live there.
Advertising refers to the methods used to draw attention to a good or service. In order to attract consumers' attention, advertising seeks to highlight a good or service. It is often used to market a particular product or service, although there are many other applications as well, with commercial advertising being the most popular.
Through "branding," which links a product name or image with particular traits in consumers' minds, commercial advertising frequently aim to boost consumption of their goods or services.
Therefore, Option (b) is correct. Targeting advertising to demographics is considered a relatively new science that is being developed.
Learn more about Geography, here;
https://brainly.com/question/1462956
#SPJ2
What sets blockchain solutions apart from conventional record-keeping solutions?
Blockchain technology are in commonly used in this dispensation. The thing that sets blockchain solutions apart from conventional record-keeping solutions is simply the ability to share different versions of the same data to multiple parties.
Blockchain is known to buildup trust, security, transparency, and the traceability of data shared across a business network. It also minimize cost with new efficiencies.
It is simply known to be distributed ledger technology that helps in the storage of information in the form of blocks and no one can change or add the data.
See full question below
What sets blockchain solutions apart from conventional record-keeping solutions?
the ability for multiple parties to be certain they are using the same data
the ability to share different versions of the same data to multiple parties
a focus and priority on bitcoin and cryptocurrency
a system that maintains rigor and complexity
Learn more from
https://brainly.com/question/21105181
1. How many colors are available in color. palette.
2. 20 colors are available in color palette. True / False
Answer:
16 colors in the palette
false only 16 colors
Why is it good to be a computer programmer?
Answer: With programming, you have more freedom than with other jobs. The majority of programming job openings are remote, giving you plenty of freedom to complete your duties.
Explanation: You can work wherever you want with programming jobs, especially if you have a good reputation.
. Circle the correct choice for each statement 1. The number of substances in a mixture (can - cannot) be varied, for a compound they (can - cannot). 2. The different substances in a mixture (can - cannot) be joined chemically; a compound (can - cannot). 3. Substances in a mixture (do - do not) keep their own properties. 4. Substances in a compound (can - cannot) be easily separated; in a mixture, they (can - cannot). 5. Examples of (mixtures - compounds) are air, sea water, and most rocks. 6. Examples of (mixtures - compounds) are water, salt, and sugar. 7. Compounds are made of elements and have a (physical – chemical) formula. 8. A (solvent - solute) is the substance that dissolves in another substance. 9. True or False: A mixture cannot have five substances. 10. True or False: In a suspension, a substance may sink to the bottom.
Answer:
1 cannot
can
2 can
cannot
3 do not
4 can
cannot
5
Cho lược đồ CSDL “Quản lý BÁN HÀNG” có các bảng như bên dưới. (Thuộc tính in đậm và
gạch chân là khóa chính, gạch CHÂN NÉT ĐỨT là khóa ngoại. Kiểu dữ liệu và độ rộng của
các thuộc tính tự chọn sao cho phù hợp.