Answer:
Input
Explanation:
Match each operating system drawback to its respective operating system.
1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System
Answer:
Microsoft Windows - More susceptible to viruses
Linux - Limited support system
Apple - Fewer compatible applications
Explanation:
Generally windows is more susceptible to viruses.
Linux is open source meaning it's up to the community to help you.
Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.
Answer:
1. Microsoft Windows is more susceptible to viruses
2. Mac OS X (Apple OS) has fewer compatible applications
3. Linux OS has a limited support system.
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.
The question is incomplete. The complete question is :
Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.
combustion reaction , photosynthesis , respiration
water + carbon dioxide + sunlight → oxygen + glucose
methane + oxygen → water + carbon dioxide + heat
glucose + oxygen → carbon dioxide + water + energy
Solution :
The chemical reactions that is occurring in the following chemical equations are :
Photosynthesis
water + carbon dioxide + sunlight → oxygen + glucose
Plants uses the light energy from the sun in the presence of water and carbon dioxide produces food by the process of photosynthesis. It produces glucose and oxygen.
Respiration
glucose + oxygen → carbon dioxide + water + energy
The cellular respiration process produces ATP with the breakdown of the glucose and oxygen. During respiration process, carbon dioxide is obtained along with water and energy.
Combustion reaction
methane + oxygen → water + carbon dioxide + heat
Combustion reaction is a chemical reaction in which methane is the main ingredient. Combustion takes place as things burn in the presence to methane and oxygen to form carbon dioxide, water and heat.
9.6 Code practice Edhesive
Answer:
N = [1,1,1,1,1],
[2,2,2,2,2],
[3,3,3,3,3],
[4,4,4,4,4]
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N=[]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
Explanation:
I got 100%.
In this exercise we have to use the knowledge of computational language in python to write the code.
We have the code in the attached image.
The code in python can be found as:
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N = [1,1,1,1,1], [2,2,2,2,2], [3,3,3,3,3], [4,4,4,4,4]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
See more about python at brainly.com/question/26104476
Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for her account. Which information should she look for in this document?
the info needed to log in
-This would show what is protected in the privacy policy and its related to you since it would show personal data.
-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.
what is a soft ware?
Software is a collection of instructions and data that tell a computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, including programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.
Answer:
it is like some data
Explanation:
You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem
Answer: Configure port security on the switch
Explanation:
Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.
When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.
Three types of common program errors are syntax, runtime, and logic. (5 points)
O True
O False
Answer:
True
Explanation:
What is your definition of Digital Safety?
Answer:
Digital Safety is being knowledgeable in the areas of Internet safety, device security, etc. and keeping yourself safe when using the Internet.
Explanation:
When you know how to stay safe on the Internet and keep yourself safe, you know Digital Safety.
Which ribbon tab has the tool that lets you connect your text to a URL?
Home
Insert
Review
Animations
Answer: Insert
Explanation:
The Ribbon was introduced by Microsoft in 2017 and it's simply a user interface element that can be found below Quick Access Toolbar. The Ribbon consist of seven tabs which are:
• Home
• Insert
• Page layout
• References
• Mailing
• Review
• View.
The Ribbon tab that has the tool that lets you connect your text to a URL is the Insert tab.
In the Menu bar, the person should click on the Insert tab that us in the Links section. After that, click on the Hyperlink or the Link option, then in the Insert Hyperlink window, one can then type addr as of the web page that the person wants to connect the text to after which the leoen will then click OK.
Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest
Answer:
Explanation:
A man-in-the-middle attack or impersonation are likely to result in problems with
data availability.
data confidentiality.
data integrity.
data mining.
Answer:
Data Confidentiality
Explanation:
A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.
A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.
What is a man-in-the-middle attack?A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.
Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.
Therefore, option B is the correct option.
Learn more about man-in-the-middle attack, here:
https://brainly.com/question/13014110
#SPJ6
What are the advantages of a watchtower?
Answer:
Usually used in securing flanks of other burning types.
Allows fast area ignition.
Crew coordination important.
Use in light to medium fuels.
Knowledge of fire behavior very important.
Explanation:
good luck
please mark me as brainlist