Answer:
whats the mission about??
Explanation:
~evita
what is the url of the website that would allow you to change your password, adjust quotas, and check a list of known computer problems on campus?
Answer:
Go to your schools website and look for the change password, ETC area I would guess it would be a "Help" tab
Explanation:
You did not explain what Campus your on however you can find this yourself pretty easy.
what is one disadvantage people face without a checking account?
Answer:
If they have a job that only pays with ckecks they won't be able to have their paycheck.
Explanation:
how do spear phishing attacks differ from standard phishing attacks?
Answer:
Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".
Hope this help please give the brainliest award.
Can someone check my answers?
I got 4 for c and 17 for d
Answer:
both are correct
Explanation:
ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!
1. A means of giving credit to a source when their information is used.
A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi
3. A device that translates analog carrier signals to encode and decode digital information.
A) USB
B) Computer Virus
C) Intranet
D) Modem
4. A virus or Trojan horse designed to cause harm to computer or device.
A) Hardware
B) Malware
C) Modem
D) Antivirus Application
5. Software that is used to detect and eliminate computer viruses.
A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser
6. Transmits data through a cable television network as a means to connect a computer to the internet.
A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB
7. An application used to access websites on the internet.
A) Malware
B) Internet
C) Proprietary
D) Browser
8. Communication that does not happen in real time.
A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware
9. A network of computers that provides access to information on the web.
A) Phishing
B) Internet
C) Antivirus Application
D) Modem
10. The cable used to connect computers in a network.
A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware
Easy Peasy Lemon Squeezy
1. A means of giving credit to a source when their information is used.
A.) Citation
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
B.) Phishing
3. A device that translates analog carrier signals to encode and decode digital information.
D.) Modem
4. A virus or Trojan horse designed to cause harm to computer or device
B.) Malware
5. Software that is used to detect and eliminate computer viruses.
C.) Antivirus Application
6. Transmits data through a cable television network as a means to connect a computer to the internet.
B.) Cable Internet
7. An application used to access websites on the internet.
D.) Browser
8. Communication that does not happen in real time.
A.) Asynchronous Communication
9. A network of computers that provides access to information on the web.
B.) Internet
10. The cable used to connect computers in a network.
B) Ethernet Cable
Answer:
your mom
Explanation:
in 2014, what percentage of the world population has access to the internet?
Answer:
At that time 43.9% of people have access to the global internet.
what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage
Answer:
could have used a browser but ok
Explanation:
The arrangement of various flash elements such as the tools panel control panel property inspector and windows is called the Workspace. Explanation: The workspace in a computer system makes us easy to navigate to different features and control options.
Preset headers and footers cannot have additional information add to the areas.
Group of answer choices
True
False
the answer to the question is true
what is my assurance wireless account number and pin
Answer:
Call Assurance Wireless at 1-(888)-898-4888 to access your account number. Your PIN is the 6-digit (or 10-digit) number you created, which is located on your welcome letter. Your account number can be found in the top right corner of any bill or by logging into your online account. Do not enter any dashes or hyphens.
Explanation:
pls mark as brainliest and hope this helps
It should be noted that your assurance wireless account number can be found at upper right-hand corner of any bill, and the PIN is the 4 digits that was given to the carrier during the call in.
According to the question, we are to discuss how individuals can know his assurance wireless account number as well as the pin.
As a result if this we can see that the Account number can be obtained at upper right-hand corner of bill as well as invoice, and the pin is usually 4 digit number.
Therefore, your assurance wireless account number upper right-hand corner of any bill.
Learn more about wireless account number at:
https://brainly.com/question/13162939
A pennant-shaped sign means you are in a _____ zone.
Answer:
The pennant-shape is only used as a road sign to signal a no-passing zone. No passing zones are stretches of roadway where drivers are not allowed to move into the adjacent lane to pass a vehicle in front.
____ describes the period of time in a twenty-four-hour period that is spent at work.
I believe "Work-Shift" should be in the blank
Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her
Explanation:
A lot of people with dyslexia can relate to Stephanie.
What language do programmers use to communicate with a computer?
Input code
Linguistic code
Programming code
Virtual code
Answer:
I would say programming code
Explanation:
Since its a system of rules written in a particular programming language
The language that programmers use to communicate with a computer is called "Programming code".
The correct option is C.
Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.
Programming languages can be divided into two categories: low-level and high-level.
Low-level languages are closer to the binary code that computers use to execute instructions.
High-level languages are more abstract and easier for humans to understand and use.
Examples of high-level languages include Python, Java, JavaScript, and C++.
Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.
Know more about programming language,
https://brainly.com/question/23959041
#SPJ3
________ is the use of information technology to support the sharing of content among networks of users.
Answer:
The social media is the use of IT to support the sharing of content among network of users.
which of the following is the most reliable storage device:
floppy disk
hard disk
USB
RAM
Answer:
RAM is the most reliable storage device.
Name any four constituent of the 8085 microprocessor.
Answer:
The timing & control unit, the decoder, serial input/output control and the arithmetic and logic unit.
Some common constituents of the 8085 microprocessor may include an accumulator, arithmetic and logic unit, temporary register, flag register, and address data bus.
What is the configuration state of the 8085 microprocessor?The configurations state of the 8085 microprocessor mainly include some other constituents like data bus-8-bit, address bus-16 bit, program counter-16-bit, stack pointer-16 bit, registers 8-bit, +5V voltage supply, and operates at 3.2 MHz single segment CLK.
According to the context of this question, an accumulator is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It also mutually supports the arithmetic and logic unit along with some common types of registers.
Therefore, some common constituents of the 8085 microprocessor are well described above.
To learn more about the microprocessor, refer to the link:
https://brainly.com/question/29243062
#SPJ5
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.
Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.
Learn more from
https://brainly.com/question/17956104
you can use view the ______ file to view the hard drive details.
Answer:
/proc/partitions
When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________. When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________.
Answer:
It is called a driver.
Explanation:
Easy Question I will make you brainless Just answer this 10 question!!
Answer:
B
Sc
B
Sc
B
B
Sc
B
Sc
Sc
Explanation:
Not positive sorry if its not 100% correct
how can an attacker execute malware through a script?
Answer:
An attacker can attach a script to a program that you download which then infects your computer.
computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
what does it mean to clear a setting in a dialog box?
Answer:
to delete it
Explanation:
Describe the type of gameplay seen during early video games
Answer:
2d?
Explanation:
It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.
Answer: Arcade Machines
The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.
which data type consumes the least storage space?
text
OLE object
yes/no
memo
Answer:
yes/no
Explanation:
Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.
PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:
1. Software used to search a database using keywords or phrases entered by the user.
A) Navigation Tracking
B) Network
C) Search Engine
D) Ethernet Cable
2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly.
A) Antivirus application
B) Ethernet cable
C) Computer virus
D) HTML
3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.
A) Modem
B) USB
C) Intranet
D) Desktop Interface
4. software that the owner maintains exclusive control over how it is modified and distributed
A) proprietary
B) navigation tracking
C) Spyware
D) operating system
5. set of principles that help users determine what is right or wrong in regards to computers.
A) modem
B) HTML
C) navigation tracking
D) Computer ethics
6. spyware that manages all of the installed applications and hardware on a computer or device.
A) Computer virus
B) operating system
C) citation
D) HTML
7. physical components of a computer system such as computer, mouse, or modem.
A) software
B) Network
C) browser
D) hardware
8. A malicious software program that spies on the user and share the information with a third-party.
A) antivirus application
B) malware
C) spyware
D) Desktop interface
9. icons and menus on the computer that allow the user to interact with the operating system.
A) Desktop interface
B) intranet
C) navigation tracking
D) Computer ethics
10. A tool that provides directions using satellites
A) asynchronous communication
B) navigation tracking
C) Ethernet cable
D) HTML
11. A restricted private network used by organizations to communicate.
A) asynchronous communication
B) navigation tracking
C) intranet
D) browser
12. content that is not owned by any individual or company that is free to use.
A) network
B) proprietary
C) Desktop interface
D) public domain
13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer
A) Cable Internet
B) Computer virus
C) public domain
D) operating system
12. content that is not owned by any individual or company that is free to use.
A) network
B) proprietary
C) Desktop interface
D) public domain
13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer
A) Cable Internet
B) Computer virus
C) public domain
D) operating system
This is a lot, but here goes!
1. C
2. D
3. B
4. A
5. D
6. B
7. D (these are technically peripherals or input devices.)
8. C
9. A
10. B
11. A
12. D
13. B
Just as a note, spyware is malware.
a file extension of .xlsx means that the file contains what?
A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).
Answer:
Explanation:
A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).
Language modeling incorporates rules of __. Select all that apply.
A. story structure
B. grammar
C. dictionary definitions
D. pronunciation patterns
Language modeling incorporates rules of grammar and pronunciation patterns
Language modeling is simply known to use rules of grammar, known pronunciations, and other patternsIt seeks to know the given probability distribution of all linguistic units such as words, sentences. is main work is to predict the next word that is to come in a document.It makes use of grammar principles and the various forms of pronunciation in its task.
Conclusively, we can say that Language modeling incorporates rules of grammar and pronunciation patterns
Learn more from
https://brainly.com/question/6214562
Language learning programs like Rosetta Stone would not be considered a simulation game because you aren’t really practicing verbal skills, you are just memorizing words.
A.
True
B.
Fale
Answer:
True
Explanation:
What refers to the place you drag and drop blocks to create instructions in Scratch?
A.
playground
B.
sprite
C.
editor
D.
environment
Answer:
It is called the editor script area, hence the name is where you create and edit code.
Hope this help please give the brainliest award.