Answer:
Existen tres tipos de seguridad informática y todos deben tomarse en cuenta a la hora de protegernos de las amenazas.
Seguridad de Red. Proteger la red es igual de importante que proteger los equipos propiamente dichos. ...
Seguridad de Software. ...
Seguridad de Hardware.
Explanation:
A(n) _____ is a flexible tool used to analyze data using reports that do not have a predetermined format.
Answer:
decision support system
Explanation:
A pivot table is a flexible tool used to analyze data using reports that do not have a predetermined format. The correct answer is the pivot.
A pivot table is a data summarization tool in spreadsheet software that allows users to rearrange and analyze data dynamically.
It provides a flexible way to aggregate and organize data based on different variables without requiring a predefined report structure.
Therefore, A pivot table is a flexible tool used to analyze data using reports that do not have a predetermined format. The correct answer is the pivot.
To know more about the pivot:
https://brainly.com/question/31261482
#SPJ4
A ________ is an application program that runs on a server-tier computer and manages processes such as items in a shopping cart
Write a C program to do the following tasks:
a) Read the grades of students in the class from the keyboard (assume the grades are
integer in the range 0 to 100).
b) Find the average of the grades that are less than 50. If there are no grades less than 50, then display the message "No grades < 50".
c) Find the average of the grades that are greater than or equal 50. If there are no
grades greater than or equal to 50, then display the message "No grades >= 50".
The program should terminate if the input grade is negative. (Hint: Use sentinel-controlled repetition structure). Note that average of the grades might not be an integer and design your program considering that
Answer:
#include<stdio.h>
void main()
int marks;
printf("Enter your marks ");
scanf("%d",&marks);
if(marks<0 || marks>100)
printf("Wrong Entry");
else if(marks<50)
printf("Grade F");
else if(marks>=50 && marks<60)
printf("Grade D");
else if(marks>=60 && marks<70)
printf("Grade C");
else if(marks>=70 && marks<80)
printf("Grade B");}
else if(marks>=80 && marks<90)
printf("Grade A");
else:
printf("Grade A+");
#may need to replace spaces with tab
Explanation:
it works ( I hope, if it doesn’t tell me what the error is)
What's an example of a digital guide?
Yelp
Starbucks
Explanation:
All these are example of digital guide
Question 1 of 10
What should you use to convert an algorithm to a format that a computer can
understand?
A. An if-then statement
B. An iteration
cha prototype
D. A programming language
SUBMIT
Answer:
I believe that it's D.
Explanation:
PLEASE HELP!
Make a code that should prompt the user for the prices and quantities of three items. The code should calculate the subtotal of the items. After the subtotal is calculated for your list your code should automatically calculate the sales tax using a tax rate of 5%.
Print out the line items with the quantity and total, and then print out the subtotal, tax amount, and total.
Answer:
subtotal = 0total = 0tax_rate = 6.5for i in range(1,4): price = float(input("Enter the price for item " + str(i) + ": ")) quantity = int(input("Enter the quantity for item " + str(i) + ": ")) subtotal += (price * quantity)tax = subtotal * tax_rate/100total = tax + subtotalprint("Subtotal: " + str(subtotal) + ", Tax: " + str(tax) + ", Total: " + str(total))
Explanation:
- Initialize the variables- Create for loop that iterates 3 times- Ask the user for the price and quantity of each item- Calculate the subtotal with given inputs- When the loop is done, calculate the tax and total- Print the subtotal, tax, and total
A menu that appears when an object is clicked with the right mouse button is called a tool-tip help menu
a. True
b. False
Answer:
False
Explanation:
It is just a pop-up bar
In windows 10, where would you save the template so it is available in the available templates list in backstage view?.
Answer:
got to \Username\Documents\CustomOfficeTemplates
Explanation:
The loss of customer trust because of security problems are ________ that created ________.
The loss of customer trust because of security problems are Hacking or negligence that created data breaches.
What are data breaches?A data breach is known to be an incidence where information of customers have been stolen from a system without the authorization of the owner of the system.
Note that customer trust can be destroyed when there is security problems such as Hacking or negligence that leads to data breaches and loss of customers information.
Learn more about customer trust from
https://brainly.com/question/26872475
A checkbox may ask if you want to receive news and updates or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an
When creating or browsing websites, this checkbox in the above scenario is referred to as Opt-in and Opt-out.
What is Opt-in and Opt-out?“Opt-in” is known to be the act that entails a positive action that is needed for one to be able to subscribe as a user to a given program or a newsletter while “Opt-out” is the opposite.
Conclusively, When creating or browsing websites, the Opt-in and Opt-out checkbox can help one to have the right to be in or out of that service as it is not mandatory.
Learn more about checkbox from
https://brainly.com/question/20347398
#SPJ1
______ is a human-readable text format for data interchange that defines attributes and values in a document.
Answer:
JavaScripts Object Notation (JSON)
Explanation:
Learning Activity 2
Directions. Complete the Venn diagram below by writing down the advantages and disadvantages of Configuring client
device systems settings. Use the rubric as your guide.
The advantages of configuring a client device include the following:
It makes it automatically active on a computer network.Communication with other devices.What is a command?A command refers to a set of instructions that are used for the configuration of a client device based on specific system settings, so as to make it active on a computer network.
Some of the advantages of configuring a client device include the following:
It makes it automatically active on a computer network.The ability to communicate with other network devices.The ability to send and receive files.Access to software updates.Converesly, the disadvantages of not configuring system settings on a client device include the following:
RedundancyObsolete software version.Vulnerability to attack.In conclusion, it is very important that you configure system settings on a client's device with the appropraite level of security and parameters.
Read more on client devices here: https://brainly.com/question/6846967
The range of cells receiving copied content is called the ____ area. A. fill B. range C. location D. paste
Answer:
The answer is paste.
D. paste
Fiona wants to fix scratches and creases in an old photograph. Fiona should _____.
Answer:
Fiona should scan the photograph and use image-editing software to fix the image.
Explanation:
Answer:
Fiona should scan the photograph and use image-editing software to fix the image.
Explanation:
Suppose that you have a computer with a memory unit of 24 bits per word. In this computer, the assembly program’s instruction set consists of 198 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. A. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. How many additional instructions could be added to this instruction set without exceeding the assigned number of bits? Discuss and show your calculations. D. What is the largest unsigned binary number that the address can hold?
The number of bits that are needed for this operation code (opcode) is equal to 8 bits.
Given the following data:
Number of operations = 198.Instruction size, I = 24 bits.How to calculate the number of bits.The number of bits that are needed for this operation code (opcode) is given by this mathematical expression:
[tex]2^n > 198\\\\2^8 > 198\\\\256 > 198[/tex]
n = 8 bits.
b. To determine the number of bits that are left for the address part of the instruction:
Opcode, O = 8 bits.Instruction size, I = 24 bits.Address = Instruction size - Opcode
Address = 24 - 8
Address = 16 bits.
c. To determine the maximum allowable size for memory:
Based on the memory unit, this is given by [tex]2^{16}\times 24[/tex]
d. The largest unsigned binary number that can be accommodated in one word of memory is equal to [tex]2^{24}-1[/tex]
Read more on binary number here: https://brainly.com/question/5381889
In a distributed IDS, the ____________________ module analyzes LAN traffic and reports the results to the central manager.
Answer:
LAN monitor agent
Explanation:
Create and Use a Spreadsheet
Upload Assignment link a pdf and please dont plagiarize.
ill give brainlest
Answer:
cant links dont work
Explanation:
Jhon bought a new printer for his desktop computer. It does not work even though he checked all the cables and cords. What do you think he forgot to connect? *
A. The installer
B. The ports and plugs
C. The Device Driver
D. The Utility Software
A chart is a graphical representation of numeric data.
A) True
B) False
_____ oversee the work of various types of computer professionals and must be able to communicate with people in technical and nontechnical terms.
Systems analysts oversee the work of various types of computer professionals and communicate with people in technical and nontechnical terms.
Who works in an information systems?The information systems field is known to be made up of people in a firm who set up and build information systems, the individuals who use those systems, and the people who are known to managing them.
Note that there is high demand for IT staff whose common example includes programmers, business analysts, systems analysts, etc.
Learn more about computer from
https://brainly.com/question/24540334
______ is used to extract knowledge from sources of data-NoSQL databases, Hadoop data stores, and data warehouses-to provide decision support to all organizational users. chapter 14
Q:
__ is used to extract knowledge from sources of data—NoSQL databases, Hadoop data stores, and data warehouses—to provide decision support to all organizational users.
A:
data analytics
Choose one answer for each statement, whether it is True or False:
a) CPU stands for Computer Processing Unit
b) The CPU processes all of the data and instructions that make a computer system work
c) The CPU carries out the fetch-decode-execute cycle
d) The clock speed, number of processor cores and cache size all affect CPU performance
If a password is entered wrongly three times the computer will
Answer:lock
Explanation:its a sicuraty thing
Ian needs to extract the day from the date 5/31/2017 entered in cell A1. Which formula can he use to do this
A cell is a box which can be seen in an Excel sheet. Ian needs to write the formula "=day(A1)".
What is Cell in an Excel?A cell is a box which can be seen in an Excel sheet, this box is named A1, B2, etc. The name of a cell depends upon the column and the row in which it is present.
In case, if Ian needs to extract the day from the date from cell A1. He needs to write the formula:
=day(A1)
This will give the output as 31.
In case, if Ian needs to extract the weekday from the date in cell A1. He needs to write the formula,
=weekday(A1,1)
This will return a number between 1 to 7 which will represent Sunday to Saturday respectively.
Learn more about Excel:
https://brainly.com/question/3441128
#SPJ1
How can Microsoft PowerPoint help me in my studies?
Answer:
It can be used by teachers and students as a way of creating slideshows. PowerPoint allows users to share the presentations live, in the room, as well as digitally online via a video conference interface. Students can also work through a presentation in their own time, making this a versatile way to communicate.
Explanation:
HOPE IT HELPS!!!!!!!!!!!
When developing an output control system, it is important to implement output standards that: (Choose all that apply.)
When creating an output control system, it is important to implement output standards or targets that managers think will have good measure efficiency, quality, etc.
What is this system about?In an output control system, it is important for managers to first make sure that they set of goals or output performance standards or targets that they believe will best measure in terms of efficiency, quality, etc., for their firm.
Note that this system often acts as a behavior control systems that helps in providing methods that can be used to ensure that workers do well in ways that make the work to be efficient.
Learn more about control system from
https://brainly.com/question/27334060
what is a set of algorithms that uses past user data and similar content data to make recommendations for a specific user profile?
Answer:
online recommendation engine
Explanation:
An arrangement in which local businesses team up with schools, hiring students to perform jobs that use knowledge and skills taught in their school classes is called a _____. a. vocational education program b. cooperative program c. internship d. service learning
An arrangement in which local businesses team up with schools, hiring students to do jobs that use skills taught in their classes is called a cooperative program.
What is cooperative program.
The cooperative program in which different firms cooperate with schools to balance the classroom study and practices, enhancing the practical knowledge and develop required skill of students.
Advantages of cooperative program-
Practical learning-Apart from theory learning, in the cooperative program students get the knowledge of practical working and concepts.Experience-In this program, students get the working experience before they graduate.Enhance Network-The students can enhance their network with cooperative team members, with the help of this program.Thus, an arrangement in which local businesses team up with schools, hiring students to do jobs that use skills taught in their classes is called a cooperative program.
Learn more about the cooperative program here;
https://brainly.com/question/9794781
Answer:
b
Explanation:
im a knower
Type the correct answer in the box. Spell all words correctly.
Which is a network of devices built around a person, typically within 10 meters of range?
А
is a network of devices built around a person, typically within a diameter of 10 meters
Reset
Next
Answer:
A PAN (Personal Area Network) is a network of devices built around a person, typically within a diameter of 10 meters
Explanation:
You are using Linux and need to perform a reverse lookup of the IP address 10.0.0.3. Which command would you use to accomplish this
Answer:
nslookup
Explanation:
you could also use ping or tracert
To perform a reverse lookup of the IP address 10.0.0.3 in Linux, you would use the nslookup command.
What is the nslookup commandThe nslookup command is a network administration tool used to query the Domain Name System (DNS) to obtain domain name or IP address mapping information.
To perform the reverse lookup, open a terminal and type the following command:
nslookup 10.0.0.3After running this command, you should see the corresponding domain name (if available) associated with the IP address 10.0.0.3. If there is a valid DNS entry for the given IP address, it will be displayed in the output. If there is no DNS mapping for the IP address, the command will indicate that no information is available.
Learn more about Linux at
https://brainly.com/question/12853667
#SPJ2