Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
Explanation:
A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.
_______________is the career cluster that medical professionals are under.
List two examples of following types of communication
Answer:
Explanation:
sign language is communication
touch is communication
Match each operating system drawback to its respective operating system.
1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System
Answer:
Microsoft Windows - More susceptible to viruses
Linux - Limited support system
Apple - Fewer compatible applications
Explanation:
Generally windows is more susceptible to viruses.
Linux is open source meaning it's up to the community to help you.
Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.
Answer:
1. Microsoft Windows is more susceptible to viruses
2. Mac OS X (Apple OS) has fewer compatible applications
3. Linux OS has a limited support system.
Two parter:
A.) What is wrong with the program segment below? The program does not contain syntax errors.
B.) Fix the programming error(s)
num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
Answer:
the variable num is not declared so the compiler doesn't define it.
add int before num:
int num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
now the code will run but it won't stop as it will never break the condition (num < 9).
Low-level programming languages are (5 points)
a
closer to human languages
Ob
less readable by humans
O
C
more readable by humans
Od
written in human languages
Answer:
Low-level programming languages are essentially written as the computer interprets them (examples would be assembly and machine language), so the answer is B.
Explanation:
You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem
Answer: Configure port security on the switch
Explanation:
Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.
When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.
Three types of common program errors are syntax, runtime, and logic. (5 points)
O True
O False
Answer:
True
Explanation:
Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.
The question is incomplete. The complete question is :
Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.
combustion reaction , photosynthesis , respiration
water + carbon dioxide + sunlight → oxygen + glucose
methane + oxygen → water + carbon dioxide + heat
glucose + oxygen → carbon dioxide + water + energy
Solution :
The chemical reactions that is occurring in the following chemical equations are :
Photosynthesis
water + carbon dioxide + sunlight → oxygen + glucose
Plants uses the light energy from the sun in the presence of water and carbon dioxide produces food by the process of photosynthesis. It produces glucose and oxygen.
Respiration
glucose + oxygen → carbon dioxide + water + energy
The cellular respiration process produces ATP with the breakdown of the glucose and oxygen. During respiration process, carbon dioxide is obtained along with water and energy.
Combustion reaction
methane + oxygen → water + carbon dioxide + heat
Combustion reaction is a chemical reaction in which methane is the main ingredient. Combustion takes place as things burn in the presence to methane and oxygen to form carbon dioxide, water and heat.
What is the difference between electrical and electronic devices?
Answer:
A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.
Answer:
the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.
Explanation:
i hope it helps ;)
Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False
In python please!! Write the definition of a function named countPos that needs integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.
Answer:
Explanation:
The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.
def countPos(number=input("Enter number: "), counter=0):
try:
number = int(number)
if number > 0:
counter += 1
newNumber = input("Enter number: ")
return countPos(newNumber, counter)
else:
newNumber = input("Enter number: ")
return countPos(newNumber, counter)
except:
print(counter)
print("Program Finished")
countPos()
9.6 Code practice Edhesive
Answer:
N = [1,1,1,1,1],
[2,2,2,2,2],
[3,3,3,3,3],
[4,4,4,4,4]
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N=[]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
Explanation:
I got 100%.
In this exercise we have to use the knowledge of computational language in python to write the code.
We have the code in the attached image.
The code in python can be found as:
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N = [1,1,1,1,1], [2,2,2,2,2], [3,3,3,3,3], [4,4,4,4,4]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
See more about python at brainly.com/question/26104476
what is the answer???
Answer:
I think it should be C
Explanation:
A group of two or more computers that are link together.
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Answer:
The right approach is Option b (volume testing).
Explanation:
A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.Other options are not related to the given query. So the above is the right response.
how important the role of valet and butler service in the hospitality
Hardware failure, power outages, and DOS attacks will affect:
data confidentiality.
data integrity.
data verification.
data availability.
Answer:
The answer should be data availability
also have a good day people !!
Answer:
Thx u2!!
Explanation:
Everyone have a good day!
Answer:
You too and thank you for 50 points!!
Explanation:
When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
Answer:
lower-priced models offer more features
Explanation:
Type the correct answer in the box. Spell all words correctly.
Alan maintains the efficiency of a printing plant by supervising plant operations and implementing safety procedures. What does he work as?
Alan is working as a _____________.
Answer:
Alan is a Maintenance Supervisor.
Explanation:
Answer:
printing plant manager
Explanation: