if chooseactivity is a javascript promise object that returns a string value, which code should you use to initiate this promise?

Answers

Answer 1

if chooseactivity is a JavaScript promise object that returns a string value, the code you should use to initiate this promise is:

chooseActivity

.then(choiceMsɡ => console.log(choiceMsɡ))

.then(choiceMsɡ => console.log(choiceMsɡ));

What is JavaScript?

When building websites, applications, servers, and even video games, web developers frequently use the lightweight programming language JavaScript to create more dynamic interactions.

Along with HTML and CSS, developers typically use JavaScript. In order to format HTML elements, the scripting language works well with CSS. User interaction is still maintained by JavaScript despite CSS's inability to do so.

It is worthwhile to learn JavaScript because it is used in the creation of websites, mobile applications, and video games. You can do this by using educational websites like BitDegree or by investigating free JavaScript applications and templates on websites that host source code, like GitHub.

Learn more about JavaScript

https://brainly.com/question/16698901

#SPJ4


Related Questions

you will need 2 terminals open for this. just like in class, you need a main terminal for generating payloads, running slmail-testbed.py, etc., and another terminal with a netcat listener listening for the reverse shell. therefore, you must use the script command in both terminals to create 4 files using 1 call to script in each terminal window.

Answers

Linux has a command called Netcat that can be used for network testing, port listening, port redirection, and port checking. The Swiss Army Knife of networking tools is another name for Netcat.

What is networking?

Networking is defined as the process of moving data around and transferring it between nodes in a network through a common channel. Making new friends, industry contacts, and even commercial partners is the goal of networking.

A hacker typically tries to get shell access to a system in order to run the malicious payload commands. The obtained shell is known as the reverse shell, and an attacker might use it to execute any code while posing as the root user.

Thus, Linux has a command called Netcat that can be used for network testing, port listening, port redirection, and port checking. The Swiss Army Knife of networking tools is another name for Netcat.

To learn more about networking, refer to the link below:

https://brainly.com/question/15002514

#SPJ1

Your site is dependent upon the use of the rlogin utility for remote access. For security reasons, you want to prevent the hosts in the marketing department from accessing the payroll server, but allow all others to do so. Which file should you use to create this restriction?

Answers

So to the hosts can be denied in the marketing department and to give access to other we have to use the file (hosts. deny)

What is meant by hosts deny?

The hosts. allow file is used in conjunction with hosts to determine whether to accept or deny a connection attempt. deny. The hosts. allow file is just a plain text configuration file with a simple syntax.

So to the hosts can be denied in the marketing department and to give access to other we have to use the file hosts. deny

What is meant by hosts deny?

The hosts. allow file is used in conjunction with hosts to determine whether to accept or deny a connection attempt deny. The hosts. allow file is just a plain text configuration file with a simple syntax.

Essentially, hosts

Deny, which we also employ here when configuring hosts, is just the act of denying the undesired source in a common language.

Deny is used to stop the marketing division from using the server and instead assigns another as the host.

allow

Thus hosts. deny is used in this case

To know more about remote access follow this link:

https://brainly.com/question/29032807

#SPJ4

Ramirez company installs a computerized manufacturing machine in its factory at the beginning of the year at a cost of $83,600. The machine's useful life is estimated at 20 years, or 398,000 units of product, with a $4,000 salvage value. During its second year, the machine produces 33,800 units of product.

Answers

Machine cost: $83,600 Cost less Salvage Value= $ 83600 - $ 40 or Salvage Value= $ 4000 Net

Describe depreciation ?Depreciation is a method of accounting used to spread out the expense of a tangible asset over the course of its useful life in order to account for value losses over time.Depreciation calculation using the straight line method The computerized production device that Ramirez Company initially installed cost $83,600.20 years is the machine's useful life Value of salvage = $4,000 Depreciation refers to the slowDepreciation is calculated as follows: 100% / (2 + useful life) = (100% / 20) * 2 \s= 10%Cost - Previous Depreciation * 10% = (83,600) Depreciation in First YearCost of machine: $83,600 Salvage Value = $ 4000 Net or Salvage Value = $ 83600 - $ 40 less the cost

To learn more about Depreciation refer to:

https://brainly.com/question/1203926

#SPJ4

which type of software program is capable of reproducing itself as it spreads from one computer to another?

Answers

Worm is capable of reproducing itself as it spreads from one computer to another.

Which type of software that has self-replicating?A computer program known as a "worm" has hostile intentions and can duplicate itself, spread across a network, and do so with or without human assistance. Its goal is to covertly copy itself and insert itself onto other computers.As it travels from one computer to another, the worm has the ability to reproduce itself.Worms either employ social engineering to deceive people into executing them, or they exploit a flaw in the target system to spread. A worm gains access to a computer through a system flaw and uses the system's file-transport or information-transport features to roam unimpeded.Viruses can multiply themselves even when they are not standalone programs.

To learn more about worm, refer to

https://brainly.com/question/23463888

#SPJ4

The ______ legislation includes $65 billion in investments in broadband internet access.

Answers

The Infrastructure legislation includes $65 billion in investments in broadband internet access.

THE INFRASTRUCTURE LEGISLATION

The infrastructure legislation (formerly known as the Infrastructure Investment and Jobs Act) allocates a total of $65 billion for broadband, which will be spread across a range of schemes. The largest is the Broadband Equity, Access, and Deployment (BEAD) initiative, which will fund deployments in unserved and underserved areas through the states. Unserved regions lack access to broadband service with download speeds of at least 25 Mbps and upload rates of at least 3 Mbps.

These measures may involve research and data collection to identify unserved and underserved areas, the establishment or expansion of a state broadband office, employee training, and community outreach.

Learn more about other Legislation here:

https://brainly.com/question/15522014

#SPJ4

how can computers and technology help in investigating a fraud? what kinds of challenges can the involvement of technology present to a case?

Answers

Today's computer forensic analysts can recover data that has been deleted, encrypted, or hidden within the folds of mobile device technology; they can be called to testify in court and relate the evidence discovered during investigations.

The computer forensic process:

A computer forensic examination is performed to recover data from computers that have been seized as evidence in criminal investigations. Experts examine evidence that may be presented in court during proceedings in a systematic manner. Forensic experts should be involved early in an investigation because they can assist in properly collecting technical material in a way that allows the content to be restored without compromising its integrity.

Many (or all) of the following steps can be included in forensic investigation efforts:

Collection entails the search for and seizure of digital evidence, as well as the acquisition of data.Examining entails using techniques to identify and extract data.Analysis is the process of using data and resources to prove a point.Reporting entails presenting the information gathered.

To know more about computer forensic, visit: https://brainly.com/question/14405745?referrer=searchResults

#SPJ4

Students will write 3 classes: BankAccount.java, BankAcountDemo.java and Financial.java
the BankAccount.java class should have the following components:
5 instance variables : balance, accName, accNum, accountType, interestRate
1 static variable : lastAccNum = 0
2 constructors : default and an overloaded constructor that takes in 3 explicit parameters(balance, accName, and accountType) to initialize the fields. (demonstrate the use of the keyword "this"). The other two fields will be assigned values inside the constructor.
13 methods
4 setter methods : setBalance, setName, setAccountType, and setInterestRate
4 getter methods : getBalance, getName, getAccountType, and getInterestRate
a withdraw method
a deposit method
a transfer method
a displayAccountInfo method
an addInterest method that invokes the static method percentOf from the Financial class and takes in two parameters; the interestRate field and the balance field. In this method interest will be added only to savings accounts according to the interestRate value. You should NOT add interest to a checking account.
Note: after calculating the interest, you will need to add it to the balance.
The BankAccountDemo.java class should have the following:
Create 3 objects AdamsAcc (C), SamsAcc(S), and LeilasAcc(S) use the default constructor for the first object and the second constructor for second and third object.
you are free to test your code and use the methods on any objects, but make sure to:
invoke and demonstrate all the methods
Invoke the addInterest method two times; once with LeilasAcc and once with SamsAcc.
invoke the displayAccountInfo() method several times to show all the changes.
Final Step: add an exception to the withdraw method whenever the amount to be withdrawn exceeds the balance.
Test this by trying to withdraw an amount that is greater then the balance in your Demo class.
Take a snapshot of the the generated exception.

Answers

A component is a real object that has a visual representation that can be displayed on a screen and can interact with the user. Components include things like buttons, checkboxes, and scrollbars in a typical graphical user interface.

What are the main components of Java class?

A method definition contains two main components, like a class: the method declaration and the method body. The following figure illustrates how the method declaration defines each of the method's attributes, including access level, return type, name, and parameters. All the action happens in the method body.

Therefore, With the use of class diagrams, we can abstractly model software without having to examine the source code. Classes in the source code and class diagrams are identical.

Learn more about Java here:

https://brainly.com/question/14615266

#SPJ1

you are a new lenovo service provider and need to use the recovery utility information on the lenovo support website. this information is restricted and is only available to users with service provider accounts. who should you contact to request a service provider user id and password?

Answers

Based on the above, the person that  you  should contact to request a service provider user id and password is Regional leads

Who is a Regional leads?

The stores, merchandise, and general presence of the company in a given region are managed by region leaders. They make sure the objectives are achieved. If not, they come up with plans to achieve the goals. Leaders in a region are expected to comprehend both the local economy and its historical context.

A regional lead is a manager, educator, or administrator who is in charge of finding and supporting workforce champions within organizations within their assigned region. Hence, he or she is the best person for you to contact.

Learn more about Region from

https://brainly.com/question/2001834
#SPJ1

In the real world, a many-to-many relationship exists between two data tables in an Access file. The data tables are titled “Full-time Employees” and “Retirement Benefits.” Which statement best describes the process for setting up the relationship between these two tables?

a. Create a one-to-one relationship for each relationship shared by the tables.
b. Create a one-to-many relationship for only the most important relationships shared by the tables.
c. Create a junction table to break the relationship into two separate one-to-many relationships.
d. Create a cross-reference table to delete any unneeded relationships in both tables.

Answers

The statement that best describes the process for setting up the relationship between these two tables is option C: Create a junction table to break the relationship into two separate one-to-many relationships.

What are the types of relationship which we can create between two tables?

Click New in the Manage Relationships box. Select a table from the list by clicking the Table arrow in the Create Relationship box. This table should be on the many side when there is a one-to-many relationship.

A relationship is established by comparing data in key columns, which are typically fields or columns with the same name in both tables. Most frequently, a connection links a field in one table to the main key, or the column that serves as each row's unique identity, in another table.

Therefore, The solution is to divide our data into various tables and establish connections between them. Normalization is the practice of dividing up data in this way to eliminate duplication and enhance data integrity.

Learn more about relationships from

https://brainly.com/question/2587531
#SPJ1

when the router looks up the destination in the routing table for every single packet, it is called?

Answers

Route lookups, also known as route resolution, are when the router checks the target in the routing table for each and every packet.

Resolution – what is it?

The number of unique pixels that can be displayed in each dimension depends on the display resolution or display modes of the a digital television, computer monitor, or display device. It is a vague word, especially since projection displays that use fixed picture-element (pixel) arrays, flat-panel displays, including liquid-crystal displays, and ray tube ( crt tube (CRT) displays, all regulate the shown resolution individually. Typically, it is stated as width height with the units in pixels, such as 1024 768, which denotes a breadth of 1024 pixels and a height of 768 pixels.

To know more about resolution
https://brainly.com/question/984943
#SPJ4

what type of error occurs when a programmer uses an incorrect calculation or leaves out a programming procedure?

Answers

Answer:

A logic error

Explanation:

Which task would be best completed by using the Find Unmatched Queries Wizard for two tables named “Products Offered” and “Customers”?

a. finding customers who have bought a minimum number of products
b. finding customers who have bought more than one of the same product
c. finding a company’s products that have never been sold
d. finding a company’s products that have sold for more than a certain amount

Answers

The task that would be best completed by using the Find Unmatched Queries Wizard for two tables named “Products Offered” and “Customers” is option b:  finding customers who have bought more than one of the same product.

What does mismatched query wizard mean?

You can build a query using this wizard that reports any orphaned or widowed records between two Microsoft Access tables. When there is no corresponding record in the one-side (parent or primary) table, a record in the many-side (child or related) table relationship is said to be orphaned.

Therefore, In the Queries group on the Create tab, select Query Wizard. Double-click Find Unmatched Query Wizard in the New Query dialog box. Select the table with the mismatched records on the wizard's first page, and then click Next.

Learn more about Customers from

https://brainly.com/question/380037
#SPJ1

if you have to spare, please drop by my office. question 9 options: a) sometime b) some time c) sometimes

Answers

Answer:

B) Some time

Explanation:

Out of all of the answer options, option B) is correct here. Lets discuss why the other options don't work.

Option A uses the phrase "sometime". Using this spelling, the definition is "at some unspecified or unknown time"

Option C) uses the phrase "sometimes", which is defined as "occasionally, rather than all of the time"

We can use process of elimination to determine that B) is correct.

Using new technology, some insurers are offering customized rates for buyers who install equipment in their car that monitors speed, acceleration, distance traveled, and other factors. What problems are the insurance companies trying to solve?.

Answers

The difficulties that the insurance companies are aiming to address are moral hazard and adverse selection. B is the best choice as a result.

What is insurance?

A party undertakes to ensure another party compensation in the event of a certain loss, damage, or injury in exchange for a fee as a way of financial loss protection. It is a method of risk management that is mostly applied to protect against the risk of a potential loss that may or may not occur.

It ensures the insured person obtains everything is legally required for them to regain their sanity and make decisions .A new beginning that makes up for all losses.

According to the theory of adverse selection, insurance buyers are more inclined to choose bad risks than good ones. Having insurance can change one's behavior, which is a phenomena known as moral hazard. If one had insurance, they might act carelessly.

Is insurance a useful thing?

Because permanent life insurance can generate cash value or be converted into cash, depending on the type of policy and how it is used, it may be seen as a financial asset. In other words, the majority of permanent life insurance contracts have the capacity to accumulate monetary value over time.

Adverse selection and moral hazard are the issues that the insurance companies are attempting to address because only those who are confident in their ability to drive safely will buy this insurance.

As a result, choice B is suitable.

To learn more about insurance visit:

https://brainly.com/question/27822778

#SPJ4

The open source movement makes _____ available to everyone in an effort to continue to build and improve the functionality of open source software.

Answers

The open source movement makes source code available to everyone in an effort to continue to build and improve the functionality of open source software.

What is meant by source code ?

In general, programming statements written by a programmer using a text editor or visual programming tool and then saved in a file are referred to as source code. When the source code is compiled using a C compiler, the output, a compiled file, is referred to as object code.

The foundation of a computer programme is its source code. It includes declarations, commands, instructions, functions, loops, and other statements that serve as guidelines for how the programme should run.

One or more text files kept on a computer's hard drive typically contain the source code that makes up a programme; these files are typically meticulously organized into a directory tree known as a source tree.

To learn more about source code refer to :

https://brainly.com/question/4593389

#SPJ4

what is an example of cybersquatting? a. overwhelming a firm's website by flooding it with seemingly legitimate messages b. acquiring a domain name to extort a firm, individual, product, or trademark holder c. slowing down packet transfer to an internet-connected computer d. threatening to destroy information stored in a firm's servers e. hacking into and defacing an organization's public web presence and refusing to let the site's owner regain control

Answers

Answer:

b. acquiring a domain name to extort a firm, individual, product, or trademark holder

after reading the email, you notice that the acronym whm appears in multiple places. you look it up online, and the most common result is web host manager. that doesn’t seem right to you, as it doesn’t fit the context of a feminist bookstore. how do you proceed?

Answers

After reading the email, you notice that the acronym whm appears in multiple places, the way to proceed is option C: Send your supervisor a polite, concise email, asking them to confirm the meaning of WHM.

What is the main purpose of email?

Email can be used for a variety of things, including getting in touch with friends, talking with professors and bosses, getting information, and submitting applications for jobs, internships, and scholarships. Your goals will determine the formality, target audience, and desired results of the messages you send.

E-mail, or electronic mail, is seen as its full name. The modern method of communication is email. Due to the advancements made in technology over the past few years and it including the rise of computers, the internet, and smartphones and this method of communication is now widely used.

Therefore, in regards to the question above, You should therefore be careful not to write anything that could be considered impolite in an email. Asking them to confirm the meaning of WHM in a polite, brief email to your supervisor is appropriate.

Learn more about email from

https://brainly.com/question/24688558
#SPJ1

See full question below

After reading the email, you notice that the acronym WHM appears in multiple places. You look it up online, and the most common result is web host manager. That doesn’t seem right to you, as it doesn’t fit the context of a feminist bookstore. How do you proceed?

Schedule a meeting with your supervisor, the client, and another analyst on your team to figure out the meaning.

Proceed with the project assuming WHM must mean web host manager.

Send your supervisor a polite, concise email, asking them to confirm the meaning of WHM.

Call the client to ask what WHM means and inform them that using acronyms is not a professional business practice.

a relational database model allows relationships between data to be considered without concern for the .

Answers

A relational database model allows relationships between data to be considered without concern for the data.

In a relational database, data is stored in one or more tables (or "relations") of columns and rows, making it simple to see and comprehend how various data structures relate to one another. Data is organized in relational databases according to predefined relationships. Relationships are logical connections that have been made between various tables as a result of their interaction.

To organize data in tables, rows, and columns, use a relational database (RDB). By joining tables, an RDB can create links, or relationships, between information, which makes it simple to comprehend and gain insights into how different data points are related to one another.

To know more about relational database click here:

https://brainly.com/question/13262352

#SPJ4

devaki is a network engineer. she is diagnosing an issue with a small business customers wireless local area network (wlan). she knows the institute of electrical and electronics engineers (ieee) has created the standards involved in various network technologies. while wlan standards cover a wide array of subsets, which general standard does she need to consult that addresses all vlans?

Answers

Since Devaki is an engineer who is designing network security for her company's infrastructure. The type of protection  is called option A; Defense in depth.

What does defense-in-depth mean in cybersecurity?

The term Defense in Depth (DiD) is a term used to describe an information security strategy in which various security measures and controls are thoughtfully layered across a computer network to safeguard the privacy, availability, and integrity of the network and the data it contains.

Note that Defense in depth (DiD) is a cyber security tactic that employs a number of layered, redundant defensive measures to safeguard sensitive information, personally identifiable information (PII), and information technology assets. The following security layer prevents the potential cyberattack if one security measure fails.

Therefore, the term a defense-in-depth approach, also known as a security-in-depth approach, is a cybersecurity method that employs multiple layers of security for comprehensive protection. Organizations in the security industry can lessen vulnerabilities, contain threats, and manage risk by using layered defenses.

Learn more about Devaki From

https://brainly.com/question/29316552
#SPJ1

See full question below

Devaki is an engineer who is designing network security for her company's infrastructure. She is incorporating protections for programming flaws, default settings, maximum values, processing capabilities, and memory capacities on devices, as well as malicious code and social engineering. What is this type of protection called?

a) Defense in depth

b) Divide and conquer

c) Security through obscurity

d) Single point of failure avoidance

to test dns configuration by resolving a host name to an ip address, which command or commands can you use? (choose all that apply.)

Answers

The commands used to test DNS configuration by resolving a host name to an ip address are


a. nslookup hostname*****

b. dig hostname

c. host hostname

Define DNS configuration.

A hierarchical and distributed naming system for computers, services, and other resources on the Internet or other Internet Protocol networks is called the Domain Name System (DNS). The domain names granted to each of the connected entities are linked to various pieces of information.

The Domain Name System, or DNS, converts domain names into machine-understandable IP addresses. DNS makes sure that the internet is not only easy to use but also operates smoothly, loading whatever content we request promptly and effectively.

To learn more about DNS Configuration, use the link given
https://brainly.com/question/27960126
#SPJ4

a character in an opera needs to communicate information quickly. it's background information, needed to advance the plot. this would best be achieved through:

Answers

Opera currently allows users to sync their open tabs, preferences, and bookmarks between mobile and desktop browsers, but in the past, doing so required users to sign up for an account on each platform and sign in, or to utilize the more constrained "Opera Touch" app.

What is Opera?

Opera currently allows users to sync their open tabs, preferences, and bookmarks between mobile and desktop browsers, but in the past, doing so required users to sign up for an account on each platform and sign in, or to utilize the more constrained "Opera Touch" app.

However, after installing the latest upgrades for Android and desktop, users can sync all of that data across devices using the core apps without logging in via a QR code.

The most recent Android and desktop versions of Opera offer two new cross-device sync techniques that make it even more easy without compromising user privacy, making it a great browser option for data privacy advocates.

Therefore, Opera currently allows users to sync their open tabs, preferences, and bookmarks between mobile and desktop browsers, but in the past, doing so required users to sign up for an account on each platform and sign in, or to utilize the more constrained "Opera Touch" app.

To learn more about opera, refer to the link:

https://brainly.com/question/1378985

#SPJ1

you should omit spaces when you assign a variable without using single or double quotation marks around its value. t/f

Answers

It is normally recommended to enclose a variable's name in double quotations when referring it.

With the exception of $,'(backquote), and, this precludes reinterpretation of any special characters contained in the quoted string (escape). Double quotation marks can be used to denote a string in a formula. The double quotations can also be escaped, which instructs Numbers, Pages, and Keynote to return the quotation marks as a text string rather than treating them as the beginning or end of a string. Simply put, quote everything where word splitting and wildcard expansion are not handled by the shell. The text in between single quotes is protected verbatim. When you need to make sure that the shell doesn't even touch the string, this is the right tool.

Learn more about variable here-

https://brainly.com/question/13375207

#SPJ4

true or false? the international electrotechnical commission (iec) develops standards, which cover both wired and wireless communication technologies, that are commonly adopted by member countries in the european union (eu).

Answers

The international electrotechnical commission (iec) develops standards, which cover both wired and wireless communication technologies, that are commonly adopted by member countries in the European union (eu) is false.

What is the International Electrotechnical Commission (IEC)?

They are working alongside the ISO and they are called the International Electrotechnical Commission (IEC). This body focuses on electronics and electronic standards.

Their Standards include a wide range of topics, such as:

Power productionSemiconductorsTelecommunicationsReal hardware for computers and networks

Therefore, the  ETSI Cyber Security Technical Committee (TC CYBER) creates information and communications technology (ICT) standards that are widely used by European Union member nations (EU). Hence the statement above is incorrect.

Learn more about wireless communication from

https://brainly.com/question/7022589
#SPJ1

The list that a lookup field displays is called the ___________.

Answers

The list that a lookup field displays are called the Lookup List.

What is a Lookup field?

A lookup field is a table field that gets its value from some other table or query. To construct a lookup field, utilize the Lookup Wizard wherever feasible.

The Lookup Wizard automates the procedure by populating the required field attributes and creating the necessary database associations.

A lookup field can supply values for a cascading list and make data entry in a field easier.

The Lookup Wizard creates a connection between tables. It generates a foreign key that references to another's main key.

Learn more about the lookup field:
https://brainly.com/question/25698028

#SPJ1

providing space for students to write their name and date on a test sheet or answer sheet is a guideline used for:

Answers

Studnet Name:_______________________          Date:__/__/____

Q1:

A.

B.

C.

D.

which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet?

Answers

On your new tablet, you can toggle on a mode that lets you move an object to a new spot only with one finger by swiping your finger across the screen.

What are gestures ?

A gesture is a visible body activity that conveys specific messages in place of or in addition to words. It is a type of nonverbal or non-vocal communication. Gestures might include the movements of the hands, face, or other body parts. Physical non-verbal communication like proxemics, purely expressive displays, or displays of shared attention are different from motions in that they convey specific messages. People can express a wide range of emotions and ideas through motions, from hostility and scorn to admiration and affection.

To know more about gestures
https://brainly.com/question/12115354
#SPJ4

Which of the following correctly uses C++11's range-based for statement to iterate through every element of the array variable arr?
A) for (auto x : arr)
B) for (auto x; x C) foreach (x in arr)
D) for x in arr

Answers

The for (auto x: arr) statement in C++11 iterates through each element of the array variable arr.

What is array?

Since C++ 11, a range-based for loop has been included. It runs a for loop across a number of values. used as a more readable alternative to the classic for loop that operates over a range of values, such as all of the container's elements.

To create loops that must run through a range, use the range-based for statement. A range is anything you can iterate through, such as a std::vector or any other C++ Standard Library sequence whose range is determined by a begin() and end().

The range() function allows us to iterate across a set of code a predetermined number of times. The range() function returns a series of numbers that by default starts at 0 and advances by 1 before ending at a specified number.

To learn more about array refer to:

https://brainly.com/question/26104158

#SPJ4

your laptop is running windows 10. you notice a security message indicating that windows firewall has been disabled. the laptop is currently connected to your organization's network, and the domain network profile settings are in effect. you plan to travel this week and connect the laptop to various airport wi-fi hotspots. you need to enable windows firewall for any public network. in this lab, your task is to: turn on the windows firewall for the public network profile only. allow the following additional service and programs through the firewall for the public network profile only: a service named key management service an application named arch98 an application named apconf

Answers

Simply quitting the web browser or restarting the computer will delete it.

How can I stop the Windows Firewall pop-up warning from appearing? It can be eliminated by simply closing the browser (ideally through Task Manager) or restarting the computer (some malicious sites employ scripts that prevent users from closing the browser).The "Windows Firewall Protection Alert" bogus error message is a ruse designed to make you believe that your machine has crashed or that a virus has been discovered while actually being a scam from Microsoft.This is done to try to frighten you into calling one of the numbers provided for support.A form of malware called phishing, also known as malware that wants to trick you into contacting scammers, may appear on your screen while you're browsing as a Windows Defender security warning.

To learn more about Firewall  refer

https://brainly.com/question/13693641

#SPJ1

You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise's strong password policy, which of the following methods will be the easiest for you to use when retrieving the password? a. Brute force attack b. Dictionary attackc. Hybrid attack d. Rule attack

Answers

Since You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter, the method that will be the easiest for you to use when retrieving the password is option d. Rule attack.

What is dictionary attack?

A kind of brute force attack where a hacker uses a "dictionary list" of terms and expressions that people and companies frequently use to try to break a password-protected security system is the term dictionary  attack.

Note that Hashcat's rule-engine was created to be 100% compatible with John the Ripper and PasswordsPro rules and vice versa for all functions that share the same letter name. Later, we began introducing some of our own, incompatible functions. To avoid confusion, these functions were given their own letter names.

Therefore, based on the above, When an attacker is aware of the rules that a system's passwords are built on, such as "alphanumeric and eight characters long," they can target their password cracking technique.

Learn more about Rule attack from

https://brainly.com/question/29358198
#SPJ1

Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file? (Choose two.)

Answers

grep root/etc/password | tee~/root.txt are the two lines containing the word root and display them out to the screen while simultaneously writing the results to a file

What is the word root in the LINUX?

The root account has essentially boundless access to all programs, files, and resources on the system. The root account is a special user with user ID (UID) 0 in the usually given the username root.

Both linux and unix have the same root words, the root users are same as the root words so for the root word identification the line greproot/etc /password is used

and for the displaying of the used keyword and root word is root word is tee~/root.txt

Hence to conclude root key word and displaying that in LINUX  is grep root/etc/password | tee~/root.txt

To now more on linux functions follow this link:

https://brainly.com/question/25480553

#SPJ4

Other Questions
consider three 1-l flasks at stp. flask a contains nh3 gas, flask b contains no2 gas, and flask c contains n2 gas. in which flask are the molecules most ideal in behavior? (1)College classrooms are often drab and dreary places. (2)Walls are painted a variation of institutional gray; furniture is easy to clean, but uncomfortable and unattractive. (3)Chairs are lined up in straight rows facing the teachers desk or lectern. (4)In one study, over 80 percent of university students rated their classrooms negatively, describing them as ugly, cramped, stuffy, and uncomfortable. (5)Research by environmental psychologists is beginning to show that unattractive classrooms are not only unappealing; they may also adversely affect academic performance.(6)A carefully controlled study of classroom environments was conducted by Wolling and Montage (1981). (7)They selected two identical classrooms located side by side in the psychology building. (8)The control classroom, which they called the sterile classroom, had white walls, a gray carpet, and rows of plastic desks. (9)The experimental classroom, which they called the friendly classroom, was redecorated with the help of a design consultant. (10)Several walls were painted bright colors, art posters were hung on the walls, large plants were added to the room, and colorful Chinese kites were hung from the ceiling. (11)In addition to traditional desks, a part of the room was outfitted with area rugs, color-coordinated cushions, and wooden cubes to provide nontraditional seating.(12)The researchers investigated how these two different environments affected performance in actual college classes. (13)Two professors teaching introductory psychology agreed to participate in the study, although they were not informed of the purpose of the research. (14)When school began, each class was randomly assigned to one of the two rooms. (15)Halfway through the term, the classes switched rooms. (16)Thus students in both classes spent half the term in the control room and half in the friendly room. (17)Students were not told they were being studied; the switch in rooms was explained as occurring because the original room was needed for videotaping.(18)The most striking finding from this study was that students performed significantly better on regular course exams when they were in the friendly rather than the sterile classroom.Question4. The students in the studya. helped design the friendly classroom.b. took two different courses.c. stayed in one room throughout the course.d. were not told they were involved in a study. Complete the car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information. Ex: if the input is: 2011 18000 2018 where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:. Solve the equation cos 2 = -5 cos - 3 on the interval 0 < 2 Answers must be exact. a client who had a roux-en-y bypass procedure for morbid obesity ate a chocolate chip cookie after a meal. after ingestion of the cookie, the client reported cramping pains, dizziness, and palpitation. after having a bowel movement, the symptoms resolved. what should the nurse educate the client about regarding this event? bile reflux 2 + 4(2x-1) = 6.25x-26with solution please a femur 18 inches long is placed in traction with an elevation of 6.2 inches. what is the angle of elevation of the femur? A container with volume 1.61 L is initially evacuated. Then it is filled with 0.246 g of N2. Assume that the pressure of the gas is low enough for the gas to obey the ideal-gas law to a high degree of accuracy. of the root-mean-square speed of the gas molecules is 192 m/s, what is the pressure of the gas? Express your answer in pascals. a constant magnetic field of 7 7 t passes through a square with side 3 3 m at an angle of 55 55 from the surface. calculate the magnetic flux that passes through the square. round your answer to two decimal places Which inequality is represented by the number line?A.|2x + 1| 7B.2|x + 1| 8C.|2x 1| 9D.2|x 1| 10 Due to periodicity, which of the following elements has chemical behavior similar to that of fluorine? Potassium Chlorine Magnesium Iron What is the result when the number 48 is decreased by 75%? when analyzing a proposed project, a cash flow that is unaffected by the decision to accept or reject the project is called: Suppose that x and y vary inversely, and x = 30 when y = 2. Find y when x=5. a federal law called a(n) statute is the source of an administrative agency's authority and establishes that agency's scope and jurisdiction over certain matters. in 2017, prime minister may dissolved parliament with the support of a 2/3 majority of house of commons members. why did she do this? quizlet if a car takes a banked curve at less than the ideal speed, friction is needed to keep it from sliding toward the inside of the curve (a real problem on icy mountain roads). (a) calculate the ideal speed to take a 85 m radius curve banked at 15 degrees. The true average diameter of ball bearings of a certain type is supposed to be 0.5 in. A one-sample t test will be carried out to see whether this is the case. What conclusion is appropriate in each of the following situations? (a) n 15 t 1.66 a 0.05 o Reject the null hypothesis. There is sufficient evidence that the true diameter differs from 0.5 in o Reject the null hypothesis. There is not sufficient evidence that the true diameter differs from 0.5 in o Do not reject the null hypothesis. There is sufficient evidence that the true diameter differs from 0.5 in o Do not reject the null hypothesis. There is not sufficient evidence that the true diameter differs from 0.5 in Because services are __________, it is often difficult for marketers to convey the benefits to consumers. you are a nurse in a medical-surgical hospital unit caring for a patient who has had limited mobility due to a chronic leg wound and has been taking oxycodone for pain multiple times per day. the patient tells you they have not had a bowel movement for five days. (8 pts) what could have contributed to the development of the constipation?