Answer:
The answer is "TLS and the DBMS".
Explanation:
In given- question there are two questions were included, which can be defined as follows:
The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of SSL, and by encrypting information and data transfer.
The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.
what's the answer to this
Answer:
S
Explanation:
The index operator will address individual characters in the string.
What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?
Answer:
security In-depth
Explanation:
The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole
Therefore in the given situation, the security In-depth required to layered the safeguarding channels to detect the infiltration
Hence, the security In-depth is the correct answer
A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.
Answer:
A. Document findings, actions, and outcomes.
F. Run a virus scan.
Explanation:
Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis
Since Ned is trying to decide how he wants to connect the nodes on the network he created, the two options that he has are option b and C:
b. Through hard cabling or wireless radio waves.
c. Through ethernet cables or Bluetooth.
What kind of cable does a computer system typically use to connect to a network?A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.
Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.
Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.
Learn more about ethernet from
https://brainly.com/question/28156384
#SPJ1
Ron is an electrician. He loves to work with wires and switches. What type of input does Ron carry when called for fixing an electric problem?
(Correct answer only)
A. tools
B. information
C. capital
D. people
E. power
this help me please.
Answer:
1) 1011010
2) 1100100
3) 1010101
4) 23
5) 22
6) 24
Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?
Answer:
The correct answer will be "Semi-structured data".
Explanation:
Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed. It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.So that the given scenario is the example of semi-structured data.
When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database
Answer:
Database
Explanation:
Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.
&. Give three differences between a
web browser
and web page
Answer:
The three differences between the Web page and Web browser are given below.
Explanation:
A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.what are the features of dot net ???
Answer:
1) interperability
2) portability
3) security
4) simplified deployment
5) base class library
6) language indepence
Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)
A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.
The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.
What is resolution?Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.
When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.
Thus, the correct option is A. Some image resolution was lost while uploading it.
To learn more about resolution, refer to the link:
https://brainly.com/question/15189307
#SPJ5
A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a
Answer:
A reverse proxy.
Explanation:
A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a reverse proxy.
In Computer Networking, a single server can be configured to appear as the endpoint for many other servers acting behind it through the use of a reverse proxy.
Hence, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.
Your computer has been operating without problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard, floppy drive, and hard disk flash at startup. Your computer has an American Megatrends, Inc. (AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective
the board if not try a restart a couple more times and we see what happens from there
How should you behave in an online academic environment?
Answer:
as u want lol
I think it's funny
Answer:
Maintain discipline
Ask questions
Try not to crack jokes
dress smartly
be friendly
don't underestimate anyone each person have their own unique skills
2. Give technical terms for
a) A feature which computer never gets tired.
b) A memory to be used on fifth generation of computer.
c) Computer that used continues data
. d) An illegal activity that harms people by using computer.
e) A machine developed by Charles Babbage in 1833AD.
Answer:
Cccccccccccccccccccccccccccccccccc
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?
Answer:
The answer is "DDoS "
Explanation:
The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.
This attack is aimed to avoid legal customers of one's website from accessing it. In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with. One other way to successfully attack is to send fake requests from the attacker.What steps are needed for word to create an index
Answer:
Do this:
Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...
Click the References tab.
In the Index group, click the Insert Index button. The Index dialog box appears. ...
Click the OK button to insert the index into your document.
Answer:
Position the insertion pointer where you want the index to appear.
(the insertion point is the point where the next characters typed from the keyboard will appear)
If you want the index to start on a new page, create a new page in the program you're using
Then you click the References tab.
In the Index group, click the Insert Index button.
When the Index dialog box appears, click the OK button to insert the index into your document.
Can you recommend me a movie?
What are the file extensions of files created with: - Microsoft Office Access - Microsoft Office Publisher
Answer:
The file extensions of files created with Microsoft Office Access is .adb for Access project
The file extension of files created with Microsoft publisher is .pub
Explanation:
The file extensions of files created with Microsoft Office Access are;
.adp = Access project
.adn = Access blank project template
.accdb= Access database for 2007, 2010, 2013, and 2016 versions
Other file extensions include
laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf
The file extension of files created with Microsoft publisher is the .pub
state three differences between text data and number data
Answer:
Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.
Answer:
Explanation:
text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech
number data is just numbers.
j. A computer on a network that acts as the central storage location for
programs and data used on the network
Answer:
Una unidad central (en inglés mainframe) es una computadora grande, potente y costosa, usada principalmente por una gran compañía para el procesamiento ...
Explanation:
The IT manager has tasked you with installing new physical machines. These computer systems are barebone systems that simply establish a remote connection to the data center to run the user's virtualized desktop. Which type of deployment model is being used
The type of deployment model that is used is referred to as Thin client.
A thin client is also referred to as lean client. It is a model that runs on the resources that are stored on a central server rather than in the resources if the computer.
A thin client is useful for shared services, and desktop virtualization. The work carried out by the server include storage of data, performing if calculation, launching software programs etc.
On conclusion, since the information given in the question explains that there's a remote connection to the data center to run the user's virtualized desktop, then the deployment model is a thin client.
Read related question on:
https://brainly.com/question/13934016
In python,_______ are used to define the conditions necessary for a while loop to run.
Answer:
Relational Operators
Explanation:
We can make a while loop run only when some variable or whatever is relative to something else.
The valid operators are:
<, >, =, <=, >=, and =!
Hope this helped!
Answer:
sorry not sure
Explanation:
What is the difference between hacking and cracking
Explanation:
The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.
How a student can use computer to improve academic performance?
Answer:
k Nishant
Explanation:
he can learn many things internet by using computer he change his self by learning about many things
Answer:
A student can use it by searching up things with his/her computer.
Browse for different new things everyday that gives knowledge.
Ask questions.
Do new things everyday.
A computer can easily input grades and send data.
Explanation:
Okay.
learn to accept your mistakes even when you have done your
Answer:
besttttttttttttttttttttttt
Analog computers are general purpose computers : true ? or false ?
Answer:
false
Explanation:
Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.
What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?
Answer and Explanation:
Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.
Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.
In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps
Answer:
The answer to this question can be defined as follows:
In option 1, the answer is "18.75%".
In option 2, the answer is "33%".
Explanation:
Given:
JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21
JOB 2-Time of the CPU = 5ms, rest = 24ms, sum = 29
JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14
In option 1:
whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.
Formula:
[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]
[tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]
[tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]
In option 2:
However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.
Formula:
[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]
[tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]
Order the steps a user needs to follow to preview and then print a document
Answer:
Click file tab, click print tab, preview document, print document.
Answer:
Click file tab, click print tab, preview document, print document.
Explanation:
Click file tab, click print tab, preview document, print document.