Answer:
C.
Explanation:
mukhang
letter
C.
pambihira
ka
naman
bat
hindi
ka
magtanong
sa
mga
nakakatanda
mong
kapatid
Answer:
The answer to your question is C. Have a wonderful safe day. <3 <3 <3
Explanation:
Spyware is malicious software installed on a computer without the owner’s knowledge. It is designed to monitor data and allow unauthorized remote access.
Question 6 options:
True
False
Answer:
True
Explanation:
How are computers connected to one another?
through networks
through printers
through laptops
Answer:
They are connected through networks
Explanation:
N/A
Answer:
the other guy is correct
Explanation:
What solicits online input such as product ratings from consumers?
A qiuck response code
Computer forensics
Crowdsourcing
Or Crowdfunding?
Answer:
Crowdsourcing I think is the correct answer. "A quick response code" and "Computer Forensics" both don't make sense as answers, and Crowdfunding is specifically for money.
Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are maintaining your firewall and network security configuration correctly?
Explanation:
It is extremely important for organizations to adopt the principles of network security and firewall configuration according to the highest security parameters and requirements, because through vulnerabilities in an organization's network system, attacks by hackers and criminals can occur. they take advantage of some system failure to steal data and information, which can be detrimental to companies that may have stolen sensitive information, organizational performance data, bank account intrusion and asset theft, etc.
In order to avoid such problems, it is necessary to have a constant management of the network systems and organizational software, in order to maintain the control, prevention and security of the systems.
If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is:_______a. shared content with version management b. shared on Google drive c. shared content with no control d. shared with the public e. shared content with version control
Answer:
d
Explanation:
Because a decimal number
If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is considered to be a: c. shared content with no control.
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. Thus, it offer or avail individuals and businesses a fast, effective and efficient way of providing services to their clients over the internet.
Generally, cloud computing comprises three (3) service models and these are;
Infrastructure as a Service (IaaS). Software as a Service (SaaS). Platform as a Service (PaaS).A file server can be defined as a type of computer that centrally stores, manage and fetch all data files (audio, image, text and video) as they are requested over the internet or network by end users (clients).
An access control refers to a security technique that is used to determine whether a user has the minimum requirements (credentials) to access, use or view resources such as documents on a computer by ensuring they are who they claim to be (authentication).
In this context, when a document (content on a computer) is shared on a file server without the implementation of an access control, the file can be anonymously edited by end users because it won't ask or request for authentication.
However, a shared content on a file server with an access control would only grant permission to authorized users while denying other users access to edit or modify its content.
Find more information: https://brainly.com/question/14014672
I need help with my previous question please
Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout view Page Break Preview
Answer:
Page Layout view
Explanation:
Answer:
C. Page layout view
Explanation:
A man is charged a fee by the city for having numerous broken cars and auto parts in his front yard. Which of the following correctly describes why the city punishes him? He has committed a crime. He is in violation of a city statute. He has violated an amendment of the U.S. Constitution. A judge has decided that he is in violation of civil law.
Answer:
Violation of city Statute
Answer:
B
Explanation:
What are three techniques used to generate ideas? O A. Free writing, brainstorming, and concept mapping O B. Free writing, clustering, and detail mapping O c. Free writing, pre-writing, and drafting O D. Pre-writing, drafting and revision
freewriting brainstorming and concept mapping
Both pre writing and post reading strategies has been used to enhance comprehension as well as the skill of the learner.
What is Pre-writing or surveying?Pre-reading or surveying is the process of skimming a text to locate key ideas before carefully reading a text (or a chapter of a text) from start to finish. It provides an overview that can increase reading speed and efficiency.
Reading strategies aim to facilitate the understanding of difficult texts. These strategies are very effective and can facilitate not only reading but also the interpretation of the text. Among the reading strategies, we can mention the use of context clues, which facilitate the understanding of difficult and unknown words.
Synthesizing the text is also a very beneficial strategy, as it allows the text to become smaller, more objective, and direct. Reading strategies should be used even by people who find it easy to read texts with different difficulties, as it allows the text to be understood in a deeper and more complete way.
Therefore, Both prereading and post reading strategies has been used to enhance comprehension as well as the skill of the learner.
More information about context clues at the link:
brainly.com/question/8712844
#SPJ2
Which of the following tools can be used to aggregate relational data from multiple sources?
A.)Power Pivot
B.)PivotTables
C.)Get & Transform
Answer:
ApOWER PIVOT
Explanation:
The tools that can be used to aggregate relational data from multiple sources is Power Pivot.
Data aggregation is the known as putting or gathering of data and presenting a summary form of it.
The data can be gathered from multiple data sources with the intent of combining these data sources into a summary for data analysis.
conclusively, Data warehouses gives users room to run queries, compile reports, generate analysis, and retrieve data in a consistent format.
Learn more from
https://brainly.com/question/21263038
Write a function that returns a pointer to the maximum value of an array of float ingpoint data: double* maximum(double* a, int size) If size is 0, return NULL.
Answer:
double * maximum( double arr[], int size){
int max = 0;
if ( size == 0){
return 0;
} else {
for (int i = 1; i < size; i++){
if (arr[i] > arr[0]){
max = arr[i];
} else {
max = arr[0];
}
}
return max;
}
}
Explanation:
The C++ source code above returns the maximum value of an array as a pointer. The function accepts two parameters, the array in question and the size of the array. The for loop iterates over the items in the array and checks for the largest, which is returned as a pointer since the function "maximum" is defined as a pointer to the floating-point number memory location.