Answer:
True
Explanation:
where a row and column meet. Columns are identified by letters (A, B, C), while rows are identified by numbers (1, 2, 3). Each cell has its own name—or cell address—based on its column and row
~Hope this helps
Answer:
True
Explanation:
What programs are always running when your computer is turned on? Enter the names of the programs in the space provided. Click the Submit button when you are finished to view the suggested response.
Answer:
open your task manager
Explanation
right click the toolbar below and click on task manager and you will see what programs are running on your pc
Answer:
Items commonly found in the system tray include antivirus settings; battery status; and volume. Sometimes e-mail programs, printers, or faxes are also present. Your computer may have other items in the system tray too.
Explanation:
I just took a test on edguenity and that was the correct answer hope this helps
When creating a storyboard, in which section do you mention how you move from one shot to the next?
A.
synopsis
B.
sketch
C.
transitions
D.
shot description
E.
shot sequence number
Answer: C
Explanation:
Answer:
E. shot sequence number
Explanation:
Suggest three ways in which celebrating an occasion influences food choices?
Answer:
It can completely show the different flavors that might have influenced the people at the past like their traditional spices and their main ingredients. It also is just a big part of celebrations because usually every single celebration comes with food and drinks.
Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux - Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets - The original utility from which OpenVas was developed - A port state which does not allow entry or access to a service - An open-source fork of Nessus - A port state that may indicate a firewall is being used to allow specified traffic into or out of the network - A port state that allows access to applications and can be vulnerable - Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly - Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Answer:
1. Nmap.
2. Fping.
3. Hping.
4. Nessus.
5. Closed port.
6. OpenVAS.
7. Filtered port.
8. Open port.
9. Port scanning.
10. Ping sweep.
Explanation:
An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
In Computer networking, IP address are classified into two (2) main categories and these are;
1. Local (internal) IP address.
2. Global (external) IP address.
Also, the internet protocol (IP) address comprises of two (2) versions and these are;
I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.
II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.
ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.
In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.
1. Nmap: a popular port scanners that has the ability to use a graphical user interface (GUI) front end.
2. Fping: allows you to ping multiple internet protocol (IP) addresses simultaneously and is usually included in Kali Linux.
3. Hping: tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets.
4. Nessus: the original utility from which OpenVas was developed.
5. Closed port: a port state which does not allow entry or access to a service.
6. OpenVAS: an open-source fork of Nessus.
7. Filtered port: a port state that may indicate a firewall is being used to allow specified traffic into or out of the network.
8. Open port: a port state that allows access to applications and can be vulnerable.
9. Port scanning: allows you the ability to scan thousands or even tens of thousands of internet protocol (IP) addresses quickly.
10. Ping sweep: performed by port scanners to scan large networks to identify which internet protocol (IP) addresses belong to active hosts.
You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure in a single component does not cause the website to become unavailable. What should you add to your configuration to accomplish this
Answer: Connect one server through a different ISP to the Internet
Explanation:
With RAID 1 configuration, data can be simultaneously copied from one particular disk to another, thereby creating a replica.
Since the person wants to provide redundancy so that a failure in a single component does not cause the website to become unavailable, one server should be connected through a different ISP to the Internet.
Construct :
4 input NOR Gate Truth Table.
9514 1404 393
Answer:
see attached
Explanation:
The output is always 0, except for the case where all 4 inputs are 0.
How does a computer get the server's IP and how does it know which way to the server?
Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
Answer:
It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction.
need help on question 5! no links pls
Answer: less than 50%, it’s about 49%
Explanation:
Answer:
59.5
so I would say the 3 third option
…..is the smallest size in audio files
Answer:
Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.
Explanation:
Answer:
Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.
PLEASE HELP I mainly only need the answer for 4.
Answer:
it is asking for https response
Doug grew up on a large farm in southwest Wisconsin. As a college graduation gift, Doug’s father gave him several hundred acres of land to raise organic soybeans, grain, and corn. Doug works the fields by himself, negotiates deals with buyers, repairs equipment, and handles all the accounting and financial issues for the business, which is called The Natural Element.
Answer: Sole Proprietorship.
Explanation:
This question wants to know what type of business is described in the scenario.
In a Sole Proprietorship, the owner of the business is essentially the business itself. They control all aspects of the business from the operating activities to the financial activities of the firm. This is usually the first stage business type in an entrepreneurship.
The definition of a sole proprietorship above fits with what Doug does. Doug is the owner of the farming business and seems to be handling all aspects of it by himself. This would therefore make it a sole proprietorship.
Need the answer ASAP!! No links I’ll report
Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?
A.software engineering process
B.software quality metrics
C.SQA audits
D.reviews
Answer:
C
Explanation:
HELP ASAP!Select all examples of desirable workplace skills, habits, and attitudes.
waits for others to solve problems
does not call in sick or miss work frequently
creates a list of solutions for the boss
arrives at work on time or early
waits for supervisor to give directions
works quickly and accurately
shows initiative
communicates effectively
sets clear goals to achieve success
gives products to friends for free
Answer:
does not call in sick or miss work frequently
creates a list of solutions for the boss
arrives at work on time or early
waits for supervisor to give directions
works quickly and accurately
shows initiative
communicates effectively
sets clear goals to achieve success
Explanation:
Have a Great Day!!!
i really want to know the best way to deal as much heart as possible plz tell me
Answer:
Set aside time every day for doing something that feels positive, whether that’s journaling, meeting up with a close friend, or watching a show that makes you laugh. Scheduling in moments that bring you joy is vital for healing a broken heart. It’s important to talk about your feelings with others and not numb yourself out.
Explanation:
Create a mobile app plan using PowerPoint slides to show mock-ups of screens, identifying input, process, and output for each
screen,
Answer:
PowerPoint slides to show mock ups
click on the _____button to move the selected text in the centre of the page (justify /centre)
Answer:
centre
Explanation:
Which audio media can be directly sent to the subscribers through an RSS feed?
A.
online streaming
B.
podcast
C.
cloud file
D.
live playback
E.
broadcast
Answer:
The correct answer should be B. podcast
Explanation:
there is a website called RSS feed that is podcasts
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
1.) Online crimes causing loss of money: give 5 names and examples to each
2.) Online misconduct or crimes targeting medical offices and services: give 5 names and examples to each
3.) Online misconduct or crimes that you have experienced: give 5 names and examples to each
Answer:
1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.
2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.
3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got sc/mmed it might apply to this question
How do you fix this!!!!
Answer:
ldek
Explanation:
can you help me with my homework what should i do
Answer:
what is matter and two examples
What is the output? Choose 3 options.
>>>import time
>>>time.localtime()
an indicator of whether or not it is a leap year
the day of the year
the month
the number of seconds after the epoch
the time zone's name
Answer:
the number of seconds after the epoch
the day of the year
the month
Explanation:
The time() function returns the number of seconds passed since epoch. For Unix system, January 1, 1970, 00:00:00 at UTC is epoch (the point where time begins).The function time. asctime(), present if the time module can be used to return the current date and time.
The output from the information given will be:
the number of seconds after the epochthe day of the yearthe monthIt should be noted that input and output are simply the communication between a computer program and its user.
The output refers to the program that's given to the user. In this case, based on the information, the output from the information given will be the number of seconds after the epoch, the day of the year, and the month.
Read related link on:
https://brainly.com/question/23968178
Select the correct answer from each drop-down menu.
Complete the following sentences.
_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.
Options for the first box are: managers, A teams, an individuals
Options for the second box are:internal, specific, external
Answer:
First, A teams, Second ,Specific
Explanation:
Which file type is best for saving line art and animated images?
DOC
GIF
JPG
MP3
Answer:
GlF =Graphic interchange format is best for saving line art and animated images.
stay safe healthy and happy.What type of address uses a number that uniquely identifies each computer?
O Computer address
O Home address
O E-mail address
O IP address
Answer:
The awnser is D or IP Address
Explanation:
BRAINLIEST PLEASEAnswer:
IP Address. This is the most unique as you can track computers down with this code too. I hope you found this helpful, you are very welcome!
If you ship bakudeku. I swear.
*RANTS*
cries in bakudeku shipper
Stages of reverse engineering
Answer:
Capture Data, Refine the Model, and then Manufacture it.
Explanation:
Need answer ASAP
Select the correct answer.
What is the role of a software analyst?
OA.
to prepare project plan
OB.
to provide customer support to stakeholder
O C.
to code and test
O D.
to perform audits
Answer:
c is the correct awnser ( to code and test )
Answer:
CCCCCCCCCCCCCCCCCCCCC
Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.
Release
Planning
Design
Coding
You might create algorithms and flowcharts during the Design phase of software development.
What is the algorithms about?In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.
Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.
Learn more about algorithms from
https://brainly.com/question/20543449
#SPJ1
adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf
Answer:
this belongs on r/ihadastroke
Explanation:
Answer: ok
Explanation: