Complete Question:
The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network.
Group of answer choices
A. user- or server-specific
B. port- or program-specific
C. role- or function-specific
D. file or folder-specific
Answer:
C. role- or function-specific.
Explanation:
The Security Configuration Wizard (SCW) was first used by Microsoft in its development of the Windows Server 2003 Service Pack 1. The main purpose of the SCW is to provide guidance to network administrators, secure domain controllers, firewall rules and reduce the attack surface on production servers.
Generally, The Security Configuration Wizard saves any changes that are made as a role- or function-specific security policy which can be used as a baseline and applied to other servers in the network.
After a network administrator checks the Group policy, any changes made as a role- or function-specific security policy by the Security Configuration Wizard (SCW) is used as a baseline and can be applied either immediately or sometimes in the future to other servers in the network after it has been tested in a well secured environment.
Additionally, the Microsoft Security Configuration Wizard (SCW) assist administrators in running the following;
1. Network and Firewall Security settings.
2. Auditing Policy settings.
3. Registry settings.
4. Role-Based Service Configuration.
The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agreement on a universal standard that’s accepted by all parties
Answer:
ISO standards
Explanation:
ISO / IEC 14443 is the ISO standard that covers RFID usage by devices.
EPCglobal - Electronics Product Code Global Incorporated is also another international standard that covers RFID. These two standards work together to standardize RFID products produced by manufacturers so that these products can be the same across different markets and manufacturers. Example I can purchase a tag from one manufacturer and a transceiver from another and they would function well together. There are also other standards for RFID but the above two are the biggest and most popular with ISO being the oldest.
Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
a. ubiquity.
b. quality.
c. anomaly.
d. integrity.
Answer:
d. integrity
Explanation:
Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.
what is the name of the physical database component that is typically created from the entity component of an erd
Answer:
nijit
Explanation:
small nano bytes desind to kill a computers cellular compunds
The process of writing in-memory objects to a file so that the object can later be read back into memory ___.
Answer:
serialization
Explanation:
Serialization is basically the process of converting an object state to a stream of bytes that object can be read back into memory later, can be stored in (in a file etc), or can be transferred over a network or transmitted to memory, file etc. So the object state is saved in order to restart it later when needed.
Discuss some of the examples of poor quality in IT projects presented in the "What Went Wrong?" section. Could most of these problems have been avoided? Why do you think there are so many examples of poor quality in IT projects?
Answer:
Explanation:
One of the biggest problems in IT projects is that software and hardware are rushed to market, in order for the sellers to beat their competition and make large profits. This causes large problems in regards to the consumer's safety and wellbeing. Most of these problems can be easily avoided by performing better quality management and performing the necessary tests before releasing a product to the market. Overall most of these poor quality IT projects are a result of greed and money.
Which of the following encryption methods does PKI typically use to securely protect keys? a. Elliptic curve b. Digital signatures c. Asymmetric d. Obfuscation
Answer:
B. Digital Signature
Explanation:
Digital signature is an electronic signatures. They are used to authenticate the identity of a person sending the message. It ensures that the original content of the document or message remains unchanged. Digital signatures cannot be imitated. There are three types of digital signature certificates:
Sign Digital Signature Certificate
Encrypt Digital Signature Certificate
Sign & Encrypt Digital Signature Certificate
A _____ is the useful part of a transmission through a network.
Answer: LAN
Explanation:
An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turned on is called ____________.
Answer:
Time machine.
Explanation:
An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turned on is called a time machine.
OS X was released in 2001 and it's Apple's version ten (10) of the operating system that runs on its Macintosh computers.
A time machine is a software tool built into the Mac operating system and it is primarily designed to automatically backup user files or data onto a dedicated drive such as an external hard drive disk through a wired connection, by using a Thunderbolt or universal serial bus (USB) cable. The automatic backup can as well be done wirelessly through a network connection.
In QlikView, ________ are used to search information anywhere in the document.
Answer:
Search Object
Explanation:
Qlikview is a form of computer software application that is basically used in analytics explanation. In order to search for information anywhere in the document inside the Qlikview application, a form of sheet object referred to as SEARCH OBJECT is utilized.
Hence, in this case, In QlikView, SEARCH OBJECT is used to search for information anywhere in the document.
A digital pen is an example of what type of device used in the information processing cycle ?
Answer:
Input is the answer
Answer:
im pretty sure its input..
Explanation:
What are the similarities and differences between the binary and decimal systems?
Answer:
A binary system is a system that functions on zeros and ones (0's and 1's).
A decimal system is an Arabic numeric system that has 10 as its base and uses a dot which is also called a decimal point to show fractions.
Differences
A decimal uses ten different digits which is 0-9 while a binary system uses just two digits 0 and 1Decimal system was historically a Hindu-Arabic system while the binary system is just an Arabic systemSimilarities
They are capable of performing arithmetic operations They both can be represented in decimal formDifferences between binary and decimal systems
A binary system represents information using two digits(0 and 1) while a decimal system represents information using ten digits (0 to 9) Numbers represented using the binary system has bits as their unit while numbers represented using the decimal system has digits as their unitBinary numbers are called base two numbers while decimal numbers are called base 10 numbersThe language understood by the computer system is binary, and not decimalSimilarities between binary and decimal systems
Arithmetic operations can be carried out on numbers in both the binary ands decimal systemsValues of each bit and digit in binary and decimal numbers respectively depends on how close they are to the decimal pointInteger and fraction components are represented in both decimal and binary systemsLearn more here: https://brainly.com/question/18520134
Which part of the Word application window should the user go to for the following activities?
Read a document: document area.
Find the name of the document: title bar.
Change the way a document is viewed: ribbon area.
Find help to do a certain activity on word: ribbon area.
Go up and down to different parts of a document: scroll bar.
Determine the page number of the document: status bar
Answer:
Correct
Explanation:
Indeed, the world application is a word processing software used by many professionals and students alike.
Read a document: To do this, the user should go to the document area found at the top left corner of the tool bar.
Find the name of the document: By looking at the Title bar.
Change the way a document is viewed: The Ribbon area is located at the top right section of the screen near the minimize icon.
Find help to do a certain activity on word: Close to the Ribbon area there is a dialog box having the image of a bulb.
Go up and down to different parts of a document: By going to the scroll bar which found at the extreme right hand side (margin) of the page.
Determine the page number of the document: By going to the Status bar found at the bottom right of the page.
The part of the Word application window where the information van be found is illustrated thus:
Read a document: The user should go to the document area that can be found at the top left corner of the tool bar.
Find the name of the document: This can be seen by looking at the Title bar.
Change the way a document is viewed: This is located at the top right section of the screen near the minimize icon.
Find help to do a certain activity on word: This can be found close to the Ribbon area.
Go up and down to different parts of a document: This can be found on the scroll bar.
Determine the page number of the document: This can be found on the Status bar.
Learn more about word applications on;
https://brainly.com/question/20659068
The following binomial coefficient identity holds for any integer
n> 0. 2n
Prove this identity combinatorially by interpreting both sides in terms of fixed density binary strings
Answer:
hello your question is incomplete attached below is the complete question and answer
answer ; attached below
Explanation:
To prove this identity combination the right hand side has to be equal to the left hand side attached below is the prove showing that the right hand side is equal to the left hand side
• How are organizations strengthening defense through ongoing management of computer networks? What are the most important tasks for a web and data security administrator on a day-to-day basis? How can the administrator ensure that no important task in the ongoing management of security in networks is neglected?
Answer:
The use of VPNs and network demarcation zones mitigates the risk of an attack from an external source while constant briefing of network attack prevention guidelines to employees and access control is adviced.
Explanation:
The use of visualisation tools like the VMware is used to represent, maintain and analyse network performance is very important for network data flow and security and to alert for important scheduled task to be implemented daily.
g Write a function that collects integers from the user until a 0 is encountered and returns then in a list in the order they were input.
Answer:
The function written in python is as follows;
def main():
user_input = int(input("Input: "))
mylist = []
while not user_input == 0:
mylist.append(user_input)
user_input = int(input("Input: "))
print(mylist)
if __name__ == "__main__":
main()
Explanation:
This line declares a main function with no arguments
def main():
This line prompts user for input
user_input = int(input("Input: "))
This line declares an empty list
mylist = []
The following iteration checks if user input is not 0; If yes, the user input is appended to the list; otherwise, the iteration ends
while not user_input == 0:
mylist.append(user_input)
user_input = int(input("Input: "))
This liine prints the list in the order which it was inputted
print(mylist)
The following lines call the main function
if __name__ == "__main__":
main()
A customer complains that her desktop computer will not power on. What initial actions should you take?
Answer:
Test The Components and the motherboard
Explanation:
Well, im going to assume that she turned on the pc and the screen is completely black, nothing being displayed but the fans are spinning. The first thing i would do is test the components to see if its working or not. What i would do first is test the components. I would start from the RAM, Video Card (If it has one) CPU, PSU, and motherboard. I would also take out the CMOS battery and put it back in after a while to clear the bios settings if the customer messed with the bios settings. Make sure to test the motherboard and check for physical damage (Fried Areas, blown capacitors, water Damage etc.) And if you cant find any physical damage try testing the motherboard and see if its dead or not. Also try checking if all of the cables are plugged in all the way, like a loose HDMI cable, loose psu cable etc. Also make sure the psu is connected to power
Also, this is my first brainly answer. Yay :)
Initials action we should take are as follows,
Check that all of the cables are fully plugged in.Ensure that power supply is turned on.After that, i will check for faulty power cable.Now open CPU and check parts and devices one by one such as RAM, SMPS etc.These are the initial actions we should take when computer is not powering on.
Learn more https://brainly.com/question/24504878
The ______ stores permanent subscriber profile data and relevant temporary data such as current subscriber location
Answer:
Home Location Register
Explanation:
Home Location Register is a mobile network database that serves as storage for various information of different individuals or people referred to as customers or subscribers.
The information it stores includes the following:
1. Subscriber's service profile
2. Subscriber's current location information
3. Subscriber's activity status
Hence, the correct answer is HOME LOCATION REGISTER.
This technique is based on searching for a fixed sequence of bytes in a single packet Group of answer choices Protocol Decode-based Analysis Heuristic-based Analysis Anomaly-based Analysis Pattern Matching
Answer:
"Pattern Matching" is the correct choice.
Explanation:
In computational science, pattern matching seems to be the testing and location of similar information occurrences or variations of any form between raw code or a series of tokens. Pattern matching in various computing techniques or interfaces is something of several fundamental as well as essential paradigms.The other choices don't apply to the specified instance. So that the choice above seems to be the right one.
what is the use of painting tools name any 5 tools
Answer:
1. Brush
2. Bucket
3. Pencil
4. Color Picker
5. Air Brush
Oh man, that's all i think.
Use the _____ and _____ features to prevent field columns from showing or to view two nonadjacent field columns for comparison.
Answer:
1. hide
2. freeze
Explanation:
In database management, a lot of functions can be carried out, among which is the HIDE and FREEZE functions.
Hence, a user can use the HIDE and FREEZE features to prevent field columns from showing or to view two nonadjacent field columns for comparison in database management.
Hence, in this case, the correct answer to the statement presented is HIDE and FREEZE
what web revolution enables user to generate content
Answer:
web 2.0 internet
Explanation:
Explanation:
Tim O Reilly in 2004 changed the web with his web 2.0 concept which according to him at the time would allow enable the user to generate content.
Recall that within our BinarySearchTree class the root variable is of type BSTNode. A BSTNode object has three attributes: info of class T, left of class BSTNode, and right of class BSTNode, Following is the implementation of the isEmpty method: public boolean isEmpty() // Returns true if this BST is empty; otherwise, returns false.
{
return (root == null);
}
A. True
B. False
Answer:
False ( A )
Explanation:
The implementation is incorrect hence the return would be false and this is because : root.left is supposed to be NULL, root.right is supposed to be NULL and when these conditions are met then the Binary tree would be empty.
The condition for the above statement would be represented as
if( root.left = = null && root.right == null &&root.info == null)
return true;
else
return false;
Create a VBScript script (w3_firstname_lastname.vbs) that takes one parameter (folder name) to do the following 1) List all files names, size, date created in the given folder 2) Parameter = Root Folder name The script should check and validate the folder name 3) Optionally, you can save the list into a file “Results.txt” using the redirection operator or by creating the file in the script. 4) Make sure to include comment block (flowerbox) in your code.
Answer:
Set args = Wscript.Arguments
If (WScript.Arguments.Count <> 1) Then
Wscript.Echo "Specify the folder name as a command line argument."
Else
objStartFolder = args.Item(0)
Set objFSO = CreateObject("Scripting.FileSystemObject")
if (Not objFSO.FolderExists(objStartFolder)) Then
Wscript.Echo "Folder "&objStartFolder&" does not exist"
Else
Set objFolder = objFSO.GetFolder(objStartFolder)
Set colFiles = objFolder.Files
For Each objFile in colFiles
Wscript.Echo objFile.Name, objFile.Size, objFile.DateCreated
Next
End If
End If
Explanation:
Here's some code to get you started.
In what section of the MSDS would you find information that may help if you use this substance in a lab with a Bunsen burner?
Answer:
The answer is "Fire-fighting measures".
Explanation:
This section is used to includes instructions to combat a chemicals flame. It is also known as the identify sources, which include the instructions for effective detonating devices and details for removing devices only appropriate for just a specific situation. It is the initiatives list, that is necessary destruction technology, materials; flaming inferno dangers.
7.1 Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the six clauses. Which of the six clauses are required and which are optional
Answer:
Answered below
Explanation:
The syntax of an SQL retrieval query is made up of six clauses. In the order in which they are used, they consist of: SELECT, FROM, WHERE, GROUP BY, HAVING and order by.
Of all these clauses, the SELECT clause and the FROM clause are required and must be included. They are the first two used to begin the retrieval query. The others are optional.
The SELECT clause allows you to choose the columns you want to get information or data, from.
The FROM clause identifies the table where the information is being retrieved.
The WHERE clause specifies a condition for the retrieval of information.
You use the GROUP BY clause to group your data in a meaningful way.
You use the HAVING clause to specify a condition on the group.
The ORDER BY clause is used to order results rows in descending or ascending order.
Which key or keys do you press to indent a first-level item in a list so it becomes a second-level item
This would be the Tab key
Attacks against previously unknown vulnerabilities that give network security specialists virtually no time to protect against them are referred to as:
Answer:
Explanation: malware
Write a function that takes any word and applies that pattern. I.E. printer =? p5r ; *** =? v2a ; function =? f6n
Answer:
I am writing a JAVA program:
import java.util.Scanner; //used to take input from user
public class Main{
public static void function(String word){ //function that takes a word as parameter an applies a pattern
int count=0; // count the number of characters between first and last characters of the word string
char first = word.charAt(0); //gets the first character of the word
char last = word.charAt(word.length() - 1); /gets the last character
for(int i = 1; i<word.length()-1;i++) //iterates through word to count the characters between first and last characters
{ count=i; } //sets the count of characters to count variable
System.out.println(first+""+count+""+last); } //prints the first and last characters of input word with the number of characters between first and last characters of word string
public static void main(String []args){//start of main function
Scanner input= new Scanner(System.in); //creates Scanner class object
System.out.print("Enter a word: "); // prompts user to enter a word
String str= input.nextLine(); //reads word string from user
function(str); } } //calls function passing the string to it
Explanation:
I will explain the program with the help of an example:
Suppose the word is printer.
charAt(0) returns the character at the 0-th index of a string word i.e printer. This means the first character of "printer" is returned i.e. 'p'
word.charAt(word.length() - 1) returns the character at the word.length() - 1 index of a string word i.e printer. This means the last character of "printer" is returned i.e. 'r'. Here length() function is used to return the length of the string. The length of "printer" is 7 (from 0 to 6) so word.length() -1 returns 7-1 = 6. This means the character at 6th index.
for(int i = 1; i<word.length()-1;i++) loop counts the character between the first and last character of "printer" . It works as follows:
1st iteration:
i = 1
i<word.length()-1 is true because 1<6
count = i
count = 1
i = i + 1
i = 2
2nd iteration:
i = 2
i<word.length()-1 is true because 2<6
count = i
count = 2
i = i + 1
i = 3
3rd iteration:
i = 3
i<word.length()-1 is true because 3<6
count = i
count = 3
i = i + 1
i = 4
4th iteration:
i = 4
i<word.length()-1 is true because 4<6
count = i
count = 4
i = i + 1
i = 5
5th iteration:
i = 5
i<word.length()-1 is true because 5<6
count = i
count = 5
i = i + 1
i = 6
At next iteration i<word.length()-1 evaluates to false because i = 6
So final value of count is:
count = 5
System.out.println(first+""+count+""+last); statement prints the first character of "printer" i.e. 'p', followed by value of count i.e. 5 , followed by last character of "printer" i.e. 'r'
Output:
p5r
Write a function that returns a chessboard pattern ("B" for black squares, "W" for white squares). The function takes a number N as input and generates the corresponding board.
Input The first line of the input consists of an integer- num, representing the size of the chessboard.
Output Print N lines consist of N space-separated characters representing the chessboard pattern.
Answer:
Here is the C++ program.
#include <iostream> //to use input output functions
using namespace std; // to access objects like cin cout
void chessboard(int N){ // function that takes a number N as parameter generates corresponding board
int i, j;
string black = "B"; // B for black squares
string white = "W"; // W for white squares
for(i=1;i<=N;i++){ //iterates through each column of the board
for(j=1;j<=N;j++){ //iterates through each row of the board
if((i+j)%2==0) // if sum of i and j is completely divisible by 2
cout<<black<<" "; //displays B when above if condition is true
else //if (i+j)%2 is not equal to 0
cout<<white<<" "; } // displays W when above if condition is false
cout<<endl; } } //prints the new line
int main(){ //start of the main function
int num; //declares an integer num
cout << "Enter an integer representing the size of the chessboard: "; //prompts user to enter size of chess board
cin >> num; //reads value of num from user
chessboard(num); } //calls chessboard function to display N lines consist of N space-separated characters representing the chessboard pattern
Explanation:
The function works as follows:
Lets say that N = 2
two string variables black and white are declared. The value of black is set to "B" and value of white is set to "W" to return a chessboard pattern in B and W squares.
The outer loop for(i=1;i<=N;i++) iterates through each column of the chess board. The inner loop for(j=1;j<=N;j++) iterates through each row of chess board.
At first iteration of outer loop:
N = 2
outer loop:
i=1
i<=N is true because i=1 and 1<=2
So the program enters the body of the outer for loop. It has an inner for loop:
for(j=1;j<=N;j++)
At first iteration of inner loop:
j = 1
j<=N is true because j=1 and 1<=2
So the program enters the body of the inner for loop. It has an if statement:
if((i+j)%2==0) this statement works as:
if(1+1) % 2 == 0
(1+1 )% 2 takes the mod of 1+1 with 2 which gives the remainder of the division.
2%2 As 2 is completely divisible by 2 so 2%2 == 0
Hence the if condition evaluates to true. So the statement in if part executes:
cout<<black<<" ";
This prints B on the output screen with a space.
B
The value of j is incremented to 1.
j = 2
At second iteration of inner loop:
j = 2
j<=N is true because j=2 and 2=2
So the program enters the body of the inner for loop. It has an if statement:
if((i+j)%2==0) this statement works as:
if(1+2) % 2 == 0
(1+2 )% 2 takes the mod of 1+2 with 2 which gives the remainder of the division.
3%2 As 3 is not completely divisible by 2
Hence the if condition evaluates to false. So the statement in else part executes:
cout<<white<<" ";
This prints W on the output screen with a space.
B W
The value of j is incremented to 1.
j = 3
Now
j<=N is false because j=3 and 3>2
So the loop breaks and program moves to the outer loop to iterate through the next row.
At second iteration of outer loop:
N = 2
outer loop:
i=2
i<=N is true because i=2 and 2 = 2
So the program enters the body of the outer for loop. It has an inner for loop:
for(j=1;j<=N;j++)
At first iteration of inner loop:
j = 1
j<=N is true because j=1 and 1<=2
So the program enters the body of the inner for loop. It has an if statement:
if((i+j)%2==0) this statement works as:
if(2+1) % 2 == 0
(2+1 )% 2 takes the mod of 2+1 with 2 which gives the remainder of the division.
3%2 As 3 is not completely divisible by 2
Hence the if condition evaluates to false. So the statement in else part executes:
cout<<white<<" ";
This prints W on the output screen with a space.
B W
W
The value of j is incremented to 1.
j = 2
At second iteration of inner loop:
j = 2
j<=N is true because j=2 and 2=2
So the program enters the body of the inner for loop. It has an if statement:
if((i+j)%2==0) this statement works as:
if(2+2) % 2 == 0
(2+2 )% 2 takes the mod of 2+2 with 2 which gives the remainder of the division.
4%2 As 4 is completely divisible by 2 so 4%2 == 0
Hence the if condition evaluates to false. So the statement in if part executes:
cout<<black<<" ";
This prints B on the output screen with a space.
B W
W B
The value of j is incremented to 1.
j = 3
Now
j<=N is false because j=3 and 3>2
So the loop breaks and program moves to the outer loop. The value of outer loop variable i is incremented to 1 so i = 3
N = 2
outer loop:
i=3
i<=N is false because i=3 and 3>2
So this outer loop ends.
Now the output of this program is:
B W
W B
Screenshot of this program along with its output is attached.
Help me pls, thank you
Answer:
pseudocode
flowchart
Explanation:
Answer:
Pseudo code flowchart