Answer:
ADO.NET stands for ActiveX Data Object is a database access technology created by Microsoft as part of its .NET framework that can access any ...
Developer: Microsoft Corporation
Design a webpage on Artificial Intelligence/augmented reality
Answer: is there even an answeR for this? Anyway plz do my question. If you are looking for web page options thou I would offer a Alexa vs VR
Explanation:
How the data is converted into the information?
Answer:
the data is converted into information by data processing
Answer:
by data processing
Explanation:
data is converted to information by analyze or manipulate data by combining with other data and using experience
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to
Answer:
Tell about an experience with a computer virus.
Explanation:
Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.
In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.
Thus, the correct answer is the first option.
Answer:
b
Explanation:
What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders
The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.
Which of the following is the MOST likely reason the mouse isn't working?
A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.
Answer:the usb mouse receiver is not plugged into the computer
Explanation:
In the case above, one can say that the USB mouse receiver is not plugged into the computer.
What is a USB mouse?A USB mouse is known to be a tool that is often attaches to a computers USB port.
In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.
Learn more about USB mouse from
https://brainly.com/question/10847782
#SPJ9
Which of the following is not a networking equipment?
Answer:
[tex]\boxed{\sf (C) \ mouse}[/tex]
Explanation:
A networking equipment can share data along a computer network. A mouse is not a networking equipment.
Universal containers uses a custom object named Insight, which is the child in a master-detail relationship with the opportunity object. Sales teams use this object to create requests for analysts who conduct supporting research regarding an opportunity. Sales teams use Salesforce1 mobile app and want to easily create new insight records from their phones. What should a consultant recommend to meet this requirement
Answer:
A. Create a custom object tab.
Explanation:
The custom object refers to an object in which a person creates to store the data and information i.e relevant for the business organization
While the custom object tab is a tab in which the data stored is displayed in the records of the custom object
Therefore according to the given situation, since the sales teams used the mobile app and want to create new insight records by using their phones
So for meeting this we should recommend creating a custom object tab
convert (0.255)¹⁰ into binary
0.01000001010001111011
Must click thanks and mark brainliest
Still giving out the brainly thing :)
just answer its as simple as that and you get points :)
Answer:
The answer to that my friend, Is 0 :D
Explanation:
Answer:
4/4
Explanation:
an interface are connection point with hardware devices are joined
Answer:
Explanation:
Networking hardware is the correct answer
array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.
user_in = str ( input ("Please enter a phrase: " ))
def reverse_str (string):
e = 0
for e in range (len (string)):
x = -1
print string[x]
x += (len (string))
The attacker sent data that was able to manipulate the return address that is reserved to store expected data
Complete Question:
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?
Answer:
A buffer overflow.
Explanation:
In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).
In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.
For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.
In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.
please help me with this this is Computer chapter Advanced HTML of class 8th
Answer:
ok let me try
It stands for
Hypertext Markup Language
Image result for html stands for
HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.
Having a skilled labor force is one of the ________________ impacts of technology on the workplace.
negative
positive
Answer:
negative
Explanation:
this is because not many people have the skills to operate the machines. In short not everyone is able to operate them
Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone
What are the advantages of Radio waves over micro waves?
Answer:
radio frequencies can penetrate deeply into the material and thus heat thick products. They heat more slowly than microwaves and thus make it possible to treat more delicate products which require a slower heating.
True or false we can used virus not use pirated software and programs
Answer:
False i guess
what do you mean by automation and diligence with respect to a computer??
Answer:
Delegince computer without any motion resists
Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?
Options:
A Infrastructure mode
B Ad hoc mode
C a wireless access point
D static IP addresses
E APIPA
Answer:
A. Infrastructure mode
C. a wireless access point
Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).
A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?a. Cell phone tetheringb. Satellite Internetc. Mobile hotspotd. Cell phone tethering
Answer:
c. Mobile hotspot
Explanation:
A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection
Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal
So the mobile hotspot should be used to provide internet service to the group.
what are the disadvantageous of emails
Answer:
it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.
Need internet connection.without it can't use.
it can be hacked.and also lack the personal touch..
Answer:
they can cause misunderstandings and people read with diffrent
moods
Explanation:
Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?
(Correct answer only)
A. magazine
B. newspaper
C. flier
D. billboard
E. brochure
Answer:
D. billboard
Explanation:
Commuters can most likely see billboards from a distance.
The print medium to be chosen by the felicity should be Billboard. Thus, option (D) is correct.
What is billboard?Billboard is a HORDING and huge outdoor advertisement board That can be seen by many people. In order to be seen by the most automobiles and pedestrians, billboards are frequently erected in busy places like highways and urban areas.
Many of the company publish their brands and products on the billboard for spreading brand awareness and spreading the word of their company to as many people can know about the product.
According to the above scenario, Felicity can capture the attention of the regular subway commuters in her area through billboard advertisement. From a distance, commuters can see the advertisement.
Therefore, it can be print medium to be chosen by the felicity should be Billboard. Hence, option (D) is correct.
Learn more about Billboard here:
https://brainly.com/question/8494411
#SPJ2
write one function each of caps lock and shift keys.
Answer:you can use the shift key to use symbols instead of numbers on the top numbers part of the keyboard
Explanation:
Some Examples are ( ) $ &
The term platform as a service has generally meant a package of security services offered by a service provider that offloads much of the security responsibility from an enterprise to the security service provider. Select one: True False
Answer:false
Explanation:
You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?
a. motherboard
b. CPU
c. graphics card
d. sound card
Answer:
all options
a, b and c the most important
Explanation:
Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard
what are the uses of mobile phones?
Answer:
We use mobile phones to:
1. communicate with our friends and family
2. looking for the information/news in the world
3. looking for the material for study
and many others
may it helps^_^
Answer:
Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.
Explanation:
Plz mark me as brainiestHow do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)
Answer:
Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.
However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.
Explanation:
Here's how to set Call Forwarding on your android
Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok' block diagram of a computer
Answer:
this the answer for you.
mark me as a brainlist plz.
what are the means of hardware security?
Answer:
Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.
Explanation:
Thank you
Explanation:
Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.