Answer:
global information system (GIS)
Explanation:
A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...
computer cannot do anything without instructions true or false
Answer: True
Explanation:A computer (specifically the CPU, or central processing unit, within the computer system) needs instructions in order to do even the simplest things. Without instructions, it can't do anything. Just to boot your computer requires executing many many instructions.
Hope it helps✌✌
has replaced the need for landline telephones in many instance
Explanation:
million landlines. During this same time the number of mobile phone lines that have been subscribed to has ...
Characteristics
While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe
Answer:
Backdoor
Explanation:
Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level
The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts
You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem
Answer:
Key escrow.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.
Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.
Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
You make a purchase at a local hardware store, but what you've bought is too big to take home in your car. For a small fee, you arrange to have the hardware store deliver your purchase for you. You pay for your purchase, plus the sales taxes, plus the fee. The taxes are 7.5% and the fee is $20. (i) Write a function t(x) for the total, after taxes, on the purchase amount x. Write another function f(x) for the total, including the delivery fee, on the purchase amount x. (ii) Calculate and interpret (f o t)(x) and (t o f )(x). Which results in a lower cost to you
Answer:
[tex]f(x) = 1.075x[/tex]
[tex]t(x) = x + 20[/tex]
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]
[tex](t\ o\ f)(x) = 1.075x + 20[/tex]
Explanation:
Given
[tex]Tax = 7.5\%[/tex]
[tex]Fee = \$20[/tex] -- delivery
Solving (a): The function for total cost, after tax.
This is calculated as:
[tex]f(x) = Tax *(1 + x)[/tex]
Where:
[tex]x \to[/tex] total purchase
So, we have:
[tex]f(x) = x * (1 + 7.5\%)[/tex]
[tex]f(x) = x * (1 + 0.075)[/tex]
[tex]f(x) = x * 1.075[/tex]
[tex]f(x) = 1.075x[/tex]
Solving (b): Include the delivery fee
[tex]t(x) = x + Fee[/tex]
[tex]t(x) = x + 20[/tex]
Solving (c): (f o t)(x) and (t o f)(x)
[tex](f\ o\ t)(x) = f(t(x))[/tex]
We have:
[tex]f(x) = 1.075x[/tex]
So:
[tex]f(t(x)) = 1.075t(x)[/tex]
This gives:
[tex]f(t(x)) = 1.075*(x + 20)[/tex]
Expand
[tex]f(t(x)) = 1.075x + 21.5[/tex]
So:
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]
[tex](t\ o\ f)(x) = t(f(x))[/tex]
We have:
[tex]t(x) = x + 20[/tex]
So:
[tex]t(f(x)) = f(x) + 20[/tex]
This gives:
[tex]t(f(x)) = 1.075x + 20[/tex]
We have:
[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex] ---- This represents the function to pay tax on the item and on the delivery
[tex](t\ o\ f)(x) = 1.075x + 20[/tex] --- This represents the function to pay tax on the item only
The x coefficients in both equations are equal.
So, we compare the constants
[tex]20 < 21.5[/tex] means that (t o f)(x) has a lower cost
which country has the most common features of analogue and digital computer
Explanation:
i don't think rhis question could be..
Name the type of token x belongs to: x=10+20+30 a) Keyword b) Literal c) Identifier d) Operator
Computer class 11
Answer:
C) Identifier is the answer I am answering question of class 11 but I read in class7. Thank you!!!Write either True or False. a) Software is touchable part of computer system. b) System software provides easy interaction between user and computer c) Every computer needs to have own operating system. d) A computer can only understand the program written in assembly language. SANJIWANI Computer Book 7
Answer:
A: False B: False C: True D: False
Explanation:
whats an MAR? lolz better not take my points #bonkers
Answer:
[tex]\huge\mathcal{\fcolorbox{aqua}{azure}{\red{✿ʏᴏᴜʀ- ᴀɴsᴡᴇʀ ♡❖}}}[/tex]
A Medication Administration Record (MAR, or eMAR for electronic versions), commonly referred to as a drug chart, is the report that serves as a legal record of the drugs administered to a patient at a facility by a health care professional. The MAR is a part of a patient's permanent record on their medical chart
▓▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓
[tex]\boxed{\pmb{\green{\sf{MAR}}}}[/tex]
medication administration record:-
A computer-generated schedule for administering medications to a patient for a defined period of time, including dosing, timing of administration and details about the physician’s orders.
▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓▓
Computer hardware refers to: Group of answer choices the mechanism through which users interact with a computer. handheld computing devices meant largely for mobile use outside an office setting. a precise set of instructions that orchestrate the functioning of the computer. a program that fulfills the requests of a client. the physical components of information technology.
Computer hardware is referred to as: E. the physical components of information technology.
A computer refers to a programmable-electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an output (information) that could be used by the end user.
Generally, the components of a computer is broadly classified into two (2) main categories and these include:
Software: such as operating system (OS).Hardware: it include speaker, keyboard, CPU, monitor, etc.In conclusion, a computer hardware is simply the physical components of an information technology (IT) because they can be seen and touched.
Read more on computer hardware here: https://brainly.com/question/959479
You have a website that accepts input from users for creating customer accounts. Input on the form is passed to a database server where the user account information is stored. An attacker is able to insert database commands in the input fields and have those commands execute on the server. Which type of attack has occurred
Answer:
SQL injection
Explanation:
SQL (Structured Query Language) Injection, are vulnerabilities associated security of SQL web interface through which an attacker can intrude into the backend of a database by modifying the queries a web program sends to the database to which it is connected
Examples of SQL injection include: Subverting application logic, which uses modified queries to alter the logic of an application. UNION attacks, which allow the retrieval of data from different tables within a database. Retrieving hidden data, which allows the attacker to have additional query results through modification of a SQL query.
Select the correct answer for each question.
Which of the following ports offers a fast
connection that could be used to download and
watch your favorite TV shows?
O Etherne
O modem
O FireWire
O USB
DONE
Answer:
USB
Explanation:
it is a standard cable connection for consumers electronics devices.
Create a class called Date that includes three pieces of information as data members -- a month (type int), a day (type int) and a year (type int). Your class should have a constructor with three parameters that uses the parameters to initialize the three data members. For the purpose of this exercise, assume that the values provided for the year and day are correct, but ensure that the month value is in the range 1-12; if it isn't, set the month to 1. Provide a set and a get function for each data member. Provide a member function displayDate that displays the month, day and year separated by forward slashes (/).
Answer:
please mark me brainlist
Explanation:
What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>
Explanation:
the output password is isalpha()
Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?
Answer:
The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT
Explanation:
The negative impacts of Internet of Things IoT devices on users are
1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices
Define Fiber optic cable
Explanation:
An optical fiber is a flexible, transparent fiber made by drawing glass or plastic to a diameter slightly thicker than that of a human hair.
When a statement within a try block causes an exception, the remaining statements in the try block Select one: a. are executed after the statements in the catch block b. are executed before the statements in the catch block c. aren't executed
In C++, 'Try block' comprises of a group of statements in which there is a probability of an exception to take place.
C). The statements that would be left in the try block in case a particular statement leads to an exception 'can't be executed.'
In case an exception takes place, the left statements in the try block fail to function. This is the primary reason for which a catch block immediately succeeds a try block in order to deal with the exception and help close that code to allow the statements to work. Thus, option C is the correct answer.Learn more about 'Try block' here:
brainly.com/question/14186450
Who said the following, and what does it mean? Conceit, more rich in matter than in words, Brags of his substance, not of ornament. They are but beggars that can count their worth; But my true love is grown to such excess I cannot sum up half my sum of wealth. (II. vi. 33-37) Juliet; she is saying that she doesn't care about money. Lady Capulet; she is reminding Juliet how lucky she is to be marrying Paris. Romeo; he is saying that true understanding has made him realize how very lucky he is to be marrying Juliet. Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.
Answer: Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.
Explanation:
Juliet was talking to Romeo in this instance and trying to tell him that it was easy to speak words but that for those words to be properly understood, action must follow them.
In other words she was telling him that to truly understand something, actions must back it up. She then goes on to say to him that the love she has is so much that it has made her feel more wealthy.
write a program to check whether the number is odd or even using 'if' statement in python
Answer:
Python Program to Check if a Number is Odd or Even :
num = int(input("Enter a number: "))
if (num % 2) == 0:
print("{0} is Even number". format(num))
else:
print("{0} is Odd number". format(num))
Type the correct answer in each box. Spell all words correctly.
Digital artist Frank is discussing how to enhance scanned or photographed images. Complete the following sentences while keeping in mind the topic of discussion.
You can rework or enhance scanned or photographed images using photo editing and illustration software or by using a digital____.
The device has a_____surface on which you can draw images, graphics, and animations.
Answer:
1. Tablet
2. Flat
Explanation:
Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
Answer:
Serial SCSI
Explanation:
Hot swapping can be defined as a process which typically involves fitting or replacing CD-ROM drive, hard-disk drive, power supply or other peripheral devices while a computer system is powered on. Thus, it allows for the installation or removal of a peripheral device from a computer while power is still being supplied to the computer i.e without having to shutdown the computer.
Serial SCSI is a SCSI standard which allows for the technique known as “hot swapping” because it's a point to point connection that is designed to move data to and from computer storage serially.
Calculates the current that feeds a washer toy having a 10 ohm resistor and a battery operated with a potential difference of 30 v
Explanation:
Using Ohm's Law and a bit of substitution, we can solve for current.
DONDE PUEDO VER LA HABITACIÓN EN ROMA?? ONLINE SIN PAGAR (ES UNA PELI)
Answer:
Sorry, Room in Rome is not available on Indian Netflix, but you can unlock it right now in India and start watching! With a few simple steps you can change your Netflix region to a country like Japan and start watching Japanese Netflix, which includes Room in Rome
Lo sentimos, Room in Rome no está disponible en Netflix indio, ¡pero puedes desbloquearlo ahora mismo en India y empezar a mirar! Con unos simples pasos, puede cambiar su región de Netflix a un país como Japón y comenzar a ver Netflix japonés, que incluye Room in Rome.
What is a protocol in digital technology plwwes help
Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.
What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?
Answer and Explanation:
Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.
Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.
Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.
Answer:
True
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.
What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?
groups
tabs
sections
properties
Answer:
tabs
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.
The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.
A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.
Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.
Answer:
B, tabs
Explanation:
edge 2021
write any four characteristics of desktop computer
When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class
Answer:
provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified
Explanation:
I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.
the second generation computer used. as a memory device
Answer:
The period from 1959-1965 was the second generation. Transistors that are cheaper, consumed less power, were used in this generation, were more compact, were more reliable, and were faster than first-generation vacuum tubing machines.
Explanation:
The primary memories and the magnet tapes and magnetic discs were used as secondary storage equipment in this generation.
The montage language and high programming languages such as FORTRAN, COBOL, have been used in this generation. The computers used batch processing and operating system multi-programming.
A memory is like the brain of human beings. It is used for storing information and instructions. Computer memory is the storage space on the computer that processes data and saves instructions for processing.
The memory is split into many small parts known as cells. There is a unique address for each location or cell, which varies from 0 to memory minus one.
There are three basic types of memory:
Memory Cache
Main Memory/Primary Memory
The Memory of a Second Kind