Answer:
Managed devices
Explanation:
hope it helps u
Which factors are involved in search engine optimization
Answer:
A Secure and Accessible Website.
Page Speed (Including Mobile Page Speed)
Explanation:
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task
Question Completion with Options:
A. device flow correlation
B. simple detections
C. application blocking list
D. advanced custom detections
Answer:
The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:
C. application blocking list
Explanation:
The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks. Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.
continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.
AWS's EC2 is primarily considered which type? OA OB. Maas O Claas O D. None of the above O E. Serverless
Answer:
IaaS (Infrastructure as a Service)
"Amazon takes the responsibility of networking, storage, server and virtualization and the user is responsible for managing the Operating System, middleware, runtime, data and application."
Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
558c::d367:7c8e:1216:0:66be
__________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.) The CPU, RAM c.) The application software, the hard disk d.) The operating system, the application software
Answer:
a then c
Explanation:
Without an operating system you just have a pile of metal, and the program contains code, which is just a series of commands
Answer:
d.) The operating system, the application software
Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices
Answer:
name is a reserved word in JS and cannot be used as an identifier
Explanation:
From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()
At the Greene City Interiors branch office, you have been asked to implement an IP network. Your network ID is currently192.168.1.0/24. You need to divide this in half network (two subnets) to accommodate hosts on two separate floors of the building, each of which is served by managed switches. The whole network is served by a single router.
Based on the above scenario, answer the following questions:
1. To divide the network in half, what subnet mask do you need to use?
2. What are the subnet IDs for each network?
3. Your manager is not satisfied with the new subnet scheme and wants to reduce the number of subnets to make more hosts and addresses available in each subnet. Is there a way to use the same subnet for the two floors of the office?
Answer:
3 is your correct answer
A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server. Soon after, the help desk begins receiving calls from users who are unable to log in. After further investigation, it becomes clear that no users have successfully connected to the web server since the certificate installation. Which of the following is MOST likely the issue?
A. DA Incorrect firewall rules are blocking HTTPS traffic.
B. Users are still accessing the IP address and not the HTTPS address.
C. DC Workstations need an updated trusted sites list.
D Users are not using tokens to log on.
Write an algorithm for a vending machine that sells just one product. The machine flashes a yellow light when the quantity inside is below 40% of capacity
Answer:
The algorithm is as follows:
1. Start
2. Capacity = 100%
3. Input Status (True/False)
4. While Status == True
4.1. Read Quantity (%)
4.2. Capacity = Capacity - Quantity
4.3. If Capacity < 40%
4.3.1 Display Yellow Flash
4.4. Input Status (True/False)
5. Stop
Explanation:
This starts the algorithm
1. Start
The capacity of the machine is initialized to 100%
2. Capacity = 100%
This gets the status of the sales
3. Input Status (True/False)
The following iteration is repeated until the status is false
4. While Status == True
Read current sales quantity from the user
4.1. Read Quantity (%)
Remove the quantity from the capacity
4.2. Capacity = Capacity - Quantity
Check is capacity is below 40%
4.3. If Capacity < 40%
If yes, display yellow flashes
4.3.1 Display Yellow Flash
This gets the status of the sales
4.4. Input Status (True/False)
End algorithm
5. Stop
Identify the statement about Windows tasks that is FALSE.
To launch an application, click the Windows icon, select "All Programs," and then click an application.
The boot process is the process for powering off a computer.
A common way to shut down the computer’s operating system is by using the Start menu.
Users log into their accounts on the Welcome screen, before Windows is ready to use.
The statement about Windows tasks that is FALSE is
The boot process is the process for powering off a computer.According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.
As a result of this we can see that in launching an application;
we need to click on Windows iconselect "All Programs," click an application.Therefore, The boot process is not the process for powering off a computer.
Learn more about Windows tasks .
https://brainly.com/question/1594289
The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.
The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.
Learn more about the boot process here.
https://brainly.com/question/24355262
#SPJ6
how do you format a cd or a DVD
Explain what 10CLS program does and the write the output
Give three reasons to use a hard drive as mass storage.
Answer:
With that in mind, let's take a look at five places where hard drives shine.
Backups and Archives. ...
Media Libraries. ...
Large Capacity Storage. ...
NAS Drives and Security. ...
RAID Arrays. ...
Other Uses.
A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised
Answer:
computer.
Explanation:
it uses data that is labeled to train.
Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not transmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted
format please? i cant understand
7. System software is the set of software programs that helps run the computer and coordinates instructions between application software and hardware devices. It consists of the operating system (OS) and utility programs. How does the mindset of the designer affect the design of the operating system (e.g., Windows vs. Linux)
Answer:
Explanation:
The main goal when designing an operating system (OS) is to make sure that the system is as efficient and intuitive as possible. This is the mindset that designers have when creating the operating system. However, this also creates drastically different designs between designers, mainly because one design structure will feel much more natural and intuitive to one designer but not another. Since the designer's own personal taste/mindset drastically affects the design, most companies find their target audience and survey/test various designs. This is done in order to find what features and styles best fit the vast majority of the people.
The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion
Answer:
B. data at rest, data in transit
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.
Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.
Consider an Erlang loss system. The average processing time is 3 minutes. The average inter-arrival time is 3 minutes. The number of servers is 3. What is r (sometimes referred to as the offered load)
Answer:
r = 1
Explanation:
Average processing time ( p ) = 3 minutes
Average inter-arrival time ( a ) = 3 minutes
number of servers ( m ) = 3
Determine the value of r
r ( offered load ) = p/a
= 3 / 3 = 1
∴ value of r ( offered load ) = 1
What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?
Answer:
Fiber Optic, it allows for speeds up to 1200 mbps
Explanation:
Which statement is accurate to describe a spreadsheet versus an Excel workbook?
a) worksheets have one or more workbooks.
b) workbooks have one or more worksheets.
c) workbooks are the same as word documents.
d) worksheets always refer to real paper.
write the full form of E-mail?
Answer:
Electronic Mail. This is your answer.
Essay on "Impact of Digitalization"
Answer:
Digitization has a proven impact on reducing unemployment, improving quality of life, and boosting citizens' access to public services. Finally, digitization allows governments to operate with greater transparency and efficiency
Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.
a. True
b. False
Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C
Validate the user input so that the user can only enter positive values for sides A, B, C. All three must be true:
A > 0
B > 0
C > 0
Answer:
The program in Python is as follows:
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
while A<=0 or B <= 0 or C <= 0:
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
print("Valid inputs")
Explanation:
Get input for A, B and C
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
The loop is repeated until inputs for A, B and C are above 0
while A<=0 or B <= 0 or C <= 0:
Get input for A, B and C
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
Print valid inputs when user inputs are correct
print("Valid inputs")
what is the python ?
Answer:
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
This is my Opinion.
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
Hope this helps you :)
1011111 ÷ 11 in numerical
Answer:
91919.18182
Explanation:
Answer:
91,919 .1HOPE IT HELPS .
A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?
a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.
Answer:
C
Explanation:
Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.
Answer:
c
Explanation:
11111 Power 2 sovle
I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outside the function print the variable (after the function executes).
What will it print?
A. 5+1
B. 4
C. 6
D. 5
Answer:
D. 5
Explanation:
If the variables original value was 5 then the value that will be printed is 5. This is because the variable is being passed as a parameter into the function and 5 is being added to the parameter value, not the actual global variable outside. Therefore, in order for the adjusted value to be printed then that new value that is returned by the function needs to be saved in a new variable. This can be seen in the example code below.