Answer:
Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules.
Security Risk Scoring
Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.
Operational Security
Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.
Database Activity Monitoring
Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.
Only by covering both of these areas can organizations have defense in depth and effectively control risk.
program 2. write a VB.NET program to solve the linear equation of the form Ax+B=C, i.e x=(C=B)/A (Eg:2x+3=7, where B and C are consonants, A is the coefficient of x)
Answer:
Module Program
Sub Main()
Dim A, B, C, x As Double
A = 2.0
B = 3.0
C = 7.0
x = (C - B) / A
Console.WriteLine($"Solution for {A}x + {B} = {C} is x = {x}")
Console.ReadKey()
End Sub
End Module
Explanation:
For A=0, the program wouldn't work, because then any x would be a solution.
Which support function under Tech Mahindra is governing data privacy and protection related requirements
Answer:
Privacy Policy
Explanation:
PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.
Given that support functions are functions which assist and in a way contribute to the company goal.
Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.
The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.
List the components of a typical operating system and summarize the role of each in a single phrase.
Answer:
The answer is below
Explanation:
There are several components of operating systems, this may be based on the specific types of Operating systems. However, here are some of the major components.
1. Kernel: it delivers the primary level of control on all the computer peripherals.
2. Process Execution: it serves as a connection between the hardware and application program
3. Interrupt: it provides a dependable technique for the OS to transmit & respond to their surroundings.
4. Memory Management: it regulates main memory and then moves processes between disk & main memory during implementation.
5. Multitasking: it interprets the activities of many independent computer programs on a similar computer system.
6. Networking: it defines the interaction of processor through communication lines
7. Security: it protects the activities of other processes going in the system
8. User Interface: it provides permission for a computer operator to get the information.
Predictive Algorithms Identify one use/application in which tprediction might cause significant ethical harms.
a. True
b. False
Brandon has configured one of the applications hosted on his cloud service provider to increase the number of resources as needed. Which of the following describes this capability?
a. Continuity
b. Adaptability
c. Vertical scaling
d. Horizontal scaling
Answer:
The description of this capability is:
d. Horizontal scaling
Explanation:
The capability that Brandon has achieved is horizontal scaling, which involves the increasing of the resources of cloud applications to meet his increasing demand for cloud services. Vertical scaling involves the addition or subtraction of power to a cloud server, which practically upgrades the memory, storage, or processing power. But to scale horizontally, more resources are added or subtracted. The purpose of horizontal scaling is to spread out or in the workload of existing resources and either increase or decrease overall performance and capacity.
Explain how you would find a book on a given subject in the library.
Answer:
In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.
Write a line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.
Answer:
A line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.
Here,
const int MAX = 25;
Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer the following [3] a) What are the security risks for which a customer needs to be careful about? b) What kind of infrastructural set up will be required to set up a cloud? c) What sort of billing model will such customers have?
Answer:
perdonnosee
Explanation:
a which is the smallest chunk of information of computer can work with
Answer:
I still mad for that spam
Explanation:
Answer:
The bits are the smallest chunk of info that is used by computers.
Explanation:
Bit: A short abbreviation for binary digit which is the smallest unit of data.
You're welcome.
I hope I helped you.
1. You purchase a new desktop computer that does not have wireless capability, and then you decide thar you want to use a wireless connection to the internet. Give two solutions to upgrade your system to wireless.
2. You are replacing a processor on an older motherboard and see that the board has the LGA1155 socket. You have three processors on hand: Intel Core i3-2100, Intel Core i5-8400, and Intel Core i5-6500. Which of these three processors will most likely fit the board? Why?a. 4.b. 5.c. 6.d. 7.
Answer: 1.) You can use a USB WiFi adapter, install a dedicated PCIe WiFi card, or upgrade to a new motherboard with built-in WiFi. (That's three solutions but just want to give you flexibility with your problem.)
Answer: 2.) None of the processors would fit because they all have different series sockets. (The i5 processors have LGA1151 sockets and the i3 has an LGA1156 socket.)
Explanation: 1.) Usb WiFi adapter, dedicated PCIe WiFi card, OR a new motherboard with built-in WiFi
2.) None of the processors work
Viết chương trình nhập vào họ tên của bạn rồi in nội dung chuỗi đó lên màn hình.Ví dụ:Nếu họ tên nhập vào là: NGUYEN BINH MINH thì kết quả màn hình như sau
Discuss at least five ways of practicing good device care and placement
Answer:
The points according to the given question are provided below.
Explanation:
Batteries are quite a highly crucial part of EVs and should be handled accordingly.Whenever a part becomes obsolete, it should have been substituted every year using an innovative version.Before using an electric car, it should have been fully charged and ready to go.Within a certain duration of time, the gadget needs to be serviced again.Be sure to keep your mobile device or another gadget in such a secure location.What happens when a dataset includes records with missing data?
Answer:
However, if the dataset is relatively small, every data point counts. In these situations, a missing data point means loss of valuable information. In any case, generally missing data creates imbalanced observations, cause biased estimates, and in extreme cases, can even lead to invalid conclusions.
It makes data analysis to be more ambiguous and more difficult.
Missing data is simply the same as saying that there are values and information that are unavailable. This could be due to missing files or unavailable information.
A dataset set with missing data means more work for the analyst. There needs to be a transformation in those fields before the dataset can be used.
Generally speaking missing data could lead to bias in the estimation of data.
A data scientist is a data expert who is in charge of data. He performs the job of data extraction, data analysis, data transformation.
read more at https://brainly.com/question/17578521?referrer=searchResults
have fire have ....
babi from babi098
Answer:
yessss I tooo have a fire at my home
lolololololololololo
ok have a great day what is your name ?
Answer:
..... ....
.... .....
....................
....................
Select the correct answer.
Which of these statements is true of dynamic design diagrams?
A.
They demonstrate objects.
B.
They demonstrate relationships.
C.
They demonstrate the behavior of system aspects.
D.
They include structure diagrams.
Answer:
They demonstrate the behavior of system aspects.
The statement true regarding the dynamic design diagram is that it demonstrates the behavior change in the system. Thus, option C is correct.
What is a dynamic design diagrams?A dynamic design diagram is given as the model that has been expressing the development of the operations, actions, and the behavior of the system over time.
The dynamic design diagram is thereby the demonstration of the behavior of system aspects. Thus, option C is correct.
Learn more about dynamic design, here:
https://brainly.com/question/14956129
#SPJ2
Calculate the number of telephone
towers required to cover the entire
Country asurning the entire country is
interconnected to provide network
coverage
Answer:
yho
Explanation:
hayi no ntwana.... lala boy
Leo is planning the new backup strategy for a subsidiary his company is purchasing that does not currently have a backup strategy in place. He decides that a full backup should be run once per week. Once per day, everything that has changed since the last full backup will be archived. Once per hour everything that has changed since the last backup of any type will be backed up. Which of the following describes the backups that will be run every hour?
a. Differential
b. Variable
c. Incremental
d. Flexible
Answer:
C. Incremental backup
Explanation:
An incremental backup is a type of backup where the succeeding copies of the data is made up of only those positions that have changed since the previous or prior copies were made. Such backups are desired since they limit the usage of space for storage and these types of back ups are faster to do that the differential backup.
When we bring this explanation to this question, we can easily see that the backup that is being carried out is done on everything that has changed since the last backup (previous backup). Therefore this is an incremental backup.
a. Daily Life Magazine wants an analysis of the demographic characteristics of its readers. The marketing department has collected reader survey records containing the age, gender, marital status, and annual income of readers. Design an application that allows a user to enter reader data and, when data entry is complete, produces a count of readers by age groups as follows: younger than 20, 20-29, 30-39, 40-49, and 50 and older. b. Modify the Daily Life Magazine program so that it produces a count of readers by gender within age group-that is, under-20 females, under-20 males, and so on. c. Modify the Daily Life Magazine program so that it produces a count of readers by income groups as follows: under $30,000, $30,000-$49,999, $50,000-$69,999, and $70,000 and up.
Answer:
uh
Explanation:
In MS_Excel , assume you have data base of employees with their ages,How you could checked the employee is continuous in work or not depending on his age? A) By using AND function. B) By using IF function. C) By using OR function. D) By using IF and AND functions
Answer:
C) By using OR function
Explanation:
Given
Employees database
Required
Check for employees that are continuous in work or not depending on age
The solution to this question lies in the question itself.
From the question, we are to check for
....employees that are continuous in work or not depending on age
Notice that the question does not imply the usage of an if-function but, the usage of an or function as indicated by the text in bold.
So.
If an employee is continuous in work, the function will return true
If an employee does not depend on age limit, the function will return true
The function will return false, if both conditions are not true
A technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue
Answer:
The answer might be C.
Explanation:
Virtualization software (hyper-v, vm ware, virtual box) has a power button to power on the virtual machine, so in the real world you would press the power button. But the virtual CPU is the closet thing to a power button.
Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a sudden it stops working and generates an error message that the account has been locked. Which of the following is the best possible reason why?
a. The password has expired.
b. The IP address of the server the process is typically accessing has changed. *
c. The ACL with the allowed list of users has changed.
d. Someone has tried to hack into the system using that account.
Answer:
b. The IP address of the server the process is typically accessing has changed
Explanation:
IP address stands for Internet Protocol address. It refers to a numerical value which is assigned to a every device which is connected to a computer network using the internet protocol for any communication.
Every device is allotted a unique IP address number.
In the context, Keely who works on an automation tool suddenly gets an error message that the account has been locked. This is mainly due to the changed in the IP address of the server that accesses the process.
The account gets closed or clocked whenever the IP address of the server changes.
Therefore, the correct option is (b).
Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of job. It also maintains a file of estimates given for jobs not yet performed; this file contains a customer number, name, address, proposed date of job, and proposed price. Each file is in customer number order.
Required:
Design the logic that merges the two files to produce one combined file of all customers whether past or proposed with no duplicates; when a customer who has been given an estimate is also a past customer.
Answer:
Hence the complete implementation of python code that reads two files and merges them together.
def merge_file(past_file_path,proposed_file_path, merged_file_path):
past_file_contents=load_file(past_file_path)
proposed_file_contents=load_file(proposed_file_path)
proposed_customer_name = []
for row in proposed_file_contents:
proposed_customer_name.append(row[1])
with open(merged_file_path,'w') as outputf:
outputf.write("Customer Number, Customer Name, Address\r\n")
for row in proposed_file_contents:
line = str(row[0]) +", " + str(row[1]) + ", " + str(row[2]) +"\r\n"
outputf.write(line)
for row in past_file_contents:
if row[1] in proposed_customer_name:
continue
else:
line = str(row[0]) + ", " + str(row[1]) + ", " + str(row[2]) + "\r\n"
outputf.write(line)
print("Files merged successfully!")
# reads the file and returns the content as 2D lists
def load_file(path):
file_contents = []
with open(path, 'r') as pastf:
for line in pastf:
cells = line.split(",")
row = []
for cell in cells:
if(cell.lower().strip()=="customer number"):
break
else:
row.append(cell.strip())
if len(row)>0:
file_contents.append(row)
return file_contents
past_file_path="F:\\Past Customer.txt"
proposed_file_path="F:\\Proposed Customer.txt"
merged_file_path="F:\\Merged File.txt"
merge_file(past_file_path,proposed_file_path,merged_file_path)
CC stand for.....in the email platform?
Along with the "To" field of an email, you will usually have a place to enter email addresses in a CC field. CC stands for "carbon copy."
Hope this helps! Please mark me as brainliest!
Have a wodnerful day!
How can using Prezi software for a presentation allow the presenter to better respond to audience needs?
Answer:
The description of the given question is summarized in the explanation section below.
Explanation:
Prezi makes things simpler to move around freely from one location to another even though you may pass through slides conventional standard edition presenting. If users spend nearly the audience's listening that would be very useful.Unless the organization's crowd looks puzzled or makes a statement, you may backtrack to that same topic without navigating several slides expediently.Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?
Answer:
public void removePrefixStrings(List<String> list , String prefix) {
if(list==null || list.size()==0)
return;
for(int i=0; i<list.size();) {
if(list.get(i).startsWith(prefix))
list.remove(i);
else
++i;
}
}
Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2
Then removal is also n
So the total time complexity is O(n3)
If there are 18 people in your class and you want to divide the class into programming teams of 3
members, you can compute the number of different teams that can be arranged using this formula
(n!/r!(n−r)!).
Using a combination method to determine how many ways can 18 people be divided into programming teams of 3 members, the number of programming teams can be arranged in 816 ways.
What is Combination?In mathematical model, a combination is a mathematical approach for calculating the number of potential arrangements in a set of things without taking the order arrangement of the items is into consideration.
It can be expressed by using the formula;
[tex]\mathbf{ _nC_r = \dfrac{n !}{ r!(n-r)! } }[/tex]
where:
[tex] \mathbf{ _nC_r = number \: of \: combinations \: \} }[/tex]n = total number of set objects = 18r = number of choosing objects = 3[tex] \mathbf{ _nC_r = \dfrac{18!}{ 3!(18-3)! } }[/tex]
[tex]\mathbf{ _nC_r = \dfrac{18!}{ 3!(15)! } }[/tex]
[tex] \mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 \times 15!}{ 3!(15)! } }[/tex]
[tex]\mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 }{ 3 \times \: 2 \times 1} }[/tex]
= 816 ways
Learn more about combinations here:
https://brainly.com/question/11732255
Difference between array processor and vector processor
Answer:
An array is used for the storaging the paticular given size element that is either fixed or given by the user. However an vector is also used for storing purpose but the size of the table is assign automatically during the running time of the program or we say dynamic size assign to table.
Answer:
An array is made up of indexed collections of information called indices, the plural form of the word "index." Though an array can, in rare cases, have only one index collection, a vector is technically indicative of an array with at least two indices. Vectors are sometimes referred to as "blocks" of computer data.
Explanation:
Array stores a fixed-size sequential collection of elements of the same type and it is index based. Vector is dynamic in nature so, size increases with insertion of elements. As array is fixed size, once initialized can't be resized. Vector occupies more memory.
Write a demo test to verify the above Rectangle object accessible from demo test main program and can execute display() method to output.
Answer:
Explanation:
The Rectangle class was not provided in this question but after a quick online search I was able to find the class code. Due to this I was able to create a test code in the main Method of my program to create a Rectangle object and call it's display() method. The Test code and the output can be seen in the attached image below. While the code below is simply the Main Test Program as requested.
class Brainly {
public static void main(String[] args) {
Rectangle rectangle = new Rectangle(20, 8);
rectangle.display();
}
}
what is operating system?
Answer:
operating system (os)is translator between the operator (user)and the computer
The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development
Answer:
The modern computer system has been evolutionary. Modern computers have allowed for us to complete hard tasks rather easily. With modern computers, we are able to calculate advanced equations with the click of a button. Trends in computing like RTX can rapidly improve performance, rendering, and tons of other graphical heavy actions. In September of 2018, we got the first RTX card, now in 2021, RTX has become exponentially better than what it was in 2018. With the modern computers comes quantum computers. Quantum computing is estimated to be 100 million times faster than any modern computer. IBM, the company to make the first computer stated that we are in the decade of quantum computing. And who knows? Maybe quantum computing will come sooner rather than later.
Explanation:
You probably should modify this a little so you don't get in trouble. I researched each topic I put into this for about an hour so I hope this is what you need. If it isn't, please don't hesitate to tell me what I didn't add or what went wrong.
Have a good day :)