Answer:
Binary ?
Explanation:
Im not 100% sure but it could be binary or 0
Write code using the range function to add up the series 3, 6, 9, 12, 15, ..... 66 and print the resulting sum. Expected Output 759
Answer:
The program is as follows:
total = 0
for i in range(3,67,3):
total += i
print(total)
Explanation:
This initializes the sum of the series to 0
total = 0
This iterates through the series with an increment of 3
for i in range(3,67,3):
Add up all elements of the series
total += i
Print the calculated sum
print(total)
what is the fullform of ETA in computer term
Answer:
Estimated Time of Arrival.
Why does a computer need programs?
A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
Group of answer choices.
A. It can communicate with networks inside a particular company with subnets.
B. It can communicate on the local network as well as on the Internet.
C. It has a public IP address that has been translated to a private IP address.
D. It cannot communicate outside its own network.
Answer:
D. It cannot communicate outside its own network.
Explanation:
Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.
Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.
When a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.
Generally, a computer cannot communicate outside its own network when it is assigned an IP address of 169.254.33.16.
What is the ghosted text or picture behind the content on the page?
Answer:
Watermark
Explanation:
This is actually called a Watermark. It is usually used as a way of showing the name or logo of the author who owns the content that is underneath the watermark. This is done so that individuals cannot steal the owner's work and use it as their own. Usually, the owner has the original version of the content without any watermark, as well as individuals that have purchased the content or a licence to use the content for personal or commercial usage.
when files on storage are scattered throughout different disks or different parts of a disk, what is it called
Answer:
File Fragmentation or Fragmented Files
Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?
Answer:
Access Quick Access commands using the More button.
Explanation:
To ensure that a command she frequently uses is added to the Quick Access toolbar Robyn would need to "Access Quick Access commands using the More button."
To do this, Robyn would take the following steps:
1. Go / Click the "Customize the Quick Access Toolbar."
2. Then, from the available options, he would click on "More Commands."
3. From the "More Commands" list, click on "Commands Not in the Ribbon."
4. Check the desired command in the list, and then click the "Add" button.
5. In the case "Commands Not in the Ribbon" list, did not work out Robyn should select the "All commands."
the user cannot use a computer system without.................... software
Answer:
the user cannot use a computer system without hardware and software
Answer:
the user cannot use a computer system without.........hardware.....and...... software
The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing
Answer:
a. spear-phishing has more specific targets than phishing
Explanation:
The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.
Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.
1. The purposes of traffic signs are
a. to direci, to decide, to stop.
b. to observe, to direct, to guide.
to stop, to warn, to decide.
d. to regulate, to warn, to guide.
Answer:
D. to regulate, to warn, to guide.
The organization will most likely ___ to an internal user attempting to escalate privilege than to an external hacker
Answer:
respond differently.
Explanation:
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.
Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.
An organization is expected to most likely respond differently to an internal user such as one of its employees that attempt to escalate his or privilege than to an external hacker.
This is usually so because the organization trust its internal users to an extent than it does with external users or an attacker such as an external hacker.
como se llama el arte de pintar en las cuevas sus actividades de caceria
A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.
Answer:
tictactoe[1][1]
Explanation:
To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::
Given a 2 - dimensional 3×3 array of integers :
Creating a dummy array assigned to the variable tictactoe :
[1 2 3]
[4 5 6]
[7 8 9]
We have a 3×3 array, that is 3 rows and 3 columns.
The middle element in the middle row is located in the second row ;second colum
Row and column Indexes starts from 0
Middle element in the middle row is the value 5 and it corresponds to :
tictactoe[1][1]
We call the variable name and the we use one square box each to house the row and column position.
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?
Answer:
Explanation:
In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.
what can be the maximum possible length of an identifier 3163 79 can be of any length
Answer:
79 characters
Explanation:
The programming language is not stated, but a little search online shows the question is about python programming language
Literally, identifiers are the names given to variables, arrays and functions.
In most programming languages (e.g. python), identifiers are case-sensitive.
i.e. Abc is a different identifier when compared to abc.
Having said that, python allows up to 79 characters to name an identifier.
Meaning that, the length of a variable name (or array, or function, etc.) can be up to 79 characters, and it cannot exceed 79 characters.
can I play the game the last of us with this spec:
John wants to assign a value to the favorite sport variable:
favoriteSport = indoor soccer
However, he gets an error message. What does he need to change in order to make the code work?
Add a space between the words in the variable name
Create a longer variable name
Put quotation marks around the string literal
Omit the symbol in the string
Put quotation marks around the string literal
Jon wants to assign a value to the favorite sport variable: favoriteSport! = "indoor soccer" but gets an error message by Removing the exclamation mark from the variable name it will fix for the code to work.
In laptop programming, code refers back to the set of instructions, or a machine of rules, written in a selected programming language (i.e., the supply code).
If you've got ever observed an exclamation mark (!) earlier than the variable in a person's JavaScript code the negation operator (!) definitely simply reverses the means of its operand. ! is the logical now no longer operator in javascript.
Learn more about the javascript here:
brainly.com/question/27683041
#SPJ3
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet
Answer:
The given statement is true.
Explanation:
The honeynet is indeed a decoy network comprising a honey trap or even more. It appears to be a real network with multiple systems but is housed on one or a few servers, each of them together in one setting, which is why it is termed a honeynet when more than one honeypot is linked to an amount of honey pot system on one subnet. In the IDSs (Intrusion Detection Systems), a padded cell system has been used which is like a honeycomb.
write a program to generate following series in qbasics 100,81,64,....1
Answer:
[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]
it's square root number you multiple times by 2
An item that contains both data and the procedures that read and manipulate it is called a(n) ________.
Answer:
Object
Explanation:
An item that contains both data and the procedures that read and manipulate it is called an object.
algo de La historia de los productos tecnologicos
Answer:
La tecnología se define como la suma de técnicas, habilidades, métodos y/o procesos utilizados y utilizados en la producción de bienes, productos o servicios, o para lograr objetivos clave de la investigación científica.
Precisamente, la tecnología se define como la aplicación del conocimiento científico con fines prácticos, especialmente en la producción industrial. Un significado secundario de la palabra se refiere al desarrollo de dispositivos y mecanismos con fines científicos y está directamente relacionado con las artes aplicadas, las ciencias aplicadas o la ingeniería. A veces se refiere a la metodología que caracteriza tal proceso. En los últimos años ha existido una tendencia a que el concepto se refiera únicamente a la alta tecnología y / o tecnología informática, aunque básicamente no se limita a estas áreas. Por ejemplo, tanto la Estación Espacial Internacional o una computadora pueden ser tecnología, también pueden ser un abridor de botellas estándar. A menudo, el objeto de la tecnología con beneficios prácticos no es el producto de la investigación científica, sino el resultado de un descubrimiento accidental.
Cuando se introduce una fórmula en una celda primero que hay que introducir es
Answer:
El signo =.
Explanation:
La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.
Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.
What will the following code display?
A) 6
B) 0
C) 3
D) 0
1
2
Answer:
Answer is C) 3
Explanation:
Adobe gives away the Acrobat Reader to build a market for the sale of software that creates Acrobat files. This is an example of:
Group of answer choices.
A. firms giving away products for half of a two-sided market to seed the market.
B. one market attempting to conquer a new market by making it a subset, component, or feature of its primary offering.
C. firms spreading costs across increasing units of production or in serving multiple customers.
D. firms taking advantage of complementary products developed for a prior generation of technology.
E. markets, once considered distinctly separate, beginning to offer similar features and capabilities.
Answer:
A. firms giving away products for half of a two-sided market to seed the market.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into two (2) main categories and these are;
I. Open-source software.
II. Proprietary software.
An open-source software is a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.
In this scenario, Adobe giving away the Acrobat Reader to build market for the sale of software that creates Acrobat files. Thus, this is an example of firms giving away products for half of a two-sided market to seed the market.
plz help me to do 4 number
Answer:
A is an abbaccus. B is Blaze Pascal. C is The Jacquard Loom. D is Charles Babbage. E is The Manchester Baby.
Explanation:
1,list all data from table customer, sale and product. 2,list Name and sex of all customer. 3,list all male customer. 4,list all male and female customer. 5,list the name and age of male customers. 6,list the name, price and color of the product.
Answer:
The SQL queries are as follows:
1. select * from customer
select * from sale
select * from product
2. select name, sex from customer
3. select * from customer where sex = 'male'
4. select name, age from customer where sex = 'male'
5. select name, price, color from product
Explanation:
Given
Tables: customer, sale, product
Required
Answer question 1 to 5
(1) All data in the given tables
To do this, we make use of the select clause to retrieve data from each of the table and * to select all data.
So, we have:
select * from customer --> This lists all data from customer table
select * from sale --> This lists all data from sale table
select * from product --> This lists all data from product table
(2) Selected details from customer table
In (1), we have:
select * from customer --> This lists all data from customer table
To retrieve selected details, we replace * with the field names.
So, we have:
select name, sex from customer
(3) Male customers
In (1), we have:
select * from customer --> This lists all data from customer table
To retrieve male customers, we introduce the where clause
So, we have:
select * from customer where sex = 'male'
(4) Name and age of male customers
In (3), we have:
select * from customer where sex = 'male'
To retrieve the name and age, we replace * with name and age. So, we have:
select name, age from customer where sex = 'male'
(5) Name, price and color of products
In (1), we have:
select * from product --> This lists all data from product table
To retrieve selected details, we replace * with the field names.
So, we have:
select name, price, color from product
Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File
Answer:
Explanation:
1.Save and Save As
The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name
2.Blank Document and Template
Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template
3. Existing File and Recently Open File
Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced
it.
True
Оr
False
Answer:
False
Explanation:
Digital learning tools are nowadays used In Education. Countries like Japan, China, India and Korea use computers and internet in their educational system.
Hope it helps!
disadvantages of computer.
Answer:You cant carry it around like a phone
Explanation:
Your friend want to make a copy of your new game you bought the previous day .
Why should you prevent him from doing that?
Answer:
It is copyright infringement
Explanation:
Required
Why you should prevent your friend from copying a software you bought
When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.
This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.