Capital gains tax - 10% profits from sale of the house
Consumption tax - 6% tax on all sales
Excise tax - 5$ tax on cable tv line
Payroll tax - 15% tax to pay for social security
Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.
Answer:
True
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.
what do you mean by automation and diligence with respect to a computer??
Answer:
Delegince computer without any motion resists
Encryption is a process
i. To hide the massage
ii. To decipher the massage
iii. To delete the massage
iv. None of them
Answer:
answer is i
Explanation:
jjgjnyjghjhkgukhi
Answer:
Encryption is a process by which we can conceal the original message (effectively hiding it)
Explanation:
We typically apply some kind of algorithm to encrypt a message. By doing this we are effectively hiding the original contents of the message so only the people with the appropriate secret key or knowledge of the algorithm can decipher it.
Helpppppppppppppphuhuh
Answer:
B
Explanation:
You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.
If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.
Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT
What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>
Explanation:
the output password is isalpha()
A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade
Answer:
A. Microsoft Office Remote Code Execution
Explanation:
From the given options, we have;
The web server having a SQL injection is infrequently use
The information on the website having SSL/TLS not used is promotional
The location of the server having a TLS downgrade is on a development network
The location of the Microsoft Office Remote Code Execution is on a human resource system test server
Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE, cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.
You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.
Answer:
I will choose a option tin best
Answer: Install a WorkGroup to allow each device to control what is shared and with whom.
Explanation:
An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?
Answer:
Data and Insights
Explanation:
In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.
Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.
Thus the answer is 'data and insights'.
What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?
Answer and Explanation:
Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.
Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.
Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone
describe in detail what each step would look like if you ran into a software error.
Answer:
First you have to identify the problem.
Second Gather information.
Third iterate through potential solutions.
Fourth Test your solution.
Explanation:
There are many different ways to handle errors in software but this is the way I do it.
Hope this helps :)
After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.
Software ErrorA software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.
You can learn more about software errors here https://brainly.com/question/18497347
#SPJ6
Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END
Answer:
full and then I would like this
A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:
Answer: Computer's BIOS
Explanation:
Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.
The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.
The CPU is responsible for?
The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .
What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?
groups
tabs
sections
properties
Answer:
tabs
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.
The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.
A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.
Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.
Answer:
B, tabs
Explanation:
edge 2021
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do
Answer:
log off of his account and log back in
Explanation:
The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.
When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class
Answer:
provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified
Explanation:
I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.
If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?
Answer: be nice no matter how mean or rude the person is.
Explanation: because if you’re not you can get in big trouble or fired.
Answer:
remain calm during the conversation
this help me please.
Answer:
1) 1011010
2) 1100100
3) 1010101
4) 23
5) 22
6) 24
full form of ip ........?
write a c program to display the series: 1,8,27,64,125
num_list = [1, 8, 27, 64, 125]
for x in range ( len( num_list) ) :
print (num_list[x])
While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe
Answer:
Backdoor
Explanation:
Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level
The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts
20 points!!!!! Plz answer quickly
Answer:
other words are not clear
please help me with this this is Computer chapter Advanced HTML of class 8th
Answer:
ok let me try
It stands for
Hypertext Markup Language
Image result for html stands for
HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.
Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)
A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.
The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.
What is resolution?Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.
When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.
Thus, the correct option is A. Some image resolution was lost while uploading it.
To learn more about resolution, refer to the link:
https://brainly.com/question/15189307
#SPJ5
how are the computer classified into different types
Answer:
Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem
Answer:
Key escrow.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.
Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.
Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
What is the purpose of requirements gathering and analysis?
Answer:
The purpose of Requirements Analysis is to discover unknown requirements, i.e., to turn unknown requirements into known requirements. Users' needs that were not expressed during requirements gathering and elicitation can be uncovered through Requirements Analysis.
Explanation:
write a program in python to make the figure:-
*
**
****
********
****************
********************************
The first and correct answer will be marked as brainliest......
Answer:
Halo mateeeee
look it will be hard to explain the code and steps to you so just refer this video. .
it will help a lott
( *cries* Serena left Ash In pokemon s19 with a k I s s)
https://youtu.be/rUy_Nq9DHTs