State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translates the machine language into programming language. Backup is a process of shrinking the files on a disk. VisiCalc was the first computer spreadsheet program. An interpreter translates the whole program into an equivalent code in one go.​

Answers

Answer 1

Answer:

2. translates program written in any programming language into Machine language

last ko . false

Explanation:

aru aaunna


Related Questions

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Answers

Answer:

"Private" is the right solution.

Explanation:

Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.

A Linux systems admin reported a suspicious .py file that ran on a daily schedule after business hours. The file includes shellcode that would automate Application Programming Interface (API) calls to a web application to get information. What type of script is executing this shellcode

Answers

Answer: Python script

Explanation:

Based on the information given in the question, the type of script that is executing this shellcode is the Python script.

The Python script is a file that contains codes that are written in Python. In such case, the file which contains the python script typically has an extension

which is ".py"' or ".pyw" when it's run on windows

Therefore, based on the information given, the answer is Python script.

The type of script used in executing the shellcode that would automate Application Programming Interface (API) calls to a web application to get information is called; Python Script.

The type of script required to execute the given shellcode is called a python script. This is because the Python script is simply defined as a file that contains a code which is written in Python.

Now, this file which contains the python script will have the extension ‘.py’. However, if it is being run on a windows machine, it could also be the extension ‘.pyw’.

Finally, to run a python script, all we need to do is to get a python interpreter that we will download and install.

Read more about python at; https://brainly.com/question/16397886

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

kamusta Bagong user Ako dito ​

Answers

Answer:

kamusta Bagong user Ako dito = hello New user I'm here

What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer

Answers

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.

Answers

Answer:

"Virtual reality" is the appropriate answer.

Explanation:

The utilization of technological advances gives the impression of a 3D interactive environment wherein the things that have such a perception of space embodiment or involvement, are considered as Virtual reality.

Virtual reality implementations often include:

Entertainment,Medical and Educational activities.

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

please answer me fast ​

Answers

Answer:

Btp

Explanation:

this will help you more

Answer:

BTP is the simplest and the most conventional model of topology

PTP

BTP✓✓✓

PTB

PTT

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails

Jeffery wants to identify the subject terms being used in APA PsychInfo for articles related to behavior modifications. What is the most efficient and effective search strategy to identify subject terms for a database search

Answers

Group of answer choices.

a. He can look for common related subject terms in a dictionary, thesaurus or encyclopedia.

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

c. He can use Go-ogle Scholar to retrieve relevant articles and find common related subject terms.

Answer:

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

The most efficient and effective search strategy to identify subject terms for a database search is to look for relevant articles in the results list from a database search and scan the subject terms.

In order to improve the speed of retrieval for a search engine, high frequency words such as if, or, and, at, to, etc., which are generally referred to as stop words are filtered out.

However, AND should be used to combine keywords and phrases when using a "subject search" option to search a database for relevant articles.

If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False

PLEASEE HELP

Answers

Answer:

false , those are called passive railways

Ricard, a sixth-grader, uses codes such as LOL, TTYL, and 411 in his text messages. The use of these codes in this context indicates that Ricard understands:

Answers

Answer: pragmatics

Explanation:

Pragmatics simply means the study of how words are used. It's the study of signs and symbols. Pragmatics includes speech acts, implicature, and conversation.

Since Richard, a sixth-grader, uses codes such as LOL, TTYL, and 411 in his text messages, then the use of these codes in this context indicates that Ricard understands pragmatics.

Discuss the entity integrity and referential integrity constraints. Why is each considered important

Answers

Answer:

Referential integrity, is the condition with the rule that foreign key values are always valid, and it is founded on entity integrity. Entity integrity, makes certain, the condition that there is a unique non-null primary key for every entity. The parent key functions as the source of the unique identifier for a set of relationships of an entity in the referential constraint parent table, and defining the parent key is known as entity integrity

Explanation:

What is the Role of an algorithm?

Answers

Answer:

Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.

pls Mark me as brainliest trust me

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

True or False? Using your traffic analytics report, you can see the source of traffic to your website

Answers

Answer:

True

Explanation:

which shooting games is good for low end PC. CSGO or Valorant?​

Answers

the best choice would be csgo

What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools

Answers

Answer:

A resource that offers dozens of canned reports built around marketing best practices

Explanation:

Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.

The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from

Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices

what is computer engineering

Answers

Answer:

Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.

Explanation:

Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.

Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.

In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology

Answer please in order

Answers

Answer:

analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.

Explanation:

Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.

Generally, it travels faster through solids than it does through either liquids or gases.

Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Answers

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

your organization has multiple remote offices. the users at the remote office often remotely connect to the application servers. which of the protocols should you enforce for encrypted communicationa

Answers

Answer:

RDP

SSH

Explanation:

RDP and SSH can both be used for remote encrypted communication. RDP protocol( called remote desktop protocol) is owned by Microsoft. It allows it's user access to the network through a GUI RDP software that allows you to connect to another computer on the network, the client server. RDPs operate over encrypted channels and is therefore secure.

SSH(called secure shell protocol) is used on Unix like OS systems to connect over unsecured network. SSH uses cryptographic encryption that increases security for it's client-server architecture. It's an improved version of RSH and Telnet which didn't make use of encryption when sending data over the network.

The method of distributing multimedia files, such as an audio file, for downloading onto a personal computer is called

Answers

Answer:

digital distribution

Explanation:

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files

Answers

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

please answer me fast​

Answers

Answer:

microsoft

Explanation:

this may help u

Answer:

Microsoft

because its a 2013 worldwide partner conference and Microsoft server operations

A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

Answers

Answer:

Explanation facility

Explanation:

Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion

When power is completely removed from your computer

Answers

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says
Other Questions
A bond has a modified duration of 8 and a price of 112,955 calculated using an annual effective interest rate of 6.4%. EMAC is the estimated price of this bond at an interest rate of 7.0% using the first-order Macaulay approximation EMOD is the estimated price of this bond at an interest rate of 7.0% using the first-order modified approximation Calculate EC EMOD A. 91 B. 102 C. 116 D. 127 E. 143 You want to change your cell phone service. The new company charges $40 permonth for cell phone use. There is a one-time start-up fee of $25. Which equationshows the total cost of your cell phone service over time? The first three steps in determining the solution set of the system of equations, y = x2 2x + 8 and y = 2x + 11, algebraically are shown in the table.Which represents the solution(s) of this system of equations?(3, 1)(3, 5)(3, 5) and (1, 9)(1, 13) and (3, 20) The genetic code is defined degenerate or even redundant because: A. the same codon codes for different amino acids B. an amino acid can be encoded by several codons C is different in all organisms, except in monozygotic twins D. the sequence of codons is not separated by intervals, but is continuous E. the structure of the genes is constantly mutating Please someone help I can not get past this question Which of these would have the greatest pressure?Group of answer choicesA large balloon with few gas molecules at a high temperatureA small balloon with many gas molecules at a low temperatureA small balloon with many gas molecules at a high temperatureA large balloon with few gas molecules at a low temperature A palindrome is a number that is identical when written both forwards and backwards. For example, 181, 25852, and 3333 are all palindromes. How many palindromes between 100 and 1000 are divisible by 3? We know that the remainder Rn will satisfy |Rn| bn + 1 = 1 (n + 1)9n + 1. We must make n large enough so that this is less than 0.0001. Rounding to five decimal places, we have b2 = _________ , b3 =_________and b4 =__________ Which of the following is NOT a characteristic of baked custard? *a) excellent flavorb) firmness of shapec) smooth, tender textured) Well blend flavor express the ratio as a fraction in the lowest terms 100cm:5m PLZ VERY QUICK The Mystery of Loch NessBy Kayden MitchellOf all the mysteries in the world, none has been as popular as that of the Loch Ness Monster. Perhaps the biggest mystery is whether it is convincing evidence or a simple desire to believe that keeps the myth alive.Loch Ness is a lake in Scotland. The loch, or lake, is known for sightings of a mysterious monster. Most who see this monster, known as Nessie, describe something with a long neck and several humps above the water. Sometimes the "monster" is moving in these sightings, and sometimes it is still. Many have suggested that Nessie might be a plesiosaur (plea-see-a-soar), an aquatic dinosaur that was trapped in the loch after the last ice age.The plesiosaur theory presents several problems. First, the plesiosaur is an air breather. Such a creature would need to surface often and, therefore, be seen more frequently. Second, it's unlikely that the same creature has lived in the loch since the last ice age. Today's creature would have to be the offspring of an original plesiosaur trapped long ago. This would suggest multiple creatures in the loch (needed to produce offspring). Again, sightings would be more frequent if this were the case.So from a purely logical stand point, the existence of such a large and ancient creature is unlikely. But assume for a minute that it is possible. What would a plesiosaur need to live in an enclosed lake?Tropical waters: Scientists believe plesiosaurs were warm-blooded. Like crocodiles and alligators, plesiosaurs would need to live in warm waters. The loch is very cold with temperatures averaging about 40 degrees Fahrenheit (4.4 Celsius).Food: Like other warm-blooded creatures, plesiosaurs would need a large quantity of food. If there is a group of Nessies, then even more food would be needed. Because the loch is full of silt (underwater dust) not much light gets into the deepest areas. So the food chain, which would depend on plankton, is very weak at its base. As a result, there is probably not enough food to support such a large creature.However, the plesiosaur theory is not the only one. Many other ideas attempt to explain the sightings and "photographs." But two separate sonar surveys of the loch have not found any evidence of a creature larger than a salmon. The last survey1, completed in 2007 by the British Broadcasting Company (BBC), involved 600 different sonar beams. Using satellite navigation systems, the team made sure every inch of the loch was searched. The team found nothing.With cell phones and digital cameras, one would think that sightings of Nessie would increase. This has not happened. The BBC team believes the legend of Nessie has endured because people see what they want to see. To prove this, the team used a fence post, raising it before groups of tourists. Afterwards several of the tourists asked to draw pictures of what they had seen drew pictures of a monster's head.1 "BBC 'proves' Nessie does not exist." 27 July, 2003. http://news.bbc.co.uk/2/hi/science/nature/3096839.stmBased on the essay, what makes people think they have seen something in the loch? The many sonar studies have identified strange objects in the water. The myth of the creature makes people imagine they have seen one. The sightings have occurred over a very long period of time. The simple explanations suggest reasons why a creature may have survived. When cutting a stem, you can cut straight across, not at an angle *TrueFalse HELP!! WILL MARK YOU BRAINLIEST!! VERY URGENT!!Which territories did Great Britain, France, and Italy acquire? Use the chart below to organize your information.Great BritainFranceItaly Two parallel conducting plates are separated by 12.0 cm, and one of them is taken to be at zero volts. (a) What is the magnitude of the electric field strength between them, if the potential 5.6 cm from the zero volt plate is 450 V Select the correct statement(s) regarding decentralized (distributed) access control on a LAN. a. no centralized access process exists, and therefore each connected station has the responsibility for controlling its access b. data collisions are possible, therefore mechanisms such as CDMA/CD are required c. when a data collision occurs, the nearest station detecting the collision transmits a jamming signal d. all of the above are correct Can someone help with this jawbone root nerve cementum blood vessel gum crown Fill in the blanks. 1. The front four teeth on each jaw are called 2. Each tooth is attached to the jawbone with the help of 3. A healthy tooth is held firmly in the jawbone by the 4. Teeth can get spoilt if they are not kept 5. Germs in the mouth feed on sugar and make what type of Literary Devices is this passage and provide an explanation " Only the champion daisy trees were serene. After all, they were part of a rainforest already two thousand years old and scheduled for eternity, so they ignored the men and continued to rock the diamondbacks that slept in their arms. It took the river to persuade them that indeed the world was altered." need this ASAP PLEASE Find the missing side of the triangle using the Pythagorean Theorem. in heating a kettle of water on an electric stove, 3.3410^3 J of thermal energy was provided by the element of the stove. yet, the water in the kettle gained only 5.9510^2 J of thermal energy. determine the percent efficiency of the electrical element in heating the kettle of water