Answer:
The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;
Device Health Attestation (DHA)
Explanation:
Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.
Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises
Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker
Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.
Which element is the first thing you should complete when making a movie?
A script
A storyboard
Opening credits
A video segment
Answer:
storyboard!!!
Explanation:
its important to have the concept in mind before starting
What is a System software that serve as a platform/supports other programs/software in a computer system
Answer:
Operating system.
Explanation:
An operating system is a program, or rather, a macro program or set of programs, whose function is to control the computer hardware, and allow the correct operation of the software installed on it, serving as a platform for it. In this way, the operating system allows, basically, the use of the computer in a functional way by the user, who will be able to run different programs and use different hardware thanks to the previous installation of the operating system. The most common operating systems today are Windows and macOS.
condition of watering a plant
Answer:
Hydration?
Explanation:
grouping keywords into separate lists for different sections for a website is known as
a. researching
b. comparing
c. organizing
d. brainstorming
Answer:
C
Explanation:
A is when you surf the web for facts.
B is just finding the difference between 2+ things.
D is when you think of a bunch of ideas firsthand before officially planning anything.
Brainliest? (❁´◡`❁)
What is an example of a composite key in a database table?
InvoiceID
CustomerID
ProductID
OrderID + ProductID
Answer:
b
Explanation:
OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.
What is composite key?A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.
In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.
Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.
However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.
Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.
Thus, the correct option is 4.
For more details regarding composite key, visit:
https://brainly.com/question/10167757
#SPJ3
What is computer task bar
Answer:
It is a bar where you can see all of your tasks or pinned items.
Explanation:
Introduction to Database: Tutorial
10 of
Name
Nancy
Date of Birth Age Blood Type
9/17/97
17 o positive
10/23/97 17 A positive
Hobby
Talent Show Registration Unique ID
drawing and painting, music Yes
A_001
reading, creative writing Yes
A_002
William
Philip
2/22/97
18
B positive
Yes
A_003
Jean
7/25/97
17
No
A_004
playing guitar
sports
George
7/29/98
16
Yes
A_005
Allan
8/16/97
17
Yes
O positive
A negative
O positive
o positive
o negative
AB positive
computer games
sports
A_006
A_007
17
No
Roger 12/11/97
Kimberly 5/12/98
16
Yes
A_008
Anne
6/10/97
17
Yes
A_009
video games
watching TV
reading fiction
listening to music
William
5/22/98
16
O positive
Yes
A_0010
Diane
3/24/97
17
A positive
Yes
A_0011
Part A
What are the field names in the database? Explain what data type is appropriate for each field.
B I y X
Х.
Font Sizes
AA
= = 三 三 三 三
Answer: this is the best situation
Explanation: it shows the process
Answer:
PLATO ANSWER. Sample Answer
Explanation:
The field names in the database are Name, Date of Birth, Age, Blood Type, Hobby, Talent Show Registration, and Unique ID. Here are the types of data that you can enter into each field.
Name:This field has 5 to 10 characters and accepts text data only.
Date of Birth: This field accepts dates only. It uses a medium-length entry in the form of month/day/year (mm/dd/yy).
Age: This field is numerical and contains numerical data only.
Blood Type: This field contains text data, with a maximum of 11 characters.
Hobby: This field can be a memo, and it can accept large volumes of data in any format. This data type can include null values as well.
Talent Show Registration: This is a Boolean data field that contains the values Yes or No.
Unique ID: This field accepts alphanumeric data, so this, too, is a text field.
FREE POINTTTTTTTTTTTTTTTTTTT
Answer:
THXXXXXXXXXX
Explanation:
1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disabled?
Select one:
Backdoor
Rootkit
Logic Bomb
Trojan Horse
Answer:
it would be logic bomb.
Explanation:
I hope this helps
Which of the following statements are true of
software engineers? Check all of the boxes that
apply.
They are responsible for writing programming
code.
They are usually strong problem-solvers.
They spend most of their work hours running
experiments in a laboratory.
They must hold advanced degrees in
computer science.
Answer:
Option A - They are responsible for writing programming
Option B - They are usually strong problem-solvers
Explanation:
A software engineer needs to be a strong problem solver and he/she must be able to write program/code. He/She is not required to conduct experiments in labs and also it is not essential for them to hold masters degree as even the non computer science or IT background people are working as software engineer.
Hence, both option A and B are correct
Answer:
A & B
Explanation:
31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure
Answer:
31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;
a) Something the individual knows;
The Personal Identification Number (PIN)
The password to an account
Answer to a (complete) set of questions
b) Something the individual possesses
An ATM card
A SIM card
Other examples includes;
Physical keys to a lock
Smart cards
Electronic Key-Card used for physical entrance into an apartment
c) Something the individual is (Static biometrics)
The fingerprint
Face recognition
Retina recognition
d) Something the individual does (dynamic biometrics);
Recognition of typing rhythm
Characteristics of the users handwriting
Voice pattern recognition
32) a) Specific account attack
A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password
Countermeasure;
Limiting the number of password guesses
The use of strong passwords having over 8 characters that includes special characters
Use of multi-factor authentication
b) Workstation Hijacking
The attacker takes advantage of an logged-in unattended workstation
Countermeasure;
The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device
c) Password Guessing
Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password
Countermeasure;
The use of a two or more of authentication method also known as a multi-factor authentication MFA
Explanation:
PLS HELP ME I NEED HELP WILL GIVE BRAINLIEST
I GOT A 65% LAST TIME AND IM DOING RETAKE! PLEASE DONT FAIL ME THIS TIME
which information will help you figure out how often your website should be updated
a. cost of updates
b. time for updates
c. visitor frequency
d. resources to update it
Answer:
Explanation: c vecause am pro
When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Response email C. Business card D. Calender
The contrast ratio of blue 80 text on a yellow-10 background is __ to 1.
80
8
70
4
Answer:
The Answer is 8...
Explanation:
Answer:
8
Explanation:
80/10= 8
Edhesive 9.1 lesson practice answers
Answer:
1. False
2. Rows and columns
3. Grid
Explanation: Bam
A local pharmacy added a new regulation about wearing gloves when in contact with any drug. It also bought a new insurance policy. The pharmacy then replaced the pill counting machine that was incorrectly dispensing medications. Which best explains the actions the pharmacy has taken to promote safety?
Wearing gloves reduces risk, the insurance policy shares the risk, and the new machine is a quality-improvement strategy that will reduce the probability of errors.
Wearing gloves shares the risk, the insurance policy reduces the risk, and the new machine is a quality-improvement strategy that will reduce the negative effects of errors.
Wearing gloves shares the risk, the insurance policy reduces the risk, and the new machine is a quality-improvement strategy that will reduce the probability of errors.
Wearing gloves reduces risk, the insurance policy shares the risk, and the new machine is a quality-improvement strategy that will reduce the negative effects of errors.
Answer:
First option.
Wearing gloves reduces risk.
The insurance policy shares the risk.
The new machine is a quality improvement strategy that will reduce the probability of errors.
Which best describes how a supporting database will be structured?
data operations
Data systems
data functionalities
Data modeling
Answer:
DATE SYSTEMS
Explanation:
DATA SYSTEMS
SO SORRY IF IM WRONG
Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming
Answer:
its D
Explanation:
ive done this before i remeber i got d
Help! I don’t know what this is.
Answer:
Best: Option 4
Worst: Option 1
Explanation:
The co-worker might be oblivious to the detrimental effect of his actions on work atmosphere. Talking to him and telling him to stop is the first step to improve this.
Option 2 is not as effective, as the co-worker would not know the reason and might just talk behind people's backs to other people, thus no actual progress would be made, except less communication overall.
Option 3 is likely to antagonize people, with the engineers being unhappy about your co-worker, and the co-worker being mad at you for telling on him. This option is the most likely to end up with someone leaving the job.
Option 1 is just expanding the circle of bad behavior, hence probably the worst possible.
Ummmm pls helppp
Which are the features of conditional formatting?
Conditional formatting enables you to_______
and_______
Answer:
A conditional format changes the appearance of cells on the basis of conditions that you specify.
Explanation:
If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates to True or False).
The process of editing includes which of the following?
(A) Transferring photos to a computer
(B) Combining media
(C) Naming Files
(D) Keeping files secure
will give brainliest
The height or amplitude of a wave is related to the input of ________
a. energy
b.matter
c.energy and matter
Answer:
a. energy
Explanation:
The higher the amplitude, the higher the energy. To summarise, waves carry energy. The amount of energy they carry is related to their frequency and their amplitude. The higher the frequency, the more energy, and the higher the amplitude, the more energy.
Hope this helped!!!
the basics of color theory assume what central tenets
What file format would be required a coworker need to edit a layer in a photoshop file 
-png
-psd
-pdf
-jpeg
C++
Assume the existence of a Window class with integer data members width and height. Overload the << operator for the Window class-- i.e., write a nonmember ostream-returning function that accepts a reference to an ostream object and a constant reference to a Window object and sends the following to the ostream: 'a (width x height) window' (without the quotes and with width and height replaced by the actual width and height of the window. Thus for example, if the window had width=80 and height=20, << would send 'a (80 x 20) window' to the ostream object.) Don't forget to have the function return the proper value as well. Assume the operator has been declared a friend in the Window class.
Answer:
Following are the code to the given question:
#include <iostream>//header file
using namespace std;
class Window //defining a class Window
{
private:
int width, height;//defining integer variable
public:
friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters
{
return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values
}
Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters
{}
};
int main() //Main method
{
Window w(80,90);//calling class constructor
cout<<w;//print object value
return 0;
}
Output:
a (80 x 90) window
Explanation:
In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.
Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.
) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message and prompt again for a valid data point. If entry has no comma Output: Error: No comma in string. (1 pt) If entry has more than one comma Output: Error: Too many commas in input. (1 pt) If entry after the comma is not an integer Output: Error: Comma not followed by an integer. (2 pts)
Answer:
In Python:
entry = input("Sentence: ")
while True:
if entry.count(",") == 0:
print("Error: No comma in string")
entry = input("Sentence: ")
elif entry.count(",") > 1:
print("Error: Too many comma in input")
entry = input("Sentence: ")
else:
ind = entry.index(',')+1
if entry[ind].isnumeric() == False:
print("Comma not followed by an integer")
entry = input("Sentence: ")
else:
break
print("Valid Input")
Explanation:
This prompts the user for a sentence
entry = input("Sentence: ")
The following loop is repeated until the user enters a valid entry
while True:
This is executed if the number of commas is 0
if entry.count(",") == 0:
print("Error: No comma in string")
entry = input("Sentence: ")
This is executed if the number of commas is more than 1
elif entry.count(",") > 1:
print("Error: Too many comma in input")
entry = input("Sentence: ")
This is executed if the number of commas is 1
else:
This calculates the next index after the comma
ind = entry.index(',')+1
This checks if the character after the comma is a number
if entry[ind].isnumeric() == False:
If it is not a number, the print statement is executed
print("Comma not followed by an integer")
entry = input("Sentence: ")
If otherwise, the loop is exited
else:
break
This prints valid input, when the user enters a valid string
print("Valid Input")
Note that: entry = input("Sentence: ") is used to get input
you would use conditional formatting on a cell when you want to _____
Answer:
to format a cell based on the value in it
Explanation:
you would use conditional formatting on a cell when you want to format a cell based on the value in it.
Reason -
Conditional formatting allows you to format a cell based on the value in it.
For example, if you want to highlight all the cells where the value is less than 30 with a red color, you can do that with conditional formatting.
How would you highlight cells with negative values in it?You can use conditional formatting.
Which statements accurately describe the Outlook interface? Check all that apply.
Two main elements are items and folders.
The content pane contains a list of items to be viewed in the reading pane.
The ribbon contains a list of tabs and menu items.
Command groups are located in the folder pane.
The main Outlook menu has a ribbon tab with default commands.
File, Home, Send/Receive, Folder, and View are commands on the main ribbon tab.
Answer:
send receive
Explanation: it gives and takes
Answer:
Explanation: EDGE2021
The Find and _______ commands allow you to easily locate and replace text. Bookmarks allow you to easily navigate to other parts of a document while _______ allow you to easily navigate to places within or outside the document. Use the _______ _______ to find out if your document contains personal information and comments. If the person receiving your document has a pre-2010 version of Microsoft Word, it makes sense to use the _______ _______. To make sure your document can be read by devices for the visually impaired, run the _______ _______.
Answer:
(a): Replace
(b): Hyperlinks
(c): Document Inspector
(d): Compatibility checker
(e): Accessibility checker
Explanation:
You will get the brief explanation of what each of the answers in the answer section does, when you complete the blanks with the answers.
However, further explanation is as follows;
(a): The find and replace tool or command allows the user to quickly replace a certain character or word or group of words with another character or word or group of words.
(b): Hyperlinks are used to link to a new document entirely or a point in the current document. Hyperlinks in Microsoft Office Word, are often in blue, and they are always double underlined.
(c): Document inspector checks hidden data such as personal information.
(d): Compatibility checker checks if a Word document is compatible with a previous edition of Microsoft Office Word.
(e): Accessibility checker checks if the people living with disabilities can use the Word document without issues.
The correct answer for each of the blanks in the given paragraph about commands and tools in computer are;
REPLACEHYPERLINKSDOCUMENT INSPECTOR COMPATIBILITY CHECKERACCESSIBILITY CHECKERA) The commands that allows the user to quickly locate and replace a text are called find and replace commands because they are used to replace a certain character or text or group of texts with another.
B) The means by which you are allowed to easily navigate to places within or outside the document is called Hyperlinks. This is because that are used to give us a link to a new document or a related one outside of the current document.
C) The tool used to find out if your document contains personal information and comments is called Document inspector. This is because it aids in checking personal information and other hidden data information.
D) The tool to use if the person receiving your document has a pre-2010 version of Microsoft Word, is called Compatibility checker. This is because a compatibility checker would help to find out if a particular Word document is compatible with a previous version of Microsoft Word.
E) The tool to run to make sure your document can be read by devices for the visually impaired is called Accessibility checker as it has inbuilt codes to assist in checking if the document can be effectively utilized by people living with disabilities.
Read more about tools and commands in Microsoft Word at; https://brainly.com/question/1323179