which one of the following is not hardware​

Answers

Answer 1
Firewall is not hardware. It is only software.
Answer 2

Answer:

There r no options

Explanation:

I think the application r not the hardware.


Related Questions

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

when do we use SAVE and SAVE AS in saving artwork in adobe illustrator?
PLEASE HELP ASAP

Answers

Answer:

to save in different format

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says

please answer me fast​

Answers

Answer:

microsoft

Explanation:

this may help u

Answer:

Microsoft

because its a 2013 worldwide partner conference and Microsoft server operations

In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between different ideas is called
A. SmartArt
B. WordArt
C. Clip Art
D. Number Art

Answers

Answer:

A. SmartArt

Explanation:

SmartArt is a graphical tool used to visually communicate information.

If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the ____________________.

Answers

Answer:

attack vector

Explanation:

If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the attackvector.

When an application has multiple uses what is it known as?
A. Minimum Features
B. Full Featured
C. Limited Features
D. Maximum Features

Answers

B.Full featured application

Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time

Answers

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Answers

Answer:

"Private" is the right solution.

Explanation:

Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails


Write a short note on Computer
impact on
our society?​

Answers

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

Answer:

Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.

Explanation:

Positive Impact of Computer:-

The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.

Negative Impact of Computer:-

Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen

Answers

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

Which is the most viewed vdo in YT ever?​

Answers

“Baby Shark Dance” by Pinkfong Kids' Songs & Stories (8.44bn views)
“Despacito” by Luis Fonsi, featuring Daddy Yankee (7.32bn views) ...
“Shape of You” by Ed Sheeran (5.29bn views) ...
“Johny Johny Yes Papa” by LooLoo Kids (5.24bn views) ...

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Answers

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

Popular mixed drinks such as margaritas

contain more alcohol than a standard drink.

A. will

B. do not necessarily

O C. never

Drugs

the chemistry of the brain and the way that a person thinks.

A. change

B. don't change

C. trick

Highway Safety Administration

Answers

Answer:

C.never and A.change that's what I think

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

Write the definition of a public class Simple. The class has no constructors, methods or instance variables.

Answers

Answer:

public class Simple{}

Explanation:

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Answers

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

Answer please in order

Answers

Answer:

analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.

Explanation:

Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.

Generally, it travels faster through solids than it does through either liquids or gases.

Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit

Answers

Answer:

total = 0

for i = 1 to 7

input temp

temp = temp * 1.8 + 32

total + = temp

average = total/7

print average

Explanation:

[Initialize total to 0]

total = 0

[Iterate from 1 to 7]

for i = 1 to 7

[Get input for temperature]

input temp

[Convert to degree Fahrenheit]

temp = temp * 1.8 + 32

[Calculate total]

total + = temp

[Calculate average]

average = total/7

[Print average]

print average

When power is completely removed from your computer

Answers

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

True or False? Using your traffic analytics report, you can see the source of traffic to your website

Answers

Answer:

True

Explanation:

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files

Answers

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

Other Questions
A study of homeowners in the 5th congressional district in Maryland found that their annual household incomes are normally distributed with a mean of $41,182 and a standard deviation of $11,990 (based on data from Nielsen Media Research). If an advertising campaign is to be targeted at those whose household incomes are in the top 20%, find the minimum income level for this target group. Look at the diagram. Which angle is supplementary to 1.) 2.)3.)4.) Christian and Tanae both leave Disneyland at the same time. Christian travels north at 65 mph. Tanae travels south at 55 mph. How long will it take them to be 540 miles apart? Which of the following equations would you use to solve this word problem? 65t + 55(t 1) = 540. 65t + 55t = 540. 65t + 55(t + 1) = 540. None of these choices are correct. A membrane consisting only of phospholipids undergoes a sharp transition from the crystalline form to the fluid form as it is heated. What would be the effect on this transition in a membrane containing 80% phospholipid and 20% cholesterol According to psychologist Ivan Steiner, team productivity peaks at about _____ team members. People become less motivated and group coordination becomes more difficult after that size. Which of the following is not true regarding the flow of information from the adjusted trial balance on the end-of-period spreadsheet? What is the value of W?5 units7 units 14 units 15 units given that O is the center of the circle, find the measure of angle BAC of arc DC = 120 Which structure is represented by the letter C?Choose 1 answer:AChloroplastBMitochondriaCVacuoleDNucleus What tone does Martin Luther King, Jr. create through his choice of words inthe following portion of his Nobel Prize acceptance speech?After contemplation, I conclude that this award whichreceive on behalf of that movement is a profoundrecognition that nonviolence is the answer to the crucialpolitical and moral question of our time - the need forman to overcome oppression and violence withoutresorting to violence and oppression. Civilization andviolence are antithetical concepts. Negroes of the UnitedStates, following the people of India, have demonstratedthat nonviolence is not sterile passivity, but a powerfulmoral force which makes for social transformation. Sooneror later all the people of the world will have to discover away to live together in peace, and thereby transform thispending cosmic elegy into a creative psalm ofbrotherhood. If this is to be achieved, man must evolve forall human conflict a method which rejects revenge,aggression and retaliation. The foundation of such amethod is loveO A. AngryO B. PowerfulOC. HopefulO D. Concerned which type of approach to manufacturing tries to anticipate customer demand when deciding how much to produce and when A shipment of 50 precision parts including 4 that are defective is sent to an assembly plant. The quality control division selects 10 at random for testing and rejects the entire shipment if 1 or more are found defective. What is the probability this shipment passes inspection? Standard deviation refers to theA. statistics used to organize, summarize, and describe sample data. value within a given set of data in its original formC. average distance between variable scores and the mean in a set of dataD difference between the largest and smallest variable scores in a set of data Who was the French military leader in North America during the French and Indian War? A. a highly respected Iroquois tribal chief B. General Edward BraddockC. Colonel George WashingtonD. General Louis de Montcalm Suppose most people regard emeralds, rubies, and sapphires as close substitutes for diamonds. Then DeBeers, a large diamond company, has a. less incentive to advertise than it would otherwise have. b. more control over the price of diamonds than it would otherwise have. c. less market power than it would otherwise have. d. higher profits than it would otherwise have. write a paragraph of godawari Nepal Carin opened a money market account with a deposit of $3,000. This account earns 2% simple interest annually. How many years will it take for her $3,000 deposit to earn $430 in interest, assuming she does not withdraw any of the money? Find the area of the geometric figure.3 yd3 ydTraperoid7 yd what force to be required to accelerate a car of mass 120 kg from 5 m/s to 25m/s in 2s The following is a list of costs that were incurred in producing book:a. Insurance on the factory building and equipmentb. Salary of the vice president of financec. Hourly wages of printing press operators during productiond. Electricity used to run the presses during the printing of the Book.e. Sales commissions paid to book representatives for each book soldf. Paper on which the text is printedg. Book covers used to bind the pagesh. Straight-line depreciation on an office buildingi. Salaries of staff used to develop artwork for the textj. Glue used to bind pages to coverInstructions: With respect to the manufacture and sale of this text, classify each cost as either a product cost or aperiod cost. Indicate whether each product cost is a direct materials cost, a direct labor cost, or a factory overheadcost. Indicate whether each period cost is a selling expense or an administrative expense.