An ISP (Internet service provider) or web hosting firm that provides Internet-based services is known as a web-based provider. The correct option is C.
What are web-based providers?An ISP (Internet service provider) or web hosting firm that provides Internet-based services is known as a web-based provider.
The free web-based providers are so popular because You can access your email account from anywhere as long as you have an internet connection.
Hence, the correct option is C.
Learn more about Web-based providers:
https://brainly.com/question/27960242
#SPJ2
Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variable names, and lowercase for constants and functions c. lowercase for variable names and constants, and uppercase for functions d. uppercase for variable names and constants, and lowercase for functions
Answer:
b) uppercase for variable names, and lowercase for constants and functions
Explanation:
Given
Programming language: prolog
Required
The case type for variables, constants and functions
In prolog,
Variable names begin with uppercase
e.g. Name, NAME
While constants and functions begin with lowercase
e.g. name, addnumbers()
Hence, (b) is correct
who is the father of computer
Answer:
Charles Babbage is the father of computer
Explanation:
Charles Babbage is know as father of computer.
hope this help!
Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch
Answer:
The program in Python is as follows:
TotalCost = int(input("Total cost: "))
if TotalCost <= 2000:
print("Wall Clock")
elif TotalCost >= 2001 and TotalCost <= 5000:
print("School Bag")
elif TotalCost >= 5001 and TotalCost <= 10000:
print("Electric Iron")
else:
print("Wrist Watch")
Explanation:
This gets input for total cost
TotalCost = int(input("Total cost: "))
If the total cost is up to 2000, print wall clock as the assured gift
if TotalCost <= 2000:
print("Wall Clock")
If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift
elif TotalCost >= 2001 and TotalCost <= 5000:
print("School Bag")
If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift
elif TotalCost >= 5001 and TotalCost <= 10000:
print("Electric Iron")
If the total cost is more than 10000, print wrist watch as the assured gift
else:
print("Wrist Watch")
write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update.
Answer:
A) software
B)assembler
C)operating system
D)system software
E)data base
F)software license
G)machine code
H)ONLINE shopping apps
Câu 1: Đất trồng là môi trường?
A. Cung cấp chất dinh dưỡng, ôxy
B. Giúp cây đứng vững
C. Cung cấp chất dinh dưỡng, ôxy, nước
D. Câu B và C
Answer:
D
Explanation:
Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?
Answer:
Platform as a Service (PaaS).
Explanation:
Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Basically, cloud computing comprises three (3) service models and these include;
1. Platform as a Service (PaaS).
2. Software as a Service (SaaS).
3. Infrastructure as a Service (IaaS).
Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.
The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.
Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).
Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.
These are the different types of Platform as a Service;
1. Private PaaS.
2. Public PaaS.
3. Open PaaS.
4. Mobile PaaS.
5. Communications PaaS.
6. Hybrid PaaS.
In this scenario, the type of service Don's company signed up for is called Platform as a Service (PaaS).
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations
Answer:
This is a pretty obvious answer.
An unwanted e-mail sent in bulk from people or organizations.
Explanation:
You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do
Answer:
Implement BitLocker with a TPM
Explanation:
In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.
Basically, there are two (2) main types of memory;
A. Read only memory (ROM).
B. Random access memory (RAM).
In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.
Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.
In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.
Software that tries to monitor and track the way you use your computer.
Explanation:
that's called a virus, and it can do much harm to your softwares
From a dictionary, the literal meaning of virus is "a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data." Therfore, the answer is clearly virus.
Hope this helps! Have a great day!
array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.
user_in = str ( input ("Please enter a phrase: " ))
def reverse_str (string):
e = 0
for e in range (len (string)):
x = -1
print string[x]
x += (len (string))
An end-user license agreement protects _____.
End User License Agreements are important for protecting the rights of the business owner/licensor and critical for setting the rules of use and managing the expectations of the end-user.
Answer: both the owner and the purchaser of the software
Explanation:
whats the recommended amount of dedodated wam
i can have in a server
Computers work on the garbage-in, garbage-out concept. Comment
what is computer virus?
Answer:
A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
Answer:
A computer virus is a software program that can generate multiple copies of itself. Computer viruses are categorized by their infection targets.They are of the following types :-
boot sector virusesfile virusesUtility software as a service giving programs. Explain. Give me the answer please coming Sunday my homework will be check.
Answer:
Explanation:
Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.
PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!
can someone help me please?
Answer:
see below picture
Explanation:
You can work your way through the formula from the inside out, mapping every operation to a gate.
Name of the best Android keyboard
Pls I need it asap!! For educational purpose
I need your Ideologies
I think Gboard is good, you can switch between languages quickly and you can translate in real time. Translation is not perfect, but it is the best translation available. Vocabulary and autocorrect is not bad too. You can change the background. It has some themes of its own, but you can always customise it with your own photo. It has instant gif, stickers and emoji options too. It also has a good collection of symbolic emojis like: *\0/*O_o(๑♡⌓♡๑)ᕙ( • ‿ • )ᕗ(☉。☉)!I cannot include all of them, they are in 100s.
But if you are looking for a solution for grammatical mistakes, then you may want to consider Grammarly.
[tex]\boxed{\underline{\bf \: ANSWER}}[/tex]
Well, just like the person before me has answered ; I prefer Gboard, a keyboard provided by Go.ogle over all the other options ones available while using android. As you can see in the attached picture, I use Gboard & have been using it for quite a lot of years now as well. Gboard provides smooth surface for typing & there's glide technology as well. There's an option to pin your clipboard (which I find really helpful) & tons of built-in emojis, emoticons (this feature is not available in many), GIFs & so on. Also you can customize your keyboard by changing themes (you can either select one of the many backgrounds they have or choose one you like; in my case I have a blue scenery clipart as my background which matches my phone's overall theme). You can also use Gboard if you prefer to text in more than 1 language (this feature is available in many other keyboards as well though).
Now moving on, I would suggest the Samsung Keyboard too (that is, of you are using Samsung gadgets). The only reason I prefer Gboard over this keyboard is because you can't customize Samsung Keyboard (you can only choose White/Dark mode). Also, emoticons aren't available.
Then at last, there's the Grammarly Keyboard. This keyboard is really good if you are looking for writing essays, paragraphs or speeches as it catches all your grammar errors. But at times, it can be a bit too much & the keyboard is not overall smooth to use (at least for me).
So there, these 3 are the best keyboards for Android users.
_____
Hope it helps.
RainbowSalt2222
Similarities between in line css and internal css
Answer:
inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.
Explanation:
queens
A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic investigation and discovered a host had been compromised. Malicious code was using DNS as a tunnel to extract data from the client machine, which had been leaked and transferred to an unsecure public Internet site. Which of the following BEST describes the attack?
A. Phishing
B. Pharming
C. Cache poisoning
D. Data exfiltration
Answer:
D. Data exfiltration
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.
The type of attack in this scenario is best described as data exfiltration.
Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.
Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.
list out the memory components used by different generation of computer
Answer:
here's your answer mate!
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...
1956 – 1963: Second Generation – Transistors. ...
1964 – 1971: Third Generation – Integrated Circuits. ...
1972 – 2010: Fourth Generation – Microprocessors.
Explanation:
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...
1956 – 1963: Second Generation – Transistors. ...
1964 – 1971: Third Generation – Integrated Circuits. ...
1972 – 2010: Fourth Generation – Microprocessors.
What are the 4 similarities of CUI and GUI
Answer:
letter U and I.
Three Letters
1 consonant and 2 vowel
All are capital letters
Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to the hard drive Go into short-term memory Go from volatile to nonvolatile memory
Answer:
Go into short-term memory
Explanation:
Data stored on physical storage devices must go into short-term memory before the processor can access it.
This is because, physical storage devices are secondary memory which store information for a long time. The CPU does not work directly with secondary memory but with primary or short term memory. Since the CPU works mainly with short term memory, information in physical storage or secondary memory has to go into short term memory for the CPU to be able to process it.
So, data stored on physical storage devices must go into short-term memory before the processor can access it.
List 10 different products made from timber
Answer:
Bath towels.
Toothpaste.
Nail polish.
Makeup.
Disinfecting wipes.
Medications.
Paints.
LCD screens.
Houses
Buildings
Explanation:
How computer is important in our life
Answer:
Computers are important in our lifes to keep us safe if theres a hurricane tornado or even a blizzard.
Another reason there important is so we can stay in contact with are family
and friends incase of an emergency.
Lastly there important because they can help us get to a place or destination
by using a gps.
Hope it helps✌✌
Answer:
computer is important because we can use it for playing games. watching videos listen music etcetera
The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.
Which of the following is the MOST likely reason the mouse isn't working?
A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.
Answer:the usb mouse receiver is not plugged into the computer
Explanation:
In the case above, one can say that the USB mouse receiver is not plugged into the computer.
What is a USB mouse?A USB mouse is known to be a tool that is often attaches to a computers USB port.
In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.
Learn more about USB mouse from
https://brainly.com/question/10847782
#SPJ9
A team of architects is designing a new AWS environment for a company which wants to migrate to the Cloud. The architects are considering the use of EC2 instances with instance store volumes. The architects realize that the data on the instance store volumes are ephemeral. Which action will not cause the data to be deleted on an instance store volume
Answer:reboot
Explanation:
can someone answer this? I'll mark u the brialintest!
pre convert single digits, or sometimes parts of a sum, then sum up. like this:
1.) 2³+2²+2^1+2^0 = 8+4+0+1 = 13
2.) 512 + 0 + 128 + 0 + 0 + 16 + 0 + 4 + 2 + 0 = 1010010110
you just need to know what the powers of two are, then you know how to convert numbers.
like 100 = 4 and 1 = 1 then 101 = 4 + 1 and in the other direction just take chunks of 5 until theres nothing left, but care not to overshoot the sum
5 = 2² + 0 + 2^1 = 101 in base2
the zeros are for the order, every time I would overshoot, it's a zero.
3.) 16 + 2 + 19 = 37
4.) 8² is 64, or (100)base8
8³ or 1000 would already overshoot, so let's see what we can do with the smaller value of a digit in base8, 8² = 64
we can 8 different digits (0 to 7) in base8
7x8^2 + 2*8^1 + 5*8^0
448 + 16 + 5
= (725)base8
very low battery right now. let me now if this already helps to grasp the concept. I'll come back later.
edit1: recharging my phone now. but I need to show quickly in order to get my own stuff done.
quick side note on topic: the number always stays the same, like if there would be a number of beans lying on the table. we justcrrorder them to write in another system. in normal base 10, 312 beans would be grouped intuitively in 3*100, 1*10 and 1*1
or: 3*10^2 + 1*10^1 + 2*10^0
note that something to the power of zero is always one (e.g.: 5^0 is like 5÷5)
Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.
Answer:
Lets us take k, m = 10, 40
q = 0
i = k
while i <= m:
if int(i*0.5)*2 == i:
q += 1
i += 1
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions
"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.
Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.
⇒ There are two kinds of Buffer overflow attacks such as:
Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.Thus we can say that the correct answer is a Buffer overflow.
Learn more about Buffer overflow here:
https://brainly.com/question/4952591
PLEASE ANSWER ASAP
Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].
Answer:
ENQUIRE database.
Explanation:
I am not sure but I guess this is the answer.