Answer: Configure port security on the switch
Explanation:
Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.
When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.
which of the following combinations of keys is used as a short for saving a document on a computer
ctrl+s
is used to save
Hope this helped
-scav
what is the answer???
Answer:
I think it should be C
Explanation:
A group of two or more computers that are link together.
To register your content with the US Copyright Office, visit copyright.gov to get started. Online
registration usually costs between _____ and _____, and you'll have to send a copy of your completed
work to the U.S. Copyright Office either through the mail or via its website. Once your work is
registered, it will be added to the Library of Congress.
$35 and $55
O $25 and $65
O $15 and $35
O $85 and $105
Answer:
$35 and $55
Explanation:
Online registration usually costs between $35 and $55 , and you'll have to send a copy of your completed work to the U.S. Copyright Office either through the mail or via its website. The correct option is 1.
What is Copyright?Copyright is a legal concept that grants creators of original works, such as literary, artistic, musical, and other types of intellectual works, exclusive rights.
These rights give the creators the ability to control how their works are used, distributed, and reproduced, as well as receive monetary compensation for their use.
Depending on the type of work and the filing option selected, online registration with the United States Copyright Office typically costs between $35 and $55 for a single work.
It should be noted that these fees are subject to change, and that additional fees may apply for specific services such as expedited processing or special handling.
Thus, the correct option is 1.
For more details regarding copyright, visit:
https://brainly.com/question/22399852
#SPJ6
Your question seems incomplete, the probable complete question is:
To register your content with the US Copyright Office, visit copyright.gov to get started. Online
registration usually costs between _____ and _____, and you'll have to send a copy of your completed
work to the U.S. Copyright Office either through the mail or via its website. Once your work is
registered, it will be added to the Library of Congress.
$35 and $55$25 and $65$15 and $35$85 and $105Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal information manager V. proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available
Answer:
A. Personal information manager.
B. Web-based.
C. Project management.
D. Proprietary.
E. Open source.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into the following categories;
A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.
B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.
C. Project management: software used to track tasks and coordinate resources.
D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.
E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.
Following is the matched solution for the given question.
I. Web-based - B. software that is hosted on a websiteII. Open source - E. software code that is freely availableIII. Project management - C. software used to track tasks and coordinate resourcesIV. Personal information manager - A. software used to keep track of appointmentsV. Proprietary - D. software which must be purchased.I. Web-based software refers to applications or programs that are accessed and used through a web browser. Instead of being installed on individual computers, the software is hosted on a server and accessed remotely over the internet.
II. Open source software refers to software whose source code is made available to the public. It can be freely used, modified, and distributed by anyone.
III. Project management software is designed to help teams and individuals manage projects efficiently. It assists in planning, organizing, and tracking tasks, resources, and timelines.
IV. Personal information manager (PIM) software is used to organize personal information such as appointments, contacts, notes, and tasks. It helps individuals manage their schedules, track important dates, and maintain personal productivity.
V. Proprietary software refers to software that is privately owned and controlled by a company or individual. It is typically distributed under licensing agreements, and users must purchase or obtain the necessary licenses to use the software.
Learn more about web-based software here:
brainly.com/question/4560046
#SPJ6
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application
Answer:
The options for running a Windows 7 application on Windows 10 are;
1) Run the compatibility troubleshooter
2) Reinstall the app
Explanation:
The most recent version of Windows 10 supports the majority of applications made for versions of Windows before Windows 10, however, in the event that an application does not run on Windows 10 the options available for running the application are;
1) Run the compatibility troubleshooter as follows;
a) Type the application's name in the tax bar search box
b) In the menu showing the application that comes up, right click on the application's name and select the "Open file location option" from among the options menu
c) In the file location, locate and right click the program file which is the .EXE file and select "Properties" from the options menu. In the Properties dialogue box, select the "Compatibility mode"
d) In the "Compatibility mode" tab, select "Run compatibility troubleshooter"
2) Reinstall the app
a) With the app not yet installed on Windows, in the setup files location of the application, right-click the setup .MSI or .EXE application file
b) In the options menu select "Properties" and then the "Compatibility" tab in the "Properties" dialog box
c) On the Compatibility tab select the "Run this program in compatibility mode for" checkbox and select Windows 7 as your desired Windows
d) Click Ok.
what is a soft ware?
Software is a collection of instructions and data that tell a computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, including programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.
Answer:
it is like some data
Explanation:
Describe at least three of the characteristics that project managers look for in project participants and explain why you think they are important
Answer:
1. Knowledge of Project Management Principles: A project participant should have the required knowledge of how project management works and how to function well in a team to achieve a common goal.
2. Time management skills: Despite the fact that it might be teamwork, the effectiveness of each individual is key. Every team member should be able to meet deadlines so as not to burden the team when they are given an individual task.
3. Excellent Communicator: A project participant should be able to communicate well with other team members, the project manager, different audiences, even customers and potential customers. Any weakness in communication skills could affect the project generally.
why you think they are important
1. Having knowledge of project management principles would lessen work and save time for the project manager and other team members as the project participant would have an idea per time of what to do.
2. A project participant that can manage time would generally increase the efficiency of the company, help the company meet deadlines, help the team meet targets.
3. Any weakness in communication skills could affect the project generally.
1. Atestharnessprogramfortestingsortingmethodsisprovidedwiththeprogram iles.ItisintheileSorts.javainthech11.sortspackage.Theprogramincludes aswapmethodthatisusedbyallofthesortingmethodstoswaparrayelements. a. Describeanapproachtomodifyingtheprogramsothataftercallingasorting methodtheprogramprintsoutthenumberofswapsneededbythesorting method. b. Implementyourapproach. c. TestyournewprogrambyrunningtheselectionSortmethod.Yourprogram shouldreport49swaps.
Answer:
Following are the code to this question:
//import package
import java.util.*;
import java.text.*;
public class Main//defining a class
{
static final int t = 50;//defining an integer constant variable
static int[] ele = new int[t];//defining an array
static int tS = 0;//defining integer variable
static void initelements()//defining a static method
{
Random r= new Random();//creating Random class Object
for (int i = 0; i < t; i++)//use loop to add value in array
ele[i] = Math.abs(r.nextInt()) % 100;//add value in array
}
static public boolean isSorted()//defining a method isSorted
{
boolean x = true;//defining boolean variable
for (int i = 0; i < (t - 1); i++)//use for loop to count array values
if (ele[i] > ele[i + 1])//use if to compare array values
x = false;//use boolean variable to hold false value
return x;//return boolean value
}
static public void swap(int x1, int x2)//defining swap method
{
tS++;//increment variable value by 1
//performing swapping
int te = ele[x1];//defining te variable that holds array values
ele[x1] = ele[x2];//exchanging array values
ele[x2] = te;//holding te values
}
static public void disp()//defining a method disp
{
int v1;
DecimalFormat f = new DecimalFormat("00");//creating DecimalFormat class Object
System.out.println("The elements array is:");//print message
for (int i = 0; i <t; i++)//defining for loop
{
v1 = ele[i];//holding array value in v1 variable
if (((i + 1) % 10) == 0)//use if to check i value
System.out.println(f.format(v1));//print value
else//else block
System.out.print(f.format(v1) + " ");//print value
}
System.out.println();//print space
}
static int getMinimum(int st, int en)//defining a method getMinimum
{
int iMi = st;//defining variable that holds parameter value
for (int i = st + 1; i <= en; i++)//use for loop compare array value
if (ele[i] < ele[iMi])//compare array value
iMi = i;//use iMi to hold loop value
return iMi;//return iMi value
}
static void selectionSort()//defining a selectionSort method
{
int e = t - 1;//defining e variable that holds total array count value
for (int i = 0; i < e; i++)//use for loop to call swap method
swap(i, getMinimum(i, e));//calling the swap method
}
public static void main(String[] args)//defining main method
{
initelements();//calling initelements method
disp();//calling disp method
System.out.println("elements is sorted: " + isSorted());//calling is isSorted method with the message
System.out.println();//for space
selectionSort();//calling selectionSort method
System.out.println("No of swaps :" + tS);//print totalswap value with the message
disp();//calling disp method
System.out.println("elements is sorted: " + isSorted());//calling is isSorted method with the message
System.out.println();//for space
}
}
Output:
Please find the attached file.
Explanation:
In this code inside the Main class, 5 static methods "initelements, isSorted, swap, disp, getMinimum and selectionSort" is declared, in which the first method holds random values in arrays, in second array it sorts its values, in the third method it swap the array, in the disp method it shows array values.
In the "getMinimum and selectionSort" it sorts array values and inside the main method, it calls all methods and prints their values.
Which option should have the strongest influence on your choice of system software for your computer?
compatibility of applications software
aesthetics
your friends' opinions
popularity
images that are made up of pixels and cannot be resized without losing quality?
Answer:
there are no known pictures that can be zoomed in and not lose quality. they will all be pixelized. mostly everything on a computer is made of pixels.
Explanation:
hope this helps!
~evita
in ICT what is the difference between Save and Save As
Answer:
Save updates the files that are already created.
Save as creates a new file or store the existing file in a new location.
PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS ALSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)
Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *
Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.
Software used for professional print publications such as posters, books, and email newsletters is called a: *
Professional software
Word processing software
Desktop program
Desktop publishing software
Which of the following criteria does NOT determine the credibility of a source? *
How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author
The process of finding a solution to a difficult or complex issue to make it easier is known as *
problem
problem-solving
input
A series of actions taken in order to solve a particular problem is known as the____________ *
process
problem
input
output
A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *
problem
output
algorithm
input
Which is the third step in the problem-solving process? *
Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem
A list of sources you used when writing a scholarly article on a specific subject is known as a: *
intellectual-property
credibility
bibliography
trademark
Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter
Which of the following is NOT a writing style format for academic purposes? *
Times New Roman
American Psychological Association
Modern Language Association
The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *
plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *
SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.
say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.
Answer:
finding a suitable solution for issue can be accomplished by following the basic four-step problem solving process and methodology outlined.
A radio and communications security repairer is responsible for both radio and satellite communication systems.
True
False
Answer:
The answer is true
Explanation:
I got it correct on the quiz
top secret mission lolz
Answer:
whats the mission about??
Explanation:
~evita
PLEASE HELP WILL GIVE BRAINLIEST
Answer:
Explanation: answer is b) the row comes first in the element of an index
can someone help me in my IT (information technology) homework
I am in 9th class and i will send the questions
Answer is. Communication peed / time – money can be saved because it’s much quicker to move information around. With the help of ICT it has become quicker and more efficient. As Advantage And Disavantages is Privacy - Though information technology may have made communication quicker, easier, and more convenient, it has also brought along privacy issues. From cell phone signal interceptions to e-mail hacking, people are now worried about their once private information becoming public knowledge.
Three types of common program errors are syntax, runtime, and logic. (5 points)
O True
O False
Answer:
True
Explanation:
What does a computer program use as a means to evaluate a condition as True or False?
Answer:
true
Explanation:
Answer:
A Boolean expression.
Explanation:
A Boolean expression is a logical statement that is either TRUE or FALSE . Boolean expressions can compare data of any type as long as both parts of the expression have the same basic data type.
9.6 Code practice Edhesive
Answer:
N = [1,1,1,1,1],
[2,2,2,2,2],
[3,3,3,3,3],
[4,4,4,4,4]
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N=[]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
Explanation:
I got 100%.
In this exercise we have to use the knowledge of computational language in python to write the code.
We have the code in the attached image.
The code in python can be found as:
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N = [1,1,1,1,1], [2,2,2,2,2], [3,3,3,3,3], [4,4,4,4,4]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
See more about python at brainly.com/question/26104476
Use the drop-down menus to match each description with the part of a report where it is located.
named moons in the solar system:
page number printed at the bottom of page 1:
page number printed at the bottom of page 20:
group of data titled “Hawks” in a report on species of migrating birds:
report titled “Technology in the Workplace”:
calculation printed beneath a group of data:
date of a report printed at the top of pages 2–100:
Answer:
1) Detail
2) Report footer
3) Page footer
4) Group Header
5) Report header
6) Group footer
7) Page header
Explanation:
I just did the assignment
test unit 8 edhesive answers
Match each operating system drawback to its respective operating system.
1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System
Answer:
Microsoft Windows - More susceptible to viruses
Linux - Limited support system
Apple - Fewer compatible applications
Explanation:
Generally windows is more susceptible to viruses.
Linux is open source meaning it's up to the community to help you.
Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.
Answer:
1. Microsoft Windows is more susceptible to viruses
2. Mac OS X (Apple OS) has fewer compatible applications
3. Linux OS has a limited support system.
Which print preview of your slide show includes a notes section for your audience?
Answer:
I would say the one on the left side, have a good day! :)
Explanation:
I hope this helps! :)
Write down a scratch program which:
performs the following tasks 5 times:
1. asks the user to input numbers
2. add the numbers in total variable
3. outputs the result
You read an article about someone who leaves USB sticks in college libraries so that people will pick them up, insert them into their laptops, and download malware. This is an example of:
phishing.
eavesdropping.
wiretapping.
social engineering.
Answer:
social engineering
Explanation:
The above scenario of USB use is an example of social engineering.
What is Social Engineering?This is known to be when a person gets phishing email via any method known as social engineering.
Conclusively, Social Engineering is a term that connote non-technical intrusion that depends on human linkage and it I one where a person is been tricked into breaking normal security means. It often makes use of USB drive for its purpose.
Learn more about social engineering from
https://brainly.com/question/26072214
Match the roles to the task they perform.
gather requirements
create software framework
identify errors in the software
develop program code for software
Role
software architects
business analysts
programmers
testers
Software Architects: “develop program code for software”
Business Analysts: “gather requirements”
Programmers: “create software framework”
Testers: “identify errors in the software”
David plays racing games on his way to work. He uses the analog stick to navigate his vehicle through other artificial intelligence-controlled
opponents. On what platform is he playing the game?
A.console
В.personal computer
C.mobile
D.handheld
Answer: David is most likely playing on Handheld.
Explanation: You can infer that he is playing on a handheld due to the fact that he is playing this game on his way to work, and the fact that he is controlling the game using an analog stick. Because of this, you can assume that what he is playing on needs to be portable, making it likely he is using a handheld.
Answer:
d - handheld
Explanation:
PLATO
What is one difference between low- and high-level programming languages? (5 points)
O a
Ob
Low-level programming languages are challenging for humans to read, while high-level programming languages are easier.
Low-level programming languages are more human-friendly, while high-level programming languages are more challenging for
humans to understand.
Ос
Low-level programming languages require interpreters and compilers, while high-level programming languages do not.
Od
Low-level programming languages use program code to communicate with computers, while high-level programming languages
use machine code.
Answer: Low-level programming languages are computer code at its most basic. They are difficult or sometimes impossible for humans to read, while high-level languages are designed to be easy for humans to understand. I believe the answer is A.
Answer:
Low-level programming languages require interpreters and compilers, while high-level programming languages do not.
Explanation: I AM SURE IT IS CORRECT 100% CORRECT
Arranging a given set of data in ascending or descending order is ...................
Explanation:
maybe it's answer is sorting
Suppose cell C5 contains the formula =B$6+C1.
Match each formula with its respective cell if you copied it.
=A$6+B4 =B$6+C6 =C$6+D2 =D$6+E1
Thank you, have a great week.
Answer:
=A$6+B4 will be in B8
=B$6+C6 will be in C10
=C$6+D2 will be in D6
=D$6+E1 will be in E5
Explanation:
$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.
As formulars are copied, the references change respectively.
With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.
As we move left and right, the column alphabet will also experience change like the rows did.
Only the absolute reference won't change no matter the direction.
Hence,
=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8
=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10
=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6
=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5