Answer:
Strategic Immersion
Explanation:
Strategic Immersioninvolves the player being intensely focused on winning the game and weighing all their actions in terms of maximizing their chances
You often travel away from the office. While traveling, you would like to use your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection do you need
Answer:
You will use a secure connection
Explanation:
You need VPN so that your IP cant be tracked which will help hackers to find you
A secured connection is a connection which is encrypted and secure the data from both the ends. A VPN (Virtual Private Network) is a secured connection.
What is Secured connection?A secured connection is a connection that is encrypted by one or more security protocols to ensure the data security which is flowing between two or more ends.
A secured connection can help someone from stealing or changing information that has been sent online. To create a secured connection, the device and website's server use an SSL protocol. SSL protocol is a set of encryption rules that both computers understand and keep the data secured.
VPN stands for "Virtual Private Network". It is used for the opportunity to establish a protected network connection when using public networks. VPNs encrypt the internet traffic and disguise online identity of an individual. This makes it more difficult for third parties to track the activities online and steal data of an individual.
Learn more about Secured connection here:
https://brainly.com/question/25556545
#SPJ2
what is an operating system that controls some aspects of the computer?
(not very well phrased, ik, it's coming from a crossword for one of my classes assigned as a snow day thing. looking for a seven letter word)
central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections.
Answer: Windows
Explanation:
examples of operating systems include
windows
mac
linux
windows has seven letters
How do you calculate the file size of a text file?
Answer:
It is calculated by multiplying the surface area of a document (height x width) to be scanned by the bit depth and the dpi2. Because image file size is represented in bytes, which are made up of 8 bits, divide this figure by 8.
___1. What is the first thing you should do if you received a package?
a. count the number of items c. accept it immediately then leave
b. check out the whole package d. check for the delivery receipt
________2. What should you do with the copy of your request for inspection?
a. return to the delivery man c. dispose it immediately
b. keep the copy of your request letter d. do not accept the letter
________3. What form is used to request for tools and equipment to be used for a
particular job written instruction to perform a work?
a. job order / order forms c. inventory of Materials forms
b. borrower’s forms d. purchase requisition
Daphne has determined that she has malware on her linux machine. She prefers to only use open-source software. Which anti-malware software should she use?.
Answer:
ClamAV is the open source antivirus you can in your Linux machine.
ClamAV is one of the best open-source anti-malware software for Linux machines.
What is malware?Any program or file that purposefully hurts a computer, network, or server is known as malware or malware. Computer viruses, worms, Keyloggers, extortion, and spyware are examples of infection.
By analyzing all received packets to stop malware from being launched and infiltrating a computer, antiviruses can assist in preventing malware attacks. Antimalware software can also identify sophisticated malware and provide defense against ransomware assaults.
Hence "One of the top free anti-malware programs for Linux systems is ClamAV".
To learn more about malware,
https://brainly.com/question/22185332
#SPJ12
Help PLEASE ILL MARK as brainlest
Answer:
computer animation (3d)
how important are operating system in our devices?
You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives
Answer:
thunderbold proly
Explanation:
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?
a. Require strong passwords in teh local security policy.b. Use cable locks to chan the laptops to the desks.c. Implement screen saver passwords.d. Encrypt all company data on the hard drives.
There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.
The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.With this, your computer becomes theft-proof.
Thia will give you piece of mind as you will not be restless anymore.
Learn more about Laptop security from
https://brainly.com/question/24956493
The Internet provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.
Answer:world wide wev
Explanation:
Beyond restoring normal operations and data, what else should be done during the recovery phase?.
Based on troubleshooting management, beyond restoring normal operations and data, one should correct the underlying root cause during the recovery phase.
The need for correcting the underlying root cause.During the restoration of normal operations and data, it is essential to correct the root cause of the problem.
By correcting the root cause of the operational problem, will limit the chance of the problem recurring.
Also, correcting the root cause of the problem will make the operations free completely of any possible malicious issue.
Hence, in this case, it is concluded that the correct answer is "correct the underlying root cause during the recovery phase."
Learn more about Restoration of operation here: https://brainly.com/question/6983264
Independence Day celebration in school paragraph
Answer:
We celebrated the Independence day in our school compound, with great pump and show. The school building and the ground were cleaned and decorated for the occasion. A flag pole was put up at the top of the school building. The seating arrangement was made on the platform
Explanation:
please Mark my answer in brainlist
A customer reached out via Twitter Direct Message to your company, looking for support with a complex issue. A co-worker was already helping that user but is away on vacation. Which Hootsuite feature would be best to respond with?
The Hootsuite platform provides tools that enable a person to manage his social media activities in one spot. The Hootsuite feature that would be best to respond with given the above scenario is;
Hootsuite inboxUsing the Hootsuite inbox, a user can access the private and public conversations between a former user and a client.
You can see the post that prompted the customer to speak with the organization's representative.
After reading through the conversations, you can reply the client and take any step that is required of you.
Learn more here:
https://brainly.com/question/15321261
A computer game allows a player to repeat a level until they run out of lives. Which two of the following loops would work correctly?
Answer:
c.
Explanation:
because this is the right syntax for the following loops
Question 10 of 10
Your company emphasizes the important of conserving (not wasting)
resources. How can you support that value when you print an 8-page report
you were asked to bring to your department's monthly meeting?
O A. Use the Print option for two-sided printing.
OB. Use the Print option to create extra copies.
C. Post the report online before printing it.
O D. Use the Save option to choose a format readers can open.
3 out of 5 citizens were eligible to vote 180 actually voted
Answer:
What is the question.
Explanation:
Answers:
Either 108/180
or 180/300
Depending on question since I dont know what ur asking
I need help with this question
What is the “digital divide”?
A. the gap between people who are very skilled using the Internet and people who are less skilled.
B. the gap between the time before Smartphones debuted and the time they became widely used.
C. the gap between people who have readily available Internet access and people who do not.
D. the gap between the time before the Internet debuted and the time it became popular.
Answer:
C IS YOUR ANSWERexplanation is availableExplanation:
The digital divide describes the gap between people who have access to affordable, reliable internet service (and the skills and gadgets necessary to take advantage of that access) and those who lack it. ... The Access Divide—This is the most visible digital divide.Answer:
option c is the answer....
Bootmgr starts and reads data from a(n) ________ file that contains information about the various operating systems installed on the system.
what is the most common size for footings for an 8 inch foundation
Answer:
#4 rods at 12 inches o.c.
Explanation:
In the context of object-oriented programming a(n) is a template for a group of objects with similar characteristics.
A class is a template for a group of objects with similar characteristics.
An object-oriented programming uses objects, instead of functions and logic to model software designs.
In an object-oriented programming, there are:
ObjectsClassesMethodsEtcObjects are what make up the object-oriented programming.
Similar objects are grouped together into classes
Hence, the text that completes the blank is class
Read more about object-oriented programming at:
https://brainly.com/question/22530356
What core components are involved with all games?
Player actions, humor, rewards, coins
Player goals and actions, rules, challenges
Challenges, riddles, mind-benders, tasks
Injury, re-birth, rules, questions
Answer:
B.) Player goals and actions, rules, challenges
Explanation:
Assume the int variables i ,lo , hi , and result have been declared and that lo and hi have been initialized.
Assume further that result has been initialized to the value 0.
Write a for loop that adds the integers from lo up through hi (inclusive), and stores the result in result.
Do not declare any additional variables --
use only i,lo,hi.
------------------------
import java.util.Scanner;
public class forloop_add{
public static void main(String args[]) {
int i,lo=1,hi=3,result=0;
Scanner scanner =new Scanner(System.in);
System.out.println("Enter the lower limit:");
lo=scanner.nextInt();
System.out.println("Enter the upper limit:");
hi=scanner.nextInt();
///{
//write your code here
//start
//end
///}
System.out.println("Result:"+result);
}
}
Answer:
I don't get this question, what is the point of initializing lo and hi if you're gonna read an input of both later, which is gonna override?
Explanation:
Which tcp/ip utility gives you the following output?.
Answer:
Nbstat -c is the correct answer.
The TCP/IP utility gives you the following output is nbtstat -c. The correct option is b.
What is TCP/IP utility?TCP/IP provides end-to-end communications that specify how data should be divided into packets, addressed, transmitted, routed, and received at the destination. This defines how data is exchanged over the internet.
The TCP/IP model has four layers: application, network access, internet, and transport. These layers function as a set of protocols when combined.
When a user sends data through these layers, the TCP/IP model does so in a specific order and then does so again in the opposite order when the data is received.
Therefore, the correct option is b, nbtstat -c.
To learn more about TCP/IP utility, refer to the below link:
https://brainly.com/question/29912510
#SPJ12
The question is incomplete. Your most probably complete question is given below:
netstat -r
nbtstat -c
netstat -a.
Arp -a.
THE BONUS QUESTION PART FOUR:
what is the most popular game that's lived for soo long
Answer:
Senet
Explanation:
RSA encryption relies on
_____. Select 4 options.
the use of prime numbers
the system time
a public key that the server and the user's computer know
a private key that only the server knows
the difficulty in factoring large numbers
Answer:
the difficulty in factoring large numbers
a public key that the server and the user’s computer know
the use of prime numbers
a private key that only the server knows
Explanation:
ege 2021
RSA encryption relies on a private key that only the server knows. Option C is correct.
What is RSA?RSA is a kind of asymmetric encryption that employs two distinct but linked keys. A communication can be encrypted using both the public and private keys in RSA cryptography. To decrypt a message, use the opposite key that was used to encrypt it.
The RSA algorithm is the foundation of a cryptosystem (a collection of cryptographic algorithms used for specific security services or purposes) that enables public key encryption and is widely used to secure sensitive data, especially when it is sent over an insecure network.
Therefore, option C is correct.
Learn more about the RSA, refer to:
https://brainly.com/question/14319307
#SPJ2
How to set encapsulation angular component.
Answer: anyone know?
Explanation:
A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called
A web-based program that uses artificial intelligence (AI) techniques to automate tasks such as web searches is called a: bot.
Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which involves the process of using computer algorithms to build a smart computer-controlled robot that is capable of automatically performing and handling tasks that are exclusively designed to be performed by humans or using human intelligence.
In the field of artificial intelligence (AI), a bot is an abbreviation for robot.
A bot is a web-based software program that assists an end user, or acts on his or her behalf, in the automatic performance of repetitive computer-related tasks such as web searches.
Read more: https://brainly.com/question/21656851
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure
Answer:
Ransomware
Explanation:
"Ransomware is malicious software that threatens to reveal sensitive data or prevent access to your files/systems until you pay a ransom payment within a set timeframe."
As a game designer, your goal in game design is to get your players to fell like your game is the whole world. You want your players to obtain a state of deep engagement with the game that allows them to fully invest their imagination in the game's artificial world. If you successfully accomplish this, what have you mastered?
roguelike state
second person perspective
player immersion
seamless movement
My Answer:
Player Immersion
Explanation:
I love video games, so this is something I am also looking for. Player Immersion will successfully draw the player into the game, seamlessly hooked to it. In order to make this possible, focus on the big details, like the setting, the music, and the plot.
Setting: Must be immersive, big, and beautiful.
Music: Must be beautiful, grand, and can possibly get stuck in your head.
Plot: Must be plausible. Don't make a plot that doesn't tie into the game.
These are things that will definitely draw in your player, hence, the answer is player immersion.
Hope this helps!
What type of programing code do game developers use.
Explanation:
object oriented programming languages like C#, C++, Java are used by developers to develop a game.