Answer:
Viruses that load from USB drives left connected to computers when computers are turned on are known as boot sector viruses
Explanation:
Software designed to close logical ports in your computer is know as firewall Which is NOT a tool hackers use to gain access to and take control of your computer
A ________ implementation involves considerable modifications to the erp software
A chocolate implementation involves a good modifications to the ERP software.
What is chocolate implementation?In the chocolate implementation, the is good system enhancement and it is known too be a type of implementation that is said to be positive for the users as the package is often customized based on user needs.
Therefore, A chocolate implementation involves a good modifications to the ERP software.
Learn more about chocolate implementation from
https://brainly.com/question/23776149
#SPJ12
Suppose a family has had a house fire in which they lost many photos, and they are worried about losing more if they have another. Which of the following is a reason this family may want to digitize their photos? Choose all that apply.
A: to make it easier to e-mail photos to friends
B: to maximize file space on their hard drive
C: to minimize risk of losing photos by backing them up in virtual space
D: to save space in their home
Answer:
C - Minimize the risk of future loss.
Explanation:
All four reasons listed are valid reasons to digitize family photos, but in this instance where this family has lost photos in a house fire before, minimizing the risk of losing photos in the future might be their primary goal.
The time component of the FITT-VP principle for overload in a muscular strength program is Multiple Choice the same as that for a cardiorespiratory fitness program. based on the number of training days per week. based on the amount of weight lifted. based on the number of sets and repetitions of specific exercises.
The time component of the FITT-VP principle for overload in a muscular strength program is D. based on the number of sets and repetitions of specific exercises.
What is a strength program?It should be noted that a strength program is a form of exercise that's done to increase one's strength.
In this case, the time component of the FITT-VP principle for overload in a muscular strength program is based on the number of sets and repetitions of specific exercises.
Learn more about strength program on:
brainly.com/question/1962479
#SPJ12
The digital divide is the difference between careers which depend on technology and those that depend on human intuition and analysis. true or false?
The digital divide is the difference between careers which depend on technology and those that depend on human intuition and analysis is a false statement.
What is the digital divide?The digital divide is known to be a term that connote the gap that exist between demographics and areas that have room to modern information and communications technology (ICT), and those that do not really have room (access) or they do have restricted access.
Therefore, The digital divide is the difference between careers which depend on technology and those that depend on human intuition and analysis is a false statement.
Learn more about digital divide from
https://brainly.com/question/7478471
#SPJ1
what statement can you use to divide a script into multiple batches?
The GO statement can be used to divide a script into multiple batches
How to determine the statement?To divide a script, we make use of the GO statement or the GO command.
The GO statement has no syntax because it is not a keyword in SQL.
However, it is used by the SQL to create a group or batch of instructions that would be sent into the server
Read more about SQL at:
https://brainly.com/question/25694408
#SPJ11
The sorted values array contains the sixteen integers 1, 2, 3, 13, 13, 20, 24, 25, 30, 32, 40, 45, 50, 52, 57, 60. How many recursive calls are made by our binarySearch method given an initial invocation of binarySearch(45, 0, 15)
The number of recursive calls that have to be done using the binary search is 4.
How to do the recursive callsbinarySearch = (45, 0, 15)
start + end / 2 = value
mid = 0 + 15/2 = 7.5
The 7th element = 30
30 is less than 45
8 + 15/3
= 23/2 = 11.5
The 12th element = 52
52 is greater than 45
8 + 11/2
= 19/2 = 9.5
The value of 9 = 40 and 40 is less than 45
10+ 11/2 = 10.5
The tenth value is 45 hence the iteration to be done is 4.
Read more on binary here:
https://brainly.com/question/21475482
#SPJ1
Jack is an accountant he can't access the spreadsheet software which is installed on the server what should jack do
Answer:
Ping
Explanation:
Jack should ping the server and check to see if it has crashed. The ping command is a networking utility that determines if an IP address or domain is accessible. Once it is determined, Jack may utilize the data to derive additional inferences. While troubleshooting internet access, pinging is generally the first line of protection. It not only tests connection, but it also counts time and ensures that all Internet Control Message Protocol packets are accountable.
Advancement made
in napier's bones
Answer:
In 1614, Edinburgh-born Renaissance scholar John Napier invented logarithms. A means of simplifying complex calculations, they remain one of the most important advances in the study and practical application of mathematics.
Explanation:
hope this will help
during which software development phase do users begin using an app?
In the testing phase, a small selection of users are invited to use the app.
Assume you have a button control named btndisplaylist. Which is the default name for an event procedure that will be executed when the user clicks on the control?
The default name for an event procedure that will be executed when the user clicks on the control will be btnDisplayListclick.
What is a default name?It should be noted that a default name means a name that's assigned to a folder that's created in a computer.
In this case, the default name for an event procedure that will be executed when the user clicks on the control will be btnDisplayListclick.
Learn more about default on:
brainly.com/question/23976472
#SPJ12
of the choices listed, which is the correct protocol to access a remote computer and execute commands?
The correct protocol to access a remote computer and execute the commands is Using the winrs command
What is a remote computer?A remote computer is a computer that a user has no access to physically, but may be able to access it remotely via a network link from another computer.
Therefore, remote computers are connected to another computer via a network link.
Hence, he correct protocol to access a remote computer and execute the commands is Using the winrs command
learn more on remote computer here: https://brainly.com/question/14951054
#SPJ11
Add the following line of code to the end of your script, replacing any function calls: nested_sum( eval(input()) )
The program is an illustration of loops; Loops are program statements used for repetition of operations
How to complete the code?The complete question is added as an attachment
The code written in Python that completes the missing parameters in the question are:
def nested_sum(mylist):
total = 0
for other_list in mylist:
total += sum(other_list)
print(total)
t = [[1,2],[3],[4,5,6]]
nested_sum(t)
nested_sum( eval(input()))
Read more about loops at:
https://brainly.com/question/24833629
#SPJ11
_____ is not considered a challenge when designing applications for multicore systems. A) Deciding which activities can be run in parallel B) Ensuring there is a sufficient number of cores C) Determining if data can be separated so that it is accessed on separate cores D) Identifying data dependencies between tasks.
Answer:
B) Ensuring there is a sufficient number of cores.
If you click a hyperlink, your browser will:
If an end user click a hyperlink, his or her web browser will display a new webpage or another area on the same page.
What is a hyperlink?A hyperlink refers to an element in a hypertext markup language (HTML) document such as a website, which is designed and developed to provide a direct access or link to another HTML document, webpage, location, image, etc.
As a general rule, a web browser will display a new webpage or another area on the same page when an end user click a hyperlink.
Read more on hyperlink here: https://brainly.com/question/9193509
#SPJ12
what is the size of the rc.conf file in bytes
Answer:
It is 281 bytes.
The size of the rc.conf file in bytes is known to be 281 bytes
What is rc conf file?The rc. conf file is known to be a kind of file that often specifies the vital services that needs to be turn on or enabled in course of system startup.
Note that in the case above, The size of the rc.conf file in bytes is known to be 281 bytes.
Learn more about bytes from
https://brainly.com/question/6835146
#SPJ11
What is the best description of an unbound control?
it is connected to a table
it is linked to an external file
it is unlimited in character length
it is unlinked to a firm’s underlying data
Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation
The causes of the situation include:
The systems use different hashing algorithms.One system uses hashing and the other used hashing and salting.How to depict the information?From the information given, the technicians are testing the security of an authentication system that uses passwords.
The technician discovers that the values are different from those on other systems because the systems use different hashing algorithms and one system uses hashing and the other used hashing and salting.
Learn more about technicians on:
brainly.com/question/14599022
#SPJ12
What does a terminal access controller access control system plus (tacacs ) keep track of? check all that apply
The thing that the terminal access controller access control system plus keep track of is the log admin access to each device and the changes that are made.
Why is the control system important?The control system is important as it's an authentication protocol used for remote communication.
Here, the terminal access controller access control system plus keep track of the log admin access to each device and the changes that are made.
Learn more about control system on:
brainly.com/question/25930304
#SPJ12
why open source software is very important for the country like Nepal
Collaboration promotes innovation through open source licensing. Many of the modern technology we take for granted would not exist today without it or would be hidden behind the restrictions of the patent system. Technology has advanced so quickly over the last few decades because of the open source movement.
As part of their extensive kitchen remodel, the Lees told their electrical contractors that they would need plenty of outlets for their many appliances. The contractors
knew that they would need to install small-appliance branch circuits using what kind of wire and circuit breaker?
The kind of wire and circuit breaker are: grounding wire such as fairly large bare copper wire.
What is the best wire for the above?A 20A, 120V small-appliance branch circuit is known to be used in the case above.
Note that Electric range circuits needs about 50-amp, 240-volt made for circuit that is said to supplies the power to the range or oven via a 6-3 electrical wire.
Learn more about circuit breaker from
https://brainly.com/question/8976395
#SPJ1
Which arcade game, released in 1972, is considered to be the first to be commercially successful?.
Answer:
Pong
Explanation:
Pong
Bios or uefi allow you to configure, enable, and disable the _____ that are bound to the motherboard
Answer:
devices
Explanation:
BIOS and UEFI are two computer firmware protocols that act as an interpreter between the operating system and the computer firmware. Both of these interfaces are used at computer launch to setup hardware components and launch the operating system stored on the hard drive.
BIOS or uefi allow you to configure, enable, and disable the devices that are bound to the motherboard.
What is BIOS in motherboard?BIOS is known to be the (basic input/output system) and it is a program of the computer's microprocessor that often helps to start the computer system after it is said to be powered on.
Note also that BIOS or uefi allow you to configure, enable, and disable the devices that are bound to the motherboard.
Learn more about BIOS from
https://brainly.com/question/13103092
#SPJ12
A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are remaining objects to process. True or false?
The for loop will always execute as long as there are remaining objects to process. It's a true statement.
What is a for loop?A for loop is used to do something repeatedly.
The for loop iterate over an items.
In a simpler term, the for loop is used to repeat a section of code known number of times.
Therefore, a for construct is a loop construct that processes a specified list of objects.
As a result, it is executed as long as there are remaining objects to process is a true statement.
learn more on for loop here: https://brainly.com/question/2374898
#SPJ2
Alex wrote a science fiction story about half-living, half-robot creatures in
another galaxy. He wanted to copyright the creature idea for later sequels but
was denied. What element was missing?
O A. Creativity
OB. Fixed form
O C. Interest
OD. Originality
Answer:
im not sure about this one but im pretty sure its d since this is not a original idea at all their are like tons of cyborn alien thing on their and this would not be original
Hope This Helps!!!
Sftp uses which mechanism to provide security for authentication and data transfer?
Sftp uses SSH mechanism to provide security for authentication and data transfer.
What are SSH known for?SSH or Secure Shell is known to be a kind of a network communication protocol that helps two computers to be able to communicate and also share their data.
Therefore, one can say that Sftp uses SSH mechanism to provide security for authentication and data transfer.
Learn more about SSH mechanism from
https://brainly.com/question/13086077
#SPJ12
isdn is considered to be what type of wan connection?
ISDN is considered to be a type of circuit-switched connection WAN connection.
What is a WAN?WAN is an acronym for wide area network and it can be defined as a telecommunication network that covers a wide range of geographical locations, especially for the purpose of communication between different users in different countries or regions across the world.
Integrated Services Digital Network (ISDN) is considered to be a type of circuit-switched connection wide area network (WAN) connection.
Read more on WAN here: https://brainly.com/question/8118353
#SPJ12
to access the internet through the pstn, what kind of connectivity device must you use?
In order to access the Internet through the PSTN, a connectivity device that you must use is a modem.
What is a modem?A modem can be defined as a type of networking device that is designed and developed to convert the signals from the wire such as a telephone line, so that data can be sent and received by a computer.
In Computer networking, modem is a connectivity device that you must use to access the Internet through the Public Telephone Service Network (PSTN).
Read more on modem here: https://brainly.com/question/7320816
#SPJ12
When can social security recipients expect the 4th stimulus check 2022.
The date for the social security recipients to expect the 4th stimulus check was from Wednesday, April 13, 2022.
What is the Social Security checks schedule?There is said to be the fourth round of Social Security checks that is known to be coming to every household.
Note that the date for the social security recipients to expect the 4th stimulus check was from Wednesday, April 13, 2022.
Learn more about social security from
https://brainly.com/question/1156607
#SPJ1
Which device limits traffic between server 1 and server 2 devnet
The device that limits traffic between server 1 and server 2 is known as a router.
What is a router?It should be noted that a router is the device that connects two or more packet switched networks.
In this case, the device that limits traffic between server 1 and server 2 is known as a router. It manages traffic between the networks.
Learn more about router on:
brainly.com/question/24813743
#SPJ12
When designing a query in power bi desktop, what is the best datatype to use for column containing currency values?
In designing a query in power bi desktop, the best datatype to use for column containing currency values is fixed Decimal Number data type.
What is Fixed Decimal Number data type?Fixed Decimal Number data type is said to be a kind of currency data type where the given location is said to be fixed for giving the decimal.
Note that in the above case, In designing a query in power bi desktop, the best datatype to use for column containing currency values is fixed Decimal Number data type.
Learn more about datatype from
https://brainly.com/question/179886
#SPJ12