Answer:
Core network components interconnect other network components. Gateway: an interface providing a compatibility between networks by converting transmission speeds, protocols, codes, or security measures. Router: a networking device that forwards data packets between computer networks.
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
Answer:
distributed denial of service
Explanation:
Answer: DDoS
Explanation:
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic.
As the Social Media Strategist at a company, your coworker comes to you and asks you to explain that if your ads and products are all over the Internet, how would anyone ever find them? Which would be your best explanation?
Explanation:
They can find the ads all over the internet. The ads will be seen by people using all kinds of websites, and of all age groups.
What is string constant??
Explanation:
String constants, also known as string literals, are a special type of constants which store fixed sequences of characters. A string literal is a sequence of any number of characters surrounded by double quotes: ... The null string, or empty string, is written like "" .
What are 3 examples of Chassis Wiring?
Answer:
.
Explanation:
. List down mental health problems that may arises with excessive use of digital social networking Do we ever need to be concerned about becoming addicted to any Internet activities? Find one example in a news or journal article of a person who was "addicted" to using a social networking site or other online activity
Answer:
Excessive utilization of digital instant messaging could perhaps lead to numerous mental health conditions.
Explanation:
The massive pressure just to preserve a privileged lifestyle the same as peer group and other such influencers. Cyberbullying would also be a key component of the social mainstream press. This might cause stress.Yes, researchers undoubtedly need to worry about who becomes familiar with the internet. There's a whole number of news items living with the effects of over-using social networking sites. There seemed to be headlines that a teen must have been strongly affected by someone with a man as well as ransacked with real money by encouraging them to stay married to her.
1
Select the correct answer.
Which tool will select the lines of a sketch in digital software?
A.
Gradient
B.
Magic Wand
Ос.
Edge Detect
OD.
Paint Bucket
Reset
Next
Answer:
gradient
Explanation:
Print even numbers till 50 in python coding.
In python, you can use a simple list comprehension to solve this problem.
print([x for x in range(51) if x % 2 == 0])
This code prints all the even numbers from 0 to 50 including 0 and 50.
How are Earth's plates made?
_____ includes the technologies used to support virtual communities and the sharing of content. 1. social media 2.streaming 3. game-based learning
Answer: it’s A, social media
Explanation:
Social media are interactive digital channels that enable the production and exchange of information. The correct option is 1.
What is Social Media?Social media are interactive digital channels that enable the production and exchange of information, ideas, hobbies, and other kinds of expression via virtual communities and networks.
Social media includes the technologies used to support virtual communities and the sharing of content.
Hence, the correct option is 1.
Learn more about Social Media:
https://brainly.com/question/18958181
#SPJ2
Copyright ownership analysis starts with this principle: The ________ is the owner.
a- Government
b - author
c- public
d- employer
Answer: Author
Explanation: self explanatory
What type of result does the MATCH function, when used on its own, return?
It returns the lookup value located in a specific location.
It returns a value that is the same as the lookup value.
It returns the cell reference of the lookup value.
It returns the relative position of a lookup value, either as a row or column number, within the selected array.
Answer:
D: It returns the relative position of a lookup value, either as a row or column number, within the selected array
Explanation:
In Microsoft, the MATCH function is a function that is easily used to look for a specific item in a range of cells, and thereafter it now returns the relative position of that item in that same range of cells.
Thus, the correct answer is Option D
Answer:
d
Explanation:
To summarize and analyze data with both a crosstabulation and charting, Excel typically pairs _____.
Answer:
" Pivot Charts with Pivot Tables" would be the right approach.
Explanation:
The pivot chart would be a visual interpretation or depiction of an Excel pivot table. Pivot charts, as well as tables, were indeed interconnected around each other. The pivot table could indeed assign a retroactively comparable number and appearance formatting or predictive text, although when data is being transferred.Which solution eliminates the need for dedicated high-speed WAN connections between sites
Answer:
running in the 90 s intensifies
Explanation:
Computerized machines have taken the place of most __________.
A.
teachers
B.
IT specialists
C.
order clerks
D.
graphic designers
Answer:
B??
Explanation:
I feel like B. is the correct answer.
If i'm wrong plz let me know :>
Answer:
B
Explanation:
Define the following. 1.upload 2.store3. download.
Answer:
1. UPLOAD- to transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
2. STORE- to keep or accumulate (something) for future use.
3. DOWNLOAD- to copy (data) from one computer system to another, typically over the internet.
[tex]\huge\mathtt{\fcolorbox{lime}{black}{\pink{Answer:-}}}[/tex]
Upload
[tex]\red\mapsto[/tex]Uploading refers to transmitting data from one computer system to another through means of a network.
Store
[tex]\red\mapsto[/tex]Computer data storage is a technology consisting of computer components and recording media that are used to retain digital data.
Download
[tex]\red\mapsto[/tex]Download means to receive data from a remote system, typically a server such as a web server an email server.
How many syllables does snail have
If you were asked to make a presentation to your class that requires you to show pictures, text and video, which program would be the best choice? A. Internet explorer B. Photoshop C. Microsoft word D. Microsoft PowerPoint
Answer:
D
Explanation:
Microsoft PowerPoint is a presentation program.
1. Write the syntax of the following HTML commands by using any one attribute
a) Font
b) Table
c) OL
d) Marquee
e) Img
Answer:
The answer is table
Explanation:
If u do not know what a syntax is, its a system where it helps u make ur sente shorter cuz if its like i wanted to go out in the rain my mum said i cant to play in the rain the fixed sentence would be I wanted to go play in the rain but my mum said no
Write a c++ programm that enter a number from the user and displays Fibonacci numbers from 1 to given number using function
Answer:
#include <iostream>
using namespace std;
int main()
{
cout << "Enter number: ";
int number;
cin >> number;
int prevfib = 0;
int fib = 1;
while (fib <= number) {
cout << fib << " ";
int add = prevfib;
prevfib = fib;
fib += add;
}
}
!WILL GIVE BRAINLIEST!
Write a Python program that prompts the user for a word. If the word comes between the words apple
and pear alphabetically, print a message that tells the user that the word is valid, otherwise, tell
the user the word is out of range.
Answer:
word = input()
if word > "apple" and word < "pear":
print("Word is valid.")
else:
print("Word is out of range.")
In Java I’m having trouble with variables. When I try to call a variable from my while loop it says, “finger cannot be resolved to a variable.” The error is on line 49.
You're declaring variable finger inside your while loop so it only exists inside your while loop. You're then trying to use your finger variable outside your while loop, which is impossible because finger only exists inside your while loop.
Try declaring total at the beginning of your program, adding finger to total before you break from your while loop and then adding randNum to your total at the end.
To better understand why you can't use finger outside your while loop, look up "java scope". This will explain why you can only use variable in the regions they're declared in.
When you are entering text, what is the most efficient way to remove the previous four characters to correct a word that you entered incorrectly?
A. Press the DELETE key THREE times
B. Finish typing the word, and then run a spell check
C. Press the BACKSPACE key four times
D. Triple-click the word to select it, then retype it correctly
Answer:
C. press the Backspace key four times
Explanation:
When you are entering text, what is the most efficient way to remove the previous four characters to correct a word that you entered incorrectly is to Press the BACKSPACE key four times
Most times people do delete a character to the right of the insertion point by pressing delete and a character to the left of the insertion point by pressing backspaceIt is often better to select the text you want to remove, then press the Delete key.
Conclusively, to quickly move an insertion point up to the start of the previous paragraph, just Press Ctrl+Up Arrow (Windows).
Learn more from
https://brainly.com/question/19286999
how to change your name to a fake one
Answer:
You can't. You have to email them and request it if you want too.
Explanation:
I hope this helped and if it did I would appreciate it if you marked me Brainliest.
Thank you and have a nice day!
What educational site could I make a screen capture tutorial on? I need ideas for a school project.
You Need Software To Screen Capture
The Software You can use is OBS its free and there are watermarks
Travis is getting ready to present his PowerPoint slides to his class. What is a good tip Travis should use during his presentation? Make eye contact and smile. Read from the slides. Speak quickly. Speak quietly.
Answer:
REad from slide and speak clearly and slowy.
Explanation:
Try to keep each to one line by using bullets or brief words, and avoid text wrapping. Instead of reading the screen, you want your audience to pay attention as you give your information. Long words might be clipped on some projectors because they cut slides off at the margins.
What is the best way to do a presentation?Once you've completed presenting the content of your speech, the simplest approach to conclude it is to say “thank you.” That has the advantage of being universally understood. Anyone can use it to signal to the audience that it is time to applaud and go.
Opening your thank-you speech with a straightforward phrase. Then, briefly discuss one or two (but no more) noteworthy points from the speech, such as the startling discovery or the wise words that were earlier mentioned.
Therefore, Content, audience, structure, and consistency are the four factors that will ensure that your audience follows along and remembers your presentation.
Learn more about presentation here:
https://brainly.com/question/14498361
#SPJ2
Pick all the correct answers
Complete the missing part of the line to allow you to read the contents of the file.
inFile = ____ ('pets.txt','r')
Answer: Sorry I’m late but the answer is open
Explanation: Edge 2021
The missing part of the line allows you to read the contents of the file. inFile = Open ('pets.txt','r').
What is the file format?The term file format refers to that, A standard way the information is encoded for storage in a computer file. It specifies how bits are used to encode information in a digital storage medium. File formats may be either proprietary or free.
The file format is the structure of that file, Which runs a program and displays the contents. As there are many examples like a Microsoft Word document saved in the. DOC file format is best viewed in Microsoft Word. Even if another program can open the file.
Therefore, By the File format allows you to read content and can open up the file format.
Learn more about file format here:
https://brainly.com/question/1856005
#SPJ2
Which of the following is the shortcut to quickly save a PowerPoint presentation?
Pressing Ctrl+Shift+S will save the slides.
Pressing Ctrl+S will save the slides.
Pressing F12 will save the slides.
Pressing Shift+S will save the slides.
Answer:
Pressing Ctrl+S
Explanation:
Two students are trying to combine their decks of Battleémon cards (a knock off version of another famous card game) so that they make one large deck of cards that contains exactly one of each unique type of Battleémon card that they own - in alphabetical order. In order to do this, the students start with two lists, deck1 and deck2, which are lists of all Battleémon cards each student owns (duplicates included) and the following available procedures.
Answer:
combinedDeck ← Add(deck1, deck2)
combinedDeck ← RemoveDups(combinedDeck)
combinedDeck ← Alphabetize(combinedDeck)
Explanation:
Uisng a the set of instructions below, a list of sorted cards without duplicates can be obtained by following the set of instructions below :
1. START
2. Read in cards of student A and student B into a set :
3. Using the union function merge, the two set of cards.
4. Since a set will contain no duplicates, then duplicate cards are automatically removed.
5. Convert the set to a list and apply the sort function.
A code snippet in python is given below :
card_A = {'meal', 'peal', 'deal', 'spin'}
#enter the values of student's A card into a set
card_B= {'skill', 'lift', 'spin'}
#Enter the values of student's B's card into a set
merge = card_A.union(card_B)
#using the union function, merge the cards
merge = list(merge)
#convert the mergers set into a list
sorted_cards = sorted(merge)
#using the sorted function, sort the values in the merged cards
print(sorted_cards)
#display the sorted cards
Learn more :https://brainly.com/question/15745784
Why did we decide to send a message as a sequence of two options rather than modifying our devices to represent more options?
Answer:
Following are the solution to this question:
Explanation:
Please find the complete question in the attachment file.
The binary message is also an XML text SMS, which is used to represent in binary character. It may also flag the binary text as binary, and it can attach the UDH as just the start of its message. In this question, we assume that you can include A and B because there could be no more than 2 choices in such a binary message.
We decided to send a message as a sequence of two states (A and B) rather than modifying our devices to represent more states (State C, State D, State E, etc.) primarily for simplicity and efficiency.
Using a binary communication system with just two states is straightforward and easier to implement than introducing more complex modifications for additional states.
Binary communication allows for clear and unambiguous encoding and decoding, making it more reliable and less prone to errors.
While using more states could potentially convey more information, it would also require more complex hardware and software, increasing the risk of communication errors and complicating the overall system design and operation.
Know more about binary communication:
https://brainly.com/question/32447290
#SPJ3
Your question is incomplete, but most probably your full question was.
Why did we decide to send a message as a sequence of state (A and B) rather than modifying our devices to represent more State (State C, State D, State E,....)?