Which one of the following is a type of network security?
a) Login Security
b) Rights Security
c) Both (a) and (b)
d) Neither (a), nor (b)


Answers

Answer 1

Answer:

I think it's (login security)


Related Questions

What does SyntaxError invalid syntax?

Answers

They typically suggest that there is a problem with the program's syntax. Example: When the colon is left out of a def statement, the result is a message that is somewhat redundant. Invalid syntax: SyntaxError.

What is syntax?

The arranging of phrases and words to create good sentences is known as syntax. The most fundamental syntax uses the formula subject + action + direct object. Jillian "struck the ball," in other words. We can comprehend that we wouldn't write, "Hit Jillian the ball," thanks to syntax. The arrangement of words in units like phrases, clauses, and sentences is referred to as syntax. Linguists refer to a set of principles and rules that control sentence structure and word order in a given language as a language's syntax. Subject-verb-object is the general rule of syntax in English. A basic sentence generally consists of a subject, a verb, and maybe an objects and modifiers.

To know more about syntax visit:

https://brainly.com/question/3022752

#SPJ4

Which of the following is not a type of application software?
A)Microsoft Office
B)Encyclopedias
C)Games
D)Windows 98

Answers

Answer:

windows 98

Explanation:

Answer:

I think the best answer would indeed be B.

Explanation:

B. Encyclopedias

Joe's computer crashed and I was looking for a replacement which of the following criteria is less important.Ram,money, color, usage ​

Answers

Answer:

color

Explanation: nobody cares what color it is how it works

Colour is the less criteria as Joe's computer crashed, and he was looking for a replacement. Hence, option C is correct.

What is meant by computer crashed?

A computer crash occurs when an operating system or program stops functioning properly. When: Hardware has had an irreparable failure.

Computer crashes are the result of hardware or operating system errors. Even though software errors are unquestionably more common, hardware errors can still be quite harmful and are more difficult to spot. A computer cannot function if certain hardware components are malfunctioning.

A crash or system crash occurs when a computer program, such as an operating system or software application, stops functioning properly and exits. A computer cannot operate without a number of hardware parts working properly.

Thus, option C is correct.

For more details about  computer crashed, click here:

https://brainly.com/question/4701800

#SPJ2

What’s GIGO
Please write it in full form

Answers

Answer:

i think it is garbage in garbage out

Explanation:

how many bits and bytes are occupied by six long variables​

Answers

Answer:

24 bytes = 192 bits

Explanation:

A long is typically 4 bytes or 4*8 = 32 bits

However, on some 64 bit systems, a long is defined as 64 bits so the answer is not universal.

Listen to the audio and then answer the following question. Feel free to listen to the audio as many times as necessary before answering the question. Where is marisol not going this afternoon? ella va al correo. Ella va al centro. Ella va al museo. Ella va al cine.

Answers

The inference is that Marisol will not be going to Ella va al museo this afternoon.

What does inference mean?

An inference is a conclusion that has been reached based on reasoning and supporting data. For instance, if you observe someone expressing distaste after eating their lunch, you can infer that they do not like it.

An inference, put simply, is a conclusion that can be reached based on the details presented in a literary work.

In this case, it is inferred that Marisol won't be going to the museum this afternoon because "Ella va al museo."

To know more inference visit:-

https://brainly.com/question/16780102

#SPJ4

what is the technology to encode filr or messages?​

Answers

Answer:

Encryption is ur ansqwer

There is a new product launched and its customer ratings are being recorded in an array. the ratings are being monitored and analyzed if there is any decrease in the ratings. find the number of periods in which the rating is consecutively decreasing.

example - ratings = [4,3,5,4,3]
periods (in other words sub arrays in which ratings are decreasing):
one day periods = [4],[3],[5],[4],[3] (count of subarrays is 5)
two day periods = [4,3],[5,4],[4,3] (count of subarrays is 3)
3 day periods = [5,4,3] (count of subarrays is 1)
so, the output for this example will be 9 (5 + 3 + 1)

Answers

The program to find the number of periods in which the rating is consecutively decreasing is; As written in the attached file

What is the program array?

What we are required to do to find the number of elements in decreasing part. For example;

4,3 means One decreasing part and has 2 elements

5, 4, 3 means second decresing part and has 3 element.

Thereafter, we just add n*(n + 1)/2 to result.

where;

n = number of elements in any part

n*(n + 1) /2 is number of decreasing subarray that can be made

For the second decreasing part which is [5, 4, 3];

number of sub arrays you can make = 3 * 4/2 = 6

Thus, we have;

[5], [4,], [3], [5,4],[4,3],[5,4,3]

The program to find the number of periods in which the rating is consecutively decreasing is as follows in the attached file;

Read more about program array at; https://brainly.com/question/16266708

There is a new product launched and its customer ratings are being recorded in an array. the ratings

How can an analog signal be converted into a digital signal.

Answers

Answer:

They first sample the signal, then quantify it to determine the resolution of the signal, and finally set binary values and send it to the system to read the digital signal.

Explanation:

hope it helps

mark me brainliest pls

The first sample is signal then sample it

which hardware component interprets and carries out

Answers

Answer:

The processor, are also called a CPU(central processing unit) is an electronic component. That interpretes and carried out the basic instruction that operates a computer

Explanation:

the most common method to deliver spyware to a target system is by using a trojan horse. true or false

Answers

The statement, "The most common method to deliver spyware to a target system is by using a Trojan horse," is true.

A Trojan horse, named after the ancient Greek story of the Trojan War, is a malicious software that disguises itself as a legitimate program or file, tricking users into downloading and installing it. Once installed, the Trojan horse can perform various malicious activities, such as capturing sensitive information, providing unauthorized access to the system, or spying on the user's activities. It is important to exercise caution when downloading and installing software from untrusted sources to prevent falling victim to such attacks.

The delivery of spyware typically involves tricking the user into downloading and installing the Trojan horse onto their system. This can occur through various methods, including:

Social engineering: Attackers may use persuasive tactics to deceive users into willingly installing the Trojan horse. For example, they may send an email or create a fake website that appears trustworthy, enticing the user to click on a link or download a file that contains the Trojan.

Software bundling: In some cases, legitimate software programs may come bundled with a Trojan horse. When users download and install these programs, they unknowingly also install the hidden Trojan.

Exploiting software vulnerabilities: Attackers can exploit security vulnerabilities in software programs or operating systems to deliver Trojans. They may take advantage of unpatched or outdated software that has known vulnerabilities, allowing the Trojan to be silently installed without the user's knowledge.

Learn more about Trojan horse   : https://brainly.com/question/16558553

#SPJ11

A walk-through of the project deliverable is conducted by
__

Answers

A walk through of the project deliverable is conducted by: the sellers agent

"A machine is having issues, so the user is responsible for getting the machine serviced. Which stage of the hardware lifecycle does this scenario belong to?"

Answers

Answer:

Maintenance

Explanation:

The maintenance stage of an hardware life-cycle involves the servicing, repair replacement of machine component activities as well as other restorative activities meant to restore the machine to its original state.

The stages of an hardware life-cycle are;

1) Planning for the required hardware

2) Buying or leasing the hardware

3) Hardware installation

4) Maintenance activities, Repair

5) Hardware upgrading

6) Extend

7) Hardware trade in or buyback

8) Disposal of the hardware

redit card theft a.requires that the thief have actual possession of the card b.requires that the thief take and carry away the card c.is a form of embezzlement d.can occur merely by unauthorized use of a credit card number

Answers

Caused purchases to be made using a credit card number that had been stolen from someone else.

What transpires to the credit card thief?

Fraudulent Credit Card Activity, The thief faces up to $1,000 in fines and up to a year in county jail if they are caught. For the losses incurred by their victims, robbers are frequently required to make restitution payments. Thieves are sometimes accused of various offenses, including both felonies and misdemeanors.

Can my credit card user be identified by the bank?

No, the bank is unable to immediately ascertain who used your debit card. However, if you notify the bank about the unauthorized use of your card, they might be able to look into it and find out who carried out the transaction.

to know more about credit card theft here:

brainly.com/question/10675635

#SPJ4

Select the correct answers.
Which are the benefits of leveraging web technologies?
processing of large amounts of data
more manpower
better marketing and customer service
increased production costs
difficulty in handling customer complaints

Select the correct answers.Which are the benefits of leveraging web technologies?processing of large

Answers

Answer:

Explanation:

Select the correct answers.

Which are the benefits of leveraging web technologies?

1) Processing of large amounts of data

2) Better marketing and customer service

Since the advent of online writing, our audience:

A. has grown much larger

B. rarely reads what we write

C. has become disinterested

D. usually comprises one person​

Answers

Answer:

C............. I think

Since the advent of online writing, our audience: A. has grown much larger.

Writing refers to an act (process) of using alphabets and writing symbols to communicate ideas, emotions, and thoughts in a readable form.

On a related note, online writing can be defined as a process that involves writing and making a literary work (piece) solely available for an audience over the internet.

Generally, the audience for online writing has grown much larger, as a result of technological advancement and the availability of communication devices such as:

SmartphonesLaptopsPalmtopse-diaries

In conclusion, our audience has grown much larger since the advent of online writing.

Read more on online writing here: https://brainly.com/question/10354868

Which office setup would be difficult to host on a LAN?
hardware.

RAM.

storage.

software.

Answers

The office setup would be difficult to host on a LAN  is option C: storage.

What is the office LAN setup like?

A local area network (LAN) is a network made up of a number of computers that are connected in a certain area. TCP/IP ethernet or Wi-Fi is used in a LAN to link the computers to one another. A LAN is typically only used by one particular establishment, like a school, office, group, or church.

Therefore, LANs are frequently used in offices to give internal staff members shared access to servers or printers that are linked to the network.

Learn more about LAN   from

https://brainly.com/question/8118353
#SPJ1

Explain any TWO (2) data information that shall be covered under "Safety Data Sheet" and elaborate why do you think the information is needed

Answers

Safety data sheets include details about chemical items that assist users in evaluating the risks. They outline the risks the chemical poses and include details on handling, storage, and emergency procedures in the event of an accident.

The properties of each chemical, its physical, health and environmental properties, protective measures, and precautions for handling, storage and transportation of the chemical are contained in a safety data sheet (formerly called safety data sheet).

Provides recommendations for each individual chemical on topics such as:

PPE, or personal protective equipmentfirst aid techniquescleanup procedures for spills

To learn more on Safety Data Sheets, here:

https://brainly.com/question/28244620

#SPJ4

What changes can be done using image editing tool?
a) Resize b) Crop c) Resize and crop

Answers

The answer is C
Most of these image editing tools allow you to crop, rotate, adjust brightness, contrast and color, touch up and add filters to photos .

In Outlook 2016, the Tell Me function can be accessed by
O pressing F1 on the keyboard.
clicking on the File tab, then the question mark button.
typing a query in the textbox on the ribbon.
typing "help" in the search box in the message pane.

In Outlook 2016, the Tell Me function can be accessed byO pressing F1 on the keyboard.clicking on the

Answers

In Outlook 2016, the Tell Me function can be accessed by

O pressing F1 on the keyboard.

clicking on the File tab, then the question mark button.

typing a query in the textbox on the ribbon.

typing "help" in the search box in the message pane.

Explanation:

I think it should be typing a query in the textbox on the ribbon.

In Outlook 2016, the Tell Me function can be accessed by clicking on the File tab, then the question mark button. The correct option is B.

What is Outlook?

The preferred email client for sending and receiving emails from Microsoft Exchange Server is Microsoft Outlook. Accessibility to contact, email, calendar, and task management tools is also provided by Outlook.

You can send and receive emails, manage your calendar, save the names and phone numbers of your contacts, and keep track of your projects using Outlook.

Even if you utilize Outlook on a daily basis, you might not be aware of all the wonderful things it can do to boost your productivity.

By selecting the File tab, then the question mark button in Outlook 2016, you may open the Tell Me feature.

Thus, the correct option is B.

For more details regarding Microsoft outlook, visit:

https://brainly.com/question/26695071

#SPJ2

What is the largest possible value that the variable x can have after the code segment executes? 17 17 A 14 14 B 11 11 C 4

Answers

Answer:

i dont know sorry man no problem listed

Explanation:

The largest possible value that the variable x can have after the code segment executes is 14. Thus the correct option is B.

What is a variable?

A variable refers to an entity whose value changes over time. As the name suggests variable which means whose value varies from situation to situation. The terms which remain fixed are referred to as constant.

A range of an array element's indexes or subscripts is referred to as an extent. The size of an array might vary between 1 and 10. The indicia or subscripts shall be integers within the range.

The terminology for ranges and indices is described in this feature specification to make it easier to index individual components within a sequence or a range.

The term "index" refers to a position in a sequence or array. In an array, the operator provides the comparative index starting from the end. A range is a representation of a composed of approximately of an array.

Therefore, option B is appropriate.

Learn more about Variable, here:

https://brainly.com/question/14662435

#SPJ5

Consider the following code segment. Assume that index1 is a number between 1 and LENGTH(theList), inclusive, and index2 is a number between 2 and LENGTH(theList) - 1, inclusive.

theList ← [9, -1, 5, 2, 4, 8]

x ← theList[index1] + theList[index2]

What is the largest possible value that the variable x can have after the code segment executes?

answer choices

17

14

11

4

state the part of the internet that contains website​

Answers

I think it would be the web browser is where it directly can be accessed and located using a url address .

A large part of Kelly's job with a software development company is to monitor the servers to ensure that they are not overloaded by the computers that are connected to them. Kelly holds the position of __________ in the organization. Infrastructure Manager Database Administrator Support Analyst Network Administrator

Answers

Kelly holds the position of Network Administrator in the software development company.

As a Network Administrator, Kelly is responsible for monitoring and managing the company's network infrastructure, including the servers. One of Kelly's key responsibilities is to ensure that the servers are not overloaded by the computers connected to them.

In this role, Kelly is tasked with implementing and maintaining network security measures, troubleshooting network issues, and optimizing network performance.

Kelly monitors network traffic and server performance to identify potential bottlenecks or signs of overload. By analyzing network usage patterns and implementing appropriate network management techniques, Kelly ensures that the servers operate smoothly and efficiently.

Furthermore, Kelly collaborates with other IT professionals, such as system administrators and database administrators, to ensure the overall stability and reliability of the company's infrastructure.

Kelly may also participate in the planning and implementation of network upgrades and expansions to support the growing needs of the organization.

Overall, as a Network Administrator, Kelly plays a crucial role in maintaining the stability, performance, and security of the company's network infrastructure, specifically focusing on preventing server overload caused by connected computers.

For more such questions on Network Administrator,click on

https://brainly.com/question/29462344

#SPJ8

A single computer on a network is called a____________.

Answers

Is it a vpn, I’m just guessing bc I don’t know anything about this stuff lol

Answer: A single computer on a network is called a node. pls brainliest

anyone pls answer this!!!!!!thanks ^-^​

anyone pls answer this!!!!!!thanks ^-^

Answers

Answer:

True

False

False

False

Explanation:

HTML isnt a scripting a scripting language it's a markup language

There are 6 levels of HTML

An empty tag only has a starting tag

what kind of tag will give additional info about your webpage​

Answers

Answer:

The LINK tag

Explanation:

Answer:

The LINK tag

Instead of producing a clickable link, the <link> tag tells the browser that there is some additional information about this page located in a different file.

The css box model is composed of a series of concentric boxes containing ____. 1.Element content, 2.Layout, 3.Fluid layout, 4.In-line block

Answers

The CSS box model is used to describe the layout and spacing of HTML elements on a webpage. It consists of a series of concentric boxes that surround an HTML element. Each box represents a different aspect of the element's layout.

The outermost box is the margin box, which defines the space around the element. The margin is the space between the element and other elements on the page. Inside the margin box is the border box, which contains the element's content and any padding or borders applied to it. The padding box is the area between the content and the border.

The content box is the innermost box, which contains the actual content of the element, such as text or images. It is the size specified by the width and height properties in CSS.

So, the correct answer to the question is "1. Element content". The CSS box model is composed of a series of concentric boxes containing element content, along with padding, borders, and margins.

Learn more about CSS box  here:

https://brainly.com/question/30582054

#SPJ11

PLEASE HELP!
Before you answer:
-No spam (Will be reported)
-No incorrect answers (Will be reported)
-Correct answers and explanations will be mark as BRAINLIEST​​​​

PLEASE HELP!Before you answer: -No spam (Will be reported)-No incorrect answers (Will be reported)-Correct

Answers

Answer:

A. True or false

1.True

2.false

3.false

4.true

5.true

1) False. Java script is easy to learn and use.

2) True. The actions performed on the objects is called Methods.

3) True. There can be multiple scripts in a single documentation.

4) False. It's the complete opposite. Single Line comments starts with double dash (//)

5) True. Java Script uses interactive elements to make the HTML pages more interactive for the users.

in autocad, which drawing function allows you to switch from draw mode to arc mode within the command?

Answers

The drawing function in AutoCAD that allows you to switch from draw mode to arc mode within the command is called the "Fillet" command.

The Fillet command in AutoCAD is used to create rounded corners between two lines, arcs, or circles. When using this command, you can specify a radius value to determine the size of the arc that will be created at the corner.

One of the key benefits of the Fillet command is that it allows you to switch from draw mode to arc mode within the same command. This means that you can easily create arcs and fillets without having to switch between multiple drawing tools.

To use the Fillet command in AutoCAD, simply type "F" on the command line, and then select the two objects that you want to connect with an arc. You can then specify the radius value for the arc and continue drawing your geometry.

Learn more about Autocad link:

https://brainly.com/question/30242212

#SPJ11

As an IT technician, you are responsible for maintaining your company's laser printers. Recently, you read that laser printers have a cleaning phase. Another IT technician explains that you do not need to clean a laser printer because of this phase. However, you do not agree. What actually occurs during this phase

Answers

Answer:

When the drums revolution is completed, the toner still remaining on the photoreceptor drum is cleaned by a plastic blade that is made of soft electrically neutral material which then deposits waste toner into a toner reservoir in the printer. The drum is then charged to become uniformly negatively charge by a rolling charger to prepare the drum for the beam from the laser.

Explanation:

Other Questions
1. Discuss the ecosystem metaphor. Why have we used cars rather than counting actual species in a realecosystem? How do the cars in the parking lot represent species in an ecological community? what is the sum of a rational numbers? Write a couple sentences to explain how you would find the area of the shaded region: Por qu tenias miedo?Yo tena miedo el incendio.Yo tena miedo por el huracn.Yo tena miedo a la tormenta.Yo tenia miedo por el terremoto. Which of the following most accurately describes your company's production operations An eddy current separator is used to separate out non-ferrous metal from other waste. It may be described as a binary separator. The eddy current separator has a feed rate of 1,000 kg/h and is operated so that during any 1 hour, 750 kg exits as output 1 and 250 kg as output 2 . In output 1,650 kg is non-ferrous metal and 100 kg is other waste. In output 2,25 kg is non-ferrous metal and the remaining 225 kg is other waste. (a) Calculate the recovery of non-ferrous metal in the output stream 1. (b) Calculate the purity of output stream 1. (c) What is the effectiveness of the separator? Why does an object move for 10 seconds and still have zero displacement? Which elements of the excerpt indicate that it is an editorial? Select two options.evidence to support an opinionan unbiased view of eventswords with strong connotationsfacts and statisticsa story-like presentation What is the prime factorization of 90? Abigail runs a small business of 55 employees. She is working hard to find a way to provide health benefits to all her employees by 2016 to be in compliance with __________.the Family Medical Leave ActSocial Securitythe Affordable Care ActMedicare Read the passage from Sugar Changed the World.The diamond and the house: two family treasures, two parts of the story of sugar. We realized that our two family storiesMarina's great-grandparents, brought to Guyana to replace slaves, and Marc's aunt's grandfather, helping to refine an alternative to that same sugarwere just the beginning of a much larger story about a remarkable substance. It is a story of the movement of millions of people, of fortunes made and lost, of brutality and delightall because of tiny crystals stirred into our coffee, twirled on top of a cake. Sugar, we began to see, changed the world.What is the purpose of this passage?to explain who Marina and Marc areto link the authors families to sugarto explore the history of Guyanato show what sugar is used for p.j. turnbaugh, v.k. ridaura, j.j. faith, f.e. rey, r. knight, j.i. gordon the effect of diet on the human gut microbiome: a metagenomic analysis in humanized gnotobiotic mice x What aspect of the Roman government did the United States borrow? x X x X A Written rules in a constitution, ensuring elected officials are fair X B C D Splitting the government into different bodies to keep power fairly divided Ensuring equal rights between men and women Calling all citizens to vote for their rulers A particle moves along a line so that at time t, where its position is given by What is the acceleration of the particle the first time its velocity equals zero? Rank the 4 market types from most to least number of firms. A Monopoly, perfect competitive, monopolistic competitive, oligopoly. B Perfect competitive, oligopoly, monopolistic competitive, monopoly. C Monopoly, oligopoly, monopolistic competitive, perfect competitive. D Perfect competitive, monopolistic competitive, oligopoly, monopoly. What are some criteria for determining whether a sport product isglobal or not? Give an example of each and explain why What occurred at the Philadelphia Convention? PLEASE HELPP!!! ASAP!! FINALS A natural or manmade depression into which solid wastes are dumped, compressed, and covered daily with a layer of dirt is a/an: A team of scientists is working to find the boiling point of a liquid at very low pressure.