Answer:
I agree with you! And thank you for the points
Explanation:
I answer educational questions and ask one of my own regarding math and it gets reported
Someone asked if their art was good and how they can improve it and it gets reported
But the only questions they don’t report are free po!nts
For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???
Answer:but this is free ponts so it is safe uggg
Type the correct answer in the box. Spell all words correctly.
Alan maintains the efficiency of a printing plant by supervising plant operations and implementing safety procedures. What does he work as?
Alan is working as a _____________.
Answer:
Alan is a Maintenance Supervisor.
Explanation:
Answer:
printing plant manager
Explanation:
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use
PKI trust model that should be used, is a distributed trust model.
A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums. With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.Conclusively, we can say that PKI trust model that should be used is a distributed trust model.
Learn more from:
https://brainly.com/question/14837773
What is the best most effective way to add your savings account?
Explanation:
to put money in your savings account for college and Car a house and a.bunch of important stuff in life
Consider the plain text ALLTHEBEST with key values 4,19,3,2,3,4,12,5,11,4 what will be the cipher text after applying vigenere cipher.
hi bae systems applied to the relationship
Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks
Answer:
</p><p>
</p><p>days1(); // calling function days1()
</p><p>
</p><p>function days1() // function days1
</p><p>
</p><p>{
</p><p>
</p><p>var week = ["sunday ", "monday ", "tuesday "," wednesday"," thursday",
</p><p>
</p><p>"friday"," saturday"];
</p><p>
</p><p>var i;
</p><p>
</p><p>for (i=0;i<7;i++) // iterating over the loop
</p><p>
</p><p>{
</p><p>
</p><p>document.write(" The number of days in a week :" +</br>);
</p><p>
</p><p>document.write( week[i] + "</br>" ); // print the number of days
</p><p>
</p><p>}
</p><p>
</p><p>}
</p><p>
</p><p>
Output:
The number of days in a week :
sunday
monday
tuesday
wednesday
thursday
friday
saturday
Explanation:
In this program, we create a function days1().In this function, we declared an array i.e " week " which will store the list of the days of the week. After that, we iterate the for loop and prints a list of the days of the week.
What is the difference between a filter and a Search Folder?
*manually & *on demand
Answer:
manually and on demand is correct
Explanation:
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities
grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities
A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.Conclusively we can therefore say that the hacker was a gray hat hacker.
Learn more from
https://brainly.com/question/15899195
can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
Answer:
Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.
Which of the following best describes the original meaning of the term hacker?
Skilled computer user
Dangerous cybercriminal
Beginning computer programmer
Computer virus developer
Answer:
Dangerous cybercrimina
Explanation:
Answer:
Skilled computer user and computer virus developer
Explanation:
What is LinkedIn?
A job search website
A virtual job fair
A recruiter website
Answer:
A job search website.
Explanation:
I will make you brainless Just answer this question!!!!
A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on...
Answer:
6, 8,5,3,4,1,9,2,7
Explanation:
Just like that
Answer:
6, 8, 1, 3, 4, 2, 9, 5, 7
n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each of which is an n- bit predictor. A two-level local predictor works in a similar fashion, but only keeps track of the past behavior of each individual branch to predict future behavior.There is a design trade-off involved with such predictors: correlating predictors require little memory for history, which allows them to maintain 2-bit predictors for a large number of individual branches (reducing the probability of branch instructions reusing the same predictor), while local predictors require substan- tially more memory to keep history and are thus limited to tracking a relatively small number of branch instructions. For this exercise, consider a (1,2) correlating predictor that can track four branches (requiring 16 bits) versus a (1,2) local pre- dictor that can track two branches using the same amount of memory. For the fol- lowing branch outcomes, provide each prediction, the table entry used to make the prediction, any updates to the table as a result of the prediction, and the final mis- prediction rate of each predictor. Assume that all branches up to this point have been taken. Initialize each predictor to the following:
Answer:
a
Explanation:
Which of the following are advantages of using meaningful names for variables when writing a program? Select two answers.
1. Less variables will be required as the existing ones can be renamed throughout the program.
2. It is easier for a person reading the code to identify the purpose of a variable and follow the logic of the program.
3. It is simpler for the compiler to compile the program, meaning wait times and errors are reduced.
4. The programmer is less likely to make a mistake and use a variable for the wrong purpose.
Answer:
The answer is 2 and 4, please give brainliest award.
what safety do you need to have ready to start a device repair?
Answer:
Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.
The ethernet cable is also known as? *
Cat 5 cable
Wan cable
RD-45 cable
Sat 5 cable
Answer:
Cat 5 cable
Explanation:
The ethernet cable is also known as Cat 5 cable.
Easy Question I will make you brainless Just answer this 10 question!!.
Answer:
Utility knife - basket
Old newspaper - basket
Strong scissor-Sc
Clean soda can-Sc
Stapler - B
Scissor-basket
Push pin - Sc
Masking tape - Sc
Pin black-Sc
Glue-basket
how to install windows 11 on unsupported processor
Answer: You can't, if you anyway bypass the system, your device will run on risk.
Suggestion: Use any Linux distro similar windows 11. Like - Ubuntu/ Linux Mint/ ElementaryOs.
(Suggestion is only for if you can't run windows 10 or the pre installed Operating System in your machine.)
what is bitcoin??????
Answer:
a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.
Explanation:
Match the letter with the corresponding Workspace Area
Options :
-workspace settings
-options bar
-menu bar
-toolbar
The workspace areas described are editing tools of the photoshop program
The options described below are part of the Adobe Photoshop program for image and photo editing.
Workspace settings: It is a bar to configure the general aspects of the workspace in which an image is going to be edited or created.
Options bar: It is a bar located in the upper part (second row) of the document in which we have different options depending on the tool of the toolbar that we choose.
Menu bar: It is the bar located at the top (first row) in which we find different options such as:
FileEditionImageCapTextSelectionFilter3DViewWindowHelpToolbar: It is the bar located on the left side of the screen where we find different editing tools for our file, such as:
MoveMagnetic loopTrimDropperBrushDraftDegradedFeatherNote: This question is incomplete because the information is incomplete. However, I can answer based on my previous knowledge.
Learn more in: https://brainly.com/question/24964958
Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.
so I believe that the word you are looking for is technology
Hope this helps
-scav
A restaurant is interested in learning about the food preferences of people living nearby to the restaurant and intends to use survey data to help decide which new items to add to the menu. Which of the following is LEAST likely to be part of the process used to analyze the data?
a. Cleaning a data visualization to remove unwanted patterns.
b. Iteratively creating visualizations to ask and answer new questions.
c. Cleaning data to remove inconsistencies.
d. Filtering the data to look at the responses from only certain groups.
Answer:
answer is d
Explanation:
i got it right in code.org
Answer:
A. Cleaning a data visualization to remove unwanted patterns.
Explanation:
While cleaning data in its raw format can be an important part of the Data Analysis Process, the visualizations are not cleaned and/or altered but rather they are interpreted to discover what patterns exist in the data.
*If one is in search of a pattern, why would one clean or alter the pattern they have been provided, self-sabotage.*
which email attachments are generally safe to open
Answer:
i would suggest not opening ones that start with bit . ly
Explanation:
pls mark brainliest
what is the answer ??
Answer:
2nd answer is braille printer1st one is MICR .80percent sure 20 percent not
[tex]▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ { \huge \mathfrak{Answer}}▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ [/tex]
1. Correct choice - MICR
MICR characters are written using oxide of Iron.
2. Correct choice - Braille printer
Braille printer is the device used to give output which can be read by visually impaired people.
The water splashed all over the top of the car.
Answer:
e
Explanation:
Dry the car of i guess
how important the role of valet and butler service in the hospitality
You are trying to sell a new product to a store owner. Which method of presentation
is likely the most effective?
A. a chart showing how sales will go up if they use this product
B. quotes from other store owners on success of this product
C. a free trial option to use the product for six months, no questions asked
D. all of the above
(10pts)
This type of cable is used to connect the keyboard and mouse to the computer:
PS/2 cable
Ethernet cable
HDMI cable
DVI cable
Answer:
I'm going to have to go with PS/2 cable
Explanation:
did some research
it's the ps/2 cable
ethernet cables are for wifi
hdmi connects computer to the monitor
dvi connects to an older type of monitor
hi please help ASAP it's about html!
Create a HTML code for writing a web page for your school time-table.
Answer :-<html>
<head>
<title> Time Table </title>
</head>
<hrcolor = "red">
<hrcolor = "blue">
<body>
<table><tr = "7"><md = "7"><Period 1_></table>
</body>
</html>
[tex] \\ [/tex]
Answered by - ItzMaster
where is the scroll bar located inside a web browser?
The Scroll Bar is the narrow space in your browser window just to the right of the content area.
List 2 differences between routing messages and broadcasting messages
Answer:
Hub is an example of a broadcast device.
Switch is an example of a multicast device