Answer:
Yes
Explanation:
I like frogs
Answer:
always been coolswag
The ethernet cable is also known as? *
Cat 5 cable
Wan cable
RD-45 cable
Sat 5 cable
Answer:
Cat 5 cable
Explanation:
The ethernet cable is also known as Cat 5 cable.
Cual es de las siguientes pertenece al software de una computadora
A bocina
B teclado
C messenger
D monitor
Explanation:
a sjsjsjsijdjdnjjjjururueu
Which of the following numeric values is considered a floating point?
A. 16
B. -16
C. 1.6
D. 160
Explanation:
B.-16
Because the things is that idk
1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments
Answer:
free money
Explanation:
scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either
Easy Question I will make you brainless Just answer this 10 question!!.
Answer:
Utility knife - basket
Old newspaper - basket
Strong scissor-Sc
Clean soda can-Sc
Stapler - B
Scissor-basket
Push pin - Sc
Masking tape - Sc
Pin black-Sc
Glue-basket
Hey is anyone else getting this? Don't mind the answer.
Answer:
Getting what? I don't get what you mean.
n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each of which is an n- bit predictor. A two-level local predictor works in a similar fashion, but only keeps track of the past behavior of each individual branch to predict future behavior.There is a design trade-off involved with such predictors: correlating predictors require little memory for history, which allows them to maintain 2-bit predictors for a large number of individual branches (reducing the probability of branch instructions reusing the same predictor), while local predictors require substan- tially more memory to keep history and are thus limited to tracking a relatively small number of branch instructions. For this exercise, consider a (1,2) correlating predictor that can track four branches (requiring 16 bits) versus a (1,2) local pre- dictor that can track two branches using the same amount of memory. For the fol- lowing branch outcomes, provide each prediction, the table entry used to make the prediction, any updates to the table as a result of the prediction, and the final mis- prediction rate of each predictor. Assume that all branches up to this point have been taken. Initialize each predictor to the following:
Answer:
a
Explanation:
describe accessibility in Windows 7
Answer:
Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.
What is the best most effective way to add your savings account?
Explanation:
to put money in your savings account for college and Car a house and a.bunch of important stuff in life
Order the steps to describe how to access the Electronics Business Card dialog box.
Answer:
posting it fren. your order is correct
Explanation:
The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:
How to access the Electronics Business Card dialog box ?Open Microsoft Outlook on your computer.
Click on the "File" tab located in the top left-hand corner of the screen.
From the drop-down menu, select "Options".
In the Options window, select "Contacts" from the left-hand menu.
Scroll down to the "Create contacts" section and click on "Electronic Business Cards".
In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.
Once you have completed making changes, click on "Save & Close" to save your electronic business card.
By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.
Learn more about Electronics Business Card here
https//brainly.com/question/19446197
#SPJ3
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Answer:
Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.
Explanation:
1. Define the term M.A.N.
Individuals may restructure their investment portfolios because
Answer:
the results are below expectations
what guidance identifies federal information security controls?
Answer:
FIPS Publication 200, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
The guidance identifies federal information security controls is THE PRIVACY ACT OF 1974.
What is Personally Identifiable statistics?Personally Identifiable statistics (PII) is any statistics approximately a person maintained with the aid of using an organization, inclusive of statistics that may be used to differentiate or hint a person's identification like name, social safety number, date and region of birth, mother's maiden name, or biometric records.
The Privacy Act states the guidelines that a federal enterprise need to observe to collect, use, transfer, and expose a person's PII.
Read more about the security :
https://brainly.com/question/26260220
#SPJ2
8
Select the correct answer from each drop-down menu.
The AND operator narrows
your search results. The OR operator broadens your search resul
Result. Am I right?
Answer:
yes you are correct
the AND operator narrows
the OR operator broadens your search results
Answer:
yes your right
(:
Explanation:
what is an indication that malicious code is running?
Answer:
If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.
please give brainliest
Order the steps to describe how to attach a contact to a new email
Answer:
confirm image correct
Explanation:
The water splashed all over the top of the car.
Answer:
e
Explanation:
Dry the car of i guess
Is 1/5 a rational number, interger, whole number, and natural
Answer:
1/5 is a rational number.
Explanation:
Natural numbers are the numbers you use to count with (1, 2, 3, etc.). Nobody uses fractions while counting whole objects unless they think they're funny and want to stall, so 1/5 wouldn't be a rational number.
Whole numbers are the exact same as natural numbers, but with the addition of the number 0 (think about it, no one starts from zero when counting).
Integers include whole numbers as well as their opposites (for example, the opposite of 4 is –4).
As a basic rule of thumb, if the number includes a fraction or a decimal point of any kind, it would be a rational number.
please help
in two to three sentences describe how you would divide a page into two columns.
Follow the steps outlined:-
Highlight the text you wish to split into columns.
Select the “Page Layout” tab.
Choose “Columns” then select the type of columns you wish to apply. One. Two. Three. Left. Right.
This type of cable is used to connect the keyboard and mouse to the computer:
PS/2 cable
Ethernet cable
HDMI cable
DVI cable
Answer:
I'm going to have to go with PS/2 cable
Explanation:
did some research
it's the ps/2 cable
ethernet cables are for wifi
hdmi connects computer to the monitor
dvi connects to an older type of monitor
Which of the following behaviors does not harm a company if your employment is terminated?
getting a copy of word-processing software before leaving
selling trade secrets to competing companies or to your future employer
creating a username and password so you can access company information after you have left
notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave
Answer:
Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.
Explanation:
Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.
Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.
If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.
The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.
Answer:
D. Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.
Explanation:
why do cyber attackers commonly use social engineering attacks?
Answer:
Sometimes the computer's brain is too secure, so of that's the case you should just try to hack the human brain by tricking it to give you the password to an account, or whatever you are using it for.
Hope this help please give the brainliest award.
Answer:
Attackers can gain what they want while bypassing most technical security controls
Explanation:
.
when backing up an ios device to a cloud service the first recommended step is to
Answer:
make sure that your device is connected to wifi
Explanation:
I think that's the answer because cloud service needs wifi (duh). Hope this helps!
Answer:
The first recommended step is to connect to an internet connect, and not your mobile WiFi as it can take a lot of GB.
Which THREE of the following practices conform to good email etiquette?
using a large font
including a salutation
using a page background
including a closing
using correct spelling and punctuation
Answer:
including a salutation, including a closing, and using correct spelling and punctuation.
Explanation:
A salutation is a greeting. It is always good etiquette to greet someone.
You do not want to end your email abruptly. Use a good closing.
It is never fun to read an email with bad spelling or punctuation. Using correct spelling and punctuation will make your email look more professional.
What is LinkedIn?
A job search website
A virtual job fair
A recruiter website
Answer:
A job search website.
Explanation:
HELP HELP HELP HELP HELP HELP PLEASE GUYS
Answer:
word
Explanation:
what safety do you need to have ready to start a device repair?
Answer:
Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.
are special characters usually found on the keyboard?
Answer:
No
Explanation:
When typing in predefined characters, Automatic substitution feature will change the characters into a symbol or special character. No.
what is the general term for programs used to operate a computer
Answer:
Software
Explanation:
ez
Answer: A Software System