Answer:
report header
Explanation:
,,,,,,,,,,,
For the creation and implementation of new technologies, which of the following must always keep ethical principles in mind?
IT professionals
neither IT professionals nor government regulators
government regulator
both IT professionals and government regulators
For the creation and implementation of new technologies, both IT professionals and government regulators.
What are implementation technologies?The implementation of new technologies in regards or within the concept of information technology (IT), is onw where the definition of implementation is made up of all the processes that occurs or takes place after the customer is said to have bought the product to get it operating properly.
Hence it is very vital that these processes such as analyzing requirements, installation and configuration be followed in the right way.
Therefore, For the creation and implementation of new technologies, both IT professionals and government regulators.
Learn more about government regulators from
https://brainly.com/question/2034176
#SPJ1
Answer:
Both IT professionals and government regulators
Explanation:
We are creating a creation and implementation of new technologies
IT professionals are must requirements because they can help you to use the technology smartly.
Also Government should regulate this as if you do it with out their regulations It is taken as illegal work
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with:
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with byte alignment.
Why is byte alignment important?It is known to be vital because the CPU is said to always reads the word size often (4 bytes on a 32-bit processor).
Therefore, if a person do an unaligned address access using a processor that aids it, the processor will be able to read a lot of words.
Note that the CPU is said to read each word of memory that is said to be requested of the address straddles and as such, If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with byte alignment.
Learn more about bits from
https://brainly.com/question/19667078
#SPJ1
The python standard library's __________ module contains numerous functions that can be used in mathematical calculations.
The python standard library's math module contains numerous functions that can be used in mathematical calculations.
What is Python Programming?
This refers to the high-level language programming that writes code in a machine-readable format and the computer executes it based on the parameters of the python language.
Hence, we can see that this math module is useful when using the python programming language as it makes use of mathematical operations such as addition, subtraction, multiplication, etc.
Read more about python language here:
.https://brainly.com/question/27666303
#SPJ1
A(n) ________ engine is a specialized program that assists you in locating information on the web and the internet. group of answer choices micro search wiki cloud
A Search engine is a specialized program that assists you in locating information on the web and the internet.
What is a Search engine?This is known to be a kind of a Software type.
A search engine is also seen to be a type of a software system that is known to be designed to function or work out web searches.
Note that They tend to search the World Wide Web in a way that is systematic in nature for specific information that is said to be specified in a textual web search query.
Therefore, based on the definition given, one can say that A Search engine is a specialized program that assists you in locating information on the web and the internet.
Learn more about Search engine from
https://brainly.com/question/512733
#SPJ1
You are a business consultant troubleshooting a failed information system. You discover that employees face negative incentives to using the system. Which component is causing the failure?
Given that the employees face negative incentives to using the system the system component that is responsible for this failure can be said to be the people.
What is a component failure?This is the term that is used to refer to the failure of a group of components at a particular period of time. This is usually the statistical probability of failure.
In a situation where the failure is due to the fact that the employees face negative incentives to using the system we can know the reason for such a failure is the people.
Read more on failure here: https://brainly.com/question/15949912
#SPJ1
What language choice will be the best for the website? 1. English only 2. Two languages: English and Chinese 3. Four languages: English, Chinese, Spanish, and Arabic You chose to redesign the company's website with minimal complexity. This turns out to be a smart move, as many countries must rely on slower Internet connections. Simple websites are more accessible in these areas with less available bandwidth. One option you take into consideration is whether to present the website content in multiple languages. You realize you won't be able to easily reconfigure the website for languages such as Arabic, which reads right to left instead of left to right, but that it might be worth it if the market is big enough. However, you can easily adapt the current site for languages more similar to English, such as Spanish.
The best language choice will be English only as it is known to be the language that is acceptable in every part of the world.
What is the most influential language in the world?English is known to be the top and the most powerful language in all of the globe.
Note that It is the dominant language that is made up of three G7 nations (such as the USA, UK and Canada), and also the British laid it foundation also as well as its global footprint.
Since it is often seen as the world's lingua franca, it is therefore right to use it instead.
Hence, The best language choice will be English only as it is known to be the language that is acceptable in every part of the world.
Learn more about language from
https://brainly.com/question/10585737
#SPJ1
at what layer of the osi model does a network switch normally operate? a. layer 5 b. layer 3 c. layer 4 d. layer 2
Answer:
D. Layer 2
Explanation:
It is layer 2.
To learn more:
https://brainly.com/question/26299918?referrer=searchResults
Hope this helps!
When computers sort data, they always use ____ values when making comparisons between values. group of answer choices numeric alphanumeric alphabetic ascending flag question: question 5
When computers sort data, they always use numeric values when making comparisons between values.
What is data sorting?Data sorting is a process of data cleaning and it is done to have a good data. It involves arranging data in order of preference to give meaning. This is to understand the data and to help in good analysis.
It also help data scientist to deign a goods model of analysis for the data. Data can be sorted based on attached values or number or percentages.
Therefore, When computers sort data, they always use numeric values when making comparisons between values.
Learn more on data sorting below
https://brainly.com/question/584814
#SPJ1
What is a brute force attack? What are the ways you can make it harder for someone to use crack your credentials using a brute force attack?
Explanation:
A brute attack is a method of cracking someone's password/credentials using a predefined set or list of commonly used passwords or from a database leak.
We can prevent our passwords from being brute forced by using a combination of password with no dictionary words and using many symbols and numbers with both upper and lower case characters.
The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The company wants to a?
Answer:
Explanation:
B is correct
Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building
A wireless network topology which would be used by network engineers to design and provide a wireless network service for an entire college building is an: C. infrastructure.
What is wi-fi?Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.
What is a topology?A topology can be defined as the graphical representation of the various networking devices that are used to create and manage a network connection.
In Computer Networking, we can infer and logically deduce that an infrastructure is a wireless network topology which should be used by network engineers to design and provide a wireless network service for an entire college building.
Read more on topology here: https://brainly.com/question/17036446
#SPJ1
Complete Question:
Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?
ad hoc
hotspot
infrastructure
mixed mode
Product with recursive methods using recursion, create a program that will allow for a user to enter 5 numbers. The program will provide the product of all 5 numbers using recursive methods. Submit screenshots of your program?s execution and output. Include all appropriate source code in a zip file. Java.
Given a product with recursive methods using recursion, the program that will allow for a user to enter 5 numbers is given below.
What program will allow for a user to enter 5 numbers is given below?import java.util.Scanner;
class Main
{
public static void main(String[] args)
{
int[] arrray = new int[5]; // variable declaration
Scanner s = new Scanner(System.in); // scanner declaration
System.out.print("Enter five numbers:");
for(int i=0;i<5;i++) // Loop runs from 0 to 4 total 5 times
arrray[i] = s.nextInt(); // Accept array elements
System.out.println("Multiplication of 5 numbers is "+multiply(arrray,4)); // calling function
}
public static int multiply(int x[], int count) // Called function
{
if(count<0)
return 1; // It return 1
return x[count] * multiply(x, --count); // recursive calling
}
}
Learn more about programs:
https://brainly.com/question/26134656
#SPJ1
How ICT has helped education to grow through progression?
Answer:
Hey there!
Explanation:
This is ur answer...
ICTs can enhance the quality of education in several ways: by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. ICTs are also transformational tools which, when used appropriately, can promote the shift to a learner-centered environment.
Hope it helps!
Brainliest pls!
Have a good day!^^
What does a router do with a packet that it does not have a destination network for?
A router that does not have a destination network for a packet would do the following: B.) Drops the packet.
What is a router?A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.
What is IP address?IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.
In Computer Networking, it is a standard occurrence or phenomenon for a router to drop the packet it receives when it does not have a destination network for the packet.
Read more on router here: brainly.com/question/24812743
#SPJ1
Complete Question:
What does a router do with a packet that it does not have a destination network for?
A.) Sends it to the Serial port
B.) Drops the packet
C.) Sends it back out the same interface it received it in
D.) Forwards the packet to the next hop
You are the PC technician for a company. You received the following email from an employee:My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well.When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day.What is the BEST way for you to respond
The the BEST way for you to respond is to set up a time where you as a person can sit down with the affected employee and show him how to carry out or complete the common tasks such as the email program.
What is the case about?In the case that the email is not working, You as the technician need to meet up with the employee at a given time and show the person the ways and how to use the email program.
Note that teaching employees on how to use their email is not one's your biggest work but it is vital to do so.
Note that out rightly telling an employee that they do not know how to use a program in the right way is not respectful or helpful to them and thus The the BEST way for you to respond is to set up a time where you as a person can sit down with the affected employee and show him how to carry out or complete the common tasks such as the email program.
Learn more about PC technician from
https://brainly.com/question/13056638
#SPJ1
Your organization stores highly sensitive data on-premises that cannot be sent over the public internet. The data must be processed both on-premises and in the cloud. What should your organization do
The best thing the organization can do to secure process data would be C. Order a Partner Interconnect connection with your network provider
What is Data Protection?This refers to the steps and processes that are taken in order to protect the integrity of data in use from tampering.
Hence, we can see that based on the fact that your organization stores highly sensitive data on-premises that cannot be sent over the public internet. The data must be processed both on-premises and in the cloud, they would need to Order a Partner Interconnect connection with your network provider.
Read more about data protection here:
https://brainly.com/question/27113550
#SPJ1
The primary goal of a data _____ is to find answers to existing questions by creating insights from data sources.
The primary goal of a data analyst is to find answers to existing questions by creating insights from data sources. Data analyst is the person who engages in a process of inspecting, cleansing, transforming, and modelling data with the goal of discovering useful information, informing conclusions, and supporting decision-making.
What is a data?In the pursuit of knowledge, data is a collection of discrete units of information in a conceptual model that in their most basic forms convey quantity, quality, fact, statistics, or other basic units of meaning. A datum is one item in a set of data.
Therefore, the correct answer is as given above
learn more about data: https://brainly.com/question/24621985
#SPJ1
Please explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
It means that there are people who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.
What is the joke about?This is known to be a popular joke that is often used by people who are known to be great savvy in the field of mathematics.
The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.
The binary system is one that relies on numbers that are known to be in groups of 2.
Therefore, If the speaker of the above phrase is one who is able to understand binary, that person would be able to say that that the phrase is correctly written as "there are 2 types of people that understand binary".
Learn more about binary from
https://brainly.com/question/21475482
#SPJ1
Write a c program that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger
Using the knowledge in computational language in C++ it is possible to write a code that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger.
Writting in C++ code:#include <iostream>
using namespace std;
int main(){
float a, b;
cout<<"Enter two numbers:";
cin>>a>>b;
if(a>b) {
cout<<"Larger Number:"<<a<<endl;;
cout<<"Smaller Number:"<<b;
}
else if(b<a){
cout<<"Larger Number:"<<b<<endl;
cout<<"Smaller Number:"<<a;
}else{
cout<<"Number are equal!"<<endl;
}
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
#include <stdio.h>
int main() {
// Variables
int a, b;
// User input
printf("Enter a number: ");
scanf("%d",&a);
printf("Enter a number: ");
scanf("%d",&b);
// Conditional operators
(a>b)? (printf("%d is bigger than %d\n", a, b)) : (printf("%d is smaller than %d\n", a, b));
(b>a)? (printf("%d is bigger than %d\n", b, a)) : (printf("%d is smaller than %d\n", b, a));
return 0;
}
DISPLAYEnter a number: 209
Enter a number: 190
209 is bigger than 190
190 is smaller than 209
EXPLANATIONDeclare the variables a and b.
Ask the user to input two numbers.
Use conditional operators to check if a is smaller or bigger than b and b is smaller or bigger than a.
General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees. Another name for this network that operates behind a firewall is a(n): Group of answer choices specialized network extranet intranet information system functional network
Based on the fact that General Electric uses its own private corporate network to link its 340,000 employees behind a firewall, this is called an Intranet.
What is an intranet?An intranet refers to a network that functions like the internet but isn't available to everyone. It is instead available to only people who are part of the organization that set it up.
This intranet allows for its users to share information and communicate with each other using all sorts of tools and collaborative software.
Intranets operate behind a firewall which means that they are less prone to attacks by hackers and can be quite faster. This is what General Electric is doing with its employees which means it uses the intranet.
Find out more on an intranet at https://brainly.com/question/13742795
#SPJ1
Cloudy computing would like to be able to link related cases together. As the admin, what would you recommend?
As the admin of a cloud computing service, I would you recommend that you ensure the use of pooled resources and efficient client-time management.
What is cloud computing?Cloud computing can be defined as a Cloud-based solutions that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives to provide various services to customers.
The types of cloud computing.In Computer technology, there are three main types of cloud computing and these include the following:
Private cloudPublic cloudHybrid cloudBasically, a hybrid cloud is designed and developed to combine the features of both a private cloud and public cloud. For instance, a hybrid cloud can be used by both the college's IT administrator and its IT consultant company which has access to the learning management system (LMS) application hosted in the cloud.
Read more on cloud computing here: brainly.com/question/17247526
#SPJ1
Which Web application threat allows attackers to pass malicious code to different systems via a Web application
Answer:
An SQL Injection
Explanation:
Web applications are vulnerable to SQL injections which can happen when an unprotected form is linked to a critical database. The attacker can pass in malicious code through the form and modify or even delete the database.
what do u mean by generation of computers?
Answer:
Generation in computer terminology is a change in technology a computer is/was being used. Initially the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up am entire computer system.
Answer:
Explanation: Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.
define the following: electronic mail, E-mail attachment, E-mail address, address book
Answer:
Explanation:
electronic mailbox
a document, picture or in an email
an address for your email : example at something . something
a book of email addresses
will you mark me as brainlest? I am trying to get a higher rank
A major hospital uses an agile approach to manage surgery schedules. a large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. which method is described in this scenario?
In this scenario, the Agile approach (method) that is being used and described is referred to as Kanban.
What is SDLC?SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.
What is Agile software development?In Agile software development, the software development team are more focused on producing efficiently and effectively working software programs with less effort on documentation.
In this scenario, we can infer and logically deduce that the Agile approach (method) that is being used and described is referred to as Kanban because it necessitates and facilitates real-time capacity communication among staffs, as well as complete work openness.
Read more on software development here: brainly.com/question/26324021
#SPJ1
Complete Question:
A major hospital uses an Agile approach to manage surgery schedules. A large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. Which method is described in this scenario?
A. Journey
B. Mapping
C. Waterfall
D. Kanban
E. Sprint
F. I don't know this ye
Instruction messages clearly explain how to execute a task. Before writing instructions, be sure you fully understand the process you are explaining. The body of instruction messages should
Instruction messages is one where the body of instruction messages should arrange items vertically with numbers.
What is an Instruction messages?An instructional message is known to be one whose design is said to be a kind of a real-world application of instructional and learning theories that is made to design the tools and technologies that are also known to be used to communicate and rightly pass information
Note that based on the above, Instruction messages is one where the body of instruction messages should arrange items vertically with numbers.
See full question below
Instruction messages clearly explain how to execute a task. Before writing instructions, be sure you fully understand the process you are explaining.
The body of instruction messages should : ___________?
A. divide the instructions into steps
B. avoid numerical lists
C. arrange items horizontally
Learn more about Instruction messages from
https://brainly.com/question/13669320
#SPJ1
In which disclosure paradigm will dislosure potentially help both the attacker and defender?
Information sharing is a disclosure paradigm in which disclosure will potentially help both the attacker and defender.
What is vulnerability?Vulnerability can be defined as any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker or a hacker, in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.
What is vulnerability disclosure?Vulnerability disclosure can be defined as a practice that typically involves reporting any security flaw in an equipment, computer software, or hardware, so as to avert and mitigate a potential attack (threat).
The types of disclosure paradigm.In Computer technology, there are four (4) main types of disclosure paradigm and these include the following:
Military: disclosure doesn't help the defender (low) but helps the attacker (high).Open source: disclosure helps the defender (high) but not the attacker (low).Information sharing: disclosure helps both the defender (high) and the attacker (high).Public domain: disclosure neither helps the defender (low) nor the attacker (low).In this context, we can infer and logically deduce that the information sharing is a disclosure paradigm in which disclosure will potentially help both the attacker and defender such as when the CIA or FBI considers whether or not to share a sensitive information with officials in other agencies.
Read more on vulnerability here: brainly.com/question/25813524
#SPJ1
When a device renews its dhcp lease, which two steps in the dhcp process are skipped?
When a device renews its DHCP lease, the two steps in the DHCP process that are skipped are discover and offer. The correct options are a and e.
What is the DHCP lease?DHCP is an IP address provisionally assigned to a networked device. Each client connected to the network while an IP address pool is managed using DHCP is merely “renting” an IP address.
As a result, DHCP servers only handle IP addresses that are valid for a specific amount of time. So in this discovery of DHCP and offers are skipped because they are not important.
Thus, the correct options are a and e.
To learn more about DHCP lease, refer to the below link:
https://brainly.com/question/14696764
#SPJ1
Your question is incomplete. Your most probably complete question is given below:
a discover
b renew
c request
d ACK
e offer
Silicone rubber and urethane caulks generally give the ____________ overall performance for exterior building envelope applications.
Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications.
What is silicone rubber made from?Silicone rubber is known to be a kind of an elastomer that is said to be made up of silicone that has silicon along with carbon, hydrogen, and oxygen.
Note that Silicone is said to be a form of an inorganic substance, while polyurethane is said to be organic in nature.
The use of thus Silicone rubber and urethane is therefore very essential to building construction.
Hence, based on the above, Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications and this is a true statement.
Learn more about Silicone rubber from
https://brainly.com/question/18902047
#SPJ1
An enterprise's application server and web server are hosted by a cloud service provider, and their database server is in the enterprise's own cloud establishment. Which type of cloud is used by the enterprise
An enterprise's application server and web server that are hosted by a cloud service provider will use option b: Hybrid cloud as the type of cloud is used by the enterprise.
What is hybrid cloud and how does it work?Hybrid cloud is known to be a very common IT infrastructure that is made to help to link up at least one public cloud and also that of a one private cloud.
This is known to be one that helps to give orchestration, management and also the function of application portability that exist between them to make a single, cloud environment for the running of a firms' computing workloads.
Hence, based on the above, An enterprise's application server and web server that are hosted by a cloud service provider will use option b: Hybrid cloud as the type of cloud is used by the enterprise.
Learn more about hybrid cloud from
https://brainly.com/question/27838623
#SPJ1
See full question below
An enterprise's application server and web server are hosted by a cloud service provider, and their database server is in their cloud establishment. Which type of cloud is used by the enterprise?
Private cloud
Hybrid cloud
Community cloud
Public cloud