Answer:
there is no following options
Explanation:
Answer: The correct answer is checking to make sure that information can be found in more than one place
Explanation: Sources are defined as locations where information is stored and accessible. When researching and validating information on the Internet (or in print), it is common practice to test multiple sources to corroborate the same details (aka Multiple Source Testing).
i need to blank the screen and move the cursor to the top what command should i use?
To put it simply, Windows 10 is stuck with a black screen. To solve this issue, simply hold down the power button on our PC or laptop to turn it off.
A variety of keyboard commands can be used to move the cursor in command mode. When in command mode, certain letter keys, arrow keys, the Return key, Back Space (or Delete) key, and the Space Bar can all be used to move the cursor. A combination of keystrokes can also be used to move the cursor further - for example, holding down the Ctrl (control) key and pressing the left arrow key will move the cursor one word to the left. Holding Ctrl and pressing the up arrow key moves the cursor to the beginning of each paragraph.
Learn more about cursor here-
https://brainly.com/question/12066537
#SPJ4
what kind of error results if a programmer used the formula length width to calculate the area of a rectangle when it should be length * width
Programmer used the formula length width to calculate the rectangle area
case RECTANGLE_AREA_CHOICE:
cout << "\nEnter the rectangle's length: ";
cin >> length;
cout << "Enter the rectangle's width: ";
cin >> width;
if (length < 0 || width < 0)
{
cout << "\nOnly enter positive values for "
<< "length and width.\n";
}
else
{
area = length * width;
cout << "\nThe area is " << area << endl;
}
break;
The quantity of space a flat surface of a specific form occupies is known as the area. The "number of" square units are used as the unit of measurement (square centimeters, square inches, square feet, etc.) The quantity of unit squares that can fit inside a surface of rectangle is known as the area of a rectangle. Blackboards, painting canvases, laptop monitors, and other flat surfaces are a few instances of rectangular shapes. To get the area that these items occupy, apply the formula for a rectangle's area.
learn more about rectangle area here:
https://brainly.com/question/16309520
#SPJ4
PLEASE ANSWER! 80 points!!!
Which option can be found below the Find Feature on the Word ribbon?
options-
A) Select All
B) Creative Find
C) Advanced Find
The option that one can find below the Find Feature on the Word ribbon is C) Advanced Find.
What does the ribbon contain?Ribbons include tabs and groups in addition to: An application button that displays a menu of commands to interact with or modify a workspace or document, such as file-related operations. A compact, resizable toolbar called a quick access toolbar that shows frequently used commands.
Note that In Microsoft Office 2007, Microsoft introduced the Ribbon, a user interface component. It is situated underneath the Title Bar and the Quick Access Toolbar. tabs are included are: Home, Insert, Page Layout, etc.
Learn more about ribbon from
https://brainly.com/question/24481253
#SPJ1
Which file attribute identifies the file as having been modified since the last backup?.
Archive File Definition
The meaning of the word Archive in the Online Computer Dictionary is used to make a copy of a backup file with the aim of protecting the original copy from damage.
How to Archive Files Into 1 File
If you want to send a large number of files, you can make the file into 1 archive file format with .zip, .tar, or .rar format first. This method is also quite easy and fast.
• First, make sure your computer has programs such as winzip, winrar. This program is needed to archive files.
• Second, you can select the file you want to archive, then right-click on the file. The example below shows 2 files to be archived
• The third step, you can directly select Add to “folder name.rar” to directly create archive files automatically. If you want to do some settings, it can be done by selecting the Add to archive option. The Add to archive option allows you to choose the save format of the file, divide or create the archive into several parts (part 1, part 2, etc.), to create a password. With the password, before the file can be extracted, it is necessary to enter the password first.
In addition to files, you can also archive folders directly along with the contents of the files in it. Keep in mind, how fast the process of archiving this file will depend on how many or large files to be archived.
Learn more about archive files athttps://brainly.com/question/15355917.
#SPJ4
A variable is created in memory the first time it appears on the left side of an assignment statement.
a. True
b. False
Option a is correct. It is true that a variable is created in memory the first time it appears on the left side of an assignment statement.
Your home computer's main storage, which is billions of bytes in size, is utilized to store both data and program instructions. The main memory's electronic circuits, as well as those of all other types of memory, do not differentiate between the two. All it keeps are bit patterns.
Some memory locations are used for machine instructions and others for data when a program is running. When a different program is executing later, some of the bytes that were previously used to store machine instructions may now hold data, and vice versa.
Remember that a data type is a method of representing a value using bit patterns. Consider a variable as a tiny container comprised of one or more bytes that can store a value of a specific data type.
Variables appear and disappear as needed by a running program. A running program may reuse that portion of memory for another use when a variable is no longer required.
To know more about memory click on the link:
https://brainly.com/question/28754403
#SPJ4
java automatically converts between objects and primitives in the process of autoboxing and unboxing. what happens when an int is autoboxed?
The Java compiler automatically converts between primitive types and the corresponding object wrapper classes through a process known as autoboxing.
Changing an int to an integer, a double to a double, and so forth are a few examples. It is known as unpacking if the conversion is made in the opposite direction. When a primitive value is: Passed as a parameter to a method that anticipates an object of the corresponding wrapper class, the Java compiler implements autoboxing. Assigned to a wrapper class variable that matches. Each of the elementary data types—Byte, Character, Double, Integer, Float, Long, and Short—has its own class in Java's lang package. Boxing is the process of converting a primitive datatype to an object.
Learn more about java here-
https://brainly.com/question/12975450
#SPJ4
which of the national institute of standards technology (nist) cybersecurity framework functions entails an analysis of cybersecurity risk and reduction of potential damage to it infrastructures?
Answer: Protect (PR) function
Explanation:
5) Is there any Positive impact in modern area. due to development of computer science? How? Present your views in 5o words.
The Positive impact in modern area. due to development of computer science are:
Accelerating healthcare progressFurthering educationExpanding communicationEmpowering people who are often overlookedBetter communication channelsWhat benefits does utilizing a computer have for you as a student?Students that use computers gain new educational concepts that aren't taught in classrooms or at colleges. Instantaneous information processing is made possible by computers, and this is crucial for learning. All of the assignments and presentations that are part of schooling can be finished in the allotted time.
How will computer science affect the future?Most occupations in the near future will require some familiarity with computer programming, and as technology develops, so will the abilities needed for software engineering positions. In the upcoming years, computer science is expected to grow in importance, sophistication, and specialization.
To know more about computer science visit:
https://brainly.com/question/20837448
#SPJ10
what part's of a computer would you need to replace is it does not work
1. the battery
2. the microchip
3. the circuit board
Answer:
It depends, like when you don't charge ur computer often the battery you will have to change the battery.
Give two reasons why network security is the most important issue regarding data centers.
Answer: To Ensure Client Data Security Why is network security important? ...
2. To Improve Network Performance Improve network performance is another reason why network safety is important. ...
Explanation:
which type of network poses increasing challenges to cybersecurity specialists due to the growth of byod policies?
Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network. A network's connections to its computers can be made by cables, phone lines, radio waves, satellites, or infrared laser beams.
Explain about the Network?
Computer networking is the term for a network of connected computers that may communicate and share resources. These networked devices transmit data through wireless or physical technologies using a set of guidelines known as communications protocols.
Computers, servers, mainframes, network devices, peripherals, and other linked devices form a network that enables data sharing. The Internet, which connects millions of people worldwide, is an illustration of a network.
Computer networks come in a variety of forms, with the following five representing the most prevalent: MAN stands for Metropolitan Area Network, LAN for Local Area Network, WAN for Wide Area Network, WLAN for Wireless Local Area Network, and CAN for Campus Area Network.
The issues posed by wireless networks and mobile devices are growing.
To learn more about Network refer to:
https://brainly.com/question/1326000
#SPJ4
You are planning to install Windows 10 on your computer and must decide which file system to use on the hard drive. What files systems are not available in Windows 10 for a local hard drive? (Select all that apply.)
a. FAT32
b. NTFS
c. exFAT
d. ext4
e. HFS
f. CDFS
The FAT32 files system is available for use on a hard drive in Windows 10. NTFS available in Windows 10 for a local hard drive.
A computer's hard disk, often known as a hard drive or HDD, is one type of technology used to store the operating system, applications, and other files used by your computer, including documents, images, and music. The other parts of your computer work together to display the programs and files that are kept on your hard drive. which we see in computers.
This information includes your operating system, programs, and any files you've made. In order to read or write the needed information, an accuator arm also moves across the platter. As the accuator arm passes over the platter, it spins to speed up the process. The data compartments can be spread out. Using HDD in computer will not give smooth experience.
Learn more about hard drive here:
https://brainly.com/question/10677358
#SPJ4
What is the most efficient means of discovering wireless signals?
War flying is the most efficient means of discovering wireless signals.
By using wardriving, a person can make a list of all open networks in any location and, if they are unprotected, return and freely browse them. War flying is the practice of spotting unprotected wifi networks using an airplane rather than a car.
Detecting Wi-Fi wireless networks with an airplane and a Wi-Fi-enabled device, such as a laptop or PDA, is referred to as war flying or war storming.
Finding wireless networks is simply part of the process of war driving. Other names for this practice include WLAN mapping, LAN-Jacking, and access point detection. The terms "War Walking" and "War Flying," which refer to searching for APs while walking or flying, were also created by some.
Learn more about War flying :
https://brainly.com/question/28451317
#SPJ4
question 7 scenario 1, continued you finish cleaning your datasets, so you decide to review tayen’s email one more time to make sure you completed the task fully. it’s a good thing you checked because you forgot to identify people who have served on the board of directors or board of trustees. she wants to write them a thank-you note, so you need to locate them in the database. to retrieve only those records that include people who have served on the board of trustees or on the board of directors, what is the correct query
To retrieve only those records that include people who have served on the board of trustees or on the board of directors, the correct query is option D: WHERE Board_Member = "TRUE" OR Trustee = "TRUE"
What is a DataSet SQL?A dataset is a representation of all the data in a database at a specific time. Table-like structures are used to further divide up the data in a dataset. Information in a table is grouped together. For instance, a table called Contact could include all of the individuals in an address book.
Therefore, To run queries against a single table such as the above, several tables, or tables in a typed DataSet, you can use either query expression syntax or method-based query syntax.
Learn more about query from
https://brainly.com/question/27851066
#SPJ1
See options below
FROM Donation_Form_List
WHERE Board_Member = TRUE AND Trustee = TRUE
SELECT *
FROM Donation_Form_List
WHERE Board_Member = "TRUE" AND Trustee = "TRUE"
SELECT *
FROM Donation_Form_List
WHERE Board_Member = TRUE, Trustee = TRUE
SELECT *
FROM Donation_Form_List
WHERE Board_Member = "TRUE" OR Trustee = "TRUE"
server manager can be used to monitor and manage other windows server 2008 and later systems.
a. True
b. False
Server Manager can be used to monitor and manage other Windows Server 2008 and later systems. The statement is true.
The Windows Server 2008 R2 operating system offers a minimum server installation option called Server Core. A server environment with minimal capabilities is offered by Server Core. To launch the Run box or the Command Prompt, press the Windows key + R. Press Enter after typing "Server Manager." In Windows Server 2012 or 2008, this ought to be the quickest and most popular method to launch Server Manager. The Server Manager shortcut is pinned to the taskbar by default. In order to keep the IT environment functional and effective, server administration also includes managing the hardware, software, security, and backups.
Learn more about Server here-
https://brainly.com/question/7007432
#SPJ4
Your windows system has been infected with malware that has replaced the standard boot loader on the hard disk with its own malicious software. which type of exploit is being used in this scenario?
A rootkit, a type of malware that installs its own program as the hard drive's boot loader, has infected the system in this scenario. Rootkits are able to get past conventional anti-malware protection measures.
A rootkit, a type of malware that installs its own software as the boot loader on a computer's hard drive, has infected the machine in this example. Rootkits can get past standard anti-malware protection measures since they load before the operating system.
A rootkit is a group of computer programs, usually malicious, that are created to grant unauthorized users access to a computer's software or other areas that are not normally accessible. They frequently conceal their own existence as well as the existence of other programs.
"Rootkit" is a combination of the words "kit" and "root," which is the conventional name for the privileged account on Unix-like operating systems (which refers to the software components that implement the tool). Due to its relationship with malware, the phrase "rootkit" carries a negative connotation.
To know more about rootkit click on the link:
https://brainly.com/question/13068606
#SPJ4
which jdk command is correct to run a java application in bytecode.class?
The java c command reads Java class and interface definitions and compiles them into class files that contain bytecode.
Annotations in Java source code and classes can also be processed using the java c command. Each method in a Java program receives a Bytecode in the form of a class file when the program is run by the compiler, which compiles the program's source code. This bytecode is also executable on any other platform. However, the bytecode is an interpreter-dependent, non-runnable kind of code. The JVM executes bytecode. The Java compiler produces bytecode, which contributes to the security and portability of the Java code.
Learn more about bytecode here-
https://brainly.com/question/25458754
#SPJ4
a digital image is stored in a file. the pixels of the image represent a gray level of 0 to 255. what instruction are you likely to use in loading a register with the value of a pixel?
The instruction are you likely to use in loading a register with the value of a pixel is lbu.
What is value of a pixel?The pixel value for a grayscale image is a single number that denotes the brightness of the pixel. The byte image, which stores this number as an 8-bit integer with a possible range of values from 0 to 255, is the most popular pixel format. Normally, 255 is considered to be white while zero is considered to be black. Use the impixel function to find the values of one or more pixels in an image and return the results in a variable. The pixels can be chosen interactively with the mouse or by specifying the pixels' coordinates as input variables.The instruction are you likely to use in loading a register with the value of a pixel is lbu.To learn more about pixel value refer to:
https://brainly.com/question/9017156
#SPJ4
What is the best method for saving the results of a command?
Type the command, followed by the > or >> operator and the path to the file where you want the command's output to go in order to redirect it. The ls command, for instance, displays a list of the files and directories in the current directory.
To store command output to a file in Linux, use redirection. In Linux, redirection can be used for this. Instead of displaying the output on the screen, the redirection operator sends it to the specified file. The > replaces any existing content on the file by redirecting the command output to the file. The routines for output to a text terminal either send output there or retain track of output sent there.
Learn more about Command here-
-https://brainly.com/question/14583083
#SPJ4
Which of the following statements describes the body of an e-mail? Check all of the boxes that apply.
It can include personal information.
It can include professional information.
It always includes an attachment.
It can include a small amount of information.
It can include a large amount of information.
It always includes an e-mail address.
Answer:
A B D E
Explanation:
I said A B wasnt right this is what came up
which is a useful email guideline that managers can follow to improve business communications?
The useful email guideline that managers can follow to improve business communications is to read emails to check for spellings and grammar before sending them.
There is no one-size-fits-all approach to the ideal way to use email for business communication. Consider this.
You might send dozens of emails to clients each day if you work in sales. Maybe not so much in terms of content writers. The only reason you have a business email as a front-end developer is probably solely because it's required by corporate policy.
Then there are all the various internal communication technologies that companies employ at work.
Therefore, while you continue reading, keep in mind that this is not a fixed, copy-and-paste solution. These are recommendations and guidelines for email usage, not strict restrictions. Thus, they might also be useful to your company communication.
Despite this, we do believe that some email etiquette is inflexible. Always offer your emails descriptive headings. Furthermore, it goes without saying how important it is to set an out-of-office reply. But we go through everything in detail in a separate guide to proper email etiquette.
To know more about email click on the link:
https://brainly.com/question/14311364
#SPJ4
the difference operator subtracts one table from the other.
a. True
b. False
True, the difference operator subtracts one table from the other.
What is the difference operator?
In relational database management system (relational dbms), the difference operator takes two sets and returns the values that are in the first set but not the second set. Aside the difference operator, they are two other relational set operators which are Union operator and intersection operator. All three set operators can be implemented in a databse management system using different queries. A Relational operators are used to compare two values and can sometimes be referred to as comparison operator.
Learn more about the difference operator from:
https://brainly.com/question/14995818?referrer=searchResults
#SPJ4
brad launches a program in order to see all of his files, folders, and programs in one place. which element of the microsoft windows operating system is brad using?
File explorer (formerly Windows explorer) is the element of the Microsoft Windows operating system used by brad.
What is File explorer?File Explorer, formerly Windows Explorer, is a file manager program that comes preinstalled with versions of the Microsoft Windows operating system starting with Windows 95. For accessing the file systems, it offers a graphical user interface. It is also the part of the operating system that displays the taskbar and other user interface elements on the screen.
Windows operating systems use File Explorer as their default file manager to explore across directories and files. The user can access and navigate the computer's stored files via a graphical user interface.
To get more information about File explorer :
https://brainly.com/question/28902151
#SPJ1
______ are established between entities in a well-structured database so that the desired information can be retrieved.
Relationships are established between entities in a well-structured database so that the desired information can be retrieved.
The main resources of an organization are data. A database, which is a company's main repository for records, is the top level in the hierarchy of data kept in computer systems, which extends from a single bit.
Relationships are the connections or interactions between different things. Strength-based classifications of entities are possible. If an entity's tables depend on its existence, it is regarded as weak.
In other words, it requires relationships to another entity in order to exist. Databases can be set up in a variety of ways, giving them a wide range of shapes. Relational databases are currently the most often used type of database.
The relational database Microsoft Access, MySQL, and Oracle are common instances of. Data is arranged into one or more tables in relational databases. Each table has a specific collection of fields that characterize the type of information kept there. One instance of a group of fields in a table is called a record.
To know more about relationships click on the link:
https://brainly.com/question/454875
#SPJ4
Once a copy is created from a virtual machine’s files, the new clone can be powered on and safely deployed in the environment without any alterations.
a. True
b. False
The statement is false. The virtual machine is shut down by the hypervisor. The virtual machine is informed that the virtual hardware is shutting down once the hypervisor traps the command.
Virtual machines have a number of benefits over real machines and are simple to administer and maintain. On a single physical machine, VMs can run several operating system environments, reducing space, time, and administrative expenses. Virtual appliances are a subset of the larger class of software appliances and are virtual machine images that have already been setup and are prepared to run on a hypervisor. It's referred to as system virtualization. The hypervisor is typically used to manage the resources for each virtual system. A piece of software called a hypervisor can virtualize hardware resources.
Learn more about virtual here-
https://brainly.com/question/19906390
#SPJ4
which security mechanism uses a unique list that meets the following specifications:
A user ACL (user access control list) is a security tool that specifies which individuals have access to particular items as well as the degree or kind of access that is permitted.
A security mechanism known as a user ACL (user access control list) specifies which individuals have access to particular objects as well as the degree or kind of access that is permitted. Every object has a different security technique that is built right into the item itself.
Mandatory access control (MAC) is a type of access control that uses subject and object categories to define and manage access.
Access control can be upheld while also promoting user productivity through the use of conditional access.
A cryptographic technique called hashing generates an identification code that is used to track data changes.
To know more about access click on the link:
https://brainly.com/question/14286257
#SPJ4
What are examples of something you have authentication controls?
A smart card, photo ID, token device and swipe card are some examples of something you have authentication controls.
A physical item in your possession, such as a smart card, photo ID, token device, or swipe card, counts as an authentication control. A password, PIN, pass phrase, or the response to a cognitive inquiry (such as your mother's maiden name) are required for Something You Know authentication.
A biometric technology, such as a fingerprint, retina scan, voice recognition, keyboard, or writing recognition, is used for Something You Are authentication.
The initial stage in access control is authentication, and there are three typical factors used: something you know, something you have, and something about you. This article gives you a solid recognition grasp of the three authentication factors and how multifactor authentication can be utilized with them.
To know more about authentication click on the link:
https://brainly.com/question/28398310
#SPJ4
submit how can you verify an email message contains a legitimate concern from a company instead of a phishing scam?
Email Online phishing scams are run by tech-savvy con artists and criminals who steal identities.
To visit the business's website and log in, enter its web address into your browser.
How do I check to see if an email is legitimate?The domain name is incorrectly spelled or has a generic public domain for the sender's email address.In terms of grammar and spelling, the email is poorly written.The email's urgency compels you to take quick action.Spam emails that contain phishing attachments rely on the recipient's inaction and passivity. Spear phishing emails are phishing emails that are generic in nature rather than being directed at a particular audience.Email Online phishing scams are run by tech-savvy con artists and criminals who steal identities. They attempt to trick you into disclosing sensitive information, such as bank account passwords and credit card numbers, by sending spam, creating fake websites that look exactly like real websites, email, and instant messages.To learn more about : Email
Ref : https://brainly.com/question/2234629
#SPJ4
a firewall is a filtering device that watches for traffic that fails to comply with rules defined by the firewall administrator. what does the firewall inspect?
Answer:
packet header
Explanation:
Which of the following items is NOT an example of application software?
Answer:
DOS
Explanation: