A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.
How long does one smoke session stay in your system.
Answer:
1-2 days
Explanation:
In rare cases 25 days
A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext
Answer:
A block cipher breaks down plaintext messages into fixed-size blocks before converting them into ciphertext using a key.
Explanation:
Consider the following instruction mix: R-type I-type (non-lw/sw) Load Store Branch Jump 24% 28% 25% 10% 11% 2% a. What fraction of all instructions use data memory
Based on the number of instructions that use Data memory, the fraction of instructions that use data memory is 35%.
Which instructions use data memory?The instructions that use data memory in the above table are Load and Store.
This means that the fraction is:
= Store + Load
Solving gives:
= 10% + 25%
= 35%
Find out more on executing instructions at https://brainly.com/question/26949355.
Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f
Answer:
true
Explanation:
An electronic resume can carry so much data about the person, and it includes images also. Then the statement is true.
What is an electronic resume?An electronic resume is termed as a resume that is read by a computer program that summarizes the information of each person.
The electronic resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.
Thus, the photo of the document about the project or internship that has been done in the past can be given on the electronic resume by uploading the certificate on the computer system along with the resume.
For example, in companies like Linkedin, and so on there are many companies that ask about the person before creating an account.
More about the electronic resume link is given below.
https://brainly.com/question/2798964
Click this link to view O*NET’s Work Activities section for Petroleum Engineers. Note that common activities are listed toward the top, and less common activities are listed toward the bottom. According to O*NET, what are some common work activities Petroleum Engineers perform? Select four options.
performing for or working directly with the public
interacting with computers
getting information
analyzing data or information
making decisions and solving problems
assisting and caring for others
Answer: 2 3 4 5
Explanation:i got it wrong so here lol
Answer:
the first one and the last one r wrong the rest all right
Explanation:
True or false? a binary file can never contain image or audio data.
Answer:
true
Explanation:
It is true that a binary file can never contain image or audio data.
What is a binary file?A binary file is one that contains data in binary format, which consists of a series of sequential bytes, each of which is eight bits long.
The content must be interpreted by a program or a hardware processor that knows exactly how the content is formatted and how to read the data in advance.
Binary files are more efficient, which is one of their benefits. In terms of memory, storing values in numeric formats like IEEE 754, rather than text characters, uses less memory.
Furthermore, binary formats provide advantages in terms of access speed. Image or audio data can never be stored in a binary file.
Thus, the given statement is true.
For more details regarding binary file, visit:
https://brainly.com/question/14593514
#SPJ2
A computer hacker trying different combinations of characters to crack a password is a ________.
Answer:
Brute force attack
A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives. Select the two correct answers, then click Done.
A raid 1 and mirrored system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives.
What is Disk mirroring?In data storage, disk mirroring is a term that connote the doubling of logical disk volumes into a different physical hard disks so that it will always be available.
Conclusively, Note that this is mostly used in RAID 1. A mirrored volume is known to be full logical depiction of separate volume copies and as such the answer above is correct.
Learn more about system from
https://brainly.com/question/25594630
What is the intermediate value of arr after two iterations of the outer for loop in the call sort(arr)
Answer: D: "Ann" "Mike " "Bill " "Lisa" "Mary" "Jose" " Shari" "Walt"
Explanation:Goes through selection sort and after 2 iterations, the largest elements are swapped with the last 2 elements of the array.
The intermediate value of arr after two iterations of the outer for loop in the call sort(arr) is option C of the image attached.
What is intermediate value in programming?This is known to be a variable that is often employed in assisting so that one can be able to compute what they want
Concluisvely, The intermediate value of arr after two iterations of the outer for loop in the call sort(arr) is option C of the image is because it will help you to have what you are after with the codes.
Learn more about ntermediate value from
https://brainly.com/question/11195842
#SPJ2
Write a statement that assigns the value 10 to the first element of an array of integers named minutes.
Answer:
Explanation:
i do not know what language you need because it has different syntax
Javascript:
const minutes = [];
minutes.push(10);
Drag each tile to the correct box.
Match each network type to an example of what it connects.
WAN
MAN
PAN
LAN
twenty computers in an office
laptop and a cell phone
a company's offices across a city
a company's offices across a country
What do we call the kernel program that moves all of a process's frames from main memory to the disk or the other way around
Answer:
This is called the swapper
Explanation:
The swapper's main job is to move processes between memory, and storage.
Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile. How many items will it allow the user to include in the rule?
the top or bottom 10 items or top or bottom 10% only
the top 10 items and top 10% only
the top or bottom 100 items only
any logical number of items or percentages in top or bottom value frames
The numbers of items that the user can include in the rule is the top or bottom 100 items only.
What is Top/Bottom Rules?Top/Bottom Rules is known to be a rule where there is a premade form of conditional formatting which is often used in Excel to alter the set up of cells in a range.
Note that the Top/Bottom Rules will allow a user to make changes to the top or bottom 100 items only as it only pertains to things that are up and those that are at the bottom.
Learn more about Top/Bottom Rules from
https://brainly.com/question/1862654
A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust and communicate securely with public websites. Which type of certificates are the network administrator currently importing
The type of certificates that the network administrator is currently importing is Root.
What do root certificates mean?Root certificates are known to be the backbone of any form of authentication and security in the area of software and also usually in the Internet.
Note that they are often issued by the certified authority (CA) and can also be verified by its owner and as such it is the best for the network administrator to use.
Learn more about certificates from
https://brainly.com/question/24931496
Really need help Which of these are ways that hackers gain access to computer systems? Select 3 options.
data validation
data validation
phishing
phishing
packet sniffing
packet sniffing
dumpster diving
dumpster diving
layered security
layered security
The ways that hackers gain access to computer systems are:
PhishingPacket sniffingDumpster divingWhat is system attack?There are different kinds of system attack. This is where the hacker often attacks the system so as to gather data or information about a system.
The different forms of attacks includes dumpster diving, shoulder surfing, tailgating, phishing and others. Data validation is not an attack on system.
Learn more about hackers from
https://brainly.com/question/23294592
Answer:
Phishing
Packet sniffing
Dumpster diving
Explanation:
Chris needs to take the opposite of a Boolean value. Which operator does so? A. == B. != C. = D. !
AIf the boolean is A,you would have to do !a
Explanation:
the explamation mark gets the opposite.So if 5 = !A, then A = -5
(dont quote me ,im not 100% postitive)
You will read in two strings from a file cp4in_1. Txt at a time (there will be 2n strings, and you will read them until EOF) and then do the following. You alternately take characters from the two strings and string them together and create a new string which you will store in a new string variable. You may assume that each string is no more than 20 characters long (not including the null terminator), but can be far less. You must use pointers. You may store each string in an array, but are not allowed to treat the string as a character array in the sense that you may not have statements like c[i]
Use the knowledge in computational language in C++ to write the a character array .
How to define an array in C++?An Array is a set of values arranged in lists and accessible through a positive numeric index. So, we have that each position of our Array is a variable of the type of our Array, so we have to have a way to initialize this set of variables.
So in an easier way we have that the code is:
#include <stdio.h>
#include <studlib.h>
int main()
{
File*fp;
fp=fopen("cp4in_1.txt","r");
char ch;
//while(1)
//{
while(!feof(fp))
{
char *s1,*s2,*s3;
s1 = (char*)malloc (20 *sizeof (char));
s2 = (char*)malloc (20 *sizeof (char));
s3 = (char*)malloc (20 *sizeof (char));
int i=0,j=0,x,y;
while(1)
{
ch=getc(fp);
if(ch=='\n')
break;
*(s1+i)=ch;
i++;
}
while(1)
{
ch=getc(fp);
if(ch=='\n')
break;
*(s2+j)=ch;
j++;
}
for(x=0;x<i;x++)
{
*(s3+x)=*(s1+x);
}
for(y=0;y<j;x++,y++)
{
*(s3+x)=*(s2+y);
}
for(x=0;x<i+j;x++)
{
printf("%c",*(s3+x));
}
printf("\n");
getc(fp);
}
}
See more about C++ code at brainly.com/question/19705654
What are you doing to an image when you manipulate it?
A. downgrading the integrity of the image
B. creating a digital footprint of the image
C. digitally altering it
D. erasing the intrinsic data
Answer:
c digitally altering it
A/an _____________ is a stored program that executes at a specified time. Group of answer choices stored procedure view trigger event
There are different kinds of program. A/an event is a stored program that executes at a specified time.
What is a Stored Program?This is known to be a program that is made up of one or plenty SQL statements that are saved in the database for future use.
The Four types of stored programs are:
Stored ProcedureStore FunctionTrigger EventConclusively, An Event is a program that is Executed at a scheduled or given time.
Learn more about program from
https://brainly.com/question/1538272
How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet
The security components of Internet describes how user's private data are used, who has access to them, which techniques and technologies protect them.
What are the security components of Internet?The security components of Internet can be defined as a strategic process that highlights and describes how all end user's private data and information are used, who has access to them, which techniques and technologies protect them.
Furthermore, the communications and preferences surrounding how an user's private data and information are handled describes are the security components of Internet.
Read more on security here: https://brainly.com/question/14286078
#SPJ1
Write the pseudocode for two modules which could be incorporated into the application planned for Lungi in Question 1. The first module must: a. Allow Lungi to enter the description and size of the blankets. b. Store the details entered in arrays. c. Provide Lungi with the option to view the list of blankets captured. If Lungi wishes to view the list of blankets, the contents of the arrays should be passed to another module. The second module should: a. Receive the arrays as arguments. b. Write the contents of the arrays to a text file that Lun
The sample pseudocode for the given question is:
ENTER #blanket size;STORE #blanket;DISPLAY "Do you want to see the blankets captured?" #answer;IF #answer: "Yes";What is a Pseudocode?This refers to the informal language that is used by computer programmers to produce an algorithm and is an important step in problem-solving.
The complete pseudocode is:
THENDISPLAY #blanketELSEENDRead more about pseudocodes here:
https://brainly.com/question/24735155
#SPJ1
A ________ is a type of virus that self-propagates using the internet or other computer network.
Answer:
A computer worm
Explanation:
.....................................
Web are websites that allow people to congregate online and exchange views on topics of common interest.
a. True
b. False
Answer:
B
Explanation:
B. False a web is not a Website
Post-production editing can only occur on a Mac computer, not a PC.
True
False
Answer:
false there is no real difference that would affect post production
A company notices their software is prone to buffer overflow attacks. They choose a popular development environment, Microsoft Visual Studio, to help avoid future attacks. What development environment feature would most help the company avoid future buffer overflows
Answer:
Compiler Option
Explanation: These help prevent buffer overflow attacks
Which of the following media forms is the Federal Communications Commission able to regulate content on?
a. FM radio
b. AM radio
c. television stations
d. the Internet
d. satellite radio
Answer:
-FM radio
-AM radio
-television stations
Explanation:
D. It's based on command and control models
5. The best way to support the growth of social media in your organization is to:
A. Develop a social media policy and strategy
B. Allow anyone in your organization to post on your organization accounts
C. Only repost/share information from other organizations in your organization accounts
D. Only post on your accounts during an emergency
The best way to support the growth of social media in your organization is to Develop a social media policy and strategy.
What is Social media policy?A social media policy is known to be the rules and regulations that are used in policing the use of social media.
Conclusively, They help to give advise to any person, etc. who is acting as a representatives of a firm on the right use of social media and thus the The best way to aid the growth of social media in your firm is to develop a social media policy and strategy.
Learn more about social media policy from
https://brainly.com/question/3653791
The UNIX-based operating systems use ________ as a delimiter between parts of a pathname; Windows operating systems use ________
The UNIX-based operating systems use Linux as a delimiter between parts of a pathname; Windows operating systems use Microsoft.
What is operating system?An operating system is a piece of software that controls and manages computers such as smartphones, tablets, computers, supercomputers, web servers, automobiles, network towers, smart watches, and other similar devices.
It is the operating system that makes it unnecessary to know a coding language in order to interact with computers.
Thus, Linux and Microsoft are correct options.
For more details about operating system, click here
https://brainly.com/question/11220987
#SPJ1
flexibility
user control
mouse-free input
text alternatives
balance
enabling the user to change the font
and other elements on the page
enabling navigation for visually
impaired users who may rely
only on keyboards for pointing
and clicking
allowing blind users to understand
website images and video
allowing a web page to adjust
to different devices and screens