is monitor is a television​

Answers

Answer 1

Answer: Can you rephrase the question

Explanation:


Related Questions

Your organization's IT department has developed a custom application that reports the hostname of each client that tries to access three servers in the accounting department that store sensitive information. You do a random test and find that the program is not reporting the host names for some clients even though it properly records their IP addresses. This is because the custom application submits reverse lookup requests to the DNS server to discover the host names for the specified IP addresses. As you investigate further, you learn that the clients whose hostnames could not be reported have static IP addresses and are on subnet 192.168.3.0. What should you do

Answers

Answer:

Configure DC1 to forward name resolution requests to 192.168.3.0

Explanation:

DC1 is configured in order to use forwarders so that they can send unresolvable host name requests to a DNS server at the main office or the head quarters.

This also prevent sending of DNS spoofing attack  to a DNS client

Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures

Please help ASAP

Answers

Answer:

clip art

Explanation:

i hope this helps you

java Consider the following problem statement. A cookie recipe calls for the following ingredients: 1.5 cups of sugar 1 cup of butter 2.75 cups of flour The recipe produces 48 cookies with this amount of the ingredients. Write a program that asks the user how many cookies he or she wants to make, and then displays the number of cups of each ingredient needed for the specified number of cookies. Format your output nicely that all numbers and decimals align as shown in the example! Limit decimals to four digits.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a program that asks the user how many cookies they want to make. Then it adjusts the original recipe based on the ratio of the original amount of cookies it makes to the amount the user wants. Finally, passing the output of the new adjusted recipe to the user. Due to technical difficulties, I have added the code as a txt file attached below.

Which term collectively describes hard disks, CDs, and flash drives?

Answers

Answer:

Auxiliary storage

Answer. Answer: Auxiliary storage is the term collectively describing the hard disks, CDs, and flash drives. Auxiliary storage is any storage which is made available through input / output channels to the device.

The part of an HTML document where the CSS file is linked is the..?
A) body
B) footer
C) header
D) paragraph

Answers

Answer:

C) header

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head.

The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.

On the other hand, the body of a HTML document contains the contents or informations that a web page displays.

Hence, the part of an HTML document where the cascaded style sheet (CSS) file is linked is the header. A style sheet can be linked to an HTML document by three (3) main methods and these are;

I. External style.

II. Inline style.

III. Embedded (internal) style.

Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have to a top-secret file?

A. ACE
B. DAC
C. MAC
D. RBAC

Q2. Which physical access control uses a portable device that authenticates a person's identity electronically by storing some sort of personal information?

A. Infrared scanners
B. Hardware security tokens
C. Biometric devices
D. Keypads

Q3. Which implementation of Network Access Control grants access depending on a specific job role?

A. DAC
B. RBAC
C. MAC
D. PAC

Q4. Which implementation of Network Access Control is more relaxed, allowing users to determine file access privileges?

A. AAC
B. MAC
C. DAC
D. RBAC

Q5. Which type of access control sets the standard for the way security actions unfold?

A. Identity
B. Management
C. Physical
D. Technical

Answers

Answer:

1. MAC

2. Biometric Devices

3. RBAC

4. DAC

5. Management

Explanation:

Q.1) Option c) MAC

Q.2) Option c) Biometric devices

Q.3) Option b) RBAC

Q.4) Option c) DAC

Q.5) Option b) Management

What is MAC ?

The ability of individual resource owners to allow or refuse access to resource objects in a file system is constrained by the security measure known as mandatory access control (MAC).

What is a biometric device ?

An authentication and security identification tool is a biometric gadget.

What is RBAC ?

Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system.

What is DAC ?

The idea behind discretionary access control is to limit access to things based on who the subject is.

Therefore, MAC, biometric device, RBAC, DAC and Management access control sets are some of the measures for network security and access control.

You can learn more about network security from the given link

https://brainly.in/question/33317398

#SPJ2

Select the correct answer.
A student is browsing a website. While browsing, he clicks on a link that takes him to another website. Which code gives the correct format of the
external link?

Answers

Answer:

(B) because on a website IT HAS TO HAVE "WWW." first

why people shouldnt get married​

Answers

Well it depends if your thinking! I know many reasons why people should get married but I also know many reasons why people shouldn’t get married!

For an example if you are a man and you don’t want to get married, well I think it’s 50% wrong and another 50% right cause if you want to enjoy life and not be stuck with the same wife you wouldn’t get married, but now think of having a family when you get married you receive a blessing, cause you will have son , daughters and a wife who will support you all the time!

Question Mode Matching Question Match the following description with the appropriate programming language generation. 1GL 1GL drop zone empty. 2GL 2GL drop zone empty. 3GL 3GL drop zone empty. 4GL 4GL drop zone empty. 5GL 5GL drop zone empty. Extremely advanced. Uses statements (scripts) rather than algorithms. High-level programming language. Uses a compiler to convert into machine language. Machine language. Represented by a series of 1s and 0s. Assembly language. An assembler converts 2GL into machine language. Specifically designed for creating database management programs.

Answers

Answer:

1GL: Machine language. Represented by a series of 1s and 0s.

2GL: Assembly language. An assembler converts 2GL into machine language.

3GL: High-level programming language. Uses a compiler to convert into machine language.

4GL: Specifically designed for creating database management programs.

5GL: Extremely advanced. Uses statements (scripts) rather than algorithms.

Explanation:

Programming languages started as a series of binary digits (i.e. 0's and 1'). This generation of language is referred to as the first generation.

However, the machine language were difficult to read by human, so mnemonics were created (i.e. assembly language). This language uses symbolic codes such as ADD for addition, etc. This is the second generation

The third generation are the high level languages that uses languages that can be easily understood by human, e.g. + means plus. However, the language must be translated; hence the need for a compiler or interpreter, as the case may be.

The fourth and fifth generations are extensions of the third generation languages. The fourth were created to connect to DBMS while the fifth are more advanced.

What
are the
difficulties associated with the machine level and assembly
languages ?​

Answers

Answer:

kalo cha

Explanation:

tero bau ra tesko

Which media example would be best for mayas presentation

Answers

Answer: c. a diagram that explains the steps involved in photosynthesis

Explanation:

The best graphic to use would be one that explains the processes involved in the process of photosynthesis. The best option is therefore the third one as it would actually show useful information on what photosynthesis is and how plants use it to get energy.

The first option would not educate anyone on what photosynthesis is as it does not talk about the process. The second and fourth options are the same.

does anyone know how to skip the video on e2020?

Answers

You can’t.

You can usually skip the last 10-20 seconds. If you click on the button that says next repeatedly you can skip a few seconds. That’s the most you can do though :/

Answer:

you can't

Explanation:

1.This check tests whether the data obeys specified criteria.Immersive Reader

Format check

Consistency check

reasonableness check

Data type check

Answers

Format check !!!!!!!!!!!!!!!!!.....

Noah would like to center and underline the title. Which of the following steps should Noah follow?
Type the title, select the underline command, and select the centering command.
Type the title, highlight the text, and select the centering command.
Type the title, highlight the text, select the underline command, and select the centering command.
Type the title, drag across the text with the mouse, and select the underline command.

Answers

Answer:

Option 3 - Type the title, highlight the text, select the underline command, and select the centering command.

Network Address Translation (NAT) technology provides a major benefit for which of these network problems

Answers

Answer:

Address being exhausted

Explanation:

Network Address Translation (NAT) technology is a technology which has been very beneficial to the IPv4 network systems.

Its major function is that it provides a whole lot of options and ensures that the address isn’t exhausted. This difference sets the IPv4 system apart from other systems whose addresses got exhausted and led to the creation of the IPv4.

why is this code giving me syntax errors on the colons and on print
print("Press enter to start program")
mark = input()
speed = int(input(Enter Mark")
if mark = >60+
print("Passed")
elif 1 <= mark >= 40:
print (“FAILED")

Answers

Answer:

Explanation:

You did not give double quotations in Enter Mark part

you did not give colon in if mark = > 60 :

Searching for Venom !!

help me find him lol​

Answers

Answer:

Venom is widely distributed taxonomically, being found in both invertebrates and vertebrates; in aquatic and terrestrial animals; and among both predators and prey.

Explanation:

[tex] \red{hope \: u \: find \: venom \: asap}[/tex]

Explanation:

[tex]are \: you \: searching \: for \: me \: [/tex]

Identify the error and write correct HTML program 5
Cyber Bullying Tips<\head>
Don’t Respond Talk to a trusted adult
<|html>

Answers

Answer:

1. <BODY background = ‘‘red”>

2. <FONT type =‘‘arial ”>

Explanation:

Answer:

<html>

<head> Cyber Bullying Tips </head>

<body>

Don't Respond, Talk to a trusted adult

</body>

</html>

Hope this helps!

You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems

Answers

Answer:

interference

Explanation:

The most likely reason for the connectivity problems is interference. This interference can be caused by many factors but in this scenario the most likely factor would be the metal studs and all the metal used to create the ceiling/floor. Metal is a huge interference when it comes to wifi signals. Depending on the type of metal and the amount it can greatly diminish the signal strength or even completely prevent the signal from passing to it's destination, regardless of how close the destination device is located.

a DVD looks just like a CD, but it holds less information​ true or false

Answers

Answer:

False

Explanation:

A DVD can hold more information because it is basically a double sided CD where it gets information on both sides whereas on a CD, you only read one side. On CDs, people can put stuff like stickers or whatever on one side while the important side is uncovered.

Question 3
There was a thunderstorm in your area and the power went out.
The traffic lights are not functioning.
• What is the first thing the law requires you to do when you arrive at an intersection?
Explain what you should do if there is an officer directing traffic.
.

Answers

The Answer Should Be:

The first thing for you to do when you arrive at an intersection is to stop at the traffic light. Your going to want to listen to the instructions or signals of the traffic Police.

I Hope This Helps? :)

the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m. ​

Answers

The computers that communicate with each other are called [tex]\sf\purple{transmission \:control\: protocol\: (TCP)}[/tex].

[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}[/tex]

Type the correct answer in each box. Spell all words correctly. What is the name of the process of checking the client's production environment to ensure software and hardware compatibility with new products? The process of checking the client's production environment to ensure software and hardware compatibility with new products, is known as .

Answers

Answer: Software testing

Explanation:

Software testing refers to testing for the compatibility of the client's device with the software or hardware product being offered.

In order for the client to be able to use the software, it needs to be compatible with both the software already in the client device as well as the hardware. If it isn't, the product will not be able to add much value to the client's device which would mean that it is not fulfilling it's required functions.

Using filtering as a strategy to deal with information overload requires Group of answer choices reviewing all unsolicited information presented. determining what information you may need and what information merits attention. using Wikipedia to verify information. disconnecting from sources of information completely. requesting references for all undocumented information.

Answers

Answer:

The answer is "Choice B"

Explanation:

Please find the complete question in the attached file.

A filter is a tool for removing undesirable parts. Eliminate solid from a fluid, for example. The filter may mean the filter action: it could be used as a verb. When the filter is mentioned, various branches of science and technology often refer to a certain type of device. Filtering tries to decide the data you need and the data you have to address the overload.

It is good for your eyes to look away from your computer screen (look at something far away) at least once an hour

Answers

i think this is true because my eyes start hurting after a while too

Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.​

Answers

The answer is A hope I helped
The answer would be a

What is one common way to select a package name for a project?

Select one:

a.
Use a company's domain name for uniqueness


b.
Use a very short name to save typing


c.
Use a secret phrase like a password


d.
Use an encryption key for security

Answers

Answer:

Jeez idrk

Explanation:

Akkaqka

que es eset internet security???

Answers

Answer:

Antivirus y Antiespía

Explanation:

ESET Internet Security ofrece protección contra todo tipo de amenazas, incluso de las más recientes, gracias a su protección proactiva, y evita que éstas puedan robar información o se propaguen a otros equipos.

I have no clue but que pasa 6 x8 = 647
666+56+8#9+

What is the biggest difference between traditional and digital cameras?
Many inventions have enabled us to use digital cameras. The biggest difference between traditional and digital cameras is that digital cameras do not use

Answers

Answer: a film roll/ film

Explanation:

There are many differences between a digital and a traditional camera such as the fact that digital cameras use LED displays, megapixels and don't have to have pictures developed but perhaps the biggest difference is that digital cameras do not have to use a film to store pictures like a traditional camera does.

Digital cameras have SD cards for storage which allows them to take way more photos than a traditional camera can as traditional cameras are limited by the space in the film roll.

Rinaldo and his game design team have

Answers

Answer:

HAVE DA baby

Explanation:LLLLLLLLLLLLLLLLLLLLLETS GOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO

Other Questions
The point D(-4,-2) Is rotated 180 counterclockwise around the origin. What are the coordinates of the resulting point, D' ? Assume that a standard number cube is rolled.Find the theoretical probability of each event to the red box that has the correct solution Can someone please solve this? A french opera composer and a pianist , one of his most popular composition is entitled "CARMEN" . He is non other than ___________________________. Suppose that you collect a random sample of 250 salaries for the salespersons employed by a large PC manufacturer. Furthermore, assume that you find that two of these salaries are considerably higher than the others in the sample. Before analyzing this data set, should you delete the unusual observations A tool box has the dimensions of 9 in by 3 in by 5 in. If Jesse plans to double all three dimensions to build a larger tool box, he believes he would double the volume of the tool box. Is he correct? Question 1 of 10Classify the following triangle. Check all that apply.606060O A. IsoscelesB. EquilateralO C. ScaleneO D. AcuteE. Right Running headings in MLA format should contain the new round of warfare between the Sioux and U.S. Army began in 1874 when a Colonel George Custer led an expedition to Little Big Horn, Montana. b Sioux Chief Crazy Horse began an effort to drive all whites from Montana and the Dakotas. c Colonel George Custer discovered gold on Sioux land in the Black Hills. d the federal government announced that it was opening all Sioux lands to settlement. e the U.S. Army decided to retaliate for the Fetterman massacre. HELPPLS! BOTS STAY AWAY!! The mean amount of money withdrawn from a bank ATM on a particular day was $120. If Lauren withdrew $80 and her z-score was -3.2, what was the standard deviation for the amount withdrawn that day? Which expressions are equivalent to the one below? Check all that apply.log 2 - log 6A. log(2) + log(1/6) B. log 2C.log(1/3)D. log 3 a home improvement store charges $20 to rent a small truck for 1 hour . Each additional hour costs $25 . There is also a fuel surcharge of $0.05 for each mile driven .How much will it cost to rent the truck for 4 hours if it is driven 30 miles Write an equation for the nth term of the arithmetic sequence. -6,-9,-12,-15 True or false pastoralism is one of subsistence agricultural? 2 x 12 divided by (2 + 6) +2^3 Solve for m.13 =2m+513=2m+5 Which of the following was the precursor to the formation of the FBI? A. the Fourteen Points B. the Palmer Raids C. the Red Scare D. the Sacco and Vanzetti trial Will someone help me out with my English assignment, please?Rewrite each of the following sentences to illustrate parallel structure.1. We have begun to exercise more, to get regular check-ups, and dieting.2. To go on picnics, taking part in sports, and vacationing with my family are my favorite summer activities.3. The concert made many new friends for us, attracted a great deal of publicity, and that it earned a lot of money.4. Our coach excels in setting possible goals for us and then to praise us for reaching them.5. This rodeo performer has won awards in seven states for bull riding, calf roping, and he does barrel racing.6. The walnut shelf by the window is for trophies, portraits, and where I like to display dishes.7. The two things I liked most about the class were that it had a great teacher and discussing philosophy.8. My Aunt Pauline has a reputation for her oyster dressing, cole slaw, and baking blueberry muffins.9. John makes a great pot of coffee, he tells a good story, and listening to anyone's problems with a sympathetic ear.10. Each boy had a different problem: Fred, shin splints; Ralph, torn ligaments; Jack, a shoulder separation; Tom, sneezed and coughed.11. Application Activity Consider the balanced equation below.PC13+ Cl2 PC15What is the mole ratio of PCI3to PCI5?1:12:13:55:3 You are an aquatic biologist studying a small lake. The stream that drains into this lake runs by croplands. You are detecting a pesticide called atrazine in the insects and worms that live in the lake. The predatory birds such as herons and egrets have very high concentrations of atrazine in their blood. The birds prey on the frogs and small fish. What condition best explains the high atrazine level in the birds?