Answer:
Explanation:
When do you need to apply for a federal student loan?
Answer:
Explanation:
In order to apply for federal student loans, you must fill out your FAFSA during a specific time. The federal deadline for completing your FAFSA is generally very forgiving — meaning that it comes very late in the school year.
bakit mahalaga ang pagtutugma ng iyong mga personal na salik sa minimithing karera
Answer:
Hi not able to understand your language
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.
Answer:
They are the same layer, only they are viewed through different conventions.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Each layer has its unique functionality which is responsible for the proper functioning of the communication services.
On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;
I. Application layer.
II. Transport layer.
III. Internet layer.
IV. Network layer.
This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.
Answer:
c
Explanation:
When did computer networking go beyond the walls of the firm?
Answer:
All kinds of computing devices such as tablets, PCs, or laptops feature a brain-like unit called the central processing unit or CPU. Your computer's CPU calculates and interprets instructions while you're surfing the web, creating documents, playing games, or running software programs.
Explanation:
BE CAREFUL OF SCAM LINKS HERE
check attached bcuz brainly freak block this
also i love u grammarly
Answer:
I know what the scam links look like and to be careful. Thanks for warning us though. Have a awesome day!
Explanation:
Answer:
have u watched euphoria
Explanation:
lol
Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:
Answer:
participle is singing
word it modifies is voice
write a program. in QBAsSIC
a to find product of two numbers
b to calculate sum of two numbers
c to calculate difference between two numbers
computer q qubasic can anybody help me plz
Answer:
The program is as follows:
5 INPUT A,B
6 PROD = A * B
7 PRINT PROD
8 TOTAL = A + B
9 PRINT TOTAL
10 DIFF = A - B
11 PRINT DIFF
12 END
Explanation:
This gets input for the two numbers
5 INPUT A,B
This calculates the product
6 PROD = A * B
This prints the calculated product
7 PRINT PROD
This calculates the sum
8 TOTAL = A + B
This prints the calculated sum
9 PRINT TOTAL
This calculates the difference
10 DIFF = A - B
This prints the calculated difference
11 PRINT DIFF
This ends the program
12 END
what are the answers for Quiz 7 answers computer science principles
Answer:
unknown
Explanation:
this sounds like it is very vague and could be confused with other tests, i do not know of any tests like this
another thing is you can ask each question, even though it would cost more points, it would be better in the long run, people with similar questions can find their answers easier, AND you can get the correct answer for each question with confidence
that and people are more willing to answer one question at a time then a whole quiz lol
not saying what you are doing is bad, its just impractical and not an easy way to go about this
hope you find the answers you need, have a great day/night mate :D
Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for her account. Which information should she look for in this document?
the info needed to log in
-This would show what is protected in the privacy policy and its related to you since it would show personal data.
-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.
Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.
so I believe that the word you are looking for is technology
Hope this helps
-scav
The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home. (9 letters)
Answer: Hazardous
Explanation: Hazardous materials should be kept somewhere safe.
Answer:
i believe it would be dangerious
Explanation:
True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.
Answer:
true
Explanation:
true true true true true
Two parter:
A.) What is wrong with the program segment below? The program does not contain syntax errors.
B.) Fix the programming error(s)
num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
Answer:
the variable num is not declared so the compiler doesn't define it.
add int before num:
int num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
now the code will run but it won't stop as it will never break the condition (num < 9).
Match the characteristics to the mobile operating system that it describes.
1. simple, user-friendly design Apple iOS
2. preferences personalized Microsoft
3. limited number of available apps Android
Answer:
1. is Apple's iOS
2. is Android
3. is Microsoft
You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem
Answer: Configure port security on the switch
Explanation:
Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.
When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.
Corinne would like to click on the link at the bottom of a Web page but she only sees the top portion of the page. She should _____. A.click twice on the status bar
B.use the scroll bar to scroll down to the bottom of the page
C.click on the back button
D.click on the display window and drag it up
Answer:
B
Explanation:
from 3dg3
Answer:
D.click on the display window and drag it up
Posts that you delete _____.
cannot ever be shared
will be released in five years
are still visible to others
may already have been shared
Answer: Below
Explanation:
n
How does an informal outline usually organize information?
A. With letters
B. With bullet points
C. With numbers
D. With Roman numerals
Write a recursive method named editDistance that accepts string parameters s1 and s2 and returns the "edit distance" between the two strings as an integer. Edit distance (also called Levenshtein distance) is defined as the minimum number of "changes" required to get from s1 to s2 or vice versa. A "change" can be defined as a) inserting a character, b) deleting a character, or c) changing a character to a different character. Call Value Returned editDistance("driving", "diving") 1 editDistance("debate", "irate") 3 editDistance("football", "cookies") 6
Answer:
Explanation:
The following code takes in the two parameters s1 and s2 and returns the Levenshtein distance of the two strings passed.
def editDistance(s1, s2):
m = len(s1) + 1
n = len(s2) + 1
arr = {}
for x in range(m):
arr[x, 0] = x
for y in range(n):
arr[0, y] = y
for x in range(1, m):
for y in range(1, n):
proc = 0 if s1[x - 1] == s2[y - 1] else 1
arr[x, y] = min(arr[x, y - 1] + 1, arr[x - 1, y] + 1, arr[x - 1, y - 1] + proc)
return arr[x, y]
Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.
security
what time of day you are online
protection of sensitive information
from which location you are accessing the site
Answer:
protection of sensitive information
Explanation:
Answer:
a c baka baddies
Explanation:
20 POINTS-
can someone help with this?
Answer:
large storage= data warehouse
data from daily= world wide
data storaage= transactional
online data= relational
I rlly don't know I'm kinda guessing here for don't take my word to heart it's been a bit since I've learned this
A radio and communications security repairer is responsible for both radio and satellite communication systems.
True
False
Answer:
The answer is true
Explanation:
I got it correct on the quiz
List two examples of following types of communication
Answer:
Explanation:
sign language is communication
touch is communication
Find what the secret message is. Get Brainliest if you are fast and correct.
Answer:
What does your digital footprint say about you?
Explanation:
Just follow the path from the end to the start, that's how I always get mazes.
Answer:
What does your digital footprint say about you?
Explanation:
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Answer:
The right approach is Option b (volume testing).
Explanation:
A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.Other options are not related to the given query. So the above is the right response.
What is Polymorphism in programming? Explain in your own words with examples.
Answer:
A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.
Explanation:
Answer:
Polymorphism is a feature of object-oriented
programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.
Explanation:
hope it helps
Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False
ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT
Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?
List three ICT tools that are commonly used in the education system?
Identify two ways in which ICT has impacted the education sector?
Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)
Explanation:
Hardware failure, power outages, and DOS attacks will affect:
data confidentiality.
data integrity.
data verification.
data availability.
Answer:
The answer should be data availability