When purchasing a security program, you must make sure that _____. Select 2 options.

it can be implemented quickly

it can be easily adopted

it hinders operational efficiency

the employees are not involved

it is complex and complicated

Answers

Answer 1

Answer:

1 ans 3

Explanation:

Answer 2

Answer:

- it can be implemented quickly

- it can be easily adopted

Explanation:

When selecting a security program to purchase, you should want to ensure its efficiency. Correct on Edge.

I hope this helped!

Good luck <3


Related Questions

Someone tell me the answer who thanks who ever who

Answers

Answer:

2. Trumpets,Guitar,Drums,Harp,Piano

3. The music notes and variety of colors and the melodies lines

4. 1 thing that needed change is maybe, it needed more intruments.

Which string method returns true if the character is a lowercase letter?

letter = input("Enter a letter: ")

islower(letter)

isLower(letter)

letter.islower() * is correct

letter.isLower()

Answers

The right answer is : is.lower(letter)

Answer: islower(letter)

Explanation: got it right on edgen

A timer is set after each frame is sent before waiting an ACK for that frame, how long does the timer take to be expired?

Answers

A timer needs to be set after each frame is sent before waiting an ACK for that frame. The length of time it takes for a  timer take to be expired depends on only when the first outstanding frames has expires first.

Some do take 5 min., 10 minutes, or even 48 hours while others depends on what the sender has set.

What is A timer is set after each frame about?

A sender is one that is not entitled  to hold a timer for each frame. It has to hold a single timer.

When a  the timer expires, the sender can then  resends all the frames whose ACK has not been seen or received yet. The sender often starts the timer at the time it is sending the first frame , and because of that, it is only when the timer for the first set frames expires before the sender can resend any other outstanding frames.

Learn more about timer from

https://brainly.com/question/25800303

Given the string “supercalifragilisticexpialidocious”.
1. What is the length of the string i.e. write the script to find the length? (2 points)
2. Find the sub-string of first 5 positions and the other sub-string with last 5 positions. (4 points)
3. Find how many times “i” occurs in this word in python

Answers

The string and the three instructions is an illustration of the python strings

The length of the string

The following instruction calculates the length of the string using the Python script:

len("supercalifragilisticexpialidocious")

The returned value of the above instruction is: 34

The substrings

The following instruction calculates the sub-string of first 5 positions and the other sub-string with last 5 positions

myStr[:5]+myStr[-5:]

The returned string of the above instruction is: "supercious"

The number of occurrence of i

The following instruction calculates the occurrences of i in the string

"supercalifragilisticexpialidocious".count("i")

The returned value of the above instruction is: 7

Read more about python strings at:

https://brainly.com/question/13795586

write a C++ program to print name, age, class, school​

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   string name;

   string age;

   string Nameclass;

   string school;

   cout<<"What is your name?\n";

   cin>>name;

   cout<<"What is your age?\n";

   cin>>age;

   cout<<"What is your class?\n";

   cin>>Nameclass;

   cout<<"What is your school?\n";

   cin>>school;

   cout<<"Name: " + name;

   cout<<"\nAge: " + age;

   cout<<"\nClass: " + Nameclass;

   cout<<"\nSchool: " + school;

   return 0;

}

Explanation:

Create a file using any word processing program or text editor. Write an application that displays the files name, containing folder, size, and time of last modification. Save the file as FileStatisits.java

Answers

Explanation:

TO MAKE FOLDER

-right click

-select 'new'

-and click on folder

As a high school student, what do you think is the advantage of someone who has knowledge about the basics of internet compared to those who have not yet experienced using it?

Answers

Answer:

For your future in your career, you will definitely have an upper hand and will be able to access and use more tools.  But the person that has never used a computer before does not know what exactly they are missing.  When they try to use a computer, they will struggle with simple task that now come naturally to you.

Explanation:

Suppose that you have a computer with a memory unit of 24 bits per word. In this
computer, the assembly program’s instruction set consists of 198 different operations.
All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
1. How many bits are needed for the opcode?
2. How many bits are left for the address part of the instruction?
3. How many additional instructions could be added to this instruction set without
exceeding the assigned number of bits? Discuss and show your calculations.
4. What is the largest unsigned binary number that the address can hold?

Answers

Answer:

a )   The amount of bits required for the opcode

 8 bits

2^8=  256        

 256>198

 We get the next lower number, which is 2^7 = 128 bits, because it is greater than 198. As a result, the operation code necessitates 8 bits.

b)   The number of bits reserved for the instruction's address.

 16 bits

 24-8  =  16

c)  

 65536

2^16  =  65536

 Maximum number =  65535

  2^15 = 32768-1

 =  32767

Explanation:

how bridges are built over water

Answers

It’s all depending on what method

List and describe in detail any four power management tools that were developed by at
least two manufacturers to prevent and/or reduce the damage of processors from the
process of overclocking. Your answer must also include the manufacturers name

Answers

Power management tools is a kind of technology that enables the efficient and optimized management of the power that is consumed by computer hardware.

What is the purpose of a power management tool?

The key purpose of a power management tool is to help:

minimize power consumption;save costspreserve the optimal performance of the system.

Examples of power management tools are:

Signal chain PowerADI Power StudioLTpowerPlay, etc.

Learn more about Power management tools at:
https://brainly.com/question/12816781

do you think film is a great media in exposing information?​

Answers

not really everything don’t need to be on the internet

Answer:I think film is a great media in exposing information

Explanation:Films are great for exposing information for many reasons. Films are long, which increases the chance the watcher will remember, also it makes the watcher more involved and more interactive

The quickest way to change a word is to double
click it.
Select the correct answer
O True
False

Answers

Answer:

I don't think that the fastest way to change a word is to double click it. Even though it highlights it super fast, then you just press backspace once, it doesn't compare to the one where you press the "ctrl" and "backspace" key at the same time, and it makes the whole entire word disappear in the blink of an eye. But, I am not sure if anybody really knows about this trick. So, it is 50/50.

Explanation:

:)

When you run your Windows Form application, what is the lifespan of a global variable (also known as a "field" or "class" variable)?

Answers

The lifespan of a global variable (also known as a "field" or "class" variable) exist only until any additional classes are initialized.

What is Windows form application?

Windows Forms is defined as a form of UI backbone that is often uused for creating Windows desktop apps.

It is known to help its user in a lot of ways to produce or make  desktop apps using  the visual designer given in Visual Studio. It has a lot of Functionality such as drag-and-drop placement of visual controls and others.

See full question below

When you run your Windows Form application, what is the lifespanof a global variable (also known as a “field” or “class”variable)?

a. during the initial click button event

b. global variables only exist if they are constants

c. only until any additional classes are initialized

d.as long as the form is running

Learn more about Windows  from

https://brainly.com/question/26420125

Which statement best characterizes under what circumstances you should add your social media profile to a resume? You should add your profile even if it is not entirely professional. You should add your profile even if it is not entirely professional. You should add your profile, but it should be entertaining and help you stand out. You should add your profile, but it should be entertaining and help you stand out. You should not add your profile under any circumstances—it is unprofessional. You should not add your profile under any circumstances—it is unprofessional. You should add your profile, but it should be professional and positive.

Answers

Answer:

You should add your profile, but it should be professional and positive.

Explanation:

this is the most reasonable response... resumes are for careers and professions.. so you must be professional and positive (if it is for example linkedin)

CHALLENGE
ACTIVITY
1.6.1: Defining a class constructor.
Write a constructor with parameters self, num_mins and num_messages. num_mins and num_messages should have a default
value of 0.
Sample output with one plan created with input: 200 300, one plan created with no input, and one plan created with input: 500
My plan... Mins: 200 Messages: 300
Dad's plan... Mins: Messages: 0
Mom's plan... Mins: 500 Messages: 0

Python please

Answers

Coding:

class PhonePlan:

 

   def __init__(self, minutes=0, messages=0):

       self.num_mins=minutes

       self.num_messages=messages

   def print_plan(self):

       print('Mins:', self.num_mins, end=' ')

       print('Messages:', self.num_messages)

my_plan = PhonePlan(int(input()), int(input()))

dads_plan = PhonePlan()

moms_plan = PhonePlan(int(input()))

print('My plan...', end=' ')

my_plan.print_plan()

print('Dad\'s plan...', end=' ')

dads_plan.print_plan()

print('Mom\'s plan...', end= ' ')

moms_plan.print_plan()

Have a great day <3

s to write a Python-program that uses training data to choose the four ideal functions which are the
best fit out of the fifty provided (C) *.
i) Afterwards, the program must use the test data provided (B) to determine for each and every x-ypair of values whether or not they can be assigned to the four chosen ideal functions**; if so, the
program also needs to execute the mapping and save it together with the deviation at hand
ii) All data must be visualized logically
iii) Where possible, create/ compile suitable unit-test
* The criterion for choosing the ideal functions for the training function is how they minimize the sum of all ydeviations squared (Least-Square)
** The criterion for mapping the individual test case to the four ideal functions is that the existing maximum
deviation of the calculated regression does not exceed the largest deviation between training dataset (A) and
the ideal function (C) chosen for it by more than factor sqrt(2

Answers

Use the knowledge in computational language in python is possible write the data about a function and the summation.

How to define function in Python?

In Python, a function is a sequence of commands that performs some task and that has a name. Its main purpose is to help us organize programs into chunks that correspond to how we envision a solution to the problem.

So in an easier way we have that the code is:

def plus(a,b):

 return a + b  

class Summation(object):

 def sum(self, a, b):

   self.contents = a + b

   return self.contents

sumInstance = Summation()

sumInstance.sum(1,2)  

See more about python at brainly.com/question/18502436

Which item is used in Excel to identify the row of a particular cell?
letter
number
type
sheet

The answer is B) number

Answers

Answer:

B) number

Explanation:

you are correct! for instance the cell E3 has the column E and the row 3

List one unprofessional AND one professional example of internet/social media

Answers

Professional: Using social media to advertise a company you created

Unprofessional: Using social media to watch cat videos

The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.

What is social media?

A social media is given as the network that forms the connections of the individuals over the internet. It enables the user to connect irrespective of borders.

The use of social media has been professional and unprofessional both. The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.

Learn more about social media, here:

https://brainly.com/question/9564823

#SPJ5

When you are hired to develop a system for an organization. Is it important to follow all the requests/wants of the system owner rather than of the system user?

Answers

If you are hired to develop a system, note that Is it vital to follow all the requests or needs of the system's owner.

The company knows what they want and it is good you do comply with their directives. You can only give your suggestions if need be.

Who can develop an information system?

The information systems field is one that is made up of people in organizations that are skilled and can design and build information system.

Note that to be  hired to develop a system, one has to follow all the requests/wants of the system owner instead of the system user as the one who needs it knows what he or she wants so you have to comply with it. You can only give your suggestions.

Learn more about system from

https://brainly.com/question/13603602

when doing a complex presentation which of the fallowing will be the best tool to begin designing your presentation

Answers

Answer:

Explanation:

The options are:

a) Open Office Writer

b) Open Office Impress

c) an outline

d) photographs

The most commonly used presentation software is Microsoft PowerPoint but it is not always available; as is the case here. Of the options, Open Office Impress is the closest in its functions to PowerPoint and is a good tool to design a complex presentation.

A processor accesses main memory with an average access time of T2. A smaller cache memory is interposed between the processor and main memory. The cache has a significantly faster access time of T1

Answers

For any single memory access, the theoretical speedup to access a word stored in the cache rather than in main memory is given by:

[tex]Speedup=\frac{T_2}{T_1}[/tex]

Given the following data:

Access time = [tex]T_1 < T_2[/tex]

What is cache?

Cache can be defined as a random access memory (RAM) that is used by the central processing unit (CPU) of a computer system to minimize (reduce) the average time taken to access memory (AMAT).

For any single memory access, the theoretical speedup that would be used by the processor to access a word stored in the cache rather than in main memory is given by:

[tex]Speedup=\frac{T_2}{T_1}[/tex]

Where:

[tex]T_2[/tex] is the time to access in main memory.[tex]T_1[/tex] is the time to access in cache.

Read more on processor here: https://brainly.com/question/5430107

You're a consultant for a large enterprise that needs a comprehensive IP addressing and DNS management solution for its physical and virtual networks. The enterprise has a primary office in Pittsburgh and three branch offices in Los Angeles, New York, and Miami. It has IT support staff only in the branch offices.The enterprise's server specialists are located in Pittsburgh. The IT directory in Pittsburgh wants to offload some of the IPAM management functions to some of the IT staff without giving them broader domain or forest administrative right. Which type of IPAM architecture do you recommend? Which features of IPAM are you likely to recommend using to address the requirements?

Answers

The type of IPAM architecture that I will recommend is the Centralized IPAM. The centralized IPAM server when deploy can help to address the issue.

What is IPAM?

IPAM (IP Address Management) is known to be a kind of administration of DNS and DHCP. This is known to be a network services that helps and handles IP addresses to machines in a TCP/IP network.

The Centralized Repository can help administrators to maintain or keep a good, correct and current records of all their IP assignments and left over addresses.

Learn more about IPAM from

https://brainly.com/question/24930846

Service provided by multiple servers acting in parallel is referred to as: a. Multiple-phase queuing system b. Multiple-channel queuing system c. Multi-delivery servicescape d. Multi-platform servicescape

Answers

Service provided by multiple servers acting in parallel is referred to as Multiple-channel queuing system.

What is Multiple-channel queuing system?

The multi channel queuing problems is known to be a system where each of the stations is known to often deliver the same type of service and they are said to be equipped with the same kind of tools.

Conclusively, A multi-channel, is said to be a single-phase business that is composed of different servers and also has a one-step servicing process.

Learn more about Multiple-channel from

https://brainly.com/question/17137414

5. How would you reorder the animation on a slide using the Animation
Pane?

Answers

Answer:

undo button

Explanation:

I hope this helps

state the name of the following computer components​

Answers

Answer:

Memory.

Hard Drive or Solid State Drive.

Video card.

Motherboard.

Processor.

Power Supply.

Monitor.

Keyboard and Mouse.

Explanation:

Memory
Hard Drive or Solid State Drive
Video card
Motherboard
Processor
Power Supply
Monitor
Keyboard and Mouse
Optical Drive DVD/RW
Ethernet or Wireless card


Central Processing Unit (Cpu)
Random Access Memory (Ram)
Motherboard
Solid State Drive (Ssd)
Three
Games User Interface
Floppy Drive
Conclusion
The Motherboard
Usb Ports
Hardware And Software
Disk Drive
Optical Disk Storage
Scsi
Laser Printer
Processing Devices
Keyboard And Mouse
Lcd
Internal
External
Stylus
Code
Non Volatile Memory
Utility Software

You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What language is the code in and does it seem likely to be malicious? import os, sockets, syslog def r_conn(ip) s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM) s.connect(("logging.trusted.foo",514))

Answers

The code below is written in JavaScript and does not seem malicious.

What is a Malicious Code?

A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of

harming the workstation; or destroying the data stored therein.

There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.

Learn more about JavaScript at:
https://brainly.com/question/16698901

How many bit positions to borrow from the host address field to subnet the network address 169.67.0.0 exactly into 5 subnets

Answers

Answer:

send me the opportunity to work with you and your family and friends and family are doing well and that you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient

Complete the sentence.
For self-driving cars, both the programmers of the software and governments who regulate them must adhere to
intellectual property laws
ethical principles
noncompete agreements
- to safeguard that the software that controls the car is capable of making life-or-death

Answers

Answer:

[ C ]  governments who regulate the car industry

[ D ]  the programmers who create the software that control the car

Proof:

Governments who regulate the car industry, the programmers who create the software that control the car are the complete sentence.

What is car industry?

Car industry is the place where the manufacturing of the cars and automobile parts are placed. Car industry  do manufacturing work for the selling purpose. The company may be directly or indirectly engage in the selling industry.

Thus, sentences are completed.

For more details about car industry, click here:

https://brainly.com/question/1139792

#SPJ2

Question 2:
(5 marks)
According to the following code; you are required to draw the flowchart in details with
clear sequences
message=input("enter yes if there is message in the inbox");
attached=input("\n enter yes if there is attachment");
inbox=eval (input ("enter number of email"));
while inbox > 0:
if message=="yes":
print ("extract the message");
if attached=="yes":
print("extract the message");
email=input("eneter v for valied or not");
if email=="V":
print ("extract attached ");
print("inject Job ");
print("inject Submission");
en email=="N":
print("Inject an error");
print ("Remove the inbox mail ");
inbox-inbox-1;
DIO:
print("stop")

Answers

Flowcharts are visual representations of a code or program segments

How to draw the flowchart?

To draw the flowchart, we make use of the following symbols and figures

Oval: To begin and end the flowchartParallelogram: To accept input for the message, attached, inbox & email variables Parallelogram: To display all outputsRectangle: To perform the arithmetic operation; inbox = inbox - 1Diamond: To make several decisions and to initiate a loop process

See attachment for the flowchart that represents the code

Read more about flowcharts at:

https://brainly.com/question/24735155

Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?

Answers

Answer:

Explanation:

some distros like ubuntu do not even allow su to switch to root. furthermore the su to root is dangerous because the user becomes the all-powerful administrative account, so no warnings are issued if the application team user tries to do something system-breaking.

Other Questions
The Shah family basement floor is shaped like a tropezoidal. The basement has sides of 36 feet and 24 feet and two sides of 21 feet. They are going to carpet the basement. The carpeting will cost $35 per square yard. What is the area, in square feet, of the basement floor? 6. Do you like chocolate...... vanilla ice cream better? 7. I have to go to work at six,...... I'm waking up at four. 8. I was on time,...... everyone else was late. 9. Nadia doesn't like to drive,....... she takes the bus everywhere. 10. Our trip to the museum was Interesting,...... there were several new artifacts on display. Find the 51st term of the arithmetic sequence 29,9, -11, ... What type of gas absorbs and re-emits infrared radiation?. [tex]solve \: the \: following \: problems \: below[/tex]please answer it correctly I need It now please none sense report help me please. I'll give brainly, thank u >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Many wild theories were put forward. It was thought that the plaques must have come from ancient Egypt, or perhaps that the people of Benin were one of the lost tribes of Israel. Or the sculptures must have derived from European influence (after all, these were the contemporaries of Michelangelo, Donatello and Cellini). But research quickly established that the Benin plaques were entirely West African creations, made without European influence. The Europeans had to revisit, and to overhaul, their assumptions of easy cultural superiority. A History of the World in 100 Objects, Neil MacGregor Which idea from the text is best supported by details in the passage? "Modern British life and culture now have a strong African component. " "All European visitors were struck by the Obas position as both the spiritual and the secular head of the kingdom. . . " "This plaque is dominated by the majestic figure of the Oba himself. " "[The plaques] changed European understanding of African history and African culture. ". What is the surface area of the Triangular Prism rounded to the nearest tenth?A)18.5 B) 36.9 C) 43.6 D) 87.2 READING"BLUEGRASS" is a genre of music......Character TraitsIdentify the character traits for each character and text evidence to prove yourthinking.TraitTextual evidenceCharacterJeremiahDennisAnnaMacPetey*Yes, Anna is turning into a zombie. That is not her character trait.*SETTINGworthing is incon Describe what you Find the measure of the missing angle in this triangle Write the equation for the cosine function for the ferris wheel ride, with where h, is the height in meters, and t, is the time in minutes. Is ( 1, 5) a solution to this system of equations? 7x+2y=13 4x+4y=14 Last year, there were n pies baked for the bake sale. This year, there were 228 pies baked. Using , write an expression for the total number of pies baked in the two years. what are the to majer branchs of economics Discuss the interdependence of the components of wellness.Lifetime Fitness on Edge Please help ASAP 100 points! need done asapAn unfair spinner has sections labeled 1 2 or 3 that are all twice as large as each of the sections labeled 4 5 or 6 Develop a probability model to describe all possible outcomes of one spin of the spinner Which organ system produces white blood cells to destroy pathogens (germs) and red blood cells to carry oxygen? O is the center of the regular pentagon below. Find its area. Round to the nearest tenth if necessary Five letter words starting with p and ending with e. PLEASE HELPHow did the Smoot-Hawley Tariff Act of the United States effect the global depression?1. This political action resulted in foreign trading being reduced by two-thirds in the 1930s. 2. Legislation like the Smoot-Hawley Tariff Act increased the value of European currency. 3. The Smoot-Hawley Tariff Act increased the value of the American dollar around the world. 4. Foreign trading partners were able to dump their surplus products on American markets.