The ______ is a far-flung network of computers, while the ______ is a system for the distribution and retrieval of electronic information.
A far-flung (widely distributed) network of computers is referred to as the Internet, while the world wide web (WWW) is a system that is designed and developed for the timely distribution and retrieval of electronic information.
The Internet is simply an abbreviation for interconnected network and it refers to a far-flung (widely distributed) network of connected computer systems that facilitates the following activities, through the use of the Transmission Control Protocol/Internet Protocol (TCP/IP):
Worldwide communication.The dissemination of information.The swift access to data resources and multiple databases.On the other hand, the world wide web (WWW) is a system that is designed and developed for the timely distribution and retrieval of electronic information.
Additionally, the world wide web (WWW) was invented in 1990 by Sir Tim Berners-Lee while he was working with the European Council for Nuclear Research (CERN).
Read more: https://brainly.com/question/21140502
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process called
Answer:
Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.
Explanation:
The process When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.
What is the Lightweight Directory Access Protocol?An open, supplier conditioning and reinforcement for providing distributed directories technology solutions over an IP network are called the Lightweight Directory Access Protocol.
By enabling the sharing of data about people, systems, networks, services, and applications throughout the network, directory services play a crucial role in the development of intranet and Internet applications.
LDAP is frequently used to offer a central location to store users and passwords. As a result, several software programs and services can connect to the LDAP server to verify users.
The interaction When LDAP traffic is made secure by utilizing a Secure Attachments Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.
More about the Lightweight Directory Access Protocol link is given below.
https://brainly.com/question/28364755
#SPJ12
Python: Write a program that prompts the user for a meal: breakfast, lunch, or dinner. Then using if statements and else statements, print the user a message recommending a meal. For example, if the meal was breakfast, you could say something like, “How about some avocado on toast?”
The program prompts user for the time of meal they will be having and a suggestion made on their behalf. The program is written in python 3 thus :
meal= input('your meal : ')
#prompts user to enter a meal type
if meal == 'breakfast' :
#check if it's breakfast
print('How about some Avocado')
elif meal == 'lunch' :
#checks if it's lunch
print('like some grapes?')
else:
print('would rice be ok?')
A sample run of the program is attached.
Learn more :https://brainly.com/question/25531734
What are the differences and similarities between computer virus and biological virus
Explanation:
computer virus is a virus that affects a computer a biological virus is a virus that can infect a living this sorry if I am wrong
Wasif would like to add some flair to text on a slide in his presentation. Which option can he use to create more dynamic graphics for his text?
*it's WordArt
Answer:
b. WordArt
Explanation:correct. post protected
Information systems degree programs typically fall into the computer, business, or _____ category. Question 4 options: a) management b) technology c) media d) social
Answer:
management
Explanation:
why do we need patch panel and modular box?
Amelia has two presentations open and wants to view them at the same time. She can click the _____ button on the View tab.
Amelia has to presentation open and can do work on them at the same time by use of the alt+tab view tab.
What is a presentation?A presentation is a Microsoft office software issued for presenting the top to the audience and masses. It can be informative, structured and brief. The presentation can be persuasive and decision-making.
The presenter needs to keep track of time and hence need to open two presentations the can do this by making use of the view tab that is alt+tab.
Find out more information about the presentations.
brainly.com/question/9624547
Sorry i have Another Question
Why is it important to be able to manage large amounts of data?
A- So it can be deleted when needed.
B- So it can be easily examined and analyzed.
C- So it can be exported quickly.
D So it can be cut and pasted into separate worksheets.
Answer:
the answer would be (B)
Explanation:
Right on EDGE 21' Computer and Technology
hope that helps :D ! have a good day.
Answer:
b
Explanation:
dbuherbbhvbhjcbhjbhjdhbbchcdhchdchc
What is the place value position of the 7 in the number below?
1,376
A ones) b tens) c hundreds) d thousands)
What is the easiest way to get great answers?
What are two potential benefits of using calendar-synchronization tools like calendly
A. If team members want to look up cultural holidays, they can search for them and compare the dates
B. If team members want to share documents with other team members, they can automatically share the documents on specific dates
C. If team members live in another time zone, their meeting times are automatically converted to display the correct time on their devices.
D. If team members prefer to schedule meetings at different times of the day, times can be discussed and arranged to accommodate everyone.
fast help me Behaving safely and ethically online involves _____.
agreeing to all online third-party agreements
agreeing to all online third-party agreements
always telling the truth about others, even negative things
always telling the truth about others, even negative things
educating yourself and others about cybersecurity
educating yourself and others about cybersecurity
always saying exactly what you think and feel
Based on online ethics and standard practice, behaving safely and ethically online involves "educating yourself and others about cybersecurity."
What is online ethics?Online ethics is a contemporary term that is used to cover all the standard practices of online users which seek to protect private information, allow freedom of expression, prevent libel, etc.
Some of the Online Ethics Private stays privateAvoid misquotingAvoid plagiarismProvide reference where possibleBe civil Never go overboard, etc.Hence, in this case, it is concluded that the correct answer is "educating yourself and others about cybersecurity."
Learn more about online ethics here: https://brainly.com/question/8348173?section=similar
Answer:
educating yourself and others about cybersecurity
What is a Word document? How do you use Word documents?
Answer:
Word document is a word processor developed by Microsoft in 1983.It is used for various purpose,some of this are Creating Document such as letters, brouchers, learning activities, pamphlets, books, newspaper, comics and many more such documents For sending multiple mails with personalized format with the help of mail merge a option in word Permanently storage of document
Hope this Helps :D
Please mark Brainliest :D
please help me will give brainliest
Answer:
The person may be a farmer market person or a marketer.
Looks like they are keeping track of how many of each item that they have sold or how many of each item they have.
How do computers hold integers greater than 255?
Answer:
It depends on the number of bits you use. In your example, you've used an 8 bit (one byte) number, which does max out at 255. Ever since forever, computers have used numbers that are larger than one byte. For when that isn't enough, Fortran includes the 'double precision' numbers which use 8 bytes.
Explanation:
Zelda has been a victim of cybersecurity attacks twice, losing considerable sums of money each time. How can she ensure that she does not become a victim to it again
What Zelda who has been a victim of cybersecurity attacks do so as to avoid the occurrence in future is to : configure all her gadgets so they can download as well as install security updates automatically.
cybersecurity attacks can be regarded as cyber crime where the information of people are used to commit crime.So for Zelda not be a victim again she need to configure her gadget so security update can be done automatically so as to avoid the occurrence.Learn more
https://brainly.com/question/24189453?referrer=searchResults
information taken from an existing classified source and generated
Explanation:
Derivative classification )-
It is the process of using existing classified information
to create new documents or material, and marking the newly-developed document or
material consistent with the classification markings that apply to the source information.
Copying or duplicating existing classified information, such as photocopying a document, is
not derivative classification.
What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each documen
Answer:
Sysprint.sep
what is the next number in the pattern 12, 18, 24, 30, 36,
What term is used to describe the process of monitoring operating results and comparing actual results with the expected results
Answer:
controlling
Explanation:
hope this helps
The university has a requirement that students must be allowed to view course offerings and register for classes that have empty seats. What type of requirement is this
Considering the situation described above, the type of requirement here is known as Functional requirement.
What is Functional Requirement?A functional requirement is a term that is often used in software engineering to describe the function of a specific system or essential parts of it.
How is Functional Requirement applies here?Given that students are allowed to view course offerings and register for classes that have empty seats, this implies that the empty classes serve the function of occupying or accommodating students for courses; this is am an example of a functional requirement.
Other types of requirements are the following:Performance RequirementsSystem Technical RequirementsSpecificationsHence, in this case, it is concluded that the correct answer is "Functional requirement."
Learn more about Functional requirements here: https://brainly.com/question/20378439
A(n) ________ store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.
Answer:
app
Explanation:
An app store allows users to download apps. It can be in the form of a website or an app.
An app store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.
What is app store?App stores are primarily online storefronts where buyers can browse through the many categories of apps, view information about each app including reviews or ratings, and download the app including app purchase, if necessary – many apps are offered at no cost.
For more than 10 years, finding and downloading apps has been made safe and dependable by the App Store. But the App Store is more than just a store; it's a modern destination committed to giving you life-changing experiences.
The Apple Store App essentially serves as a mechanism for in-app purchases of Apple products rather than online ones. Your programs would be downloaded from the app store.
Thus, it is app store.
For more details about app store, click here:
https://brainly.com/question/2814429
#SPJ2
Programming that relies on the use of objects and methods to control complexity and solve problems is known as what type of programming
Answer:
Object-based programming
Explanation:
Another alternative more commonly used is Object Oriented Programming (OOP)
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
Network Standards help us to access a network, control data transmission, and evaluate hardware devices across systems.
Networks standards are built to direct the rules in data communications for the devises of hardware and corresponding software for prompt and efficient interoperability between them.
Some official organizations responsible for regulating standards are:
International Standards Organization (ISO) International Telecommunication Union (ITU) Institute of Electronics and Electrical Engineers (IEEE) American National Standards Institute (ANSI) Internet Research Task Force (IETF) Electronic Industries Association (EIA)Different standards can be used during data communication at the same time on different layers, Some commonly used ones includes:
Application layer − HTTP, HTML, POP, H.323, IMAP Transport layer − TCP, SPXSee more here:https://brainly.com/question/17316634
__________ refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.
Business Intelligence or data analysis refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.
Business intelligence (BI) is a data analysis is used by organizations to analyze data and hence gain insights on overall business performance so as to help the organization make good business decisions.
It helps organizations to increase revenue and efficiency thereby being more competitive than other business organizations.
Find out more at: https://brainly.com/question/15406226
define a pseudocode algorithm that will efficiently play the guessing game.
Answer:
In computer science, pseudocode is a plain language description of the steps in an algorithm or another system. Pseudocode often uses structural conventions of a normal programming language, but is intended for human reading rather than machine reading.
Explanation:
A( n ) ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a database.
Answer:
Here's your answer DBMS or (database management system)Can someone please help me with this .
Answer:
whether or not it is raining outside
if the first letter of your name starts with A
whether or not you were on time to school today
the answer to a yes or no question
whether or not it is monday
Explanation:
notice how all of them are "Whether" or "if" or "yes or no" or "1 or 0"
Fletcher is making an online ticket buying system for a museum. His program needs to calculate the final cost of a ticket with extra options added, a planetarium show and an IMAX 3D movie. The initial code looks like this:
The final ticket cost obtained by taking the sum of ticket price and the extra options can be obtained thus ;
finalCost = ticket + imax3D + starShowUsing Python 3 :
ticket = int(input("Enter ticket cost :"))
#takes input for ticket cost
imax_cost = int(input("Enter imax3D cost :"))
#takes cost of imax3D
starshow_cost = int(input("Enter cost of starShow :"))
#takes input for cost of starShow
finalcost = ticket + imax_cost + starshow_cost
#takes the sum of the cost and assign to the finalcost variable
Learn more : https://brainly.com/question/25553386