Answer:
downloads.
Explanation:
A test using various ransomware strains showed that 1,000 Word documents could be encrypted in anything from 18 seconds to 16 minutes. Thus, option D is correct.
What easiest way to become a victim of malware download?Phishing emails are by far the most popular way for hackers and state-sponsored hacking groups to disseminate malware.
Adware is malware that targets computer users with unwanted adverts. This makes it possible for the creator of the malware to obtain payment from the companies whose adverts are served by it.
However, certain viruses may be scheduled to begin infecting your computer a few days after they are downloaded. Other viruses may attempt to circumvent antivirus protection by downloading in chunks.
Therefore, Hackers have become adept at crafting emails that lead recipients to click on links or download files that contain malicious software.
Learn more about downloads here:
https://brainly.com/question/29328797
#SPJ2
HELP FAST I NEED THE ANSWERS NOW!!!
YOU’LL GET 20 POINTS AND I AM GONNA PUT YOU IN BRAINIEST!!
Answer:
1. The food could contaminate (food contamination) & drinks could potentially spill on appliances.
2. Reading the directions beforehand allow you to properly assemble or handle objects such as beakers, or hot plates. You could break the glass objects or burn yourself on the heat source.
3. If you're at school in a lab, you could say an eye wash shower, fire blanket, or fire extinguisher.
4. Dispose trash etc. into the appropriate bins, and clean any spill before
leaving the lab.
5. NO. It's important to follow the procedures carefully so you and the people around you will not be harmed.
hope this helps!!
True or false
A compiler translates a source program one line of code at a time.
Answer:
True
Explanation:
yes It translates one line at a time to be able to confirm all information.
Answer:
True
Explanation:
I hope this helps you
what are the 2 things you are not sure about evaluating functions
Answer:
every thing
Explanation:
Answer:
To evaluate a function, substitute the input (the given number or expression) for the function's variable (place holder, x). Replace the x with the number or expression. 1. Given the function f (x) = 3x - 5, find f (4).
A function is a relation in which each input has only one output. In the relation , y is a function of x, because for each input x (1, 2, 3, or 0), there is only one output y. x is not a function of y, because the input y = 3 has multiple outputs: x = 1 and x = 2.
A formula is an expression which calculates the value of a cell. Functions are predefined formulas and are already available in Excel. For example, cell A3 below contains a formula which adds the value of cell A2 to the value of cell A1.
Explanation:
Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?
Appointment
Meeting
Event
Period
Answer:
The answer u looking for is event
Answer:
event
Explanation:
Consider the following code:
Using Python
x = 19
y = 5
print (x % y)
What is output?
In python the % operator is modulo. Modulo returns the remainder of two numbers.
19 % 5 = 4 therefore,
print(x%y) would output 4
Using Python, the output of the code will be 4. The explanation of the problem is shown below.
What is Python?Python is a high-level, interpreted programming language that was first released in 1991 by Guido van Rossum. It is a general-purpose language that can be used for a wide variety of applications, including web development, scientific computing, data analysis, artificial intelligence, machine learning, and more.
Python is known for its simplicity and readability, making it easy to learn and use. Its syntax is designed to be concise and expressive.The % operator in Python returns the remainder of the division of two numbers.
In this case, x % y is equivalent to 19 % 5, which is 4 since 19 divided by 5 is 3 with a remainder of 4. The print function is used to display the value of the expression x % y on the screen.
Learn more about Python, here:
https://brainly.com/question/30391554
#SPJ3
What is one reason why a business may want to move entirely online
Answer:
maybe because it requires less work and the amount of peole online today greater than say 8 years ago.
When would you use the Reading View in Word?
To add an image to the document
To have Word Online read the document to you
To make changes to the document
To read the document without any distractions
Answer:
D: to read the document without any distractionsTo read the document without any distractions is used in the reading View in Word. Thus, option D is correct.
What is an Inference?
This refers to the deductions or conclusions that are made about a particular thing or idea based on available evidence, background information and powers of conclusion.
Hence, we can see that from the given text, Nicholas Carr is quoted as saying that reading online makes people to be 'mere decoders of information.' and this makes people become less engaged as they tend not to use their ability to interpret texts less and less.
Based on the given text, it can be seen that Nicholas Carr believes that reading online makes people not connect as deeply as reading without distraction, which can be an inference, to offline reading.
Therefore, To read the document without any distractions is used in the reading View in Word. Thus, option D is correct.
Learn more about document on:
https://brainly.com/question/27396650
#SPJ2
Type the correct answer in the box.
How can users prevent broadcasting their existing connections?
User can make the BLANK name invisible, thereby preventing the hackers from knowing about an existing connection.
Answer:
User can make the network name
Answer:
The correct answer is: SSID
Explanation:
Hiding the SSID involves preventing the broadcast of the SSID name. Users can make the SSID name invisible to prevent hackers from knowing about an existing connection.
Question # 4
Multiple Choice
Which number is equivalent to 72.5e-2?
O 72.5
O 7.25
0 7250
O 0.725
answer is
o
that's so easy
Answer:
0.725
Explanation:
72.5e-2 = 72.5 x 10-2 = 0.725
Steve Jobs described early computers as “the most remarkable tool that we’ve ever come up with..it’s equivalent of a bicycle for our minds.” Would you describe smartphones as a bicycle for our minds?
Answer:
Here is my stance on the phone issue and a quote from Steve himself.
"I think one of the things that really separates us from the high primates is that we’re tool builders. I read a study that measured the efficiency of locomotion for various species on the planet. The condor used the least energy to move a kilometer. And, humans came in with a rather unimpressive showing, about a third of the way down the list. It was not too proud a showing for the crown of creation. So, that didn’t look so good. But, then somebody at Scientific American had the insight to test the efficiency of locomotion for a man on a bicycle. And, a man on a bicycle, a human on a bicycle, blew the condor away, completely off the top of the charts.
And that’s what a computer is to me. What a computer is to me is it’s the most remarkable tool that we’ve ever come up with, and it’s the equivalent of a bicycle for our minds."
Explanation:
Like anything smartphones, computers, and television can be the junk-food equivalent of our minds or the inspiration to better yourself with knowledge and creativity. To me its like a bicycle in that are you riding the bicycle to healthfoods or mcdonalds. Its the freedom of the transportation of knowledge that can be so life-changing and so life-threating at the same time.
I would not think of smartphones as a bicycle for our minds as they do not run on how my mind functions.
What are people view on the quote above?Some people do believe that the statement is true. They think also that smartphones and tablets can be a source of big distraction if not handled well.
Smartphones are a good learning tools, or they can be bicycles for our minds only when they are used by a skillful person.
Learn more about smartphones from
https://brainly.com/question/917245
A customer complains that the network connection on the laptop is intermittent. The customer states that they are using a wireless PC card for network connectivity. The customer believes that the laptop may be too far from the wireless access point; however, he does not know where the wireless access point is located.
As a technician, you need to be able to ask questions that will be recorded on a work order. What are 5 closed-ended questions and 5 opened-ended questions that you would ask a customer.
how are you
I will ask what's the problem
what happend before u saw this
what did I do after
was anyone with you
and give me permission to help
One day you tap your smartphone screen to turn it on, and nothing happens. It appears to be turned off and will not turn on. What should you try first to fix it?
perform a soft reset
plug it into a charger for an hour
submerge it in a bag of rice for 24 hours
perform a hard reset
Answer:
B) Plug it in
Explanation:
Though the other answer would be helpful in a real life situation, the correct choice on ed g e is b) :)
Question 12 (1 point)
Generally, each pixel in an image creates 25 bytes of data.
True
False
Answer:
This is B: False
Explanation:
Each pixel of an image creates 24 bits, or 3 BYTES of data for color, and 1 byte for black and white.
A variety of fonts may be used in letter writing as long as the font size is 12 points.
True
False
Answer:
False
Explanation:
For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that shows what the progress looks like over time. Which application is best suited for this effort?
Notepad or Paint
Impress or PowerPoint
Writer or Word
Calc or Excel
PLZ BEEN STUCK ON THIS
What is the second software layer of the Open Systems Interconnection reference model called?
data link
protocol
network
TCP/IP
Answer:
am not really sure but between TCP/IP and data link am sorry for not being precise .
Answer: DATA LINK
Explanation:
SEARCH IT UP!
Vincent is a digital media professional. His bosses always praise his artwork. His company has just taken on a new project. Vincent has some thoughts and ideas about this new project that he wants to discuss with the senior employees. What kind of skills should he use to pitch his ideas?
A.
technical
B.
manipulative
C.
social
D.
interpersonal
Answer:
A
Explanation:
I think the answer in A
Which of the following would be provided from the use of a GIS?
a. map displaying satellite data of farmland use
b. map displaying projected path of a hurricane
c. Doppler radar images for weather forecasting
d. satellite images used to reconstruct a forest fire
The one that would be provided from the use of a GIS is a map displaying the projected path of a hurricane. The correct option is b.
What is GIS?A computer system that analyzes and presents spatially related data is known as a Geographic Information System (GIS). It makes use of information associated with a certain place.
People can use GIS technology to compare the locations of various objects to determine how they connect to one another. For instance, utilizing GIS, a single map might show both polluting and pollutant-sensitive locations, such as wetlands and rivers, as well as locations that cause pollution, such as industries.
You need to enable tropical storm tracking if you want to follow a hurricane on our map. Click the symbol in the top-right corner to begin.
Therefore, the correct option is b. map displaying the projected path of a hurricane.
To learn more about GIS, refer to the link:
https://brainly.com/question/14464737
#SPJ2
Which of the following is a location or selection of text which can be named to mark and navigate to different locations?
Endnotes
Footnotes
Bookmarks
Citations
Answer:
bookmarks because it is able to navigate diffrent locations
Explanation:
True or False: A ruler is used to measure units of length, inches, feet
and yards.
Answer:
True
Explanation:
Rulers are used to measure relatively small increments including centimeters, inches, feet and even yards (yardsticks).
Accurately describing the message in the subject line makes it more likely that the message will be read.
True
False
1. How did Russian hackers gain access to sensitive Democratic National Party files?
1. Problem solving is
(4 Points)
O A. highly interactive
B. collaborative
C. Both And B
D. Designing an App
Answer:
A
Explanation:
1. Problem solving is
(4 Points)
O A. highly interactive
B. collaborative
C. Both And B
D. Designing an App
Can anyone please help me with how to use a while loop to ask a user to input positive integers until the user enters 0 and at the
end, print the largest number of all the integers entered.
I can send an example if needed
In python 3:
def main():
largest = 0
while True:
number = int(input("Enter a number: "))
if number == 0:
print(largest)
return
elif number > largest:
largest = number
if __name__ == "__main__":
main()
I hope this helps!
Write an algorithm in pseudo code to find the product of two numbers
Answer:
Read num1 , num2
Set multi to num1*num2
Write multi
Explanation:
Help please I’ll give u brainless
c its c OK your welcome
100 POINTS PLEASE HELP Ken Thompson and Dennis Ritchie co-created which operating system?
Answer:
UNIX operating system
Explanation:
Unix is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
Answer:
the UNIX
During the 1960s to 1970s, Bell Labs colleagues Ken Thompson and Dennis Ritchie developed UNIX, a multi-tasking, multi-user operating system alternative to the batch processing systems then dominating the computer industry.
Explanation:
With which of the following is network administration concerned? Check all of the boxes that apply.
A. security
B. hardware
C. software
D. network setup
E. network maintenance
a b c and i think e if not e do d
Answer:
all
Explanation:
Taylor organizes and manages all his files and folders logically. How does this activity help Taylor in his daily work environment?
A.
improves efficiency at work
B.
improves time management skills at work
C.
improves leadership skills at work
D.
improves team management skills at work
Answer:
B
Explanation:
If Taylor has all of his folders organized he will not have to spend forever trying to find a document when he could have the document and be getting to a meeting or lunch.
I hope this helps you.
Answer:
wouldnt it be efficiency
Explanation:
you only organize and manage folders to be quick and efficient not manage your time.
How do you implement instruction level parallelism
Answer:
To obtain substantial performance enhancements, we must exploit ILP across multiple basic blocks.
Explanation: