Answer:
Innovation:
Explanation:
Technology is defined as human innovation in action that involves the generation of knowledge and processes to develop systems that solve problems and extend human capabilities.
To innovate is to make changes in something established, especially by introducing new methods, ideas, or products.
what nat ip address is a public ip address that maps to an inside device?
The nat ip address is a public ip address that maps to an inside device is "inside global".
What is IP address?It should be noted that IP address simply means an internet protocol address that's is associated with a computer network.
In this case, the nat ip address is a public ip address that maps to an inside device is "inside global".
Learn more about IP address on:
brainly.com/question/24930846
#SPJ12
Which is considered the most widely used cloud computing service?
The most widely used cloud computing service is the Amazon web services.
What is cloud computing?It should be noted that cloud computing simply means the on-demand availability of computer resources without direct active management by the user.
In this case, the most widely used cloud computing service is the Amazon web services.
Learn more about cloud computing on:
brainly.com/question/19057393
#SPJ12
HURRY PLS
polina is a system architect and at the point in her current project where she must review the code at a high level to make sure it meets all the requirements. After that, which of the following groups will polina work with
A) the testing team
b)the CEO
Answer:
the testing team
Explanation:
because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not
What is open source software
Answer:
Open Source Software
Explanation:
Open-source software is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.
Answer:
open so software is an computer software that is reliance in which copyright holding reference uses the rights use study change and disturb this software and it so scold to anyone for any propose also open source software maybe diplobed in collaborative public manner
Explanation:
helpful
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources assigned to other operating systems running in the same hardware environment
Answer:
VM escape attack
Explanation:
In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.
Which API gives higher performance and low graphics?
OpenGL?
Vulkan?
Direct3D11?
Metal?
pls suggest your answer
algorithm to print the first 10 odd numbers
Answer:
I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)
Explanation:
please mark brainliest
in a relational database application, a(n) ________ key is used to link one table with another.
In a relational database application, a foreign key is used to link one table with another.
What is a foreign key?In database management system (DBMS), a foreign key can be defined as a column whose value provides a link between the data that are stored in a table or relational database.
This ultimately implies that, a foreign key is used to link one table with another in a relational database application.
Read more on keys here: https://brainly.com/question/8131854
#SPJ12
Three symptoms of hacking
Answer:
1. You receive mass emails
2. Your internet searches get redirected
3. Your passwords are not working
Explanation:
Hope it helps
Which device limits traffic between server 1 and server 2 devnet
The device that limits traffic between server 1 and server 2 is known as a router.
What is a router?It should be noted that a router is the device that connects two or more packet switched networks.
In this case, the device that limits traffic between server 1 and server 2 is known as a router. It manages traffic between the networks.
Learn more about router on:
brainly.com/question/24813743
#SPJ12
When you coordinate tasks by email, you show respect for the recipient's time by:
When tasks are coordinated by email, you can show respect for the recipient's time by clearly stating your availability.
What is an e-mail?An e-mail is an acronym for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users send and receive both texts and multimedia messages over the Internet.
As good work ethics, when tasks are coordinated by e-mail, you can show respect for the recipient's time by clearly stating your availability and providing details about time frames.
Read more on e-mail here: https://brainly.com/question/15291965
#SPJ12
_____ view provides the most options for defining fields.
A table design view provides the most options for defining fields.
What is table design?Tables are known to be a design pattern for showing a big amounts of data in rows and columns.
Note that in the case above, A table design view provides the most options for defining fields.
Learn more about table design from
https://brainly.com/question/26961510
#SPJ12
A for statement contains three expressions: initialization, test, and:
A for statement contains three expressions and these are:
InitializationTestUpdateWhat is a for statement?A for statement can be defined as a type of statement that is written by a computer programmer to repeat an action or event in a software program for a specific number of time.
In Computer programming, a for statement contains three expressions and these include the following:
InitializationTestUpdateRead more on statements here: https://brainly.com/question/18736215
#SPJ12
A router is performing basic routing functions. What will be the third step in the transmission of a packet?
The third step in the transmission of a packet is known as a network layer.
What is a router?It should be noted that a router is a device that connects two or more packets networks.
Here, the third step in the transmission of a packet is known as a network layer. It adds another header in what is received.
Learn more about router on:
brainly.com/question/24812743
#SPJ12
Jack is an accountant he can't access the spreadsheet software which is installed on the server what should jack do
Answer:
Ping
Explanation:
Jack should ping the server and check to see if it has crashed. The ping command is a networking utility that determines if an IP address or domain is accessible. Once it is determined, Jack may utilize the data to derive additional inferences. While troubleshooting internet access, pinging is generally the first line of protection. It not only tests connection, but it also counts time and ensures that all Internet Control Message Protocol packets are accountable.
PYTHON --- Toll roads have different fees based on the time of day and on weekends. Write a function calc_toll() that has three parameters: the current hour of time (int), whether the time is morning (boolean), and whether the day is a weekend (boolean). The function returns the correct toll fee (float), based on the chart below.Weekday TollsBefore 7:00 am ($1.15)7:00 am to 9:59 am ($2.95)10:00 am to 2:59 pm ($1.90)3:00 pm to 7:59 pm ($3.95)Starting 8:00 pm ($1.40)Weekend TollsBefore 7:00 am ($1.05)7:00 am to 7:59 pm ($2.15)Starting 8:00 pm ($1.10)Ex: The function calls below, with the given arguments, will return the following toll fees:calc_toll(8, True, False) returns 2.95calc_toll(1, False, False) returns 1.90calc_toll(3, False, True) returns 2.15calc_toll(5, True, True) returns 1.05
The toll program illustrates the use of conditional statements;
As a general rule, conditional statements are used to make decisions
The toll programThe toll program written in Python where conditional statements are used to make several decisions is as follows:
def calc_toll(hour, morning, weekend):
toll_fee = 0
if weekend == False:
if morning == True:
if hour < 7:
toll_fee+=1.15
elif hour < 10:
toll_fee+=2.95
elif hour <= 12:
toll_fee+=1.90
else:
if hour < 3:
toll_fee+=1.90
elif hour < 8:
toll_fee+=3.95
elif hour >= 8:
toll_fee+=1.40
else:
if morning == True:
if hour < 7:
toll_fee+=1.05
elif hour <= 12:
toll_fee+=2.15
else:
if hour < 8:
toll_fee+=2.15
elif hour >= 8:
toll_fee+=1.10
return toll_fee
Read more about conditional statements at:
https://brainly.com/question/24833629
#SPJ1
What should be used to prevent javascript from accessing a session id value?.
Cookies should be used to prevent javascript from accessing session-id values.
What are cookies?
Cookies are brief text messages that a website you visit sends to your browser.
Web browsers are instructed to only send cookies using encryption using the Secure cookie property.
The session ID can be taken from the user's browser cookies during storage, frequently via cross-site scripting. The session ID may be seen while it's being sent by listening in on network traffic.
Keep in mind that every request to the server includes a session ID. Using the cookie attribute of the Document object,
JavaScript is also capable of manipulating cookies. JavaScript has the ability to read, write, change, and remove cookies that are specific to the current web page.
Hence, cookies should be used to prevent javascript from accessing session-id values.
To learn more about the cookies refer to:
https://brainly.com/question/20263903
#SPJ1
A server creates a port that it uses to receive requests from clients. discuss the design issues concerning the relationship between the name of this port and the names used by clients
The issues raised by the name of the port and the name used by clients are service, efficiency and the local identifiers.
What is a server created port?A server created port is the login endpoint assigned with the specific number, that mediates the delivering exchange of the information in between the server and the client.
The design issues that may rise with the name of the port and the name used by the clients includes:
Unaware to learn the port and the IP address used by the client in order to reach the service.The problem with different servers offering services at the same time.Efficiency problem with the port access and the local identifiers.Learn more about server port, here:
https://brainly.com/question/13105604
#SPJ1
A destination port number at the transport layer identifies which application on a computer should receive the data transmission
A destination port number at the transport layer identifies which software application on a computer should receive the data transmission: True.
What is the transport layer?The transport layer can be defined as one of the seven layers of the open systems interconnection (OSI) model and it is responsible for routing messages through an active computer network while selecting the best transmission path from the source to the destination device.
In Computer networking, a destination port number at the transport layer is saddled with the responsibility of identifying which software application on a computer should receive the data transmission.
Read more on transport layer here: https://brainly.com/question/26177113
#SPJ12
What process sends ones and zeroes across network cables
Answer:
modulation
Explanation:
Modulation is the procedure of encoding data into electrical signals for transmission through a media. For transmission, binary information, denoted by a sequence of ones and zeros, should be translated to analog or digital electrical signals. The method converts data into electrical signals suited for transmission is known as modulation. Digital modulation is the transmission of binary signals zeroes and ones.
The process that sends ones and zeroes across network cables is modulation.
What is modulation?Modulation is the process of encoding information from a message source in a way that is suitable for transmission
In other words, the process by which information is encoded into electrical signals for transmission over a medium.
Binary information, are represented by a series of 1s and 0s and must be converted to analogue or digital electrical signals for transmission.
learn more on modulation here: https://brainly.com/question/14592357
#SPJ12
If you use a cluster that is managed by a cloud provider, which of these will be managed for you by the cloud provider? *
When you use a cluster that is managed by a cloud provider, the things that will be managed for you by the cloud provider are:
Monitoring.Networking.Security management task.What is cloud?It should be noted that cloud computing are the software that are made available to users through the internet.
When you use a cluster that is managed by a cloud provider, the things that will be managed for you by the cloud provider are monitoring, networking, and security management task.
Learn more about cloud on:
brainly.com/question/9759640
#SPJ12
#SPJ12
Which technique is used with network address translation (nat) where a source port chosen by a client is the same port used by a router?
The technique that is used with network address translation (nat) where a source port chosen by a client is the same port used by a router is port preservation.
What is port preservation?It should be noted that port preservation simply means using the port number chosen by the client initially.
In this case, the technique that is used with network address translation (nat) where a source port chosen by a client is the same port used by a router is port preservation.
Learn more about port on:
brainly.com/question/4804932
#SPJ12
You hide three worksheets in a workbook and need to unhide them. What is an accurate statement about this process?
The accurate statement about this process is that "The person must unhide each worksheet separately".
How do you unhide multiple sheets in Excel?To unhide multiple sheets, one can:
Right-click the Sheet tab at the bottom, and then click on Unhide. Then also click all together the Shift + Up/Down Arrow keys to click multiple (or all) worksheets, and then click OK.Note that The accurate statement about this process is that "The person must unhide each worksheet separately".
Learn more about worksheets from
https://brainly.com/question/25130975
#SPJ12
How can file signature in headers be used to reinforce the identification of files with different extension names in forensic audit.
Answer:
A file header is a 'signature' placed at the beginning of a file, so the operating system and other software know what to do with the following contents. Many electronic discovery applications will use the file header as a means to verify file types.
Explanation:
i) Convert 8GB to bits. Give the expression.
Answer:
64 billion
Explanation:
1gb = 1 billion bytes
so 8gb = 8 billion bytes
then
1 byte= 8 bits
so 8 billion bytes = 8 × 8 billion bits, 64 billion bits
webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so. true or false?
The statement that webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so is false.
What is webrooming?It should be noted that webrooming simply means the consumer practice for researching products online before buying theme in stores.
In this case, the main idea of webrooming isn't to buy it at stores because it's cheaper. Therefore, it's false.
Learn more about webrooming on:
brainly.com/question/14988432
#SPJ12
Your friend just noticed his smartphone's battery is running low. Unfortunately, your friend isn't very knowledgeable about computers and smartphones, so he doesn't know what type of charging cable he needs. He knows his phone is running iOS 12. What kind of cable does your friend need to charge his phone
Answer:
Lightning
Explanation:
Apple Inc. designed and developed the Lightning computer bus and power connection. Apple mobile devices such as iPhones, iPads, and iPods use the Lightning connection to connect to host computers, external displays, cameras, USB battery chargers, and other accessories. Lightning is substantially smaller than its predecessor, with only 8 pins instead of 30.
The programming process consists of several steps, which include:
The programming process consists of several steps, which include: Design, creation, testing, and debugging.
What are the steps in programming process?The programming process is also made up of:
Defining the problem.Planning the solution.Coding the program.Testing the program.Documenting the programNote also that The programming process consists of several steps, that include: Design, creation, testing, and debugging.
Learn more about programming process from
https://brainly.com/question/22654163
#SPJ12
The lower-order word of the r9 register can be addressed as
The lower-order word of the r9 register can be addressed as an aspect of 64-bit general registers and in SP-2.
What is low order word?The "Word" that is 16 bits, and it is one where two words can fit into a 32 bit location usually at the same time. The "low" word is said to be the smallest or least significant of 16 bits.
Therefore, note that the lower-order word of the r9 register can be addressed as an aspect of 64-bit general registers and in SP-2.
Learn more about lower-order word from
https://brainly.com/question/13833510
#SPJ12
Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation
The causes of the situation include:
The systems use different hashing algorithms.One system uses hashing and the other used hashing and salting.How to depict the information?From the information given, the technicians are testing the security of an authentication system that uses passwords.
The technician discovers that the values are different from those on other systems because the systems use different hashing algorithms and one system uses hashing and the other used hashing and salting.
Learn more about technicians on:
brainly.com/question/14599022
#SPJ12