Answer:
1) Detail
2) Report footer
3) Page footer
4) Group Header
5) Report header
6) Group footer
7) Page header
Explanation:
I just did the assignment
The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do
Answer:
Have them try again. If it still is wrong then maybe dont let them use the internet!
write any two reasons why files are stored in folders
Answer:
Explanation:
The answer is The tree structure suggests the main benefit of folders: to organize your files. You can create folders to store and organize your pictures, your documents, your videos, and so on. Folders are also used to separate the files created by different users.
Answer:
Putting files into folders can help you stay organized and keep your files seperated. Having seperate place for different files make them easy to find. Having folders for your files also make them easier to move, for example, if you are moving your information to a new device, it is faster and more efficient because your files are placed in folders, so you don't have to move each indviual file.
I hope this was helpful! =)Complete the sentence with the correct response.
When choosing a new computer to buy, you need to be aware of what operating it uses.
Answer:
When choosing a new computer to buy, you need to be aware of what operating system it uses.
Explanation:
An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.
Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.
so I believe that the word you are looking for is technology
Hope this helps
-scav
One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
A: capital gains on the investment will be taxed at a lower rate.
B: fees will not be charged by brokers for selling the investment.
C: money earned on the investment will be considered tax-free.
D: profits on the investment can be averaged over the length of time the investment
is held.
Answer:
A, Capital gains on the investment will be taxed at a lower rate.
Explanation:
omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!
A man-in-the-middle attack or impersonation are likely to result in problems with
data availability.
data confidentiality.
data integrity.
data mining.
Answer:
Data Confidentiality
Explanation:
A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.
A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.
What is a man-in-the-middle attack?A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.
Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.
Therefore, option B is the correct option.
Learn more about man-in-the-middle attack, here:
https://brainly.com/question/13014110
#SPJ6
Complete the sentence with the correct response.
If you were to create a mobile app and wanted to create it on an operating system that would allow the users to personalize preferences within the operating system, you would use the operating system.
Answer:
You would use the Android operating system.
Explanation:
Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Many application developers prefer it due to its many customization options.
what are the answers for Quiz 7 answers computer science principles
Answer:
unknown
Explanation:
this sounds like it is very vague and could be confused with other tests, i do not know of any tests like this
another thing is you can ask each question, even though it would cost more points, it would be better in the long run, people with similar questions can find their answers easier, AND you can get the correct answer for each question with confidence
that and people are more willing to answer one question at a time then a whole quiz lol
not saying what you are doing is bad, its just impractical and not an easy way to go about this
hope you find the answers you need, have a great day/night mate :D
Describe at least three of the characteristics that project managers look for in project participants and explain why you think they are important
Answer:
1. Knowledge of Project Management Principles: A project participant should have the required knowledge of how project management works and how to function well in a team to achieve a common goal.
2. Time management skills: Despite the fact that it might be teamwork, the effectiveness of each individual is key. Every team member should be able to meet deadlines so as not to burden the team when they are given an individual task.
3. Excellent Communicator: A project participant should be able to communicate well with other team members, the project manager, different audiences, even customers and potential customers. Any weakness in communication skills could affect the project generally.
why you think they are important
1. Having knowledge of project management principles would lessen work and save time for the project manager and other team members as the project participant would have an idea per time of what to do.
2. A project participant that can manage time would generally increase the efficiency of the company, help the company meet deadlines, help the team meet targets.
3. Any weakness in communication skills could affect the project generally.
___________ helps businesses conduct interactive meetings online, including conferences, training, support sessions, and client presentations.
Answer: Web Conferencing
Explanation: I was gonna say technology but that's super broad. It could also be collaborative tools but I think this is the correct answer.
z 1
-- = --
7 21
solve
Answer:
[tex]z= \frac{1}{3}[/tex]
Explanation:
Given
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Required
Solve
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Multiply both sides by 7
[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]
[tex]z= \frac{1}{21} * 7[/tex]
Rewrite as:
[tex]z= \frac{1 * 7}{21}[/tex]
[tex]z= \frac{7}{21}[/tex]
Simplify fraction
[tex]z= \frac{1}{3}[/tex]
Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed
Answer:
Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.
Explanation:
Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.
Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.
Write a Python code to take input of age of three people by user and determine youngest people among them
Answer:
# Take Ages
person1 = eval(input("Enter age of person 1 : "))
person2 = eval(input("Enter age of person 2 : "))
person3 = eval(input("Enter age of person 3 : "))
# check youngest
if person1 < person2 and person1 < person3:
print("Person 1 is youngest")
elif person2 < person1 and person2 < person3:
print("Person 2 is youngest")
elif person3 < person1 and person3 < person2:
print("Person 3 is youngest")
Which option should have the strongest influence on your choice of system software for your computer?
compatibility of applications software
aesthetics
your friends' opinions
popularity
Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?
Answer:
I'm pretty sure this is not possible on Windows OS.
Explanation:
Two different monitors can work, as you probably know, but I don't think you can use separate keyboards and mice on the same machine.
in ICT what is the difference between Save and Save As
Answer:
Save updates the files that are already created.
Save as creates a new file or store the existing file in a new location.
concept of green computing
Answer:
Reducing Environmental Impact of Technology
Explanation:
The main concept of green computing is to reduce the environmental impact that technology has. This revolves around everything that has to do with technology and computing. Including using technology and software to create solutions to better the environment, while also using computing resources as efficiently as possible. Then when the physical devices are obsolete, recycle as much as possible in order to reduce the physical waste that technology has on the environment.
Which of the following is an example of how the healthcare industry uses computer programming? (5 points)
a
Create drones
b
Make 3-D prosthetics
оо оо
с
Plant agriculture
d
Use 4-D special effects
The healthcare industry uses computer programming will be Make 3-D prosthetics. Then the correct option is B.
What is the healthcare industry?The healthcare business, also known as the medicinal industry or the medicine economy, is an amalgamation and combination of economic segments that offer products and services for the treatment of patients in the curative, preventative, rehabilitative, and pastoral care categories.
Uses of the healthcare industry are given below.
Apps with medical databases or references.Applications for tracking chronic diseases.Applications for diagnosis with a focus on prevention.Applications for people's health.Apps for better health.Apps for psychological health.Thus, Computer programming is used in the healthcare sector to create three-dimensional prostheses. Then the correct option is B.
More about the healthcare industry link is given below.
https://brainly.com/question/14379549
#SPJ2
True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.
Answer:
true
Explanation:
true true true true true
A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C
Please select the best answer from the choices provided
A
B
C
D
Answer:
D
Explanation:
Write down a scratch program which:
performs the following tasks 5 times:
1. asks the user to input numbers
2. add the numbers in total variable
3. outputs the result
What is a network?
A. The software only that connects electronic devices so they can
communicate with each other
B. The hardware only that connects electronic devices so they can
communicate with each other
C. The hardware and software that prevents electronic devices from
communicating with each other
D. The hardware and software connecting electronic devices so they
can communicate with each other
Answer: For a network to exist, both the hardware and software of a computer must be able to communicate with other computers, so the answer is D.
The hardware and software connecting electronic devices so they can communicate with each other.
What is Network?An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.
They frequently appear everywhere, including in buildings like homes, offices, and government agencies. Computer networks can be used to share information and get around geographical restrictions.
Several protocols and algorithms are used by network devices to define the precise transmission and reception of data by endpoints. For instance.
Therefore, The hardware and software connecting electronic devices so they can communicate with each other.
To learn more about Network, refer to the link:
https://brainly.com/question/15002514
#SPJ7
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. What could you do to add an additional layer of security to this organization
Train the receptionist to keep her ipod in a locked drawer when not in use.
What is ipod?Apple Inc. created and marketed the iPod line of portable media players and multifunctional mobile gadgets, which has since been discontinued. On October 23, 2001, the initial version of iTunes was made available, almost 8 and a half months after the Macintosh version.
As of 2022, Apple is anticipated to have sold 450 million iPod products. On May 10, 2022, Apple stopped producing the iPod range of products. The iPod brand was abandoned by Apple the longest, after more than 20 years.
Some versions of the iPod can act as external data storage devices, just like other digital music players. Before macOS 10.15, users could transfer contacts, e-mail settings, calendars, music, photographs, movies, games, and other content to devices that supported the iTunes program from Apple.
Therefore, Train the receptionist to keep her ipod in a locked drawer when not in use.
To learn more about ipod, refer to the link:
https://brainly.com/question/119195
#SPJ5
What can be written to perform a certain number of iterations or to iterate until a specific result is achieved?
so in coding we use a thing called a loop to one of the most common loops is a if or loop this is when we tell the software to keep trying the task that is in the loop until it completes the task.
-scav
A restaurant is interested in learning about the food preferences of people living nearby to the restaurant and intends to use survey data to help decide which new items to add to the menu. Which of the following is LEAST likely to be part of the process used to analyze the data?
a. Cleaning a data visualization to remove unwanted patterns.
b. Iteratively creating visualizations to ask and answer new questions.
c. Cleaning data to remove inconsistencies.
d. Filtering the data to look at the responses from only certain groups.
Answer:
answer is d
Explanation:
i got it right in code.org
Answer:
A. Cleaning a data visualization to remove unwanted patterns.
Explanation:
While cleaning data in its raw format can be an important part of the Data Analysis Process, the visualizations are not cleaned and/or altered but rather they are interpreted to discover what patterns exist in the data.
*If one is in search of a pattern, why would one clean or alter the pattern they have been provided, self-sabotage.*
Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest
Answer:
Explanation:
Who is Carl Thompson?
Match the characteristics to the mobile operating system that it describes.
1. simple, user-friendly design Apple iOS
2. preferences personalized Microsoft
3. limited number of available apps Android
Answer:
1. is Apple's iOS
2. is Android
3. is Microsoft
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
Consider the following code segment.
int[][] multi = new int[4][4];
for (int rows = 0; rows < 4; rows++)
{
for (int cols = 0; cols < 4; cols++)
{
if (cols == 0)
{
multi[rows][cols] = 0;
}
else if (cols == 1)
{
multi[rows][cols] = 1;
}
else if (cols == 2)
{
multi[rows][cols] = 2;
}
if ((rows % 2 == 0) && (cols % 2 == 0))
{
if ((rows >= 2) && (cols <= 2))
{
multi[rows][cols] = 9;
}
}
}
}
As a result of executing the code segment, how many elements in the two-dimensional (2D) array multi will store the value 9 ?
A) 0
B)1
C)2
D)4
E)6
Answer:
C
Explanation:
C.10 15 20 35
30 35 40 45
50 55 60 65
As a result of executing the code segment, 2 elements in the two-dimensional (2D) array multi will store the value 9. Thus, option C is correct.
How the elements in the array can be calculated?Given the array
arr = {1,2,3,4,5}
To set the first two elements of array arr to 10.
Kindly note that ; index numbering if array elements starts from 0
First element of the array has an index of 0
2nd element of the array has an index of 1 and so on.
Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.
arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1
arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2
Therefore, As a result of executing the code segment, 2 elements in the two-dimensional (2D) array multi will store the value 9. Thus, option C is correct.
Learn more about array on:
https://brainly.com/question/13107940
#SPJ2