Answer:
Block Chain is a system of recording information that makes it difficult or impossible to change, hack, or cheat the system.
A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
Hope this helps.
x
Organizations must protect their sensitive information through digital security measures and their _____ through physical security measures. Select 4 options.
IT infrastructure
equipment
employees
customers
RFID systems
Answer:
IT infrastructure
Explanation:
and their IT infrastructure through physical security measures. There are two main ways of "hacking" a system. One is through a flaw in the software that is someone skilled enough can manipulate in order to gain access to the system and retrieve data or manipulate the system as they see fit. The second method is physically by accessing the IT infrastructure. If you were able to do so and there are no physical security measures you could simply plug into the infrastructure and access all the information that you want because you would be completely bypassing the digital security measures by doing so. That is why physical security measures are placed so that only qualified and vetted individuals have access to the infrastructure.
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Which word-processing feature provides a quick way to execute commands without using your mouse?
Print Preview
Keyboard Shortcuts
Find and Replace
Spelling and Grammar
The word-processing feature that provides a quick way to execute commands without using your mouse are Keyboard Shortcuts. The correct option is B.
What are keyboard shortcuts?A hot key is a key or combination of keys on a computer keyboard that, when pressed all at once, performs a task (such as starting an application) faster than a mouse or other input device.
Hot keys are also known as shortcut keys. Many operating systems and applications support hot keys.
Click to start the selection, then hold down the left mouse button and drag the pointer over the text you want to select.
Click twice anywhere in the word. Click after moving the pointer to the left of the line until it changes to a right-pointing arrow.
Thus, the correct option is B.
For more details regarding keyboard shortcuts, visit:
https://brainly.com/question/12531147
#SPJ1
Answer:
its B Keyboard Shortcuts Explanation: i did the test ;/
2. What does the unsigned decimal value of 99 as sum of powers of 2
Answer:
(99)₁₀ = (1100011)₂
Explanation:
I believe the question is asking you to convert 99 in base 10 to binary
If so, the above would be the answer easily computed using a programming calculator
If I have mis-interpreted your question, my apologies and you can report this answer
Suppose that you had to explain to find the concept of an information system, how would you define it?
Answer:
Mark me Brainliest plz
Explanation:
I would describe an information system as the combination of its five basic components - hardware, software, data, people, and processes - and how they all work together to add value to a business or organization. For instance, I (person) use email (software) on my laptop (hardware) to communicate with key stakeholders within my organization. By doing this simple process multiple times each day, I am using an information system.
(345.10
What is answer of this (345)10
A central issue of public sharing is:
A. how well we balance in private.
B. how much time we spend alone.
C. how good our performance is.
D. how much information we share.
Perform the following for each 8 bit binary addition:
add the two binary numbers
interpret all there 8 bit binary numbers as a signed number (2’s complement)
interpret all three 8 bit binary numbers as unsigned numbers
Binary Number
Signed Decimal Value
Unsigned Decimal Value
Number 1
01111001
Number 2
00011110
Sum
Binary Number
Signed Decimal Value
Unsigned Decimal Value
Number 1
00011011
Number 2
00010100
Sum
Binary Number
Signed Decimal Value
Unsigned Decimal Value
Number 1
11110110
Number 2
10000011
Sum
Answer:
Where are options?
Explanation:
________ is software that is needed to run and maintain the functionality of a computer and its parts.
An operating system (OS) is a piece of software that executes other applications and programs on a computer while controlling and coordinating the hardware components. It is the core component of the system software, and without it, a computer cannot operate.
What is computer ?A computer is a device that may be configured to automatically perform series of mathematical or logical operations (computation). Modern digital computers are capable of running programmes, which are generalised sets of operations. These apps give computers the ability to carry out a variety of tasks. A computer is a minimally functional computer that contains the peripheral devices, system software (primary software), and hardware required for proper operation. This phrase may also apply to a collection of connected computers that work as a unit, such as a network or group of computers. The sole purpose of early computers was to perform computations. Since ancient times, simple manual tools like the calculator have supported humans in performing computations.
To know more about computer visit:
https://brainly.com/question/21474169
#SPJ1
During a user’s onboarding process, many designers focus on a gradual release of information. This process is called what?
progressive disclosure
working with the tkinter(python) library
make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?
To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.
How can I make a tkinter window always appear on top of other windows?By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.
This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.
Read more about python
brainly.com/question/26497128
#SPJ1
Network ____ specify the way computers access a network. a. wires b. files c. standards d. instructions
Answer:
c. standards
Explanation:
Network standard specifies the way computers access a network. They are guided rules that must be taken into consideration for successful integration and interaction of technologies that use a wide variety of networks.
Another integral importance of network standard is that they ensure that individual usage of carried out without issues related to inconsistency.
Examples of Agencies governing the regulation of network standards are the International Telecommunication Union (ITU) and the Institute of Electrical and Electronics Engineers (IEEE)
Haley is responsible for checking the web server utilization. Which things should she review while checking the server utilization?
While checking the server utilizations, she should review____ and ____.
First box?
CPU
cables
backup media
Second box?
RAM
web application
antivirus
Answer:
While checking the server utilizations, she should review CPU and RAM.
Explanation:
Answer:
CPU and RAM
Explanation:
What are the types of storage?
Answer:
Primary Storage: Random Access Memory (RAM) Random Access Memory, or RAM, is the primary storage of a computer. ...
Secondary Storage: Hard Disk Drives (HDD) & Solid-State Drives (SSD) ...
Hard Disk Drives (HDD) ...
Solid-State Drives (SSD) ...
External HDDs and SSDs. ...
Flash memory devices. ...
Optical Storage Devices. ...
Floppy Disks.
Answer:
The types of storage unit are 1)magnetic storage device 2)optical storage device
How has the shift to locally grown produce decreased greenhouse emissions?
Answer:
How has the shift to locally grown produce decreased greenhouse emissions? 1 Large farms often create greenhouse emissions by poor farming practices. 2 Locally grown produce allows fewer dangerous toxins to seep into the soil and the atmosphere.
Present an example that uses correctly a local variable inside a function to mask (hide) it from a global variable. Explain the purpose of masking the variable, how it should be declared, and how it is used. Show as much C/C++ code as needed to explain your example.
The code example that uses correctly a local variable inside a function to mask (hide) it from a global variable is:
int i = 5;
void function (){
...
for(int i = 0; i < 13; i++)
}
What are local and global variables?Local variables are variables that have the scope only inside the function that it was declared.
Global variables are variables that have an entire program as a scope.
If a global variable is "re-declared" inside a function, then the scope is only the function, meaning that the local variable inside the function hides it from the global variable.
This is the case in the code we gave for this problem, in which:
The global variable i is declared with a value of 10.Inside the function function(), another variable i is declared, this time with a scope only inside the function f, masking it from the global variable.More can be learned about local and global variables at https://brainly.com/question/13109296
#SPJ1
3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification
Here's the correct match for the purpose and content of the documents:
The Correct Matching of the documentsProject proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.
Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.
Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.
Read more about Project proposal here:
https://brainly.com/question/29307495
#SPJ1
identify what is being described in each statement below choose the correct answer from the choices inside the box write it on provided answer sheet
Impediments which alter the normal flow of transferring messages or information between a sender and receiver results in communication breakdown. The causes of the breakdown in communication in the pictures are :
Noise from cars due to engine or horn
Noise from Television
Angry conversation resulting in yelling
In other to ensure a smooth and successful communication, the message or information being passed between the speaker and receiver must be well heard and received, hence prompting an appropriate response.
Noise from car engines, horn and other vehicle mechanism would affect the clarity of the information being passed, hence resulting in communication breakdown.
Similarly, The volume of sound coming from a Television set is capable of causing communication breakdown due to high sound level preventing the accuracy of the messages being passed.
Learn more about communication on:
brainly.com/question/21262702
#SPJ1
What is social displacement? Question 22 options: the gained efficiency in being able to communicate through technology , the act of moving files from your computer to an external site , the risk of being "unfriended" by someone on social media , the reduced amount of time we spend communicating face to face
Answer: The Answer should be D
Explanation: It's the definition.
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
I have already asked this before and recieved combinations, however none of them have been correct so far.
Help is very much appreciated. Thank you for your time!
Based on the information provided, we can start generating possible six-digit password combinations by considering the following:
The password contains one or more of the numbers 2, 6, 9, 8, and 4.
The password has a double 6 or a double 9.
The password does not include 269842.
One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.
Using this method, we can generate the following list of possible password combinations:
669846
969846
669842
969842
628496
928496
628492
928492
624896
924896
624892
924892
648296
948296
648292
948292
Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.
I need help finishing this coding section, I am lost on what I am being asked.
Answer:
when cmd is open tell me
Explanation:
use cmd for better explanatios
what functions can you perform with project management software?
Answer:
Planning and scheduling. ...
Collaboration. ...
Documentation. ...
Reporting. ...
Resource management. ...
Managing the project budget.
Explanation:
1.convert the following binary numbers to decimal
1.AB2 base in 16
2.123 in base 16
3.ABB base 16
4.35E.E base 16
2.convert binary numbers to decimals
1.237 in base 8
2.2731 in base 8
3.617.7 in base 8
4.22.11 in base 8
3.Find the two's complement representation of the following numbers using 8bit
a) -17
b) -11
c) -46
d) -78
a) The converted binary numbers are:
1.AB2 base in 16 = 2738
2.123 in base 16 = 291
3.ABB base 16 = 43787
4.35E.E base 16 = 3.3671875
b) converted binary numbers to decimals are:
237 in base 8 = 159
2731 in base 8 = 1497
617.7 in base 8 = 7.234375
22.11 in base 8 = 0.15625
c) The two's complement representations of the following numbers using 8bit are:
-17 = 11101111.
-11 = 11110101.
-46 = 11010010.
-78 = 10110010.
What is the explanation for the above?1) Converting binary numbers to decimal:
AB2 base in 16:
The first digit from the right is 2, which represents 2 in decimal.
The second digit from the right is B, which represents 11 in decimal.
The third digit from the right is A, which represents 10 in decimal.
Therefore, AB2 base 16 in decimal is: 2 + 11x16 + 10x16^2 = 2 + 176 + 2560 = 2738
2) 123 in base 16:
The first digit from the right is 3, which represents 3 in decimal.
The second digit from the right is 2, which represents 2 in decimal.
The third digit from the right is 1, which represents 1 in decimal.
Therefore, 123 base 16 in decimal is: 3 + 2x16 + 1x16^2 = 3 + 32 + 256 = 291
3) ABB base 16:
The first digit from the right is B, which represents 11 in decimal.
The second digit from the right is B, which represents 11 in decimal.
The third digit from the right is A, which represents 10 in decimal.
Therefore, ABB base 16 in decimal is: 11 + 11x16 + 10x16^2 = 11 + 2816 + 40960 = 43787
4) 35E.E base 16:
The first digit from the right is E, which represents 14 in decimal.
The second digit from the right is ., which separates the integer and fraction parts.
The third digit from the right is 5, which represents 5 in decimal.
The fourth digit from the right is 3, which represents 3 in decimal.
The fifth digit from the right is E, which represents 14 in decimal.
Therefore, 35E.E base 16 in decimal is: 14/16 + 3x16^-1 + 5x16^-2 + 14x16^-3 = 14/16 + 3/16 + 5/256 + 14/4096 = 3.3671875
Converting binary numbers to decimal:
1) 237 in base 8:
The first digit from the right is 7, which represents 7 in decimal.
The second digit from the right is 3, which represents 3 in decimal.
The third digit from the right is 2, which represents 2 in decimal.
Therefore, 237 base 8 in decimal is: 7 + 3x8 + 2x8^2 = 7 + 24 + 128 = 159
2) 2731 in base 8:
The first digit from the right is 1, which represents 1 in decimal.
The second digit from the right is 3, which represents 3 in decimal.
The third digit from the right is 7, which represents 7 in decimal.
The fourth digit from the right is 2, which represents 2 in decimal.
Therefore, 2731 base 8 in decimal is: 1 + 3x8 + 7x8^2 + 2x8^3 = 1 + 24 + 448 + 1024 = 1497
3) 617.7 in base 8:
The first digit from the right is 7, which represents 7 in decimal.
- The second digit from the right is ., which separates the integer and fraction parts.
- The third digit from the right is 1, which represents 1 in decimal.
- The fourth digit from the right is 6, which represents 6 in decimal.
- Therefore, 617.7 base 8 in decimal is: 7/8 + 1x8^-1 + 6x8^-2 + 0x8^-3 + 0x8^-4 + 0x8^-5 + 0x8^-6 + 0x8^-7 = 7/8 + 1/8 + 6/64 = 7.234375
4) 22.11 in base 8:
The first digit from the right is 1, which represents 1 in decimal.
The second digit from the right is 1, which represents 1 in decimal.
The third digit from the right is ., which separates the integer and fraction parts.
The fourth digit from the right is 2, which represents 2 in decimal.
Therefore, 22.11 base 8 in decimal is: 1x8^-1 + 1x8^-2 + 2x8^-3 + 0x8^-4 = 0.140625 + 0.015625 = 0.15625
Finding the two's complement representation of the following numbers using 8-bit:
To find the two's complement of a negative number, we first need to represent the number in binary form, invert all the bits, and then add 1 to the result.
a) -17:
- The binary representation of 17 is 00010001.
- Inverting all the bits gives 11101110.
- Adding 1 to 11101110 gives 11101111.
- Therefore, the two's complement representation of -17 in 8-bit is 11101111.
b) -11:
- The binary representation of 11 is 00001011.
- Inverting all the bits gives 11110100.
- Adding 1 to 11110100 gives 11110101.
- Therefore, the two's complement representation of -11 in 8-bit is 11110101.
c) -46:
- The binary representation of 46 is 00101110.
- Inverting all the bits gives 11010001.
- Adding 1 to 11010001 gives 11010010.
- Therefore, the two's complement representation of -46 in 8-bit is 11010010.
d) -78:
- The binary representation of 78 is 01001110.
- Inverting all the bits gives 10110001.
- Adding 1 to 10110001 gives 10110010.
- Therefore, the two's complement representation of -78 in 8-bit is 10110010.
Learn more about binary numbers at:
https://brainly.com/question/28222245
#SPJ1
Using the Student class you created in the previous problem, instantiate 3 Student objects. Add them to a list, then iterate through the list and call the print function on your Student class so that your output resembles: There are 3 students in this class: Chuck is from Charles City Sally is from Shenendoah Juan is from Des Moines
class Student:
def __init__(self, name, city):
self. name = name
self. city = city
def print(self):
print(f"{self.name} is from {self.city}")
students = [Student("Chuck", "Charles City"), Student("Sally", "Shenendoah"), Student("Juan", "Des Moines")]
print("There are 3 students in this class:")
for student in students:
student. print()
The code:We first create a Student class that contains two attributes: name and city. The init method initializes the attributes. Then, we instantiate three Student objects and add them to a list. Finally, we iterate through the list and call the print() method on each Student object which prints out the student's name and city.
Learn more about programming :
https://brainly.com/question/23275071
#SPJ4
At what age could you retire with $1 million if you started investing at age 25?
Answer:
65 years old
Explanation:
25-year-old would need to save approximately $400 a month to achieve a $1 million balance by age of 65
Which of the following statements is true regarding a user account? Once a user account has been created, it cannot be completely deleted. Once a user account has been assigned to a group, it cannot be completely deleted. Files created by a user in a group must be assigned to another group member if the original user account is deleted. Files created by a user account can be completely removed if they are no longer needed.
Answer:
Files created by a user account can be completely removed if they are no longer needed.
Explanation:
A user account can be defined as a profile or identity created for the users of a computer system. There are various types of user accounts and these includes administrator, guest, and standard user.
The statements which is true regarding a user account is that, files created by a user account can be completely removed if they are no longer needed.
Internet Retailing
Visit an e-commerce Web site such as Amazon.com and find a product you would like to purchase. While looking at the page for that item, count the number of other products that are being offered on that page.
Activity
Answer the following questions: What do they have in common? Why are they appearing on that page?
When I visited the e-commerce Web site such as Amazon.com and find a product that I would like to purchase which is a laptop, The thing that the sellers have in common is that they are trusted and verified sellers, their product presentation is nice and has warranty on it. The reason they are appearing on that page is because the product are similar.
What is E-commerce site website?The term e-commerce website is one that enables customers to buy and sell tangible products, services, and digital commodities over the internet as opposed to at a physical store. A company can process orders, receive payments, handle shipping and logistics, and offer customer care through an e-commerce website.
Note that there are numerous eCommerce platforms available, each with its own set of characteristics. The optimal eCommerce platform will therefore rely on your demands, available resources, and business objectives.
So, for instance, if you're a novice or small business owner looking to set up an online store in only a few clicks, go with a website builder like Hostinger. Oberlo, on the other hand, boasts the best inventory management system for dropshippers and is the top eCommerce platform overall.
Learn more about e-commerce Web site from
https://brainly.com/question/23369154
#SPJ1
Choose all of the items that accurately describe an operating system.
manages a computer’s hardware
implements essential features like file and folder management
is managed by the microprocessor (CPU)
provides the platform that application software runs on
is not necessary on a smartphone
Answer:
provides the platform that application software runs on, manages a computer's hardware, and implements features like file and folder management.
Explanation:
The operating system manages a computer’s hardware, provides the platform that application software runs on and implements essential features like file and folder management. The correct options are a, b, and d.
What is operating system?An operating system (OS) is the program that manages all of the other application programs in a computer after being loaded into the computer by a boot program.
The application programs interact with the operating system by requesting services via a predefined application program interface (API).
The operating system (OS) controls all of the computer's software and hardware. It manages files, memory, and processes, handles input and output, and controls peripheral devices such as disk drives and printers.
The operating system manages the hardware of a computer, provides the platform on which application software runs, and implements essential features such as file and folder management.
Thus, the correct options are a, b, and d.
For more details regarding operating system, visit:
https://brainly.com/question/6689423
#SPJ2
51. According to the OSI model, at which of the following layers is data encapsulated into a packet?
(A) Layer 2
(B) Layer 3
(C) Layer 4
(D) Layer 5
According to the OSI model, the layer in which data is encapsulated into a packet is: A. layer 2.
The layers of the OSI model.Basically, there are seven (7) layers in the open systems interconnection (OSI) model and these include the following in sequential order;
Physical LayerData link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication LayerIn Computer networking, the data link layer known as "layer 2" is where data is encapsulated into a packet.
Read more on OSI model here: https://brainly.com/question/26177113
#SPJ1
wite a short essay recalling two instance, personal and academic, of when you used a word processing software specifically MS Word for personal use and academic work
I often use MS Word for personal and academic work. Its features improved productivity. One use of MS Word was to create a professional resume. MS Word offered formatting choices for my resume, like font styles, sizes, and colors, that I could personalize.
What is MS WordThe software's tools ensured error-free and polished work. Using MS Word, I made a standout resume. In school, I often used MS Word for assignments and research papers.
Software formatting aided adherence to academic guidelines. Inserting tables, images, and citations improved my academic work's presentation and clarity. MS Word's track changes feature was invaluable for collaborative work and feedback from professors.
Learn more about MS Word from
https://brainly.com/question/20659068
#SPJ1