Answer:
A web application is a computer program that utilizes web browsers and web technology to perform tasks over the Internet.
Explanation:
Web applications include online forms, shopping carts, word processors, spreadsheets, video and photo editing, file conversion e.t.c.
. ___________ is the duty of every government that wants to ensure its national security.
A. Cybersecurity
B. Connectivity
C. Policy
D. Defense
Answer:
your answer is d wish it helps you
Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing practices and procedures b. Increases in hacker skills and capabilities c. Poorly designed network protection software d. Increasing sophistication of computer viruses and worms
Answer:
Users who do not follow secure computing practices and procedures
Explanation:
Most data breaches that occur as a result of hacking and cyber-attacks get all the attention. However, the kind of mistakes that employees make in corporate situations can sometimes be very costly. Whether accidental or not, human error is the leading cause of most information security breaches. When you have proper policies, people working in big organizations, for instance, will know how they are to do with them. Organizations should put more effort on its employees. By ensuring that secure computing practices and procedures are followed, it will help guide the workforce more effectively.
What are the differences between Layered and Client-Server Architecture?
The differences between Layered and Client-Server Architecture is Client-Server Architecture is a shared architecture system where loads of client-server are divided, whereas layered architecture is a software architecture in which the different software components, organized in tiers (layers).
Further explanation
Software architecture is the fundamental structures of a software system. On the application level, the two most common architectures are client/server and layered architecture.
Client-Server Architecture is a shared architecture system where loads of client-server are divided. In client/server architecture, the database system has two parts such as a front-end or a client, and a back-end or a server.
Multitier or layered architecture (often referred to as n-tier architecture) is a software architecture in which the different software components, organized in tiers or layers and it provide such dedicated functionality. Examples of layered architecture are print, directory, or database services.
Learn more1. Learn more about Client-Server Architecture https://brainly.in/question/9279200
Answer details
Grade: 9
Subject: Computers and Technology
Chapter: software architecture
Keywords: software architecture, Client-Server Architecture, Layered architecture
Write a program that will askthe user to enter the amount of a purchase. The program should thencompute the state and county sales tax. Assume the state sales tax is4 percent and the county sales tax is 2 percent. The program should displaythe amount of the purchase, the state tax, the county sales tax, the total salestax, and the total of the sale. (which is the sum of theamount of purchase plus the total sales tax). Hint: Use the value 0.02 torepresent 2 percent, and 0.04 to represent 4 percent.
Info:
I am doing it in Python. Hope it will help you.
Code:
am = float(input('Enter the amount: '))
stx = (am*0.04)
slt= (am*0.02)
tl = stx+slt+stx
print(f'Sales Tax: {slt}, State Tax: {stx}, Grand Total: {tl}')
Result:
Enter the amount: 15
Sales Tax: 0.3, State Tax: 0.6, Grand Total: 1.5
Which text function capitalizes the first letter in a string of text?
Question 10 options:
UPPER
CAPITAL
FIRST
PROPER
1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they heroic characters or dangerous criminals? Do the representations conform to any of the realities of the hacker subculture, or do they simply further stereotypes about hackers as a whole?
Final answer:
Portrayals of hackers in media often simplify or sensationalize the hacker subculture, overlooking its complexity and diversity. Understanding the motivations behind hacking activities is crucial, yet resources tend to focus more on technological defenses than on the individuals involved. There is a need to differentiate between hackers and to develop a nuanced view of their activities and ethical considerations.
Explanation:
Popular media often portray hackers as either noble outlaws or dangerous criminals, leaning into stereotypes that may not accurately reflect the realities of the hacker subculture. This binary representation overlooks the complex motivations and ethical frameworks within which many hackers operate. For instance, while some hackers engage in criminal activities for personal gain, others are driven by political ideologies, aiming to expose corruption or promote transparency, akin to what has been observed with groups like Wikileaks.
There is a growing need to differentiate between various types of hackers, rather than lumping them together in a single, often negative, caricature. Understanding who is hacking and why is crucial, yet, as highlighted in discussions, resources are mainly funneled into technological defenses rather than exploring the psychological and sociological aspects of hacking. This approach fails to address the root causes or motivations behind hacking activities, whether they are for malicious purposes, curiosity, or whistleblowing.
Moreover, the representation of hackers in media fails to capture the diversity within the hacker community, which is not monolithic. Attributes commonly ascribed to hackers, such as being male, bright, and socially withdrawn, might resonate with certain stereotypes but do not universally apply. The comparison of some hackers' behavior to that of corporations, as described by Joel Bakan, suggests a need to critically evaluate and understand the ethical dimensions and the potential for 'psychotic' behavior within both entities.
When date is processed into a meaningful form, i becomes _______.
Answer:
When date is processed into a meaningful form, it becomes information.
The thick net medium consisted of a thin coaxial cable True/False
Answer:
True
Explanation:
The thick net medium consisted of a thin coaxial cable.
Write a program that has a conversation with the user. The program must ask for both strings and numbers as input. The program must ask for at least 4 different inputs from the user. The program must reuse at least 3 inputs in what it displays on the screen. The program must perform some form of arithmetic operation on the numbers the user inputs. Please turn in your .py file as well as a screenshot of your program's output. Please include comments in your code to explain how it works An example program run might look like (have fun with this and be creative): ‘What is your name?’ “Josh” ‘Thanks, Josh. What is your favorite color?’ “green” ‘Mine too. Do you also like Ice Cream?’ “No” ‘Josh, how old are you?’ “40” ‘... and how many siblings do you have?’’ “3” ‘That means you are one of 4 kid(s). Is green the favorite color of anyone else in your house?’
Answer:
yo im sorry eat my cookie
Explanation
doorkoeeworkwoeroewkrwerewrwe
A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states).
Answer:
A geographic information system (GIS) uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states).
what are the advantages of google cloud ?
Answer:
There are many advanteges of google cloud but the only one i can name off my head is that there will be ALOT more storage you can use.
Are technical skills or people skills more important to the team manager in a software development project?
Answer:
A well-rounded team manager in a software development project is critical to its success. Having the best developers only gets you so far. Without proper leadership, the project will most likely fail. Developers won't know what direction to go, deadlines won't be met, and the end product will not be created to the specifications as set forth in the project. A software development team manager needs to possess both the proper technical skills to guide the developers when they get stuck, but more importantly have the proper people skills and business process skills to allow the team to work as a well-oiled machine. In this paper, we will look at two different types of team managers and how they affect the software development lifecycle.
In recent years the number of arbitrary/remote code execution attacks have skyrocketed. Why is this type of attack so popular with attackers?
Explain the role auditing plays in the context of achieving trustworthy systems.
Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s.
A. digital signals
B. contiguous signals
C. ramp signals
D. exponential signals
Answer:
i think digital signals
Explanation:
A digital signal is a signal that is being used to represent data as a sequence of discrete values; at any given time it can only take on one of a finite number of values.[1][2][3] This contrasts with an analog signal, which represents continuous values; at any given time it represents a real number within a continuous range of values.
Answer: A) Digital signals
Explanation:
Digital signal is a signal that helps in describing about the data in sequential manner in form discrete bands or binary values. The electrical signal containing data is converted into bits that can be represented through two digital values i.e. 0s and 1s.Other options are incorrect because contiguous signal is regular adjacent signal. Ramp signal is represented as increment in magnitude with timeExponential signal is based on sine and cosine signal that is two real time signal.Thus, the correct option is option(A).What is the relation between Information and Data?
Answer:
In a sentence: data is raw numbers, while information is organized data.
Explanation:
Data is a series of numbers or facts. A data set is a collection of data that are related (for examples all the students result in your last math exam). But it's not organized by itself... and rarely mean anything when looked at it in a raw manner.
To make sense of a data collection, you have to analyze it, calculate the mean or median of the data set for example... this is a treatment that has to be done to a data set to give it significance.. after such analysis, the result you have (mean, median, etc..) is a piece of information devired from the data.
In the CSMA/CD random access method, if the maximum propagation time is 100 micro seconds and the station has unsuccessfully attempted transmission ten times, the maximum amount of time the station waits before the next attempt to send is:
a. 51,200 micro seconds
b. 204,800 micro seconds
c. 102,400 micro seconds
d. None of the above
2. A shift register can operate:
a. Serially
b. In parallel
c. Both serially and parallel
Rom also called main memory or system memoryis used to stor the essential parts of the operating while the computer is running / true or false
What time does the clerk set its clock to?
Answer:
the correct corresponding time of the time zone the clerk is in
Explanation:
is this a multiple choice?
What is the difference between an HTTP POST and an HTTP GET? Give an example of when each would be used ?
An HTTP POST request is used to add new information to a server so it can be stored, and an HTTP GET request is used to retrieve stored information from a server.
Usage Examples:Let's say you run a web server dedicated to storing football game scores.
A computer at a game that just finished may use an HTTP POST request to send the final score to your web server so you can store it.
Someone at home may be viewing a website for sports scores. That website's server may send an HTTP GET request to your server asking for the final score of a specific game, and your server would provide that information.
The main circuit board inside the system uit is called megaboard / true or false
what are 2 of system software and how are they used?
Answer:
System software is software on a computer that is designed to control and work with computer hardware. The two main types of system software are the operating system(Windows,Linux,Mac OS) and the software installed with the operating system, often called utility software (Anti virus, Disk formatting, Computer language translators) . In some cases, the operating system and utility software depend on each other to function properly.
Some system software is used directly by users and other system software works in the background. System software can allow users to interact directly with hardware functionality, like the Device Manager and many of the utilities found in the Control Panel.
What is the correct method for moving a control file (assume you use PFILE)?
A. Issue the ALTER DATABASE RENAME FILE command.
B. Shut down the database; move the control file; modify the CONTROL_FILES parameter in PFILE; and start up the database using PFILE.
C. Copy the control file to a new location; shut down the database; modify the CONTROL_FILES parameter; and start up the database.
D. Shut down the database; delete the control file; start up the database in NOMOUNT mode; issue the CREATE CONTROL FILE command; and start up the database.
Answer:
b
Explanation:
What is process and what do you know about process control block?
What do you believe is the future of certification?
what is the subnet mask ?
Answer:
is a 32-bit number that masks an IP address
Explanation:
Logically twisted pair Ethernet employs a bus topology, but physically twisted star-shaped topology True/False
Answer:false
Explanation:
What is the ethical danger of using agents in negotiation?
The director of IT security is generally in charge of ensuring that the ____________ conforms to policy.
A. business
B. Workstation Domain
C. connectivity
D. infrastructure
Answer:
the answer is d wish it helps you