A digital signature is created when a person signs his or her name on a pen pad and the signature is automatically converted and affixed to a computer document.
What is a document?Generally speaking, a document is a permanent record of information that a user may access at a later time. In a document storage system, a full document or specific sections of it can be regarded as distinct data elements. Here are some typical illustrations of documents: letters.
Which four types of documents are there?Tutorials with a learning focus are one of the four categories of documentation.
how-to manuals with a purpose.
conversations that focus on understanding.
informational sources of reference.
To know more about the document visit:
https://brainly.com/question/20696445
#SPJ4
Question 2 of 25
What is the best definition of a programming language?
A. The internal language a computer uses to communicate with
other computers and devices
OB. A language that instructs a computer how to carry out functions
OC. A complex thought process that breaks down difficult problems to
find their solutions
OD. The language that developers use to communicate with one
another about software design
SUBMIT
Answer:
A language that instructs a computer how to carry out functions
Explanation:
The definition of computer programming is the process of writing code to facilitate specific actions in a computer, application or software program, and instructs them on how to perform.
This is a longer answer to the question just without "language" in it.
Answer:
B. A language that instructs a computer how to carry out functions
Explanation:
A computer language designed to provide standardized commands is known as a programming language. These instructions can be translated into a machine-readable code.
What type of cloud infrastructure delivers services based on security requirements, the mission-critical nature of the applications, and other company-established policies that supports organizations that want to maintain higher security standards for some data but have less-sensitive data that does not require intranet-level protection?.
Private cloud computing offers features like scalability and self-service that are similar to those of public cloud computing.
What is cloud infrastructure ?
The set of hardware and software components needed to enable cloud computing make up cloud computing infrastructure. It consists of computer and network resources.Through the development of cloud networks that effectively store data remotely, a cloud infrastructure engineer contributes to the development of the networks and systems needed for computer cloud systems.Public, private, hybrid, and multiclouds are the four primary categories of cloud computing. The three primary categories of cloud computing services are infrastructure as a service (IaaS), platforms as a service (PaaS), and software as a service (SaaS).Network, servers, storage, and virtualization are the four elements of cloud infrastructure that each contribute to the success of an organization's application deployment and service delivery.To learn about infrastructure refer to :
https://brainly.com/question/29745873
#SPJ1
Answer the following question in 3-4 complete sentences. Define the following terms: - registration - press - keyblock.
Answer: the action or process of registering or of being registered: To exert steady weight or force against: an indentation where the rock pressed the ground
In financial cryptography and PCI standards, a Key Block is an encrypted key stored with its metadata in a cryptographically secure way. That means that the key’s usage information and other parameters can’t be altered by an attacker by tampering with the encrypted key.
Explanation:
she is developing access policies based on personnel security principles. as part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. what practice is she developing?
The right response is a direct assault. An immediate attack is a type of chance where a threat is actively pursued and compromised by a group of people.
What is assault?In general, an assault is defined as an intentional act that causes another person to reasonably fear harmful or offensive contact will occur soon. No actual harm must be done to the victim, but the actor must have intended to make an offensive or harmful contact with them, and the victim must have been made aware of this intention immediately.In the context of an assault, "intention" denotes that the action was not accidental; the motive, however, is irrelevant.It doesn't matter if the tortfeasor just wanted to scare the victim or if they were making a joke about it.It is sufficient for the tortfeasor to have intended the actual contact without regard to whether it was harmful or offensive.To learn more about intention refer https://brainly.com/question/29613124
#SPJ4
which cytoskeletal element could be described as solid, thinner structures that are often organized into a branching network?
the cytoskeletal element could be described as solid, thinner structures that are often organized into a branching network is microfilaments
What is microfilaments?As they are made up of two entangled strands of the globular protein known as actin, microfilaments are also known as actin filaments. They are the tiniest filaments of the cytoskeleton and polymers of the protein actin. They are essential for muscle contraction, cell division, and cellular mobility.With a diameter ranging from 5 to 8 nanometers, microfilaments are the thinnest cytoskeleton filaments seen in the cytoplasm of eukaryotic cells. These filaments' polymers are robust and flexible, resisting buckling and crushing while providing support for the cell.Microfilaments are adaptable parts that are crucial to cytokinesis and the structure of a cell. The flexible filament layout of the framework makes it possible for it to aid in cell migration.To learn more about microfilament refer to:
https://brainly.com/question/1286389
#SPJ4
you want to be able to identify the services running on a set of servers on your network. which tool would best give you the information you need? answer port scanner protocol analyzer network mapper vulnerability scanner
Services running on a set of servers on your network. the tool would best give you the information you need vulnerability scanner
What is mean by vulnerability scanner?A vulnerability scanner is a piece of software created to examine networks, applications, and machines for vulnerabilities. These scanners are employed to identify a system's vulnerabilities. They are used to identify and find vulnerabilities in network-based assets like firewalls, routers, web servers, application servers, etc. that result from incorrect setups or poor programming. Both authenticated and unauthenticated scans are possible with contemporary vulnerability scanners. Modern scanners are frequently offered as SaaS (Software as a Service); they are delivered online and are shown as web applications. The installed software, open ports, certificates, and other host data that can be queried as part of its workflow can all be customised by the modern vulnerability scanner, as well as vulnerability reports.To learn more about vulnerability scanner refer to:
https://brainly.com/question/29534018
#SPJ4
what is a computer?
Answer:
A computer is an electronic machine designed to accept data as input , process the data, and give out required information/ result as output
EXPLANATION:
A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result
based on a program, software, or sequence of instructions on how the data is to be processed.
i hope this helped
explain one advantage and two disadvantage of including an instruction such as this in a pipelined processor
The one advantage and two disadvantages of including an instruction in a pipelined processor are explained below.
The advantage of a pipelined processor is performance improvement, through pipelining it is possible to pump more instructions in order to execute parts of various instructions in parallel. The first disadvantage of a pipelined processor is that it makes things complex in the case of branch forwarding. and the second disadvantage is that it makes concurrency problems related to the influence of several instructions using the same data or waiting for several other instructions to run.
You can learn more about pipelined processor at
https://brainly.com/question/13059382
#SPJ4
assuming a packet loss is detected after the 26th round by a receipt of a triple duplicate ack, the value of the congestion window size will be
The threshold will be set to half the current value of the congestion window (8) when the loss occurred and congestion window will be set to the new threshold value + 3 MSS. Thus the new values of the threshold and window will be 4 and 7 respectively.
What is Congestion window?
The congestion window (CWND) is one of the factors in TCP that determines the maximum number of bytes that can be sent out at any given time. The sender maintains the congestion window, which prevents a link between the sender and the receiver from becoming overloaded with traffic. This is not to be confused with the sender's sliding window, which exists to keep the receiver from becoming overloaded. The congestion window is calculated by estimating the amount of congestion on the link.
When a connection is established, the congestion window, which is kept independently by each host, is set to a small multiple of the maximum segment size (MSS) allowed on that connection.
To know more about TCP, visit: https://brainly.com/question/14280351
#SPJ4
Why do games usually have rules?
A.
to make them less fun
B.
to provide structure so that the game objective can be achieved
C.
so that they can be broken
D.
because it’s easier to program rules into a game
Answer:
B
Explanation:
Part B
Instant Search can NOT be used to search through archived messages.
Please select the best answer from the choices provided
True or false
Answer: False
Explanation:
Instant Search can be used to search through archived messages!
Which of the following statements is NOT a difference between movies and video games?
A.
Movies have been around for decades longer than video games.
B.
Movies show you the story, but video games allow you to shape the story.
C.
Video games have player agency, whereas movies usually do not allow viewers to make decisions that affect the plot.
D.
Movies always have a narrative, whereas video games usually do not.
Create a program that prompts the user for how old they are turning, and then, using a loop, outputs a virtual cookie for every year old they are.
Answer:
age = int(input('How old are you turning? '))
for i in range(age):
print('(::)')
using a chained hash table with an array size of 17. what is the maximum number of entries that can be added to the table.
There is no maximum upper limit of entries that can be added to the tables in an array.
What are an example and an array?An array is a collection of comparable types of data. For instance, we can create an array of the string type that can hold 100 names if we need to record the names of 100 different persons. an array of strings = new String[100]; Here, the aforementioned array is limited to 100 names.
How do arrays function?Elements of the same data type are found in adjacent and close-by memory areas in a linear data structure known as an array. Arrays operate using an index system with values ranging from 0 to (n-1), where n is the array's size.
To know more about array visit:
https://brainly.com/question/19570024
#SPJ4
g 1 - explain how a vpn can prevent: a) a man-in-the-middle-attack. b) passive eavesdropping 2- explain how to reconcile the integrity guarantees of ipsec with the fact that certain fields in the ip header are mutable.
This guarantees that packets are coming from a reliable source and not an intruder Encryption. Each packet's IP header and payload are both encrypted via IPsec.
What is IP Security?
A system called IP Security, or IPsec, allows for the safe transmission of data over open networks. to create circuits utilising IPsec tunnelling, where all data transported between the two endpoints is encrypted, to secure network data. With the following qualities, IPsec can secure our traffic. Confidentiality is ensured by encrypting our data so that only the sender and recipient may access it. Establishing secure connections between devices is a VPN operates. The IPsec or SSL/TLS encryption protocols are frequently used in VPNs. Encryption keys are created by each device connected to the VPN, and all data transferred across the VPN is encoded and decoded using these keys.
To learn more about network data from given link
brainly.com/question/9421222
#SPJ4
if you need to display lots of text in a worksheet, you can consider using a text box. how will you insert a textbox?
Select "Text Box" under the "Text" section of the Insert tab. To draw a text box in the worksheet that is the desired size, click and drag. To add text, simply click inside the box and enter or paste your text.
In Excel, what is the name of the text box?
This cell. There are rows and columns in an Excel worksheet. Cells are the little boxes that are formed where these columns and rows cross. The cell with a black border is the active cell, or the cell that can be affected.
The text box function is what.
You can add a text box as an object to your document, allowing you to enter and insert text wherever in your file. Text boxes can be beneficial for moving material about in your document as well as for calling attention to certain text.
To know more about Text box in Excel visit;
https://brainly.com/question/14831906
#SPJ4
kara has selected the cell range a1:d8 in the worksheet shown. which option would allow kara to sort the data in alphabetical order according to the employees' first names?
The option that would allow kara to sort the data in alphabetical order according to the employees' first names is sorted by: Columns B, A to Z. The correct option is B.
What is a worksheet?Cells in a worksheet (sometimes referred to as a spreadsheet) can be used to enter and compute data. Columns and rows have been used to arrange the cells.
Consider it a book. Select the data, go to the Data Ribbon, click Sort, then choose the column you wish to alphabetize by in Excel. Your mouse should be over the data you want to alphabetize.
Therefore, the correct option is B, sort by: Column B, A to Z.
To learn more about the worksheet, refer to the link:
https://brainly.com/question/29558945
#SPJ1
The question is incomplete. Your most probably complete question is given below:
Sort by: Column A, A to Z
Sort by: Column B, A to Z
Sort by: Column C, Z to A
Sort by: Column B, Z to A
According to the cloud computing trends for 2020 video case, what term is used to describe a distributed computing model where information is processed closer to its source?.
Answer: Public cloud providers have begun to distribute their services to different geographical locations, becoming known as the distributed cloud. In this way, the cloud is broken up into multiple smaller datacenters in different locations rather than just one large datacenter.
Explanation:
write a Visual Basic program that asks the user to enter a number and then displays the number than is ten times larger than the number entered.
Answer:
Module Module1
Sub Main()
Dim num As Integer
Console.WriteLine("Enter a number: ")
num = Console.ReadLine()
Console.WriteLine("The number you entered is: " & num)
Console.WriteLine("The number ten times larger than the number you entered is: " & num * 10)
Console.ReadLine()
End Sub
End Module
To add a design to your PowerPoint, you should look under the ______ tab.
Design
Home
Insert
All of the above
What is output by the following code?
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)
Answer:
if the code is like this, theres an indent on the print(sum)
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)
the output would be:
3
8
15
24
35
or
if the code look like this, it has no indent on print(sum)
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)
the output would be:
35
what kind of software would you use to view and troubleshoot protocol specific problems such as tcp retries
The most common software used to view and troubleshoot protocol specific problems such as TCP retries is a protocol analyzer. Popular examples are Wireshark, tcpdump, and Microsoft Network Monitor.
The Benefits of Using a Protocol Analyzer for Troubleshooting Protocol Specific IssuesProtocols such as TCP are fundamental for the successful communication and interaction of computers with each other over the internet. As such, any problems or issues with these protocols can have serious consequences for the functionality of networks and systems. To identify, diagnose and troubleshoot these issues, protocol analyzers are essential tools. This essay will discuss the benefits of using a protocol analyzer for troubleshooting protocol specific issues.
A protocol analyzer is a type of software which can be used to view, analyze and monitor the traffic generated by protocols such as TCP. It can be used to detect issues such as retransmissions, packet drops, or incorrect packet sizes. As such, it serves as an invaluable tool for network and system administrators who need to diagnose and troubleshoot protocol specific issues.
Learn more about TCP protocol:
https://brainly.com/question/14280351
#SPJ4
what career cluster allows you to act direct or produce
Answer:
finance analyst, treasurer, economist, bank worker, debt counselor or insurance professional.
Explanation:
In CANTRAC, what functionality portion of CeTARS is where course data is initially input and updated, this data is automatically updated in CANTRAC?
Answer:
Discoverer
Explanation:
How do you find the width and height of an Oval in coding? (cmu)
Explanation:
MU Graphics is a persistent-object graphics package, meaning that it allows you to draw shapes on the screen using Python, and those shapes will stay on the screen until they are removed.
Here is an example. Click the green run button to draw a rectangle and circle. You can also change the code and run again to see your changes!
Shapes can be changed or interacted with by using the built-in event functions, like so.
Match each explanation with the correct term.
1-multiprocessing
2-subtasks
3-multiprogramming
•Each task allocated a set amount of time in which to be executed.
•Tasks are executed through different processors and shared memory.
•Components of instructions are broken down to enable concurrent processing. Tasks are executed through different processors and shared memory.
The ability for many processes to share processors (CPUs) and other system resources is known as multitasking. One task is run at a time by each CPU (core). However, multitasking enables each processor to swap between active tasks without having to wait for each one to complete (preemption).
What multiprogramming task allocated set amount of time?Multitasking in computers is the simultaneous performance of several tasks (sometimes referred to as processes) for a predetermined amount of time.
Therefore, Instead of waiting for an existing job to finish, new ones can begin and interrupt it before it is complete.
Learn more about multiprogramming here:
https://brainly.com/question/13441089
#SPJ1
You have been given an assignment for a magazine. The assignment involves architectural photography. The magazine wants high-contrast black and white abstract images that follow the basics of composition. Choose four elements of composition and explain in detail how you would translate them into architectural photographs. Produce architectural photographs using the chosen rules of composition.
(Subject Photography)
Answer:
I think it should be camera
which of the following classifications of method behavior produces acceptable side effects? group of answer choices any method that changes another object. any method that changes an explicit parameter. mutator methods that do not change explicit parameters. accessor methods that do not change explicit parameters.
The following classifications of method behaviour produces acceptable side effects is Mutator methods that do not change explicit parameters.
How do I use Java's mutator methods?
Accessible methods for mutators must be declared. Although, there is no return type for Mutator methods. However, depending on the information type of the residential variable, they may accept a parameter. Then, it will use the keyword this to acquire the private variable and set its value to the parameter's value.
What names should mutator methods have?
Now let us start with the names that mutators are given. The method has to return void and be public. In addition, the keyword set should start the method name in lowercase. the class variable name, starting with a capital letter.
To know more about Mutator methods visit:
https://brainly.com/question/29852600
#SPJ4
What formula would you enter in C3 that combines A3 and B3 to get a result like in C2?
answer choices
=CONCATENATE(A3," ",B3)
=A3,&,&,B3
=CONCATENATE(B3," ",A3)
=CONCATENATE(B3,,,A3)
=B3,&,&,A3
You would enter the formula CONCATENATE(A3,"",B3) in C3 to combine A3 and B3 to produce the same outcome as C2.
What three categories of formulae are there?Empirical, molecular, and structural chemical formulae are the three basic categories. The simplest entire freaking ratio of the atoms is shown by empirical formulae, the number for every type of atom of an element is shown by molecular formulas, and the bonds between the atoms or molecules are shown by structural formulas.
Briefing :=CONCATENATE("A3","","B3") =CONCATENATE(A3," ",B3) =CONCATENATE(A3,,B3) =CONCATENATE(A3,"",B3) Where, ext1, text2, ... text_n depicts the wires that need to be connected. We do not need to surround A3 and B3 in quot since the line values are already contained within a cell.
To know more about Formula visit :
https://brainly.com/question/17983720
#SPJ4
a system administrator opens a phishing email while using his privileged credentials is considered an insider threat?
It is true that an insider threat exists when a system administrator opens a phishing email while using his privileged credentials.
What is system administrator?A system administrator (sysadmin) is an information technology professional who supports a multiuser computing environment and ensures continuous, optimal performance of IT services and support systems.Sysadmins are responsible for ensuring the uptime of their companies' computers, servers and internet -- basically "keeping the lights on" to limit work disruptions. This includes system maintenance and configuration, such as installing and troubleshooting hardware and software and assessing new technologies for their companies.Nevertheless, system administrator job responsibilities vary greatly among employers. In larger organizations, the title may be used to describe any administrator who is responsible for a specialized IT system, such as the one that supports servers.To learn more about servers refer to:
https://brainly.com/question/24137718
#SPJ4