Multiple Choice Questions
1. Which one of the following statements best describes computer privacy?
(a) Securing a computer from fires and earthquakes.
(b) Protecting a computer from a power surge.
C) Preventing your friend from viewing your computer data without your permission.
(d) Preventing important computer files from getting accidentally deleted.
urity measures can you adopt to help protect your computer an​

Answers

Answer 1

''Preventing your friend from viewing your computer data without your permission'' is the one describes computer privacy.

What is computer security and privacy?The goal of data privacy is to protect data from unauthorised access, theft, and loss. It's crucial to maintain data security and confidentiality by practising good data management and avoiding unauthorised access that might lead to data loss, change, or theft.Because it provides you control over your identity and personal data, internet privacy is crucial. If you don't have that control, anyone with the means and the will may use your identity to further their interests, such as selling you a more costly trip or robbing you of your funds.Data protection is the focus of security, whereas user identity protection is the focus of privacy. However, the exact distinctions are more nuanced, and there may be certain places where they overlap. Security refers to safeguarding information from unauthorized access.

Learn more about Data security refer to :

https://brainly.com/question/27034337

#SPJ4


Related Questions

who is the king of computers?

Answers

Answer: Bill Gate, who is known as the king of computer programs

Hope this helps!

Answer:

Professor Eric Roberts

Explanation:

Computer scientist

What are the key constructs of a G&T Value Delivery objective?

Excelling in customer mindshare
Delivering business value
Delivering an innovative solution
Aligning to contractual commitments

Answers

Explanation:

delivering business value

"We can't a computer use source code

Answers

Answer:

Explanation:

There are two main reasons why you can't access the source code from applications on your computer: It isn't present on your computer. The source code isn't really needed to run the application, the executable is (.exe) The executable is just a bunch of machine code stuff that isn't human readable.

I this is .exe hope it helps

I need help finishing this coding section, I am lost on what I am being asked.

I need help finishing this coding section, I am lost on what I am being asked.
I need help finishing this coding section, I am lost on what I am being asked.
I need help finishing this coding section, I am lost on what I am being asked.

Answers

Answer:

when cmd is open tell me

Explanation:

use cmd for better explanatios

Ashley has many interests. She likes to read, listen to music, and play soccer with her
friends. But her favorite thing to do is to go camping with her family. She likes camping
because she gets to spend time with her mom and dad and little brother. She also loves
being outside and sleeping in a tent. She likes cooking over a campfire and roasting
marshmallows. Camping is a great way to get fresh air and exercise.
2. Which of the following is a supporting detail about Ashley from the
paragraph that gives the best support for the main idea?
OShe likes all kinds of music.
OShe likes weekends.
OShe likes cooking over a campfire.
OShe likes her little brother.
(1 point)

Answers

Answer:

c. she likes cooking over a campfire

Explanation:

it says it right in the story

Using complete sentences list 3 reasons why it is important to follow email etiquette when sending or receiving messages?

Answers

Answer: The bottom line is that email etiquette rules are here to stay. It is always crucial to use proper email etiquette because it organizes our communication, improves efficiency, and creates a professional appearance.

Explanation: It organizes our communication, improves efficiency, and creates a professional appearance.

If the message portion of a frame contains 640 bits, SDLC has a beginning flag (8 bits), an address (8 bits), a control field (8 bits), a frame check sequence (assume we use a CRC-32 with 32 bits), and an ending flag (8 bits). Calculate the efficiency of this synchronous transmission and complete TE1. Next, calculate the efficiency using a frame that contains 720 bits with the same overhead and complete TE2. Which one is more efficient

Answers

Answer:

The same basic formula can be used to calculate the efficiency of synchronous transmission. For example, suppose we are using SDLC. The number of information bits is calculated to help you determine how many.

Explanation:


When you check your hard drive to see how much space is available, you are checking your
O primary memory
O secondary storage
O tertiary storage
O primary storage

Answers

Answer:

secondary storage

Please help me with this
For the three Ontario University (U or T, York, Ryerson) are the courses that I have taken good when wanting to get admitted into Computer Science

6 U/M Courses:

- ENG 4UO (English)
- SPH 4UO (Physics)
- ICS 4UO (Computer Science)
- MHF 4UO (Advanced Functions)
- MCV 4UO (Calculus and Vectors)
- TEJ 4MO (Computer Engineering Technology)

* DO I NEED SCH 4UO (Chemistry) for computer science

Answers

Although Chemistry (SCH 4UO) is not usually a mandatory prerequisite for entering Computer Science programs, it is wise to carefully scrutinize the individual admission standards of the universities that catch your eye to guarantee that you satisfy their prerequisites.

What are the Courses about

Judging from the courses above,  Having a good grasp of written communication is often a prerequisite for enrollment in a wide range of university programs, and taking English (ENG 4UO) serves as proof of this skillset.

Your interest and background in the field are evident through your enrollment in Computer Science (ICS 4UO). Enrolling in this course can significantly enhance your chances of getting accepted into a Computer Science program, and it offers significant practical benefits.

Learn more about University  from

https://brainly.com/question/1086066

#SPJ1

characteristics of a bar chart include: multiple select question. length or height of bar reflects frequency of a category typically display vertical bars. are used strictly for quantitative or numerical data. display horizontal bars when the axis labels are long or there are many categories.

Answers

A category or variable's frequency or magnitude are represented by the bar's length or height. Although they can also employ horizontal bars, they commonly display vertical bars.

What properties does a bar chart have?

Discrete, continuous, or categorical data are typically organised into class intervals in bar charts. They consist of an axis and a set of indicated horizontal or vertical bars. The bars show the frequency distributions of various values of a variable or just the various values themselves.

What makes it easier to determine the width or height of each bar on a bar graph?

The values of the secondary variable define the length of each bar. These principles might originate from a wide range of sources. The values could be as basic as.

To know more about display visit:-

https://brainly.com/question/14413434

#SPJ4

Design a pda (pushdown automata) of the following:
a^n b^n c^m d^4m

Answers

Answer:

Explanation:

Here is the design of a Pushdown Automaton (PDA) for the language L = {a^n b^n c^m d^4m}:

1. The PDA has a stack to store symbols.

2. The initial state is q0 and the initial stack symbol is Z0.

3. The transitions are defined as follows:

- Transition from q0:

 - Read 'a' from the input, push 'A' to the stack, and remain in q0.

 - Read 'b' from the input, pop 'A' from the stack, and transition to q1.

 - Read 'c' from the input, push 'C' to the stack, and transition to q2.

 - Read 'd' from the input, push 'D' to the stack, and transition to q3.

- Transition from q1:

 - Read 'b' from the input, pop 'A' from the stack, and remain in q1.

 - Read 'c' from the input, push 'C' to the stack, and transition to q2.

 - Read 'd' from the input, push 'D' to the stack, and transition to q3.

- Transition from q2:

 - Read 'c' from the input, push 'C' to the stack, and remain in q2.

 - Read 'd' from the input, pop 'C' from the stack, and transition to q2.

 - Read 'd' from the input, pop 'D' from the stack, and transition to q2.

 - Read end of input, pop 'Z0' from the stack, and transition to q4 (final state).

- Transition from q3:

 - Read 'd' from the input, push 'D' to the stack, and remain in q3.

 - Read end of input, pop 'Z0' from the stack, and transition to q4 (final state).

4. The PDA accepts the input string if it reaches the final state q4 with an empty stack.

Note: This PDA design assumes that n and m are positive integers. If n or m can be zero, some modifications to the transitions may be needed to handle those cases.

You're the network administrator for a consulting firm. Your network consists of the following:
• 30 laptops in the sales department
10 computers for HR
• 5 laptops for management
• 20 computers in marketing
• 15 computers in IT
You're using Microsoft Intune to manage the company's devices. You've configured an update ring named Management and
enrolled the ring in the Semi-Annual Servicing Channel. You've also set updates to be delayed for 30 days, which gives you ample
time to test them before they're rolled out to the user machines. However, you want to make sure you can rollback a feature
update if a problem comes up after the update has been installed on the user machines.
What is the maximum number of days you can configure a feature update uninstallation period for?

Answers

Answer:

anytime

Explanation:

as far as i know you can manage in real time meaning add or remove any hardware or software anytime but im not sure once its rewritten each is considered version 1.0 but uninstallation happens each time you reinstall so uninstallation is actualy anytime

last i checked all tho trial activation is usualy one week or one month so 7 or 30 days till installation but uninstall is anytime unless it service or updates

Which of the following tasks are suitable for creating an algorithm? Choose all that apply

Answers

A tasks are suitable for creating an algorithm are:

giving directions to a location.solving a math problem.tracking money in a bank account.tracking the number of items in inventory.

What is algorithm?

An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.

Note that in the case above, A tasks are suitable for creating an algorithm are:

giving directions to a location.solving a math problem.tracking money in a bank account.tracking the number of items in inventory.

See options below

giving directions to a location

saving time writing a computer program

solving a math problem

tracking money in a bank account

tracking the number of items in inventory

Learn more about algorithm from

https://brainly.com/question/24953880

#SPJ1

What type of model does the web use? Choose the answer.

a. Client-Server model
b. Client-Host model
c. Server-Website model
d. Web-Internal model

Answers

The type of model does the web use is

a. Client-Server model

What is client-server model?

The web primarily uses the Client-Server model. In this model, the web is divided into two main components: clients and servers

Clients are devices or software applications that request and consume resources from servers. examples of clients include web browsers (such as Chrome or Firefox) running on users' devices, mobile apps, or even other servers.

Servers on the other hand, are powerful computers or software applications that store and deliver resources in response to client requests. servers host websites, web applications, or other services and are responsible for processing client requests, retrieving data, and sending it back to the clients.

Learn more about Client-Server model at

https://brainly.com/question/30042674

#SPJ1

1. Why does a computer have different types of ports?

Answers

Answer:

Computer ports are classified into two types based on the protocols used. A protocol is a set of rules and standards to be followed during data transfer and communication. Usually, data is transmitted in a particular pattern.

Explanation:

for a ser of rules and standards to be followed during data transfer and communication

If images around the edges of a monitor do not look right, the computer might have a(n)

access problem.
hardware problem.
Internet problem.
software problem.

I will give brainiest to best answer

Answers

Answer:

it would be a software problem.

Explanation:

this is because when your computer crashes, the software all "explodes" and resets.

Hardware Problem

If a manufacturer damaged something, it can cause issues that the software can not interpret. For example the screen is damaged. The pixels could be damaged on the screen and most likely not the fault of a software.

Which statement best describes a flexible algorithm?

Answers

Answer:

It can perform a task or solve a problem even if various inputs are involved.

Explanation:

what is a Computer ?and it's demerits​

Answers

Answer:

Computer has making human life faster because of its incredible speed,Accuracy and storage, with which human can save anything and search it out easily when needed. We can say computer a versatile machine because it is very flexible in performing their jobs.

Answer:

Computer is an electronic device which takes the raw data and instructions as an input and process it and give the meaningful resut as an output.

Explanation:

Demerits of computer :

Carpal tunnel and eye strain

Depression

Waste our time

A pedometer treats walking 1 step as walking 2.5 feet. Define a method named feetToSteps that takes a double as a parameter, representing the number of feet walked, and returns an integer that represents the number of steps walked. Then, write a main program that reads the number of feet walked as an input, calls method feetToSteps() with the input as an argument, and outputs the number of steps.

Use floating-point arithmetic to perform the conversion.

Ex: If the input is:

150.5
the output is:

60
The program must define and call a method:
public static int feetToSteps(double userFeet)

CODE:
import java.util.Scanner;

public class LabProgram {

/* Define your method here */

public static void main(String[] args) {
/* Type your code here. */
}
}

Answers

Answer:

Here's the completed code that implements the feetToSteps method and the main program that reads the number of feet walked as input and outputs the number of steps walked:

import java.util.Scanner;

public class LabProgram {

   public static int feetToSteps(double userFeet) {

       double steps = userFeet / 2.5; // Convert feet to steps

       return (int) Math.round(steps); // Round steps and convert to integer

   }

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       double feetWalked = scnr.nextDouble();

       int stepsWalked = feetToSteps(feetWalked);

       System.out.println(stepsWalked);

       scnr.close();

   }

}

Explanation:

In this code, the feetToSteps method takes a double parameter userFeet, representing the number of feet walked, and converts it to the number of steps walked by dividing it by 2.5 (since 1 step = 2.5 feet). The result is then rounded to the nearest integer using the Math.round method and casted to an integer before being returned.

The main program reads the number of feet walked as input using a Scanner object, calls the feetToSteps method with the input as an argument, and outputs the number of steps walked using System.out.println. Finally, the Scanner object is closed to free up system resources.

Please explain how interface design prototyping techniques help to develop System?

Answers

The term interface design prototyping techniques help to develop System as it is one that allow designers to depict their design via the use of interactive and engaging product, and this is one that leads to a better knowledge of the design for all that are involved.

What is interface design prototyping?

User interface (UI) prototyping is known to be a kind of an iterative analysis method where a given users are  said to be actively involved in the workings of the UI for a system.

Note that there are design's problems that are known to be always noticeable and the act of creating a prototype, can help a person to hold a version of their proposed product and know the different aspects of the job.

Hence, The term interface design prototyping techniques help to develop System as it is one that allow designers to depict their design via the use of interactive and engaging product, and this is one that leads to a better knowledge of the design for all that are involved.

Learn more about interface from

https://brainly.com/question/5080206

#SPJ1

When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and _________ as a service.

Answers

Answer:

Infrastructure.

Explanation:

In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.

Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.

When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

According to NIST, the five (5) characteristics of a cloud computing service are;

1. On-demand self-service .

2. Broad network access .

3. Resource pooling .

4. Rapid elasticity .

5. Measured service.

Additionally, the cloud service can either be deployed as private, public, hybrid or community service.

data privacy may not be applicable in which scenarios?
1. an app targeted at children for entertainment
2.a platform developed purely for knowledge exchangewith no motive of financial incentive
3.a platform being hosted in a country with no dp laws but targeted at data subjects from a country with stringent DP laws
4.a website for disseminating knowledge and that allows anonymous access

Answers

Data privacy may not be appropriate within the following scenarios:

An app focused on children for amusement: Whereas information security is vital, uncommon controls such as the Children's Online Protection Security Act (COPPA) might apply instep.A stage created absolutely for information trade with no rationale of monetary motivation: As long as individual information isn't collected or prepared, information protection may not be specifically appropriate.A stage being facilitated in a nation with no information protection laws but focused on information subjects from a nation with rigid information protection laws: The stage ought to comply with the information security laws of the focused country, regardless of the facilitating area.Web site for spreading information and permitting mysterious get to In case no individual information is collected or connected to the clients, information security may not be specifically pertinent, but other contemplations like site security ought to still be tended to.

In situation 1, particular directions like COPPA may administer data privacy for children.

In situation 3, compliance with the focus on the country's data privacy laws is fundamental notwithstanding of facilitating area.

Learn more about data privacy here:

https://brainly.com/question/31211416

#SPJ1

What is Groovefunnels?

Answers


GrooveFunnels is a game-changer and it’s disrupting the market quite a bit.

Explanation:

Griovefunnels is a suite of digital marketing tools desinged to help you run a sucessfull online business .

i need simple app ideas​

Answers

maybe make a game since people are playing games a lot more because of pademic.

intellectual property laws cover software and many other digital creations. Which of the following is an example of a positive impact of intellectual property laws?

Pedram, a student, can always study in any library in the United States for free because US libraries are declared intellectual property.
Pedram, a student, can always study in any library in the United States for free because US libraries are declared intellectual property.

Chanel, a homebuyer, gets a tax break because her house includes an office room which counts as intellectual property.
Chanel, a homebuyer, gets a tax break because her house includes an office room which counts as intellectual property.

Ariel studies real estate laws and uses her knowledge to help low-income families find affordable housing.
Ariel studies real estate laws and uses her knowledge to help low-income families find affordable housing.

Ricardo, a medical researcher, sells a vaccine he discovered and uses the proceeds to fund more research.
Ricardo, a medical researcher, sells a vaccine he discovered and uses the proceeds to fund more research.

Answers

Patents are an example of intellectual property rights. names of domains. industry architecture.

What does intellectual personality entail?

Abstract. When people encounter a social, political, religious, historically significant, or economically significant cultural phenomena, they use their feelings, behaviour, beliefs, attitudes, and methods of reasoning, evaluation, and decision-making to decide whether to accept or reject it. What exactly is intellectual haughtiness? A person who is otherwise clever will often be blinded to the truth by a set of traits known as intellectual hubris. Some examples of these are a lack of logical rigour and the use of preconceived assumptions or what one believes he acquired in school rather than rigorous reasoning.

To know more about rights visit:-

https://brainly.com/question/7721379

#SPJ1

Answer:

the answer is Ricardo!

Explanation:

I got it right

) write a binary search function (using recursion) int binary search(int val, int * a, int first, int last); which searches the values in the sorted array a[] from a[first] to a[last] to find an array element with value val. if it finds val, it returns the position of val in a[]. otherwise it returns -1. for example, given the array a[]

Answers

#include <iostream>

#include <algorithm>

int binarySearch(int val, int *a, int first, int last) {

   if (first>last) return -1;

   int mid = first+(last-first)/2;

   if (a[mid]==val) return mid;

   // recursive

   if (val<a[mid]) return binarySearch(val,a,first,mid-1);

   else return binarySearch(val,a,mid+1,last);

}

int main(int argc, char* argv[]) {

   

   int n; std::cin>>n;

   int array[n];

   for(int i=0;i<n;i++) {

       std::cin>>array[i];

   }

   

   //Which value?

   int v; std::cin>>v;

   

   //Sort before sending the function.

   std::sort(array, array+n);

   std::cout << "Position: " << binarySearch(v,array,0,n) << std::endl;;

   return 0;

}

) write a binary search function (using recursion) int binary search(int val, int * a, int first, int

) Write the JS code to load the 3rd party script before ready event triggers and after successful load show your name on the browser with a message

Answers

Answer:

Following are the code to this question:

var id= document.createElement('script');//defining id varaible that uses the createElement method  

ld.src = "https://code.jquery.com/jquery-3.5.1.min.js";//defining id varaible with src that holds the source link

alert("The loaded Script is: ");//defining alert box that print Script loaded.

Explanation:

In the above-given code, an id variable is defined that uses the createElement method, which helps to create the specified name with the Element Node, and in the next line, it uses the src with the id variable, that store the link, it also helps to loads the 3rd party script, which is displayed in an alert msg box.

recent trends on operating system

Answers

Answer:

Windows 10 if this is what I think u mean

Choose all items that represent common website
design flaws.
menu at the top of the page
distracting background
short page-load times
too many or confusing fonts
poor navigation
dead hyperlinks

Answers

Isn’t it basically all of them haha?

Answer:

2,4,5,6

Explanation:

just answered it

Pseudocode finding the sum of the number 12, 14, 16

Answers

Answer:

Pseudocode:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Iterate over each number in the 'numbers' array.

  3.1 Add the current number to the 'sum' variable.

4. Print the value of 'sum'.

Alternatively, here's an example of pseudocode using a loop:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Initialize a variable named 'index' and set it to 0.

4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:

  4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.

  4.2 Increment 'index' by 1.

5. Print the value of 'sum'.

Explanation:

1st Pseudocode:

1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.

2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.

3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.

3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

2nd Pseudocode using a loop:

1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.

2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.

3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.

4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:

4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4.2: We increment the 'index' by 1 to move to the next position in the array.

5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

Other Questions
please help i need it fast PLEASE HELP! WILL GIVE BRAINLYEST ANSWER The ancient city of Alexandria was a major attraction for ______.scholarsathletesfarmerssoldiers Why did the Vikings leave Greenland?(please hurry I need this quick and thank u!) please show work please and thank you Which elements did the Curies discover? According to loewen and myrdal (1944), racism and integration is? The school used nine busses, each filled with the same number of students, to go on a class field trip Eight students arrived separately by car. If n represents the number of students per bus an expression that represents the total number of students What rhymes with dance? bill wants to determine his blood type, so he takes a few drops of blood from a puncture wound in his finger and mixes it with various antisera. his blood cells agglutinate when mixed with the anti-a serum and anti-rh serum, but not with the anti-b serum. this means a) bill could receive type b blood in a transfusion. ABCD is a rectangle in which AD = (2x + 1) cm and DC = (3x - 2) cm. PQRS is a trapezium in which PQ is parallel to SR, PQ = (x + 2) cm, SR = (5x 8) cm and the shortest distance between PO and SR is (4x 11) cm. The area of ABCD is twice the area of PQRS. Write down an equation in x to represent this information and show that it simplifies to 18x-89x + 68 = 0. An object is dropped from a 32 m tall building. How fast will it be going when itstrikes the ground? 38century aAccording to "Excerpt from Wackiest White House Pets," why was the late twentieth"glorious time for White House pets" (paragraph 12)? Use two details from the article tosupport your response. one way interest groups become involved in the election process is by 9. Salvador is playing a game where theproduct must be greater than 5. Which twocards result in a product greater than 5?31/1/23A. 1 and 4B. 3 and 12C. 3 and 128D. 2 and 12/231/4/283 What is the length of the hypotenuse? If necessary, round to the nearest tenth. A salesperson increases the amount of sales, in dollars,each quarter by 15%. If the salesperson has $45,000 in sales in the 1st quarter, what is theamount of total sales by the end of the 4th quarter, to the nearest cent? What is the range of possible sizes for side x? Which polynomial is the correct product? 15y3 17y2 22y 15 6y3 17y2 22y 15 6y3 20y2 22y 15 6y3 17y2 22y 25. The odds in favor of an event are 8 to 3. What is the probability of the event?