1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
2 years ago
14

Which web source citations are formatted correctly? check all that apply.

Computers and Technology
1 answer:
Nitella [24]2 years ago
8 0

Answer:

uhm you have to add a picture i'll edit my answer and tell you once you do.

You might be interested in
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
A teacher wants a program to give extra points to students who fail a test. Write a Python program to do the following: (a) Ask
Lorico [155]

Answer:

Hi there! Please find the answer below.

Explanation:

The program below demonstrates how each of the requirements can be coded in a simple Python script. To copy the array, we can use the copy() method of the array. To calculate the diff, we can use a few different techniques, so I have implemented it using a loop over the arrays and just storing and displaying the difference in the 2 arrays.

new_string.py

def add_test_score(score):

 test_score.append(score);

contact_hash = {}

test_score = []

print("Enter 5 test scores: ");

for x in range(0, 5):

   input_string = input("Enter test score " + str(x + 1) + ": ")

   add_test_score(int(input_string));

print(test_score);

test_score_copy = test_score.copy();

for e in test_score_copy:

   if e < 60:

       test_score_copy[test_score_copy.index(e)] += 10;

diff = [];

for e in test_score:

   print(test_score[test_score.index(e)]);

   print(test_score_copy[test_score.index(e)]);

   if not test_score[test_score.index(e)] == test_score_copy[test_score.index(e)]:

       diff.append(e);

print(diff);

8 0
4 years ago
What is the purpose of requirements gathering
inn [45]

Answer:

to determine customer needs for a software

application

to reduce over scheduling of project

resources

Explanation:

Requirement gathering and analysis involves a business analyst and the client. And this is done in various phases with the first phase involving the business analyst and the client. And the second phase of software requirement is also being covered, and that is done by a team of System analysts, business analyst, and technical writers are part of both the team. However, both the phases have nothing to do with the bugs, and hence the first and the third part is not the correct part. However, customer needs are noted down, and in the second phase when resource requirement other than technical requirement is studied, partly it is ensured that there is no over the scheduling of the project resources during the project. And hence the second and the fourth options are the correct options.

3 0
3 years ago
Read 2 more answers
g write a recursive function that prints out all the even numbers between x and y inclusive if x is odd then the print out will
Reil [10]

Answer:

The function written in python is as follows:

def EvenNumbers(x, y):

    if (y < x):

         return

    if (y % 2 == 0):

         EvenNumbers(x, y - 2)

    else:

         EvenNumbers(x, y - 1)

    if (y % 2 == 0):

         print(y)

Explanation:

x represents the lower limit while y represents the upper limit.

So, the recursion will be repeated as long as x <= y

This defines the function

def EvenNumbers(x, y):

This checks if y < x. If yes, the recursion stops execution and return to the main

<em>     if (y < x): </em>

<em>          return </em>

The following if and else condition checks determines the appropriate range of the recursion.

<em>     if (y % 2 == 0): </em>

<em>          EvenNumbers(x, y - 2) </em>

<em>     else: </em>

<em>          EvenNumbers(x, y - 1) </em>

The above takes care of printing starting at x + 1 if x is odd

This checks and prints the even numbers in the range

<em>     if (y % 2 == 0): </em>

<em>          print(y)</em>

<em />

To call the function from main, make use of

EvenNumbers(x, y)

Where x and y are integers

e.g EvenNumbers(2,10), EvenNumbers(1,17), EvenNumbers(3,21)

<em>See attachment</em>

3 0
3 years ago
You need to apply security settings to the registry on a Windows server. Which command should you use
Mekhanik [1.2K]

There are different kinds of measures taken in security. The command should you use is   Certutil.

<h3>What is Certutil</h3>

Lawrence Abrams was known to be the man that mad Windows to have a built-in program called CertUtil.

This is often used to manage certificates in Windows where one can install, backup, delete, manage, and perform a lot of functions related to certificates and certificate that are saved in Windows.

See full question below

You need to apply security settings to the registry on a Windows server. Which command should you use?

certutil

regedit

regex

cipher

Learn more about Certutil from

brainly.com/question/24931496

7 0
2 years ago
Other questions:
  • Create a procedure named FindLargest that receives two parameters: a pointer to a signed doubleword array, and a count of the ar
    13·1 answer
  • 13) Search engines and metasearch engines are examples of which network application?
    12·1 answer
  • If you are feeling sick and you want to drive somewhere, you should
    12·2 answers
  • Which building-block feature is available in the Text grouping on the Insert tab?
    14·1 answer
  • Addition and subtraction are considered to be ____ operations performed by a computer.
    7·1 answer
  • How do you check how much space is left in current drive?
    9·1 answer
  • I just wanna promote my 2 yt channels c: <br> (the channels are in the comments of this question)
    14·1 answer
  • What is data that originated in another program or format?
    7·1 answer
  • Peer collaboration helps develop critical-thinking skills, which is the ability to
    9·2 answers
  • 0 -10°
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!