1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
2 years ago
10

If an intruder can ____ a device, then no electronic protection can deter the loss of information.

Computers and Technology
2 answers:
Mrac [35]2 years ago
4 0

Answer:

Physically Access

Explanation:

kramer2 years ago
3 0

Answer: Physically access

Explanation:

If an intruder can physically access a device, then no electronic protection can deter the loss of information.

You might be interested in
What is up with the bots? They are so annoying.
Yuki888 [10]

Answer:

very very very annoying

6 0
3 years ago
Read 2 more answers
Program 4 - Pick color Class Create a class that randomly pick a color from an array of colors: string colors[7]; Have the color
xxMikexx [17]

Answer:

#include<cstdlib>

#include<bits/stdc++.h>

#include<time.h>

using namespace std;

class Colors{

string colors[7];

public:

void setElement(int,string);

void printAllColors();

void printRandomColor();

};

void Colors::setElement(int index,string color){

colors[index] = color;

}

void Colors::printAllColors(){

cout << "Printing all the colors:\n";

for(int i=0;i<7;i++){

cout << colors[i] <<"\t";

}

}

void Colors::printRandomColor(){

srand (time(NULL));

int index = rand() % 7;

cout<< "\n\nThe random picked color:";

cout << colors[index] << endl;

}

int main(){

Colors color;

color.setElement(0,"red");

color.setElement(1,"orange");

color.setElement(2,"yellow");

color.setElement(3,"green");

color.setElement(4,"blue");

color.setElement(5,"indigo");

color.setElement(6,"violet");

color.printAllColors();

color.printRandomColor();

}

to get the random color we are using srand and rand function. we are using time as seed to srand() function,because every time the time is changed. And based on that we are using rand() function and doing mod with 7 with the random number to get the index between 0 to 6, as ut array size is 7(0 to 6).

In the setElement(int index,string color) method we are inserting the value of colors in the colors array based on index.

In the printAllColors() function we are printing all the colors in the array.

In the printRandomColor() er are printing any random color based on rand() function.

and in main() we are initializing the string array with colors and calling the functions.

7 0
3 years ago
Read 2 more answers
Part of implementing Ken 7 Windows Limited new enterprise resource planning (ERP) software is ensuring all workstations and serv
spayn [35]

Answer:

Explanation:

1) The Functions a software application provide to keep a web browser secured includes:

a) The web browser should always be updated, you can keep it on "automatic update" option enable on your browser settings so that it will be automatically updated whenever the browser gets an update.

b) Always keep the third party cookies disabled because of the many unauthorized and phishing sites over the internet. This leaves the browser unsafe and cause higher security risk so block all the third party sites and cookies from the browser.

2) The Functions a software application prohibit to keep a web browser secured includes:

a) Do not store passwords on your web browser, deny the "store password" option on your browser settings. This is very important Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

b) Don't ever click on unwanted and unknown hyperlinks. There will be many unsolicited attachments, files, etc over the internet please do not open or download it unnecessarily.

3) The functions a software application should provide to keep a web server secured includes:

a) Always using an application scanner. Whenever you install or download any new applications, scan the application before accessing it or opening it.

b) Install all the security patches to keep off hackers as they are many on the internet.

4) The Functions a software application should prohibit to keep a web server secured includes:

1) Uninstall an application that has not been used for long time, because they are actually of no use.

b) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

3 0
3 years ago
Consider a pipelined than can issue up to one instruction per cycle, but fewer may be issued because of pipeline hazards, multi-
a_sh-v [17]

Answer:

Achieved Instruction per cycle rate is 4.11\times 10^{15}

Solution:

As per the question:

Execution time, t = 1.4 s

No. of instructions being executed, n = 1.8 billion =

Clock speed of CPU, f = 3.2 GHz = 3.2\times 10^{9} Hz

Now, to calculate the actual issue rate achieved:

CPI (Cycle per Instruction) = \frac{t}{n\times f}

CPI = \frac{1.4}{1.8\times 10^{6}\times 3.2\times 10^{9}}

Instruction per cycle is given as the reciprocal of CPI:

Instruction per cycle = \frac{1.8\times 10^{6}\times 3.2\times 10^{9}}{1.4} = 4.11\times 10^{15}

6 0
3 years ago
Write a for loop that prints the integers 50 through 1, each on a separate line. use no variables other than count.
Anton [14]
For( count = 50; count > 0; count-- )
    System.out.println( count );
5 0
3 years ago
Other questions:
  • A defined set of standards that computers must follow in order to communicate properly is known as a
    13·2 answers
  • The first widely adopted windows product, ____, featured a standardized look and feel, similar to the one made popular by apple'
    11·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • People, can anyone point me a highlighter for google chorme ?
    11·1 answer
  • If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = in
    6·1 answer
  • Difference between switch and switch lite
    10·1 answer
  • Explain different users of computer in briefly?​
    14·1 answer
  • Another word for asking a question of your data is to _____ it.
    6·1 answer
  • Describe the five components of a computer
    6·1 answer
  • What type of purchase requisition is used to turn-in a recoverable/reparable material to the ssa?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!