1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
6

You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the

hard drives and RAM being stolen from inside the computers. What could they do to prevent this from happening
Computers and Technology
1 answer:
gregori [183]3 years ago
7 0

Explanation:

To avoid the theft of  the hard drives and RAM being stolen from inside the computers, all they need to do is replace the PC's screws with proprietary security screws. These screw have very different head, thus impossible to unscrew with common tools. They are also called tamper proof screws.

You might be interested in
Assume that to_the_power_of is a function that expects two integer parameters and returns the value of the first parameter raise
Bezzdna [24]

Answer:

The statement in python is as follows:

to_the_power_of(cube_side,3)

Explanation:

As stated as the requirement of the code segment, the statement takes as parameters a variable cube_side and a constant 3.

It then returns the volume of the cube; i.e. cube raise to power 3

<em></em>

<em>See full program below</em>

<em>def to_the_power_of(val,powe):</em>

<em>     result = val**powe</em>

<em>     print(result)</em>

<em>cube_side = float(input("Cube side: "))</em>

<em>to_the_power_of(cube_side,3)</em>

4 0
3 years ago
Word frequencies - functions
Nuetrik [128]

Answer:

#include <iostream>

#include <vector>

#include <iomanip>

#include <string.h>

#include <string>

#include <algorithm>

using namespace std;

bool strEqual(const string& str1, const string& str2)

{

 //check each characters by case insensitive  

 return std::equal(str1.begin(), str1.end(),

                     str2.begin(), str2.end(),

                     [](char str1, char str2) {

                         return tolower(str1) == tolower(str2);

                     });

}

unsigned GetWordFrequency(vector<string>& vec,const string& str)

{

 //return the number of occurrences of the search word in the

 unsigned res=0;//the numbers of occurences

 for(auto itr:vec)

   {

     if(strEqual(itr,str))

       res++;

   }

 return res;

}

int main()

{

 int size=0;

 cin>>size;

 vector<string>vec;

 for(int i=0;i<size;i++)

   {

     string str;

     cin>>str;

     vec.push_back(str);

   }

   cout<<"Output:"<<endl;

 for(auto itr: vec)

   {

     cout<<itr<<" - "<<GetWordFrequency(vec,itr)<<endl;

   }

 return 0;

}

Explanation:

5 0
2 years ago
Watch any film of the silent era. Choose a short film from any genre that is less than 30 minutes long. Write a review of your e
Nutka1998 [239]

 A review of your experience of watching this film. Make comparisons with a modern film of the same genre that you have recently watched The Consistency of the Silent Era Technique in The Artist.

<h3>What have been a number of the principal silent movie genres?</h3>

Many early silent movies have been both dramas, epics, romances, or comedies (frequently slapstick). One-reelers (10-12 minutes) quickly gave manner to four-reel feature-period movies.

From the factor of visible method seems there are a few which can be ordinary of the silent film technology this is appearing players, kind of shot, modifying transitions, intertitles and sound strategies together with using track at some stage in the movie.

Read more about the comparisons :

brainly.com/question/25261401

#SPJ1

7 0
3 years ago
"Businesses around the world all need access to the same data, so there needs to be one type of information system that is desig
Paha777 [63]

Answer:

below

Explanation:

this statement is false because different business have different information needs

4 0
3 years ago
Convert the following denary numbers into binary using 8-bit register:
Dafna11 [192]

Answer:

  1. 7binary220

Explanation:

seseven binary twotwenty

5 0
3 years ago
Other questions:
  • Which is currently the most common cellular network?<br> 4G<br> 4G LTE<br> 5G<br> 5G LTE
    13·1 answer
  • A coordinated collection of fonts,colors,and other viscal effects is called
    10·1 answer
  • An employee believes there is an imminent danger situation at her workplace. She contacts OSHA to report the safety hazard. Her
    8·1 answer
  • To alter just one character in a StringBuilder, you can use the ____ method, which allows you to change a character at a specifi
    5·2 answers
  • Complete the function doubling_time that takes two parameters bal and apr and uses a while loop compute the number of years it t
    10·1 answer
  • What is modularity? Help asap
    9·1 answer
  • Wiliam would like to sort a list of items after the data is already entered
    7·2 answers
  • A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and
    12·1 answer
  • Why wouldn't a game using just run-length encodings be challenging?
    9·1 answer
  • Use the drop-down menus to match each description to its corresponding term.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!