1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
12

Which does an icon on the desktop signify?

Computers and Technology
1 answer:
yawa3891 [41]3 years ago
5 0
I believe that the answer is D. 
On a desktop the icons for files, programs and folders can all be present.
You might be interested in
_____ regulate current/voltage flow, similar function as _____,but are smaller, cheaper, and more reliable.
Tpy6a [65]

Direct Current Power regulates current/voltage flow, similar function as unregulated or regulated, but is smaller, cheaper, and more reliable.

<h3>What is Direct Current Power?</h3>
  • In contrast to the flow of a river, direct current is a technique in which electricity constantly flows in the same direction. It speaks about the flow of electricity produced by batteries, solar cells, and other sources.
  • Alternating current (AC), on the other hand, is a technique in which the positive and negative sides are consistently swapped at regular intervals, changing the direction of the electricity flow in accordance.
  • This is the electricity that comes from a generator or a plug-in.
  • Alternating current is used to transmit both the electricity generated at power plants and the electricity delivered to houses.

To learn more about Direct Current Power, refer:

brainly.com/question/1402412

#SPJ4

8 0
2 years ago
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
3 years ago
An administrator needs to examine ftp commands being passed to a server. what port should the administrator be monitoring?
Hitman42 [59]
Port 21

The server-PI (Server Interpreter) is the process that listens to port 21 on the FTP server. The Server Interpreter has control over server-DTP (Server Data Transfer Process), the method used for data transfer connection. The server-PI must be in a position to respond to standard FTP commands like USER and PASS and several other commands.

 

 



7 0
3 years ago
If the base address of an array is located at 0x1000FFF4, what would the following instructions be equivalent to (assume this ar
ZanzabumX [31]

Answer:

The correct option to the following question is my_array[2] = 45.

Explanation:

Because the offset '8' which used for the subscript 8 divided by 4 which is 2.

So, that's why my_array[2] = 45 is the correct answer to the following question.

An array is the data type in the programming languages which stores the same type of data at a time whether it an integer type or string type.

8 0
4 years ago
In a submarine battle simulation, you know all the locations the enemy units can move to. Anticipating these moves, you call for
BaLLatris [955]

Answer:

perfect information

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • The _______ displays the name of the open file and the program.
    13·1 answer
  • A survey of results on mobile phone datasets analysis
    5·1 answer
  • Write a paragraph on the orgin or development of ONE of the following elementss of the Internet:
    15·1 answer
  • An unwanted 'explosion' of inbox messages is called​
    8·2 answers
  • BOTH INTERNATIONAL &amp; INLAND Which procedure(s) shall be used to determine risk of collision?
    14·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • Research and describe a recent development in theater and film lighting and explain how the technology can be used. (Maybe limit
    8·2 answers
  • Which of the following represent features of free software licensing? Check all of the boxes that apply.
    10·1 answer
  • Which line of code will find the first occurrence of a three in an array?
    5·2 answers
  • .- Una tienda de vestidos de fiesta, ofrece un descuento a las personas
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!