1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olenka [21]
3 years ago
7

3 thing I learned in ICT

Computers and Technology
1 answer:
frutty [35]3 years ago
6 0
I’ve learned makes me understand how it is important in our life to have an internet, and also important to know as a things I’ve known. First of all, I have learned about Camtasia, it is a program that are used to make a video about. And to show the others that how to do this or that on the computer.
You might be interested in
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
Rr lyrae stars pulsate, but with shorter periods and lower luminosities than cepheids. true false
KIM [24]

True, RR Lyrae stars pulsate, but with shorter periods and lower luminosities than Cepheids.

The pulsation periods of the fundamental-mode RR Lyrae stars range from about 0.3 to 1.0 days (Population II pulsators with longer periods are categorized as type II Cepheids), but the vast majority of them have generations longer than 0.45 days.

<h3>Why do RR Lyrae stars pulsate?</h3>

RR Lyrae stars pulse like Cepheid variables, but the nature and histories of these stars is thought to be rather different. Like all variables on the Cepheid fluctuation strip, pulsations are caused by the κ-mechanism, when the ambiguity of ionised helium varies with its temperature.

To learn more about RR Lyrae, refer

brainly.com/question/13946889

#SPJ4

8 0
2 years ago
Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
pantera1 [17]

Answer: Result:Enter the number of quarters in the jar: 4

Enter the number of dimes in the jar: 5

Enter the number of nickels in the jar: 2

Enter the number of pennies in the jar: 5

Total value is 1 dollars and 65 cents

Explanation: import java.util.Scanner;public class Coins { public static void main(String[]args) { int quarters, dimes, nickels, pennies; int total;Scanner scan = new Scanner (System.in);System.out.print("Enter the number of quarters in the jar: "); quarters = scan.nextInt();System.out.print("Enter the number of dimes in the jar: ");dimes = scan.nextInt(); System.out.print("Enter the number of nickels in the jar: ");nickels= scan.nextInt(); System.out.print("Enter the number of pennies in the jar: ");pennies = scan.nextInt(); int total_cents = 25*quarters + dimes*10 + nickels*5 + pennies;total =total_cents/100;total_cents = total_cents %100;System.out.println("Total value is " + total + " dollars and " + total_cents + " cents ");}}

Result:Enter the number of quarters in the jar: 4

Enter the number of dimes in the jar: 5

Enter the number of nickels in the jar: 2

Enter the number of pennies in the jar: 5

Total value is 1 dollars and 65 cents

4 0
3 years ago
Read 2 more answers
It is okay to use a dust rag when cleaning the inside of a computer.
Sunny_sXe [5.5K]
Yes you can do that, it won't hurt the computer.
4 0
3 years ago
Read 2 more answers
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritat
    7·1 answer
  • Mobile devices typically come pre installed with standard apps like web browsers , media players, and mapping programs true or f
    9·1 answer
  • Which symbol is used to separate a worksheet name from a cell reference?
    10·1 answer
  • Survey Q. Non-scoring: What role is played in the team? (1 correct answer)
    14·1 answer
  • Assume that the following code exists inside a method of MyClass, and that this code compiles without errors: int result = book.
    13·1 answer
  • What are three reasons teens might start drinking alcohol??
    7·2 answers
  • The purpose of a database is to help people stop using spreadsheets.
    10·1 answer
  • Identify the following​
    9·1 answer
  • Is a free verse a poetry that has no images
    5·2 answers
  • what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!