1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
4 years ago
12

Briefly explain five measures you have undertaken to protect your confidential

Computers and Technology
1 answer:
Gnom [1K]4 years ago
5 0

Answer:

by putting it in old fashioned password box

Explanation:

I I think I should say so that's a good person is not able to go see guys place where there's a nice specifically said that it must be old fashioned lunch boxes I don't usually be opened

You might be interested in
You have this code in your program.
earnstyle [38]

The line code will create array is G = array('f',[2.5, 3, 7.4])

<h3>What is meant by array ?</h3>

As opposed to defining distinct variables for each value, arrays are used to hold numerous values in a single variable. Set the data type (such as int) and the array name, followed by square brackets [, to construct an array.

An array is a collection of elements with the same type that are kept in nearby memory  locations and may each be separately referred to using an index to a special identifier. There is no need to declare five distinct variables when declaring an array of five int values (each with its own identifier).

In the C programming language, arrays are a derived data type that may contain primitive data types like int, char, double, float, etc.

To learn more about array refer to :

brainly.com/question/28061186

#SPJ1

6 0
1 year ago
Find the equation of a line which has 10 points the following two coordinates: (4, 0) and (3, 4)​
alex41 [277]

Answer:

The equation of the line is y = -4·x + 16

10 points on the line include;

(0, 16), (1, 12), (2, 8), (3, 4), (4, 0), (5, -4), (6, -8), (7, 12), (8, -16), (9, -20), and (10, -24)

Explanation:

The given points through which the line passes are;

(4, 0) and (3, 4)

The slope, 'm', of the line is given as follows;

Slope, \, m =\dfrac{y_{2}-y_{1}}{x_{2}-x_{1}}

Therefore, the slope of the line is (4 - 0)/(3 - 4) = -4

In point and slope form we can get;

\dfrac{y-0}{x-4} = -4

The equation of the line in point and slope form is therefore;

y = -4·(x - 4) = -4·x + 16

The equation of the line in slope and intercept form is

y = -4·x + 16

10 points on the line are obtained using the equation of the line and the desired x-values input into cells on MS Excel and presented here as follows;

(0, 16), (1, 12), (2, 8), (3, 4), (4, 0), (5, -4), (6, -8), (7, 12), (8, -16), (9, -20), and (10, -24)

8 0
3 years ago
when using screwdrivers you should always be aware that the screwdriver blade might slip out of the slot and strike you in the .
ELEN [110]

When using screwdrivers you should always be aware that the screwdriver blade might slip out of the slot and strike you in the:

  • -hand
  • -eye
  • -mouth

<h3>What is a Screwdriver?</h3>

A screwdriver is said to be a kind of a modern tool that can come in a manual or powered type and it is one that is often used for turning screws.

Note that a typical simple screwdriver is one that has a handle as well as a shaft and it is also one that is often ending in a tip where a given user can be able to put their hands into the screw head before turning the handle.

Therefore, when using screwdrivers you should always be aware that the screwdriver blade might slip out of the slot and strike you in the:

  • -hand
  • -eye
  • -mouth

Learn more about screwdrivers  from

brainly.com/question/20717091

#SPJ4

3 0
1 year ago
The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
jarptica [38.1K]

Answer:

hello your question has missing options below are the missing options

A. Monitor all traffic using the firewall rule until a manager car) approve it.

B. Immediately roll back the firewall rule until a manager can approve it

C. Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Have the network team document the reason why the rule was implemented without prior manager approval.

answer : Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible. ( C )

Explanation:

A good step to have in the procedures of a situation like this is

Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

4 0
3 years ago
Determine the output of the following code segment:
Nataly [62]

Answer:

The output to the given code as follows:

Output:

10

100

64

36

16

4

0

4

16

36

64

Explanation:

In the given java code, an integer variable "i" and an array number is defined, which size is 10, in the next step two for loop is declared, that can be described as follows:

  • In the first loop, array use loop variable "i" use, which minus the value of 5 and multiplies by 2, and it will calculate the square of that number.
  • In the next step, a for loop is declared, that prints these array number variable square.
7 0
4 years ago
Other questions:
  • Write a set of pseudocode instructions to feed a pet, using at least five steps?<br><br> Thank you!!
    6·1 answer
  • Which of the following will most likely result in a decrease in population?
    11·2 answers
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
    5·1 answer
  • Which of the following defines a network
    7·1 answer
  • What is your favorite anime ( All movies and episodes related to them count )
    8·2 answers
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
  • What is the most used gaming keyboard in 2022?
    8·1 answer
  • Choose the best answer from the options below to complete the following sentence.
    15·1 answer
  • Which term refers to the use of the internet at work for personal use?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!