1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
3 years ago
6

You have created a personal web page using a commercially available design program and web hosting site. The only items on your

personal machine are the pictures you have uploaded to your site. What type of software are you most likely using to create, modify, or update your website pages
Computers and Technology
1 answer:
maria [59]3 years ago
4 0

Answer:

Notepad or Sublime text

Explanation:

These softwares enables you use and edit the website HTML, CSS and JavaScript code where necessary. Thank you.

You might be interested in
Which is a solution that represents the majority of VPNs on the market and is commonly referred to as a VPN appliance?
Dafna1 [17]

Answer:

Remote access VPN

Explanation:

The solution that represents the majority of VPN's on the markets and is commonly referred to as a VPN appliance is the Remote access VPN

A remote access VPN is a type of VPN  that  works by creating a virtual channel (appliance ) between different devices for the purpose of exchanging data in an encrypted form. although this Tunnel passes through the public internet the Data exchanged are only accessible by the devices connected via the tunnel only .

The remote access VPN  is mostly used to connect an employee to the company's network therefore it represent the majority of VPNs in the market.

3 0
3 years ago
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?Ethical Decision
ratelena [41]

Answer:

Explanation:

1. Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?

Answer:

Before the discussion, Fred, Gladys, and Charlie focused on other ends in regards to information security. Fred was more concerned with adding additional software to fix the malware issues when clearly there were easier steps that need to be taken

2. How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?

Answer:

Gladys’s performance should be based on the new security measures and protocol that she has in place for the organization. This of course, is putting a lot of trust into Charlie’s performance as she was the one to introduce Charlie with his new plan on the organization’s new security. She practically had him nominated for CIO.

3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?

Answer:

Before considering outside threats, internal threats should be looked into early in the planning process. Internal threats does not necessarily mean that the employees have malicious intent, but the case of human error and failure can also be a negative contribution to cyber security. Creating a security program and education end users by creating a security policy guidance is one of the the best ways to prevent simple cyber security issues from starting

Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer.

Answer:

Absolutely not! By hiring an unexperienced family member over a trained professional, Fred is letting his emotions get the better of him. Fred should consult with Gladys on whether his son-in-law is good candidate for the position or not. Rather than sacrifice company security, Fred could possibly find his son-in-law a position in the companies’ financial or human resources departments.

8 0
3 years ago
Which correctly shows the configuration of boxes in the View tab that allow the indents to be changed?
den301095 [7]
The correct answer is B. Got it right on my review
4 0
3 years ago
Let U = {b1, b2, , bn} with n ≥ 3. Interpret the following algorithm in the context of urn problems. for i is in {1, 2, , n} do
viva [34]

Answer:

Check the explanation

Explanation:

Kindly check the attached image for the first step

Note that the -print" statement executes n(n — I)(n — 2) times and the index values for i, j, and k can never be the same.  

Therefore, the algorithm prints out all the possible ways to draw three balls in sequence, without replacement.

Now we need to determine the number of lines this the algorithm print. In this case, we are selecting three different balls randomly from a set of n balls. So, this involves permutation.  

Therefore, the algorithm prints the total  

P(n, 3)  

lines.  

7 0
3 years ago
Jamal wants to create a program that will play music during the afternoon. Which kind of loop should be used in the program?
Colt1911 [192]

Answer:

i could be completely wrong, but my guess is "while"

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following are advantages of cloud computing?
    6·2 answers
  • What allows a person to interact with web browser software?
    13·2 answers
  • The email program shipped with Microsoft office
    15·1 answer
  • Which of the following recently developed technologies has NOT greatly increased the speed of information dissemination?
    13·2 answers
  • Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should
    6·1 answer
  • 1) ( IBADE - 2020)A legislação que regula o uso da Internet no Brasil por meio da previsão de princípios, garantias, direitos e
    9·1 answer
  • 4.5 code practice computer science
    5·1 answer
  • This isn't really a question ,but a random fact about Fnaf William Aton
    7·2 answers
  • Which of the following symbols is a part of all spreadsheet functions?
    7·2 answers
  • 010101010101011101011
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!