1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
7

30 point!! Looking at your Personal Fact Sheet, do you see any areas that may need improvement? In which areas do you have the m

ost room for growth? How could you bolster those areas?
Computers and Technology
2 answers:
Paul [167]3 years ago
7 0
Can you please provide us with a photo of your personal fact sheet?
skad [1K]3 years ago
6 0

May you please provide us with a “personal fact sheet” please?

You might be interested in
What is one key difference between the radiation and convection zones?
Anuta_ua [19.1K]
 convection requires a medium is not the main difference, it is simply the most obvious aspect of what is a fundamentally different mechanism for transfering energy. Convection is the transfer of energy by movement of a medium, whereas radiation is the transfer of energy by, well, thermal radiation. Conduction also requires a medium, but, again, it is a fundamentally different mechanism than either convection or radiation; in this case it is the transfer of energy through a medium.

Unfortunately, analogies are hard but if you can visualize the particles involved, it would help. Picture the red hot iron you mentioned. On a molecular level, the material is emitting lots and lots of photons (hence why it is glowing red). The creation of these photons takes energy; energy from the heat of the iron. These photons leave the iron, pass through the environment, and eventually collide with some other object where they are absorbed and deposit their energy. This is radiative heat transfer. If that energy is deposited on your retina or a CCD (like in a digital camera), an image forms over time. This is how infrared goggles work and they would work equally well in high vacuum as here on earth.

In conduction, the next simplest example, there is no generation of photons (physics nerds forgive me for the sake of simplicity). The individual atoms in the object are vibrating with heat energy. As each atom gains energy from it's more energetic neighbors, so it gives up energy to its less energetic ones. Over time, the heat "travels" through the object.

In convection, the molecules of gas near the object gain energy, like in the conduction case, but those same molecules that gained energy then travel through the environment to some other location where they then give off their heat energy.

In summary:

radiation = generated and absorbed photonsconduction = molecules exciting their neighbors succesivelyconvection = molecules heated like in conduction, but then move to another location
7 0
3 years ago
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
3 years ago
What are the uses of navigation keys​
Zolol [24]
The navigation keys allow you to move the cursor, move around in documents and webpages, and edit text.
3 0
2 years ago
The         provides access to the Internet; may also be internal
grin007 [14]
The TCP/IP protocol provides access to internally and externally I.e. The internet.
3 0
4 years ago
Good english songs to put in a power point
zheka24 [161]
Depends on what the powerpoint is about...
7 0
3 years ago
Other questions:
  • How do you tack pictures for this app
    15·1 answer
  • A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database da
    6·1 answer
  • (a) Implement (in Java) the RadixSort algorithm to sort in increasing order an array of integer keys.
    10·1 answer
  • In which of the following situations should you expect to provide your Social Security number?
    13·1 answer
  • When does personal information often need to be entered online?
    15·1 answer
  • What are the two categories of problems that we can simply convert<br> to parallel code?
    10·1 answer
  • File
    10·1 answer
  • Que es un algoritmos
    12·2 answers
  • What is web browser <br>​
    7·2 answers
  • I dont know how to put the negative sigh on my computer
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!