1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
4 years ago
9

What does it mean when system ui has stopped?

Computers and Technology
1 answer:
Andru [333]4 years ago
7 0
One of the most common errors on electronic devices. This Error indicates that an update was "corrupted" or "Unsuccessfully patched"
You might be interested in
Write an algorithm whether the given number is positive negative or zero​
Ahat [919]

Answer:

See the code below in python.

Explanation:

num = int(input("Enter a number: "))

if (num == 0):

 print("You entered 0...")

elif (num < 0):

 print("Your entered a negative number...")

else:

 print("You entered a positive number...")

Regards: Your Friendly Study Co-Pilot!

6 0
3 years ago
Draw the gates required to build a half adder.
Svetach [21]

Answer:

The gates required to build a half adder are :

  1. AND Gate for Carry.
  2. XOR Gate for Sum

Explanation:

AND Gate is required for the carry and the XOR gate is required for the sum.

The figures for the gates and the truth tables for the half adder are attached so please refer them for further explanation.

The sum is 1 when one of the input is High or 1 if both the inputs are same then the sum is 0.So this behavior is implemented by X-OR gate.

The carry is High only when both of the inputs are 1.This is implemented by AND-Gate.

6 0
3 years ago
In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
algol13

Answer:

One of the biggest social media giants has faced many such security and privacy risks in the past 3 years. 10 are listed below:

1. No one can forget the New Zealand attack on the mosque, and it was telecast live via it. And that is certainly a security risk. And if someone is able to stream live, the AI is in question definitely as this cannot be telecast.

2. Can you forget the various US shooting cases in the past 5 years? And many out of them where telecast lives on it. Again the AI, and the authentication is in question.

3. Many evils have many times advertised itself through it, and that is a security risk. This put up the question on the Data Scientists of the company.

4. It's a huge data on it, and many users have been able to misuse it, and that is a security risk. This put up the question mark on the application of the Big Data.

5. Once, the UK parliament questioned it to sell the secret data, and that was a privacy risk.

6. An Engineer was caught negotiating to sell secret users data to a third party, and that is a privacy risk as well as a question on management technology, as its possible now to check these kind of frauds.

7. Its accounts have been hacked many times, as well as millions of user-profiles, were stolen. This is a security and privacy risk.

8. Its data is still not safe as evils have proved they can break the authentication. However, it has reacted well, and they look like being a safe destination now.

9. Once, someone from Russia was caught collecting a lot of data from it. That was a security and privacy risk. And surely if someone is uploading a lot of complicated and confidential data, must be checked through proper AI implementation.

10. In India too there have been claims that a lot of personal information during elections 2014 was sold. That was a security and data risk. And the data scientists were proved vulnerable again. Its quite sure hence, a lot of work has to be done in Data Science and Artificial intelligence still.

However, its owner is one of the finest souls on earth. He donated all his money when he was blessed with a child. Some out of his team cheated, and else some technology failure or the huge amount of data was the reason for the fault. However, other companies are also facing such problems. And hence, he cannot be blamed for this. And the company now definitely has recovered from the nightmare that they faced in the past 3 years.

Explanation:

The answer is self explanatory.

8 0
3 years ago
Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture
lara31 [8.8K]

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

<h3>How does SaaS (Software as a service) impact organizational security posture?</h3>

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

<h3>What is organization level security in Salesforce?</h3>

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

brainly.com/question/24852211

#SPJ1

4 0
2 years ago
Assume that you have an ArrayList variable named a containing 4 elements, and an object named element that is the correct type t
jonny [76]

Answer:

Option (4) is the correct answer.

Explanation:

In Java programming language ,array collection starts from 0 index location and ends in a size-1 index location. So to access the last elements the user needs to use a[Size-1] statement. so to modify the value of the last location of the array the user needs to use "a[size-1]= element;".

But when the user wants to add some new value to the end of the array list collection then he needs to use the statement--

a.add(element); //where add is a function, element is a value and a is a array list object.

Another option is invalid because--

  • Option 1 is not the correct because "a[3]=element;" modify the value of the 3rd element of the array.
  • Option 2 gives a compile-time error because add functions bracts are not closed.
  • Option 3 gives the error because a[4] gives the location of the 5th element of the array but the above question says that a is defined with 4 elements.
7 0
3 years ago
Other questions:
  • What are the advantages and disadvantages of it?
    14·1 answer
  • What is a geotag?
    10·1 answer
  • On most computers, the default font size in word is ____. 8 11 14 16
    8·2 answers
  • Make a java program to enter a two-digit integer and determine if both digits are prime
    6·1 answer
  • Universal Containers is creating a custom Visualforce page to allow users to edit contact records. The developer has used an ape
    6·1 answer
  • What are some options available in the Spelling and Grammar Checker in word?
    6·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • How many tens are there in the number 156?<br> A. 1<br> B. 15<br> C. 6<br> D. 56
    7·2 answers
  • You plays pokemon go
    14·2 answers
  • I’m select circumstances is a permissible character on the Mac operating system
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!