1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
6

PLEASE PLEASE PLEASE PLEASE PLEASE HELP! I'M BEGGING Y'ALL! I NEED THIS FOR TODAY! CORRECT ANSWERS WILL BE AWARDED BRAINLIEST!

Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
4 0

Answer:

You can make an online memorial, you can write their story online, you could make videos for them, technologhy allows many people to thank them, band you can donate things online to them.

Explanation:

Im not sure if this is right but its what first came up into my head

You might be interested in
Which of the following exhibit temporal locality: 1. Repetition control flow 2. Linear search on an array of integers 3. Accessi
Tom [10]

Answer:

1, 2 and 3

Explanation:

Temporary locality occurs when a program accesses an instruction or a  data, there is a high probability that this  same instruction or data will be accessed again soon.

6 0
3 years ago
#Write a function called "scramble" that accepts a string #as an argument and returns a new string. The new string #should start
mojhsa [17]

Answer:

def scramble(s):

   if len(s) % 2 == 1:

       index = int(len(s)//2)

   else:

       index = int(len(s)/2)

   

   return s[index:] + s[:index]

Explanation:

Create a function called scramble that takes one parameter, s

Check the length of the s using len function. If the length is odd, set the index as the floor of the length/2. Otherwise, set the index as length/2. Use index value to slice the s as two halves

Return the second half of the s and the second half of the s using slice notation (s[index:] represents the characters from half of the s to the end, s[:index] represents the characters from begining to the half of the s)

8 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
3 years ago
What does technological convergence mean, with examples?
Brrunno [24]

Answer:

Technological convergence is a term describes the layers of abstraction that enable different technologies t inter operate efficiently as a converged system. Convergent services such as VoIP, IPTV, Smart TV and others tend to replace the older technologies.

Explanation:

As a feature of society convergence can spur economic growth and change how people communicate on a global basis. A good way t evaluate the previous generations, items such as CD player, cassette deck, console TV or corded telephone each served only one function, whereas a single modern handheld computing device can meld several of those functions with hardly any user intervention required.

7 0
3 years ago
Which of these are variables in an organization? Choose three.
Rzqust [24]

Answer:

Example of organizational variables are codes of ethics, ethical climate, organizational size, top management, organizational structure and organization culture.

Explanation:

Organizational variables can be defined as characteristics of a decision that influences the decision-making process and its outcome. This organizational variables also influence how an individual makes decisions.

Example of organizational variables are codes of ethics, ethical climate, organizational size, top management, organizational structure and organization culture.

6 0
2 years ago
Other questions:
  • Which shortcut brings up the Print screen?
    10·2 answers
  • Press ____ to select the entire worksheet.<br> F1<br> F4<br> ALT+A<br> CTRL+A
    8·1 answer
  • Pressing and holding _______ while clicking enables you to select multiple contiguous files or folders.
    15·1 answer
  • What does it mean for a wireless network to be operating in "infrastructure mode"? If the network is not in infrastructure mode,
    5·1 answer
  • Samantha has to create a video for her science project on the blossoming of a flower from a bud to one with fully opened petals.
    5·2 answers
  • When is the redo log buffer written to the redo log file?
    5·1 answer
  • Composition means ________. a)that data fields should be declared private b)that a class extends another class c)that a variable
    6·1 answer
  • Favorite color should it be stored why?or why not?<br>​
    6·1 answer
  • You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub
    12·1 answer
  • 8.6 Code Practice: Question 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!