1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
4 years ago
8

The best how can i get. Ethiopian bank enterance examination for natural science grade 12?

Computers and Technology
1 answer:
zubka84 [21]4 years ago
5 0

do your own work ************************************************************************************************************************************************************

You might be interested in
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
If you were going to construct a table that only included shape names with number prefixes, which shape would you include
NikAS [45]
The answer would be A. square
3 0
4 years ago
Sequential and direct access are two methods to locate data in memory. Discuss why major devices now a days use direct access? H
djverab [1.8K]

Answer:

Direct data access reduces the speed of retrieving data from memory or storage. Retrieving data and storing it in a cache memory provides direct access to data in the storage.

Explanation:

Sequential memory access, as the name implies, goes through the memory length location in search of the specified data. Direct memory access, provides a memory location index for direct retrieval of data.

Examples of direct and sequential memory access are RAM and tapes respectively. Data in sequential memory access can be access directly by getting data in advance and storing them in cache memory for direct access by the processor.

3 0
3 years ago
In the late 1990s, Microsoft was sued for "tying" its Internet browser, Internet Explorer, to its operating system. A seller for
LekaFEV [45]

Answer:

Section 3 of the Clayton act.

Explanation:

Section 3 of the Clayton act 15 U.S.C.S § 14, makes illegal some kind of distribution practice that facilitates monopolistic arrangement that is section 3 of the Clayton act makes it illegal to enter into tying arrangement, exclusive dealing contracts or requirement contracts if such contracts tends to lessen competition. Where customer is required to pay for an undesired product in order to obtain a desired product.

3 0
3 years ago
Write a static method named lowestPrice that accepts as its parameter a Scanner for an input file. The data in the Scanner repre
NikAS [45]

Answer:

Explanation:

The following code is written in Java. It creates the method as requested which takes in a parameter of type Scanner and opens the passed file, reads all the elements, and prints the lowest-priced element in the file. A test case was done and the output can be seen in the attached picture below.

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

class Brainly{

   public static void main(String[] args) throws FileNotFoundException {

       Scanner console = new Scanner(System.in);

       System.out.print("file location: ");

       String inputLocation = console.next();

       File inputFile = new File(inputLocation);

       Scanner in = new Scanner(inputFile);

       lowestPrice(in);

   }

   public static void lowestPrice(Scanner in) {

       double smallest = in.nextDouble();

       while(in.hasNextDouble()){

           double number = in.nextDouble();

           if (number < smallest) {

               smallest = number;

           }

       }

       System.out.println(smallest);

       in.close();

   }

}

6 0
3 years ago
Other questions:
  • In which career field, would the Computing Technology Industry Association's CompTIA A+ certification be useful?
    13·1 answer
  • If you want to open an application that does not have a tile pinned to the start menu
    9·1 answer
  • In ipv4 addressing, an ip address whose first octet is in the range of 192–223 belongs to a class ____ network.
    15·1 answer
  • Array is special variable that can handle more than one value.
    6·1 answer
  • Universal Containers (UC) has a great user interface for their Customer Community Knowledge Base. UC has multiple Communities an
    15·1 answer
  • Horizontal lines should be avoided in photographs because they make the photograph appear small.
    8·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • Design a class FileArray that has a static method named writeArray. The method should take two arguments: the name of a file and
    11·1 answer
  • Michael’s team is presenting a robot before their examiners. What do they need which is a definitive description of the final pr
    6·1 answer
  • How does a fully integrated Data and Analytics Platform enable organizations to convert data into consumable information and ins
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!