1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
6

Question 4 (1 point)

Computers and Technology
1 answer:
Leno4ka [110]3 years ago
6 0

Answer:

I need the know what "the following" are! Then I can answer!

Explanation:

You might be interested in
Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
cestrela7 [59]

Answer:

(A) 1

Explanation:

In UNIX the file system the file system is a central part of the operating system. The file system is for storage and retrieval of information. Programs that form the UNIX system also stores information in files.

UNIX file systems supports three files namely: ordinary file, directory files, device files or special files.

If we need to access bytes 2500-2503 it means the bytes are within the third block. So we will need only one access.

Note this is because the file control block (inside) is within the memory. If file control block was not in the memory we would have needed more disk accessses.

7 0
3 years ago
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
Contemporary pc operating systems and application software use a​ ________, which makes extensive use of​ icons, buttons,​ bars,
V125BC [204]

Contemporary pc operating systems and application software use a​ Graphical User Interface (GUI), which extensively uses​ icons, buttons,​ bars, and boxes to perform tasks.

What is a GUI?

A system of interactive visual components for computer software is known as a GUI (Graphical User Interface).

Compared to MS-DOS and the shell of Unix-like operating systems, a GUI is more user-friendly than a text-based command-line interface.

Objects like icons, cursors and buttons are included in a GUI. Sometimes these elements are enhanced with visual effects like transparency and sounds.

Learn more about Graphical User Interface here: brainly.com/question/14758410

#SPJ4

3 0
2 years ago
An animal shelter recently held an adoption event and found homes for 48 of their shelter animals. If they found home for 80% of
vredina [299]

Answer:

9.6

Explanation:

4 0
3 years ago
Read 2 more answers
This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false. Where should return fals
Marianna [84]

Answer:

at the end, i.e., after the for loop.

Explanation:

see code.

I also added a cooler alternative implementation.

6 0
3 years ago
Other questions:
  • Which of the following best describes the Distribution Mix?
    15·1 answer
  • At what two layers of the osi model are lan and wan protocols likely to differ??
    7·1 answer
  • Ok so another weird question! So if you know what google drive is and how to upload a video why does it keep adding hours! it ke
    11·1 answer
  • Help me please............
    6·2 answers
  • What feature is available to add a suggestion in the margin of someone else's document?
    7·1 answer
  • What is the information age?
    12·1 answer
  • Question 2 of 10
    13·1 answer
  • Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
    14·1 answer
  • Which workbook view is used most often in Excel?
    8·1 answer
  • How could this code be simplified?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!