1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
4 years ago
3

Workstation control standards institute security requirements to harden end user devices. For example, a Malicious Code Protecti

on standard attempts to keep a workstation free from viruses and other malware. However, this policy is a preventive control, which means that it tries to prevent an infection through installing scanning software. As such it is lacking in detection control, so it cannot detect and report symptoms of an infection.
1. True
2. False
Computers and Technology
1 answer:
beks73 [17]4 years ago
7 0
The correct answer is 1 true
You might be interested in
Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
rusak2 [61]

Answer:

Explanation:

The following code is written in Java. It creates 5 random integers and saves them to a list called myList. Then it loops through that list and checks each one until the largest and smallest values are obtained. Finally, it uses these values to calculate the sums and products as requested. The program has been tested and the output can be seen in the attached image below.

import java.util.ArrayList;

import java.util.Arrays;

import java.util.Random;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Random rand = new Random();

       ArrayList<Integer> myList = new ArrayList<>();

       for (int i = 0; i< 5; i++) {

           int mynum = rand.nextInt(20);

           myList.add(mynum);

       }

       int largest = myList.get(0);

       int smallest = myList.get(0);

       int sum = 0;

       int product = 1;

       int sumLargestandSmallest, productLargestandSmallest;

       for (int x : myList) {

           if (x > largest) {

               largest = x;

           }

           if (x < smallest) {

               smallest = x;

           }

           sum += x;

           product *= x;

       }

       sumLargestandSmallest = largest + smallest;

       productLargestandSmallest = largest * smallest;

       System.out.println("List" + Arrays.toString(myList.toArray()));

       System.out.println("Smallest: " + smallest);

       System.out.println("Largest: " + largest);

       System.out.println("Sum: " + sum);

       System.out.println("Product: " + product);

       System.out.println("Sum of Smallest and Largest: " + sumLargestandSmallest);

       System.out.println("Product of Smallest and Largest: " + productLargestandSmallest);

   }

}

6 0
3 years ago
Num = int(input("Enter a number: "))
Pavlova-9 [17]

So, 5 is intered.

Line 1: num will recieve the integer 5

Line 2: Blank

Line 3: num will recieve 1, wich is the remainer of the division of 5 by 4.

Line 4: will return true, since num is indeed equal to 1.

Line 5: Will print "A"

Line 6: Will return false

Line 7: Gets jumped

Line 8: Will return false

Line 9: Gets jumped

Line 10: Will return false

Line 11: Gets jumped

Line 12: Will return false

Line 13: Gets jumped

The only OUTPUT is "A".

5 0
3 years ago
Iaz005<br> plz make a new zoom
AURORKA [14]

ohhhhh okkkkkkkk??!! haha

7 0
3 years ago
Read 2 more answers
Assume three jobs arrive at approximately the same time (arrival time are all 0), but Job A arrives slightly before Job B, and J
Komok [63]

Answer:

Explanation:

Correct:

8 0
3 years ago
Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected rou
34kurt

Answer:

Explanation:

For example with the hierarchical network design of Cisco (three-layer) it is worth mentioning the following benefits:

- This type of infrastructure is highly reliable

- The complex problem regarding network design is broken into smaller and manageable areas.

- Improved access, access, core layers and distribution

-  The hierarchy provides specific functions important in defining its role within the whole network.

Regarding the access layers in the hierarchy the following are core benefits:

- Layer 2 switching

- Virtual access control lists (VACLs)

- Power over Ethernet (PoE) and auxiliary VLANs for VoIP

- Spanning tree

- High availability

- Port security

- Address Resolution Protocol (ARP) inspection

5 0
4 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • The part you should check first when you are servicing a sparking universal motor is the A. commutator. B. armature. C. brushes.
    9·1 answer
  • Xbrl taxonomy: is the document format used to produce web pages. is the final product (report. is a classification scheme. is a
    12·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • Houston want to have a quick conversion with his friend about an upcoming school activity. which type of website would be most u
    12·2 answers
  • Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6
    6·1 answer
  • What is the function of a breadcrumb trail in a website?
    13·1 answer
  • From a database point of view, the collection of data becomes meaningful only when it reflect
    8·1 answer
  • Việc áp dụng khai báo hải quan điện tử có áp dụng chữ ký số, đem lại những lợi ích gì
    10·1 answer
  • Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should NOT
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!