1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
7

You wish to lift a 12,000 lb stone by a vertical

Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
3 0
Ndnsnskiaqosikejwnw sorry
You might be interested in
DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the
kherson [118]

Answer:

What i would suggest for the organization is to use the Testing Infrastructure strategy. it is good for your consulting firm because it is less costly and provide security.

Explanation:

Solution

There are different network security strategy which is listed below:

Segment the network:

Segmentation in network is very useful for providing security.If any threat is occur only one segment is effected remaining are safe and it is less cost process. very useful for small organizations.

Test your infrastructure :

Testing infrastructure also very good technique.

Always we have to test our infrastructure whether threat is occur or not.

If any threat is happen we can detect that easily by testing our infrastructure.

Regularly update anti-virus software :

This is very useful for small organizations and it is less cost.with less cost we can provide security for all devices like computer,server,modems etc.

Frequently backup your critical data :

This is very good technique for crucial data.If we backup important data any time that will be useful if any attack is happen.

This is less costs and simple.

Change router default security settings :

Changing router password and settings also helpful for providing security.If we maintain same password and same settings for a long time that may lead to data hacking.It is cost less process very useful for small organizations.

6 0
3 years ago
Consider the function definition void Demo( int& intVal, float floatVal ) { intVal = intVal * 2; floatVal = float(intVal) +
Fynjy0 [20]

Answer:

myInt=40

myFloat=4.8

Explanation:

First look at the function definition .It has two arguments intVal is passed by reference while floatVal is passed by value.So the changes done on the myInt variable will be reflected on the original argument because when a variable is passed by reference the the changes are reflected on the original argument but when a variable is passed by value the function created a duplicate copy of it and work on them so changes are not reflected on the original argument.So myInt will get doubled while myFloat will remain the same.

5 0
3 years ago
What are the external parts of a computer system and which are output devices and which are input devices
cestrela7 [59]
I'd question the wording, However:

Monitor, Output device.
Keyboard, Input device.
Mouse, Input device.
Speakers Output Device.
Microphone, Input device.
Printer, Output device.
Scanner, input device.

Devices do not have to explicitly be one or the other e.g. a printer with a scanner, or headphones with a microphone.  
4 0
4 years ago
To guarantee that the member variables of a class are initialized, you use ____.
Leya [2.2K]
A constructor, member initialization lists and also the default member initializer. Here you see all three (in reality you choose one construct per variable).

class A
{
  public:
    int x = 0;

   A() : x(1)
   {
      x = 2;
   }
};
8 0
3 years ago
List as many coding languages as you can think of. ​
Butoxors [25]

python

Java

C

C++

XML

SEE I CHANGED IT >,_,<

4 0
2 years ago
Other questions:
  • How did the discovery of glossopteris support wegner's continental drift hypothesis?
    15·1 answer
  • Explain about forensic tools?
    14·1 answer
  • ​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted
    8·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • Friday Night Funkin Fans, does this count as a leak if I share it?
    13·2 answers
  • Edhesive 6.8 lesson practice answers
    10·1 answer
  • If you would like to compare information on two different Web pages, you should _____.
    13·2 answers
  • Developed the first compiler and conducted work that led to the development of COBOL ?
    6·1 answer
  • What are the characteristics of computer. Explain any one​
    15·2 answers
  • What does an arrow after a command indicate
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!