Scripting languages are unique computer languages because they automate task that could be done by human operator and are easy to use.
<h3>What is a scripting language?</h3>
Scripting languages are programming languages that is interpreted.
They are programming languages that automates the task that will originally be performed by a human operator.
Scripting languages are used to give instruction to other software to run accordingly to how you want it.
The scripting language is different form other language base on the fact that its interpreted . This means the code are translated to machine code when it is run.
The major advantage of scripting languages is that it is human readable and understandable.
Examples of scripting languages are Python and JavaScript.
learn more on scripting here: brainly.com/question/12763341
#SPJ1
Answer:
D. HIPAA (Health Insurance Portability and Accountability Act)
Explanation:
HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.
PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.
Answer:
True.
Explanation:
A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.
Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.
Answer:
Turn on file and printing sharing for all networks.
Explanation:
Windows has several security features when connecting to a network. In the control panel, you can access to Network and internet > Network and sharing center > Advanced sharing options. There you will see 3 different profiles, one for private networks, one for guest or public networks, and one for all networks.
You should take one of the 2 options. Enable file and printer sharing for all networks, so he can just print without doing anything more. Or keeping the print sharing just for private networks, and adding his new branch office's network to the private networks list.
Answer:
Polyethylene or polythene (abbreviated PE; IUPAC name polyethene or poly(methylene)) is the most common plastic in use today.
Explanation: