1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
5

What should you call a person who has permission to bypass the security of a computer to access it

Computers and Technology
1 answer:
Sav [38]3 years ago
7 0

Answer:

Administrator

Explanation:

Such permission to bypass the security of a computer to access it is being given to only the administrator. No other user is allowed to have such privileges. And there is only one administrator in a team, and this is the standard as only then the security of a network of computers, and a particular computer can be ensured. And the correct answer to this question is certainly the Administrator.

You might be interested in
"Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
weqwewe [10]

int main() {

string simon_Pattern;

string user_Pattern;

int userScore;

int i;

user_Score = 0;

simon_Pattern = "RRGBRYYBGY";

user_Pattern = "RRGBBRYBGY";

for (i = 0; i <= simson_pattern.length; i++) {

if (simon_Pattern[i] == user_Pattern[i]) {

user_Score = user_Score + 1;

} else {

break;

}

}

cout << "userScore: " << user_Score << endl;

return 0;

}

Here it uses two string variable to store “simson’s pattern and user’s pattern”. Then a “for loop” is executed till the end of the string. Inside the for loop both the strings are compared character by character and when found the score is added. If not for loop is exited and finally the score is displayed.

5 0
3 years ago
Read 2 more answers
How much speedup would result from running application A on the entire 22-core processor, as compared to running it serially?
Agata [3.3K]

This question is incomplete. The complete question is given below:

Your company has just brought a new 22-core processor, and you have been tasked with optimizing your software for this processor. You will run four applications on this system, but the resource requirements are not equal. Assume the system and application characteristics listed in table 1.1

Table 1.1 Four Applications

Application

A

B

C

D

% resources needed

41

27

18

14

% parallelizable

50

80

60

90

The percentage of resources of assuming they are all run in serial. Assume that when you parallelize a portion of the program by X, the speedup for that portion is X.

a. How much speedup would result from running application A on the entire 22-core processor, as compared to running it serially?

Answer:

Speedup = 50

Explanation:

  • The speedup for that portion is x if we parallelize a portion of that program by X.
  • If the whole program has no parallelize portion or in other words the whole program is running serially then the speedup will be zero.
  • So in this scenario if parallelizable portion of A is 50% so according to above description the speedup is 50.
6 0
3 years ago
Media convergence is the result of the integration of the different media technologies. Please select the best answer from the c
AlladinOne [14]

This is true

We can simply put media convergence as the merging of previously distinct media technologies into one core technology or ecosystem. All it takes is separate ideas being smashed together to form one big idea. An example of media convergence is a smartphone. The smartphone is the technological convergence of communication. It can be used to communicate while functioning as a computer on which we share and view content. Before, this could have taken several devices to accomplish the above task individually.

7 0
4 years ago
Read 2 more answers
What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks, and each block is t
Orlov [11]

Answer:

Electronic Code Book

Explanation:

5 0
3 years ago
Jeroo Bob has just awoken from a long night's sleep and is hungry for some winsum flowers. He walks out of
IgorLugansk [536]

Answer:

bro this is long try something easy

Explanation:

im lazy to read

7 0
3 years ago
Other questions:
  • What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply
    14·2 answers
  • Select the correct answer.
    9·2 answers
  • A broadband router is used to do which of the following? run the programs on a computer locate lost files on a computer manage a
    6·1 answer
  • All of the following are vertical alignment options except __middle , top, center, or_bottom_.
    12·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • Choose the word pair that would best complete this analogy <br> annihilation : obliteration
    7·1 answer
  • A chain of dry-cleaning outlets wants to improve its operations by using data from
    7·1 answer
  • These are templates or patterns that make it easier for users to enter data
    8·1 answer
  • Some of the ways we can resolve IPv4 address shortage
    15·1 answer
  • Write a program that creates a two-dimensional array named height and stores the following data:
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!