1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
13

Coloumn1; Criteria1: Average of best three marks (CA); CA>=40

Computers and Technology
1 answer:
Nikitich [7]3 years ago
5 0

Answer:

Please check the attachment.

for the assembly language program the jump and move keywords have been used to establish the if else ladder.

Also for the best three marks, we need to store the three theory and two practical marks in an array, and then we can sort it to get the best three marks to find the CA. and then from initial array, we can find the last two practical test parks, and find their average.

Rest of the calculation is as being mentioned in the image. Also, in the image we have 2 practicals. We need to count two instead of three there, and rest is as shown.

Explanation:

The answer does not require any further explanation.

You might be interested in
Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
Snowcat [4.5K]

Answer:

b. Synchronous replication

Explanation:

Replication of data in storage partitions or in a number redundant array of independent disk drives helps to promote redundancy, as implied, and faulty tolerance to reduce loss of data.

There are two categories of replication and they are synchronous and asynchronous replication.

Synchronous replication requires low latency network site to mirror data, while asynchronous replication mirrors data in large metropolitan area in high latency networks.

4 0
3 years ago
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
sergij07 [2.7K]

An action which this organization should take to find out if systems have been compromised is: C. Look for unauthorized accounts.

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities and compromises in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails a tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the computer system.

In this scenario, we can reasonably infer and logically deduce that an action which this organization or cybersecurity specialist should take to find out if systems have been compromised is to look out for unauthorized accounts.

Read more on penetration test here: brainly.com/question/25813524

#SPJ1

Complete Question:

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for policy changes in Event Viewer.

Scan the systems for viruses.

Look for unauthorized accounts.

Look for usernames that do not have passwords.

7 0
1 year ago
A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes a
Yanka [14]

Answer:

Boot to safe mode

Explanation:

When a virus attacks boot system, that is to say, Windows program won´t load. The following steps should be considered taking into account what Windows Version is being used, Windows 7, 8 or 10:

1. Press  F8 (Windows 7) F4 (Windows 8, 10)

2. Enable Safe Mode

3. Run Safe Mode

4. Once in safe mode the user will have access to Windows and eventually document files can be extracted via pendrive.

5 0
3 years ago
(tco 8) the process of granting a user access to an application is called _____.
Scrat [10]

I guess the correct answer is Authentication.

The process of granting a user access to an application is called Authentication.

3 0
3 years ago
I NEED HELP!! What is the portrait mode?
Rashid [163]

Answer:

A its achromatically save your file

5 0
2 years ago
Read 2 more answers
Other questions:
  • A user reports that she can't access the new server used in the accounting department. you check the problem and find out that h
    9·1 answer
  • Select two netiquette guidelines. In a paragraph of no less than 125 words, explain why these guidelines make professional onlin
    9·1 answer
  • Creating a chart using a spreadsheet Chart Wizard involves four steps. Which is the last step?
    6·1 answer
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • Which computer component are you most like? Explain why.
    10·1 answer
  • Which one of these do you need to become president of the US ?
    6·2 answers
  • 1.which screen appears after the password is typed (welcome, lock)​
    11·2 answers
  • कम्प्युटर को पहिलो पुस्ता भनेको के हो?​
    8·2 answers
  • I like the impact that the increasing number of social grants may have on the things mothers​
    14·1 answer
  • 1. Which sentence best expresses the main idea
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!