1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
15

We look for trends when we are looking at data. What is a trend?

Computers and Technology
2 answers:
Otrada [13]3 years ago
7 0

a trend is the general direction that data is going.

yulyashka [42]3 years ago
4 0
A subject of what people say at the time, most used, famous at the present time
You might be interested in
Use an ifstream object named indata to read the first three integers from a file called lottowins and write each number to stand
Gemiola [76]

Answer:

int x;

indata.open("lottowins");

indata >> x;

cout << x << endl;

indata >> x;

cout << x << endl;

indata >> x;

cout << x << endl;

indata.close();

4 0
3 years ago
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor, technicians must?
Neporo4naja [7]

When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor. Technicians must recover 80% of the nameplate charge.

Compressor is a mechanical device used in many industries which has the function of increasing gas pressure by reducing its volume. The air compressor is a specific type of gas compressor.

Compressors can be characterized in a number of different ways, but are usually divided into types based on the functional method used to produce compressed air or gas. The following are common compressor types. Types covered include:

  • Pistons
  • Diaphragm
  • Helical Screw
  • Slide propeller
  • Scrolling
  • Rotary Lobe
  • Centrifugal
  • Axial

How to use an air compressor

  1. Position the Air Compressor
  2. Check the Oil Level
  3. Check the Drain Valve
  4. Set the PSI
  5. Prepare the Air Tank
  6. Connect the Air Hose
  7. Connect the Desired Tool
  8. Remove Excess Moisture

You can learn more about compressor here brainly.com/question/26581412

#SPJ4

7 0
1 year ago
Which package is the Graphics class part of? _________________ .
Ksenya-84 [330]

Answer: C) java.awt

Explanation:

Java.awt is commonly used in AWT (abstract window toolkit) which basically contain core graphics in AWT class. The java.awt is the important package in the AWT. It basically contain the main capabilities of the graphics and define the GUI ( graphical user interface) frame in the java platform.

It also support the event handling and also the event class like window and key event in the java.awt.

Therefore, option (C) is correct.

8 0
3 years ago
You shut down VM1, configure the processor compatibility settings, and then start VM1. Does this meet the goal?
Naddik [55]

Answer:

Yes it does.

Explanation:

VM or virtual machines are enabled by the hypervisor in host operating systems. More than one virtual machine can run in an operating with only one processor.

Live migration, save and restore, and production checkpoints are all mobility processes that does not require rebooting the system. Since these virtual machine mobility processes is not compatible running directly on different processor, the virtual machine must be shutdown, and rebooted on the new processor host.

However, to run the virtual machine on a different processor without rebooting, the VM is run on processor compatibility mode (in the processor compatibility settings).

7 0
3 years ago
Other questions:
  • un diagrama de flujo donde se gana una partida de ajedrez teniendo en cuenta los movimientos de la otra persona
    8·1 answer
  • Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b
    5·1 answer
  • why is wrong timing, poor technology, bad implementation and politics in business affected the OSI model as a standard
    5·1 answer
  • 1. Problem solving is
    13·1 answer
  • What is a table in excel
    10·2 answers
  • How can you enter Task Manager in Windows? Select 3 options. press Ctrl + Shift + Tab press Ctrl+Alt+Delete and then click Task
    8·1 answer
  • What is the name of the virus that appears to be a legitimate program but when opened
    9·1 answer
  • Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false​
    5·1 answer
  • An analog video is a video signal transmitted by an analog signal, captured on a (blank)
    13·1 answer
  • Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!