1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
4 years ago
12

the penalties for ignoring the requirements for protecting classified information when using social networking services are ____

___ when using other media and methods of dissemination?
Computers and Technology
1 answer:
uysha [10]4 years ago
7 0

Answer:

the same as

Explanation:

Classified information is confidential information that a government deems to be protected.

There are certain penalties for the person if they ignore any protection measure for classified information when using social networking services and the penalties are the same as if someone uses other media and methods of dissemination.

Hence, the correct answer for the blanks is "the same as".

You might be interested in
A for loop
MAVERICK [17]

Answer:

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Explanation:

i feel that i remmeber it from a test

8 0
3 years ago
What is the difference between a Computer Science and a Compter Engineer major?
xeze [42]

Answer:

Computer Science is the study of the existing things and programming language to acquire knowledge in that field

Computer engineering is applying the knowledge to invent new things

Explanation:

Computer Science is the study of the existing things and programming language to acquire knowledge in that field

Computer engineering is applying the knowledge to invent new things

If we want to accomplish any task , first you should know how to achieve that task and you should have some knowledge to do that task. Computer Science basically deals with acquiring knowledge in the are of computers.

Computer engineering is the engineering things based on the facts we have alreday

5 0
4 years ago
F1: 2^14 formula ....................................................................
QveST [7]

Answer:

=POWER(2,14)

Explanation:

The complete question is to write the given formula in cell F1

We have:

F1 = 2^\wedge {14}

The above formula implies 2 raised to the power of 14.

In Excel, this can be achieved using the power function

And the syntax is:

=POWER(m,n)

which means m^n

So, 2^14 will be entered in cell F1 as:

=POWER(2,14)

4 0
3 years ago
Identify two real-world examples of problems whose solutions do scale well
stellarik [79]

Explanation:

We should see scaling well as referring to problems that can well be solved using computation. Two real-world examples are:

  • problems involving finding the largest or smallest of several lists of numbers: Usually, a simple program executed to lookup the data set to determine which number fits the properties needed.
  • problems involving equations: By computing the variables (x, y, etc) that make up the equation, and the operations (eg, addition, division) to be performed on the variables the problem can be solved well.
3 0
3 years ago
You are planning to use Spark to create a machine learning model that recommends restaurants to users based on user details and
SCORPION-xisa [38]

Answer:

The third point i.e " Use an alternating least squares (ALS) algorithm to create a collaborative filtering solution" is the correct answer .

Explanation:

The Alternating Less Squares  is the different approach that main objective to enhancing the loss function.The Alternating Less Squares process divided the matrix into the two factors for optimizing the loss .The divided of two factor matrix is known as item matrix or the user matrix.

  • As we have to build the machine learning model which proposes restaurants to restaurants that are based on the customer information and the prior restaurant reviews the alternating least squares is the best model to implement this .
  • All the other options are not the correct model also they are not related to given scenario that's why they are incorrect options.
4 0
3 years ago
Other questions:
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • 24 bit or 16 million colors is often called?
    7·1 answer
  • PLEASE help me RIGHT NOW!!!!!!!!! I will give a Brainly to anyone who helps me!
    15·1 answer
  • Consider the following definitions:public boolean someMethod (int[] list, int value){ int counter; boolean flag = false; for (co
    10·1 answer
  • Sensitive data is always classified true or false
    14·1 answer
  • Complete the function by filling in the missing parts. The color_translator function receives the name of a color, then prints i
    11·1 answer
  • Jerry can use an <br> program to restrict information from going out without his permission.
    12·2 answers
  • Explain briely what this statement mean.<br>"A byte is equivalent to a character"<br>​
    15·1 answer
  • Does putting a glue stick on your touchpad make it stop working pls help
    10·1 answer
  • A technician is testing a connector in a circuit with a voltmeter. With the power on in the circuit, the meter reads 12 volts wh
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!