1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ad libitum [116K]
4 years ago
7

What do you believe is the future of certification?

Computers and Technology
1 answer:
Gemiola [76]4 years ago
7 0
Technology,performance,learning
You might be interested in
Order the steps for creating an automatic reply in Outlook.
RSB [31]

Answer:

Select File > Automatic Replies.

Select Send automatic replies.

If you don't want the messages to go out right away, select Only send during this time range.

Choose the dates and times you'd like to set your automatic reply for.

Type in a message.

Select OK.

Explanation:

3 0
2 years ago
Read 2 more answers
Write an if-else statement with multiple branches. If givenYear is 2101 or greater, print "Distant future" (without quotes). Els
irga5000 [103]

Answer:

import java.util.Scanner;

public class num9 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter year");

       int givenYear =in.nextInt();

       if(givenYear>=2101){

           System.out.println("Distant Future");

       }

       else if(givenYear>=2001){

           System.out.println("21st Century");

       }

   }

}

Explanation:

  • Using Java programming Language
  • Import Scanner class to receive user input of the variable givenYear
  • Use if statement to check the first condition if(givenYear>=2101)
  • Use else if statement to check the second condition if(givenYear>=2001)
  • print Distant future and 21st century respectively
3 0
4 years ago
How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
balandron [24]

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

3 0
3 years ago
You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
cestrela7 [59]
Here are my definitions of each option:

Spam = Unwanted mail, advertisements, etc

Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft

Malware = Usually a malicious piece of code that can be used to slow down your computer or to get a hold of your computer for some other malicious reason

Legitimate = Means that the sender is valid, you know who its coming from, and you know that you won't get attacked by the email

So based on this, I would say that the answer is B. Phishing


3 0
4 years ago
Read 2 more answers
What are the layers in the internet protocol stack? what are the principle responsibilities of each of these layers?
Andrew [12]
1: Application
2: Presentation
3:Session
4: Transport
5:Network 
6: Data link 
7: Physical

Application is a Interface Layer and responsible Layer
<span />
3 0
3 years ago
Other questions:
  • Which of the following is NOT one of the responsibilities of the Federal Reserve?
    10·1 answer
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • Practice Home Survey
    14·1 answer
  • A fitness tracker can be classified as a wearable computer. true
    9·1 answer
  • How do I cite a website?
    7·2 answers
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a
    12·1 answer
  • Which of the following will display a string whose address is in the dx register: a.
    12·1 answer
  • ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
    14·1 answer
  • Decades of research throughout the world have found a _____ correlation between academic achievement and socioeconomic status, l
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!