Answer:
- The graph of the function is attached below.
- The x-intercepts will be: (2, 0), (-2, 0)
- The y-intercept will be: (-20, 0)
Explanation:
Given the function
As we know that the x-intercept(s) can be obtained by setting the value y=0
so
switching sides
Add 20 to both sides
Dividing both sides by 5
so the x-intercepts will be: (2, 0), (-2, 0)
we also know that the y-intercept(s) can obtained by setting the value x=0
so
so the y-intercept will be: (-20, 0)
From the attached figure, all the intercepts are labeled.
Answer:
Explanation:
Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.
Some of the necessary safety conditions that should be taken include;
1) Appropriate research about the software including taking more about the vendors and reviews.
2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.
3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.
4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.
difference between engineering and architecture are.
A engineer is a person whose job involves designing and building engines, machines, roads, bridges ,etc .
While architect design buildings only.
Answer:
a.
Explanation:
Two bytes have 2 times 8 bits is 16 bits.
Max value that can be expressed is 2¹⁶-1 = 65535
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.