1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka-Z-Leto [24]
2 years ago
6

One of the main reasons for copyright law is to encourage creators to share their work for the benefit of the general public. Pl

ease select the best answer from the choices provided
t or f
Computers and Technology
1 answer:
irina [24]2 years ago
8 0

Answer:

ewatuqhfuyerhjf

Explanation:

true

You might be interested in
Oxnard Casualty wants to ensure that their e-mail server has 99.98 percent reliability. They will use several independent server
sattari [20]

Answer:

The smallest number of servers required is 3 servers

<em />

Explanation:

Given

Reliability = 99.98\%

Individual Servers = 95\%

Required

Minimum number of servers needed

Let p represent the probability that a server is reliable and the probability that it wont be reliable be represented with q

Such that

p = 95\%\\

It should be noted that probabilities always add up to 1;

So,

p + q = 1'

Subtract p from both sides

p - p + q = 1 - p

q = 1 - p

Substitute p = 95\%\\

q = 1 - 95\%

Convert % to fraction

q = 1 - \frac{95}{100}

Convert fraction to decimal

q = 1 - 0.95

q = 0.05

------------------------------------------------------------------------------------------------

<em>To get an expression for one server</em>

The probabilities of 1 servers having 99.98% reliability is as follows;

p = 99.98\%

Recall that probabilities always add up to 1;

So,

p + q = 1

Subtract q from both sides

p + q - q = 1 - q

p = 1 - q

So,

p = 1 - q = 99.98\%

1 - q = 99.98\%

Let the number of servers be represented with n

The above expression becomes

1 - q^n = 99.98\%

Convert percent to fraction

1 - q^n = \frac{9998}{10000}

Convert fraction to decimal

1 - q^n = 0.9998

Add q^n to both sides

1 - q^n + q^n= 0.9998 + q^n

1 = 0.9998 + q^n

Subtract 0.9998 from both sides

1 - 0.9998 = 0.9998 - 0.9998 + q^n

1 - 0.9998 = q^n

0.0002 = q^n

Recall that q = 0.05

So, the expression becomes

0.0002 = 0.05^n

Take Log of both sides

Log(0.0002) = Log(0.05^n)

From laws of logarithm Loga^b = bLoga

So,

Log(0.0002) = Log(0.05^n) becomes

Log(0.0002) = nLog(0.05)

Divide both sides by Log0.05

\frac{Log(0.0002)}{Log(0.05)} = \frac{nLog(0.05)}{Log(0.05)}

\frac{Log(0.0002)}{Log(0.05)} = n

n = \frac{Log(0.0002)}{Log(0.05)}

n = \frac{-3.69897000434}{-1.30102999566}

n = 2.84310893421

n = 3 (Approximated)

<em>Hence, the smallest number of servers required is 3 servers</em>

6 0
3 years ago
What is the difference between a Is your Milling machine and grinding machine
Law Incorporation [45]

Answer:

one is used for milling and one is used for grinding

Explanation:

8 0
3 years ago
When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across
lana66690 [7]

Answer: rows, columns

Explanation: :)

6 0
3 years ago
4.8% complete this is a single choice question; skip ahead to question content a b c d confirm difficulty level: moderate an int
PilotLPTM [1.2K]

Answer:

A replay attack

4 0
2 years ago
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
sergij07 [2.7K]

An action which this organization should take to find out if systems have been compromised is: C. Look for unauthorized accounts.

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities and compromises in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails a tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the computer system.

In this scenario, we can reasonably infer and logically deduce that an action which this organization or cybersecurity specialist should take to find out if systems have been compromised is to look out for unauthorized accounts.

Read more on penetration test here: brainly.com/question/25813524

#SPJ1

Complete Question:

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for policy changes in Event Viewer.

Scan the systems for viruses.

Look for unauthorized accounts.

Look for usernames that do not have passwords.

7 0
1 year ago
Other questions:
  • Your friend, who is a little computer phobic, is going to create his first web page, and he asks you to recommend some software
    13·1 answer
  • A powerpoint ________ is a set of unified design elements.
    5·1 answer
  • which type of classroom enable students to attend lectures without being physically present with the teacher
    14·2 answers
  • You coded the following class: public class N extends String, Integer { }When you compile, you get the following message:N.java:
    9·1 answer
  • William found out that someone used his report on american culture without his permission. what is william a victim of?
    11·1 answer
  • ____________ are collected from several entities at the same point in time.
    13·1 answer
  • Which domain indicates that a website is sponsored by a university or college?
    12·1 answer
  • O O O O O O O
    9·1 answer
  • Need answer ASAP.
    8·1 answer
  • How would you open the web browser in Linux and still have access to the Linux terminal?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!