1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
7

List any ten keyboard symbols.​

Computers and Technology
1 answer:
Nostrana [21]3 years ago
3 0

Answer:

Esc- Esc (escape) key.

F1 - F12 What are the F1 through F12 keys?

F13 - F24 Information about the F13 through F24 keyboard keys.

Tab Tab key.

Caps lock- Caps lock key.

Shift- Shift key.

Ctrl - Control key.

Fn- Function key.

Alt- Alternate key (PC only; Mac users have an Option key).

Spacebar- Spacebar key.

Hope this helps, have a great day/night, and stay safe!

You might be interested in
What are the arguments both for and against the exclusive use of boolean expressions in the control statements in java (as oppos
sineoko [7]

Reliability is the major argument for the exclusive use of Boolean expressions (expressions that result to either true or false) inside control statements (i.e. if…else, for loop). Results from control statements become reliable because Java has disallowed other types to be used. Other types, like arithmetic expressions in C++ oftentimes include typing errors that are not detected by the compiler as errors, therefore causing confusion.

7 0
3 years ago
The sun can be an excellent source of natural light.<br> True.<br> False.
Blababa [14]

Answer:

The answer is TRUE

7 0
3 years ago
Read 2 more answers
assume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
tino4ka555 [31]

Answer:

Suppose I am Chief information officer of a business firm which provide accounting related services to leading companies and brands. Obviously the data that my organization has excess of is prone to various cyber threats and because even a slight misuse of data will cause huge loss of clients, it is huge responsibility to secure every bit of data from any kind of cyber threat.

Majorly two type of security threats are there :-

External threat:-When threat is caused due to an external factor which is outside organization it is called external threat.                                                                                                                                

Criminal syndicates:- These are group of malicious professional attackers .They carefully chosen targets from which they expect good returns.

State-sponsored actors:-Their main goal is accessing the database of organization and an access to organizations.

Hacktivists:- Generally they carry out a malicious cyber activity to promote either a political agenda, religious belief or a social ideology. There has come many cases where these hackers shuts down websites, either for fun or for some political purpose time to time.

2. Internal threat:-Threats which comes from employees, ex-employees and third parties. It is very easy for someone from inside the organization to steal the data and misuse it.

Some of the methods by which we can make sure that the data of organization is secured are:-

Adopt for Penetration testing tool:- Penetration testing tools check the vulnerabilities or weak areas in the software systems.We can also install IDS (Intrusion Detection System) which will alert us if there is suspicious activity on the network. Further we would have to keep an eye on all the database access activity and usage patterns in real time to ensure that no data leakage is taking place, or there is unauthorized SQL.

Calculate risk scores:- Risk scores calculates the vulnerabilities and gives the extent of severity in the form of a numerical score. This will gives the company a bigger picture of data vulnerability.Security companies like Lucideus provide this service of risk score calculation.

A trained Workforce-Employees in the company would have to trained to recognize common cyber threats .Small mistakes that we all do like opening emails from mysterious senders should not be done. There is need of promoting a security conscious work culture. Further if ex employees leave the company on bad terms ,it may happen that they would misuse the data out of anger.So to make sure that this doesn't happen provide only a limited access to employees so that once they leave their privileges to access data of the organization is denied.

Encrypt Data:-Encryption is a process where data is converted to scrambled code before transmitting it by using special mathematical algorithms. Further decoding of that data can be done only when an authorized user accesses it. This will make sure that data is secured and is accessed only by right users.In current scenario, encryption is one of the most popular and effective data security methods used by organizations.

Cloud-based architectures:- It may sound bizarre but Cloud-based architectures are more disaster-tolerant to protect data.Clouds uses encryption to transmit the data and it is encrypted also when it is idle on the cloud servers.

Explanation:

7 0
3 years ago
Write a generator function named count_seq that doesn't take any parameters and generates a sequence that starts like this: 2, 1
Crank

Answer:

#code (count_seq.py)

def count_seq():

   n='2'

   while True:

       yield int(n)

       next_value=''

       while len(n)>0:

           first=n[0]

           count=0

     

           while len(n)>0 and n[0]==first:

               count+=1

               n=n[1:]

           next_value+='{}{}'.format(count,first)

       n=next_value

if __name__ == '__main__':

   gen=count_seq()

   for i in range(10):

       print(next(gen))

Explanation:

  • Start with number 2. Use string instead of integers for easy manipulation .
  • Loop indefinitely .
  • Yield the integer value of current n .
  • Loop until n is an empty string .
  • Loop as long as n is non empty and first digit of n is same as first .
  • Append count and first digit to next_value .
3 0
3 years ago
Which spreadsheet function category uses Boolean operators? mathematical logical financial statistical database
Dominik [7]
The answer is Logical Functions

The Microsoft Excel logical functions include the conditional tests and the Boolean operators. Excel provides four major logical functions to work with. The functions are OR, AND, XOR and NOT. These functions are used when you want to carry out several comparisons in your formula. 

They are also used between search terms to expand, narrow, or exclude results in spreadsheets, search engines or databases.






3 0
4 years ago
Read 2 more answers
Other questions:
  • Steffie wants to change the margins of a worksheet to Normal to align it better on a printed page. To do this, what can she do a
    5·1 answer
  • Is the protocol that specifies how web browsers and servers communicate.?
    11·1 answer
  • Which device should be used for enabling a host to communicate with another host on a different network?
    9·1 answer
  • On the Loan worksheet, in cell C9, enter a PMT function to calculate the monthly payment for the Altamonte Springs 2018 faciliti
    6·1 answer
  • Which of these practices should you follow while creating your resume?
    13·2 answers
  • Monica needs to work on a document where she has to highlight topics in bold and add emphasis to some words in a paragraph using
    9·1 answer
  • Get someone get her for me if need snap kell.c11
    10·1 answer
  • What is the value of 25 x 103 = ________?
    8·2 answers
  • What is stored in studentScores after running the program code?
    5·1 answer
  • A retailer is able to track which products draw the most attention from its customers through the use of 5g-enabled motion senso
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!