1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
12

Iciples UI

Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
8 0

Answer:A

Explanation: I took the test !

You might be interested in
What kind of material is used for DRAM (dynamic random-access memory)?
Alex Ar [27]

The kind of material that is used for DRAM (dynamic random-access memory) is metal-oxide-semiconductor.

<h3>What is DRAM?</h3>

DRAM was invented in 1968. It is a type of RAM used in modern computers and laptops. It is a type of random access memory. Its name is dynamic random access memory.

Metal-oxide-semiconductor is used in making the transistors and capacitors of the DRAM, which are used to store the data. They hold a bit of the data in these capacitors and transistors.

Thus, the material that is used is metal-oxide-semiconductor to make DRAM (dynamic random-access memory).

To learn more about DRAM, refer to the link:

brainly.com/question/20216206

#SPJ1

3 0
1 year ago
A __________ is an information system that produces all kind of reports and interprets information so it can be used by concerne
lord [1]

Answer: Decision support system (DSS)

Explanation:

 Decision support system is the process in which the information model basically support the managers in the process of the decision making.

It is an information system and produces various reports and also interprets the data and information so that it help to make decisions.

The decision support system (DSS) is basically carried out by the management by reviewing all kinds of the report and then generate necessary data or information.

On the other hand, all the other options are incorrect as they are not related to the decision making process. Therefore, DSS is the correct option.

3 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
Sue is installing a printer. What program will she need to get the printer to work with her computer? Specify some functionaliti
umka21 [38]

Answer:

Utility software tool​

Explanation:

After connecting the printer and turning it on, you'll need to install the printers software and drivers. Every printer should come with the software used to install a printer in Windows or your operating system.

8 0
2 years ago
Add a subclass FillInQuestion to the question hierarchy of Section 10.1. Such a question is constructed with a string that conta
sattari [20]

Answer:

class Question:

   def __init__(self):

       self.text = ""

       self.answer = ""

   def setText(self,text):

       self.text = text

   def setAnswer(self,answer):

       self.answer = answer

   def display(self):

       print(self.text)

   def checkAnswer(self,response):

       ans = self.answer.replace(' ','')

       ans = ans.lower()

       response = response.replace(' ','')

       response = response.lower()

       if(response == ans):

           return "Correct answer"

       else:

           return "Wrong answer"

class FillInQuestion (Question):

   def __init__(self):

       super(Question, self).__init__()

   def setText(self,text):

       temp = text.split("_")

       temp[0] = temp[0] + "_______"

       super(FillInQuestion,self).setText(temp[0])

       super(FillInQuestion, self).setAnswer(temp[1])

def main():

   # Create the question and expected answer.

   q = FillInQuestion()

   q.setText("The inventor of Python was _Guido van Rossum_")

   # Display the question and obtain user's response.

   q.display()

   response = input("Your answer: ")

   print(q.checkAnswer(response))

main()

Explanation:

The python program defines two classes, a parent class called Question and a child class called FillInQuestion. The screen shot of the output is seen below.

3 0
3 years ago
Other questions:
  • When people need information, they typically turn to:
    7·1 answer
  • Please Help!!!<br> I keep getting this answer wrong
    10·1 answer
  • The most basic software required for an online course where writing is involved is:
    13·1 answer
  • How to interchange first half of the array with second half of array in python?
    9·1 answer
  • Which of the following is a correct group scope type in AD, windows server 2016?
    6·1 answer
  • 7. Little Big Planet advanced the platforming genre of games by __________.
    14·1 answer
  • Which task is not possible with VLOOKUP?
    10·2 answers
  • Explain the term information security?​
    9·1 answer
  • 1. Read What You Need to Know closely and watch the Five Components of Fitness video
    14·1 answer
  • 15. How many PC’s can be connected to a UPS?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!