1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
6

ANY MHA FANS SAY DEKU

Computers and Technology
1 answer:
Elina [12.6K]3 years ago
8 0

Answer:

DEKU IS BEST

Explanation:

You might be interested in
How are computers classified into different types? Explain ​
zloy xaker [14]

Answer:

On the basis of size there are four types of computer. They are minicomputer, micro computer, mainframe computer and super computer. Super computer is the fastest, most expensive, big in size, and most powerful computer that can perform multiple tasks within no second.

3 0
2 years ago
A loop decision point for an algorithm consists of three features: an initial value, a set of actions to be performed, and a(n)
pychu [463]

Answer:

Option c is the correct answer for the above question.

Explanation:

A loop is used to repeat some lines in some specific times which depends on some conditions of the loop. If a person wants to print "welcome" on 5 times then he can do this by two ways one is writing a print statement 5 times and the other is states a loop that executes 5 times through condition. The loop is described or written by three necessary points which are:-

  1. The fist is to initialize the initial value which tells the compiler for the starting point of the loop.
  2. The second is to any action for that condition variable which takes the loop for the direction of ending points.
  3. The third is a condition that defines the ending point of the loop.

The above question also states about the loop in which first and second points are given then the third point is necessary to complete the sentence which is states in option c. Hence the option c is correct while the other is not because--

  • Option 'a' states about the class operator which is not the part of the loop.
  • Option b states about the documentation plan which is also not the part of the loop.

5 0
4 years ago
Of the listed principles, which process would transpire if a user provides a correct username and password?
kompoz [17]

Answer:

then the system will automatically grant access to that individual

Explanation:

Regardless of the system, a username and password are credentials used in order to prevent unauthorized access to the system. Therefore if a user provides the correct username and password when prompted, then the system will automatically grant access to that individual, since the account that they have logged in correctly as is already registered as an authorized account within the system.

5 0
3 years ago
You copy the formula =SUM($A1:C1) from cell D1 to cell F10. What will the formula change to?
vichka [17]

Answer:

It will change to =SUM($A10:E10)

Explanation:

A1 is the first selection of the series, and because you move the series down ten spaces it changes to A10 instead of A1. C1 changes to E10 because the series is again ten spaces below the original cell and over two columns from C to E, since you moved the formula to F10.

3 0
3 years ago
Read 2 more answers
1. What kind of metrics would be useful that are based on testing knowledge after security awareness training? The metrics could
DedPeter [7]

Answer:

i hope it will helpful for your

mark me brainlist

Explanation:

Metrics refer to a system or standards of measurement.

These are measures of quantitative assessment for the purpose of comparing, tracking and performance measurement.

When it comes to measuring employee's awareness, people's knowledge of comprehensive security awareness it can be monitored through online security awareness programs. The knowledge of the employees can be tested in regard of a hot topic i.e cybersecurity practices.

Online quizes can be used to show whether employees know the risks of leaving a computer unmonitored.

Simulated or planned cyber attacks, mockdrills can be planned by the company to test the presence of mind, readiness of employees after the training.

These things should be done without any prior notice so that the employees feel the real pressure and the situation is same as the real world

The metrics used to test the security awareness of the trained staff must be consistent, cheap to gather, can be expressed as cardinal or in percentage , and most importantly they should be contextually relevant i.e they should faciliate decision makers to take actions and attain the desired objective.

Awareness surveys are important baseline to test the knowledge of employees after the training. They are simple to set up and easy to use as well.

For example- all employees know that there is a security team but do they know their goals and policies of the team. Awareness surveys can be used to check these parameters and get the desired results from it.

6 0
3 years ago
Other questions:
  • You are doing research for a current event report on smartphone technology. You do a web search for information that includes se
    5·2 answers
  • Audacity is _________ program that is free to download and is used by tens of millions of people worldwide.
    9·2 answers
  • Consider a tcp connection between host b and server
    9·1 answer
  • What does psychologist Edward Spector mean when he says “ We have an entire generation of guinea pigs in an experiment”?
    14·1 answer
  • The question "How is traffic affected by fans leaving the stadium?" is related to which of the following?
    10·1 answer
  • In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
    10·1 answer
  • Gauthmath https://s.tutorus.xyz/lp/invite?code=GGQGBL​
    13·1 answer
  • Which methods will remove filters? Check all that apply.
    6·2 answers
  • How do cyber criminals target user’s end devices?
    11·2 answers
  • Select the functions in the Insert tab in PowerPoint.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!