1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
2 years ago
12

Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics

and federal problem-solvers. How might that explain some of the security vulnerabilities present in the internet today?
Computers and Technology
1 answer:
Stels [109]2 years ago
6 0

Answer:

they trusted each other

Explanation:

thses were scientists with one goal in mind: making it work.  No cheating.

You might be interested in
Describe the tools that are required to accomplish each step in the data management process.
RideAnS [48]

Answer: The tools which are required to accomplish each step in the data management process are:

1. Cloud Data Management tools.

2. Master Data Management (MDM) tools.

3. Reference Data Management (RDM) tools.

4. ETL tools.

5. Data visualization and  analytics tools

Explanation:

Cloud Data Management tools with the help of various API's are able to connect multiples system with their data to the cloud. examples are amazon cloud, google API cloud.

MDM tools are used for creation and maintenance of reference data. example are Profisee

RDM tools is used with the MDM tools and are use to define the businesss processes over the reference data. Examples are Collibra.

ETL tools helps to load data of an organisation to data warehouses after transformation and testing the data pipeline constituting the data from different databases.

Data visualization  analytics tools helps to extract and generate report from the big sets of data which can help an organisation to take business decisions.

6 0
3 years ago
Read 2 more answers
How many total numbers can be represented with an 8-bit binary (base-2) system?
ddd [48]

Answer:

256

Explanation:

4 0
3 years ago
Write a Python program that uses function(s) for writing to and reading from a file:
swat32

import random

def random_number_file_writer(nums):

   f = open("random.txt", "w")

   i = 0

   while i < nums:

       f.write(str(random.randint(1,500))+"\n")

       i += 1

   f.close()

def random_number_file_reader():

   f = open("random.txt", "r")

   total = 0

   count = 0

   for x in f.readlines():

       total += int(x)

       count += 1

   print("The total of the numbers is "+str(total))

   print("The number of random numbers read from the file is "+str(count))

def main():

   random_number_file_writer(int(input("How many random numbers do you want to generate? ")))

   random_number_file_reader()

main()

I hope this helps!

6 0
3 years ago
3. The wildlife department has been feeding a special food to rainbow trout finger lings in a pond. A sample of the weight of 40
andrey2020 [161]

Answer:

1)  402.7 grams. This estimate is called the sample mean.

2)  (399.11, 406.29)

3) The 99 percent confidence limits is between 399.11 grams and 406.29 grams.

I am 99% sure that the value lies between 399.11 grams and 406.29 grams.

Explanation:

sample size (n) = 40, the mean weight (x)= 402.7 grams and the standard deviation (σ)=8.8 grams

1) The point estimated mean weight of the population is 402.7 grams. This estimate is called the sample mean.

2) c = 99% = 0.99

α = 1 - 0.99 = 0.01

\frac{\alpha }{2} =\frac{0.01}{2} =0.005.

The z score of 0.005 corresponds with the z score of 0.495 (0.5 - 0.005).

z_\frac{\alpha }{2} =2.58.

The margin of error (e) = z_\frac{\alpha }{2}*\frac{\sigma}{\sqrt{n} }  =2.58*\frac{8.8}{\sqrt{40} } =3.59

The confidence interval = x ± e = 402.7 ± 3.59 = (399.11, 406.29)

3) The 99 percent confidence limits is between 399.11 grams and 406.29 grams.

I am 99% sure that the value lies between 399.11 grams and 406.29 grams.

8 0
3 years ago
Bobby is investigating how an authorized database user is gaining access to information outside his normal clearance level. Bobb
Sveta_85 [38]

Answer:

Aggregate Function .

Explanation:

The aggregate function returns the single value of the entire column of the database management system. The Aggregate Function is used in the SELECT statement and the GROUP BY clause.  

The sum(),avg(), etc are some examples of Aggregate Function in the database with the help of aggregate function bobby gains the access to information above the usual clearance point. and summarizes the data.

7 0
3 years ago
Other questions:
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • The first computer introduced was the IBM PC. A. True B. False
    11·2 answers
  • Complex communication skills will probably never be outsourced to a computer because they require the human touch.
    8·1 answer
  • Which evaluation factor will be most important when choosing technology for the company
    5·1 answer
  • Richard needs to copy information from another slide presentation that uses a different design template. To ensure that the info
    7·1 answer
  • From the television industry's point of view, which of the following would be the most desirable viewer?
    5·1 answer
  • An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro
    10·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the
    10·1 answer
  • You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing some
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!