1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
10

PowerPoint SAM Capstone Project 1 can PLEASE someone do it for me I have some directions like steps and you just have to do it i

n a powerpoint slide please I would really appreciate it
Computers and Technology
2 answers:
KengaRu [80]3 years ago
8 0

Answer:

Sooo what's the question??

Explanation:

natali 33 [55]3 years ago
7 0

Answer:

kk

Explanation:

You might be interested in
VURULU<br> The default style in Word is called the
Bess [88]

Answer:

This manual first provides information on:

1. The specific format requirements for font size, style, and type and spacing.

2. It provides step-by-step instructions on how to change the default paragraph style settings

to match these requirements for your entire document.

This ensures that the font style and size and paragraph spacing remain consistent in your

electronic thesis/ dissertation.

Explanation:

8 0
3 years ago
Which is the correct notation to specify the following inheritance?
Alika [10]

Answer:

Create the student class object which inherit the printinfo() from the abstract class People

Explanation:

Classes in object-oriented programming are blueprints of a defined type of data structure.

An object of an abstract class cannot be instantiated. So, the People class in question, is only inherited by the Student class which able to use the define printinfo() method.

4 0
3 years ago
A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
nika2105 [10]

I believe the answer is D. I hope I helped :)

7 0
3 years ago
Read 2 more answers
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
Convert 105 decimal to 128 binary form
krok68 [10]

Answer:

1101001 is binary 105

128 in binary is 10000000

6 0
2 years ago
Other questions:
  • When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the interna
    9·1 answer
  • How do switches and bridges learn where devices are located on a network?
    5·1 answer
  • 6) Sometimes it is difficult to read a piece of code and understand what the code will do. For this reason, you may want to add
    9·1 answer
  • Please fill these out. I really need this done.
    5·1 answer
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • 5. The operating system has two components
    12·2 answers
  • ¿La tecnología ha esclavizado al hombre?
    15·1 answer
  • Is a free verse a poetry that has no images
    5·2 answers
  • How do you answer someone's question when they have asked?
    5·2 answers
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!