1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lera25 [3.4K]
3 years ago
5

What is the output?

Computers and Technology
1 answer:
Vinvika [58]3 years ago
4 0

Answer:

20

Explanation:

You might be interested in
How should you respond to the theft of your identity cyber awareness.
antiseptic1488 [7]

The way to respond to the theft of your identity cyber awareness is; To report the crime to the local commission which is the Federal Trade Commission (FTC).

<h3>Protection from Identity Theft</h3>

Identity Theft is basically a crime that happens happens when someone steals your personal information and uses it commit a fraudulent offence.

Now, the person that stole your identity may use the stolen information he got from you to apply for credit, file taxes, medical services or other government privileges.

The acts perpetuated above by the thief could lead to damage to your reputation with credit status and your good name too which could take years to rebuild.

Thus, it is very pertinent to report any case of such to the relevant government commission which in this case is Federal Trade Commission (FTC).

Read more about Identity Theft at; brainly.com/question/15252417

5 0
3 years ago
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
vichka [17]

Answer:

spooler

Explanation:

A print server uses a print spooler as a software holding area for jobs waiting to be printed.

8 0
2 years ago
Read 2 more answers
What is the atomic number of neonWhat do the following results from the TEST FOR LIFE tab indicate about the sample
Scorpion4ik [409]
The atomic number for Neon is 10.

I do not see the info for the second part of the question
6 0
3 years ago
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
Discuss Batch Processing clearly showing the advantages and disadvantages
vazorg [7]

Answer:

Batch Processing is the processing of previously collected jobs in a single batch.

Explanation:

Some advantages would be that a data center's staff can schedule batch processing during times when the computers are otherwise idle, such as overnight, The computer operators can delay or prioritize different batches easily, and computer files containing commands, programs and data; once created, some can be run repeatedly as needed, adding convenience for the staff and helping keep processing costs low.

Some disadvantages would be that all of a batch job's input data must be ready before the computer can run it, problems with data, errors and program crashes that occur during batch jobs bring the whole process to a halt, and the inputs must be carefully checked before the job can be run again.

https://www.techwalla.com/articles/advantages-disadvantages-of-batch-processing

5 0
3 years ago
Other questions:
  • When inserting a fly in animation what is the first step in the process?
    9·1 answer
  • If you were going to construct a table that only included shape names with number prefixes, which shape would you include
    11·1 answer
  • What is the keyboard shortcut Ctrl+Z used for?
    14·2 answers
  • What is commodity? explain
    14·1 answer
  • A lack of financial literacy can cause you to lose your
    10·1 answer
  • IOS jail broken or Android unrooted which is better to hack with
    6·1 answer
  • Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
    12·1 answer
  • 2. How is accessing the Internet through a home network and public Wi-Fi similar?​
    15·1 answer
  • Give one (1) advantage and one(1) disadvantage of using and integrated software package over a custom written one.
    15·1 answer
  • You are a software engineer at a company where management routinely encourages you and your colleagues to use pirated software.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!