1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ArbitrLikvidat [17]
3 years ago
13

Select the correct answer.

Computers and Technology
1 answer:
mixas84 [53]3 years ago
4 0

Answer:

overviews

Explanation:

You might be interested in
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
To delete only the selected contents of the table, but not the table itself, ____.
Volgvan

To delete only the selected contents of the table, but not the table itself, you need to click on this cell in the table.

6 0
3 years ago
In what form do the hexadecimal numbers need to be converted for a computer’s digital circuit to process them?
MrMuchimi

Hexadecimal numbers are just a convenient representation of binary data. When entered as text, they consist of ASCII characters 0-9 and a-f. The numbers will then have to be converted to binary. This is accomplished by converting to uppercase, subtracting the ASCII offset (48 for 0-9 or 55 for A-F), so that the result is a number between 0 and 15 (inclusive). This can be stored in computer memory to represent 4 bits.

Hexadecimal numbers represent binary numbers in the following way:

hex | binary

0 = 0000

1 = 0001

2 = 0010

3 = 0011

4 = 0100

5 = 0101

6 = 0110

7 = 0111

8 = 1000

9 = 1001

a = 1010

b = 1011

c = 1100

d = 1101

e = 1110

f = 1111

As you can see, no other 4 bit combination exists.



5 0
4 years ago
Explain the use of keyboard shortcuts and key combinations. You create a document by using Office Word 2013. You need to enter t
goldenfox [79]

Answer:

Use the combination: Ctrl + Alt + C to get the copyright symbol

Explanation:

<em>Keyboard shortcuts</em> are single or combination of several keys to carry out a specific action. This action may vary according to application programs or operating systems.

Some generic examples of keyboard combinations include:

  • Ctrl + C to copy selected objects,
  • Ctrl + V to paste copied objects
  • Ctrl + N to open a new document or browsing window
  • Ctrl + O to open a saved file.

Keyboard shortcuts are a blessing to users for the following reasons:

  1. Saves time: Imagine dragging a mouse to highlight a document of about 500 pages, what a waste of time right? Ctrl + A will do all that in about a second or two. Using keyboard shortcuts and key combination saves the user a lot of time.
  2. Efficiency: Since the time spent is greatly reduced, the user becomes more efficient because jobs are carried out faster, more grounds are covered making the user more efficient.
  3. Multi-tasking: Moving through multiple open windows and tasks with speed requires the use of keyboard shortcuts and combinations. Imagine that you are using a Windows Operating System, you are running an analysis on your browser and it requires you to constantly check it out and you have to finish typing this document on Microsoft Word and you constantly want to ensure that your music player is playing the right song, navigating through this programs using the mouse will just be tiring and may be forced to just stick with a particular application, but with just the Alt + Tab key, you can navigate these applications with ease.

In Office Word 2013, combining the <em>Ctrl + Alt + C</em> will create the copyright symbol in seconds.

4 0
3 years ago
Other questions:
  • Which of the following is a professional organization in the field of IT? Society for the Prevention of Cruelty to Animals (SPCA
    6·2 answers
  • 1. The number of major solutions for preventing workplace hazards is
    14·1 answer
  • . What type of device is a computer? Where does it use?​
    14·1 answer
  • Define a function is_prime that receives an integer argument and returns true if the argument is a prime number and otherwise re
    9·1 answer
  • What properties make it suitable to be used for supportive frames
    15·1 answer
  • Excel files have a default extension of ?
    12·1 answer
  • The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the C
    12·1 answer
  • Here you guys go im back didnt die or any thing gg for who ever gets this
    11·2 answers
  • Is it true that if the user log out the computer will turn off automatically​
    9·2 answers
  • PLEASE HELP<br><br><br> Write a pseudo code for an algorithm to wrap a gift.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!