1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
3 years ago
11

in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​

Computers and Technology
1 answer:
DENIUS [597]3 years ago
3 0

Answer:

Wireless LAN

Wireless MAN

Explanation:

I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.

You might be interested in
Write down the name of output devices
notka56 [123]

Answer:

Monitor

Printer

Headphones

Computer Speakers

Projector

GPS

Sound Card

Video card

4 0
3 years ago
Read 2 more answers
Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the
Novay_Z [31]

Answer:

You can restrict a user’s Internet Explorer web access by modifying the "Family" settings.

A) Content filtering tab in the Microsoft Windows Tab

From the left-hand navigation menu, select Settings > General > Advanced Features. Scroll down until you see the entry for Web content filtering. Switch the toggle to On and Save preferences.

B) to activate protection from unwanted items like cookies?

Open Internet Options | Privacy, click on the Advanced button. Place a check in "Override automatic cookie handling". Set "First Party Cookies" to Block, set "Third Party Cookies" to Block.

Cheers!

3 0
4 years ago
Write a program that prompts the user to enter five test scores and then prints the average test score. Indicate the average tes
eduard

Answer:

I am writing the program in C++ and Python.

C++ code:

#include <iostream>  // for input output functions

using namespace std;   // identifies objects like cin cout

int main() //start of main() function body

{  //  test scores variables are declared along with average and sum variables

 double test_score1, test_score2, test_score3, test_score4, test_score5, average, sum;      

   cout << "Enter 5 test scores: \n";  //prompts user to enter 5 test scores

   cin >> test_score1 >> test_score2 >> test_score3 >> test_score4 >> test_score5;  //reads values of five test scores entered by user

   sum = test_score1 + test_score2 + test_score3 + test_score4 + test_score5;  // calculates the sum of the five test scores

   average = sum / 5;      //computes the average of five test scores

   cout << "The average test score is: " << average;  

 //displays the computer average of the five test scores entered by the user

}

Explanation:

The program prompts the user to enter the values of 5 test scores. It the calculates the sum of all these 5 input test scores and stores the result in sum variable. In order to compute average test score the sum of these 5 test scores is divided by the total number of test scores that is 5 and the result is stored in average variable. Lastly it displays the average by displaying the value of the average stored in the average variable.

Python Program:

num=5  # total number of test scores

list=[]  #list to store values of 5 test scores

for i in range(0,num):  #loop to enter values of test scores

#prompts user to enter values for 5 test scores

   test_scores =int(input("Enter the five test scores"))

   list.append(test_scores)  #appends the input test scores in the list

average=sum(list)/num  #calculates sum of the values stored in list and #divides the value of sum with the total number of test scores i.e. 5

print("Average test score is: ",round(average,2))

#displays average of the five test scores rounding up to two decimal places

Explanation:

This is a small program in Python to compute average test score. If you want to take separate input for each of the five test scores you can use the following program:

#takes value for each test score seperately from user

testScore1 = int(input('Enter 1st test score: '))  

testScore2 = int(input('Enter 2nd test score : '))

testScore3 = int(input('Enter 3rd test score : '))

testScore4 = int(input('Enter 4th test score : '))

testScore5 = int(input('Enter 5th test score : '))  

#calculates sum of each test score

sum = (testScore1 + testScore2 + testScore3 + testScore4 + testScore5)  

#method to compute average test score

def average(sum):

   return sum / 5         #divide value of sum with total number of test scores  

#calls average function to display average test score using print statement

print("average test score is: " , average(sum))

The programs along with their outputs is attached in the screenshots.

5 0
3 years ago
assume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
tino4ka555 [31]

Answer:

Suppose I am Chief information officer of a business firm which provide accounting related services to leading companies and brands. Obviously the data that my organization has excess of is prone to various cyber threats and because even a slight misuse of data will cause huge loss of clients, it is huge responsibility to secure every bit of data from any kind of cyber threat.

Majorly two type of security threats are there :-

External threat:-When threat is caused due to an external factor which is outside organization it is called external threat.                                                                                                                                

Criminal syndicates:- These are group of malicious professional attackers .They carefully chosen targets from which they expect good returns.

State-sponsored actors:-Their main goal is accessing the database of organization and an access to organizations.

Hacktivists:- Generally they carry out a malicious cyber activity to promote either a political agenda, religious belief or a social ideology. There has come many cases where these hackers shuts down websites, either for fun or for some political purpose time to time.

2. Internal threat:-Threats which comes from employees, ex-employees and third parties. It is very easy for someone from inside the organization to steal the data and misuse it.

Some of the methods by which we can make sure that the data of organization is secured are:-

Adopt for Penetration testing tool:- Penetration testing tools check the vulnerabilities or weak areas in the software systems.We can also install IDS (Intrusion Detection System) which will alert us if there is suspicious activity on the network. Further we would have to keep an eye on all the database access activity and usage patterns in real time to ensure that no data leakage is taking place, or there is unauthorized SQL.

Calculate risk scores:- Risk scores calculates the vulnerabilities and gives the extent of severity in the form of a numerical score. This will gives the company a bigger picture of data vulnerability.Security companies like Lucideus provide this service of risk score calculation.

A trained Workforce-Employees in the company would have to trained to recognize common cyber threats .Small mistakes that we all do like opening emails from mysterious senders should not be done. There is need of promoting a security conscious work culture. Further if ex employees leave the company on bad terms ,it may happen that they would misuse the data out of anger.So to make sure that this doesn't happen provide only a limited access to employees so that once they leave their privileges to access data of the organization is denied.

Encrypt Data:-Encryption is a process where data is converted to scrambled code before transmitting it by using special mathematical algorithms. Further decoding of that data can be done only when an authorized user accesses it. This will make sure that data is secured and is accessed only by right users.In current scenario, encryption is one of the most popular and effective data security methods used by organizations.

Cloud-based architectures:- It may sound bizarre but Cloud-based architectures are more disaster-tolerant to protect data.Clouds uses encryption to transmit the data and it is encrypted also when it is idle on the cloud servers.

Explanation:

7 0
3 years ago
Why might you want to save a downloaded file to your computer first instead of running it immediately?
sukhopar [10]

Answer:

Explanation:

Run: Choose Run when you only need the download once. Perhaps it’s a song or video you only plan to listen to or watch once. Another scenario might be an installation program that, when run, installs software on your machine in other, permanent locations. Once installed, you probably don’t need the installer again.

Save: When you want to keep whatever it is you’ve downloaded, choose Save. You can still run it, or whatever else you’d like to do with it, but you’ll need to do that yourself. You’ll also want to decide where, on your computer, to keep the file.

<em>Save and run: Use this option when you want to do both: save the file to a location you control, and then immediately run it. </em>

<em />

8 0
3 years ago
Other questions:
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • Which is currently the most common cellular network?<br> 4G<br> 4G LTE<br> 5G<br> 5G LTE
    13·1 answer
  • Your program will demonstrate use of arrays, searching an array, using methods, passing parameters by reference, returning value
    13·1 answer
  • Operating software is a must in every software (a) True (b) False
    8·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    13·2 answers
  • WILL UPVOTE &lt;3
    9·1 answer
  • Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
    5·2 answers
  • Programs which were typically reserved for college-level classes such as computer animation and CAD programs are now being appli
    13·1 answer
  • How to fix my pc from this
    11·2 answers
  • What is Accenture's role in Multi-party Systems?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!