1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
3 years ago
9

Retype the paragraph with the corrections. There are 12 corrections. Look closely at the word and letter highlighted in yellow t

o determine how to correct them. Please help Thank you

Computers and Technology
1 answer:
Artemon [7]3 years ago
4 0

Answer:

Touch typing is a useful skill. It allows you to increase your typing speed and at the same time and reduces the number of errors you make. Touch typing makes you type faster and more efficient. You can be productive and complete your school assignments much quicker. Touch typing also allows you to type communication documents, like e-mails, in a fast and efficient manner. Most importantly, if you type properly then it will reduce repetitive injuries like carpal tunnel syndrome. There are many benefits of learning how to type correctly.

Explanation:

You might be interested in
Using the employment websites, search for part-time jobs that relate to the career fields you are interested in pursuing or to y
arsen [322]

In order to start a part time job first we have to do some research in particular criteria they are Research your degree and occupational information and industry information.

Explanation:

There are many part- time jobs, they are web developer, sales representative, interpreter and translator and content writer.

There are various websites for this kind of jobs. For example in Quicker, Monster and indeed .com are some of the websites.

The we developer job is creating website for the customer based on the requirements. Example school management, library management.

Then comes data entry job it is a simple job that is to enter the captcha and correcting errors in files and copy pasting job.

Content writer is a job in which the different types of questions are answered for the U.S based companies.

7 0
3 years ago
Read 2 more answers
You work in a classified environment where Bell LaPadula MLS (Multilevel Security) model is employed. Your clearance is "SECRET"
kumpel [21]

Answer:

The answer is by using a covert channel like shared memory objects such as files, directories,messages, etc since both  the user and the sender of the document are on same network of the company.

Explanation:

The Bell LaPadula MultiLevel Security model was a security policy developed by Bell and LaPadula in 1973 in response to a security issue raised by the US Air Force regarding file-sharing mainframe computers . Actually, many people with networked systems have realized by early 1970s that the protection purportedly offered by many commercial operating systems was poor, and wa not getting better any time soon. This was observed when it was noticed that as one operating system error was fixed, some other vulnerability would be discovered. There was also the constant worry that various unskilled users would discover loopholes in the operating system during usage and use them to their own advantage.

 Information release may take place via shared memory objects such as files, directories, messages, and so on. Thus, a Trojan Horse acting on behalf of a user could release user-private information using legitimate operating system requests. Although developers can build various mechanisms within an operating system to restrict the activity of programs (and Trojan Horses) operating on behalf of a user  , there is no general way, short of implementing nondiscretionary policy models, to restrict the activity of such programs. Thus, given that discretionary models cannot prevent the release of sensitive information through legitimate program activity, it is not meaningful to consider how these programs might release information illicitly by using covert channels.

For example, for someone with higher integrity level (SECRET) to send an accounts payable application to a user, if the untrusted accounts payable application contains a Trojan Horse, the Trojan Horse program could send a (legal) message to the said user process running at a lower integrity level (CONFIDENTIAL), thereby initiating the use of a covert channel. In this covert channel, the Trojan Horse is the receiver of (illegal) lower integrity-level input and the user process is the sender of this input.

7 0
4 years ago
What are the side effects of overclocking?
Oksana_A [137]

Answer:

Reduced processor lifespan, reduced fan cooler performance over time, bugs.

Explanation:

The reason is that when you overclock your processor you are increasing its base speeds in GHZ. The processor was designed to work at a determined speed, let's say 3.00 ghz. If you increase this speed to 4.00 ghz, it's not just that now it's working faster, it also draws more power from your power supply, and increases the heat that the chip is taking. Processors are designed to endure high temperatures, therefore, you will likely not see any damaged in short term, but your components life span will be severely reduced, also depending on how much you overclock the processor, and the stability of your system, you can see bugs, unexpected restarts, and strange behavior of the computer. As an example, the i5 4670k runs at 3.80 stock speed, it can reach 50 / 65 degrees under full load. If you raise the speed up to 4.5ghz it will reach 70/80 degrees, depending on your ambient temperature and other factors.

6 0
3 years ago
Which of the following was not important in the development of the internet?
lesantik [10]
D. Rise of NASA.Hope I helped.
8 0
4 years ago
Read 2 more answers
3.What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation
weqwewe [10]

Answer:

speed and storage

Explanation:

The pros and cons of both are mainly in regards to speed and storage. Due to linked lists elements being connected to one another it requires that each previous element be accessed in order to arrive at a specific element. This makes it much slower than an array-based implementation where any element can be quickly accessed easily due to it having a specific location. This brings us to the other aspect which is memory. Since Arrays are saved as a single block, where each element has a specific location this takes much more space in the RAM as opposed to a linked implementation which is stored randomly and as indexes of the array itself.

Array Implementation:

  • Pros: Much Faster and Easier to target a specific element
  • Cons: Much More Space needed

Linked Implementation

  • Pros: Less overall space needed
  • Cons: Much slower speed.
5 0
3 years ago
Other questions:
  • Effective presentations vary the color scheme on each slide.<br><br> True<br> False
    5·2 answers
  • You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database.
    6·2 answers
  • PLEASE HELP QUICK WILL GIVE BRAINLY
    6·1 answer
  • Which of the following conditions will maximize the amount of interest you earn
    5·1 answer
  • Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest
    15·1 answer
  • 1 point
    5·2 answers
  • Please solve the ones you can. Solving Both will be appreciated. thank you
    13·1 answer
  • 9.2 lesson practice ​
    6·1 answer
  • explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
    6·1 answer
  • Suppose your team is finishing a project and the supervisor stresses ensuring the material cannot be erased. To what memory leve
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!