1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ainat [17]
2 years ago
15

The central point of Christian belief is that God, the Father, entered into human history as the

Computers and Technology
1 answer:
Simora [160]2 years ago
4 0

Answer:

The central point of Christian belief is that God, the Father, entered into human history as the Son, Jesus of Nazareth, and arose as the Holy Spirit. Christian Philosophy God is the Creator of the universe.

Explanation:

You might be interested in
What type of product does amd manufacture
Vitek1552 [10]
AMD makes CPUs, GPUs, Motherboards, Graphics Cards and other computer hardware
6 0
3 years ago
Which two extensions in scratch are correctly matched to their accessibility goals
enyata [817]

The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

<h3>What are Scratch Extensions?</h3>

Scratch extensions are known to be used in an interface with external hardware and information outside of the Scratch website via new blocks.

Note that The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

Learn more about scratch  from

brainly.com/question/25720264

#SPJ1

4 0
2 years ago
Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and c
LuckyWell [14K]

Answer:

The correct answer is A.

Explanation:

Vishing can be described as phishing but only using a mobile telephone, making the victim give up any personal information that could be used for identity theft etc.

Pharming is a process which redirects the traffic from a known and trusted website to another one where they perform the operation of stealing the personal information of the people.

The example given in the question falls into the category of "Spear Phishing" which is when the victim receive e-mails that look like they have been sent by a trusted and known individual. This way they are more likely to open the e-mail or click on the link in the e-mail and the phishing act has a higher chance of success.

I hope this answer helps.

6 0
3 years ago
Oxnard Casualty wants to ensure that their e-mail server has 99.98 percent reliability. They will use several independent server
sattari [20]

Answer:

The smallest number of servers required is 3 servers

<em />

Explanation:

Given

Reliability = 99.98\%

Individual Servers = 95\%

Required

Minimum number of servers needed

Let p represent the probability that a server is reliable and the probability that it wont be reliable be represented with q

Such that

p = 95\%\\

It should be noted that probabilities always add up to 1;

So,

p + q = 1'

Subtract p from both sides

p - p + q = 1 - p

q = 1 - p

Substitute p = 95\%\\

q = 1 - 95\%

Convert % to fraction

q = 1 - \frac{95}{100}

Convert fraction to decimal

q = 1 - 0.95

q = 0.05

------------------------------------------------------------------------------------------------

<em>To get an expression for one server</em>

The probabilities of 1 servers having 99.98% reliability is as follows;

p = 99.98\%

Recall that probabilities always add up to 1;

So,

p + q = 1

Subtract q from both sides

p + q - q = 1 - q

p = 1 - q

So,

p = 1 - q = 99.98\%

1 - q = 99.98\%

Let the number of servers be represented with n

The above expression becomes

1 - q^n = 99.98\%

Convert percent to fraction

1 - q^n = \frac{9998}{10000}

Convert fraction to decimal

1 - q^n = 0.9998

Add q^n to both sides

1 - q^n + q^n= 0.9998 + q^n

1 = 0.9998 + q^n

Subtract 0.9998 from both sides

1 - 0.9998 = 0.9998 - 0.9998 + q^n

1 - 0.9998 = q^n

0.0002 = q^n

Recall that q = 0.05

So, the expression becomes

0.0002 = 0.05^n

Take Log of both sides

Log(0.0002) = Log(0.05^n)

From laws of logarithm Loga^b = bLoga

So,

Log(0.0002) = Log(0.05^n) becomes

Log(0.0002) = nLog(0.05)

Divide both sides by Log0.05

\frac{Log(0.0002)}{Log(0.05)} = \frac{nLog(0.05)}{Log(0.05)}

\frac{Log(0.0002)}{Log(0.05)} = n

n = \frac{Log(0.0002)}{Log(0.05)}

n = \frac{-3.69897000434}{-1.30102999566}

n = 2.84310893421

n = 3 (Approximated)

<em>Hence, the smallest number of servers required is 3 servers</em>

6 0
3 years ago
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Alicia is a dietitian. She gives other people suggestions for nutrition. She wants to organize a large amount of data concerning
    13·1 answer
  • Encyclopedia.com is considered to be
    15·1 answer
  • A form of speech that is used to clarify, describe, demonstrate, and/or explain is referred to as _____.
    7·2 answers
  • Types of operating systems
    5·2 answers
  • Why did artists use pinhole cameras during the renaissance?
    8·1 answer
  • What is the output of the following code segment? int n = 0; for (int k = 0; k&lt; 2; k++) {n=n +2;} cout &lt;&lt; n; oo 0 1 O O
    8·1 answer
  • Pls Help need it before 1pm PLS.
    15·2 answers
  • What is the importance of different camera angles ?
    9·2 answers
  • 3. Create mode was one of the most innovative and influential features of which of the following games?
    7·1 answer
  • Give an example of what Artificial Intelligence application most popular is used on a daily basis.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!