1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
3 years ago
13

Need help with the last one or if I got the others wrong

Computers and Technology
1 answer:
Stells [14]3 years ago
3 0
I think the answer would be c? if im wrong my apologies.
You might be interested in
Which of the following statements about global variables is true? 1.A global variable is accessible only to the main function. 2
Korvikt [17]

Answer:

A global variable can have the same name as a variable that is declared locally within the function.

Explanation:

In computer program, we refer to a global variable as that variable that comes with a global perspective and scope, ensuring its visibility throughout the program, except it is shadowed. The set of this kind of variable is referred to as global state or global environment. One feature of global environment is that it can have similar name as a variable declared locally within the function.

7 0
3 years ago
Summary: Given integer values for red, green, and blue, subtract the gray from each value. Computers represent color by combinin
Dmitry_Shevchenko [17]

Answer:

Follows are the code to this question:

#include<iostream>//defining header file

using namespace std;// use package

int main()//main method

{

int red,green,blue,x;//declaring integer variable

cin>> red >>green>>blue;//use input method to input value

if(red<green && red<blue)//defining if block that check red value is greater then green and blue  

{

x = red;//use x variable to store red value

}

else if(green<blue)//defining else if block that check green value greater then blue  

{

x= green; //use x variable to store green value

}

else//defining else block

{

x=blue;//use x variable to store blue value

}

red -= x;//subtract input integer value from x  

green -=x; //subtract input integer value from x

blue -= x;//subtract input integer value from x

cout<<red<<" "<<green<<" "<<blue;//print value

return 0;

}

Output:

130 50 130

80 0 80

Explanation:

In the given code, inside the main method, four integers "red, green, blue, and x" are defined, in which "red, green, and blue" is used for input the value from the user end. In the next step, a conditional statement is used, in the if block, it checks red variable value is greater than then "green and blue" variable. If the condition is true, it will store red variable value in "x", otherwise, it will goto else if block.

  • In this block, it checks the green variable value greater than the blue variable value. if the condition is true it will store the green variable value in x variable.
  • In the next step, else block is defined, that store blue variable value in x variable, at the last step input variable, is used that subtracts the value from x and print its value.      
5 0
4 years ago
A type of security control that takes measures to help restore a system is referred to as:
vovikov84 [41]

Answer:

C.  corrective

Explanation:

Security controls

These are actions or measures taken to maintain and/ or restore the security of the system. Security controls are categorized as corrective, preventive and detective, which are discussed below.

Corrective

Security controls which help in taking the corrective steps after the malicious activity has done damage to the system or restoring the security of the system are called corrective security controls.

These controls also act as preventive measures for future risks.

These controls perform the healing and have remedial action for the damage done to the system.

Once the system has been recovered, appropriate measures are put in place to avoid further damage.

The damage can be done to the computer system, its hardware and software resources or the data.

Examples include restoring the database from the backup file.

Updating or renewing antivirus software rectifies the security against virus.

For example, once the database has been restored, access control, antivirus and other measures are employed to prevent the database from being corrupted and to prevent system from being affected.

Preventive

Security controls which help in stopping the malicious activity from harming the system are called preventive security controls.

As per the name, these measures are employed to prevent any security breach.

These measures prevent any suspicious activity from taking place which may cause harm to the system.

Firewalls prevent unauthorized access.

Antivirus prevents malicious applications from running.

Login feature to give access only to authorized user.

Detective

Security controls which help in detecting the malicious activities and alerting the security personnel are called detective security controls.

As per the name, these measures are used to identify any suspicious activity and report them. Detective controls do not prevent or correct any security breach.

Alarms are employed to detect and alert any suspicious activity.

Intrusion detection system (IDS).

In an ideal situation, security controls are a combination of all the types mentioned above.

4 0
3 years ago
Libraries can be found in cities of all sizes and are open to varied users.
Inessa [10]

Answer:

True

Explanation:

3 0
3 years ago
Read 2 more answers
What is a malicious actor essentially looking for when attempting a network attack?
ahrayia [7]

Answer:

information of personnel

Explanation:

4 0
4 years ago
Other questions:
  • How to remove a channel from favorite list on suddenlink?
    15·1 answer
  • Refer to the exhibit. pc1 issues an arp request because it needs to send a packet to pc3. in this scenario, what will happen nex
    9·1 answer
  • A navigation device that transfers packets of data between two or more networks is called a _______
    12·1 answer
  • A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
    14·1 answer
  • When you are printing handouts, which of these can you do? A. Save paper by placing more than one slide per page. B. Check the f
    7·1 answer
  • Operational feasibility, which refers to user acceptance and support, as well as management acceptance and support, is also know
    9·1 answer
  • A program is a high-level one that has been converted to machine language
    15·1 answer
  • What is the small ribbon inside a microphone that pick up vibrations
    7·1 answer
  • think about any special skills or passions you have and describe a way you might apply them to earn money.
    7·1 answer
  • Look at these examples:- • Men are not emotional. • Women are too emotional. • Jewish people are good business people. • The Fre
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!