1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
2 years ago
8

Carl is a music teacher. He builds custom computer systems for his students to use when they are learning and creating music. Ca

rl is preparing a hard drive to install a new operating system. He must choose the file system to use. Analyse how the choice of file system would affect the use of a computer system
Computers and Technology
1 answer:
shutvik [7]2 years ago
4 0

Answer:

um ahh <em> </em><em>badl</em><em>y</em><em> </em>

Explanation:

i really don't know the answer

You might be interested in
In Online Data Extraction data is extracteddirectly from the ------ system itself.o Hosto Destinationo Sourceo Terminal
barxatty [35]

Answer:

system itself.

Explanation:

In Online Data Extraction data is extracted directly from the system itself.

4 0
3 years ago
What report would best help identify potential browser issues with website traffic?
Bezzdna [24]

The question above has multiple choices:

<span>a)      </span>The Active Users report

<span>b)      </span>The New vs Returning report

<span>c)       </span>The Browser & OS report

<span>d)      </span>The Source/Medium report

The answer is c) The browser & OS report


The browser & OS report in Google analytics can be used to analyze the website consumption in various versions of operating systems and web browsers. You are able to compare metrics such as bounce rate, session duration, and pages/sessions to each browser or OS.






6 0
3 years ago
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
import java.util.Scanner; public class StudentScores { public static void main (String [] args) { Scanner scnr = new Scanner(Sys
Delvig [45]

Answer:

The code at 'Your solution goes here' is in the bold font given

Explanation:

import java.util.Scanner;

public class StudentScores {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       final int SCORES_SIZE = 4;

       int[] oldScores = new int[SCORES_SIZE];

       int[] newScores = new int[SCORES_SIZE];

       int i;

       for (i = 0; i < oldScores.length; ++i) {

           oldScores[i] = scnr.nextInt();

       }

       for (i = 0; i < oldScores.length - 1; ++i) {

           newScores[i] = oldScores[i+1];

       }

       newScores[oldScores.length-1] = oldScores[0];

       for (i = 0; i < newScores.length; ++i) {

           System.out.print(newScores[i] + " ");

       }

       System.out.println();

   }

}

4 0
3 years ago
If a database is not maintained or if incorrect data is entered into the database, serious problems can occur. What problems cou
Archy [21]

Database is maintained by keeping only relevant data and updating existing data in a timely manner.

This is achieved by issuing proper insert, update and delete operations.

Incorrect data leads to incomplete information. Databases which hold transaction details, any inaccuracies lead to misinformation to its users.

Both the above lead to serious issues in data maintenance and prove the database ineffective. This indicates manhandling of the database.

No maintenance

Database is maintained when only relevant information is present. Irrelevant information includes information like information of past students, old information of current students, etc.

For students who have completed their courses and left, the database should be updated by removing data of such students.

Also, for newly enrolled students, their enrolment should reflect in the official records.

In case of changes in any of the student information, timely update operations should be performed to keep only current data in the database.

All these operations should be done timely in order to avoid any discrepancies in the real data and updated data in the system.

Incorrect data

In situations where incorrect data is input in the student database, incorrect data will be recorded for that particular student. Incorrect data can be related to ssn, name, address, course details and fees payment.

In case of incorrect transaction details like fees payment, this incorrect data will reflect in the student record as well as will affect the overall earnings of the school.

For enrolled students, correct enrollment details regarding the course and classroom should be recorded. Any error in this data will cause the student inconvenience and the respective student will be at loss.

Also, taking advantage of this situation, any outsider acting as an enrolled student, can gain access to the school.

This leads to mismatch of information and can lead to fraud situations against the educational institute.

3 0
3 years ago
Other questions:
  • Sarah is creating and formatting a newsletter for her school. Which page layout rules should she consider when doing this?
    13·2 answers
  • A provides an easy way for workers to interact with their computers
    9·1 answer
  • A sense of scale tells us what about the objects in a picture?
    11·2 answers
  • Which field in a Transmission Control Protocol (TCP) header provides the next<br> expected segment?
    5·1 answer
  • ___________ is related to mass, but also includes the gravitational pull of the Earth.
    14·1 answer
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • Question 2 of 10
    12·1 answer
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
  • What is connected to the base unit in Desktop PC?
    14·1 answer
  • What is the difference between the byte and short data types in Java?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!