1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
14

Using productivity software ensures that the end product will look professional. Please select the best answer from the choices

provided T F
Computers and Technology
1 answer:
borishaifa [10]3 years ago
5 0

Answer:

False

Explanation:

You might be interested in
During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
borishaifa [10]

Answer:

b. Try to convince the owner of the computer to give you to decryption key/password.

Explanation:

Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.

The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.

The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.

The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.

4 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and
sdas [7]

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

8 0
3 years ago
In order to protect your computer from the newest virus, which of the following should you do after you've installed a virus sca
grigory [225]
After the viruses would be detected we have to clean them.
means we have to erase the virus . 
6 0
3 years ago
A typical day in programming and software development would involve
mrs_skeptik [129]

Answer:

writing code for a software program.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are; waterfall model, incremental model, spiral model, agile model, big bang model, and V-shaped model.

The five (5) standard stages of development in software development are;

I. Analysis.

II. Design.

III. Implementation (coding).

IV. Testing.

V. Maintenance.

A typical day in programming and software development would involve writing code for a software program.

Generally, software applications or programs require a code containing series of sequential instruction to perform specific tasks, commands and processes. These sets of code are typically written by a software developer (programmer).

3 0
3 years ago
Other questions:
  • 1. What arguments can you make for the idea of a single language for all programming domains
    10·1 answer
  • What type of rain happens when cold air meets warm air
    14·1 answer
  • Write a SELECT statement that joins the Categories table to the Products table and returns these columns: category_name, product
    5·1 answer
  • Will the Python code below print something? And will it terminate?
    9·1 answer
  • The data in a data warehouse have which of the following characteristics?
    12·1 answer
  • Different organizations implement different Information Systems base on their core business operations. explain
    14·1 answer
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • Cloud computing allows organizations to rent computing resources from providers instead of having their own locally managed ____
    7·1 answer
  • Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is
    9·1 answer
  • 50 POINTS!!!!!!!!!!!<br><br> Give at least two examples of how the transport layer is used.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!