1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
2 years ago
7

Cybersecurity is defined as the set of techniques to protect the secrecy, integrity, and availability of computer systems and da

ta against threats. (true or false)
Computers and Technology
1 answer:
natka813 [3]2 years ago
7 0

Answer:

<h3>The answer is true because it protects our secret account </h3>
You might be interested in
Ryan needs to see the space available to insert content on a slide in his presentation. Which feature of presentation program sh
emmainna [20.7K]

He should use the Format feature.

4 0
4 years ago
Read 2 more answers
Write a program in main.c that reads the file lorum.txt and counts the number of characters on each line. Your program should cr
Aneli [31]

Answer:

A C programming language was used to write a file lorum.txt and counts the number of characters on each line.

Explanation:

Raw_Code :

#include<stdio.h>

int main(){

  FILE *read,*write;       //creating file pointers

  int line=1,count=0;

  char ch;

  read = fopen("lorum.txt","r");   //opening files to read and write

  write = fopen("count.txt","w");

  while((ch = getc(read))!=EOF){       //reading lines until end of the file

      if(ch == '\n'){                   //if new line character encountred

          fprintf(write,"%d: %d\n",line,count);       //Then printing count of that line to file  

          line++;                       //incrementing the count of lines

          count = 0;                   //making characters count to 0

      }

      else{

          count++;           //if it is not new line character then increasing character count

      }

  }

  fprintf(write,"%d: %d",line,count);   //writing last lines count to count.txt

  fclose(read);

  fclose(write);

  return 0;

}

4 0
3 years ago
Which is an example,of an input devices? Choose the answer.
Alenkasestr [34]

Answer:

microphone

Explanation:

You have to plug in microphones, and if you plug it in, it is considered an input.

3 0
3 years ago
Create a Sub called "daisyDecisions" that runs when you click a button. In this sub, you will create a program that determines w
jenyasd209 [6]

Answer:

see explaination

Explanation:

Please find the screenprint and the VBA code. As shown in the screenprint, range B1 is used to enter the number of petals. If you want to use a different cell for petals input, then change the code accordingly.

Also, the VBA code is placed in the Sheet1 module. No new modules are inserted.

Screenprint: see attachment for screenshot

VBA Code:

Private Sub CommandButton1_Click()

Call daisyDecisions

End Sub

Private Sub daisyDecisions()

Dim remainder As Integer

Dim noOfPetals As Integer

noOfPetals = Sheet1.Range("B1").Value

remainder = noOfPetals Mod 2

If remainder <> 0 Then

MsgBox "He/She loves you!!!"

Else

MsgBox "He/She loves you not!!!"

End If

End Sub

7 0
4 years ago
If\s*.*[&gt;&lt;]=.*\s*:<br> what does this mean
trasher [3.6K]

You know that means if you use c++

you need to put something in this

#include<iostream>

using namespace std;

int what_ you_ want;

int main ()

{

cout<<"WHAT DO U WANT"; cin>>what_you_want;

if (what_you_want<1000)

and then use {, else, } return 0;

but it is good for c++


5 0
3 years ago
Other questions:
  • Carly wants to be able to look at a document without having to use the horizontal scroll bar located on the bottom of the screen
    7·1 answer
  • You have opened the properties dialog box for an installed printer on your computer system. on what tab will you find informatio
    8·1 answer
  • The times per second an audio file is converted from analog to digital is the ______. audio file format bandwidth sample rate wa
    5·2 answers
  • What is a clutch on a car
    6·1 answer
  • What term is used to describe the time it takes a signal to travel from one location to another on a network?
    13·1 answer
  • Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
    8·1 answer
  • Fill in the code to complete the following method for checking whether a string is a palindrome. public static boolean isPalindr
    11·1 answer
  • Paul listed the websites he searched to find information on a career in biology ​
    15·1 answer
  • WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES
    8·1 answer
  • Which of the formulas below are valid? Select all that apply?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!