1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
2 years ago
11

Help pls cmu cs 0 4.1.2.1 Creating Groups checkpoint 1

Computers and Technology
2 answers:
Sindrei [870]2 years ago
8 0

Answer:

Explanation:

Circle(centerX, centerY, radius, fill='black', border=None,

borderWidth=2, opacity=100, rotateAngle=0, dashes=False,

align='center', visible=True)

svp [43]2 years ago
3 0

Answer: For each group, you want to add, click the [ +] sign and select it from the list that shows. A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic between its multiple interfaces.)

Explanation: The Check Point Rule Base must not have these objects. If it does, the Security Management Server will not generate Access Lists. OSE devices report their network interfaces and setup at boot time. Each OSE device has a different command to list its configuration. You must define at least one interface for each device, or the Install Policy will fail.

You might be interested in
What is the HIPAA Privacy rule, and why does it affect IT professionals?
CaHeK987 [17]

Solution:

The HIPAA Privacy Rule establishes national standards to protect individuals' medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically.

IT affects it by these ways:

The HIPAA Privacy Rule for the first time creates national standards to protect individuals’ medical records and other personal health information.

• It gives patients more control over their health information.

• It sets boundaries on the use and release of health records.

• It establishes appropriate safeguards that health care providers and others must achieve to protect the privacy of health information.

• It holds violators accountable, with civil and criminal penalties that can be imposed if they violate patients’ privacy rights.

• And it strikes a balance when public responsibility supports disclosure of some forms of data – for example, to protect public health.

This takes for patient.

• It enables patients to find out how their information may be used, and about certain disclosures of their information that have been made.

• It generally limits release of information to the minimum reasonably needed for the purpose of the disclosure.

• It generally gives patients the right to examine and obtain a copy of their own health records and request corrections.

6 0
3 years ago
Which of the following is/are used in multimedia?
SCORPION-xisa [38]

Answer:

<em> </em><em>I </em><em>think</em><em> </em><em>text </em><em>and </em><em>pictures</em><em> </em><em>because</em><em> </em><em>I </em><em>know </em><em>it </em><em>is </em><em>in </em><em>my </em><em>book </em><em>I </em><em>hope</em><em> it</em><em> will</em><em> help</em><em> you</em><em> have</em><em> a</em><em> great</em><em> day</em><em> bye</em><em> and</em><em> Mark</em><em> brainlist</em><em> if</em><em> the</em><em> answer</em><em> is</em><em> correct</em><em> </em>

<em>kai6417</em>

<em>#</em><em>c</em><em>a</em><em>r</em><em>r</em><em>y</em><em> </em><em>on </em><em>learning</em>

5 0
2 years ago
Processing information involves ____.a. Performing arithmetic or logical operations on binary data accepting information from th
Iteru [2.4K]

Answer:

c. Both a and b

Explanation:

In computing, processing information simply means performing a task. It means transforming data from one form to another.

In the real sense of it, it means, performing arithmetic or logical operations (by ALU) on binary data which could result in transmitting data from input devices to output devices. When a user launches the calculator application on his PC, and he tries to do some arithmetic (which is processed by the ALU) by entering numbers using his keyboard/mouse (input devices), he gets the result on the screen(output device). This scenario is a typical example of processing information.

<em>Hope this helps!</em>

7 0
3 years ago
Have you ever tried using such a camera?​
guapka [62]

Answer: yeah i mean i use my canon camera

Explanation:

7 0
2 years ago
People who connect one network to another within the company or even across organizations are A. central connectors. B. boundary
Lunna [17]

People who connect one network to another within the company or even across organizations are boundary spanners.  

People who serve as ambassadors to linking information and communications on informal networks within different department in an organisation and with other organisations or personnel  far and near for the good of their organisation are called Boundary Spanners.

The importance of Boundary  spanning in organisation includes

  • Exchange of expertise information
  • Nurturing of connections with people from different part s of the world.
  • Improved innovation in businesses

See more here: brainly.com/question/14728967

5 0
3 years ago
Other questions:
  • An employee is angry with his boss and wants to sabotage the company. To accomplish this he secretly changes some of the values
    7·1 answer
  • Ascending and descending are examples of
    5·2 answers
  • Discussion group may have a___________ who monitors the postings and enforces the sides rules​
    13·1 answer
  • Which pattern is produced by the following code? for (int i = 1; i &lt;= 6; i++) { for (int j = 6; j &gt;= 1; j--) System.out.pr
    6·1 answer
  • Will give Brainiest and stuff to right answer[s].
    12·2 answers
  • There is an application which inputs hundred numbers from the user, if user enters a positive number it increments valid numbers
    6·1 answer
  • A network consists of 10 computers, all running windows 7 professional. one computer acts as a file server and serves up data to
    6·1 answer
  • When referring to hard drives, access time is measured in
    11·1 answer
  • The physical part or components of a computer system called​
    5·2 answers
  • What does ""fair use"" mean regarding copyrighted works?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!