1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
2 years ago
11

You conduct an experiment to find the probability of a flipped coin landing on

Computers and Technology
2 answers:
AleksandrR [38]2 years ago
7 0
C. The probability of choosing something could either be this or that . Considering this, the probability of obtaining a head should be 50%
AleksAgata [21]2 years ago
5 0

Answer:

Experimental probability describes how frequently an event actually occurred in an experiment. So if you tossed a coin 20 times and got heads 8 times, the experimental probability of getting heads would be 8/20, which is the same as 2/5, or 0.4, or 40%.

You might be interested in
Answered
Zina [86]

Answer:

You could think about this in several ways with several approaches.

- Survey

- User testing in groups

- On the actual registration program, 3 questions pop up

With general open ended questions and by talking to users

Explanation:

- Demographics

- Ask them what they like about the registration program

- What they use the registration for

- What they would do to improve it

6 0
2 years ago
Tell me at list 5 farm animals dieases​
Vlad [161]
<h3>Answer : </h3>

<em><u>F</u></em><em><u>a</u></em><em><u>r</u></em><em><u>m</u></em><em><u> </u></em><em><u>C</u></em><em><u>o</u></em><em><u>m</u></em><em><u>m</u></em><em><u>o</u></em><em><u>n</u></em><em><u> </u></em><em><u>D</u></em><em><u>i</u></em><em><u>s</u></em><em><u>e</u></em><em><u>a</u></em><em><u>s</u></em><em><u>e</u></em><em><u>s</u></em><em><u> </u></em><em><u>:</u></em><em><u> </u></em>

<em><u>.</u></em><em><u> </u></em><em><u>General Farm Animal Diseases.</u></em>

<em><u>.</u></em><em><u> </u></em><em><u>Avian Influenza.</u></em>

<em><u>.</u></em><em><u> </u></em><em><u>Bovine Spongiform Encephalopathy (BSE)</u></em>

<em><u>.</u></em><em><u> </u></em><em><u>Foot-and-Mouth Disease.</u></em>

<em><u>.</u></em><em><u> </u></em><em><u>West Nile Virus.</u></em>

Explanation:

<em><u>H</u></em><em><u>o</u></em><em><u>p</u></em><em><u>e</u></em><em><u> </u></em><em><u>i</u></em><em><u>t</u></em><em><u> </u></em><em><u>h</u></em><em><u>e</u></em><em><u>l</u></em><em><u>p</u></em><em><u>s</u></em><em><u> </u></em><em><u>o</u></em><em><u>u</u></em><em><u>t</u></em><em><u> </u></em><em><u>:</u></em><em><u>)</u></em><em><u>)</u></em>

7 0
3 years ago
Read 2 more answers
You work in a classified environment where Bell LaPadula MLS (Multilevel Security) model is employed. Your clearance is "SECRET"
kumpel [21]

Answer:

The answer is by using a covert channel like shared memory objects such as files, directories,messages, etc since both  the user and the sender of the document are on same network of the company.

Explanation:

The Bell LaPadula MultiLevel Security model was a security policy developed by Bell and LaPadula in 1973 in response to a security issue raised by the US Air Force regarding file-sharing mainframe computers . Actually, many people with networked systems have realized by early 1970s that the protection purportedly offered by many commercial operating systems was poor, and wa not getting better any time soon. This was observed when it was noticed that as one operating system error was fixed, some other vulnerability would be discovered. There was also the constant worry that various unskilled users would discover loopholes in the operating system during usage and use them to their own advantage.

 Information release may take place via shared memory objects such as files, directories, messages, and so on. Thus, a Trojan Horse acting on behalf of a user could release user-private information using legitimate operating system requests. Although developers can build various mechanisms within an operating system to restrict the activity of programs (and Trojan Horses) operating on behalf of a user  , there is no general way, short of implementing nondiscretionary policy models, to restrict the activity of such programs. Thus, given that discretionary models cannot prevent the release of sensitive information through legitimate program activity, it is not meaningful to consider how these programs might release information illicitly by using covert channels.

For example, for someone with higher integrity level (SECRET) to send an accounts payable application to a user, if the untrusted accounts payable application contains a Trojan Horse, the Trojan Horse program could send a (legal) message to the said user process running at a lower integrity level (CONFIDENTIAL), thereby initiating the use of a covert channel. In this covert channel, the Trojan Horse is the receiver of (illegal) lower integrity-level input and the user process is the sender of this input.

7 0
3 years ago
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
Heyyy ik this isn't a dating site but like is there any guy (12,13,14)that would be willing to date a 13 y/o girl
Alexxx [7]
Lol I alit of people will be interested but we need to see proof that you are a girl but like just your face to know your not a catfish
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following represent typical account fees?
    7·1 answer
  • It is not recommended by the USA EPA, but adding refrigerant to a leaking A/C system is
    13·1 answer
  • You can use ???? a to test tread wear on your tires
    14·2 answers
  • HURRY UP NEED HELP!!! What are examples of curricular education? Check all that apply.
    9·2 answers
  • How do i unblock website on my school computer
    7·2 answers
  • You are the IT administrator for a small corporate network. Recently, you added a web server that runs services that need to be
    12·1 answer
  • The statement ____ declares intList to be a vector and the component type to be int
    8·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • What will happen when you drag and drop a worksheet tab into another workbook WITHOUT holding the Ctrl key down?
    13·2 answers
  • I neeeeeeeeeeeddddddddddddd help plz ppl
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!