Answer: Level 3
Explanation: I studied for the test
You are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. The students use the computers to search the internet for research paper content. The school budget is limited. Which content filtering option would you choose?
Answer:
I would use a manually created blacklist.
Filters like those found in Internet Explorer and Netscape can help users block out objectionable or obscene material. In this situation, I could add my own web addresses to the list of blocked sites.
Another method of filtering would be to install hardware-based filters that look for certain keywords in a user's browsing history and flag that information as unacceptable. This would give me more control over what is blocked, but again would not allow me to personally review each page flagged by the filter before it became available to students.
I would go with a manual blacklist because it will provide an extra level of protection to the computer lab without being very cumbersome or prone to bugs.
Explanation:
My own original answer.
The ________ loop is a good choice when you do not want the loop to iterate if the condition is FALSE in the beginning.
Answer:
while
Explanation:
The while loop is a good choice when you do not want the loop to iterate if the condition is FALSE in the beginning.
What is lost when the computer is turned off
Answer:
your computer's RAM loses its data when the power is off
one of the safest and easiest investments for young people is
Answer:
Young investors have the single most valuable resource on their side—time. Compound interest and dividend reinvestment are proven methods of building long-term wealth.
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?.
Answer:
Application software
Explanation:
i think
Question 12(Multiple Choice Worth 3 points)
(Lesson 6.2 LC)
When two cars arrive at a four-way stop, which car must yield the right-of-way?
O The car to the left
O The car to the right
The car that arrives second
o
Both cars have the right-of-way
Answer: the car that gets there second the one who gets their first goes first
Explanation:
i drive lol
A(n) ________ portal offers a personalized, single point of access through a web browser to employees located inside and outside an organization.
A corporate portal offer employees (end users) that are located inside and outside an organization a personalized, single point of access through a web browser.
What is a web browser?A web browser can be defined as a software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.
In Computer technology, a corporate portal is a type of website that is typically designed and developed to offer employees (end users) that are located inside and outside a business firm or an organization a personalized, single point of access through a web browser.
Read more on website here: https://brainly.com/question/26324021
Can someone please help me with this question?
Many people are scared of the rise of Artificial Intelligence (AI). Do you think computers that are controlled by an AI are something to be afraid of? Why or why not?
Answer:
There are many good reasons to fear or not fear computers that are controlled by AI.
Fear:
The AI can do things without people asking it to.The AI could be hàcked into, making it easier for hàckers and scam.mers to get into the computer and take information.TBH, I don't really like things that aren't natural and/or created by God.Don't Fear:
AI's can do many things that humans cannot do.AI's can do things faster and more efficiently than humans can.AI's can be used to help us with many things that are impossible or very hard for humans to do.Explanation:
Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!
Stay Brainy!
−Kallmekrish
Hurrryyy pleasee!!!!
Answer:
Show the answer choices
Explanation:
Show the answer choices please
name any two software programs that employees can use to communicate effectively
Answer
unified communication software or video conference.
Explanation:
The internet is based on which three key technologies?.
The internet is based on the client/server computing, the packet switching, development of the communications standards for the linking networks and the computers
What is the internet?The internet is a vast network that connects computers all across the world. It is a wide and open network that can be used to share, communicate and transfer information or data.
The internet is made on HTTP client/server computing, the packet switching, and standards for linking networks and computers TCP/IP, HTTP.
Find out more information about the internet.
brainly.com/question/1757772
Legacy systems can be described as all of the following except? Usually found on a mainframe. Old systems that often require hard-to-use command languages. Systems that most often have detailed information that can be accessed by a system at a higher tier. A system that often holds the middle tier of a multiple-tier system. A system that is already in place, from the past.
A legacy system refers to outdated infrastructure, applications, and processes, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.
What is a legacy system?It describes software or IT systems that have been around for a long time and that, from a technological point of view, should be replaced by a more modern version.
A legacy system has often been used for a long time and is no longer technologically up to date, however these old applications are still used for various reasons, for example because they form the basis of newer software.
Therefore, we can conclude that legacy systems are those computer systems that have become outdated but are still used by companies, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.
Learn more about legacy systems here: https://brainly.com/question/7494597
If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _________ utility.
Answer:
Cleanup is correct:)
Explanation:
Please help!!! Question 8
Answer: To break out of some block of code.
Which one of the following does NOT contain a
battery of some type?
A. Portable printer
B. Wired keyboard
C. UPS
D.
iPod
Answer:
B
Explanation:
took the test a day ago
In which type of attack does a person, program, or computer disguise itself as another person, program, or computer to gain access to a resource
deepfake
Explanation:
a deepfake is when an AI or robot makes an image that looks EXACTLY like a person,or can replicate its voice. does this help?
A network____________________is a physical connection of computer through cables
A good way to repeatedly perform an operation is to write the statements for the task once and then place the statements in a loop that will repeat as many times as necessary. true or false
The statement 'a good way to repeatedly perform an operation is to write the statements once and then place the statements in a loop that will repeat as many times as necessary' is TRUE. It is part of Phyton programming.
What do Phyton loops mean?
Phyton loops are specific loops used to execute a statement and/or group of statements many times.
The loops in Python programming include for loop, while loop (that allows to execute a block of statements repeatedly), and nested loop.
In Phyton programming, the loop statements are executed for each specific item of a given sequence.
Learn more about Phyton loops here:
https://brainly.com/question/26497128
which microsoft azure service is a eelational service that allows for rapid creation of relational databasses and apps
Answer:
Azure SQL Database
Explanation:
Calculate the number of Characters and the size of words “Caleb University Imota, Lagos”using Taro Yamen
The code to calculate the number of characters and the size of words is as follows:
x = input("Enter your text here: ")
char=0
word=1
for i in x:
char = char+1
if(i==' '):
word=word+1
print("Number of words in the given string ",word)
print("Number of characters in the given string ",char)
Code explanation:
The code is written in python
The first line of code, we store the users input in a variable called x.Then we initialise the variable char to zero.The variable word is also initialise to zeroThe we loop through the user's input and count the character We also look for space to know the word, then count the words .Finally, we print the number of word and the number of character.learn more on python code here: https://brainly.com/question/20379340
You want to build a computer that is designed to stand upright on a desk and takes up the least amount of space possible, but still capable of two expansion slots. Which type of computer would you select?
Answer:
Micro ATX slim tower.
This is a special type of thin computer that has good processing and satisfies people who want less space taken up.
What does it mean when your excel table has headers?.
Answer:
A table header is a row at the top of a table used to label each column.
Explanation:
What was one factor that led to more people seeking jobs in cities and factories?
do any of you gies know how to bet Arceus in legend Arceus
Answer:
The balance of Economic and political power shifted from agriculture to manufacturing, making industry and cities grow.
Technology that transfers page images composed inside a computer directly to printing plates is called:
Technology that transfers page images composed inside a computer directly to printing plates is called Computer-to-plate.
What is Computer-to-plate?Computer-to-plate (CTP) is known to be a kind of modern imaging technology. It is known to be used in the area of modern printing processes.
This technology is one that often forms an image suing a Desktop Publishing (DTP) application which is the output to a printing plate. In the CTP procedure, the plates are said to be made from a variety of materials that is from aluminum to polyester.
Learn more about Technology from
https://brainly.com/question/25110079
help pls
cmu cs 0
4.1.2.1 Creating Groups checkpoint 1
Answer: For each group, you want to add, click the [ +] sign and select it from the list that shows. A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic between its multiple interfaces.)
Explanation: The Check Point Rule Base must not have these objects. If it does, the Security Management Server will not generate Access Lists. OSE devices report their network interfaces and setup at boot time. Each OSE device has a different command to list its configuration. You must define at least one interface for each device, or the Install Policy will fail.
What asks users to write lines of code to answer questions against a database?.
Answer:helps users graphically design the answer to a question against a database. structured query language (SQL).
Explanation:
Write JAVA code that will randomly place a blue dot into a circle of radius 100 centred on a square black canvas of side length 500. See attached picture:
Answer:
// Drawing (or printing) texts on the graphics screen:
drawString(String str, int xBaselineLeft, int yBaselineLeft);
// Drawing lines:
drawLine(int x1, int y1, int x2, int y2);
drawPolyline(int[] xPoints, int[] yPoints, int numPoint);
// Drawing primitive shapes:
drawRect(int xTopLeft, int yTopLeft, int width, int height);
drawOval(int xTopLeft, int yTopLeft, int width, int height);
drawArc(int xTopLeft, int yTopLeft, int width, int height, int startAngle, int arcAngle);
draw3DRect(int xTopLeft, int, yTopLeft, int width, int height, boolean raised);
drawRoundRect(int xTopLeft, int yTopLeft, int width, int height, int arcWidth, int arcHeight)
drawPolygon(int[] xPoints, int[] yPoints, int numPoint);
// Filling primitive shapes:
fillRect(int xTopLeft, int yTopLeft, int width, int height);
fillOval(int xTopLeft, int yTopLeft, int width, int height);
fillArc(int xTopLeft, int yTopLeft, int width, int height, int startAngle, int arcAngle);
fill3DRect(int xTopLeft, int, yTopLeft, int width, int height, boolean raised);
fillRoundRect(int xTopLeft, int yTopLeft, int width, int height, int arcWidth, int arcHeight)
fillPolygon(int[] xPoints, int[] yPoints, int numPoint);
// Drawing (or Displaying) images:
drawImage(Image img, int xTopLeft, int yTopLeft, ImageObserver obs); // draw image with its size
drawImage(Image img, int xTopLeft, int yTopLeft, int width, int height, ImageObserver o); // resize image on screen
Explanation:
Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a country’s political scenario affect the freedom of media?
ASAP
in america we are free to say most of whatever we want in media becuase we have free speech here. in other countries, they don't have freedom of speech,and sometimes it also has to do with the political situation. like say in china, where teenagers arent allowed to use the internet for more than a certain amount of time,and arent allowed to talk to each other. thats becuase of the fact that that country is a communist country and the government wants much more control than in other countries.
How can ICTs be used in the workplace to improve the way employees
communicate with each other? Provide any TWO ways.
Answer:
it allows them to work more efficiently, with fewer waisted resources
Explanation:
10 effects that you can find in Audacity.
Answer: Distortion.
Echo.
Limiter.
Paulstretch (extreme stretch)
Phaser.
Reverb.
Reverse.
Truncate Silence.
etc
Explanation: this is it