The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:
Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.Which feature helps to prevent spam messages from being sent to your inbox?To avoid spam in one's email, one of the best thing to do is to Run your inbox through spam filter and virus filter.
Hence, The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:
Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.Learn more about Email from
https://brainly.com/question/24688558
#SPJ1
What is one way to use proper netiquette when communicating online? Ask permission before posting private information. Post a message when you are angry Use CAPS when sending a message. Use unreliable sources.
Answer: A
Explanation:
Being a responsible netizen you must respect anyone using internet. Be mindful of what you share which include fake news, photos and video of others. Watch you're saying, if you wouldn't say something in real life dont say it online. You must think before you click not to hurt others.
Answer:
Ask permission before posting private information.
Explanation:
Just the most logical answer
Suppose you present a project and your supervisor comments that the graphics need to be a higher quality and suggests you replace a circuit board. To what circuit board is your supervisor referring?
graphics card
video card
sound card
system card
Answer:graphics card
Explanation:
Answer:
graphics card
Explanation:
In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the executives _______________________.
Answer:
vg
Explanation:
kiopoggttyyjjfdvhi
which internet service is the main reason the internet has expanded and what draws newcomers to the internet?
Answer:
It has spread throughout the world since it is a very useful tool since most things are facilitated, thus leading to a much more efficient daily life, which is why the internet is one of the main means for the functioning of the world today. day, as new technologies have revolutionized
Social media.
The term social media refers to those digital tools that facilitate the transmission of information, communication and social interaction between individuals. Thus, social media allows individuals to relate to each other, in a similar way as if they were physically interacting, but through computer means.
These social media can be from profiles on social networks to blogs, podcasts or even videos on digital platforms. In short, nowadays social media is an integral part of people's social life, and it is in many cases what ends up driving them to use the internet.
Learn more in https://brainly.com/question/21765376
what is ergonomic in computer science
Answer:
Ergonomics is the science of fitting jobs to people. One area of focus is on designing computer workstations and job tasks for safety and efficiency. Effective ergonomics design coupled with good posture can reduce employee injuries and increase job satisfaction and productivity.
The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the CREATE TABLE statement that inserts the following movies:
Title Rating Release Date
Raiders of the Lost Ark PG June 15, 1981
The Godfather R March 24, 1972
The Pursuit of Happyness PG-13 December 15, 2006
Note that dates above need to be converted into YYYY-MM-DD format in the INSERT statement. Run your solution and verify the movies in the result table have the auto-assigned IDs 1, 2, and 3.
CREATE TABLE Movie (
ID INT AUTO_INCREMENT,
Title VARCHAR(100),
Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')),
ReleaseDate DATE,
PRIMARY KEY (ID)
);
-- Write your INSERT statement here:
Answer:
INSERT INTO Movie(Title,Rating,ReleaseDate)
VALUES("Raiders of the Lost ArkPG",'PG',DATE '1981-06-15'),
("The Godfaher",'R',DATE '1972-03-24'),
("The Pursuit of Happyness",'PG-13',DATE '2006-12-15');
Explanation:
The SQL statement uses the "INSERT" clause to added data to the movie table. It uses the single insert statement to add multiple movies by separating the movies in a comma and their details in parenthesis.
A local real estate company can have its 25 computers upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?
Answer:
it is
Explanation:
400 dollars for 10 systems and 200 dollars for 5 systems
explanation
first
find the price of 1 system or computer which is done by dividing 1000 by 25
25)1000(40
100
____
00
00
__
0
then multiple it by 10 =40 ×10=$400
Answer:
400!!
Explanation:
You are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remote access to your computer to enable them to act as you to fix situation. What type of must be installed on your machine to allow this type of action by another person
Answer:
Single User OS.
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
There are different types of operating systems (OS) used for specific purposes and these are;
1. Batch Operating System.
2. Multitasking/Time Sharing OS.
3. Multiprocessing OS.
4. Network OS.
5. Mobile OS.
6. Real Time OS .
7. Distributed OS.
8. Single User OS.
A Single User OS is a type of operating system that only allows one user to perform a task or use a system at any time.
In this scenario, you are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remote access to your computer to enable them to act as you to fix situation. Therefore, the type of OS which must be installed on your machine to allow this type of action by another person is called a Single User OS.
Are items a through e in the following list algorithm? If not, what qualities required of algorithms do they lack?
a. Add the first row of the following matrix to another row whose first column contains a nonzero entry. (Reminder: Columns run vertically; rows run horizontally.)
[1 2 0 4 0 3 2 4 2 3 10 22 12 4 3 4]
b. In order to show that there are as many prime numbers as there are natural numbers, match each prime number with a natural number in matching the first prime number with 1 (which is the first natural number) and the second prime number with 2, the third with 3, and so forth. If, in the end, it turns out that each prime number can be paired with each natural number, then it is shown that there are as many prime numbers as natural numbers.
c. Suppose you're given two vectors each with 20 elements and asked to perform the following operation. Take the first element of the first vector and multiply it by the first clement of the second vector. Do the same to the second elements, and so forth. Add all the individual products together to derive the dot product.
d. Lynne and Calvin are trying to decided who will take the dog for a walk. Lynne suggests that they flip a coin and pulls a quarter out of her pocket. Calvin does not trust Lynne and suspects that the quarter may be weighted (meaning that it might favor a particular outcome when tossed) and suggests the following procedure to fairly determine who will walk the dog.
1. Flip the quarter twice.
2. If the outcome is heads on the first flip and tails on the second, then I will walk the dog.
3. If the outcome is tails on the first flip, and heads on the second, then you will walk the dog.
Answer:
Following are the responses to the given points:
Explanation:
The following features must contain a well-specified algorithm:
Description [tex]\to[/tex] Exact measures described
Effective computation [tex]\to[/tex] contains steps that a computer may perform
finitude [tex]\to[/tex] It must finish algorithm.
In choice "a", there is little algorithm Because it does not stop, finiteness has already been incomplete. There is also no algorithm.
In choice "b", it needs productivity and computational burden. because it's not Enter whatever the end would be.
In choice "c", the algorithm is given the procedure. It fulfills all 3 algorithmic properties.
In choice "d", each algorithm is a defined process. Since it needs finitude.
algorithm and flowchart of detect whether entered number is positive, negative or zero
1 #include
2 using namespace std;
3
4 int main() {
5 int userNum;
6 int userNumSquared;
7
8 cin >> userNum;
9
10 userNumSquared = userNum + userNum; // Bug here; fix it
11
12 cout << userNumSquared; // Output formatting issue |
13
14 return 0;
15 }
16
While the zyLab platform can be used without training, a bit of training may help some students avoid common issues.
The assignment is to get an integer from input, and output that integer squared, ending with newline. (Note: This assignment is configured to have students programming directly in the zyBook. Instructors may instead require students to upload a file). Below is a program that's been nearly completed for you.
Click "Run program". The output is wrong. Sometimes a program lacking input will produce wrong output (as in this case), or no output. Remember to always pre-enter needed input.
Type 2 in the input box, then click "Run program", and note the output is 4.
Type 3 in the input box instead, run, and note the output is 6.
When students are done developing their program, they can submit the program for automated grading.
Click the "Submit mode" tab
Click "Submit for grading".
The first test case failed (as did all test cases, but focus on the first test case first). The highlighted arrow symbol means an ending newline was expected but is missing from your program's output.
Matching output exactly, even whitespace, is often required. Change the program to output an ending newline.
Click on "Develop mode", and change the output statement to output a newline: cout << userNumSquared << endl;. Type 2 in the input box and run.
Click on "Submit mode", click "Submit for grading", and observe that now the first test case passes and 1 point was earned.
The last two test cases failed, due to a bug, yielding only 1 of 3 possible points. Fix that bug.
Click on "Develop mode", change the program to use * rather than +, and try running with input 2 (output is 4) and 3 (output is now 9, not 6 as before).
Click on "Submit mode" again, and click "Submit for grading". Observe that all test cases are passed, and you've earned 3 of 3 points.
Answer:
Change line 10 to:
userNumSquared = userNum * userNum;
Change line 11 to:
cout << userNumSquared<<endl;
Explanation:
Though the question is a bit lengthy but the requirements are not clearly stated. However, I'm able to pick up the following points.
Print the square of the inputted numberPrint the squared number with a new lineTo do this, we simply modify the affected lines which are lines 10 and 11.
The plus sign on line 10 will be modified to multiplication
i.e.
userNumSquared = userNum * userNum;
And line 11 will be modified to:
cout << userNumSquared<<endl;
Every other line of the program is okay and do not need to be modified
Explain the complement of a number along with the complements of the binary and decimal number systems.why is the complement method important for a computer system?
olha so olha la que bacana bonito
The complement method are the digital circuits, are the subtracting and the addition was the faster in the method. The binary system was the based on the bits are the computer language.
What is computer?
Computer is the name for the electrical device. In 1822, Charles Babbage created the first computer. The work of input, processing, and output was completed by the computer. Hardware and software both run on a computer. The information is input into the computer, which subsequently generates results.
The term “binary” refers to the smallest and minimum two-digit number stored on a computer device. The smallest binary codes are zero (0) and one (1). The use of storing numbers easily. The computer only understands the binary language. The binary is converted into the number system as a human language. The complement method are the digital circuits the addition and the subtracting was the easily.
As a result, the complement method is the digital circuits are the subtracting to the binary system was the based on the bits are the computer language.
Learn more about on computer, here:
https://brainly.com/question/21080395
#SPJ2
what are the cleaning solutions used in cleaning gas stove, refrigerator and kitchen premises?
Answer:
Detergents. Soaps, liquid or paste. Solvent cleaners. Acid cleaners. Abrasive cleaners. Applying heat. Exposing to radiant energy. Chemical sanitizers. Natural cleaning materials.
Explanation:
2. It is the art of creating computer graphics or images in art, print media, video games.
ins, televisions programs and commercials.
Write a function solution that, given an integer N, returns the maximum possible
value obtained by inserting one '5' digit inside the decimal representation of integer N.
Examples:
1. Given N = 268, the function should return 5268.
2. Given N = 670, the function should return 6750.
3. Given N = 0, the function should return 50.
4. Given N = -999, the function should return - 5999.
Assume that:
• N is an integer within the range (-8,000..8,000).
In your solution, focus on correctness. The performance of your solution will not be the
focus of the assessment.
Copyright 2009-2021 by Codility Limited. All Rights Reserved. Unauthorized copying, publication or
disclosure prohibited
You did not specified the language, so I did my program in python.
Hope it helps!!!
What is Software Packages
[tex]{\fcolorbox{red}{black}{\white {Answer}}}[/tex]
A software package is an assemblage of files and information about those files. ... Each package includes an archive of files and information about the software, such as its name, the specific version and a description. A package management system (PMS), such as rpm or YUM, automates the installation process.
Computers has done more harm than good
Explanation:
Teueeeeeeeeeeeeeeeeeee
Can someone tell me how to get rid of the the orange with blue and orange on the status bar
Please and thank you
Picture above
Answer:
Explanation:
i'm not sure how tho
h. What is recycle bin?
->
Answer:
Trash application, the Recycle Bin
A company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design
methodology would they be using?
A
structured design
B.
modular design
C.
object-oriented design
rapid application development
D
E
use-case design
Answer:
C. object-oriented design
Explanation:
Answer:
c. object- oriented design.
Explanation:
i took the test.
Which image-editing tool can be used to help remove spots and other marks from an image?
A. brighten
B. stylize
C. healing brush
D. contrast
E. desaturate
Answer:
c. healing brush
Explanation:
A customer comes into a computer parts and service store. The customer is looking for a device to provide secure access to the central server room using a retinal scan. What device should the store owner recommend to accomplish the required task?
Answer:
The owner should recommend facial ID or retinal scanner
In comparison to other biometric methods like fingerprint or retinal scans, it is quicker and more practical. Comparing facial recognition to typing passwords or PINs, there are also fewer touchpoints. Multifactor authentication is supported for a second layer of security check.
What secure access to central server room, a retinal scan?The topic of facial recognition has always caused controversy. The technology, according to its proponents, is a useful tool for apprehending criminals and confirming our identities. Critics argue that it violates privacy, may be inaccurate and racially prejudiced, and may even lead to unjustified arrests.
Simpleness of use and implementation. Once put into practice, both approaches are simple to utilize. However, facial recognition is basically possible with any camera (although a higher quality camera will be more accurate). Iris scanning is impossible with a standard camera, and the technology can be very expensive.
Therefore, The owner should recommend facial ID or retinal scanner.
Learn more about scan here:
https://brainly.com/question/24319849
#SPJ2
A Zookeeper wants you to create a program to keep track of all of the animals in the zoo and people working for him. You are given 4 files: Mammals.txt, Birds.txt, Reptiles.txt, and Personnel.txt. Your task is to create an array of structs for each file to hold the entries. The first line of each file will be a number indicating how many entries are in the file.
Answer:
I don't know you should figure that out good luck
Explanation:
good luck
____________ reference is used when you want to use the same calculation across multiple rows or columns.
Answer:
relative cell
Explanation:
So, if you want to repeat the same calculation across several columns or rows, you need to use relative cell references. For example, to multiply numbers in column A by 5, you enter this formula in B2: =A2*5. When copied from row 2 to row 3, the formula will change to =A3
Answer:
Relative
Explanation:
Relative reference is used when you want to use the same calculation across multiple rows or columns.
State and give reason, if the following variables are valid/invalid:
Variables defined in Python
Valid/Invalid
Reason
daysInYear
4numberFiles
Combination-month_game
Suncity.school sec54
Answer:
See Explanation
Explanation:
Variable: daysInYear
Valid/Invalid: Valid
Reason: It begins with a letter; it is not a keyword, and it does not contain a hyphen
Variable: 4numberFiles
Valid/Invalid: Invalid
Reason: It begins with a number
Variable: Combination-month_game
Valid/Invalid: Invalid
Reason: It contains a hyphen
Variable: Suncity.school sec54
Valid/Invalid: Invalid
Reason: It contains a dot and it contains space
Binary is a base-2 number system instead of the decimal (base-10) system we are familiar with. Write a recursive function PrintInBinary(int num) that prints the binary representation for a given integer. For example, calling PrintInBinary(5) would print 101. Your function may assume the integer parameter is non-negative. The recursive insight for this problem is to realize you can identify the least significant binary digit by using the modulus operator with value 2. For example, given the integer 35, mod by 2 tells you that the last binary digit must be 1 (i.e. this number is odd), and division by 2 gives you the remaining portion of the integer (17). What 's the right way to handle the remaining portion
Answer:
In C++:
int PrintInBinary(int num){
if (num == 0)
return 0;
else
return (num % 2 + 10 * PrintInBinary(num / 2));
}
Explanation:
This defines the PrintInBinary function
int PrintInBinary(int num){
This returns 0 is num is 0 or num has been reduced to 0
if (num == 0)
return 0;
If otherwise, see below for further explanation
else
return (num % 2 + 10 * PrintInBinary(num / 2));
}
----------------------------------------------------------------------------------------
num % 2 + 10 * PrintInBinary(num / 2)
The above can be split into:
num % 2 and + 10 * PrintInBinary(num / 2)
Assume num is 35.
num % 2 = 1
10 * PrintInBinary(num / 2) => 10 * PrintInBinary(17)
17 will be passed to the function (recursively).
This process will continue until num is 0
1. In what ways a computer system is like a human being
la
2. In what ways is it not like a human being
3. What will happen if the computer is not invented
a computer system can be considered similar to human beings in a way that it needed various parts in order to it to function it humans we need the or such as hurt brain veins exactra while computer need the CPU Ram etc
Explain different types of networking-based attacks
Answer:
Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it
To copy an item, you would:
O Highlight the item, right click, and select copy
O Press Ctrl + X
O Press Ctrl + Z
O Highlight text
When you use a rest area, you should:
A. Make sure your windows are closed tightly
B. Stop in a dark place where you can sleep
C. Walk around your car after resting
D. Sleep with the windows rolled down