A situation that might create a problem for a website’s security is known o be as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.
Others are;
Lack of authentication in company security. Access control-linked misconfigurations.A Software misconfigurations.What could a back-end developer do to prevent this situation from occurring?Always Encrypt sensitive data: Do not use weak encryption algorithm.The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.
Hence, A situation that might create a problem for a website’s security is known o be as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.
Learn more about website’s security from
https://brainly.com/question/10450768
#SPJ1
Write a raptor program that will display the count from 100 to 0 in decrements of 5.
A raptor program that will display the count from 100 to 0 in decrements of 5 is shown below.
What is a raptor program?This refers to a programming environment that works on a flowchart basis to help the user to present their algorithms in a visual manner.
Using a raptor program, you can display a count from 100 to 0 in decrements of 5 as shown:
#include <iostream>
#include <string>
using namespace std;
int main()
{
int count;
Count =100;
while (Count<=0)
{
cout << Count << endl;
Count =Count-5;
}
return 0;
}
The result would be a list showing numbers that go from 100 to 0 in decrements of 5.
Find out more on raptor programs at https://brainly.com/question/15082977
#SPJ1
What are the advantages of cloud computing over computing on premises?
Answer:
answer my question
Explanation:
open my account. i need help.The ________ loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop. switch do-while while for pre-test
Answer:
The for loop
Hope it helps!
What type of Trojan is a set of tools designed to gain control of a computer without revealing its presence
A type of Trojan which is a set of tools that is designed and developed to gain access and control of a computer system without revealing its presence is referred to as Rootkit.
What is a malware?A malware can be defined as any type of software program or file that is designed and developed to be intentionally harmful to the host computer, server, or network, especially for the purpose of wreaking havoc, damage and destruction after gaining an unauthorized access.
In Computer technology, a Rootkit is a type of Trojan which refers to a set of tools or software program that is designed and developed to gain access and control of an end user's computer system without revealing its presence.
In conclusion, an end user can protect his or her computer system from Rootkits by installing an antivirus software with an updated malware infection database.
Read more on antivirus here: https://brainly.com/question/17209742
#SPJ1
The type of Trojan that is a set of tools designed to gain control of a computer without revealing its presence is called Rootkits.
What is a Rootkit?
Rootkit is software, most often malicious, created to hide or camouflage the existence of certain processes or programs from normal detection methods and allow exclusive access to a computer and its information. Its intercepts the data that is requested and filters this information when an operating system makes a request to read a file, letting the system read only the files that are not infected. Therefore, the antivirus installed on the machine or other security tool on the computer cannot detect any threat or malicious file.
See more about computing at: brainly.com/question/13027206
#SPJ1
Betty is photographing a meadow at 1:00 p.m. what camera white balance setting will work best at this time?
The correct option exists B. Betty is photographing a meadow at 1:00 p.m. Daylight camera white balance setting will work best at this moment. To return the color temperature to neutral, it counts an opposing color to the image. After successfully white balancing an image, whites should occur white rather than blue or orange.
What is Daylight camera?Daylight – This mode stands for the normal daylight location while shooting outdoors. Many cameras do not include Daylight mode. Cloudy – This mode stands ideal for shooting on a cloudy day. This exists because it warms up the subject and surroundings and permits you to capture better shots.
Which light is better for the eyes yellow or white?In our living rooms, dining rooms, bedrooms, and other areas of the house, it is recommended to use warm white, which is also understood as yellow color light. The yellow light has a greater calming influence on the eyes since it contains less blue light. It is well known that cool hues may create it challenging to fall asleep.
The Kelvin scale rates the color or warmth of white light; the warmer the color, the more down the color temperature. Candles exist normally around 2000 Kelvin (k), but daylight exists typically between 5500 and 6500k. Digital cameras exist the most adept at choosing the ideal white balance between 3200 and 6500K. In other terms, they're quite good at deciding which color temperature, between a warm interior and daylight white balance, compares to the lighting situations that photographers typically work in.
To learn more about Daylight camera refer to:
https://brainly.com/question/16146767
#SPJ4
The complete question is,
Betty is photographing a meadow at 1:00 p.m. What camera white balance setting will work best at this time?
A. Flash
B. Daylight
C. Fluorescent
D. Cloudy
Answer:
The answer is Daylight I believe
A data analyst uses _____ to decide which data is relevant to their analysis and which data types and variables are appropriate
Answer:
I believe that the answer is a database organization.
What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications?
The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.
What is a Subapplicant?Subapplicant is known to be a term that connote a State agency, or a community, that is said to be submitting a subapplication to the applicant and this is one that is often used as a source of aid under the FMA program.
Note that Upon grant award, the subapplicant is seen as the subrecipient and thus, The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.
Learn more about subapplication from
https://brainly.com/question/14400492
#SPJ1
How is creating subclass of an existing class different from copying the code from the existing class to a new file?
The creating subclass of an existing class different from copying the code from the existing class to a new file because one involves existing class while the other involves a new class.
What is superclass?This is known to be creating a class, instead of declaring completely new members, then a person often designate that the new class to inherit the members of an existing class - Uses Existing class.
What is subclass?In the creating a class, instead of declaring what we call a completely new members, a person can designate that the new class to be able to inherit the members of an existing class. Uses New class.
Hence, The creating subclass of an existing class different from copying the code from the existing class to a new file because one involves existing class while the other involves a new class.
Learn more about subclass from
https://brainly.com/question/19260275
#SPJ1
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router
In this scenario, the next step that you should perform on your router is: D. verify the LAN interface status.
What is a router?A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.
What is IP address?IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.
In this scenario, the next step that you should perform on your router is verifying the status of the local area network (LAN) interface.
Read more on router here: brainly.com/question/24812743
#SPJ1
Complete Question:
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?
Verify the WAN interface status
Check the ARP cache
Check the IP routing table
Verify the LAN interface status
Check the MAC address table
A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is most likely being implemented?
The type of cloud that is most likely being implemented when a group of small local businesses has joined together to share access is community cloud service. The correct option is C.
What is cloud service?Cloud services have a wide variety of services for companies and businesses. They provide applications and software with resources. They provide easy and affordable services.
Community cloud service is a shared type of cloud service that helps banks and heads of trading firms.
Thus, the correct option is C. Community.
To learn more about cloud service, refer to the below link:
https://brainly.com/question/24227961
#SPJ1
The question is incomplete. Your most probably complete question is given below:
Public
Private
Community
Hybrid
Anna is making a presentation on the top five most visited cities in her state. she wants to make sure that she does not put in too much information and slides on one city, and too little on another. which type of view in a presentation program will enable her to see the text of all the slides in the presentation? anna should use view to see the titles and text of all slides in the presentation.
Answer:
yea she should
Explanation:
Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include: Group of answer choices
Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include option b: Histamines and leukotrienes.
What are Histamines and leukotrienes.In the workings of allergic rhinitis, histamine is known to be a tool or that which is known to act or functions for the main allergic rhinitis symptoms such as rhinorrhea, nasal itching and others.
Note that Its effect is one that is often seen in nasal congestion but leukotrienes is one that leads to a boast or an increase in that of nasal airway resistance and also in that of vascular permeability.
Hence, based on the given scenario above, the Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include option b: Histamines and leukotrienes.
See full question below
Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include:
A) The bee venom itself.
B) Histamines and leukotrienes.
C) Leukocytes and epinephrine.
D) Adrenaline and histamines.
Learn more about allergic reaction from
https://brainly.com/question/2693669
#SPJ1
A hacker is viewing information that passes along a network line for the purpose of gathering information. This is called?
In order to obtain information, a hacker is seeing data as it travels through a network line. This is called sniffing. The correct option is a.
What is sniffing?In terms of network security, a sniffing attack entails the theft or interception of data through the use of a packet sniffer to record network traffic.
A hacker is a person who attacks or stole pieces of information illegally. They catch the line system of the computer, and they hack software, money, or data.
Thus, the correct option is a. Sniffing.
To learn more about sniffing, refer to the below link:
https://brainly.com/question/17100775
#SPJ1
The question is incomplete. Your most probably complete question is given below:
a. Sniffing
b. Spoofing
c. Hijacking
d. Impersonation
Brendan is examining a report using the design view. which section in the design view is going to appear only once on the first page and could contain logos and title information? page header page footer report header report footer
Answer:
report header
Explanation:
,,,,,,,,,,,
Traditional methods of collecting systems requirements include: a. rapid application development. b. prototyping. c. interviews. d. joint application design. e. agile methodologies.
Answer:
interviews
Explanation:
because the designer gets to directly interact with the customer who knows exactly what they want.
How have productivity programs improved the professional lives of people? (check all that apply)
made it easier and faster to communicate with others
made it harder to create and modify documents
made it easier to manipulate numbers in a spreadsheet
made it easier and less expensive to present information
Productivity programs improved the professional lives of people because:
made it easier and faster to communicate with othersmade it easier to manipulate numbers in a spreadsheetmade it easier and less expensive to present informationWhat is productivity?Productivity is known to be the level of efficiency in regards to the production of goods or services and it is one that is rated by some measure.
Hence, Productivity programs improved the professional lives of people because:
made it easier and faster to communicate with othersmade it easier to manipulate numbers in a spreadsheetmade it easier and less expensive to present informationLearn more about productivity from
https://brainly.com/question/14262252
#SPJ1
Answer:
A). Made it easier and faster to communicate with others
C). Made it easier to manipulate numbers in a spreadsheet
D). Made it easier and less expensive to present information
Explanation:
I just did the Assignment on EDGE2020 and it's 200% correct!
Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)
In Hootsuite Inbox, you can see all the correspondence between a user and your organization on a particular social channel, including public and private conversations. This is useful for
The ability to view all the correspondence between an end user and your organization (company) on a particular social media channel, as well as public and private conversations is useful for understanding the full context of the most recent exchange in Hootsuite Inbox.
What is Hootsuite Inbox?Hootsuite Inbox can be defined as a type of software application that is designed and developed to help end users in managing social messages (correspondence) from their organization's customers and audiences, especially by availing them an ability to collect and view (see) both private and public conversations (messages) from all networks or social media channel in one place.
This ultimately implies that, the ability to view all the correspondence between an end user and your organization (company) on a particular social media channel, as well as public and private conversations is useful for understanding the full context of the most recent exchange in Hootsuite Inbox.
Read more on Hootsuite Inbox here: https://brainly.com/question/15321261
#SPJ1
When working with a spreadsheet, data analysts can use the _____ function to locate specific characters in a string.
When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.
What is the CLEAN Function?The CLEAN Function is known to be a tool that is often categorized in the Excel Text functions.
Note that this function tends to delete or remove any kind of non-printable characters from any specified or given text.
Note that As financial analysts, people tend to often import data from a lot of sources and the CLEAN function can help to delete nonprintable characters.
Hence, When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.
Learn more about spreadsheet from
https://brainly.com/question/4965119
#SPJ1
difference between sorting and filtering
Answer:
Essentially, sorting and filtering are tools that let you organize your data. When you sort data, you are putting it in order. Filtering data lets you hide unimportant data and focus only on the data you're interested in.
Explanation:
Hope this will help
The term “sorting” is used to refer to the process of arranging the data in ascending or descending order.
Example: Statistical data collected can be sorted alphabetically or numerically based on the value of the data.
FilteringThe process of data filtering involves selecting a smaller part of your data set to view or analyze. This is done by using that subset to view or analyze your data set as a whole.
Example: A complete set of data is kept, but only a portion of that set is used in the calculation, so the whole set is not used.
Hope this helps :)
meaning of mesh topology
The meaning of mesh topology is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.
What is meant by mesh topology?Mesh topology is a kind of networking that is said to be where the full nodes do act in a form of a cooperation so that they can be able to share or distribute data among themselves.
Note that this topology was said to be first seen or developed in about an approximate of about 30+ years ago and it is one that is often used in military applications and now it is seen to be used in home automation, smart HVAC control, and others.
Hence, The meaning of mesh topology is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.
Learn more about mesh topology from
https://brainly.com/question/14879489
#SPJ1
If html is used to specify the content of the webpage, then what do you use css for?
If html is used to specify the content of the webpage, then CSS to to specify the appearance of content on a webpage.
What is the uses of CSS?
Cascading Style Sheets can be regarded as one that is been used in styling as well as in layout web pages .
When there is a need to perform some actions such as :
alter the font color size spacing of contentsplit it into multiple columnsThen CSS comes into play , hence, If html is used to specify the content of the webpage, then CSS to to specify the appearance of content on a webpage.
Learn more about CSS on:
https://brainly.com/question/16397886
#SPJ1
A __________ is more concerned with copying and running code, rather than the code's maintainability or documentation.
Answer: system architect
Explanation:
A system architect is more concerned with copying and running code, rather than the code's maintainability or documentation
The primary goal of a data _____ is to find answers to existing questions by creating insights from data sources.
The primary goal of a data analyst is to find answers to existing questions by creating insights from data sources. Data analyst is the person who engages in a process of inspecting, cleansing, transforming, and modelling data with the goal of discovering useful information, informing conclusions, and supporting decision-making.
What is a data?In the pursuit of knowledge, data is a collection of discrete units of information in a conceptual model that in their most basic forms convey quantity, quality, fact, statistics, or other basic units of meaning. A datum is one item in a set of data.
Therefore, the correct answer is as given above
learn more about data: https://brainly.com/question/24621985
#SPJ1
explain the role of role of programming language in computer system .
Answer:
Explanation:
A programming language is a language used to write computer programs, which instruct a computer to perform some kind of computation, and/or organize the flow of control between external devices A programming language is a language used to write computer programs, which train a computer to perform some kind of computation, and/or organize the flow of control between external devices. there are 5 main programming languages; Java, SQL, Javascript, C++, and Python. Java is the most popular and number 1 skill tech companies use this language and over 3 billion phones run on Java. SQL pronounced sequel is a special-purpose programming language used for getting information from and updating databases because all businesses run a database system of some kind. It’s also one of the easier tech skills to learn, with numerous tutorials and free resources online. Javascript is a scripting language, often used to make web pages interactive. It’s text-based, written in an HTML document, and run through a web browser. C++ is a general-purpose programming language that can be used to create small programs or large applications. In 2013, C++ was CyberCoders’ most in-demand programming language skill. As an extension of C, one of the oldest coding languages, C++ provides a foundation for many newer, more popular ones. Python is a general-purpose, high-level programming language with an emphasis on code readability. It’s one of the easier programming languages to learn, with its use of common words and expressions, more white space, and fewer curly brackets.
A programming language is a language that is used to create computer programs that direct a computer to carry out calculations or manage the control flow between external devices.
What is Computer system?A programming language is a language that is used to create computer programs that instruct a computer to carry out specific computations and/or manage the operation of external devices.
There are five main programming languages: Python, Java, SQL, and Javascript. Around 3 billion phones operate on Java, making it the most utilized language in the computer industry.
As all businesses need some sort of database system, SQL, which is pronounced sequel, is a special-purpose computer language used for obtaining information from and updating databases.
Therefore, A programming language is a language that is used to create computer programs that direct a computer to carry out calculations or manage the control flow between external devices.
To learn more about Programming, refer to the link:
https://brainly.com/question/11023419
#SPJ3
Generic mouse and keyboard drivers are included with the os.
a. true
b. false
Answer:
This is true!
Explanation:
Mouse and keyboard drivers are standard and are usually included with the OS.
________ focus on managing documents, communicating, and scheduling. group of answer choices transaction processing systems knowledge work systems executive support systems office automation systems.
Office automation systems focus on managing documents, communicating, and scheduling. The correct option is D.
What is an Office automation system?An office automation system is a tool from which data can be transferred from one system to another system without using manpower, or without human interventions. Examples are slack, Zoom video calls, Microsoft video calls, etc.
They are used to analyze, collect, and share data. They manage tasks easily, they also manage business process management software.
Thus, the correct option is D. office automation systems.
To learn more about the Office automation system, refer to the below link:
https://brainly.com/question/15131330
#SPJ1
Write a program whose inputs are three integers, and whose output is the largest of the three values. ex: if the input is: 7 15 3
Explanation:
PythonThere are many ways we can write this program. Here are two ways.
Using the max functionFor this question, we can the max function to find the largest of the 3 values.
def largest(value1: int, value2: int, value3: int) -> int:
--return max(value1, value2, value3)
Series of if-else statements
We could have alternatively used a series of if-else statements to get the largest value.
def largest(value1: int, value2: int, value3: int) -> int:
--if value1 >= value2:
----if value1 >= value3:
------return value1
----else:
------return value3
--else:
----if value2 >= value3:
------return value2
----else:
------return value3
The dashes before the lines are not part of the code. They are just for showing indentation. Also, the :int is a type annotation to indicate the type for the parameters. It isn't necessary, but it can help you and others understand what kind of arguments must be passed in to the function.
Write a program that first reads a list of 5 integers from input. then, read another value from the input, and output all integers less than or equal to that last value
Answer:
integers = [int(i) for i in input().split()]
value = int(input())
for integer in integers:
--if integer <= value:
----print(integer)
Explanation:
We first read the five integers in a string. We can use the .split() method, which splits the string into separate parts on each space.
For example:
print(input())
>> "4 -5 2 3 12"
print(input().split())
>> ["4", "-5", "2", "3", "12"]
We cannot work with these numbers if they are strings, so we can turn them into integers using the int constructor. An easy way to do this is with list comprehension.
print([int(i) for i in input().split()]
>> [4, -5, 2, 3, 12]
Now that all the values in the list are integers, we can use a for loop to get each of the values and check whether they are less than or equal to the value.
Let's first get the value from the input.
integers = [int(i) for i in input().split()]
value = int(input())
print(value)
>> 4
Here, we have to pass the input through the int constructor to be able to compare it with the other integers. Let's now make a for loop to go through each integer and check if the integer is less than or equal to value.
for integer in integers:
--if integer <= value:
----print(integer)
The dashes are there to show indentation and are not part of the code.
Write a program that takes a string as an input. If the string entered is equal to
“Chicken”, print “This is equal” to the screen. If the string entered is not equal to
“Chicken”, print “This is not equal” to the screen.
The program could be written using a python script.
Python script on string operationThe program takes a string as an input. First, declare a variable for the input:
var = str()
#The above code will ask for a string to be inputted
Next would be to condition the script in a particular direction using the 'if' statement. That is, a Boolean function.
if var ==('chicken'):
#The above code will compare the inputted string to the word 'chicken'.
print("This is equal")
#The screen will display 'This is equal' if the inputted stringis the same as 'chicken'.
else:
print("This is not equal")
#The screen will display "This is not equal" if the inputted string is not the same as 'chicken'.
In summary, the code goes thus:
var = str()
if var ==('chicken'):
print("This is equal")
else:
print("This is not equal")
More on python scripts can be found here: https://brainly.com/question/14378173
#SPJ1
Question 2 if you have a slow computer, what are some possible culprits that could be causing this? select all that apply
Answer:
too many programs running, computer virus, lack of memory, to much cache
Explanation: