Answer:
Machine Learning and/or Artificial Intelligence (AI)
What windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?
The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.
Does Windows 10 possess local security policy?The Local Security Policy is known to be one that is often seen in Windows 10 and it is also known to be made up of information that is regarding the security of a local computer.
Note that If a person is trying to get into the Local Security Policy in Windows 10 Home, a person will receive an error report about it.
Therefore, The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.
Learn more about windows utility from
https://brainly.com/question/6058561
#SPJ1
Which component is responsible for collecting and consolidating data from network devices that are being monitored with snmp?
Answer:
A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
The availability and accessibility of storage are critical concerns for enterprise computing. Traditional direct-attached disk deployments within individual servers can be a simple and inexpensive option for many enterprise applications, but the disks -- and the vital data those disks contain -- are tied to the physical server across a dedicated interface, such as SAS. Modern enterprise computing often demands a much higher level of organization, flexibility and control. These needs drove the evolution of the storage area network (SAN).
SAN technology addresses advanced enterprise storage demands by providing a separate, dedicated, highly scalable high-performance network designed to interconnect a multitude of servers to an array of storage devices. The storage can then be organized and managed as cohesive pools or tiers. A SAN enables an organization to treat storage as a single collective resource that can also be centrally replicated and protected, while additional technologies, such as data deduplication and RAID, can optimize storage capacity and vastly improve storage resilience -- compared to traditional direct-attached storage (DAS).
SAN architecture
A storage area network consists of a fabric layer, host layer and storage layer.
Kira would like to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization. What control would best meet her needs
The control that Kira would be needing in order to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization is the CASB
What is the SaaS solutions?
This is the term that is used to refer to what is called Software as a service. This is the service that allows for the connection of certain cloud based apps over the internet connection.
This service is known to work for the person that subscribes to it following the pay as you go way. It helps in certain services such as the emails, calendars and in certain office tools.
Hence we can conclude that the CASB is the control that Kira would be needing in order to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization
Read more on SaaS here: https://brainly.com/question/13615203
#SPJ1
A machine where the operating system runs an application on top of an operating system is called?
A machine where the operating system runs an application on top of an operating system is called a virtual machine.
What is a virtual machine?A Virtual Machine (VM) is known to be a kind of a tool that is known to often help one to be able to compute resource that make use of software to run programs and carry out apps.
An operating system (OS) is said to be the program that, is known to be one that is being first loaded into the computer as a result of a boot program, and it is one that handles all of the other application programs inside any computer.
Hence, A machine where the operating system runs an application on top of an operating system is called a virtual machine.
Learn more about operating system from
https://brainly.com/question/22811693
#SPJ1
A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
b. false
Answer:
A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
It is true that a threat vector is an item of code on a distributed device that reports the condition of the device to a central server. The correct option is a.
What is a threat vector?The total number of attack vectors that an attacker can use to manipulate a network or computer system or extract data is referred to as the attack surface.
Threat vector and attack vector are interchangeable terms that describe the various ways a hacker can gain access to data or other confidential information.
The methods used by adversaries to breach or infiltrate your network are referred to as attack vectors.
Malware and ransomware, as well as man-in-the-middle attacks, compromised credentials, and phishing, are all examples of attack vectors.
A threat vector is a piece of code on a distributed device that reports the device's status to a central server.
Thus, the correct option is a.
For more details regarding a threat vector, visit:
https://brainly.com/question/28558110
#SPJ2
You are using a device that reads the physical addresses contained in incoming data that travels along network cables. Based on the physical address that it reads, the device then forwards the data out one of its ports to reach the destination device. What type of device are you using
You are using a device that reads the physical addresses contained in incoming data that travels along network cables. Based on the physical address that it reads, the device then forwards the data out one of its ports to reach the destination device. The type of device you are using is router.
What is Router?A router is an hardware device that is used in transferring information or data from a system to another.
The data can also be transfered from one computer networks to another.
Router makes it easier for more than one device to be connected easily without difficult Internet access.
Therefore, The type of device you are using that reads incoming data that travels along network cables is router.
Learn more on router below
https://brainly.com/question/24812743
#SPJ1
Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?
A.
old style
B.
geometric sans-serifs
C.
transitional and modern
D.
humanist sans
E.
slab serifs
The type of typeface that Derek should use is option D: humanist sans.
What is an typeface?A typeface is known to be a kind of a design tool that is used for lettering and it is one that is made up of variations in regards to its size, weight (e.g. bold), slope and others.
What defines a humanist font?The “Humanist” or “Old Style” is known to be a kind of a historical classification that is used for any typefaces that have its inspiration from Roman lettering and also that of the Carolingian minuscule as it often include forms that looks like the stroke of a pen.
Since Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters, The type of typeface that Derek should use is option D: humanist sans.
Learn more about typeface from
https://brainly.com/question/11216613
#SPJ1
To dynamically change a reference line using parameter action, you first create a reference parameter. next, add a parameter action for it. Finally?
In order to dynamically change a reference line using parameter action, you first create a reference parameter. Next, add a parameter action for it. Finally, A. add a reference line whose value follows a reference parameter.
What is a function parameter?A function parameter can be defined as a special kind of variable which is used in a function to point to a data that is provided as an input (reference) into the function.
This ultimately implies that, a software program that is coded by a software developer or programmer to include a function parameter is generally capable of passing data to a function as an input, whenever it is called.
In this context, we can infer and logically deduce that software developer or programmer must first create a reference parameter and then add a parameter action for it in order to dynamically change a reference line by using parameter action.
Finally, the software developer or programmer should add a reference line with its value following a reference parameter.
Read more on function parameter here: https://brainly.com/question/24223153
#SPJ1
Complete Question:
To dynamically change a reference line using parameter action, you first create a reference parameter. Next, add a parameter action for it. Finally, _____.
a. add a reference line whose value follows a reference parameter.
b. add the sheet you want to control as the bottom-right element in the layout.
c. also add a URL action that points to the dashboard itself.
d. add a reference line with a per pane scope and a tooltip.
Compare MAN, WAN, and LAN, and make a table having three columns.
Answer:
MAN :-)
MAN stands for metropolitan area network.It covers a larger area than LAN such as small towns, cities, etc. A MAN, also called the Metropolitan Area Network, is defined as the computer network that joins the metropolitan areas.The maintenance cost of MAN is difficult.WAN :-)
WAN stands for wide area network.It covers a large area than LAN as well as a MAN such as country/continent etc.A WAN, also called the Wide Area Network, is defined as a telecommunications network that extends over a large area.The maintenance cost of WAN is difficult.LAN :-)
LAN stands for local area network.It covers smaller areas such as colleges, schools, hospitals, and so on. LAN (Local Area Network) is defined as a computer network that is responsible for connecting local areas like schools, residents, universities, etc.The maintenance cost of LAN is easy.Hope its helpful :-)
If so, please mark me as brainlist :-)
The computer-like model used to describe the way humans encode, store, and retrieve information is the ________ model.
Answer:
Information processing model
Hope it helps!
"ICT in education is very helpful for all types of learner" justify
"ICT in education is very helpful for all types of learner" because:
ICTs is one that often boast the quality of educationIt increases the learner motivation and also their engagement in learning.It boast or quickens the acquisition of a lot of basic skills.It is known to often enhance teacher training. What are the benefits of using ICT in education?ICTs are known to be a kind of transformational tools that when it is used in the right way can lead to a shift to a form of learner-centered environment.
The Advantages of ICT are:
They are known to be Cost Effective. They are known to be AutomatedThey tend to act as a Bridging of cultural divide. They help in the Creation of new jobs.Therefore, "ICT in education is very helpful for all types of learner" because:
ICTs is one that often boast the quality of educationIt increases the learner motivation and also their engagement in learning.It boast or quickens the acquisition of a lot of basic skills.It is known to often enhance teacher training.Learn more about ICT from
https://brainly.com/question/20717870
#SPJ1
Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their _____.
Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their Web browsers.
What is a Platform as a service PAAS?Platform as a service (PaaS) Software is known to be a kind of a hardware that gives an operating system on which a lot of developers can be able to make and also transmit solutions without the use of the underlying system software.
A web browser is known to be that which takes a person yo anywhere on the internet and it helps one to get back information.
Hence, Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their Web browsers.
See full question below
Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.
Web browsers
Web avatars
smart cards
data gloves
Learn more about PaaS from
https://brainly.com/question/20600180
#SPJ1
A list of user passwords were accidentally leaked as the result of a company policy breach. What actions can you take now to prevent any additional data exposure? Select two answers.
The actions that you can you take now to prevent any additional data exposure are:
Use multi-factor authenticationEducate end usersWhat is a Data Breach?This refers to the situation where there is a loss of data either through hacking or carelessness by a systems administrator.
Therefore, we can see that based on the fact that a list of user passwords was accidentally leaked as the result of a company policy breach, this is a serious data breach and future loss can be prevented if there is:
Use multi-factor authenticationEducate end usersRead more about data breach here:
https://brainly.com/question/13696307
#SPJ1
A computer is completely compromised when it won't turn on or operate. what is the best way to fix it?
Answer: Check to make sure it is plugged into the wall first . or that the power cord is plugged into the laptop and the laptop is charged up.
Explanation:
1. (If you are on a desktop, you need to have it plugged in at all times.)
2. (On a desktop you may need a new power supply or fan if it is an old enough machine, the power supply can be replaced if that does not work you may need a new motherboard or processor chip ..you can test it with a second power supply.
3. Oh, do you have enough ventilation inside the case is the fan working on the back of the case, and are the vents on the front clogged ?? A machine needs free-flowing air from the front to back to cool down the hard drive and the DVD or cd rom players as well as the MB. Use canned air and clean those vents and spray that air everywhere inside the desktop tower ...
4. Age is also a factor when a machine gets too old it will slow down and take longer to come on till one day it just stops.
5.. ( On a desktop, you have the CMOS battery on the MB that helps keep the machine running it is the size of a watch battery and you can get it at the local store.
6.. That battery (CMOS) needs to be replaced at least once a year as it controls your time and date and the year as it is imperative to work on your motherboard for peak performance.
7. You may have a virus,use an antivirus, like AVAST and try to add it on a USB thumb drive to clean the machine outside of windows or mack
Your computer seems to be running slowly. In particular, you notice that the hard drive activity light remains lit when you run multiple applications and switch between open windows. This happens even though you aren't saving large files. What should you do to troubleshoot the problem
If your computer seems to be running slowly, the things that a person should you do to troubleshoot the problem is that one should use the Task manager as it can display CPU utilization graphs in regards to eight processors.
What troubleshooting meaning?Troubleshooting is known to be a term that is seen as a form of a systematic approach to problem-solving.
Note that it is one where or which is said to be used to find and alter or correct issues that are in regards to complex machines, electronics, computers and also that of software systems.
Hence, If your computer seems to be running slowly, the things that a person should you do to troubleshoot the problem is that one should use the Task manager as it can display CPU utilization graphs in regards to eight processors.
Learn more about troubleshoot from
https://brainly.com/question/14394407
#SPJ1
What health issue did Feiler face that led him to consider his family? What was his family situation at this time?
The answers to the question is given below:
What health issue did Feiler face that led him to consider his family?Feiler was known to have bone cancer and this led him to see or recognize his family.
What was his family situation at this time?This was known to have caused him to to be away from his family a lot of times.
Bone tumor or cancer is known to be a kind of mass that is composed of unusual cells that are said to be growing in a bone.
A lot of tumors are treatable and it is good that one discover it early.
Therefore Feiler was said to have bone cancer and this made him to look for his family.
Learn more about cancer from
https://brainly.com/question/11710623
Checks or safety procedures are put in place to protect the integrity of the system is referred to as?
answer:
system controls
Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her _____ memory.
Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her echoic memory.
What is memory?
This is the term that is used to refer to the human ability to store the things that they hear and the things that they see to mind. It is the ability that people have to recollect things that they have seen happen.
The echoic memory is the term that is used to refer to the short term memory that has the ability to store the things that a person would hear. This type of memory may only last for a short while.
Hence we can say that Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her echoic memory.
Read more on echoic memory here: https://brainly.com/question/10196869
#SPJ1
Avicenna is smart software being developed by ibm that will be used to assist radiologists with interpreting medical images such as?
Avicenna is smart software being developed by ibm that will be used to assist radiologists with interpreting medical images such as CT Scans.
What can be detected by CT scan?The ailment or disease that a CT scan can find are :
Some types of cancer and tumors.Fractures such as (broken bones).Heart disease.Note that a computerized tomography (CT) scan is known to be one that makes use of both a series of X-ray images that are known to be obtained from a lot of angles around a person's body and ti is known to also uses computer processing to make cross-sectional images (slices) of the bones, blood vessels and others.
Therefore, CT scan images gives a kind of a more-detailed information than just X-rays and as such, Avicenna is smart software being developed by ibm that will be used to assist radiologists with interpreting medical images such as CT Scans.
Learn more about software from
https://brainly.com/question/1538272
#SPJ1
Early computers took up entire rooms. which of these dramatically reduced the size of computers? microchips sound recording compact discs digital-video discs
Answer:
Micro chips
Explanation:
The evolution of computers to the modern day is made possible due to the micro chips or modern transistors or super efficient silicon integrated circuits The micro chips replaced the valves or vacuum tubes that made earlier computers have an enormous size.
What is the best to calculate units total treatment time for day, remembering the total treatment time constrains the number of units to be billed?
The best time to calculate units total treatment time for day, remembering the total treatment time constrains the number of units to be billed is;
Total treatment time for the day - total event or service-based units of the day= total time for time-based units.What is Time Constraint?The term time Constraint is known to be a word that connote or that defines some factors that hinders a projects in regards to time.
Note that this is made up of deadlines, workload management, and others such as resource allocation. a person that has worked on a project is one that needs to deal with some constraints when it came to project execution.
Hence, The best time to calculate units total treatment time for day, remembering the total treatment time constrains the number of units to be billed is;
Total treatment time for the day - total event or service-based units of the day= total time for time-based units.Learn more about time constrains from
https://brainly.com/question/6073946
#SPJ1
PKI is the a federal information processing standard that specifies a cryptographic algorithm developed to replace both DES and 3DES. _____ Group of answer choices
The assertion that PKI is a federal information processing standard that specified an algorithm to replace DES and 3DES is FALSE.
Why is this false?The Public Key Infrastructure (PKI) is a framework which is used to support encryption, and authentication of certificates so that businesses are secure.
There is a federal information processing standard which is used to specify a cryptographic algorithm and this standard. This then replaced DES and 3DES. It is called the Advanced Encryption Standard (AES).
Find out more on the Public Key Infrastructure at https://brainly.com/question/10651021
#SPJ1
What windows utility can be used to find out what process are launched at startup?
System Configuration is known to be the windows utility can be used to find out what process are launched at startup.
What is System Configuration ?The term System configuration is a known to be a word that connote a kind of a systems engineering that tells the computer hardware, the processes as well as the kinds of devices that is made up of the full system and that of its boundaries.
A configuration example is if an artwork is said to be put out in order to make full use of the connections between the pieces and therefore one can have different kinds of System Configuration based on what the device is.
Therefore, System Configuration is known to be the windows utility can be used to find out what process are launched at startup.
Learn more about windows utility from
https://brainly.com/question/20659068
#SPJ1
What is the importance of system security within the organization where you currently work or at an organization within your field of study
The importance of system security within the organization where you currently work is that It acts to protects the organization's strength to function in its full capacity without interference.
What is the importance of system security within an organization?It helps in the safe operation of all firm's applications that are known to be implemented on the firm's IT systems. It also protects the data of the organization of which they often collects and use.
Note that In any business, the use of system security is vital for the safety of data and information in regards to the business and that of its clients. Hence, it helps to bring about the efficiency in the running of the company, and it keep safe the IT infrastructure assets.
Therefore, The importance of system security within the organization where you currently work is that It acts to protects the organization's strength to function in its full capacity without interference.
Learn more about system security from
https://brainly.com/question/25720881
#SPJ1
What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an adso?
The difference between a field and an infoobject as well as its advantages is given below.
What is the difference between InfoObject and adso?The difference between Infoprovider and ADSO can be seen when we tell about the definition of both.
Note that Info Providers are known to be tools that are often used to save the data in SAP BW system. Info Providers are said to be the objects that can be seen in BW, which are saving data physically or virtually and it is one that give access to the data and can also be in the assessment for reporting issues.
In terms of ADSO , it is one that Corporate memory and it is one that helps a person to be able save the full history of the data that can be used for reconstruction purposes, and it is one where a person do not need to to extract it all from the source system.
What is the advantage of using infoobjects instead of fields in an adso?Modeling InfoObjects brings is one that gives a lot of additional effort when compared to ADSO . ADSO is one that helps or enables you to be able to compress your data, thereby lowering the total data footprint.
Learn more about InfoObjects from
https://brainly.com/question/1382377
#SPJ1
In a partially filled array, the number of slots in the array that are not currently used is the?
Answer:
Can you please explain more
Explanation:
General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees. Another name for this network that operates behind a firewall is a(n): Group of answer choices specialized network extranet intranet information system functional network
Based on the fact that General Electric uses its own private corporate network to link its 340,000 employees behind a firewall, this is called an Intranet.
What is an intranet?An intranet refers to a network that functions like the internet but isn't available to everyone. It is instead available to only people who are part of the organization that set it up.
This intranet allows for its users to share information and communicate with each other using all sorts of tools and collaborative software.
Intranets operate behind a firewall which means that they are less prone to attacks by hackers and can be quite faster. This is what General Electric is doing with its employees which means it uses the intranet.
Find out more on an intranet at https://brainly.com/question/13742795
#SPJ1
When a database stores view data, it uses a _____ that depends on data in a corresponding _____.
When a database stores view data, it uses a materialized view that depends on data in a corresponding view table. The correct option is 4.
What is a database?A database is a collection of data in an organized and easy way. They store electronic data and manipulate it. An example is an online telephone directory that saves people's contact, name, and addresses.
The materialized view is an organized view of data in the system, and the view table is the table where all the data can be viewed.
Thus, the correct option is 4. Materialized view, view table.
To learn more about the database, refer to the below link:
https://brainly.com/question/25198459
#SPJ1
The question is incomplete. Your most probably complete question is given below:
1. base table, view table
2. materialized view, base table
3. view table, materialized view
4. materialized view, view table
The hardware component of a computer system consists of programs written in computer languages. a. True b. False
Answer: true
Explanation:
according to the most typical basic paradigm of programming theory, a computer program is an algorithm written in a programming language, a series of instructions satisfying certain exact conditions and requirements (predefinedness, clear execution, etc.)
The most common format used for data modeling is: A. logic modeling. B. process modeling. C. entity-relationship diagramming. D. a flowchart. E. state-transition diagramming.
The most common format used for data modeling is C. entity-relationship diagramming.
What is Data modeling ?Data modeling in software engineering can be regarded as the process involving the creation of a data model that is been used in processing information system by applying certain formal techniques.
It should be noted that there are different types of modelling but The most common format used for data modeling is C. entity-relationship diagramming.
Learn more about Data modeling on:
https://brainly.com/question/27250492
#SPJ1