The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.
Does Windows 10 possess local security policy?The Local Security Policy is known to be one that is often seen in Windows 10 and it is also known to be made up of information that is regarding the security of a local computer.
Note that If a person is trying to get into the Local Security Policy in Windows 10 Home, a person will receive an error report about it.
Therefore, The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.
Learn more about windows utility from
https://brainly.com/question/6058561
#SPJ1
You're interested in using the services of a vendor company. How would you assess their security capabilities?
If a person is interested in using the services of a vendor company the ways that one would assess their security capabilities is to ask them to give you or perform any penetration testing or a kind of security assessment reports.
What is the report about?For a person to be assured of the security capabilities of any company, it is good that one ask them to fill a a questionnaire.
Note that the security assessment questionnaire is one that can assure you to quickly and efficiently have a broad understanding of what security measures that the vendor company has in store.
Note that If available, any reports that has the detailing penetration testing results is available or the security assessments is one that can be required from them.
Hence, If a person is interested in using the services of a vendor company the ways that one would assess their security capabilities is to ask them to give you or perform any penetration testing or a kind of security assessment reports.
Learn more about vendor company from
https://brainly.com/question/15104782
#SPJ1
Students are required to explore and find an idea for their Computer Science project.
The aim of the project is to create something that is tangible and useful using Python / Python
and SQL connectivity. The objective here is to find a real-world problem that is worthwhile to
solve, and develop an application for the same.
Students should submit the title and a brief synopsis of the project they are planning to do.
(CBSE CLASS 12 CS)
The topic a Students can explore and find an idea for their Computer Science project is finding or discovering of rear cancer genes through the use use of computer programming.
What is the title?Finding or discovering of rear cancer genes through the use use of computer programming.
What is computer programming?This is often called systems programming or the act of creating of computer software that is said to be an aspect of a computer operating system or some control program.
It is known to be part or used in computer networks. Note that Systems programming is one that entails data and program management, such as operating systems, control programs, and others.
Student can expand on the topic above form their Computer Science project.
Learn more about computer programming from
https://brainly.com/question/797477
#SPJ1
in makecode arcade, which part of the interface can be used to answer questions about how a block functions?
in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.
What is the function about?In Blocks, Functions is known to be the element that one can find under the Advanced section.
Note that in finding functions in block, student can be be introduced to Simple functions.
Hence, in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.
Learn more about block functions from
https://brainly.com/question/17043948
#SPJ1
Answer:
The right side panel
Explanation:
On the right side panel you can see the various functions of specific block functions in MakeCode Arcade.
Placing a(n)____ to a folder on a start menu or on the desktop can make it easier to locate and open the folder.
Placing shortcut to a folder on a start menu or on the desktop can make it easier to locate and open the folder.
What are shortcuts on the desktop?
The shortcuts on the desktop serves as the tolls that help in the location of files as well as other documents and function on the desktop which help in time management when working on the computer.
It should be noted that Placing shortcut to a folder on a start menu or on the desktop can make it easier to locate and open the folder.
Learn more about desktop on:
https://brainly.com/question/24735155
#SPJ1
Array bounds checking should be directly coded into a system rather than assumed.
a. True
b. False
Answer:
True
Explanation:
One cannot assume an array bounds, it has to be specific
Cloudy computing would like to be able to link related cases together. As the admin, what would you recommend?
As the admin of a cloud computing service, I would you recommend that you ensure the use of pooled resources and efficient client-time management.
What is cloud computing?Cloud computing can be defined as a Cloud-based solutions that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives to provide various services to customers.
The types of cloud computing.In Computer technology, there are three main types of cloud computing and these include the following:
Private cloudPublic cloudHybrid cloudBasically, a hybrid cloud is designed and developed to combine the features of both a private cloud and public cloud. For instance, a hybrid cloud can be used by both the college's IT administrator and its IT consultant company which has access to the learning management system (LMS) application hosted in the cloud.
Read more on cloud computing here: brainly.com/question/17247526
#SPJ1
In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of?
Mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of memory and screen size.
What is mobile application?A mobile app is known to be a kind of a software application that was made specifically for its use in terms of small, wireless computing machines.
It includes, smartphones and tablets, instead of desktop or laptop computers.
Note that Mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of memory and screen size as this was said to be a major setback for it.
Learn more about mobile applications from
https://brainly.com/question/917245
#SPJ1
See full question below
In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of
Select one:
a. memory and screen size.
b. screen size and keyboard functionality.
c. processing speed and graphics capabilities.
d. storage capacity and processing speed.
18. The Internet in countries like North Korea, Saudi Arabia, and China is
O A. accessible to all citizens.
O B. much faster than Internet in the United States.
OC. common in the rural areas.
O D. controlled by the government.
Answer:
D
Explanation:
These are all more controlling countries that restrict civilian internet use
The correct option is D. The Internet in countries like North Korea, Saudi Arabia, and China is controlled by the government.
Although business surveillance in association with the Chinese government has reportedly happened, it is primarily carried out through the government. China keeps an eye on its residents via the internet, cameras, and other digital tools.
What are the internet and its benefits?By doing so, it establishes a platform for online information sharing and retrieval. Only you will have access to all of the apps, websites, social media platforms, and other services if your device is online. The fastest method for sending and receiving information these days is thought to be the internet.
China has the most extensive and sophisticated Internet censorship in the entire world. The government controls website content and keeps an eye on Internet usage. Major Internet platforms in China set up complex self-censorship techniques as needed by the government.
Thus, the correct option is D.
Learn more about the Internet here:
https://brainly.com/question/13308791
#SPJ2
To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and do what action?.
To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and double click , in rapid succession, using the left mouse button.
Which mouse pointer will open the file folder?When a person is known to be using Windows 10 or an older version of any given Windows, a person can be able to open files and folders through the act of double-clicking on them.
Note that based on the above, if a person can alter this behavior to open files using a single click ( that is the mouse is used by double-clicking on a single click).
Therefore, based on the above, To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and double click , in rapid succession, using the left mouse button.
Learn more about mouse from
https://brainly.com/question/10847782
#SPJ1
What line of code assigns a char variable outputgames with the value hte gamespointer points to?
The line of code that assigns a char variable outputGames with the value the gamesPointer points to is known to be:
outputGames = *gamesPointer:What is a line of a code?The instructions a programmer is known to often writes when making a program is known to be the code line.
Note that the Lines of code are seen as the "source code" of any kind of a program, and one line is one that can be used to make or generate a single machine instruction or a lot of it based on the programming language.
Hence, A line of code in assembly language is seen to be turned into a single machine instruction.
Therefore, The line of code that assigns a char variable outputGames with the value the gamesPointer points to is known to be:
outputGames = *gamesPointer:Learn more about codes line of code from
https://brainly.com/question/25875879
#SPJ1
A user wants to adjust the number of horizontal and vertical pixels displayed on a monitor screen. What display setting will the user adjust?
A user need to adjust the number of horizontal and vertical pixels displayed on a monitor screen and it is known as Resolution.
What is computer Resolution?
Resolution is known to be a term that connote the image quality that is known to be made or produced by what we call the printer or what is shown on a monitor.
Note that With the use of the monitors, the resolution is known to be one that is often measured by the number of pixels that is said to be horizontal by the pixels that is standing vertically.
An example, of the Resolution is 1024 × 768 pixels. Therefore, A user need to adjust the number of horizontal and vertical pixels displayed on a monitor screen and it is known as Resolution.
Learn more about pixels from
https://brainly.com/question/9017156
#SPJ1
The security field will be needed through an organization's life.
a. True
b. False
During which phase of system development would you acquire any necessary hardware and software?
During the design phase of system development, you would acquire all the necessary hardware and software.
What is SDLC?SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.
In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;
PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenanceAlso, phased implementation simply refers to an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other).
In conclusion, we can infer and logically deduce that you would acquire all the necessary hardware and software during the design phase of system development.
Read more on phases here: brainly.com/question/7112675
#SPJ1
Typically a personal computer uses a(n) ________ to store the operating system and software applications. group of answer choices flash drive external hard disk optical drive internal hard disk
Typically a personal computer uses a(n) internal disk to store the operating system and software applications.
What is internal disk?This is known to be a kind of tape, disk, optical that tends to drive or that is seen inside the case of any given desktop or laptop computer.
Note that An internal drive is one that gets its power from the central power supply and the other types of storage devices are:
RAM: Random Access Memory. ROM: Read-Only Memory. Magnetic Storage Devices.Therefore, Typically a personal computer uses a(n) internal disk to store the operating system and software applications.
Learn more about personal computer from
https://brainly.com/question/4945544
#SPJ1
structure that the house the electronic system specifications
Electrical systems, also called circuits or networks, are designed as mixtures of mainly three fundamental components: resistor, capacitor, and inductor. They are likewise defined by resistance, capacitance, and inductance—generally considered to be lumped-parameter effects.
What are the specifications of a circuit?
The specification can (and normally does) also set some of the physical parameters that the procedure must meet, such as size, weight, moisture resistance, temperature range, thermal output, vibration tolerance, and acceleration tolerance.
What is the electronic system?
An Electronic System is a physical interconnection of components, or parts, that gathers various parts of information together.
To learn more about Electrical systems, refer
https://brainly.com/question/24786034
#SPJ9
Brian would like to limit the ability of users inside his organization to provision expensive cloud server instances without permission. What type of control would best help him achieve this goal
Resource policy is what Brian would use to limit the ability of users inside his organization to provision expensive cloud server instances without permission.
What is the resource policy?The resource policy can be defined to be the system that is able to create the rule that is based on the specific resources and the actions that a particular feature would have. The resource is going to be accessible by a particular system. The resource can be defined as a server that may allow or refuse the performance of a particular function.
Hence we can conclude that the Resource policy is what Brian would use to limit the ability of users inside his organization to provision expensive cloud server instances without permission.
Read more on resource here: https://brainly.com/question/3752408
#SPJ1
Ricky unplugs his amazon alexa smart speaker when he is not using it. he's trying to limit unnecessary _____.
Ricky unplugs his amazon alexa smart speaker when he is not using it. he's trying to limit unnecessary data collection.
What are data collections?Data collection is the process of gathering and measuring information on variables of interest, in an established systematic fashion that enables one to answer stated research questions, test hypotheses, and evaluate outcomes.
Data may be grouped into four main types based on methods for collection: observational, experimental, simulation, and derived.
See more about data collection at brainly.com/question/20389933
#SPJ1
How ICT has helped education to grow through progression?
Answer:
Hey there!
Explanation:
This is ur answer...
ICTs can enhance the quality of education in several ways: by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. ICTs are also transformational tools which, when used appropriately, can promote the shift to a learner-centered environment.
Hope it helps!
Brainliest pls!
Have a good day!^^
An artistic technique that creates the appearance of three dimensions on a flat surface.
Answer:
atmospheric perspective
You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?
If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.
What is meant by alphabetical order?We are known to be people who like to sort letters and words in a way that is alphabetical in nature.
This implies that one does this to order them as they are known to appear in the alphabet.
Hence, if sorting words in to alphabetical order, we often look at the first letter of the word and as such, If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.
See full question below
You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?
Select an answer:
Everything on the page will be sorted alphabetically by territory.
Only text items will be sorted alphabetically by territory, but chart items must be sorted separately.
The chart will be sorted alphabetically by territory, but the slicer will be unchanged.
The slicer will be sorted alphabetically by territory, but the chart will be unchanged.
Learn more about alphabetical order from
https://brainly.com/question/26971639
#SPJ1
An attacker installs trojan malware that can execute remote backdoor commands, such as the ability to upload files and install software to a victim pc. what type of trojan malware is this?
The attacker has installs trojan malware that can execute remote backdoor commands called the Remote Access Trojan (RAT).
What is Remote Access Trojan (RAT)?This is known to be a worm that is often written in VBS, and it is one that do makes it hard to see on Windows machines and it is one that makes the attacker to have total control over a machine and also they send data back to their server.
Hence, The attacker has installs trojan malware that can execute remote backdoor commands called the Remote Access Trojan (RAT).
Learn more about trojan malware from
https://brainly.com/question/11831402
#SPJ1
When referencing a substring such as str1[m:n] if m >= n then the value will be?
Answer: '' (An empty string)
Explanation:
Normally, when we are getting a substring, we will start from the character at index m and go until, but exclude the character at index n.
If m is greater than n, then we cannot get any substring as we would have to go backwards when we need to go forwards. If m=n, then we still cannot get any characters as we have to exclude the character at index n, making us have to exclude the character at index m as well.
Hence, for both situations the value would be an empty string, or a string with length 0.
After thoroughly evaluating a supplier, many organizations summarize evaluations using a supplier ____ matrix-a type of weighted scoring model.
After thoroughly evaluating a supplier, many organizations summarize evaluations using a supplier evaluation matrix-a type of weighted scoring model.
What is evaluation matrix?This is a tool, used to measure proposals, submitted by suppliers. It is basically meant to rank proposals based on defined criteria so that the best can be chosen.
In evaluation matrix, a score is assigned to each criteria that was considered under different categories and then the supplier with the highest score is selected to do business with.
Using evaluation matrix assess the suitability of suppliers to the business, who can work with the business for a long time hence, an essential tool for planning and organizing an evaluation.
Learn more about evaluation matrix here: https://brainly.com/question/15071654
#SPJ1
What two documents describe the purpose of the optask link?
The two documents describe the purpose of the optask link are:
MTAMTNWhat is responsible for promulgating the Optask link message?The agency that is known to be assigned the role to promulgate the OPTASK LINK is known to be MTA which is said to be the physical configuration.
The MTA is known to be one that contains the physical configuration, functional organization, and also all of the operational methods used in the set up , establishment, changes, and operation of Multi-TDL Networks. The MTA is said to be the physical linkages and equipment of the MTN.
Hence, the two documents describe the purpose of the optask link are:
The MTAThe MTNLearn more about MTA from
https://brainly.com/question/24131225
#SPJ1
what might be the greatest risk to any computer installation?
a. fire b.sabotage c. fraud d.theft
Answer: a. Fire
Explanation:
The greatest threat to any computer installation would most likely be a fire. Setting up/installing your computer can be a complicated process where fires can be started if you have power running when it shouldn't.
Sabotage might be the greatest risk to any computer installation. The correct option is B.
Thus, Intentional harm or disruption of computer systems, networks, or data by people with malicious purpose is referred to as sabotage.
It may involve intentional alteration of data to harm or disrupt, the introduction of viruses or malware, unlawful access to private information, or hacking.
Sabotage poses a substantial risk to computer installations and the businesses that depend on them because it can result in lengthy downtime, the loss of crucial data, monetary losses, and weakened cybersecurity.
Thus, Sabotage might be the greatest risk to any computer installation. The correct option is B.
Learn more about Sabotage, refer to the link:
https://brainly.com/question/34707842
#SPJ7
Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.
MMS, or Multimedia Messaging Service, as opposed to SMS.
In an advertisement, a speed specification, such as 2.66 ghz, indicates the speed of the microprocessor?
Answer:
yes / true
Explanation:
it is one of the factors in determining the speed of the microprocessor
In an advertisement, a speed specification, such as 2.66 Ghz, indicates the speed of the microprocessor, this statement is true.
What is Microprocessor?Microprocessors are a kind of small electronic devices that have the arithmetic, logic, and control circuitry required to carry out the tasks of a central processing unit in a digital computer.
Based on the instructions kept in the memory, a microprocessor accepts binary data as input, processes it, and then outputs the results. The microprocessor's ALU (arithmetical and logical unit), control unit, and register array are used to process the data.
Through a collection of registers that serve as temporary fast-access memory locations, the register array processes the data. The control unit regulates how data and instructions move through the system.
Hence, In an advertisement, a speed specification, such as 2.66 Ghz, indicates the speed of the microprocessor
To know more about Microprocessor follow the link.
https://brainly.com/question/14708869
#SPJ5
which things computer case contains
Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.
What is a computer case?The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.
In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.
The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.
It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.
See more about computing at: brainly.com/question/15707178
#SPJ1
Silicone rubber and urethane caulks generally give the ____________ overall performance for exterior building envelope applications.
Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications.
What is silicone rubber made from?Silicone rubber is known to be a kind of an elastomer that is said to be made up of silicone that has silicon along with carbon, hydrogen, and oxygen.
Note that Silicone is said to be a form of an inorganic substance, while polyurethane is said to be organic in nature.
The use of thus Silicone rubber and urethane is therefore very essential to building construction.
Hence, based on the above, Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications and this is a true statement.
Learn more about Silicone rubber from
https://brainly.com/question/18902047
#SPJ1
What is the practice of tagging pavement with codes displaying where wi-fi access is available?
a. bad actor
b. actor war
c. chalking war
d. driving
The practice of tagging pavement with codes displaying where wi-fi access is available is generally known as: c. war chalking.
What is wi-fi?Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.
What is Wireless Equivalency Protocol (WEP)?Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).
According to the IEEE Wireless Fidelity (Wi-Fi) standard, war chalking simply refers to a practice that typically involves tagging pavement with codes which displays where wi-fi access is available.
Read more on Wireless network here: https://brainly.com/question/13697151
#SPJ1