Explain your experience with the Internet including what search engine you typically use and why, how ethics play into the use of the information you gather, and how you protect your search privacy.

Answers

Answer 1
My experiences with the internet have been good, with not really and problems. I use Bing, a search engine created by Microsoft. I use Microsoft because I think I get better results, and with your searches you get points that you can redeem for prizes and rewards. I don't generally see anything that is ethnic related, I tend to stay on the path of schoolwork, and in my settings on my Bing account there is setting to protect my search history. 

Related Questions

The ____ loop is particularly useful when processing arrays.

Answers

The FOR EACH loop is particularly useful when processing arrays. The newer for statement is called the enhanced for or for each because it is called this in other programming languages. It is used in preference to the standard for loop if applicable because it is much readable. The series of value of the for each loop is used to access each successive value in a collection values. It is commonly used to iterate over an array or a collection class, for example is the array list. It can also iterate over anything that implements the iterable interface which is the define iterator method. Many of the collections classes implement iterable which makes the for each loop very useful.

Final answer:

The for loop is particularly useful when processing arrays. When you need to iterate over array elements, the for loop allows you to execute a block of code a certain number of times, which corresponds to the length of the array.

Explanation:

Arrays are collections of data items that are accessible via numeric indices. To process each element in an array, you often need to access them sequentially, starting with the first element and ending with the last. The for loop is ideal for this situation because you can define a loop control variable that starts at 0, then incrementally increase it in each iteration until it matches the length of the array (usually one less than the array length because array indices typically start at 0). This way, you can work through the array systematically. The for loop provides a clear structure for iterating over arrays and is compact in syntax, making it a preferred choice among programmers when dealing with collection-based data structures like arrays.

"________ write the instructions for a computer."

Answers

Programmers/Coders write the instructions for a Computer.

A stem-and-leaf display describes two-digit integers between 20 and 80. for one of the classes displayed, the row appears as 5|246. what numerical values are being described?

Answers

In a two digit scenario, the "5" stem can contain the numbers 50-59. In this example the numbers 52, 54 and 56 are represented.

Final answer:

In the stem-and-leaf display row 5|246, the numbers being described are 52, 54, and 56, with '5' as the stem and '2', '4', '6' as leaves.

Explanation:

The question asks about a specific row in a stem-and-leaf display, which is 5|246. In a stem-and-leaf plot, all data values within a class are visible and are divided into a stem, which consists of the leading digit(s), and a leaf, which consists of a final significant digit. In this context, the stem '5' represents the tens place, and the leaves '2', '4', and '6' represent one-digit numbers in the units place.

Therefore, the numerical values being described are 52, 54, and 56.

I have a real struggle when it comes to working with strings, whether they're arrays or pointers to strings, and I'm lost cause when I read or watch tutos I understand them, but then I'm like a novice when I need to write actual code, what should I do?
PS: I'm using C language.

Answers

In C, you deal with a string always via a pointer. The pointer by itself will not allocate memory for you, so you'll have to take care of that.

When you write char* s = "Hello world"; s will point to a "Hello world" buffer compiled into your code, called a string literal.

If you want to make a copy of that string, you'll have to provide a buffer, either through a char array or a malloc'ed bit of memory:

char myCopy[100];
strcpy(myCopy, s);

or 

char *myCopy;
myCopy = (char*)malloc( strlen(s) + 1 );
strcpy(myCopy, s);

The malloc'ed memory will have to be returned to the runtime at some point, otherwise you have a memory leak. The char array will live on the stack, and will be automatically discarded.

Not sure what else to write here to help you...

Depending on the programming language being used, modules are also known as ____ . subroutines, procedures, or methods subroutines, code bits, or methods tasks, functions, or methods procedures, functions, or hierarchy

Answers

Final answer:

In programming, modules are also referred to as subroutines, procedures, or methods. These terms define organized and potentially reusable code sections with a programming language.

Explanation:

Depending on the programming language being used, modules are also known as subroutines, procedures, or methods. These terms represent a way in which code is organized into manageable parts, often with the purpose of reusability and better organization in programming.

A subroutine is a sequence of program instructions that performs a specific task, packaged as a unit. This unit can be used in several different places within a program. A procedure is similar to a subroutine and is often used interchangeably, although in some languages, it refers specifically to a subroutine that does not return a value. Methods are subroutines associated with objects or classes in object-oriented programming (OOP).

Which ssh option should you enter at the command prompt to set up an ssh tunnel for x server traffic?

Answers

The proper command is ssh -x

Typically, a programmer develops a programâs logic, writes the code, and ____ the program, receiving a list of syntax errors.

Answers

"debugs" is the answer

Typically, a programmer develops a program of logic, writes the code, and debugs the program, receiving a list of syntax errors.

What is debugging?

Debugging is the process of locating and fixing any potential mistakes that have already occurred. Software developers use debugging tools to methodically locate and fix computer program flaws, mistakes, and other irregularities as part of routine debugging.

In syntax programs, to get syntax errors, debugging is used.

Basic debugging procedures include:

Recognize the presence of a bug.Find the bug's source and isolate it.Determine the root of the bug.Find a solution to the bug.Test it after applying the fix.

Therefore, a programmer often creates a logic program, writes the code, debugs the program, and then receives a list of syntax mistakes.

To learn more about debugging, refer to the link:

https://brainly.com/question/23527660

#SPJ5

Safety is a concern around electronic equipment of all types. When you see the sign and the symbol shown in the figure above, what particular safety hazard may exist?

A. Laser light
B. Radioactivity
C. High voltage
D. Delicate equipment

Answers

This sign indicates there may be a danger of laser light and you should be wearing eye protection.

_____ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and mp3 players.

Answers

NVRAM or Nonvolatile Memory

Workflow, groupware, and telepresence systems are examples of which network application?

Answers

I hope this is correct

how is the numeric string that makes up a digital signature created?

Answers

A numeric string is created by a cryptographic algorithm, which is called a hash that is used to validity of a message or authenticity of a document. The signature is verified by an algorithm that uses the stated owner of the signature's public key to accept or reject the authenticity of a signature. A certification authority's digital signature is used to verify the authenticity of digital certificates and other documents in a PKI.

A(n) _____ is often used so remote users have a secure connection to an organization’s network.

Answers

VPN ( Virtual Private Network) with or without RSA Token

Answer: Virtual private network (VPN)

Explanation:

Virtual private network(VPN) is defined as a network that is based on internet medium so that link can be established between remote users and private network of any company. The link is created in the form of encrypted connection to make data transmission secure and reliable over the network.It prevents any unauthorized access in internal private network of any company or organization to maintain privacy of data .

When messages to a remote web server are being lost for no apparent reason and you suspect the problem might be a path mtu black hole, which tcp/ip utilities would you not use to diagnose the problem?

Answers

You can use PING to start troubleshooting the problem.

What does limited access to a document mean?

Answers

Limited access to a document usually means that the creator of the document is able to limit how much access one person is able to get.

A user who has limited access is not able to change permissions to a document to which they should have full control of. It enables the user read the document but not edit it. One way to limit access to a document is to restrict editing permissions before you send the document to other people. This will prevent them from editing and confidential information.

How can you prove that the web server (iis) role is installed on the server?

Answers

I'm sure the answer is not what you are looking for, but from many years of personal experience the simplest way is to drop to a command prompt and do a net start - this will give you a list of all the running services. Alternatively, you can run WIN+X and run services.msc and check if the World Wide Web Service is there and running. You can also try to connect to the server via its server name, If IIS is installed the Default page should at least come up, otherwise you might get a 404 or 500 error message indicating something is wrong with the setup.
There are many more way to do this but hopefully this will suffice.

A page containing an outline of the entire site and its content, called a(n) ____, can be supplied to users.

Answers

The answer to this question is a site index.  A site index is also known as a site map where in the users can access a certain list of pages of a certain website. The two types of site index are HTML index and an XML index.  

A field in an access database table that has no value is determined by access to have a ____ value

Answers

A field in an access database table that has no value is determined by access to have a null value

To concatenate s1, s2, s3, and s4, you write ________.

Answers

I would say that since concatenate is to link things together in a chain or series I would write this series as s1+s2+s3+s4. In other words, the + sign would indicate the links between the individual items which together would make a chain.
According to Standard C, the statement
s1 = strcat(s1, s2) will concatenate string s2 to s1. That is, s2 will be appended to the end of  s1.

Therefore, to concatenate s1, s2, s3, and s4, write
s1 = strcat(s1, (strcat(s2, strcat(s3, s4))))
and the result will be stored in s1.

________ is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of them.

Answers

MITM (=Man In The Middle). Even cryptographically secure key exchange algorithms are not safe against a MITM. To prevent MITM, both sides have to have some secret by which they can prove they're 'real', or you need an external trusted party (like a certificate authority) that can vouch for them.

"in an attempt to secure his wireless network, bob turns off broadcasting of the ssid. he concludes that since his access point requires the client computer to have the proper ssid, it would prevent others from connecting to the wireless network. unfortunately, unauthorized users are still able to connect to the wireless network. why do you think this is possible?"

Answers

This is possible because all access points come with the default SSID that the manufacturer sets. This SSID is unique to the manufacturer.

You have implemented nap with dhcp enforcement, so you need to ensure you have an updated anti-virus software package, an updated anti-spyware package, and the newest security patches. which servers do you need to set up as remediation servers and why?

Answers

There are several solutions for Anti-Virus such as McAfee ePolicy Orchestrator, Symantec endpoint protection. On the OS Side, Windows has a free WSUS Server that manages Windows Microsoft Patches. Also, SCCM and SCOM are good solutions.

It's safe to download files from the internet if you perform regular windows security undated; that is all you need to protect your computer from viruses

Answers

No, Microsft recommends you purchase and install a Virus Protection  Program despite having its own free version Microsoft Security Essentials. If you notice on any new computer, usually McAfee/Trend or any other Virus Protection program is preinstalled and active for a few months. There are pretty good free versions out there, Total AV and PC Protect are very good and have high rankings.

Final answer:

Regular Windows security updates are crucial but not the sole measure to protect against viruses; antivirus software and safe browsing habits are also needed. Upgrading Windows may be needed for compatibility with newer files.

Explanation:

The question concerns whether performing regular Windows security updates is sufficient to protect a computer from viruses when downloading files from the internet. While keeping your Windows operating system up to date is crucial for security, it is not the only measure you should take to protect your computer. Antivirus software, safe browsing habits, and a firewall are also essential components of a comprehensive security approach.

Furthermore, the concept of planned obsolescence addressed in the provided information speaks to a different issue related to software compatibility rather than virus protection. Upgrading your Windows operating system may be necessary to maintain compatibility with newer files, but it is a separate concern from the question of safety in downloading files.

You're working at a large industrial plant and notice a tag similar to the one shown in the figure above. Which of the following actions should you take?

A. Operate this switch only if more than 24 hours have elapsed since the tag was signed.
B. Operate this switch only after making certain no one is working on the affected circuit.
C. Operate this switch only after normal working hours.
D. Operate this switch only after getting permission from the person who signed the tag.

Answers

Hey there!

Even if there isn't anyone working on the circuit at the moment, it still may be exposed and activating it could cause a variety of problems. This means that whoever is present or whatever time you would activate the circuit is irrelevant as the switch should only be thrown after permission is given. 

Logically, you would need permission from whoever ordered against throwing the switch in the first place, which should be the person who signed it. I believe that your answer will be "Operate this switch only after getting permission from the person who signed the tag", which is D. 

Hope this helped you out! :-)

________ is/are used to display information on the computer's screen.

Answers

cout objects are used to display information on the computer's screen.

Network signaling is a function of which layer of the osi model

Answers

Network signaling is a function of the Network (1) Layer of the OSI model.

But this time use 16 kib pages instead of 4 kib pages. what would be some of the advantages of having a larger page size? what are some of the disadvantages?

Answers

Here are the advantages and disadvantages of larger paper size: 

Advantages: 

Reduces minor page faults. 

Disadvantages: 

There will be a decrease in the number of frames. 

There will be an increase number of page faults. 

Waste of more space with the internal fragmentation.

A ____ dynamic volume can only be created with three or more dynamic disks. raid 1 raid 5 raid 5i raid 23

Answers

The answer is Raid 5 and 23

when performing conflict management, it is important to identify your;
net worth
benefits
costs and rewards
goals

Answers

The goal of the conflict management is to limit the negative effects of a conflict. Some of the strategies used in conflict management are: Accommodating , forcing, compromising, collaborating. When performing conflict management it is important to identify your benefits. Benefits are the positive aspects that arise from the conflict. 

"what protocol is commonly used to request configuration files from another computer â"

Answers

What protocol is commonly used to request configuration files from another computer" Answer TFTP

Difference between alt tab and windows tab

Answers

Alt+Tab switches between windows instantly while Windows+Tab displays all currently active windows.
Hope this helps :D
Other Questions
The Roman author Quintilian said, Art was inspired by nature, a work of art differs from nature because an artist will transform nature into art. Examine the painting below by Katsushika Hokusai entitled, The Great Wave of Kanagawa. Explain how the artwork relates to Quintilians famous quote, including the artists technique(s) and inspiration(s). Which lines are Parallel? Justify your answer Which of the following events occurred between 1915 and 1935? A.Europe was involved in World War II. B.The transcontinental railway was completed. C.Economic prosperity followed World War I. D.President McKinley was shot; he was succeeded by Theodore Roosevelt. A square has an area that is less than 100m^2. What is a reasonable range for the graph of the squares side What factor causes southeast asia's role in climate change to be larger than it appears at first glance? What made Standard Oil a horizontal integration monopoly?It controlled all aspects of oil production.It owned ninety percent of US oil refineries.It formed a trust.It operated all across the United States. What is the nx bit and which form of the buffer overflow attack does it protect against? Which country is contributing the least to the exponential growth of the human population? Today only, a table is being sold for $333 . This is 74% of its regular price. What was the price yesterday? Point C is the center of the circle. The measure of angle ACB is 12x 7. Arc AB measures 10x + 7. Find the value of x. You dissolve 4.5 mol of potassium hydroxide to make a 2 L solution. What is the molarity of the solution? prepare slogan reflecting universal brotherhood Monette has posted over 100 book reviews on discussion forums. she also frequently reviews products and services and posts her reviews on local restaurants on review sites. as a social media user, monette would best be characterized as a _____. If people constantly ask you to repeat a statement, your _______ of speaking may be too fast. A. volume B. pitch C. rate D. tone Annie found that 57 students in her school knew French and 23 of those students knew Spanish, as well. There were 11 students who did not know French but knew Spanish. There were 4 students who knew neither French nor Spanish. Which table best summarizes the data collected by Annie? Knew SpanishDid not know SpanishTotalKnew French573491Did not know French11415Total6838106 Knew SpanishDid not know SpanishTotalKnew French123446Did not know French11415Total233861 Knew SpanishDid not know SpanishTotalKnew French233457Did not know French11415Total343872 Knew SpanishDid not know SpanishTotalKnew French233457Did not know French41115Total274572 Hi!! First answer gets Brainliest! :)How have the following affected settlement, trade, and government in Costa Rica?-Land features-Water features-Climate-Location-Natural resources-IndustriesI know that this is kind of a weird question, but all answers are greatly appreciated!! Who became the first african american supreme court justice in 1967? Line graphs are useful for seeing trends. How do you explain a line graph that goes up and down? PLS HELP ASAP WILL MARK BRAINLIEST!Question 3(Multiple Choice Worth 2 points)(6.02 MC)Innovative ideas may someday lead to a new way of addressing significant marine issues. Which of the following should be considered when evaluating the costs and benefits of a new innovative process?Cost to buildEffort and time to implementMaintenance and recurring costs I and II only I and III only II and III only I, II, and III Question 4(Multiple Choice Worth 2 points)(6.02 LC)Which of the following factors would best contribute to a measurement of environmental quality? Average temperature Water clarity Salinity levels Average speed of sound Question 5(Multiple Choice Worth 2 points)(6.02 MC)Two new products are competing for grant money, with the goal of cleaning up the marine environment. Each product removes plastic from the ocean. Product 1 can be used in the open ocean and requires monitoring once every three months to retrieve collected plastic. Product 2 is designed to be used in harbors and marinas and requires monitoring once per week to retrieve collected plastic. If all other costs and benefits are equal, which of these products would you recommend for the grant? Product 1 because it requires less monitoring, reducing the overall cost Product 1 because it is presumed to be more effective at removing plastic Product 2 because it would provide more job opportunities for local people Product 2 because it would probably last longer in marinas than in the open oceanQuestion 6(Multiple Choice Worth 2 points)(6.02 MC)Which of the following best describes the relationship between human population size and resource use? Countries with high populations are likely to use more resources. Countries with high populations are likely to use fewer resources. Countries with low populations are likely to use more resources. There is no correlation between population size and resource use. b. Briefly explain ONE reaction Native Americans to European policies Steam Workshop Downloader