Answer:
Trackpoint
Explanation:
A trackpoint is a joystick type of control meant to be used in moving the pointer like the mouse, it was invented by IBM and made it commercially available in 1992, even though the trackpoint is not seen on new laptops but it still exists on some laptops like the Lenovo Thinkpad series.
The disadvantage of the trackpoint is that it provides less accuracy.
Wayne works for a large law firm and manages network security. It’s common for guests who come to the law firm to need to connect to the WiFi. He wishes to ensure that he provides maximum security when these guests connect using their own devices, but also seeks to provide assurance to the guests that his company will have minimal impact on their devices. What is the best solution?
Answer:
C) Dissolvable NAC agent
Explanation:
Network Access Control systems can perform a health check on devices to make sure they meet minimum security standards prior to connecting. Permanent NAC would have an impact on visitor devices; agentless NAC has less impact and COPE devices aren’t possible to give to guests.
Which sentence follows all punctuation and capitalization rules?
A. Marios book, the money market, went on sale September 5, 2008.
B. Mario's book, The Money Market, went on sale September 5, 2008.
C. Marios book, The Money Market, went on sale September 5, 2008.
D. Mario's book, the money market, went on sale September 5, 2008.
Answer:
B. Mario's book, The Money Market, went on sale September 5, 2008.
To move or copy a range of cells, select the correct order:
1. Move the pointer over the border of the selection until the pointer changes shape.
2. Select the cell or range you want to move or copy.
3. To move the range, click the border and drag the selection to a new location, or to copy the range, hold down the Ctrl key and drag the selection to a new location.
Answer:
Correct Order
2. Select the cell or range you want to move or copy.
1. Move the pointer over the border of the selection until the pointer changes shape.
3. To move the range, click the border and drag the selection to a new location, or to copy the range, hold down the Ctrl key and drag the selection to a new location.
Explanation:
To move or copy range of cells in MS Excel, You first select the cell/range you want to move or copy, hover the mouse pointer and take note when it changes shape, then finally click the border (when you noticed the change of shape of the pointer) and hold down the ctrl key and drag it to the destination location.
To move or copy a range of cells, select the range, hover over the border so the cursor changes shape, and then drag to the new location with or without holding Ctrl for copying. Utilizing Excel's features like cherry-picking for non-contiguous cells and AutoFill for formulas enhances productivity and accuracy.
Explanation:To move or copy a range of cells in applications like Microsoft Excel, you should follow these steps:
Select the cell or range you want to move or copy.Move the pointer over the border of the selection until the pointer changes shape.To move the range, click the border and drag the selection to a new location. To copy the range, hold down the Ctrl key and drag the selection to a new location.Selecting non-contiguous cells can be done by clicking the first cell, holding down the Ctrl key, and clicking each additional cell you want to include. This method, known as "cherry-picking" cells, allows for flexibility in selecting a range that is not adjacent. Similarly, utilizing keyboard shortcuts like Ctrl+A can select the entire worksheet while the Ctrl key can also help in selecting non-adjacent rows or columns.
To perform actions like cut, copy, and paste, Excel utilizes the Clipboard, where data is temporarily stored when it is cut (using Ctrl+X) or copied (using Ctrl+C). You can then paste the data (using Ctrl+V) to the desired destination. Taking advantage of Excel's AutoFill feature can save time when copying and pasting formulas, which updates relative cell references automatically.
When performing data analysis or formatting, it's important to first highlight the correct data range. It should be noted that blank rows and columns in a dataset can affect the auto-selection of a data range in Excel for tasks such as sorting.
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address? a. static IP addressing with incomplete information b. interference from surrounding devices c. reduced computer power supply output d. unreachable DHCP server
Answer:
Option (D) is the right answer.
Explanation:
DHCP term used as a short form of dynamic host configuration protocol, which is used to assigns the IP address automatically according to the network.
According to the scenario, the system is getting the wrong IP address that resulting in internet disconnection which is a failure of the DHCP server because it is responsible for assigning the right IP address to the system.
Hence option (D) is the most appropriate answer.
While other options are wrong because of the following reasons:
Static IP is the type of IP address which is fix and doesn't change in the system after rebooting, hence it has no connection in the change of IP address. If the DHCP server is working well there is no chance of interference from the surrounding device. Network setting has no connection with computer power supply as SMPS is used to give power and boot system only.Final answer:
The computer has been assigned an APIPA address, indicating it couldn't reach the DHCP server. The correct cause is an unreachable DHCP server, causing the computer to self-assign this IP address.
Explanation:
When a computer is assigned an IP address such as 169.254.100.88, this is known as an Automatic Private IP Addressing (APIPA) address. It generally means that the computer has failed to obtain an IP address from the Dynamic Host Configuration Protocol (DHCP) server. Common causes of this issue could include network configuration errors, DHCP server failure, or the absence of a DHCP server on the network. APIPA addresses are self-assigned by the computer when it is configured to obtain an IP address automatically and cannot reach the DHCP server.
In this case, the correct answer to what could cause a computer to get such an IP address is d. unreachable DHCP server. This scenario typically does not involve interference from surrounding devices, static IP addressing, or a reduced computer power supply output.
A _______ is a host that runs software to provide information, sucha s web content, to other hosts.
Answer:
Server
Explanation:
Servers are used to house information from websites to video games.
A user reports that an application crashed. The technician tries a few other applications on the PC and finds that none of them start normally or that they crash soon after being launched. What is a possible cause of the problem?
The possible cause of the problem on application keep on crashing in user's PC lies on the computer's operating system.
The computer's operating system performs automatic updates (sometimes being set into manual updates). Either way, updates can cause applications to crash if it is being installed wrongly. Sometimes due to slow internet connection, updates get paused and will cause problems in your computer. You can apply the following steps to fix applications that keep on crashing:
Make sure the operating system updates are installed correctly. You can take a look at your system configuration, (in Windows 10, you can see it at system settings > Windows Update Settings), there are updates list that you can see and you can choose either you will stop, reinstall and continue the updates. You need to execute a clean boot. You will need a third party tool to try this method. You need to back up your data and perform system restore to the last OS version installed in your computer that functions well. You can select this method if you want to undo the system update and would just like to use your computer in it's last best state.A virus infection on the computer could be the source of the problem.
Some computer viruses are designed to damage your computer by destroying files, corrupting applications, or reformatting the hard drive. Others just clone malware or flood a system with traffic, rendering all internet activity impossible.
There are various ways for a computer to become infected with a virus, the majority of which involve downloading malicious files, either purposefully or unwittingly. Pirated music or movies, photographs, free games, and toolbars, as well as malware emails with files, are all prominent offenders.
Learn more:
https://brainly.com/question/24382507?referrer=searchResults
Where would be the most likely place to find the keyboard combination used to toggle a keyboard backlight on or off?
In the keyboard manual
It is always Ctrl + Page Up
On the side of the keyboard
Under the keyboard
Answer:
In the keyboard manual
Explanation:
A manual is the document that is provided along with the devices or machines to learn about different functionalities and operations. As different model of devices and machines have different operations and functions, that may have different manuals.
Laptop have different brands and all brands have some different keyboard functionalities so they provide their users manuals for their device. We can turn off or on the key board light by reading key board manual. Because different model of laptops have different keys combinations for this particular purpose.
What kind of printer is used with multipart forms such as those with point of sale machines?A) dot-matrixB) daisy-wheelC) inkjetD) color
Answer:
The answer is "Option A".
Explanation:
The Dot matrix printer is also known as an impact matrix printer. It is a multi-part form printer because it prints data on paper. This printer uses a hammer and a ribbon printer, that shapes pictures from dots. and other options are not correct, that can be described as follows:
In option B, daisy-wheel printer prints data on printer only one side that's it is not correct. In option C, the Inkjet printer is capable to print data in multi-part forms, but this printer does not data in continuous forms. In option D, the color printer allows you to print data in color format like images, graphs, and banner. It prints data only on one side, that's why it is not correct.A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-specified hash result or (b) two data objects that map to the same hash result. a. cryptographic hash function b. strong collision resistance c. one-way hash function d. compression function
Answer:
a. cryptographic hash function
Explanation:
A cryptographic hash function is a hash function that is suitable for use in cryptography. It is a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size and is a one-way function, that is, a function which is practically infeasible to invert.
The answer is a. cryptographic hash function, which is designed to produce a unique, fixed-size hash for any given data input and possesses properties crucial for ensuring data security and integrity.
Explanation:The correct answer to your question is a. cryptographic hash function. A cryptographic hash function is designed to take an input (or 'message') and produce a fixed-size string of bytes that is typically a digest that is unique to the specific input. This type of hash function possesses several important properties which are crucial for cryptography:
The output (hash value) for a particular input is always the same, ensuring consistency (Property 1).Given a hash value, it is computationally infeasible to determine the original input (Property 2).It is highly unlikely to find two different inputs that produce the same hash value, known as collision resistance (Property 3).A minor change in the input leads to a significant change in the resulting hash, a characteristic known as the avalanche effect (Property 4).These attributes make a cryptographic hash function a fundamental tool in the field of cybersecurity, data integrity, and digital forensics.
Instead of using fonts located on your web server in your web pages, many companies that create and license fonts enable you to link to fonts on their web servers. To do so, you add an additional link element to your HTML file using a web address provided by the host as the value for the ____ attribute.
Answer:
The correct answer is href attribute.
Explanation:
It is a type of HTML attribute used to speifies the URL (Uniform Resourse Locator) of the page the link goes to or it links to the differnt part of the same page. <a> (anchor) tag is used to create a link and defines as a hyperlink.
The href can be based on the following elements such as :
<area><link><a><base>For example :
[tex]<a href\text{=}"links address/">Visit google</a>[/tex]
so href is the attribute used by the many companies that created and license fonts enable you to link to fonts into web servers.
Phil wants to add a new video card, and he is sure the power supply is sufficient to run the new video card. But when he tries to locate the power connector for the new video card, he does not find a 6-pin PCI-E power connector. He has several extra cables for hard drive power cables from his power supply that he is not using.What is the least expensive way for Phil to power his video card?
A. Use a SATA to 6 pin PCI-E adapter.
B. Change the dual voltage option.
C. Purchase a new power supply.
D. You will not be able to add the video card to the system
Answer:
A. Use a SATA to 6 pin PCI-e adapter.
Explanation:
SATA cables or connectors, also known as serial ATA, are usually meant for installing optical drives and hard drives. Unlike its counterpart (PATA), it is much faster in speed and can hot swap devices, that is, devices can be installed with shutting down the system.
PCIe are extension adapter cables in PC, used for the purpose of connecting peripheral devices like video cards, networt card etc.
A SATA to PCIe adapter cable can be used to power the video card to be installed. It is cheaper and faster than other options.
This is the most flexible way to create a query. Used to create queries that displays only the records that match criteria entered in the Query Design view.
Answer:
Query Wizard
Explanation:
We can use the Query Wizard to automatically create a selection query, but in this case, we have less control in our details of the query design, it's the fastest way to create a query, even detect some design errors.
Steps to use the Query Wizard
1) In the Queries group on the Create, click Query Wizard
2) Add fields
3) On the last page of the wizard, add a title to the query
Identify a Hypertext Markup Language (HTML) embedded element that contains programming scripts used to construct bitmap images and graphics.
Answer:
Canvas
Explanation:
HTML5 canvas gives you the power to create drawings using JavaScript, it is used with the <canvas> tag to programmatically make the drawing using JavaScript. Canvas is a feature that came with the HTML version 5 called HTML5. canvas is named from the traditional canvas fine artist use for bringing their artistic ideas into life.
You have been asked to provide an account for an outside consultant, who needs limited access to the network for a very short period of time.
What type of account will you give this person?
Answer:
Guest account
Explanation:
When a consultant is accessing a network for a while and needs limited access to it, A Guest account should be given. This help keep your data and information save both now and in the future.
A guest account is an account with limited access and permission to a network over a specific period of time.
Your friend Luis recently was the victim of identity theft and has asked your advice for how to protect himself in the future. You tell Luis that he should install software that protects network resources from outside intrusions, called a(n) ______.
a. hot spot
b. tracking cookie
c. firewall
d. security scanner
Answer:
Firewall
Explanation:
Firewalls are mainly intended to protect an individual computer system or network from being accessed by an intruder, especially via the Internet. They thus work to prevent sabotage of the system and the theft or unauthorized viewing of private or sensitive data, such as through the use of spyware.
Final answer:
Luis should install a "firewall" to protect against identity theft by serving as a barrier that controls network traffic and prevents unauthorized access to his computer's resources.
Explanation:
To protect yourself from identity theft and ensure the security of your network resources, it's important to install a program known as a firewall. This software acts as a barrier between your computer and the internet, controlling incoming and outgoing network traffic based on an applied rule set. It helps to prevent unauthorized access to your system, which can be crucial for protecting sensitive personal information from cybercriminals.
A firewall is different from programs that monitor Web usage, which may be used in work settings to ensure employees are focused on work-related tasks. While both are concerned with the use of the internet, a firewall is specifically designed to protect against intrusions and hacking attempts.
Dr. Joon asks her students how to insert a table in an Excel workbook. The students record the steps a chart. Which students listed the correct steps?
A: Talia and Roni
B: Adi and Hila
C: Roni and Hila
D: Talia and Adi
Answer:
C
Explanation:
Both Table and Format as Table can be used to create a table
You are expecting an important letter in the mail. As the regular delivery time approaches, you glance more and more frequently out the window, searching for the letter carrier. Your behavior in this situation typifies that associated with which schedule of reinforcement?
Answer:
pigeons are biologically predisposed to flap their wings in order to escape aversive events and to use their beaks to obtain food
Explanation:
Final answer:
The behavior of frequently checking for the mail carrier is an example of a variable interval schedule of reinforcement, where rewards are given at unpredictable time intervals, producing a steady response rate.
Explanation:
Your behavior of glancing out of the window frequently as the regular delivery time approaches is typical of what is known as a variable interval schedule of reinforcement. This schedule provides reinforcement at unpredictable time intervals, leading to a moderate, steady rate of the behavior in anticipation of the reinforcement (in this case, the arrival of the letter carrier).
Unlike continuous schedules where the behavior is reinforced every time, or fixed-ratio schedules where reinforcement is given after a set number of responses, variable interval schedules do not specify when the next reinforcement will be given after the last one, causing the constant anticipation of the reward.
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by what?
Answer:
magnitude and the probability of it occurring
Explanation:
In every single study that involves an individuals risk of self-harm there are two variables that need to be evaluated, and those are the magnitude and the probability of it occurring. In other words how likely is the individual to hurt themselves and if they do, to what extent (physical, emotional, death). By evaluating this can allow you to take action if things get to serious, or even prevent something from happening that can lead that person that is at risk from hurting themselves.
In Windows applications, a ____ control is commonly used to perform an immediate action when clicked.a. text boxb. buttonc. windowsd. forms
Answer:
Option b. button
Explanation:
Button control is one of the most common user controls in Windows application to enable user perform an immediate action when clicked. We can see there might be more than one button controls in a single Window application and each of them can be used to trigger different specific action.
For example, button control can be created to perform a "Submit" or "Login", or "Calculate" action in Windows application. The button click event will trigger a corresponding action to meet a specific purpose.
Multitasking is: Group of answer choices
A. the ability within a program which allows multiple parts or threads to run simultaneously.
B. the capability in an OS which supports a division of labor amoung all of the processing units.
C. a situation in which instructions and data from one area of memory overflow into memory allocated to another program.
D. the capability in an OS which allows two or more tasks, jobs,or processes to run simultaneously.
Answer:
Option (A) and (D) are the correct suitable answer for the above question.
Explanation:
Multitasking is a concept in which multiple events are occurring at the same time. It is a processor power that can able to handle multiple tasks simultaneously in the same unit of time.
Practically, the events are not occurring at the same amount of time but it seems to the user that task is performing simultaneously because of processor switching. In processor switching, the processor switches the task one by one and performs them but it is so fast. Hence the user seems that the task is performing simultaneously.
Another option does not make any sense for the above question because--
Option b justify for the division of tasks not to do multiple tasks in a single unit of time.
Option C justifies the concept of memory allocation.
Given the following declaration of a field in a class: public static final String GREETING = "Hi";
Which of these statements is not true?
a) Each object of this class can access GREETING
b) The value of greeting can’t be changed in any methods
c) Each object of this class has its own copy of GREETING
d) GREETING.length() = 2
e) GREETING.toUpperCase() = "HI"
Answer:
Each object of this class has its own copy of GREETING
Explanation:
option c: Each object of this class has it’s own copy of GREETING
This is the only false statement. When a variable is preceded by the Static key word only one copy of that variable is created, no matter the amount of object created from the instance of that class.
option a: Each object of this class can access GREETING, this is true.
option b: The value of GREETING can’t be changed in any methods, this is true because GREETING is preceded by the keyword final.
option d: GREETING.length() = 2, this is true because the method length() is use to get the length of the string "Hi" which is 2.
option e: GREETING.toUpperCase() = "HI", this is also true because the method toUpperCase() convert all the character of "Hi" to uppercase.
Note: All these are peculiar to java programming language.
Final answer:
Explanation of the incorrect statements regarding the static field declaration in a Java class.
Explanation:
b) The value of greeting can’t be changed in any method: This statement is not true because even though the field is declared as 'final', it can still be accessed and modified using reflection.
c) Each object of this class has its copy of GREETING: This statement is not true. Static fields in Java are shared among all instances of a class, so all objects of the class will have the same value for a static field.
d) GREETING.length() = 2: This is true since the length of the string 'Hi' is 2.
Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense's front end Exchange Server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password. What tool would be best used to accomplish this?
A. SMBCrack
B. SmurfCrack
C. PSCrack
D. RainbowTables
Answer:
RainbowTables
Explanation:
RainbowTables is the best option when the cracker has limited time.
What are three requirements of information technology a. Accuracyb. _______________________________c. _______________________________d. _______________________________2. How much is spent annually on supply chain software?a. $1 billionb. $10 billionc. $100 billion3. Supply chain technology = software a. True b. False4. What activity is creating new demand for RFID technology? a. Store fulfillment of online ordersb. Tracking and delivery of construction materialsc. Hospital patient identification d. Amusement park ticketing5. What will be the next big innovation in supply chain technology?a. Driverless trucksb. Drone deliveryc. In-home 3D printingd. TeleportationLooking Ahead - Episodes 10-12 6.
Answer:
1b. Accessibility 1c. Efficiency 1d. Relevance
2. $10 billion
3. False
4. All of them
5. Drone Delivery
Explanation:
1. Information technology is the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information and it must be accurate, accessible, efficient and relevant.
2. Every year about $10 billion is spent on SCM (supply chain management software).
3. supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual delivery to the end user while software are just virtual tools use in the day to day activities.
4. Every activity mention is creating a new demand for the radio-frequency identification technology.
5. Drone delivery
________________consist of rules that define network security policies and governs the rights and privileges of uses of a specific system.
Answer:
Access control list(ACL).
Explanation:
Access control list(ACL) gives the instruction to the operating system about the network security policies and it also governs the rights and privileges of uses of a specific system.In each operating system, the system object is combined with the access control list. The access control list is a collection of one or more access control entries.
The main advantage of the access control list it provides flexibility in network security.
What does backbone cabling consist of?
Select one:
a. Short length cables with connectors at both ends.
b. It is cabling that connects workstations to the closest data room and to switches housed in the room.
c. The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.
d. The shielded cables that are used for high data transmission rates between an organization and an ISP.
Answer:
Option (C) is the correct answer.
Explanation:
Backbone cabling is a type of structured cabling. As the name suggests it is used to connect equipment rooms, telecommunication rooms, and entrance facilities. These are typically done from floor to floor. It can be a form of UTP cable, STP cable, coaxial cable or fiber optic cable. It gives the facility of interconnection.
Option C also suggests the concept which is used above hence it is the correct answer. while other options are not valid because-
Option "a" states that it is a short length cable, It is a concept of Horizontal Cable.
Option b also states about the concept of Horizontal cable.
Option d states about the shielded cable.
Which of the following peripherals would a company use to take inventory quickly and update price tags for products? (Choose two.)
A. Barcode scanner
B. Label printer
C. Magnetic reader
D. KVM switch
E. NFC device
F. Flatted scanner
Answer:
A and C
Explanation:
Inventory systems are software systems designed to keep track of goods or company assets, to feed in inputs mostly it uses some hardware devices. In a situation where there is a tag placed on the item Barcode scanner or magnetic reader is used to capture the item details and feeds it to the program which in turn, decrements the number of items in-stock, update price and generate report.
You are rolling a toy truck to Tim, and infant, when the truck rolls out of sight. If Tim makes an effort to search for the truck, he is exhibiting:__________.
Answer:
In the given question, Tim is exhibiting object permanence.
Explanation:
Object permanence is the comprehension that an object continues to exist even when it cannot be perceived in any way which means that when object cannot be sensed ( heard,seen,touched).
It is a basic concept of developmental psychology, that deals with the development of young children's social and mental capacities. It was studied and presented by developmental psychologist Jean Piaget . According to Piaget, object permanence is a significant developmental stage in the first two years of a child’s life. Piaget proposed a series of 6 stages which describes when and how object permanence advances during the first two years of life. Children first begin to develop an idea of object permanence at around 8 months old. Other studies shows that this ability begins at a younger age.
What is usually needed to get both a work calendar and a personal calendar to show in the same place on a mobile device?
A plug-in
An add-in
An app
Permission sharing
The Springfork Amateur Golf Club has a tournament every weekend. The club president
has asked you to write two programs:
1. A program that will read each player’s name and golf score as keyboard input, and then
save these as records in a file named golf.txt. (Each record will have a field for the
player’s name and a field for the player’s score.)
2. A program that reads the records from the golf.txt file and displays them.
Answer:
The Python code is given below for each question.
Explanation:
1:
if __name__ == '__main__':
f = open('golf.txt', 'w')
n = int(input("Enter number of players:"))
for i in range(n):
name = input("Enter name of player number " + str(i + 1) + ":")
score = int(input("Enter score of player number " + str(i + 1) + ":"))
f.write(name + "\n" + str(score) + "\n")
f.close()
2:
try:
with open('golf.txt') as r:
lines = r.readlines()
for i in range(0, len(lines), 2):
print("Name:", lines[i].strip())
print("Score:", lines[i+1].strip())
print()
except FileNotFoundError:
print("golf.txt is not found!")
Final answer:
The question involves writing two programs for the Springfork Amateur Golf Club: one to save each player's name and golf score to a file, and another to read and display these records from the file, illustrating the use of file input and output in programming.
Explanation:
Creating and Reading Golf Tournament RecordsThe request involves two primary tasks related to file input and output in programming: creating a file to store records and reading from that file to display the records. This practice is essential in developing applications that need to persist data across sessions. By understanding how to implement both tasks, students will gain valuable insight into how software applications manage data.
Program to Save Player RecordsThis program should prompt the user for player names and scores, creating a record for each and writing these records to a golf.txt file. It's important to handle file operations carefully to avoid data loss or corruption. Each record would ideally have separate fields for the player's name and score, ensuring structured data storage.
Program to Display Records from FileThe second program will read the records stored in the golf.txt file and display them. This task involves opening the file in read mode, iterating over each line (assumed to represent a record), and parsing the line into its component fields to be displayed. Such a program demonstrates reading from and interpreting external data sources.
The Personnel Security Management Network (PSM Net) requires the use of an entity called a_______.
Answer:
The answer is "SMO".
Explanation:
SMO stands for Security Management Office, it is also known as PSM Net(Personnel Security Management Network). This is a term based on security partnerships with groups of entities rather than divisions or orgs.
It assigns the SMO to the categories of persons for which they are responsible. It enables SMO Safety Managers to take safety precautions, monitor and receive notifications from their employees.