Guys can anyone tell me answer from this photo Get Branilliest

Guys Can Anyone Tell Me Answer From This Photo Get Branilliest

Answers

Answer 1

Answer:

1. A computer itself

2.I don't no


Related Questions

What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?

Answers

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

monitor is hard copy output device??
false
true​

Answers

Answer:

false

Explanation:

monitor is an output device but not hard copy. Hard copy is paper

Still giving out the brainly thing :)
just answer its as simple as that and you get points :)

Answers

Answer:

The answer to that my friend, Is 0 :D

Explanation:

Answer:

4/4

Explanation:

A specialized output device for producing charts, maps, and very high-quality drawings is

A. Printer
B. Plotter
C. Scanner
D. OMR​

Answers

Answer:

B- plotter

Explanation:

because it's designed to produce high quality graphics.

A specialized output device for producing charts, maps, and very high-quality drawings is plotter. The correct option is B.

What is plotter?

Plotters are also known as large-format and wide-format printers. They were the first output devices capable of printing high-resolution continuous lines, text, and images in color.

It also aids in generating graphics and full-sized engineering drawings. Plotters cost more than traditional printers.

It interprets computer commands and draws line drawings on paper with multicolored automated pens using plotters. It can generate graphs, drawings, charts, and maps, among other things.

Plotters are used in a wide range of construction and MCAD applications, such as technical drawings, maps, orthophotos, and renders.

Plotter is a specialized output device used to create charts, maps, and very high-quality drawings.

Thus, the correct option is B.

For more details regarding plotter, visit:

https://brainly.com/question/20904644

#SPJ2

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing

Answers

Explanation:

denial of service attacks (dos)

Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

What is Electronic jamming?

This is known to be a kind of  electronic warfare that is the use of jammers that shows interfering signals toward an enemy's system and thus it often blocks the receiver.

Therefore, Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

Learn more about jamming from

https://brainly.com/question/17488276

#SPJ9

what is the main theme of The hundred dresses​

Answers

Explanation:

The main theme of The hundred dresses is about the act of forgiving someone's mistake. i hope so

The main theme of The Hundred Dresses is that we should never judge someone by their name, looks or status. This theme is presented through a Polish immigrant in America, who is bulied by the other girls of her class because she had a "strange" name and she was poor, but then she surprises everyone by her drawing skills.

An attacker, acting as a postal worker, used social engineering tactics to trick an employee into thinking she was legitimately delivering packages. The attacker was then able to gain physical access to a restricted area by following behind the employee into the building. What type of attack did the attacker perform? Check all that apply.

Answers

Answer: Deception

Explanation:

Pretty straight forward...

The attacker was then able to gain physical access to a restricted area by following behind the employee into the building, this type of attack is tailgating attack. The correct option is B.

In order to trick a worker, the assailant used a tailgating attack in which they pretended to be a postal worker.

The attacker tricked the employee into granting access to a restricted area by putting on the appearance of a real package delivery.

This type of physical intrusion gets over security precautions and takes advantage of public confidence.

In contrast to digital attacks, a tailgating attack takes use of human weaknesses, hence it is essential for organizations to place a high priority on staff awareness and training to reduce such dangers.

Thus, the correct option is B.

For more details regarding Tailgating attack, visit:

https://brainly.com/question/34195547

#SPJ3

Your question seems incomplete, the probable complete question is:

An attacker, acting as a postal worker, used social engineering tactics to trick an employee into thinking she was legitimately delivering packages. The attacker was then able to gain physical access to a restricted area by following behind the employee into the building. What type of attack did the attacker perform? Check all that apply.

A) Phishing attack

B) Tailgating attack

C) Denial of Service (DoS) attack

D) Man-in-the-middle attack

E) Brute force attack

What does this mean

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

A person is asking you not to use those words/sentences here because it hurt their feelings

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as

Answers

Answer:

Reconnaissance

Explanation:

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem using a well-defined algorithm B) Computer programs try to solve poorly-defined problems using well-defined algorithms C) Computer programs try to solve well-defined problems using poorly-defined algorithms D) Computer programs try to solve math problems using only plain English

Answers

Explanation:

A) computer programs generally try to solve hard problems in a few seconds and makes us easy to learn

An objective of the __________ is to provide a standardized set of I/O interface routines to user processes. Select one: a. working directory b. file management system c. indexed file allocation d. file directory Clear my choice

Answers

Option b (file management system) is used to provide a set of input/output interface.

A software package that focuses on providing numerous user-friendly features including productivity applications as well as file manipulations, respectively, would be termed as the file management system.

The other given alternatives such as:

Option a (Working directory) - The directory users are functioning in at present.Option c (Indexed file allocation) - The techniques of assignment dictate how documents have been saved on a disc.Option d (File directory) - A file storage place on your desktop.

These options are not connected to the given question. Thus the above answer is the correct one.

Learn more about the file directory here:

https://brainly.com/question/2170165

What combination of keys will autofill highlighted cells to the right?

Answers

Answer:

it is Ctrl+R            

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?

Options are :
A. Enable the host-based firewall on the Internet server
B. Enable HIPS to protect the server until the patch is released
C. Utilize WAF to restrict malicious activity to the Internet server
D. Downgrade the server and defer the new feature testing

Answers

Answer:

i think its C. Utilize WAF to restrict malicious activity to the Internet server

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario

Answers

DDoS hope this helps :3

who was the first person to invent computer​

Answers

Answer:

Alan Turing

Explanation:

If we're speaking modern terms, I would say Alan Turning

what is communication?
What is telecommunications?
what do you mean by model of transmission?

Answers

Communication network requires certain components such as sender, receive,data protocol and medium

telecommunications the message such as text , audio , video through electronic media in the from of electronic signals

The direction of communication from sender to receiver and vice versa

[tex] \huge \bold \blue{AnSweR}[/tex]

Communication is the act of giving, receiving, and sharing information -- in other words, talking or writing, and listening or reading. Good communicators listen carefully, speak or write clearly, and respect different opinions.

The transmission of information, as words, sounds, or images, usually over great distances, in the form of electromagnetic signals, as by telegraph, telephone, radio, or television.

The transmission model of communication describes communication as a one-way, linear process in which a sender encodes a message and transmits it through a channel to a receiver who decodes it.

Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.

Answers

Answer

Wash your hands thoroughly before using the computer.

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

Group of programs are software ​

Answers

Answer:

No

Explanation:

a single program or application is a software

Answer:

False

Software categories are groups of software. They allow software to be understood in terms of those categories, instead of the particularities of each package.

Other Questions
Instructions: Determine whether the following polygons aresimilar. If yes, type in the similarity statement and scale factor. Ifno, type 'None' in the blanks. If you had to pick one invention being the most important in history, which would you pick? Translate into an algebraic expression and simplify if possible: How far have i travelled if i biked at 10mph for h hrs, i walked 3mph for twice as long as i biked, and ran at 10 mph for one quarter as long as i walked?(Please help ASAP) Vertical plane R intersects horizontal plane P. Points D, and B are on the line of the intersecting planes. Point F is on the top half of plane R. Point G is on the bottom half of plane G. Point C is on the left half of plane P. Point E is on the right side of plane P. There is a line formed between points C and E. Point H to above and to the right of the planes. Point L is below and to the left of the planes.The intersection of plane R and plane P is.Point is not on plane P.Line C E and Line D B intersect at point . traders fix the price of cosmetic items 30% above the cost price when he sold an item at 25% discount there was a loss of Rs 15 find the cost price and marked price of the item define amplitude & period of the particle performing linear S.H.M where is the United States governmentgoing right onwrong when it comes to providing an equitable system of government for theAmerican people and the people (immigrants, foreign visitors, etc.) residing within itsborders? help fast pleaseefind the unit rate for Dion and Emily who read faster? Dion: 36 pages in 3 days emily: 45 pages in 5 days 36 pages__________= ? pages per day. 3 days 45 pages _________=? pages per day. 5 days deon read _____ pages per day than emily. The language of leaders Unit test? Im on my second try :( In developing nations, the (1) _____ of food is the primary cause of malnutrition. Famine, drought, war, and (2) ____________ systems of food distribution contribute to the (3) ________ problem of world hunger. Many countries have little or no reserves of (4) _______ land or water: in addition, some, such as Bangladesh and other Southeast Asian nations, cannot afford to buy food from other countries. Some countries have enough resources to grow food but governmental (5) ________ of agriculture and poor policy decisions have resulted in (6) _______ diets.In addition to (7) _______ disorders, there are certain diseases that contribute to malnutrition by (8) _______ with the body's (9) ________ or utilization of (10) ______ .1. A. availability B. available C. inavailability D. unavailability2. A. reliable B. unreliable C. reliant D. reliance3. A. ongoing B. going C. outgoing D. gone4. A. fertility B. fertilize C. fertile D. fertilized5. A. neglectful B. neglect C. neglectfulness D. neglecting6. A. adequate B. inadequate C. unadequate D. inadequate7. A. dietetic B. dietary C. dietarian D. dietetics8. A. interfering B. interfere C. interfered D. being interfered9. A. absorptive B. absorbed C. absorption D. absorbent10. A. nutrients B. nutrition C. nutritious D. nutritionist write any four social rules of your society. 2.three vertius of sect. A B C D are A (2, 2), B (-3,2), ((Plot those point and find the quad of D and find the areaof dood. ABCD. The farmer felt ___________ when he knew his chicken laid a gold egg. (excite) *Dont put your dirty shoes on the shelf, Betty said Peter. --> Peter told ............. *Mr. Khanh said You should give your son a dictionary, Ms. Loan. --> Mr. Khanh asked Ms. Loan ........... *That young man is very generous. He always helps the poor, the old and the handicapped. (enough) --> That young man.......... *Our close friend, Tuan Minh usually told us his joke. --> Our close friend, Tuan Minh used ......... *Without saying anything to us, she left _____________. (sudden ) *Hard work always brings ______________. (succeed) *The man behaved foolishly towards his chicken.--> The man had a ....................... essay about you cannot come for cricket practices as you have sprained your leg . write a note to your friend explaining the reason for not coming . PLS HELP ME ON THIS QUESTION I WILL MARK YOU AS BRAINLIEST IF YOU KNOW THE ANSWER!! What I got to do please Title Before you even think about reading thepoetry or trying to analyze it, speculate on whatyou think the poem might be about based uponthe title. Often time authors conceal meaning inthe title and give clues in the title. Jot down. Whatyou think this poem will be about...(Ozymandias)TPCASTT PLS HELP ME ON THIS QUESTION I WILL MARK YOU AS BRAINLIEST IF YOU KNOW THE ANSWER PLS GIVE ME A STEP BY STEP EXPLANATION!!Which of the following statements is true?A. A data set will always have exactly one modeB. A data set can have multiple modesC. A data set will always have at least one modeD. A data set will never have a mode Find the sum of the geometric sequence. 1, 1/2, 1/4, 1/8, 1/16. Alice, Bob, and Carol play a chess tournament. The first game is played between Alice and Bob. The player who sits out a given game plays next the winner of that game. The tournament ends when some player wins two successive games. Let a tournament history be the list of game winners, so for example ACBAA corresponds to the tournament where Alice won games 1, 4, and 5, Caroll won game 2, and Bob won game 3.Required:a. Provide a tree-based sequential description of a sample space where the outcomes are the possible tournament histories. b. We are told that every possible tournament history that consists of k games has probability 1/2k, and that a tournament history consisting of an infinite number of games has zero prob- ability. Demonstrate that this assignment of probabilities defines a legitimate probability law. c. Assuming the probability law from part (b) to be correct, find the probability that the tournament lasts no more than 5 games, and the probability for each of Alice, Bob, and Caroll winning the tournament.