Answer:
A. True.
Explanation:
Web analytics is a skill that employs data analytics to analyze the web data generated by web users to decision business decision and adjustment on the business website.
For a web developer to keep tracks for the user logs created by user visiting the website, they design trackers called web beacons.
Web beacons are web elements or components (normally not visible or small graphic tools like buttons) that are used to keep track of user online behavior.
The function of the file server is to : 1. store data and software programs that can be used by client computers on the network. 2. manage all printing requests from clients on the network. 3. transfer e-mail messages to other servers on the network. 4. store HTML documents for an Internet or intranet web site. 5. coordinate the communication of client and servers on the network.
Answer:
1. store data and software programs that can be used by client computers on the network.
Explanation:
Answer:
its D
((((((routers, which direct the data to the correct destination.))))))
One of the managers in your organization has seen older servers crash because of one malfunctioning program. What feature in Windows Server 2016 can help prevent this from happening?
Answer:
Privileged mode for the kernel is the correct answer.
Explanation:
In the following statement, It is the feature of the Ms Windows Server 2016 that helps the manager of the company to see the following earlier servers that crash when program is malfunctioning. The following privileged mode feature helps the manager to prevent this from occurrence. That's why the following answer is correct.
Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and features? A- Static IP addresses have been configuredB- Administrator has a strong passwordC- Security updates are current
Answer:
A. Static IP address have been configured.
Explanation:
A network is an interconnection of network devices for communication to occur. A network comprises of end devices and intermediate network devices.
End devices are the sources and destinations of data transmission, while intermediate devices are the devices that makes communication of data possible like routers and switches. Examples of end devices are servers and workstations (computers, smartphones etc.).
A server in a network is a device that provides special services to workstations or clients. The IP addresses of servers must be known, that is, a static IP address must be configured on a server. Examples of server protocols are DNS, TFTP, FTP, DHCP etc.
What is the output of the code snippet given below?string s = "abcde";int i = 1;while (i < 5){ cout << s.substr (i, 1); i++;}a. no outputb. abcdc. abcde d. bcde
Answer:
The answer is "Option d".
Explanation:
In the given C++ program code, two-variable is defined, that is "s and i", in which variable s is a string type that holds a value, that is "abcde", and variable i is an integer type, that holds a value '1'.
In the next line, a while loop is declared, that uses integer variable which value is less than 5, inside a loop a substring function is used, that specifies the number of character and return its value. In array and string indexing starts from 0, and that variable i starts from 1, that is used in substring function, that's why it will print only "bcde".If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added terms as material alterations. a. True b. False
Answer:
The statement is TRUE
A(n) ____ is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.
Answer:
incident
Explanation:
An incident is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.
What is the asset?A business asset is something that has present or future economic worth to the company. In essence, assets for companies encompass anything managed and held by the firm that is today valuable or has the potential to give monetary advantage in the future.
Patents, machines, and investments are some examples of the assets. Assets are crucial because they may help you create money, raise the value of your firm, and help it function smoothly.
Therefore, an incident is an attack on an information asset that puts the confidentiality, integrity, or availability of information resources at risk.
Learn more about the asset, refer to:
https://brainly.com/question/13848560
#SPJ2
A network using multiple cell towers falls under which type of network?
CAN
MAN
WAN
WMN
Answer:
man
Explanation:
multiple area network
Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona not include in her presentation?
A. Large number of vulnerabilities.
B. End-of-life systems.
C. Lack of vendor support.
D. Mis-configurations.
Answers:
C. Lack of vendor support.
Explanation:
In formation technology, network administrators and engineers experience network security thread due to a large number of vulnerabilities from poorly configured security protocols and end of life of network devices, which results from the outdated nature of a device leading to the end of continual upgrade of the system to allow current and more secure network configuration protocols.
The lack of vendor support is not discussed because the standard OSI and TCP network model are supported by most network device vendors.
Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices against computer viruses and ____ is essential for both individuals and businesses.
Answer:
hackers
Explanation:
If there are two things computers should be protected from - especially if they continually connect to the internet - they are malicious programs such as viruses and their malicious human counterparts - hackers.
Computer viruses are malicious programs that integrate themselves into another program, replicate themselves and cause harms to system programs and resources by altering and/or destroying these programs. These viruses are mainly transmitted and spread by removable media devices and programs downloaded from the internet.
Hackers are unauthorized set of programmers that can break into a system, network and even applications in order to steal, alter or destroy them. The launch malicious programs via the internet into the system or network of systems.
"Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer?"
Answer:
The Session layer (Layer 5)
Explanation:
The OSI (Open Systems Interconnection) seven-layer model is a reference model that explains how devices (or applications) communicate over the network. The model consists basically of seven different layers which are;
i. Layer 1 or the physical layer
ii. Layer 2 or the data-link layer
iii. Layer 3 or the network layer
iv. Layer 4 or the transport layer
v. Layer 5 or the Session layer
vi. Layer 6 or the presentation layer
vii. Layer 7 or the application layer.
Out of the seven layers, the session layer (layer 5) keeps track of a system's connections to send the right response to the right computer by setting up, coordinating and managing these connections. It controls, establishes and maintains the connection between multiple computers or applications on a computer.
Having demonstrated its versatility as a high-tech newswire, Twitter drew the attention of those who would prefer to see certain information suppressed.A. TrueB. False
Answer:
A. True.
Explanation:
Twitter social media platform is an online messaging application, that provides a medium for users to communicate with friends, advertise events or products and broadcast news at a large scale.
Its contents are summarized and detailed with pictures, videos, audios and text information. Developers of this web application utilized the concept of user interface and user experience design for easy access to information on the platform.
A certain computer game is played between a human player and a computer-controlled player. Every time the computer-controlled player has a turn, the game runs slowly because the computer evaluates all potential moves and selects the best one. Which of the following best describes the possibility of improving the running speed of the game?A The game's running speed can only be improved if the game is played between two human players instead of with the computer-controlled player.B The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.C The game's running speed cannot be improved because computers can only be programmed to find the best possible solution.D The game's running speed cannot be improved because the game is an example of an algorithm that does not run in a reasonable time.
Answer:
B The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.
Explanation:
Even though the moves are not the perfect ones, the algorithm of the game can be written in a way that it can solve the problems and play faster.
Let's see the problems in other options.
A -> The only way is not replacing the computer with a human because, we know that computers can play faster than a human when the algorithm is written well.
C -> Computers cannot only be programmed to find the best possible solution. They can be programmed how the programmer wants them to behave.
D -> Since we do not know anything about the game, we cannot say anything about the algorithm runtime.
Companies that have a well-established brand name or reputation in a particular line of business usually want the URLs for their Web sites to reflect that name or reputation.Ture/false
Answer:
The answer is "True"
Explanation:
In the web browser, when you type and search any name of the company or any brand name so, it will be given the full detail of the company or the specific brand, and it also provides the new collection of the brand. which allows you to buy the product online, that's why we use the URL, that reflects the reputation of a company or the brand.
a particular variety of database that works by connecting tables to each other. It is the most popular form of database and the type we will discuss most in this class.
Answer:
Relational Database
Explanation:
Relational Database is the type of database in which data is stored and presented in the form of tables and it is used to access, manipulate and manage data.Table is also called a relation. It consists of rows and columns where rows represent a record of data and columns represent the attributes of the data.Every table has a primary key which uniquely identifies a row in a table and a foreign key is used to establish relationships among tables.In relational database domain is used to define specify the possible values that an attribute can have.Constraints can also be applied to the values of the attributes in the table.There are many advantages of a relational database. It can organize and manage bulk of information. It is easy to add or delete data in the relational database according to the change in requirements.Relational database ensures the consistency and integrity of data when many users obtain the same database at same time by using concurrency control methods.It ensures security by limiting access rights to the data.It also eliminates data redundancy and dependency using normalization technique which ensures data integrity and accuracy.In a relational database, the link between two tables by a primary key and a foreign key is known as what?
Answer:
Relationship is the correct answer for the above question
Explanation:
When there is a normalization in any table then it is divided into two or more tables. It will help the user to make it easy in access. So when the two tables are made by one table then there is a primary key for the first table and the foreign key for the second table which is used to identify the data of the table. The primary key is used to identify the data of its table and the matching value of the primary key and foreign key is used to identify the data of the second table which makes a relation on the first and the second table.The above question asks about the link between tables where the primary key and foreign key is used and that link is known as relation because it is made up of one table to overcome the problem of normalization. So the answer is the relationship.Procter & Gamble uses an intranet called InnovationNet to help people working on similar problems share ideas and expertise. InnovationNet connects those working in many different departments around the world. It uses a browser-based portal to access data and includes a directory of subject matter experts who can be tapped to give advice or collaborate on problem solving or product development.
The answer is Core Competencies.
Core competency is a management theory which focuses on team works by different divisions or department in an organization. It focuses on activities, programs, software and anything that would make people in the company working together to achieve company's missions more effectively.
What is activated as necessary to support local eocs and to ensure that responders have the resources they need to conduct response activities?
Answer: Emergency Operation Center (EOC)
Explanation:
An Emergency Operation Center is the coordination base for emergency service in case there is any within a state or a state Connecticut. The major purpose of the emergency center is to be in charge of controlling deploying and utilizing facilities needed to prepare for any form of emergency, disaster management, etc.
To run an effective Emergency Operation Center, focus must be on the facilities, equipments and personnel involved.
One of the Visual Studio 2015 languages that can be used for rapid application development is C#. Another language that supports rapid applicaton development is ____________
Answer:
Visual Basic is the appropriate answer for the following blank.
Explanation:
Visual Basic is a language based on real events of a third generation for the Module Object model coding model that was originally published and declared legacy in 2008.
In an easy to use graphical environment programmers can create a visual basic programming language for software interfaces and codes. VB is the collection of different components used with the help of the forms with specific characteristics and actions.A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which benefit will implementing the Spanning Tree Protocol provide to this design?
Answer:
Redundant paths can be available without causing logical Layer 2 loops.
Explanation:
Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops. These loops are called physical loops. When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop. This affects the performance of the network as the result of broadcast packets flooding. STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.Spanning Tree Algorithm is used by STP to determine the optimal path of switch to the network.Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.This information helps STP to eliminate the redundant paths.So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b. it manages the execution of .NET applications c. it specifies the format of compiled .NET applications d. it specifies the data types that can be used by .NET applications
Answer:
d. it specifies the data types that can be used by .NET applications.
Explanation:
The .NET Framework Class Library (FCL) makes the system functionality of the .NET Framework available because it contains interfaces, data types, various classes and so on.
It is also important to note that the FCL is integrated to the CLR or Common Language Runtime of .NET Framework which is responsible for code execution.
The Framework Class Library or FCL can be categorized broadly into three:
1. Frameworks
2. Utility features in .NET, and
3. Wrappers around the Operating System (OS) functionality.
1. Frameworks: The FCL contains many frameworks aimed at the development of some applications. For instance, WPF or Windows Presentation Foundation is used to carry out a number of functions but majorly to render user interfaces.
2. Utility features in .NET: This contains a number of classes for use in the .NET framework, examples of these classes include: dictionary, queue, stack, list and so on. Additionally, it contains classes for different manipulations, for example, for handling regular expressions the Regex class is available for use.
3. Wrappers around the Operating System (OS) functionality: Contained in the Framework Class Library are wrappers that are present at the root functionality of the Windows OS. For instance, classes to handle I/O, network features, file system as so on.
Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can benefit from traffic-monitoring applications.A. TrueB. False
Answer:
A. true
Explanation:
Based on the information provided within the question it can be said that the statement is completely true. This is because, traffic-monitoring applications have the main function of monitoring and analyzing the flow of traffic of one or various different items. Which can be applied to the business involving utility, infrastructure, and environmental services by monitoring the specific items regarding each business. Therefore making sure that enough product is entering or leaving each business as it is suppose to. As well as providing stock analysis and defective product alerts.
A device on a power drill that enables a user to back out a drill bit that is stuck in the work material is called a(n) __________.
A power drill is a electrical component that is used to drill or fast screw tightening and it maybe cordless or with cord. So, when the power drill is used to make hole then by using reverse switch it can be back out by rotating in opposite direction.
It is a simple switch operated electrically.It used to reverse the direction in which current is flowing.Reversing switch has four terminals.These terminals can be connected in such a way that when the switch is triggered then the direction or current is reversed and so the rotation of the motor of the power drill is also reversed.I hope it will help you!Why are models based on assumptions? A. Because models are not intended to analyze real-world events. B. Because models are only concerned about questions of equity, not question of efficiency. C. Because models have to be simplified to be useful. D. Because models are very different from theories.
Models are based on assumptions because models have to be simplified to be useful.
Answer: Option C.
Explanation:
Model is a computer program which helps to predict the situation as to what might have happened. Models are used almost in every aspect, be it economics or science or biology.
Assumptions are necessary because there are many complexity in every system and it is thus essential to have an understanding of the working of those system. It is necessary to remove the complexities for models to be useful. Models which aren’t based on assumptions are massive which is turn creates a problem. Thus it is necessary that models are simplified to be useful.
the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives and false negatives.
Answer:
Tuning. See explanation below.
Explanation:
Tuning
By definition the tuning is: "the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives and false negatives."
And this process is the improvement of system performance in computer science. Usually is related to optimization of a process, when we us tunning, we can follow these steps:
a) Identify which numeric values are acceptable and improve the parameters
b) Take a measure for the system originally and without the tunning in order to have an initial comparative measure
c) Understand that each process have a critical path, we need to identify it.
d) Modify parts who not improve the efficiency of the algorithm
e) Check the performace when we apply modifications
Which term is used to describe a network security device or host software that filters communications, usually network traffic, based on a set of predefined rules?a. Snifferb. Auditorc. Hackerd. Firewall
Answer:
The correct answer is option (D).
Explanation:
According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.
while the other options are wrong because of the following reasons :
A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules. An auditor can be defined as a program that is used to analyze the network. The hacker can be a person who hacks the system to gain access or gather information.What type of cloud computing service provides hardware infrastructure along with necessary operating system software for running client applications?
Answer:
Platform as a service is the correct answer.
Explanation:
In the following statement, Cloud computing is the platform that allow users the services such as the safety of their important documents and data. It is also the type platform that provides users the infrastructure of the hardware with the important software of the operating system for client applications. That's why the following answer is correct.
Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ________, is changing the picture dramatically.A. Hardware as a HelpB. Software as a ServiceC. Processing as a ProductD. Storage as a Solution
Answer:
Option B Software as a Service
Explanation:
Software as a Service (SaaS) is a new software acquisition model. SaaS is based on a subscription license instead of perpetual license. The software is hosted by software provider and the user is required to use a client software or web browser to access and use the software. User pays for the service (software itself) they use on regular basis which can be monthly or yearly.
SaaS offers always up-to-date software solution to the user and the software can be accessed from any machine at any place. Apart from the subscription fee, user is not required to pay additional cost for license renewal or updating software. SaaS provides a cheaper and economic cost of software acquisition.
Describe the form in which a program is passed from the scanner to the parser; from the parser to the semantic analyzer; from the semantic analyzer to the intermediate code generator.
Answer:
Token stream, Parse tree, Abstract syntax tree or other intermediate form.
A city-wide wireless network is an example of which type of network?
CAN
MAN
WAN
WMN
Answer:WAN
Explanation:
This means Wide Area Network. It is a combination of about two local area networks designed to serve a large geographical area such as a city.
n a poll, 6767% of Internet users are more careful about personal information when using a public Wi-Fi hotspot. What is the probability that among threethree randomly selected Internet users, at least one is more careful about personal information when using a public Wi-Fi hotspot? How is the result affected by the additional information that the survey subjects volunteered to respond?
Answer:
The probability that among three randomly selected Internet users, at least one is more careful about personal information when using a public Wi-Fi hotspot is 0.964
If the survey subjects volunteered to respond , then those with the strongest opinions are most likely respond. The survey sample is then not randomly selected, the survey may have a response bias.
Explanation:
Let P(at least one is more careful about personal information when using a public Wi-Fi hotspot) denote the probability that among three randomly selected Internet users, at least one is more careful about personal information when using a public Wi-Fi hotspot, then we have the equation
P(at least one is more careful about personal information when using a public Wi-Fi hotspot) = 1 - P(none of the selected users is more careful about personal information when using a public Wi-Fi hotspot)
If 67% of Internet users are more careful about personal information when using a public Wi-Fi, then 33% of them are not.P(none of the selected users is more careful about personal information when using a public Wi-Fi hotspot) = [tex]0.33^{3}[/tex] ≈ 0.036
P(at least one is more careful about personal information when using a public Wi-Fi hotspot) = 1 - 0.036 = 0.964