what does this mean PLEASE?

What Does This Mean PLEASE?

Answers

Answer 1

Answer:

the controls of which you're your suppose to use or where your suppose to put it

Explanation:

because i'm not sure what you're your showing me


Related Questions

____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.

Answers

Denial of Service (DoS) attacks exploit software weaknesses, causing degraded performance or server crashes on the victim's system.

These attacks overwhelm the targeted server with an excessive amount of traffic or resource requests, making it unable to respond to legitimate user requests. The goal is to disrupt the availability of the targeted system, rendering it inaccessible to users. DoS attacks can be carried out through various methods, such as flooding the network with traffic, exploiting software vulnerabilities, or overwhelming system resources. Mitigating these attacks involves implementing protective measures, such as firewalls, load balancers, and traffic filtering, to ensure the availability and reliability of servers and networks.

Learn more about DoS attacks here:

https://brainly.com/question/32253386

#SPJ11

The statement is incomplete, but based on the provided information, the term that fills the blank is "Denial of Service (DoS)" attacks.


Denial of Service attacks aim to disrupt the normal functioning of a system or network by overwhelming it with a high volume of malicious traffic or by exploiting vulnerabilities in the software to cause crashes or degraded performance.




learn more about Denial here :


https://brainly.com/question/13777500


#SPJ11

Instructions
Please modify your 4.2.5 Growing Circle activity on CodeHS and then submit it here.

Your circle should start being as big as the width of the screen and should decrease in size until it disappears.

Here is the code i have in growing circle so far
/* Constants */
var START_RADIUS = 1;
var INCREMENT = 1;
var CHANGE_COLORS_AT = 10;
var circle;

function start(){
circle = new Circle(START_RADIUS);
circle.setPosition(getWidth() / 2, getHeight() / 2);
add(circle);

setTimer(drawer, 50);

}

function drawer(){

circle.setRadius(circle.getRadius() + INCREMENT);

if((circle.getRadius() % CHANGE_COLORS_AT)== 0){
circle.setColor(Randomizer.nextColor());
}
if((circle.getRadius() * 2) > getHeight()){
stopTimer(drawer);
}
}

Answers

The modification of Growing Circle activity on CodeHS is in the explanation part.

What is programming?

The process of carrying out a specific computation through the design and construction of an executable computer program is known as computer programming.

Here's the modified code for the Growing Circle activity on CodeHS that starts as big as the width of the screen and decreases in size until it disappears:

/* Constants */

var START_RADIUS = getWidth() / 2;

var DECREMENT = 1;

var circle;

function start() {

 circle = new Circle(START_RADIUS);

 circle.setPosition(getWidth() / 2, getHeight() / 2);

 add(circle);

 setTimer(drawer, 50);

}

function drawer() {

 circle.setRadius(circle.getRadius() - DECREMENT);

 if (circle.getRadius() <= 0) {

   stopTimer(drawer);

   remove(circle);

 }

}

Thus, this modified code will make the circle shrink from its starting size until it disappears.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ1

1. What are the electronic hand tools presented in the video? 2. How many cleaning materials where used to maintain the tools? 3. Enumerate the steps in maintaining the hand tools presented in the video clip.

Answers

I don't think you can answer the question without a video

typically, the first iteration or two of the up produces documentation and a ____ system

Answers

The first iteration or two of the up produces documentation and a prototype system. Prototyping involves the production of a partial implementation of the system.

Prototyping enables users to assess the system’s usability and verify that the requirements have been correctly interpreted. Prototyping can be utilized as part of iterative development, allowing the system to be constructed in smaller increments.Prototyping is a method for creating prototypes or models of a system, as well as a tool for developing and refining requirements and design. It is used to confirm that the software will meet user expectations and that it will function properly. A prototype is a limited model of a product or system that is created for testing and development purposes. It’s a small version of the end product that includes only the key features or functions. As a result, a prototype may be created in a variety of formats, including sketches, wireframes, mockups, or working software. A prototype can be used to evaluate a system’s functionality and usability and to gather feedback from users.

To know more about first iteration visit:

https://brainly.com/question/32215783

#SPJ11

, , ,g d,t ,dt m,dt ymtd

Answers

Answer:ummm me confused

Explanation:

the three main objectives of information security are

Answers

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

power supply, keyboard, monitor, mouse,ROM,CPU are belongs to Output, Input or Storage device​

Answers

Answer:

Keyboard :Input

Monitor: Output

Mouse:Input

ROM:Storage

CPU: Processing device

Question 4: Write one paragraph about network security.
Question 6: write one paragraph about wireless network
design

Answers

Network security is the practice of protecting computer networks and their data from unauthorized access, misuse, or disruption. Wireless network design refers to the planning and implementation of wireless communication systems that enable the transfer of data without the need for physical wired connections.

Question 4:

Network security involves implementing various measures, such as firewalls, encryption, authentication protocols, and intrusion detection systems, to safeguard networks and ensure the confidentiality, integrity, and availability of information.

Network security aims to prevent unauthorized individuals or malicious entities from gaining access to sensitive data, conducting unauthorized activities, or causing damage to network infrastructure.

With the increasing reliance on interconnected systems and the rise in cyber threats, network security has become paramount in maintaining the privacy and security of networks and the data they transmit.

Question 5:

Wireless network design involves designing network infrastructure, access points, and coverage areas to ensure reliable and efficient wireless connectivity.

Factors such as signal strength, range, interference, and capacity are taken into consideration to create a network that meets the requirements of the intended users.

Wireless network design encompasses the selection of appropriate wireless technologies, such as Wi-Fi or cellular networks, and the consideration of security protocols to protect data transmitted over the wireless medium.

To learn more about network security: https://brainly.com/question/28581015

#SPJ11

HELP FAST PLS PLS

Put the steps in order to produce the output shown below.
Assume the indenting will be correct in the program.
'uno'
Line 2
Line 1
Line 3

HELP FAST PLS PLSPut the steps in order to produce the output shown below.Assume the indenting will be

Answers

Answer: the line numbers are different on mine, but these were correct

Explanation:

HELP FAST PLS PLSPut the steps in order to produce the output shown below.Assume the indenting will be

Following are the description on the three-line code:

In the first line, a dictionary "games" is declared that holds "key and value" in it.In the key, it holds an integer value, and in the value, it holds a string value.In the second line, the append method is declared that adds value to the dictionary.In the third line, it holds a value of 12.

Please find the attached file for the code.

Learn more:

brainly.com/question/20250851

HELP FAST PLS PLSPut the steps in order to produce the output shown below.Assume the indenting will be

Who is your favorite Funtime Anamatronic?

Answers

Answer:

ur mom

Explanation:

jk it's prb something like foxy

I neeed help pleaseeee

I neeed help pleaseeee

Answers

Answer:

C. Class

Explanation:

A img tag allows you to put an image. An img tag is not a attribute.

a p tag allows you yo make a paragraph. A p tag is not an attrbute.

A class attribute allows you to give an element a specific class. Styling the class in css will style all elements which have the class.

A src tag is used for referencing script and style locations. It is an attribute but not the one we are looking for.

Thus, The answer is C, a class.

What are the uses of various lights? How are they all different? How do you decide on their usage? How can you use natural light to your advantage?

Answers

Answer:

lights

Explanation:

HELP ME PLEASE AM TIMED!!!~~~~ promised brainly for most reliable answer!!

How would a user ensure that they do not exceed the mailbox quota?

The user can select a mailbox that does not have a quota.
The user can flag the items as Junk Mail.
The user can just move items to the Deleted Items folder.
The user must empty items from the Deleted Items folder or Archive items.

Answers

Answer:

The Third one

Explanation:

Thanks brainly

Answer:

third one

Explanation:

thanks for brainly

which language is used in server- side scripting plato

Answers

Server-side code can be written in any number of programming languages examples, of popular server-side web languages include PHP, Python, Ruby, C#, and JavaScript (NodeJS).

what is the procedure of formatting a document​

Answers

Answer:

I believe it's:

double space size 12 font Times New Roman

The RAM memory of a computer contains the volatile memory, which includes

Web sites visited recently

overwritten or erased text files

password protected records

e mails sent

Answers

The RAM memory of a computer contains the volatile memory, which includes; Websites recently visited

Random Access Memory(RAM)

Random access memory (RAM) is defined as a computer's short-term memory that it utilizes to handle all active tasks and applications.

Now, no single program, file, game, or stream would work without a RAM. Thus, RAM is a temporary storage that goes away when we shut down the computer.

Examples of things that RAM store from the options given is only websites visited recently.

Read more about Random Access Memory at; https://brainly.com/question/86807

Answer: web sites visited recently

trust

Display the desktop without minimizing or closing any windows.

Answers

The desktop can be fully displayed without minimizing or closing any windows by maximizing it.

What is a desktop display?

The desktop display is the computer monitor that shows the graphical interface of the window screen.

In the desktop mode on your window, you can display your entire desktop screen by clicking on the maximize button.

This enables you to see each icon on the screen clearly.

The image attached below shows a clear view of how to display the screen without minimizing or closing any windows.

Learn more about the desktop display here:

https://brainly.com/question/8384714

Display the desktop without minimizing or closing any windows.
Display the desktop without minimizing or closing any windows.

Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better.

What is the quickest way to do this?

keyboard shortcut
sizing handles
context menu
sizing dialog box

Answers

Sizing handles but I’m not super sure

Teleconferencing allows workers from around the world to

Answers

Teleconferencing allows workers from around the world to connect and collaborate in real time without the need for physical travel.

Teleconferencing

This technology enables remote workers to attend meetings, share ideas, and participate in discussions as if they were in the same room. With teleconferencing, teams can stay connected and work efficiently regardless of their location, which ultimately leads to increased productivity and cost savings for businesses. Teleconferencing allows workers from around the world to collaborate and communicate effectively with each other in real time. This technology enables participants to exchange information, share documents, and conduct meetings without the need for physical presence, thus saving time and resources.

To know more about remote workers visit:

https://brainly.com/question/28437474

#SPJ11

While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for

Answers

Answer:

Record time offsets.

Explanation:

In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.

The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.

Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.

Additionally, the time stamp varies depending on the operating system being used;

- For windows operating system, it uses a 64 bit time stamp.

- For Linux or Unix, it uses a 32 bit time stamp.

New communication technology can impact seemingly unrelated industries such as the airline industry. This would be an example of a threat of substitute products. threat of entry. Customers tend to have negative opinions of firms that imitate other firms. forward integration.

Answers

Answer: threat of substitute products

Explanation:

A laptop is running hotter than normal, and its cooling fan sounds slower than usual. which is the most likely problem? dust or pet hair a dirty keyboard too many startup items outdated widgets

Answers

A laptop is running hotter than normal, and its cooling fan sounds slower than usual. The most likely problem is too many startup items.

A cooling fan is added to a laptop so that cooling air can be provided to the delicate parts of the laptop and excess heat is flown away easily from the laptop. The cooling fan helps in protecting all the delicate hardware parts of the system.

If there is too much dust or pet hair accumulated in the laptop, then the fan will work slower than usual due to the trapped dust or pet hair. As a result, the laptop will not be effectively cooled. The heat flowing from the laptop will increase and the slow down of the fan will not be enough to dissipate it. Hence, it shall be ensured that not enough dust or pet hair is accumulated in your laptop.

To learn more about laptop, click here:

https://brainly.com/question/6494267

#SPJ4

what are worms ? this question is from computer from chapter virus;​

Answers

a computer worm is a stand-alone malicious program which can spread itself to other parts of any device. However, one similarity is that both virus and worms are a subcategory of malware.

Answer:

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

Explanation:

You can open a movie maker project file any time in a media player. (1 point) true false

Answers

Answer:

yes it is true you can make a movie Maker project file anytime in a media player.

write a naive bayes classifier with priors inferred from the dataset and class-conditional densities inferred using scipy.stats.gaussian kde with default bandwidth. use only the training data to fit the classification model. print the training accuracy and testing accuracy.

Answers

Sure, here is an implementation of a Naive Bayes classifier using the Gaussian KDE to estimate class-conditional densities and priors inferred from the dataset:

python

Copy code

from sklearn.naive_bayes import GaussianNB

from sklearn.metrics import accuracy_score

from scipy.stats import gaussian_kde

import numpy as np

# Generate some random training and testing data

np.random.seed(123)

X_train = np.random.randn(100, 2)

y_train = np.random.randint(0, 2, size=100)

X_test = np.random.randn(50, 2)

y_test = np.random.randint(0, 2, size=50)

# Compute class priors

class_priors = np.bincount(y_train) / len(y_train)

# Compute class-conditional densities

densities = []

for i in range(2):

   X_class = X_train[y_train == i]

   density = gaussian_kde(X_class.T)

   densities.append(density)

# Fit Naive Bayes classifier

clf = GaussianNB(priors=class_priors)

clf.fit(X_train, y_train)

# Predict training and testing labels

y_train_pred = clf.predict(X_train)

y_test_pred = clf.predict(X_test)

# Compute training and testing accuracy

train_acc = accuracy_score(y_train, y_train_pred)

test_acc = accuracy_score(y_test, y_test_pred)

print("Training accuracy:", train_acc)

print("Testing accuracy:", test_acc)

This implementation assumes that the input data is a numpy array of shape (n_samples, n_features), where each row represents a sample and each column represents a feature. The GaussianNB class from scikit-learn is used to fit the Naive Bayes classifier, and the accuracy_score function is used to compute the training and testing accuracy.

For more questions like dataset visit the link below:

https://brainly.com/question/16521396

#SPJ11

peter recently bought a media player and a digital camera. he wants to buy a memory card for these devices. which memory device should peter use in hi

Answers

By considering these factors, Peter can make an informed decision about the appropriate memory card for his media player and digital camera. It's also worth checking the device manuals or contacting the manufacturers for any specific recommendations or limitations.


When choosing a memory card for a media player and a digital camera, Peter should consider the following factors:

1. Compatibility: First, he needs to ensure that the memory card is compatible with both the media player and the digital camera. Most devices support standard memory card formats like SD (Secure Digital) or microSD.

2. Capacity: The capacity of the memory card determines how much data it can store. Peter should consider his storage needs based on the size and type of media files he plans to use. For example, if he intends to store high-definition videos or RAW photos, he may require a higher capacity card such as 64GB, 128GB, or even 256GB.

3. Speed Class: The speed class of a memory card indicates its data transfer speed. For smooth recording of high-quality videos or continuous burst photography, Peter should choose a memory card with a higher speed class. The available speed classes include Class 2, 4, 6, and 10, with higher numbers representing faster speeds.

4. UHS Speed Class (U3): If Peter's devices support UHS-I or UHS-II interfaces, he should consider a memory card with a UHS Speed Class rating of U3 or higher. This ensures faster data transfer rates, especially for recording 4K videos or high-resolution photos.

5. Brand and Quality: It's generally recommended to choose memory cards from reputable brands known for their reliability and performance. Brands like SanDisk, Samsung, Lexar, and Kingston are popular and offer a range of options.

By considering these factors, Peter can make an informed decision about the appropriate memory card for his media player and digital camera. It's also worth checking the device manuals or contacting the manufacturers for any specific recommendations or limitations.
To know more about digital camera click-
https://brainly.com/question/21208327
#SPJ11

Select all the statements that are true about top down and bottom up parsers. Question 30 options: A bottom-up parser constructs a parse tree by beginning at the leaves and progressing toward the root. The bottom-up parser order corresponds to the reverse of a rightmost derivation. A top-down parser traces or builds a parse tree in preorder. A top-down parser corresponds to a leftmost derivation.

Answers

The following statements are true about top-down and bottom-up parsers:

A bottom-up parser constructs a parse tree by beginning at the leaves and progressing toward the root. The bottom-up parser order corresponds to the reverse of a rightmost derivation. A top-down parser traces or builds a parse tree in preorder. A top-down parser corresponds to a leftmost derivation.

A bottom-up parser begins with the input string and attempts to transform it to the start symbol of the grammar by shifting and reducing. A bottom-up parser creates the parse tree by starting at the leaves and working its way up to the root.

A bottom-up parser order corresponds to the reverse of a rightmost derivation. This is called a shift-reduce parser.

A top-down parser builds a parse tree by starting at the top of the tree and working its way down to the leaves. The top-down parser constructs the parse tree in preorder.A top-down parser corresponds to a leftmost derivation. This is called a recursive descent parser.

Learn more about parser at;

https://brainly.com/question/32200546

#SPJ11

What is output by the following code? Select all that apply.

c = 2




while (c < 12):

print (c)
c = c + 3
Group of answer choices

3

4

6

7

9

2

10

5

12

8

1

11

Answers

Note that the output of the code given above is: 5.

What is the explanation of the above analogy?

Given that the value of c is 2

2 < 12 (true statement)

print

c = c + 3

i.e, c = 2+3

Therefore, the answer is 5.

It is to be noted that in computer programming, computer code is a set of instructions or a set of rules expressed in a specific programming language (i.e., the source code). It is also the name given to the source code after it has been compiled and is ready to execute on a computer (i.e., the object code).

Learn more about codes:
https://brainly.com/question/28848004
#SPJ1

Encryption can be applied on a file, a folder, or an enitre hard disk and provide a strong level of protection.
a. true
b. false

Answers

The given statement "Encryption can be applied on a file, a folder, or an entire hard disk and provide a strong level of protection" is true.

Encrypting File System provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS. EFS is a functionality of New Technology File System (NTFS) and is built into a device via the OS. It facilitates file or directory encryption and decryption with the help of complex cryptographic algorithms.

Encryption can be used to protect all of the above by using a secure algorithm to scramble data into an unreadable format. Files, folders, and hard disks can all be encrypted to prevent unauthorized access.

Therefore, the given statement is true.

Learn more about the Encryption here:

https://brainly.com/question/30225557.

#SPJ4

Match term to description.


Primary storage for most computers, it often goes by the drive letter C. Today, the typical capacity for this type of storage is 500 gigabytes to 2 terabytes or more.


1 Choose. A type of optical storage generally used for music or data. The capacity for this type of storage is approximately 700 megabytes.


2 Choose. A type of optical storage generally used for movies or data. The capacity for this type of storage is in the range of 4. 7 to 8. 5 gigabytes


3 Choose. A type of solid-state storage, this device connects to the computer through a USB port. Common capacities are 8 GB to 256 GB though two terabyte drives are now available.


4 Choose. A place to plug in a secondary circuit board such as a modem or sound card.


5 Choose. The primary circuit board; everything must eventually connect to this component.


6 Choose. An external connection point where devices may be plugged into the computer.


7 Choose. Pathways on the motherboard over which data can travel from place to place


8 Choose. Contains instructions to get the computer started and the operating system loaded into RAM (non-volatile; read-only)


9 Choose. The primary microchip inside the computer, it oversees the operations of the computer and executes instructions

Answers

Primary storage for most computers, typically referred to as the C drive, has a capacity ranging from 500 gigabytes to 2 terabytes or more.

Optical storage used for music or data has a capacity of approximately 700 megabytes.

Optical storage used for movies or data has a capacity in the range of 4.7 to 8.5 gigabytes.

Solid-state storage that connects to the computer via a USB port has common capacities of 8 GB to 256 GB, with two terabyte drives now available.

A slot or connector on the motherboard where secondary circuit boards, such as modems or sound cards, can be plugged in.

The motherboard is the primary circuit board where all components of the computer connect.

An external connection point on the computer where devices can be plugged in, such as USB ports.

Pathways on the motherboard that allow data to travel between different components of the computer.

Read-only memory (ROM) contains the instructions to start the computer and load the operating system into RAM.

The central processing unit (CPU) is the primary microchip inside the computer that oversees operations and executes instructions.

In summary, the matching terms are as follows:

Primary Storage

Optical Storage for music or data

Optical Storage for movies or data

Solid-State Storage (USB-connected)

Slot for secondary circuit board

Motherboard

External connection point

Pathways on the motherboard

Read-only memory (ROM)

Central Processing Unit (CPU)

learn more about Primary storage here:
https://brainly.com/question/520781

#SPJ11

Other Questions
if a student represents materials they found online as their own work, what is occurring? Drag the tiles to the correct boxes to complete the pairs.Match the given work profiles to their respective job roles.=reserved.Georgia inspects farms, slaughterhouses, and pet food companies.Kane conducts training and lectures for veterinary students.Rose is working on developing a new surgical techniquefor animal treatment.Matt is responsible for surveying, analyzing the reason,and consequences of a new animal borne diseasethat is contagious to humans. chlorine has 7 valence electrons. with what group/family of elements will chlorine most likely bond with? At equilibrium at 1200C, [I2] = 9. 5 102 M and [I] = 3. 2 102 M. What is the value of Keq for this system? 3. 4 101 1. 1 102 1. 1 93. Example of Understatement What are the formulas and steps to solve Area of composite figures find equation tan line curved defined by x+2xy+y4=21 points (1,2) Hi guys can you answer my math question Dont mind my answers that I erased but please do all of the questions determine whether the data are qualitative or quantitative.temperatures inside 10 pizza ovens IF THE DAY IS SUNNY, 1000 PEOPLE WILL ATTEND THE BASEBALL GAME. IF THE DAY IS CLOUDY, ONLY 500 PEOPLE WILL ATTEND. IF IT RAINS, ONLY 100 PEOPLE WILL ATTEND. THE LOCAL METEOROLOGIST STATES THAT THE PROBABILITY OF A SUNNY DAY IS 0.4, OF A CLOUDY DAY IS 0.5, AND OF A RAINY DAY IS 0.1. FIND THE NUMBER OF PEOPLE THAT ARE EXPECTED TO ATTEND Solve system of equations using substitution method2x-3y=6x + y = -12 Someone help plzsssszzz thank u At the movie theatre, child admission is $5.50 and adult admission is $8.60. On Wednesday, 131 tickets were sold for a total sales of $946.80 . How many adult tickets were sold that day? 5 + ( 3 ) ( 6x 5 ) ? Only Roman Catholic Christianity was state-approved.Question 2(Multiple Choice Worth 5 points)(05.01 MC)In Europe today, monarchs areOstill a major force in politicsO completely goneO the heads of most states but losing powerO in only a few countries and mostly ceremonial Select the three possible accessory buildings.playhousetrailershedgarageapartment Order the following from smallest to largest. Place the smallest value at the top of your list.0.1km10cm10,000mm1m sharon wiley is a sales representative employed by a leading producer of pharmaceuticals used in veterinary medicine. recently she attended a university-sponsored seminar that focused on new research findings in selected areas of veterinary medicine. ms. wiley is most likely attempting to develop a the height of an experimental plant after x days can be represented by the formula 3(4x+2). The height of a second plant can be represented by the formula 6(2x+2). Is it possible that the two plants will ever be the same height?Expain.