Made from fruit juice, water and sugar, The American version contains milk and cream and sometimes egg white​

Answers

Answer 1

Answer:

ok what is the question supposed to be ?

Edit : nvm i got what you were saying ...

Sherbet and Ices – made from fruit juices, water and sugar. American sherbet contains milk and cream and sometimes egg white.


Related Questions

explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace

Answers

Answer:

The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.

Of the people working in concert with security teams to ensure data quality and protection, the head of information management is responsible for executing policies and procedures, such as backup, versioning, uploading, and downloading. True False

Answers

Answer:

true

Explanation:

because Internet

because Internet

define Microsoft Excel 2010​

Answers

Answer:

a very very old Microsoft application that only people on old pc's use now

Explanation:

Answer:

Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.

This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.

Explanation:

In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.

Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.

The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.

what is storage unit in computer and five examples of storage units.

Answers

Answer:

the storage unit of a computer is known as the term which is used to indicate storage capacity.

Explanation:

Five units of storage units are:-

1) byte

2) kilobyte

3) megabyte

4) gigabyte

5) terabyte

Which area of a magazine cover is often important for those shops and stalls that cannot display the entire cover page on a stand?
A.
one-third
B.
left-third
C.
two-third
D.
one-fourth

Answers

I think the answer is one fourth.

Because usually only that part is visible in a stand. It usually contains the name of the magazine and a little bit of illustration gives an idea about what it is about.

When the ping command is used, output is similar across operating systems. Which two values are displayed as part of the output

Answers

Answer: round-trip time

message byte size.

Explanation:

Ping refers to the primary IP command that is used in the troubleshooting of connectivity, and reachability. The ping command is also used in testing the computer's IP address.

When the ping command is used, output is similar across operating systems and the two values that are displayed as part of the output include the round-trip time and the message byte size.

Which command entered without arguments is used to display a list of processes running in the current shell

Answers

Answer:

ps

Explanation:

In Unix and Unix-like operating system, the command used to display the list of processes running in the current shell is ps. For each of these processes, the following details are displayed;

i. PID which indicates the id of the process

ii. TTY which indicates the type of terminal from which the process is running.

iii. TIME which represents the CPU time consumed by the the process and its sub-processes.

iv. CMD which represents the command that runs as the current process.

when files on storage are scattered throughout different disks or different parts of a disk, what is it called

Answers

Answer:

File Fragmentation or Fragmented Files

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

write history of computer virus. I will mark as brainliest answer ​

Answers

Answer:

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.

Mark Brainliest please

Computer viruses have been around for quite a bit and nearly all of them have been spread through the Internet or its predecessors. Most viruses have been designed to steal users' information, processing power and/or disable the system all together.

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.

The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.

"The Morris" was the first Computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the size of the internet. His approach used security holes in sendmail and other Unix applications as well as weak passwords, but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet.

Since then, many new viruses have been introduced and the trend is growing exponentially every year.

Infamous viruses of the digital age
Following are some of the most well-known or significant viruses that have grown in step with the role of information technology in society:

In 1991, the "Michelangelo" virus was first discovered in Australia. It would lay dormant until 6th March every year and then overwrite the first one hundred sectors on the storage devices with zeros, preventing the computer from booting. Only 20,000 computers were reported infected.

In 1998, CIH was released. It infected around 60 million computers and caused significant damages by overwriting important system files. It was written by a Taiwanese student.

In 1999, "Melissa" was released. This one, was the first wide spread Word Macro Virus. It was distributed via email and would automatically send itself to the first 50 people in the Outlook address book. It did not harm the computer as it was sending out passwords for some erotic websites which required membership. It caused so much email traffic resulting in email servers to crash.

2000 was the year of "iloveyou". Again, it came via email however it sent itself to all contacts. It also overwrote office, image, and audio files. The virus came from the Philippines and infected over 50 million computers in less than 10 days. Most companies back then decided to turn off their email servers to stop spreading the virus.

Since 2000, so many new viruses have been unleashed to wreak havoc on the world at large that it is difficult to list the most infamous. "Anna Kournikova", Code Red, Nimba, Beast, SQL Slammer, Blaster, Sobig, Sober, MyDoom, Netsky, Zeus, Conficker, Stuxnet, CryptoLocker, Locky, Mirai and WannaCry, are a few examples that come to mind.

Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system to support automated services, and __________ are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. A. contingent IDs, system accounts B. system accounts, contingent IDs C. systems administrator accounts, contingent IDs D. control partners, system accounts

Answers

Answer: B. system accounts, contingent IDs

Explanation:

Aside from human user types, there are non human user groups. Known as account types, (system accounts) are implemented by the system to support automated services, and contingent IDs are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. The system account is refered to as the user account which the operating system creates during installation.

Therefore, the correct option is B.

Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer choices

Answers

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

Someone gave me flashcards on a keychan. I have to memorize them and then give them back. Can I back them up to my PC by creating/copy the documents?

Answers

Answer: Yup!

If you'd rather take a picture with your phone, just back transfer the photos into your computer if necessary.

what is data processing? What is the output of data processing system?​

Answers

Answer:

A data processing system is a combination of machines, people, and processes that for a set of inputs produces a defined set of outputs. The inputs and outputs are interpreted as data, facts, information etc. depending on the interpreter's relation to the system. ... Conversion converting data to another form or Language.

Explanation:

(⌒_⌒;)

A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable for at least an eight-hour window as part of the response and recovery controls implemented. Which redundancy effort should be put in place to ensure the data remains available?

Answers

Answer: UPS

Explanation:

The redundancy effort that should be put in place to ensure the data remains available is the Uninterruptible Power Supply(UPS).

Uninterruptible Power Supply (UPS) is necessary in the provision of battery backup power when there's drop or stoppage in the flow of electricity. With regards to the question, it'll ensure that data is not lost at the system level in the event of a blackout.

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal

Answers

Answer:

Answer would be, PSTN (public switched telephone network)

An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable?

Answers

Answer:

offline backup solution

Explanation:

In such a scenario, the best option would be an offline backup solution. This is basically a local and offline server that holds all of the flight record data that the cloud platform has. This offline backup server would be updated frequently so that the data is always up to date. These servers would be owned by the aviation company and would be a secondary solution for the company in case that the cloud platform fails or the company cannot connect to the cloud service for whatever reason. Being offline allows the company to access the database regardless of internet connectivity.

4 Two people play a counting game.
The rules of the game are as follows:
The first player starts at 1
Each player may choose one, two or three numbers on their turn and the numbers must be in ascending order
Players take it in turns to choose
The player who chooses "15" loses the game. For example, if the first player chooses three numbers (1, 2, 3) then the second player could choose one number (4), two numbers (4, 5) or three numbers (4,5,6).
The first player then takes another go.
-Write an algorithm using pseudocode that allows two players to play this game.
The algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
--Display the numbers that the player has chosen Display a suitable message to say --which player has won once the number 15 has been displayed​

Answers

Answer:

algorithm should:

--Alternate between player 1 and player 2

--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3

An algorithm using pseudocode that allows two players to play the game is:

BEGIN Player One num "1"ASCENDING order num;TURN Player One num;TURN Player Two num;INCREMENT IF there is num "15"THENPLAYER loses

What is a Pseudocode?

This refers to the use of plain language to describe the sequence of steps for solving a problem.

Hence, we can see that from the given game rules about the input that is made by a player where he starts at 1 and any player that selects 15 loses the game and there is an increment is displayed in a rough form above.

Read more about pseudocodes here:

https://brainly.com/question/24953880

#SPJ2

define business systems​

Answers

A business system is a group of interdependent elements or tasks that meet a business objective. You should document every step for each business process or activity. Business activities consistently produce results. Strategizing how you complete these tasks can help streamline daily operations.

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files

Answers

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

Elabora un argumento sobre como nuestras acciones impactan en la calidad del aire y promueven acciones a favor del cuidado del ambiente y la salud

AYUDAAAAA!!!!!!!!

Answers

Answer:

Reduzca la cantidad de viajes que realiza en su automóvil. Reduzca o elimine el uso de chimeneas y estufas de leña. Evite quemar hojas, basura y otros materiales. Evite el uso de equipos de jardín y césped que funcionen con gas.

#CarryOnLearning

Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet. True False

Answers

Answer:

True - Firewalls are software programs/hardware devices designed to keep computers safe from hackers

What will the following code display?


A) 6

B) 0

C) 3

D) 0

1

2

Answers

Answer:

Answer is C) 3

Explanation:

Jeffery wants to identify the subject terms being used in APA PsychInfo for articles related to behavior modifications. What is the most efficient and effective search strategy to identify subject terms for a database search

Answers

Group of answer choices.

a. He can look for common related subject terms in a dictionary, thesaurus or encyclopedia.

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

c. He can use Go-ogle Scholar to retrieve relevant articles and find common related subject terms.

Answer:

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

The most efficient and effective search strategy to identify subject terms for a database search is to look for relevant articles in the results list from a database search and scan the subject terms.

In order to improve the speed of retrieval for a search engine, high frequency words such as if, or, and, at, to, etc., which are generally referred to as stop words are filtered out.

However, AND should be used to combine keywords and phrases when using a "subject search" option to search a database for relevant articles.

A sponsored link was delivered 100 times, and 10 people clicked on it. Calculate the click-through rate.

Answers

Answer:

10%

Explanation:

100 / 10 = 10

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.You want to protect the laptop from Internet-based attacks.Which solution should you use?

Answers

You can get a antivirus subscription that will kill malwaresAlso, you can avoid going on websites you don't trustI hope this helps you.

A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

Answers

Answer:

Protocol

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols are the reason you can easily communicate with people all over the world, and thus play a critical role in modern digital communications.

Which type of attack cripples the network and prevents legitimate users from accessing network resources

Answers

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

Your friend want to make a copy of your new game you bought the previous day .

Why should you prevent him from doing that?​

Answers

Answer:

It is copyright infringement

Explanation:

Required

Why you should prevent your friend from copying a software you bought

When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.

This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.

The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer:

Compactness

Explanation:

Have a nice day!

Other Questions
let's have a class named Distance having two private data members such as feet(integer), inches(float), one input function to input values to the data members, one Display function to show the distance. The distance 5 feet and 6.4 inches should be displayed as 5- 6.4. Then add the two objects of Distance class and then display the result (the + operator should be overloaded). You should also take care of inches if it's more than 12 then the inches should be decremented by 12 and feet to be incremented by 1. Carin opened a money market account with a deposit of $3,000. This account earns 2% simple interest annually. How many years will it take for her $3,000 deposit to earn $430 in interest, assuming she does not withdraw any of the money? What is the subject of a topic In these imprinted cells, the SNRPN transcript overlaps with another gene, called UBE3A, which is transcribed in the opposite direction. This means that the region that the RNA polymerase transcribes in these two genes actually overlaps; in some cases, overlapping transcription in opposite directions leads to transcriptional interference, meaning that collisions between the polymerases traveling in opposite directions can interfere with transcription. It is believed that this takes place in this case, meaning that the more SNRPN transcription occurs, the more this disrupts transcription of UBE3A. Based on this information as well as information about the effects of imprinting on SNRPN transcription, which of the following statements about UBE3A transcription would be true?a. The maternal copy of UBE3A is expressed and the paternal copy is silenced.b. The paternal copy of UBE3A is expressed and the maternal copy is silenced.c. Both copies of UBE3A are highly expressed.d. Both copies of UBE3A are silenced. Una torre de 28.2 m de altura esta situada a la orilla de un rio, desde lo alto del edificio el ngulo de depresin a la orilla opuesta es de 25.2. Calcular el ancho del ro 11.The temperature of a body of water influencesvegetation patternsglobal warmingthe formation of desertsthe temperature of the air above it what is the measure of the angle formed by a side of the given angle and the given angle's bisector:27? He excelled at most sports, but for some reason basketball was his Achilles' heel. Positive tone, analogy Positive tone, allusion Negative tone, analogy Negative tone, allusion The primary goal of socialism is equality of:O A. wealth.O B. political power.C. economic systems.D. genders.SUBN Pls ans this question step by step not only ans if it will help me than I will thanks uu comment uu pls ansme What is a mycelium?A. long, skinny, branching filaments with cross walls to separatethe nucleiB. a mass of hyphae under the fruiting body that do the work ofdecomposingC. the material above the soil that contains spores for reproducing Which of the following statements depend on the absolute dating of events? Draw the structure of the alkene with the molecular formula C6H10 that reacts with Br2 to give this compound. Find the volume.Use = 3.14coneh = 14 in.r = 9.9 in.in 3hType the correct answer rounded to twodecimal places, pls help it would be so appreciated I Describe the duties and responsibilities of own work role? The sum of the measures of two of the angles formed by the intersection of two lines is 114 degrees. Find the measures of all angles. (There are 4 boxes to fill out for the answer) The weirdest laws in the world gets brainliest. Look up the weirdest laws in the world and either post it in the comments or as an answer. I don't want anything inappropriate or I will report you! A compound, C7H13Cl, is reacted with sodium ethoxide and gives a single elimination product, C7H12. Treatment with ozone followed by zinc and water gives the compound below. Identify the original compound. A. 2-chloro-1,1-dimethylcyclopentane.B. 1-chloro-1,2-dimethylcyclopentane.C. 4-chloro-1,2-dimethylcyclopentane.D. 2-chloro-1,3-dimethylcyclopentane. 1. Match the word to its definition:1. Mainframesa. A type of computer used by many people at the same timeto allow access to the same secure data2. Super computerb. A large and powerful scientific computer that can processlarge amounts of data quickly3. Programc. The coded instructions that tell a computer what to do;also to write the code for a program4. Notebookd. A device that includes, text, and data capabilities5. Smart phonee. An individual's personal computer that resides on a desk ortable6. Tabletf. A computer that combines the features of a graphic tabletwith the functions of a personal computer; sometimescalled a tablet PC7. Desktop8. Computerg. Is a machine that changes information from one form intoanother by performing four basic actionsh. A small portable computer, such as a netbook How did the end of the Cold War affect the Soviet Union and Yugoslavia? 1 Both nations splintered in part along ethnic lines. 2 Both nations rejected economic aid from the United States. 3 Both nations pursued entry into the European Union. 4 Both nations disbanded national military forces.