suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts were unsuccessful. What tool did you implement that logged those attempts and identified the users

Answers

Answer 1
Two factor authentication? I’m not sure

Related Questions

please help me please i really need helpp so i can pass

Answers

Answer:

Piezoelectric gauge is used to convert charge into measureable electric signal.

Universal serial bus interface allows a computer and flash drive to exchange information.

Analytical balance is used to measure mass

Ultrasonic flow sensors measure the seed of water using ultrasonic waves.

Explanation:

Analytical balance is used to measure mass. An analytical balance is a device that can measure the mass of an object  accurately. It can also measure very small amount of mass with a range between 0.1mg - 0.01mg.

Universal serial bus interface allows a computer and flash drive to exchange information. A Universal Serial Bus (USB) is an interface that allows communication between peripheral devices and a computer. It connects peripheral devices such as mouse, keyboards, printers, scanners, external hard drives and flash drives with the computer.

Piezoelectric gauge is used to convert charge into measureable electric signal. A piezoelectric gauge has a piezoelectric sensor that uses piezoelectric effect to measure changes in pressure, temperature, force and convert these changes into electrical charge.

Ultrasonic flow sensors measure the speed of flowing liquid using ultrasonic waves. It uses sound waves to determine the speed of the liquid.

_________________ allows cloud controller to locate instances on separate zones to boost redundancy.

Answers

Answer:

_____Router___ allows the cloud controller to locate instances on separate zones to boost redundancy.

Explanation:

A router, as a networking device, forwards data packets between one computer network and other networks.  With a router, one can use wired and wireless devices to connect to the Internet.  Unlike a modem, which connects the home network to a wider internet, a router can enable the networks to interact with one another without using the Internet.

An external file that can be imported into a slide to give more detailed explanation of the topic would be ____.

Answers

Answer:

Video clip

Explanation:

In a Microsoft PowerPoint, a video clip is considered an external file. Asides from the pictures and text presented in the slide for a smooth transition of the message in the PowerPoint document, a video clip can give a more detailed explanation of the topic.

This can be done by clicking the Insert tab from a Menu bar. Then click on the Video tab followed by Movie from the file. Then look for the movie file and click insert.

Please help!!! I am very confused about this question!

Answers

Explanation:

You mean like Sports Photography - focuses on athletes and coaches

Editoral Photography - focuses on a public story

Architectural Photography- focuses on design of buildings ,etc.

Answer:

Amateur Photography <----> focuses on capturing life events

Advertising Photography <----> focuses on enhancing desirability of products

Editorial Photography <----> focuses on providing visual news

Documentary Photography <----> focuses on social reality

Explanation: I think this should be correct, let me know if it helps :)

In the range E7:E11, apply the Currency number format with zero decimal places and $ as the symbol.

Answers

Answer:

bt wheres the data

Explanation:

The following program calculates yearly and monthly salary given an hourly wage. The program assumes a work-hours-per-week of 40 and work-weeks-per-year of 50. Insert the correct number in the code below to print a monthly salary. Then run the program. The monthly salary should be 3333.333... .

Answers

Answer:

The program implemented in Python is as follows:

hourly=float(input("Hourly Wage: "))

print("Annual Rate: "+str(hourly * 40 * 50))

print("Monthly Rate: "+str(round((hourly * 40 * 50/12),2)))

Explanation:

The question is incomplete as the missing code is not given. However, I've written the program from scratch in python.

This prompts the program user for the hourly Wage;

hourly=float(input("Hourly Wage: "))

This calculates and prints the annual rate

print("Annual Rate: "+str(hourly * 40 * 50))

This calculates and prints the monthly rate

print("Monthly Rate: "+str(round((hourly * 40 * 50/12),2)))

Note:

The annual rate is calculated by multiplying the hourly wage to number of hours per week (40) to number of weeks per year (50)

The monthly rate is calculated by [tex]annual\ rate/12[/tex]

A company is completing research and development for software which it is planning to produce in approximately 2 years time. Which of the following assumptions should the company make about the processing speeds of the hardware which will be used to run this software.

Answers

Answer:

true tbh I don't really Know

Describe at least two ways social media has impacted cybersecurity.

Answers

Answer:

Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.

Explanation:

Answer:Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business

Explanation:

can u guys tell me what is the definition of umbra​

Answers

a conical shadow excluding all light from a given source specifically : the conical part of the shadow of a celestial body excluding all light from the primary source.

Write a method, public static void selectSort(ArrayList list), which implements a selection sort on the ArrayList of Integer objects list. For example, if the parameter list would be printed as [3, 7, 2, 9, 1, 7] before a call to selectSort, it would be printed as [1, 2, 3, 7, 7, 9] after the method call.

Answers

Answer:

Explanation:

The following code is written in Java and like asked in the question, it is a function that takes in an ArrayList of Integers as a parameter and uses selection sort to sort the array.

public static void selectSort(ArrayList<Integer> list) {

                       for (int i = 0; i < list.size() - 1; i++)

                       {

                               int index = i;

                               for (int j = i + 1; j < list.size(); j++){

                                       if (list.get(j) < list.get(index)){

                                               index = j;

                                       }

                               }

                               int smallerNumber = list.get(index);

                               list.set(index, list.get(i));

                               list.set(i, smallerNumber);

                       }

               }

g The process of a CPA obtaining a certificate and license in a state other than the state in which the CPA's certificate was originally obtained is referred to a

Answers

Answer:

Substantial equivalency.

Explanation:

An unmodified opinion on financial statements can be defined as an opinion issued by an auditor stating that there are no material misstatements and this simply implies that the, the financial statement represents a true and fair perspective.

Hence, when an investor seeking to recover stock market losses from a certified public accountant (CPA) firm, he or she must establish that the audited financial statements contain a false statement or omission of material fact in accordance with the public company accounting oversight board (PCAOB).

The process of a certified public accountant (CPA) obtaining a certificate and license in a state other than the state in which the CPA's certificate was originally obtained is referred to as substantial equivalency. Thus, this make it possible for certified public accountant (CPA) to practice in a state other than where he or she was issued the license.

create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.

Answers

Answer:

Explanation:

The following code is written in Python and creates a function called create_sentence which takes in 2 parameters which are the number of spaces and the number of stars. Then it uses these values to create the sentence and return it.

def create_sentence(spaces, stars):

   sentence = ""

   for x in range(spaces):

       sentence += " "

   for x in range(stars):

       sentence += "★"

   sentence += "\n"

   return sentence

What job does a back-end developer perform?
O Evaluates a computer systems vulnerabilities and weaknesses
O Handles what happens behind the scenes on websites
Handles what users see and experience on websites
O Writes code for video games​

Answers

Answer:

Handles what happens behind the scenes on websites

Explanation:

The website back end is made up of server, an application, and a database. The back-end developer builds and coordinate these components together. Back end developers manage the technical side of the websites (that is what the users do not see on the website).

The back end developer needs to know how to program using PHP, java, Python, Ruby, as well as use tools such as MySQL, Oracle, and SQL Server.

4) Name ways in which a government could use computers to control its
citizens.
5) Describe at least two social changes brought about by communication
technologies.
6) How does a service economy differ from a production economy?
7) Name three ways in which TV has affected our culture.
8) Define ethical.
I
9) Why does digital editing raise ethical problems?
10) What is a computer virus?

Answers

A computer virus is what takes over a computer and ruins everything. It can spread from device to another device.

What kind of operating system is Windows? I

Answers

Huh? I don’t understand
computer operating system

How important "saving" in every individual?​

Answers

Answer:

The importance of saving money is simple: It allows you to enjoy greater security in your life. If you have cash set aside for emergencies, you have a fallback should something unexpected happen. And, if you have savings set aside for discretionary expenses, you may be able to take risks or try new things.

With the use of technology and digital files increasing daily, do you think it is necessary for experts to be trained in document and handwriting analysis

Answers

Answer:

Yes.

Explanation:

In this case, it is believed the expert that is being referred to as an expert witness is a "Forensic document examiner. The forensic document examiner is an expert in determining the authenticity or credibility of a document by analyzing the originality of the document, such as handwritings signatures, a history of the documents, etc.

Hence, despite the use of technology and digital files increasing daily, it is still necessary for experts to be trained in document and handwriting analysis because they need to understand the originality of documents and signatures that involve the computerized handwriting of individuals.

To bundle links together in order to improve bandwidth availability and redundancy, what protocol is used

Answers

Answer:

Link Aggregation Control Protocol

Explanation:

Link Aggregation Control Protocol can be used to assist in the formation of port channel bundles of physical links.

Link Aggregation Control Protocol is an IEEE standard defined in IEEE 802.3ad. LACP lets devices send Link Aggregation Control Protocol Data Units (LACPDUs) to each other to establish a link aggregation connection.

Need help please asapp

Answers

Answer:

B

Explanation:

0.05 is the decimal form of 5%

So the sale amount times 0.05 will give the tax amount

Hope this helps!

In the 2018-2019 softball season, Allison hit the ball 28 out of 67 times, this included fouls. What was her percentage
of misses?

Answers

Answer:

Allison missed 58.21% of the times.

Explanation:

The first step is to divide 28 by 67 to get the answer in decimal form:

28 / 67 = 0.4179

Then, we multiplied the answer from the first step by one hundred to get the answer as a percentage:

0.4179 * 100 = 41.79%

Then 100(%) - 41.79(%) = 58.21%

what is the moon in science class?

Answers

Some big ball of cheese that glows or something

give five types of charts

Answers

Answer:

line graphs, bar graphs and histograms, pie charts,

True or False: Kitchen lighting can be included on a small appliance branch circuit.. Single line text.

Answers

The answers is False

What is the software system design to locate information on the World Wide Web
search browser
Search engine
Search keyboard
Search result

Answers

Answer:

Search engine

Explanation:

Answer:

search engine

Explanation:

If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All computers are electronic devices. Some electronic devices are not made of clay.

Answers

Answer:

because the conclusion is not in agreement with the two premises.

Explanation:

Remember, the term syllogism refers to the form of reasoning that draws its conclusion based on the stated premises. In other words, a conclusion is reached if it satisfies all or part of the premises.

In this case, the statement "No computer is made of clay" and  "All computers are electronic devices" should be inferred to mean, No electronic devices are made of clay" not "Some electronic devices are not made of clay," since the two premises neither suggest that electronic devices are made from clay.

The reason why the given syllogism is invalid is because; The conclusion does not agree with the premise.

We are given two statements as premises;

1) No computer is made of clay

2) All computers are electronic devices

The third statement is the conclusion which states that;

3) Some electronic devices are not made of clay.

Now in syllogism, the conclusion must be in agreement with the two premises.

In this question, the conclusion doesn't agree with the premises because the conclusion says "some electronic devices are not made of clay". Whereas the premise says that no computer which is an electronic device is made of clay.

Since none of the premise suggests that any electronic device is made of clay, then the syllogism is invalid.

Read more about syllogism at; https://brainly.com/question/1622136

In 1981, the first digital icons were launched for users in _________, which was the first computer with a GUI operating system.

Answers

Answer:

Xerox Alto

Explanation:

the first digital icons were launched for users in Xerox Alto in 1981. this was the first computer with a General user interface (GUI) operating system. It had a speed designation of 3 Mbit/s.

The xerox Alto had a huge influence in the design of personal computers in decades to come. It was the first to bring together all of the components of the GUI.

In 1981, the first digital icons were launched for users Xerox Alto which was the first computer with a GUI operating system.

It should be noted that the first digital icons that was launched is Xerox Alto in 1981. It was simply the first computer that had a general user interface operating system.

Also, Xerox Alto had a speed designation of 3 Mbit/s and had a huge influence in the design of personal computers in decades to come.

Read related link on:

https://brainly.com/question/21728252

2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s in reverse order. If s is 'top', the expression should evaluate to 'pot'.

Answers

Answer:

The program in Python is as follows:

s = input("Three letter string: ")

if(len(s)==3):

    print(s[::-1])

else:

    print("Invalid length")

Explanation:

This prompts the user for a three-letter string

s = input("Three letter string: ")

The following if condition checks if the length of the string is 3. If yes, it reverses and print the reversed string

if(len(s)==3):

    print(s[::-1])

If otherwise, it prints "Invalid length"

else:

    print("Invalid length")

When packets are routed on the Internet, the route for a particular packet is not pre-
determined. Instead, the next hop is decided by each router along the way.
How does that increase the fault tolerance of routing on the Internet?

Answers

Answer:

She notices the website is using a different font and logo, and that the emails are suspiciously worded:

Explanation:

Answer: Each router can pick a connection that's currently working and available.

Explanation: yes

Write a java program named SumThousand The program adds all the number from 1 to 1000 together and print out the sum

Answers

Answer:

The program in Java is as follows:

public class SumThousand  {

   public static void main(String args[]) {

     int sum=0;

     for(int i =1;i<=1000;i++)

         sum+=i;

     

     System.out.println("Sum = " + sum);

   }

}

Explanation:

This initializes sum to 0

int sum=0;

This iterates from 1 to 1000

     for(int i =1;i<=1000;i++)

This calculates the required sum

         sum+=i;

     

This prints the calculated sum

     System.out.println("Sum = " + sum);

   

Nia is editing a row in an Access table. The row contains the Pencil icon on the left end of the record
this icon indicate?
A. The record is committed.
B. The record has not been written.
C. The record has been written.
D. Nia is editing the record currently.

Answers

Answer:

The answer is D

Explanation:

That little pencil reminds you that you are entering or editing the current record, and that the changes you are making are not yet saved. The little pencil disappears as soon as you move off the current record. Take that as confirmation that Access has saved your new record, or the changes you made to an existing one.

In the case above, The row has the Pencil icon on the left end of the record this icon indicate Nia is editing the record currently.

What is record?

A record is known to be the state or fact of an act been put down or is been recorded.

Note that In the case above, The row has the Pencil icon on the left end of the record this icon indicate Nia is editing the record currently as it shows the pen icon.

Learn more about record  from

https://brainly.com/question/25562729

#SPJ9

Other Questions
help this is my midterm is -27 divided by (-3) positive or negative & how Complete the table.(Type whole numbers or decimals.) Which of the following is NOT one of the Five Pillars of Islam?Options:Muslims must truly believe that there is no God but Muhammad.Muslims must be generous to the poor.Muslim may not eat or drink from sunrise to sunset during Ramadan.Muslims must pray five times a day. Solve each system.y=6x + 62x -6y= -2 I need this math question solved fast please!!! - Interest: A sum fetched a total simple interest of $ 4016.25 at the rate of 9 %.p.a. in 5 years. What is the sum? Which is the topic sentence of the following paragraph? Each paragraph should have a topic sentence, support, and a concluding sentence. The topic sentence tells the one thing you will discuss in this paragraph. The support gives the information, facts, details, reasons, examples, and anything else you wish to tell about the one topic you are writing about. The concluding sentence summarizes the paragraph's content. Question 10 options: a) Each paragraph should have a topic sentence, support, and a concluding sentence. b) The support gives the information, facts, details, reasons, examples, and anything else you wish to tell about the one topic you are writing about. c) The concluding sentence summarizes the paragraph's content. d) The topic sentence tells the one thing you will discuss in this paragraph. Of 140 seventh-grade students, 15% earn the Presidential Physical Fitness Award. How many students earn the award? Which post World War II conflict ended with neither side winning? A girl has 11 coins in dimes and quarters. Their value is $1.55. How many quarters does she have?835 Ethical analysis precedes law when it is the basis for creation of a law.Select one:O True False What is the best approximation for the value of 140? Elijah currently has six strollers that he purchased for $235 each and four cribs that he purchased for $450 each on the floor of his baby supply store. He also has three strollers and two cribs in his storeroom. Using the weighted average cost method, what is the cost of each item being sold at Elijah's baby supply store? a. $364.00 b. $342.50 c. $32100 d. $301.15 Please answer thank you !!! PLEASE HELP ILL MARK BRAINLIESTWhich event from Acts II and III demonstrates the recurring motif of "Fair isfoul, and foul is fair"?O A. Lady Macbeth drugs the king's guard to allow Macbeth to killDuncan.B. Hecate is angry at the three witches and yells at them for theirdisobedience.C. Banquo doesn't commit any crime but is murdered at Macbeth'scommand.D. Macbeth sees Banquo's ghost at the banquet and tries to defendhimself. What was Kristallnacht, or the Night of Broken Glass? Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size. I don't know how to do this can someone help me Cycle time is computed as A. daily operating time divided by the product of desired output and the sum of job times B. the product of desired output and the sum of job times divided by daily operating time C. daily production time available divided by the desired number of outputs D. desired output divided by the daily operating time