answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
2 years ago
15

Henry is working from a USDA office. He has several tasks to perform today: 1) he logs onto his USDA computer to get started; 2)

he faxes a sensitive document to his supervisor using a fax machine with the appropriate clearance; 3) he confirms some appointments and project due dates and enters them into his PDA; and 4) he calls his supervisor on his cell phone to review the document he just faxed over. Which of Henrys actions was a mistake? A. Using a cell phone to discuss sensitive information.B. Using a complex password to log onto the computer.C. Downloading data to his PDA.D. Using a fax machine with the appropriate level of clearance to send the sensitive fax.
Computers and Technology
1 answer:
Ksivusya [100]2 years ago
3 0

Answer:

  A. Using a cell phone to discuss sensitive information

Explanation:

In general, cell phone signals are not secure. Cell phones without appropriate encryption should never be used to discuss sensitive information.

You might be interested in
The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. I
Talja [164]

Answer:

The correct answer to the following question will be "Instruction set architecture".

Explanation:

The Instruction Series Design is a component of the system that is accessible to the compiler and the programmer. It is also the distinction between hardware and software. We will describe in detail the set of instructions used in most of the microprocessors that are used today.

The processor ISA can be represented using 5 categories, these are as follows:

  • The RAM Running Memory.
  • Amount of clear operating names.
  • Location of operands.
  • Operations
  • Size and type of the operand.

Therefore, Instruction set architecture is the right answer.

4 0
2 years ago
A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an erro
Ray Of Light [21]

Answer: Which of these is a compound morphology? (A. bookkeeper = book + keeper)

The software first uses (NLU) to map and analyze the input. It then creates the output using (NLG).

(It works by mapping input to representation and analyzing them.)

What type of morphology does this follow? (D. derivational morphology)

What is such an error called? (C. lexical ambiguity)

Explanation: Plato

4 0
2 years ago
9. Which of the following are true for all regular languages and all homomorphisms? (a) h (L1 ∪ L2)= h (L1) ∩ h (L2). (b) h (L1
mixer [17]

Answer:

h (L1 ∪ L2)= h (L1) ∩ h (L2).

This is true.

There will be w ∈  (L1 ∪ L2) for any s ∈ h (L1 ∪ L2) in such a way that s=h(w)

we can assume that w ∈ L1

So In this case h(w) ∈ L (S1). Hence s ∈ L(S1)

for any s ∈ h (L1) U h(L2)

We can assume that s ∈ L(S1)

There exists w ∈ L1 such that s= h(w)

In this case it is w ∈ L1 U L2 as well.

Hence , s ∈ h (L1 U L2)

Explanation

consider  = 0,1 and  = a,b and h(0) = a , h(1) = ab

(a) Consider L1 = 10,01 and L2 = 00,11

   Now L1 ∪ L2 = 00,01,10,11

   h (L1 ∪ L2) = h(00) , h(01) , h(10) , h(11) = h(0)h(0) , h(0)h(1) , h(1)h(0) , h(1)h(1)

  = aa, aab , aba , abab

Hence h (L1 ∪ L2) = aa, aab , aba , abab .

Here h (L1) = h(10) , h(01) = h(1)h(0) , h(0)h(1) = aba , aab

Hence h (L1) = aba , aab .

Here h (L2) = h(00) , h(11) = h(0)h(0), h(1)h(1) = aa, abab

Hence h(L2) = aa, abab.

Finally Hence , h (L1 ∪ L2)= h (L1) ∩ h (L2).

5 0
2 years ago
Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
Sphinxa [80]
<span>The answer is highlight cells, select the Insert tab, click on the number, select Date from the category box, highlight the correct format, and click OK.</span>
8 0
2 years ago
Match each logical function with its description. AND COUNTIF SUMIF IF tests for a certain condition and returns one of two valu
lakkis [162]
1. IF
2. AND
3. COUNTIF
4. SUMIF
4 0
2 years ago
Other questions:
  • Select the correct answer. James is a sales analyst of a departmental store chain. He checked the sale records for the past 12 m
    6·2 answers
  • A large Internet merchandise provider determines its shipping charges based on the number of items purchased. As the number incr
    6·1 answer
  • Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
    13·1 answer
  • If productCost and productPrice are numeric variables, and productName is a string variable, which of the following statements a
    11·1 answer
  • Imagine a business where there are no clear boundaries defined for data and systems ownership. As a security professional, descr
    11·1 answer
  • They predicted another cold day in Seattle. They predicted another windy day in Seattle. Combine the sentences into one sentence
    8·1 answer
  • ) A byte is used to represent a single character in the computer ______<br> true or false?
    14·2 answers
  • For a data structure, such as a stack, who is responsible for throwing an exception if the stack is empty and a pop() is called:
    13·1 answer
  • Write a class named Employee that has private data members for an employee's name, ID_number, salary, and email_address. It shou
    7·1 answer
  • Given a sorted list of integers, output the middle integer. A negative number indicates the end of the input (the negative numbe
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!