answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olenka [21]
2 years ago
7

In the scenario below, identify which of the three dimensions is primarily threatened or compromised. The constant popups on his

computer are making it difficult for Alfonso to accomplish work that involves being on the internet.
a. Confidentiality
b. Integrity
c. Availability
Computers and Technology
1 answer:
Elenna [48]2 years ago
4 0

Answer:

The answer is "Option c "

Explanation:

A Damaged Machine is characterized just like any computing device, in which secrecy, reliability, or accessibility was affected by an untrustworthy source, whether wittingly or unwittingly. A resolution could be achieved either by unreliable source administrative interaction. Evaluating the quality is especially challenged throughout the situation, the continuous pop-ups to the device make it impossible to Alfonso to be doing a job on the network, and wrong choices can be described as follows:

  • In option a, It is wrong because it is used in the virus continues to sign in.
  • In option b, It is wrong because it is affected by the compromised.

You might be interested in
The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms
strojnjashka [21]

The answer in the space provided is the Diffie-Hellman Key Exchange. This is entitled to be the first published key algorithm in which has a limit in which the exchange occurs in secret values and that its purpose was to enable two users to have an exchange of key in a secure manner in means of using it for a subsequent symmetric encryption in terms of messages.

7 0
2 years ago
Use the Manufacturing database from "Excel Databases.xls" on Blackboard. Use Excel to develop a multiple regression model to pre
Dennis_Churaev [7]

Answer:

52.64

Explanation:

Multiple Regression:

Multiple regression generally explains the relationship between multiple independent or predictor variables and one dependent or criterion variable.

Please kindly check attachment for the step by step solution of the given problem.

6 0
2 years ago
Look at the top 3 banking activities done via mobile banking vs. online banking. What characteristics do you notice for both?
muminat

Answer:  <em>The biggest difference between the two is their functionality. Internet Banking allows you to conduct online transactions through your PC or laptop and an internet connection. On the other hand, mobile banking can be done with or without internet. Many banks nowadays have their mobile apps for mobile banking.</em>

Disadvantages of Mobile Banking

<em>If the customer does not have a smartphone than the use of Mobile Banking becomes limited. A transaction like transfer of funds is only available on high-end phones. Regular use of Mobile Banking may lead to extra charges levied by the bank for providing the service.</em>

<em />

Explanation: <u><em>Was this helpful to you? if so please put me Brainlyest.</em></u>

4 0
2 years ago
Given 4 integers, output their product and their average, using integer arithmetic.
solmaris [256]

Answer:

see explaination

Explanation:

Part 1:

import java.util.Scanner;

public class LabProgram {

public static void main(String[] args) {

Scanner scnr = new Scanner(System.in);

int num1;

int num2;

int num3;

int num4;

int avg=0, pro=1;

num1 = scnr.nextInt();

num2 = scnr.nextInt();

num3 = scnr.nextInt();

num4 = scnr.nextInt();

avg = (num1+num2+num3+num4)/4;

pro = num1*num2*num3*num4;

System.out.println(pro+" "+avg);

}

}

------------------------------------------------------------------

Part 2:

import java.util.Scanner;

public class LabProgram {

public static void main(String[] args) {

Scanner scnr = new Scanner(System.in);

int num1;

int num2;

int num3;

int num4;

double avg=0, pro=1; //using double to store floating point numbers.

num1 = scnr.nextInt();

num2 = scnr.nextInt();

num3 = scnr.nextInt();

num4 = scnr.nextInt();

avg = (num1+num2+num3+num4)/4.0; //if avg is declared as a float, then use 4.0f

pro = num1*num2*num3*num4;

System.out.println((int)pro+" "+(int)avg); //using type conversion only integer part

System.out.printf("%.3f %.3f\n",pro,avg);// \n is for newline

}

}

8 0
2 years ago
Although slow start with congestion avoidance is an effective technique for coping with congestion, it can result in long recove
Serggg [28]

Answer:

The answer to this question can be defined as follows:

In option A: The answer is "13020".

In option B: The answer is "468 Segments".

Explanation:

Given:

The value of round-trip delay= 60 m-second

The value of Bandwidth= 1Gbps

The value of Segment size = 576 octets

window size =?

Formula:

\text{Window size =} \frac{(\text{Bandwidth} \times \text{round} - \text{trip time})}{(\text{segment size window })}

                     =\frac{10^9 \times 0.06}{576 \times 8}\\\\=\frac{10^9 \times6}{576 \times 8\times 100}\\\\=\frac{10^7 \times 1}{96 \times 8}\\\\=\frac{10^7 \times 1}{768}\\\\=13020.83

So, the value of the segments is =13020.833 or equal to 13020

Calculating segments in the size of 16 k-bytes:

\text{Window size} = \frac{10^9 \times 0.06}{16,000 \times 8}

                    = \frac{10^9 \times 0.06}{16,000 \times 8}\\\\ = \frac{10^9 \times 6}{16,000 \times 8 \times 100}\\\\ = \frac{10^4 \times 3}{16 \times 4}\\\\ = \frac{30000}{64 }\\\\=468.75

The size of 16 k-bytes segments is 468.75 which is equal to 468.

6 0
2 years ago
Other questions:
  • Which option describes wearable technology?
    5·2 answers
  • Give at least one example computer application for which a connection-oriented service is appropriate and at least one example c
    12·1 answer
  • Phillip is a wellness counselor. He has created a newsletter as a service for his clients. He needs to decide upon a method to d
    7·1 answer
  • Match each logical function with its description. AND COUNTIF SUMIF IF tests for a certain condition and returns one of two valu
    7·1 answer
  • Your reputation and credibility will be immediately destroyed if your website contains?
    8·2 answers
  • Programming challenge description: Write a program that, given two binary numbers represented as strings, prints their sum in bi
    6·1 answer
  • ArgumentException is an existing class that derives from Exception; you use it when one or more of a method’s arguments do not f
    11·1 answer
  • ____ twisted pair is the least quality twisted pair wire that should be used in a data/voice application.
    9·1 answer
  • Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
    11·1 answer
  • Which XP practice prescribes that "the code [always be] written by two programmers at one machine"?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!