answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
2 years ago
5

The __________ of a desktop computer is the case that houses the computerâs critical parts, such as the processing and storage d

evices.
Computers and Technology
1 answer:
Phantasy [73]2 years ago
4 0
You said it in your question. The case! Though it's also given other names, such as housing, chassis, enclosure etc.
You might be interested in
Write a loop to populate the list user_guesses with a number of guesses. The variable num_guesses is the number of guesses the u
Masja [62]

Answer:

num_guesses = int(input())

user_guesses = []

for i in range(num_guesses):

    x = int(input())

    user_guesses.append(x)

   

print(user_guesses)

Explanation:

This solution is provided in Python

This line prompts the user for a number of guesses

num_guesses = int(input())

This line initializes an empty list

user_guesses = []

This loop lets user input each guess

for i in range(num_guesses):

This line takes user input for each guess

    x = int(input())

This appends the input to a list

    user_guesses.append(x)

This prints the user guesses    

print(user_guesses)

6 0
1 year ago
1. Show that the three security services-confidentiality, integrity, and availabilty- are sufficient to deal with the threats of
nika2105 [10]

Answer:

Answer explained below

Explanation:

1. confidentiality prevents disclosure,availability prevents disruption,integrity prevents accepting wrong data. availability and integrity will prevent disruption. the possessed data if wrongly held then its availability is affected. if actual data is impersonated then integrity is affected.

2. computers are invented by humans. they are programmed by humans. humans may tend to make mistakes and may fail to take care of all real-time possibilities. hence may not be perfectly secure

3.a. o-->owner r-->read w-->write x-->execute

                                             alicerc babrc cyndyrc

      alice                           ox  

      bob                                   rr  

      cyndy

3b                                          alicerc babrc cyndyrc

      alice                                  ox              r            r

      bob                                                     ox  

     cyndy                                  r                rw           orwx  

4. Integrity means that information is correct, and that data has not been corrupted in any way. integrity ensures that information has not been compromised, that the information is valid and is a result of authenticated and controlled activities. If we don’t have any way to confirm and ensure that this is true, we can’t guarantee confidentiality.

5.a.discretionary access control

Since users can assign and modify permissions that they possess, access control is discretionary.

5.b.originator access control

This would be originator access control. This is because if I am the author of the memorandum I am

the one who can say my information can be distributed, no one else can.

5.c.mandatory access control

The system controls access and an individual cannot change that. There is a somewhat tricky scenario

though that could possibly make this discretionary; if there is an owner of the 'military facility' and this person also had the ability to promote military personnel to 'general'. In this way the facility owner could grant access to their facility.

6 0
2 years ago
Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee
juin [17]

The answer is B: Yahoo! mail

Donna is able to install Yahoo! mail as an app on her portable devices like phones and tablets and be able to organize her Google mails, Outlook, and yahoo accounts. The beauty of it is that you are able to sign in with any account (non-Yahoo emails). anywhere and at any time. It also provides 1000 GB of free secure cloud storage.



6 0
2 years ago
Read 2 more answers
Write a method called makeStars. The method receives an int parameter that is guaranteed not to be negative. The method returns
serious [3.7K]

Answer:

// import the Scanner class

// to allow the program receive user input

import java.util.Scanner;

// The class Solution is defined

public class Solution{

   // main method to begin program execution

   public static void main(String[] args) {

       // scanner object scan is declared

       Scanner scan = new Scanner(System.in);

       // Prompt the user to enter a number

       System.out.println("Enter the number of stars you want: ");

       // user input is assigned to numOfStar

       int numOfStar = scan.nextInt();

       // call the makeStars method

       makeStars(numOfStar);

   }

   

   // makeStars method print stars using recursion

   // the method call itself till starNum == 0

   public static void makeStars(int starNum){

       if (starNum != 0){

           System.out.print("*");

           makeStars(starNum -1);

       }

   }

}

Explanation:

The code is well comment and solve the problem using recursion.

6 0
2 years ago
Poor quality lateral communication will result in which ofthe
zhuklara [117]

Answer:

b

Explanation:

b, lack of coordination

3 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is not a benefit of active listening?
    8·1 answer
  • Which computer applications can Mr. Crowell use to make the classroom learning more stimulating and interesting? Mr. Crowell has
    9·2 answers
  • When using preventative insecticides which holiday period should trigger an application?
    15·2 answers
  • Assume that the variables gpa, deansList and studentName, have been declared and initialized. Write a statement that adds 1 to d
    13·1 answer
  • Does the Boolean expression count > 0 and total / count > 0 contain a potential error? If so, what is it?
    8·1 answer
  • Write a method called printReverse that accepts a String as its parameter and prints the characters in opposite order. For examp
    9·1 answer
  • When Jen is planning to upgrade to a monitor with a better resolution, what should she be looking for in the new monitor? machin
    11·1 answer
  • 14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc
    13·2 answers
  • Suggest how the following requirements might be rewritten in a quantitative way. You may use any metrics you like to express the
    7·1 answer
  • TQ Artificial Intelligence (AI)
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!