answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
2 years ago
12

Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul

a. Where will the CPU store data for easy access and quick retrieval during these computations?
A) read-only memory 
B) random- access memory 
C)  Hard disk 
D) Compact disk 
Computers and Technology
2 answers:
EastWind [94]2 years ago
8 0

Answer: B) random- access memory(RAM)

Explanation: Random-access memory is the memory unit  of the operating system that operates at high speed and can be accessed randomly The data stored in this memory can be revived till the system is on position.

According to the case mentioned in the question,Samantha can retrieve the formula stored in the form of data from RAM and use it whenever she requires it for calculation till the computer is on.This shows the volatile nature of RAM.

Other options are incorrect because read-only memory(ROM) can store data which can be only read, hard disk is non-volatile disk that stores data and compact disk(CD) stores data using light .Thus, the correct option is option(B).

MrMuchimi2 years ago
4 0
B. random-access memory
You might be interested in
Do all of the packets in your sent messages always follow the same path? If not, describe at least two different paths packets t
Lemur [1.5K]

Answer:

All the message I sent were from the same routers

Explanation:

All the message I sent were from the same routers

5 0
2 years ago
Read 2 more answers
There are 10 red apples and 12 green apples in a basket. If Vinta randomly selects 3 apples from the basket, what is the probabi
denpristay [2]

Answer:

12/22

Explanation:

As there are 22 apples in total and 12 green it is 12/22.

5 0
2 years ago
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
gogolik [260]

Answer and explanation:

Authentication:

authentication can be done by using the user id and password, by using social sign in  or by using the biometrics. Authentication means verify the user who they claim they are and to grant them access.  

Authentication works as follows:  

Prompting the user to enter the credentials.  

Send the credentials to the authentication server.  

Match the credentials.  

Authorize the user and grants the acces

External Website security:  

External Website security is important to protect the website from hackers, electronic thieves and to prevent security breach.  

Use of firewall.  

Implement the access control.  

Use of MVC (Model View Controller) to create different view for different type of user.  

Use of encryption.  

Use of SSL certificate.

Use of security plugins.  

Implement tools and techniques for backup and disaster recovery.  

Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  

Use of authorization to provide different user with the specific privileges and access.  

Encrypt or hide sensitive web pages.  

By implementing IT policies.  

Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway (single tenant or multi-tenant):

VPN(Virtual private network), BGP(Border gateway protocol), hyper-V network can be used to provide the remote access.  

Remote access can be provided by simple configuration. Remote access involves enabling user, managing their access, protecting the assets, use of remote desktop protocol and managing server sessions, remoteApp and personal and pooled desktop.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  

Rules to prevent SQL injection and XSS.  

Allow only the specific type of traffic.  

Use access rules for IP security.  

Implement certain IT policies.  

Can implement their own rule.  

Wireless Security:  

Nowadays Wifi is being used in every organization and it prevents the network from malicious and unauthorized access.  

Wireless security can be provided by the use of encryption, decryption, authentication and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

In the following manner VLAN can be configured for web interface:  

Switching => VLAN => Advanced => VLAN Membership  

Switching => VLAN > Advanced => Port PVID Configuration.  

VLAN web filtering:  

VLAN can be configured between router and firewall, router and gateway, router and switch and by doing so one can filter the web traffic that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and registering the laptop by their MAC address will provide laptop security. Use of security tool for local machine is also a good option. Use of device level authentication by using local username and password is also a good idea.  

Application policy recommendations:  

Application policy includes use of cookies, social media integration, access control, generating notifications and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes the list of security methods to be implemented for traffic filtering, IP spoofing, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind the firewall and it matches the incoming traffic against the security policies. It matches the signature and handles the intrusion if any and generates the log and alerts for the same.  

IDS goal is to identify malicious traffic before it can proceed further into the network. It generates alerts and notification so that the network monitoring team can look after the intrusion.  

Use of anomaly based detection and prevention system is the better choice.

6 0
2 years ago
Which native windows application allows one to access basic pc settings and controls system info?
vlabodo [156]
As far as windows 7 and below it was control panel, but in windows 8 and higher, microsoft added, a new app which was called settings, control panel was still there but with a few features removed
7 0
2 years ago
Read 2 more answers
How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories an
I am Lyosha [343]

Mobile software is an App that can be downloaded to a mobile device and used to execute specific tasks. Once the app is initiated, it runs inside the operating system until it is been closed by the user. These are small, individual software units which can work as a browser, game, shopping app, calculator and more.


There are mainly 3 types of mobile apps:

Native applications, Hybrid applications, and Web applications.


Native Applications:

Native applications are developed to be used on a particular platform or device. They exist on the device and are accessed through icons on the device. Native apps are written for specific Operating System, which means a separate source code is written for each OS, such as iOS, Android, Linux, and Windows, this means, a native Android software will not work on a windows platform, because the Windows platform does not have the source code to operate the software, however, the advantages of native applications is that they can take the full advantage all features in the devices’


Web Application:

Web application (Web app) is a client-server software application, in which the client runs in a web browser. It is stored on a remote server and delivered over the Internet through a browser interface. It is not designed for a specific type of device or an operating system, which means it can be accessed from several devices. Web applications commonly use a combination of server-side script (ASP, PHP, etc) and client-side script (HTML, Javascript, etc.) to be developed.


Hybrid Applications:

Hybrid applications have the characteristic of both web applications and native applications. They combine the elements of both native and Web applications. They are developed using HTML, CSS, and Javascript, and then wrapped into a native application using platforms like Cordova. Since they are designed for various platforms, they don’t require different source codes like native apps, Web application development is obviously faster, simpler and rapid.

5 0
2 years ago
Read 2 more answers
Other questions:
  • What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
    13·2 answers
  • Sharon reads two different articles about avocados. The first article, in a weight loss magazine, claims that avocados are unhea
    10·2 answers
  • James is an employee at the packaging unit of a chocolate factory that has come up with a new concept of packaging and marketing
    11·2 answers
  • A painting company has determined that for every 115 square feet or wall space, one gallon of paint and eight hours of labor wil
    11·1 answer
  • Convert the following binary number to octal (111000)2​
    12·1 answer
  • Match the vocabulary word to the accurate definition. A software program that enables you to search for, interact with, and retr
    5·2 answers
  • A file concordance tracks the unique words in a file and their frequencies. Write a program that displays a concordance for a fi
    6·1 answer
  • What elements of SANS 20 you could leverage to reduce the TCP/IP vulnerabilities of your workstation
    9·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    9·1 answer
  • Dante has a worksheet shared with multiple users. He would like the ability to approve or reject changes that are made. Which fe
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!