PLS HURRY 43 POINTS

Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.

surveil people’s digital behavior
promote access to information
manage the internet
limit access to digital information
provide efficient internet searches

Answers

Answer 1

Answer:

surveil people’s digital behavior

promote access to information

provide efficient internet searches

Explanation:

i just know things


Related Questions

What modifier should you use on the members of a class so that they are not accessible to another class in a different package, but are accessible to any subclasses in any package

Answers

The private modifier specifies that only other members of the same class can access the member. The protected modifier restricts access to the member to within its own package.

What are public and private modifiers?

The public access modifier permits code from both inside and outside the class to access the class's methods and properties, whereas the private modifier prevents outside code from accessing the class's methods and properties.

Thus, private modifier is the member.

For more details about private modifier, click here

https://brainly.com/question/15108837

#SPJ1

While making a digital portfolio, Sarah wants to add names and contact information of people she knows professionally. What should she
Include regarding these people?
Sarah should include
letters regarding names and contact information of people she knows professionally.
Reset
Next

Answers

In adding names and contact in a digital portfolio, Sarah should include the full name, street address, city, state, and zip code, and contact information.

What is a digital portfolio?

A digital portfolio is an electronic portfolio where a person includes it blog, names, pictures, texts, etc.

Thus, In adding names and contact in a digital portfolio, Sarah should include the full name, street address, city, state, and zip code, and contact information.

Learn more about digital portfolio

https://brainly.com/question/23758218

#SPJ1

You have a single router that connects your private network to the Internet. You have two subnets on the private network, and the Internet connection is through the Serial0/0/0 interface. Your ISP has given you 6 outside addresses that you can use for NAT configuration. You can use addresses 70. 0. 0. 64 through 70. 0. 0. 69. All hosts on your private network must be allowed Internet access using those six addresses. There should be no limit to the number of clients on the private network that can access the Internet at the same time. Complete the following tasks: Designate both FastEthernet interfaces as inside NAT interfaces. Configure the Serial0/0/0 interface as an outside NAT interface. Create a standard access list number 50 that allows both inside networks. Create a NAT pool named my_addrs identifying the 6 addresses. Use the netmask parameter to configure the addresses using a 29-bit mask. Use the ip nat inside source command to link the access list with the address pool. Be sure that all inside clients can simultaneously access the Internet. Save your changes

Answers

Select Fiji.

Press Enter to get started.

At the Fiji> prompt, type enable and press Enter.

At the Fiji# prompt, type config t and press Enter.

At the Fiji(config)# prompt, type interface fa0/0 and press Enter.

At the Fiji(config-if)# prompt, type ip nat inside and press Enter.

At the Fiji(config-if)# prompt, type interface fa0/1 and press Enter.

At the Fiji(config-if)# prompt, type ip nat inside and press Enter.

At the Fiji(config-if)# prompt, type interface s0/0/0 and press Enter.

At the Fiji(config-if)# prompt, type ip nat outside and press Enter.

At the Fiji(config-if)# prompt, type access-list 50 permit 192.168.1.0 0.0.0.255 and press Enter.

At the Fiji(config)# prompt, type access-list 50 permit 192.168.2.0 0.0.0.255 and press Enter.

At the Fiji(config)# prompt, type ip nat pool my_addrs 70.0.0.64 70.0.0.69 netmask 255.255.255.248 and press Enter.

At the Fiji(config)# prompt, type ip nat inside source list 50 pool my_addrs overload and press Enter.

Press Ctrl + Z.

At the Fiji# prompt, type copy run start and press Enter.

Press Enter to begin building the configuration.

!!! 20 points !!!!!
find the css code for the photo liker app in code studio. it's unit 4 lesson 4. i need the text code to copy and paste. either do that or debug this code, please. it says that likes isn't called for but it obviously is and i dunno what to do about that. help, please.

Answers

Answer: I need more info to answer this question

Explanation:

To evaluate the performance of a security system, administrators must establish system performance _____________________

Answers

To evaluate the performance of a security system, administrators must establish system performance baselines.

What is a performance baseline?

A baseline for any kind of performance measure is known to be one that often looks at the the average stages or level of the work that one is  currently working on.

Note that it often compare future performance levels using test so as to see if performance has changes and as such to evaluate the performance of a security system, administrators must establish system performance baselines.

Learn more about security system from

https://brainly.com/question/25720881

#SPJ1

You can us the (BLANK) symbol when you want to automatically add a set of numbers together in a spreadsheet

Answers

Answer:

Σ

Explanation:

What symbol can you use when you want to automatically add a set of numbers together on excel?

✓ Σ This is the Greek letter Sigma. It is used to start the Autosum facility.

Which part of the nist cybersecurity frameworks defines the activities needed to attain the different cybersecurity results?.

Answers

The part of the NIST framework that defines the activities to attain different cybersecurity results is the Framework core.

What is cybersecurity?

The term 'cybersecurity' makes reference to the strategies aimed at protecting information on the deep web.

Cybersecurity techniques are fundamental to protect sensitive data such as passwords from hackers.

In conclusion, the part of the NIST framework that defines the activities to attain different cybersecurity results is the Framework core.

Learn more  about cybersecurity here:

https://brainly.com/question/17579545

#SPJ1

In Python, the __________ function is used to enter data inside a list [array].

A. copy
B. insert
C. get
D. add
E. append

Answers

In Python, the insert function is used to enter data inside a list. The + operator returns a new array containing the elements from both arrays. append(): appends the element to the array's end. insert()

Can input an array into a function Python?

Any sort of data, such as a text, list, array, dictionary, or dictionary, can be supplied as an argument to a function in Python.

When one pass numeric arrays as arguments to Python methods or functions, they are passed by reference.

Thus, option B is correct.

For more details about Python, click here

https://brainly.com/question/13041484

#SPJ1

In Python to center an output statement, the ^ (caret) symbol will be used in the format specifier of the format function.

A. True
B. False

Answers

Answer:

true

Explanation:

In Python to center an output statement, the ^ (caret) symbol will be used in the format specifier of the format function.

A. True

B. False

True

which of the following energy conversions occurs inside a battery?

Answers

Answer:

chemical energy is changed into electrical energy.

Explanation:

85 points hurry pls
Which of the following statements are true regarding barriers to communication? Select 3 options.

The barriers to communication make it difficult to build trust and rapport on a cross-cultural team.
The barriers to communication make it difficult to build trust and rapport on a cross-cultural team.

The only choice for reducing language barriers on a multilingual team is to have a person translate all interactions.
The only choice for reducing language barriers on a multilingual team is to have a person translate all interactions.

Even when language is not a barrier to communication, issues can arise because of differing communication styles.
Even when language is not a barrier to communication, issues can arise because of differing communication styles.

To reduce barriers caused by speaking different languages, effective teams should only choose team members that speak a common language.
To reduce barriers caused by speaking different languages, effective teams should only choose team members that speak a common language.

Barriers to communication can be best addressed with an open mind and positive attitude.
Barriers to communication can be best addressed with an open mind and positive attitude.

Answers

The statements which are true regarding barriers to communication are: A, C, and D.

What are barriers to communication?

Barriers to communication can be defined as form of obstacle or hindrance that typcically affects the swift and easy communication of an information between two or more parties.

This ultimately implies that, barriers to communication are impediments to effective communication between two or more parties and these include the following:

Language differenceCommunication stylesCultural difference

Read more on communication here: brainly.com/question/26152499

#SPJ1

Answer:

-The barriers to communication make it difficult to build trust and rapport on a cross-cultural team.

-Barriers to communication can be best addressed with an open mind and positive attitude.

-Even when language is not a barrier to communication, issues can arise because of differing communication styles.

Explanation:

sorry for adding no letters, the order is different for everyone!

Companies learn a lot about customers because they leave clues in all of the following ways EXCEPT: Group of answer choices actions taken when navigating a company website. how they write code. searches with search engines. making comments about the company on social media.

Answers

Companies learn a lot about customers because they leave clues in all of the ways above except how they write code.

What is learning  about customers?

The act of learning  about customers  is known to be the act or the process whereby firm studies and know more about their potential customers through survey, feedback, etc.

Note that Companies learn a lot about customers because they leave clues in all of the ways  except how they write code as they do not need them for that.

Learn more about customers from

https://brainly.com/question/380037

#SPJ1

la révolution industrielle rédaction

Answers

The Industrial Revolution began in the 18th century in Great Britain. It was only the first stepping-stone to the modern economic growth that is still growing to this day. With this new bustling economic power force Britain was able to become one of the strongest nations. While the nation was changing so was the way that literature was written. The Industrial Revolution led to a variety of new social concerns such as politics and economic issues. With the shift away from nature toward this new mechanical world there came a need to remind the people of the natural world. This is where Romanticism came into play; it was a way to bring back the urban society that was slowly disappearing into cities.

The Agricultural Revolution: Between 1750 and 1900 Europe’s population was dramatically increasing, so it became necessary to change the way that food was being produced, in order to make way for this change. The Enclosure Movement and the Norfolk Crop Rotation were instilled before the Industrial Revolution; they were both involved in the separation of land, and the latter dealt more with developing different sections to plant different crops in order to reduce the draining of the land. The fact that more land was being used and there weren’t enough workers it became necessary to create power-driven machines to replace manual labor.

Socioeconomic changes: Prior to the Industrial Revolution, the European economy was based on agriculture. From the aristocrats to the farmers, they were linked by land and crops. The wealthy landowners would rent land to the farmers who would in turn grow and sell crops. This exchange was an enormous part of how the economy ran. With the changes that came with the Industrial revolution, people began leaving their farms and working in the cities. The new technologies forced people into the factories and a capitalistic sense of living began. The revolution moved economic power away from the aristocratic population and into the bourgeoisie (the middle class).

The working conditions in the factories during the Industrial Revolution were unsafe, unsanitary and inhumane. The workers, men, women, and children alike, spent endless hours in the factories working. The average hours of the work day were between 12 and 14, but this was never set in stone. In “Chapters in the Life of a Dundee Factory Boy”, Frank Forrest said about the hours “In reality there were no regular hours, masters and managers did with us as they liked. The clocks in the factories were often put forward in the morning and back at night. Though this was known amongst the hands, we were afraid to speak, and a workman then was afraid to carry a watch” (Forrest, 1950). The factory owners were in charge of feeding their workers, and this was not a priority to them. Workers were often forced to eat while working, and dust and dirt contaminated their food. The workers ate oat cakes for breakfast and dinner. They were rarely given anything else, despite the long hours. Although the food was often unfit for consumption, the workers ate it due to severe hunger.

During this time of economic change and population increase, the controversial issue of child labor came to industrial Britain. The mass of children, however, were not always treated as working slaves, but they were actually separated into two groups. The factories consisted of the “free labor children” and the “parish apprentice children.” The former being those children whose lives were more or less in the hands of their parents; they lived at home, but they worked in the factories during the days because they had to. It was work or die of starvation in this case, and their families counted on them to earn money. Fortunately these children weren’t subjected to extremely harsh working conditions because their parents had some say in the matter. Children who fell into the “parish apprentice” group were not as lucky; this group mainly consisted of orphans or children without families who could sufficiently care for them. Therefore, they fell into the hands of government officials, so at that point their lives as young children turned into those of slaves or victims with no one or nothing to stand up for them. So what was it exactly that ended this horror? Investments in machinery soon led to an increase in wages for adults, making it possible for child labor to end, along with some of the poverty that existed. The way that the Industrial Revolution occurred may have caused some controversial issues, but the boost in Britain’s economy certainly led toward the country becoming such a powerful nation.

Select each of the steps involved in creating a table in a presentation.

Use a slide layout containing the desired placeholder.

Open the table and copy it.

Enter and format text.

Double-click on the placeholder.

Click outside of the object.

Answers

Answer:

huh? Making your presentation more interesting through the use of multimedia can help to improve the audience's focus. PowerPoint allows you to use images, audio and video to have a greater visual impact. These visual and audio cues may also help a presenter be more improvisational and interactive with the audience.

difference between communication service and communication media​

Answers

Explanation:

Communication Devices :

A communication device is a hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers or mobile devices. A widely used communication device is a modem.

2. communication Media :

Communication media means of sending or receiving information or data. And in telecommunication, Communication media refers to the channel or tool or device through which data will be transmitted. Different communication media’s used for sending the data or information from one computer or terminal to another inside some kind of network.
Communication Device

Communication service means the act of communicating using any system or the act of transmission and receipt of information between two or more points. Each point must be capable of both transmitting and receiving information if communication is to occur.


Media:

Communication media refer to the ways, means or channels of transmitting message from sender to the receiver. Communication media indicate the use of verbal or non-verbal language in the process of communication.

What are the limits of hashing and verifying that files haven’t changed?

Answers

The hashing function can take any number of key-value pairs and there is no specific limit to it.

What is hashing?

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

https://brainly.com/question/13106914

#SPJ1

Do you think that smart televisions are going to replace media players?

Answers

Answer:

yes because smart television give more information

The page .Product contains data retrieved from an external system of record using a data page. How do you ensure .Product always contains the most current data from the data page

Answers

Answer:

Select refer to a data page on .Product

Explanation:

Q:

The page .Product contains data retrieved from an external system of record using a data p…

A. Select Refer to a data page on .Product.

B. Select Copy data from a data page on .Product...

A:

A

An IF statement inside the true block of another IF statement is called:

A. it is not possible to put an IF statement inside the block of another IF statement
B. a relational operator
C. a nested IF statement
D. a branched IF statement
E. a conditional operator

Answers

Answer:

C. a nested IF statement

Explanation:

Anytime something is contained within another of itself, it's referred to as being "nested".

if (true)

{

     if(true)

     {

       

     }

}

Find the 66th term of the arithmetic sequence
25,10,−5

Answers

Answer:

the answer is 33825

Explanation:

Answer:

-950

Step-by-step explanation:

Arithmetic sequence=a+(n-1)d

a=first number

n=nth term

d=difference

a=25

n=66

d=-15

So let's solve

25+(66-1)(-15)

25+(65)(-15)

25-975

-950

So the 66th terms is -950

Which is the output of the formula =IF(c4>100;"TRUE";"FALSE"), if the value in c4 is 111

Answers

Answer:

In given data, the formula is incorrect because semi-colon is used in place of comma. The correct formula statement are: =IF (C4>100, "TRUE", "FALSE") Then its output will " TRUE ". According to correct formula. It means that if no. in cell C4 is greater than 100 it shows output TRUE otherwise FALSE..

Explanation:

When multiple endoscopic approaches are performed to accomplish the same procedure, report a code for.

Answers

the successful endoscopic approach only.

You want to e-mail your grandparents a recording of your pieces for your upcoming piano recital. which audio file format will allow your grandparents to download the files, considering they have an older computer with a slower internet connection?

pcm wav

alac

mp3

flac

Answers

Based on the above, the audio file format that will allow your grandparents to download the files is Mp 3.

What is MP3 Format?

MP3 is known to be a kind of coding format that is made just for digital audio.

Note that in Based on the above, the audio file format that will allow your grandparents to download the files is Mp 3 as it can help to play the audio.

Learn more about e-mail from

https://brainly.com/question/24506250

#SPJ1

Type the correct answer in the box. Spell all words correctly.

Fill in the blank with the correct word.
Children use audio-visual media to get hands-on experience and learn
________activities.

Answers

Answer:

kinesthetical

Explanation:

please give brainliest please and good luck :)

Write a Python program to solve the problem described above. Define a function satisfactory_meal(Meal) which takes a single parameter, Meal, and returns True or False. Meal is a list of lists of the form [Dish_number, Organic, Has_dairy, Has_meat, Locally_sourced] where the Dish_number is a positive integer and the other list items are 1 or 0. The function should return True if the meal is satisfactory, and should return False otherwise. You may assume that the Meal list will be in the correct format when the function is called; you do not have to error-check for a non-list or an incorrectly formed list. The dishes in list Meal are not necessarily sorted by dish numbers or any other order. In your program, you may write and call any additional functions that are helpful in the computation. Examples: satisfactory_meal([ [8, 0, 0, 0, 1], [9, 1, 1, 0, 1], [23, 1, 0, 0, 1], [2, 1, 0, 1, 0], [6, 0, 0, 1, 1] ]) should return True, satisfactory_meal([ [4, 1, 0, 0, 0], [7, 0, 1, 0, 1], [90, 0, 0, 0, 0], [3, 0, 0, 1, 1] ]) should return False, and satisfactory_meal([ ]) should return False.

Answers

def dx(fn, x, delta=0.001):

   return (fn(x+delta) - fn(x))/delta

def solve(fn, value, x=0.5, maxtries=1000, maxerr=0.00001):

   for tries in xrange(maxtries):

       err = fn(x) - value

       if abs(err) < maxerr:

           return x

       slope = dx(fn, x)

       x -= err/slope

   raise ValueError('no solution found')

Type the correct answer in the box. Spell all words correctly.////////////////////////////////////////////////////////
////////////////////////////////////////////////////////In a manufacturing system, a sensor determines whether a furnace is at an appropriate temperature. The sensor’s information governs the flow of fuel to the furnace. Identify the elements of this manufacturing system.////////////////////////////////////////////////////////
This particular manufacturing system has an additional fourth element known as
.

Answers

Answer:

Where are the words to put in

Explanation:

Answer:

mm I dont understand where do the words go

Explanation:

Bruno is asked to create a program that will require the user to enter a passcode. If the wrong passcode is entered, the user can try again until they get it right. What kind of loop should be created for this? A. a binary loop B. a condition-controlled loop C. a count-controlled loop D. an interface loop

Answers

Answer:

a condition controlled loop

Explanation:

if a user get the password right he will not have to restart

In the given scenario, the kind of loop that should be created is a condition-controlled loop. (Option B).

What is a Condition-controlled Loop?

A condition-controlled loop is also known as a "while loop." It continues to execute its code block as long as a specified condition is true. In this case, the condition would be something like "while the entered passcode is not correct." The loop will keep running until the user enters the correct passcode, at which point the condition becomes false, and the loop exits.

Accordingly, in this scenario, Bruno needs to create a loop that repeatedly asks the user to enter a passcode and checks whether the entered passcode is correct or not. If the entered passcode is incorrect, the loop should allow the user to try again until they enter the correct passcode.

Learn more about condition-controlled loop here: https://brainly.com/question/34137222

#SPJ2

Which package is required for shadow passwords to be enabled?.

Answers

Answer:

For shadow passwords the shadow-utils package to be enabled

Explanation:

The shadow-utils package includes the necessary programs forconverting UNIX password files to the shadow password format, plusprograms for managing user and group accounts. The pwconv commandconverts passwords to the shadow password format. The pwunconv commandunconverts shadow passwords and generates a passwd file (a standardUNIX password file). The pwck command checks the integrity of passwordand shadow files. The lastlog command prints out the last login timesfor all users. The useradd, userdel, and usermod commands are used formanaging user accounts. The groupadd, groupdel, and groupmod commandsare used for managing group accounts.

For shadow passwords, the shadow-utils package is to be enabled.

What are shadow passwords?

On Linux and Unix, shadow accounts improve login security. Normally, passwords are stored in a publicly accessible table in an encryption key.

The hashed login encoding for a Linux user is stored in the bottommost along with extra information pertaining to the user password.

The programs required to convert UNIX credential files to the shadow login format, as well as applications for managing user and band accounts, are all included in the ghost package. Passwords are converted to the shadow password format using the tool.

Hence "The shadow-utils package must be enabled for shadow passwords".

To learn more about shadow passwords,

https://brainly.com/question/13034007

#SPJ12

What is the best game recorder on windows with no watermark,no lag, and don't hav to pay(other than game bar)

Answers

Answer:GeForce Experience is good

Explanation: GeForce experience is an app you can use for screen recording (no watermark), downloading nvedia drivers and you can use it to access all your games in one place.

Consider that there is a class Team for soccer team members under Soccer namespace and another class Team for basket team members under the Basketball namespace. What is the correct syntax that will help the compiler identify the correct Team

Answers

The correct syntax that will help the compiler identify the correct Team is;

Soccer::Team SoccerTeamMembers

BasketBall:Team BasketBallTeamMembers.

What Is syntax?

Syntax is known to be the steps or arrangement of words and phrases to bring about a proper sentences.

Note that in the above case, The correct syntax that will help the compiler identify the correct Team is;

Soccer::Team SoccerTeamMembers

BasketBall:Team BasketBallTeamMembers.

Learn more about syntax from

https://brainly.com/question/831003

#SPJ1

Other Questions
which of the following is the best example of the growing fear of communism and foreigners that america was experiencing in the 1920's? please help, i need to find the equation please Why was there a Red Scare in the U.S.? 5. While decorating her bedroom, Sandra spent the following amounts: {$29, $58, $15, $130, $75, $23} Calculate the mean absolute deviation to the nearest tenth. MAD= The _____developed their complexcivilization in the cooler highlandsof the Andes Mountains.A. IncasB. GermansC. French Write 0.423 as a fraction. Please help me with this it's algebra WILL GIVE BRAINLIEST and 5 points What is the range of function gif g(x) = -2/(x) + 1OA. (-2, 0)OB. (0,0)OC. (-0,2)OD. (-0,1) Solve the problem and define the variable (50 points) I NEED HELP FAST!!!What is the distance between 14,-15 and 10,-7 all of these were ancient african writing systems except1) Hieroglyphics2) Ge'ez3) Merotic4) Cuneiform The Federal courts are governed by a statute known as the____ Code.1.judicial2.justice3.trial4.court 3. In what year were marble columns first used in private homes? (1 point) O 89 B.CE 070 B.CE 091 B.CE 052 B.CE Name two New Left groups, and tell me what they believed. what is the most important reason that Christianity is so geographically widespread? A student is investigating how a bowl of ice changes in one hour. She places a bowl of ice on a table inside her classroom. She observes it at three different times. The diagram shows her observations.The diagram shows a bowl with ice at 1:00 P M, 1:30 P M, and 2:00 P M. At 1:00 P M, the bowl is filled with ice cubes. At 1:30 P M, some ice cubes remain and they are floating in some water. At 2:00 P M, the bowl is filled only with water.QuestionWhich question is the student ,begin emphasis,most,end emphasis, likely trying to answer?Answer options with 4 optionsA. How does water evaporate?B. How can the water cycle be modeled?C. How is water chemically changed by melting?D. How does temperature affect the physical state of water? 1.Anthony has a sink that is shaped like a half-sphere. The sink has a volume of 3000/3 , in^3?. One day, his sinkclogged. He has to use one of two cylindrical cups to scoop the water out of the sink. The sink is completelyfull when Anthony begins scooping.(a) One cup has a diameter of 5 in, and a height of 6 in. How many cups of water must Anthony scoopout of the sink with this cup to empty it? Round the number of scoops to the nearest wholenumber. Show all your work.(b) One cup has a diameter of 6 in, and a height of 6 in. How many cups of water must he scoop out ofthe sink with this cup to empty it? Round the number of scoops to the nearest whole number.Show all your work Mike is shopping for new clothes. 5. Why is Elie surprised that the dentist steals? How did the introduction of the cotton gin affect enslaved workers on Southern plantations? O Enslaved workers had less work to do. O Planters gave enslaved workers better nxorking conditions. O Enslaved workers were able to purchase insurance. O Planters demanded enslaved laborers work faster.