The term platform as a service has generally meant a package of security services offered by a service provider that offloads much of the security responsibility from an enterprise to the security service provider. Select one: True False

Answers

Answer 1

Answer:false

Explanation:


Related Questions

You want to complete conversion tracking setup on your business website with Google Ads. You've already implemented a global sitewide tag. Your next step is to create event tags, which must be placed in the correct section of your web pages to properly function. Where's the event tag implemented on a web page?

Answers

Answer:

The answer is "Between the website tags immediately after the global site tag".

Explanation:

The event tag is used to log clicks as well as perceptions for adverts, not creative things, or to define the inventive data, It may insert more parameters.  

These Tags are code binder clips, that are added to the site and then sent to respondents to obtain and send data. In this users could use tags to monitor scrolls, track suitable formulation, gather feedback, start generating heat maps, display advertising, to your website for all kinds of applications. The API also sends event details to Google Ads, show & Video 360, Campaign Manager, Search Anzeigen 360, and google docs that use the international site tag in the JS tag.

What are the three major tasks does a computer perform?​

Answers

Ans:

Input, processing, and output.

The three major tasks a computer performs are Input, processing, and output.

What are the tasks of a computer?

These tasks exist all connected to the four basic computer functions: input, output, processing, and storage.

Taking data and instructions from a user, processing the data as per instructions, and showing or storing the processed data, exist the four main functions of a computer.

To learn more about computer

https://brainly.com/question/24540334

#SPJ2

(C++) Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.4^2 = 16Given: #nclude using namespace std;int RaiseToPower(int baseVal, int exponentVal){int resultVal = 0;if (exponentVal == 0) {resultVal = 1;}else {resultVal = baseVal * //your solution goes here;}return resultVal;}int main() {int userBase = 0;int userExponent = 0;userBase = 4;userExponent = 2;cout << userBase << "^" << userExponent << " = "<< RaiseToPower(userBase, userExponent) << endl;return 0;}

Answers

Answer:

Following are the code to this question:

RaiseToPower(baseVal, exponentVal-1);//calling method RaiseToPower and in second parameter we subtract value  

resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);//defining resultVal variable that calculate baseVal and method value

Explanation:

In the above-given code inside the "RaiseToPower" method is defined that accepts two parameters, which are "baseVal and exponentVal" and inside the method, an integer variable "resultVal"  is defined, that holds a value that is 0.

In the next step, if the conditional statement is used, in if the block it checks the "exponentVal" variable value that is equal to 0, if it is true it assigns value 1 in "resultVal" otherwise it will go to else block in this block, the "resultVal" variable holds "baseVal" variable value and call the "RaiseToPower" method, and multiply the baseVal and method and store its value in resultVal and return the value. Inside the main method, two integer variable userBase, userExponent is defined that holds a value and calls the above method and prints its return value.

please find the attachment of the code file and its output.

What are the factors affecting the life of ballast? Explain.​

Answers

Answer:

When it's too hot or too cold.

Explanation:

When a bulb of the wrong size or voltage is used in the fixture, the ballast often overheats, causing the light to shut off. The bulbs and the fixture must also match in frequency, or the ballast becomes overworked and overheated.

Put these operating systems in order according to the date they were released. (The first to be released would be
number 1, and the last to be released would be number 5.)
1. 1
Windows 7
2. 2
Windows 2.0
3. 3
MS-DOS
4. 4
Windows XP
5. 5
Mac OS
NEXT QUESTION
ofron un

Answers

1. ms-dos 1981
2. windows 2.0 1987
3. windows xp 2001
4. mac os 2001
5. windows 7 2009

________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes

Answers

Answer:

Web 2.0

Explanation:

The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.

What can you use on the Internet to look for information?

Answers

Answer:

I use Wikipedia to know anything

What are two ways to start a manual spellcheck in MS Word or MS Office?

Answers

Answer:

Explanation:

There are two ways to start a manual spellcheck in MS Word or MS Office are:-

1) This is the easiest method .Press the button F7 and more importantly u can get  this in my MS Project Shortcut list.

2)Try to go to the ribbon on the top part of Microsoft Project and click on the Project tab . Then go move to the right and you will find the ABC button for the spell checker.

These functionalities are used in all current versions of Microsoft Project such as 2010, 2013, 2016, and 2019.

What is the difference between Packaged and tailored Software?​

Answers

Answer:

Packaged software are easy or simple to use because these software have an easy interface. Whereas custom software is hard to use because these software are custom-built or customized.

Explanation:

Hope your confusion is now over mate

What are the Typical application
of mini computer​

Answers

Answer:

calls, messages, photos, emails

Explanation:

as in mobile phones

Answer:Minicomputers are used for scientific and engineering computations, business-transaction processing, file handling, and database management, and are often now referred to as small or midsize servers.

Explanation:

The development of computer languages is classified into two categories .

true or false​

Answers

Answer:

False

Explanation:

Mark me as a brainliest

1) To point the lens of a camera up or down is called:
A) Arc
B)Dolly
C)Pan
D)tilt

Answers

Answer:

D)

Explanation:

Tilting is a cinematographic technique in which the camera stays in a fixed position but rotates up/down in a vertical plane.[1] Tilting the camera results in a motion similar to someone raising or lowering their head to look up or down. It is distinguished from panning in which the camera is horizontally pivoted left or right. Pan and tilt can be used simultaneously.[2] In some situations the lens itself may be tilted with respect to the fixed camera body in order to generate greater depth of focus. [3][4]

The camera's tilt will change the position of the horizon, changing the amount of sky or ground that is seen.[5] Tilt downward is usually required for a high-angle shot and bird's-eye view while a tilt upward is for a low-angle shot and worm's-eye view. The vertical offset between subjects can reflect differences in power, with superior being above.

How can artificial intelligence be used in learning science?

Answers

Artificial intelligence can be used to help science students research and verify their research. It is also a very interesting topic to study in general.

Hope that helped!!! k

what is communication?
What is telecommunications?
what do you mean by model of transmission?

Answers

Communication network requires certain components such as sender, receive,data protocol and medium

telecommunications the message such as text , audio , video through electronic media in the from of electronic signals

The direction of communication from sender to receiver and vice versa

[tex] \huge \bold \blue{AnSweR}[/tex]

Communication is the act of giving, receiving, and sharing information -- in other words, talking or writing, and listening or reading. Good communicators listen carefully, speak or write clearly, and respect different opinions.

The transmission of information, as words, sounds, or images, usually over great distances, in the form of electromagnetic signals, as by telegraph, telephone, radio, or television.

The transmission model of communication describes communication as a one-way, linear process in which a sender encodes a message and transmits it through a channel to a receiver who decodes it.

Which of the following stores the operating system?
O Von Neumann center
O Bluetooth center
O the cloud
O random access memory

Answers

Answer:

The Cloud

Explanation:

Clouds are basically computers offsite.  The cloud is used for many things, Like storage, to running applications which needs an operating system to work. Just like the device you are using right now to use Brainly. It needs an operating system to install a web broswer or app to acess a service. Hope this helps!

You have an application that for legal reasons must be hosted in the United States when U.S. citizens access it. The application must be hosted in the European Union when citizens of the EU access it. For all other citizens of the world, the application must be hosted in Sydney. Which routing policy should you choose in order to achieve this

Answers

Question options:

A. Latency-based routing

B. Simple routing

C. Geolocation routing

D. Failover routing

Answer:

C. Geolocation routing

Explanation:

Geolocation routing is used in allocating resources for different traffic sources originating from different geographical locations. Consequently you are allocating a different resource to handle a different DNS query based on the location/origination of the DNS query. In the above example, you will need to for example to route all queries from any other place in the world that is not US or Europe to a load balancer for Sydney. Your application in their different locations using geolocation routing would have to be adapted and localized to the region so as to serve the audience there

PLEASE HELP!!!! I'll mark Brainliest for whoever is first!!!!

What does this snippet of code do? birds = ["robin", "finch", "grackle", "crow", "wren"] for i in birds: print(i)

It counts the number of birds in the list.
It prints the index and then each bird name.
It prints each bird name on a separate line.
It prints each index number on a separate line.

Answers

Answer:

It counts the number of birds in the list.

Explanation:

The snippet of code works in counting the number of birds in the list.

What is a code Snippet?

A code snippet is a word that is used in computer programming to inform a little chunk of reclaimable source code, machine code, or text. Some text skilled worker, code skilled worker, and IDEs have a property called Code Snippets. The code in this snippet counts the number of birds in the list.

Therefore, option A is correct.

Learn more about the code Snippet, refer to:

https://brainly.com/question/15003149

#SPJ2

Learning how to use software takes time. So, after customers have learned to use a particular software package, it is easier to sell them software upgrades than to convince them to switch to new software. What implications does this conclusion have for expected rates of return on R

Answers

Answer:

This implies that software firms

can develop upgrades with a lower cost and less risk than they can develop a new product.

what is the location in the base interface of the link to
create a table using wizard?
pls Answer me.
I'll make as BRIANLIST. ​

Answers

Answer:

Hey mate, here is your answer. Hope it helps you.

Explanation:

Before you can create objects such as tables and forms, you must first create the database file in which they will be stored.

1. On the File tab select New.

2. Click on Blank database.

3. In the File Name box, type a name for your database.

4. Click on the browse button to the right of the File name box to browse for a location for your

database.

5. Click on Create.

A new database will be created with a new default Table.

6. Click on Design View to start working with this Table.

You can use forms to control access to data, such as which fields of data are. Then open the table or query upon which you want to base the form. 2. To create a form on which all fields from the underlying table or query are placed. Then to be more selective about which fields appear on your form, you can use the Form Wizard.

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?

Options are :
A. Enable the host-based firewall on the Internet server
B. Enable HIPS to protect the server until the patch is released
C. Utilize WAF to restrict malicious activity to the Internet server
D. Downgrade the server and defer the new feature testing

Answers

Answer:

i think its C. Utilize WAF to restrict malicious activity to the Internet server

An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential

Answers

Answer:

d . commercial potential

Explanation:

The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.

This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.

What combination of keys will autofill highlighted cells to the right?

Answers

Answer:

it is Ctrl+R            

c. Compare Mainframe and Minicomputers with their key features



plzzz help ​

Answers

Answer:

Mainframe computer:

The size of the disk is large.

They have large memory storage.

The speed of processing is fast in comparison to minicomputer.

They are more expensive.

Minicomputer:

The size of disk is small.

They have less memory storage in comparison to mainframes.

Their processing speed is less in comparison to mainframes.

It is not as expensive as mainframes.

Explanation:

I hope this will help you

When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O

Answers

Answer:

The answer is "Option d".

Explanation:

In the question, the numbering of the choices is missing so, in the attached the file defines it numbering after that we provide its solution:  

In the question the "option d" is correct, because when we call the function "stop", it ends the store space assigned to the local variables and "called" function parameters, since the variables are no longer used, so the memory is released and once the process is called, the memory is reassigned and then once again assigned when the function ends.

When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O

Answers

Answer:

last option: When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated.

Explanation:

A function, when it is called, uses the stack to allocate local variables. When it exits, those variables are no longer needed (since they are local), so the stack pointer is reset to the position it had before calling the function.

Who are the founders of Microsoft?

Answers

Answer:

BILL GATES & PAUL ALLEN

Explanation:

HOPE IT HELPS!!!!!!!!!!!!!!!!!!!!!

Which is an example of machine-to-machine communication?
(Correct answer only)

A. talking to a friend
B. a computer connecting to a server
C. a computer doing statistical analysis
D. playing a video game
E. talking on the phone to a family member

Answers

Answer:

B Or C sorry Im not Sure

Explanation:

Machine-to-machine communication, or M2M, is exactly as it sounds: two machines “communicating,” or exchanging data, without human interfacing or interaction.

Answer:

B. a computer connecting to a server

Explanation:

Which of the following has the honor of the first robot-human handshake in space?
a. Robonaut 2
b. Baxter
c. Shakey
d. Robosapien

Answers

Answer:

option a

Robonaut 2

Explanation:

it is also known as R2

hope it helped you:)

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this

Answers

Answer:rogue access point

Explanation:

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

Other Questions
how do you copy a file Is the given equation a quadratic equation? Explain. x(x6)=5 The equation is not a quadratic equation because there is no x2-term.The equation is a quadratic equation because there is an x2-term. The equation is not a quadratic equation because the expression is not equal to zero. The equation is not a quadratic equation because there is a term with degree higher than 2. I think the answer is A but im not sure. can someone please tell me what bug this is? What is the domain of the relation (8, -2), (4,-2), (3, 2), (-5, -3)?A. {8,4,3, -5}B. {-8, -4, 3, 5)C. 2-5, -3, 4, 8}D. 2-3, -2, 2} Joseph jogs from one end A to the other end B of a straight 300 m road in 2 minutes 30 seconds and then turns around and jogs 100 m back to point C in another 1 minute. What are Joseph's average speeds and velocities in jogging (a) from A to B and (b) from A to C? The fact that statutes requiring a license only requires payment of a fee indicates that the purpose of the law is to: Correctly label the below as simple, complex, compound, compound-complex, or sentence fragment. 1.Vampires Dairies is my favorite television show, but I also love True Blood. 2.Juan, Sam and Marie went to a movie, ate popcorn, and walked around the mall. 3.After the officer pulled Tim over, Tim began to cry, and the officer took pity on him. 4.Running after the car, the dog barked until the car was out of sight. 5.I love skiing, my brother loves snowboarding, and my sister likes snow tubing. 6.We ordered pork tenderloin for our entre and scalloped potatoes for our side dish. 7.Although he hasnt read the book, he has decided to write a book report on it. 8.I saved my money so that I could buy an iPad. 9.I love eating turkey at Thanksgiving, but my friends family eats lasagna because his cousin is allergic to poultry. 10.Because you dont understand me. The function f(x)=x^2 + ax + b has a minimum at (3,9) what are the values of a and b C. Answer the following questions.1. What is disease?2. How is a communicable disease caused?3. Explain the cycle of a communicable disease.4. What are the symptoms and preventive measures of tetan5. How is hookworm infested? Describe the preventive meaof it.6. How is diphtheria caused?7. Write the preventive measures of hookworm8. Where is malaria mostly occurred in Nepal? What apreventive measures?9. Write the methods of prevention from pneumonia.10. What is AIDS? How can it be prevented?Explain a communicable disease you have suffered fromgive one by one ans This is not really a question but can you read my essay that I wrote last year and review it? Please. If life is not suffering you still do not have the moral righteousness to decide whether someone else's life is worth living. What this person is saying is, life is not meant to live in pain, therefore you cant decide if someone else should live or die. This relates to abortion. Abortion is the termination of a life, a babys life. There is no excuse to abort unless it is to save the life of the mother. Besides, there are other options. Abortion is wrong, for many reasons, therefore it should be illegal. A human is a human being from the point it was created. According to BBC.com, A foetus has a unique genetic code, a foetus is a unique individual. Aborting a child, no matter how long it has been inside its mother's womb, would be killing it. And killing a human being is a crime. It is wrong to kill beings that would have a future like ours if they lived. (BBC.com: Introduction to the Abortion Debate) Everybody wants to live a happy and succesful life. Why not give a child the chance to grow up, to be successful and happy? It is wrong to cause pain & suffering, a foetus is sufficiently developed to feel pain by 18 weeks. (BBC.com: Introduction to the Abortion Debate) Nobody wants to be in pain, so why cause it to another? One said, Many women do not become pregnant by choice. It is wrong to force these women to remain pregnant when they do not want to be. (Kialo.com Pro-life vs Pro-choice: Should abortion be legal?) It is obvious that most women who have an abortion do not become pregnant because they want to. But no one forces these women to remain pregnant, instead some give advice on how to raise a child. If women abort, they are forcing a baby to die when they do not want to. ... This can lead to additional abortion benefits; it allows women to continue pursuing their educational or career goals and work toward greater financial stability. (Unplannedpregnancy.com Pros & Cons of Abortion: 16 Things Every Women Should Know) But according to the University of Massachusetts Medical School, only 4% of the abortions are due to interference with education or career plans. The causes of financial instability are, the lack of money management skills, income stability, and financial literacy. (ScienceDaily.com) One of the leading causes of the lack of money management skills is education expenses. (solveyourdebts.com) According to marketplace.org, college graduates leave school with a debt of $30,000. But 53% end up being unemployed or working in a job that doesnt require a bachelors degree. (Washington.edu) So there is no reason to abort if you have that excuse. There are two other options besides abortion. Adoption and parenting. If you truly do not have the money to raise a child or do not want it you could put it up for adoption. There are many couples out there willing to adopt and raise a child. On the other hand, you could just raise the child. There are many organizations that provide help if it is needed. Later on, after the pregnancy, you can learn to love it and care for it. It may be true that it is cheaper to abort than to raise a child. According to CBSnews.com, the estimated cost of raising a child from birth through age 17 is $233,610. To abort, it costs from about $350 to $950. But what matters most is that you love and care for the child. Although an abortion usually lasts 10-15 minutes, it still violates the right to life. It causes pain and suffering to both the mother and the baby. There are other options, abortion doesnt have to be one of them. Why not give a chance, instead of taking one away? Explain the impacts of immigration and urbanization on the rise of global economy. Make sure to provide specific examples. The hydrogen spectrum has a red line at 656 nm, and a blue line at 434 nm. What is the first order angular separation between the two spectral lines obtained with a diffraction grating with 5000 rulings/cm? I need to write a essay about how computers are taking over the world The governor has some control over the final appropriations bill through the use of the ________ veto. Group of answer choices Rajah 9 menunjukkan laluan bagi kuching Fun Run. Berapakah sesaran bagi pelari tersebut? Mula 2 km 6 km Tamat 10 km Rajah Diagram 9 O A.5 km O B.6 km O c. 10 km D. 18 km Please help solve this. 10points worth it An item is regularly priced at $70. Keiko bought it on sale for 80% off the regular price. How much did Keiko pay? $ if your ans is correct i will choose you as a brainlist when the number of student of a school was increased by 30% it became 455. Find the previous number student. If g(x) = 1 - x find: -5g(4) - 1 what is a soliloquy in a drama?