What is a cyber community, and when am I a part of it?

Answers

Answer 1

Answer:

A cyber community is a virtual community that includes one or more groups of people. Cyber communities can be open to anyone or to a select group of people, but they often fulfill a need people have to form friendships and romantic relationships or to talk with others about certain issues or topics.


Related Questions

what is the world first mobile phone brand​

Answers

Answer:

The world first mobile phone brand is Motorola.

Answer:

bruh u have the internet u must be brain dead

Explanation:

its

Motorola

Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server data mirroring is not enabled?a. Full backupb. incremental backupc. Differential back upd. Snapshot

Answers

Answer: C. Differential backup

Explanation: There are several ways od ensuring the preservation and storage of data even cases of disaster, one of such ways is data data mirroring which allows data to be replicated or copied in real time and several backup options. In cases where there there is need to restore a server, the warm recovery site provides a data or disaster recovery option used to mitigate the effect of data loss on organization. In the absence of data mirroring, differential backup option, provides the quickest recovery option as it only requires changes in the data stored after the last full backup. These speed experieced should be expected due to the relatively low data been dealt with rather than the entire data.

What line of code will import matplotlib?

Answers

-run command prompt as admin

- install python if you have not

- type "python -m pip install pip"

- and then " python -m pip install matplotlib"

-run command prompt as admin

- install python if you have not

- type "python -m pip install pip"

- and then " python -m pip install matplotlib"

The functions of mat plot lib enable it to function similarly to MATLAB. Each function modifies a figure in some way, such as by producing a figure, a plotting region within a figure, some lines within a plotting area, labelling the plot, etc.

Mat plot lib would be useless for processing numbers if it could only deal with lists. In arrays, you typically use integers. In actuality, all sequences undergo internal array conversion. The example that follows shows how to use arrays to draw multiple lines with various format styles in a single function call.

To know more about mat plot lib visit:

brainly.com/question/15705875

#SPJ6

If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencinga) trueb) false

Answers

Answer:

A. True.

Explanation:

Authentication in computer technology can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

Hence, if the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing.

This simply means that, when a user enters his or her private key (password); the authenticator matches the private key to the uniquely defined credentials. Permission and access is granted by the authorization system right after a successful authentication.

Pete Jones, a bait shop owner, incorporates ______ within a webpage to entice customers to buy a new lure.

Answers

Answer: CTA

Explanation:

Call to action (CTA) is a piece of content, or an aspect of webpage, advertisement which encourages the audience to do something.

CTAs help an organization or company to convert a reader or visitor to a lead which will be sent to the sales team. Pete Jones, a bait shop owner, incorporates CTA within a webpage to entice customers to buy a new lure.

The bias condition for a transistor to be used as a linear amplifier is called:________.
(a) forward-reverse
(b) forward-forward
(c) reverse-reverse
(d) collect bias

Answers

Answer:

(a) forward-reverse

Explanation:

A transistor is an electronic component which consist three electrodes, base-b, collector-c and emitter-e. It is a semiconductor and some of its types are n-p-n, p-n-p, field effect transistors (FET), bipolar junction transistors (BJT) etc.

For a transistor to function as a linear amplifier, it must be appropriately biased. The major required condition is forward-reverse bias. This ensure the appropriate functioning of the transistor as an amplifier of electronic signals.

Where Can I Get Actual Microsoft AZ-900 Exam Questions?

Answers

Answer:

Pls check the site "examtopics"

U fill find ur questions there


________________is a distribution of Linux Operating
system for desktop computers.

Answers

Answer:

Ubuntu

Explanation:

Ubuntu is based on Linux and Debian and is free/open-source. It’s released in 3 editions: Desktop, Core, and Server.

Hope this helped!

Which of the following specific components are incorporated on HDInsight clusters?
A. Storm
B. Spark
C. Hive
D. All the options

Answers

Answer:

D

Explanation:

The answer to this question is option D. All of the options are incorporated on HDinsight clusters.

HDInsight is very useful in the field of computer science because it creates a fast and easy way for large amounts of data to be processed. It also has the characteristic of being cost effective.

HDInsight has different cloud and open source frameworks. These includes:

HadoopHiveRLLAPSparkStorm

Read more at https://brainly.com/question/15399234?referrer=searchResults

How can you determine which package is better: openssh-server-5.3p1-118.1.el6_8.x86_64 or openssh-server-6.6p1-1.el6.x86_64

Answers

Answer:

The best by the concept of the newest is the better is the openssh-server-6.6p1-1.el6.x86_64.

Explanation:

The openssh-server-5.3p1-118.1.el6_8.x86_64 and the openssh-server-6.6p1-1.el6.x86_64 are named version of a server which is the openssh- server.

The first server is the later version is the 5.3p1 version( which is seen after the server name ), while the former is the 6.6p1 version. They both use the Linux operating systems version RHEL 6 and 6.8 and are for 32-bit and 64-bit computers (.x86_64).

So, judging by the newest, the version 6.6 is the better server of the two.

What are the advantages, strengths and/or weaknesses of remote access methods and techniques such as RADIUS, RAS, TACACS+ and VPN?

Answers

Answer:

they store authentication details in the remote server and its retrieval is encrypted. But it can also be very slow when the network signal is down.

Explanation:

Private IP network like in a small or enterprise company needs access control methods to prevent unwanted access to files by unauthorized employees. The regular router ssh authentication is good for a small company but it has no backup storage to hold user login details and easily be hacked by attackers. So the AAA policy is adopted to prevent this. it stands for authentication, authorization and accounting, and uses protocols like the RADIUS, TACAS+, VPN, etc, to prevent unwanted access. it is fast and saves all the login details of all the employees in the network, but experiences slow or no authentication when network is down.

Write an expression that continues to bid until the user enters 'n'.
Sample output with inputs: 'y' 'y' 'n'
I'll bid $7!
Continue bidding? I'll bid $15!
Continue bidding? I'll bid $23!
Continue bidding?
1 import random
2 random.seed (5)
3
4 keep going
5 next bid = 0
6
7 while Your solution goes here
8 next bid next bid + random.randint(1, 10)
9 print(' ll bid x ' (next bid))
10 print('cohtinue bidding?', end-
11 keep going input
ACTIVITY 53.3. While loop: Insect growth
Given positive integer num_insects, write a while loop that prints that number doubled up to, but without exceeding 100. Follow each number with a space.
Sample output with input:
8 8 16 32 64 1 nu
1 insects = int(input()) Must be
2
3 Your solution goes here

Answers

Answer:

1)

Add this while statement to the code:

while(keep_going!='n'):  

#the program keeps asking user to continue bidding until the user enter 'n' to stop.

2)

Here is the code for ACTIVITY 53.3. While loop: Insect growth:

num_insects = int(input())

while num_insects <= 100:

   print(num_insects, end=' ')

   num_insects = num_insects * 2

 

Explanation:

Here is the complete code for 1)

import random

random.seed (5)

keep_going='-'

next_bid = 0

while(keep_going!='n'):

   next_bid = next_bid + random.randint(1, 10)

   print('I\'ll bid $%d!' % (next_bid))

   print('continue bidding?', end='')

   keep_going = input()

Here the the variable keep_going is initialized to a character dash keep_going='-'

The statement keep_going = input() has an input() function which is used to take input from user and this input value entered by user is stored in keep_going variable. while(keep_going!='n'):  is a while loop that keeps iterating until keep_going is not equal to 'n'.    print('continue bidding?', end='')  statement prints the continue bidding? message on the output screen. For example the user enters 'y' when this message appears on screen. So keep_going = 'y' . So the operation in this statement next_bid = next_bid + random.randint(1, 10) is executed in which next_bid is added to some randomly generated integer within the range of 1 to 10 and print('I\'ll bid $%d!' % (next_bid))  prints the result on the screen. Then the user is prompted again to continue biffing. Lets say user enters 'n' this time. So keep_going = 'n'. Now the while loop breaks when user enters 'n' and the program ends.

2)

num_insects = int(input()) #the user is prompted to input an integer

while num_insects <= 100: #the loop keeps iterating until value of num_insects exceeds 100

   print(num_insects, end=' ') #prints the value of num_insects  

   num_insects = num_insects * 2 #the value of num_insects is doubled

For example user enters 8. So

num_insects = 8

Now the while loop checks if this value is less than or equal to 100. This is true because 8 is less than 100. So the body of while loop executes:

   print(num_insects, end=' ') statement prints the value of num_insects

So 8 is printed on the screen.

num_insects = num_insects * 2 statement doubles the value of num_insects So this becomes:

num_insects = 8 * 2

num_insects = 16

Now while loop checks if 16 is less than 100 which is again true so next 16 is printed on the output screen and doubled as:

num_insects = 16 * 2

num_insects = 32

Now while loop checks if 32 is less than 100 which is again true so next 32 is printed on the output screen and doubled as:

num_insects = 32 * 2

num_insects = 64

Now while loop checks if 64 is less than 100 which is again true so next 64 is printed on the output screen and doubled as:

num_insects = 64 * 2

num_insects = 128

Now while loop checks if 128 is less than 100 which is false so the program stops and the output is:

8 16 32 64  

The programs along with their output is attached.

Which of the following statements is true?
A. Project management is being used at a consistent percentage of a firm's efforts.
B. Project management is far from a standard way of doing business.
C. Project management is increasingly contributing to achieving organizational strategies.
D. Project management is a specialty that few organizations have access to.
E. All of these statements are false.

Answers

The answer is C. project management is increasingly contributing to achieving organizational strategies

Encryption relies on the use of _________to ensure that information is readable only by the intended recipient.

Answers

Answer:

Encryption Keys

Explanation:

In order to make sure only the intended recipient receives the information, encryption keys rely on a unique pattern, just like your house key, except instead of grooves and ridges encryption keys use numbers and letters.

Use the _____ and _____ features to prevent field columns from showing or to view two nonadjacent field columns for comparison.

Answers

Answer:

1. hide

2. freeze

Explanation:

A database such as SQL is considered as a well-structured group of information that is managed in a computer or server for easy access when needed to call upon.

Therefore, in any given database management, a lot of tasks can be done, among other several other features available is the HIDE and FREEZE functions.

Hence, a user can use the HIDE and FREEZE functions to prevent field columns from showing or to view two nonadjacent field columns for comparison in database management.

Hence, in this case, the correct answer to the statement presented is to HIDE and FREEZE

What is the result if you add two decimal numbers (45+216), expressed in binary using 8-bit unsigned precision?

Answers

Answer:

261

Explanation:

Adding up two decimal numbers ( 45 + 216 ) expressed in binary using 8-bit unsigned precision

first we express the decimal numbers in 8-bit unsigned precision :

45 = 32 + 8 + 4 + 1 = 2^5 + 2^3 + 2^2 + 2^0 = 00101101

216 = 2^7 + 2^6 + 2^4 + 2^3 = 11011000

Adding the numbers together =  00101101

                                                   + 11011000

                                                 = 100000101 = 261 ( an overflow occurred )

note : The maximum value that can be expressed with 8-bit unsigned precision is  = 2^8 - 1 = 256

Regular Expression Replace Challenge
In this challenge you will use the file regex_replace_challenge_student.py to:
Write a regular expression that will replace all occurrences of:
regular-expression
regular:expression r
egular&expression
In the string: This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression
Assign the regular expression to a variable named pattern
Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results

Answers

Answer:

Here is the Python program:

import re  # module for regular expressions

search_string='''This is a string to search for a regular expression like regular expression or  regular-expression or regular:expression or regular&expression'''  #string to search for a regular expression

pattern = "regular.expression" #Assigns the regular expression to pattern

substitution="regular expression"  #substitute all occurrences of pattern with regular expression string stored in substitution  

replace_results = re.sub(pattern,substitution,search_string)  # sub() method from the re package to substitute all occurrences of the pattern with substitution

print(replace_results) #Assigns the outcome of the sub() method to this variable

Explanation:

This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression

search_string='''This is a string to search for a regular expression like regular expression or  regular-expression or regular:expression or regular&expression'''

The following statement assigns the regular expression to a variable named pattern .

pattern = "regular.expression"

The following statement is used to substitute the pattern (regular expression) in the search_string by replacing all occurrences of "regular expression" sub-string on search_string.

substitution="regular expression"  

The following statement uses re.sub() method to replace all the occurrences of a pattern with another sub string ("regular expression"). This means in search_string, the sub strings like regular expression, regular-expression, regular:expression or regular&expression are replaced with string "regular expression". This result is stored in replace_results variable. Three arguments are passed to re.sub() method:

sub string to replace  i.e. pattern

sub string to replace with  i.e. substitution

The actual string i.e. search_string

replace_results = re.sub(pattern,substitution,search_string)  

The following print statement displays the output of replace_results

print(replace_results)

The output of the above program is:

This is a string to search for a regular expression like regular expression or regular expression or regular expression or regular expression

Hardening FSO infrastructure includes all of the following except:______.
A. FSOs should have backstops to prevent overshoot to neighboring office windows orrooftops
B. They should be mounted in easy to reach places.
C. They should have physical security such as keycard and/or biometric access.
D. They should be protected by motion detection systems and motion-activated video.

Answers

Answer:

Hardening FSO infrastructure includes all of the following except:______.

A. FSOs should have backstops to prevent overshoot to neighboring office windows or rooftops.

Explanation:

FSO means a floating storage and offloading vessel.  It is a simplified version of a floating production, storage, and offloading (FPSO) unit.  FSO vessels are mainly floating vessels used by the offshore oil and gas industry for the storage of oil.  Unlike the more advanced FPSO it cannot be used for the production and processing of hydrocarbons, and storage of oil.  Since FSOs are installed offshore storage and offloading vessels, there is no need to harden the infrastructure by having "backstops to prevent overshooting to neighboring office windows or rooftops."

______________ is any strategy that tricks a user into giving up his or her password or granting access to an attacker.

Answers

Answer:

Social engineering.

Explanation:

What is the part of a system that defines the extent of the design pursuant to the operational requirements?

Answers

Answer:

The system's scope defines the extent of the design according to operational requirements. The proposed system is also subject to limits known as boundaries, which are external to the system. Boundaries are also imposed by existing hardware and software.

In most languages, if a file does not exist and a program attempts to open it in append mode, what happens?

Answers

Answer:

It create a new file in which writing of data begins.

Explanation:

A file can be open in the three mode:

-r (Read mode): open an existing file for the purpose of reading data from it.

-w (write mode): Create a new file for the purpose of writing data to it.

-a (append mode): open an existing file for the purpose of appending extra data to it but if the file does not exist, it create a new file and start writing data to it.

External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures.
A. True
B. False

Answers

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

Which the following is NOT a reason why it is difficult to defend against today's attackers? a. increased speed of attacks b. simplicity of attack tools c. greater sophistication of defense tools d. delays in security updating

Answers

Answer:

The correct answer to the question is OPTION C "greater sophistication of defense tools"

Explanation:

An attacker is the individual or organization whose activities are illegal because they usually aim at ''stealing" people's information or getting access to their accounts without prior knowledge of the victim.

Atimes, website developers make mistakes thereby exposing files on the web server outside of the directory of the website. This files are readable by attackers who capitalize of the mistake who use command injection to carryout an attack, while some attackers use scripts or programs developed by others to attack computer systems and networks.

increased speed of attacks makes it difficult to secure computers from attackers beacause, attackers use modern simple tools  that are fast such that it can quickly scan systems for weaknesses and expose the vulnerability to carryout an attack.

Describe three (3) software packages that can be used to capture data?

Answers

Answer:

SingleClick

SingleClick is an Optical Character Recognition (OCR) tool that can be used to capture machine produced characters in low volume ad-hoc capture applications and populating a line of business application.

OCR (Optical Character Recognition)

OCR as a technology provides the ability to successfully capture machine produced characters in preset zones or, full page. OCR systems can recognise many different OCR fonts, as well as typewriter and computer-printed characters. Dependent upon the capabilities of the particular OCR product, this can be used to capture low to high volumes of data, where the information is in consistent location(s) on the documents. 

ICR (Intelligent Character Recognition)

ICR is the computer translation of hand printed and written characters. Data is entered from hand-printed forms through a scanner, and the image of the captured data is then analysed and translated by sophisticated ICR software. ICR is similar to optical character recognition (OCR) but is a more difficult process since OCR is from printed text, as opposed to handwritten characters.

(copied from Google)

; )

Which of the following is a career that's indirectly linked to careers in web technologies?

ОА. system administrator

OB. UI developer

OC. UX developer

OD. web developer

Answers

Answer:

that would beA

Explanation:

Write a program that asks the user to enter the number of pancakes eaten for breakfast by 10 different people (Person 1, Person 2, ..., Person 10) Once the data has been entered the program must analyze the data and output which person ate the most pancakes for breakfast.

Answers

Answer:

The program written in python is as follows

persons = []

most = 0

personindex = 0

for i in range(1,11):

      print("Person ",i)

      pancake = int(input(": "))

      persons.append(pancake)

      if pancake > most:

             most = pancake

             personindex = i

print("Person ",personindex," ate most pancakes")

Explanation:

This line initializes an empty list

persons = []

This line initializes variable most to 0

most = 0

This line initializes variable personindex to 0

personindex = 0

This line iterates from 1 to 10

for i in range(1,11):

The next two line prompts user for input

      print("Person ",i)

      pancake = int(input(": "))

This line inserts the user input to the created list "persons"

      persons.append(pancake)

The next if statement checks for the person with the most pancakes

      if pancake > most:

             most = pancake

             personindex = i

This line prints the person with most pancakes

print("Person ",personindex," ate most pancakes")

How to improve and create beautiful graphic

Answers

Answer:

Learn OpenGL and any graphics rendering program.

Explanation:

Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use? JavaScript HTML CSS Text editor

Answers

Answer:

Text Editor

Explanation:

What the question implies is that, what tool will she need to create the website.

And the answer is a text editor; this is so because the other three options are web development languages used in developing a website but the text editor is where she'll write her line of codes to create the required website poll.

Example of usable text editors are notepad and notepad++ etc.

If Janelle wants to create a school website for poll she has to make use of html.

What is HTML?

The full name for this is HyperText Markup Language. It is a programming language that is used to create websites.

It is very useful here because it helps to create structured documents. Therefore the HTML is the best tool for her.

Read more on HTML here

https://brainly.com/question/24373129

Privacy is considered keeping information about a network or system user from being disclosed to unauthorized people.A. TrueB. False

Answers

Answer:

A. True

Explanation:

Privacy: In computer science, The term "privacy" is described as an issue that generally concerns specific computer community in order to maintain some personal information associated with individual citizens of specific nations in computerized systems that is responsible for keeping the records. However, it is also a major concerns for different individuals to keep their data safe.

Answer:

True

Explanation:

Privacy is considered keeping information about a network or system user from being disclosed to unauthorized people. As per the  Information privacy law,  the relationship between the collection and dissemination of data, technology, the public expectation of privacy, legal and political issues surrounding them.It is also known as data privacy or data protection.

If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can''t steal user''s information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.

Answers

Answer:

hacker can steal your data in many ways.

Explanation:

if you allow cookie site for fake websites. It can absolutely be possible.

Other Questions
*Why were the Hausa states unable to resist takeover by the Kanem-Bornu?*How did the location of Kanem-Bornu contribute to the empires power? describe how carbon skeletons may vary and explain how this variation contibutes to the diveristy and complecity of organic moleculs how do you be nice to people you meet Does the text contain a vague pronoun reference? Whenever the Heberts visit New Brunswick, they see their relatives. 17. Eduardo is a 40-year-old individual who plans to retire at age 65. Between now and then, $2000 is paid annually into his IRA account, which is anticipated to pay 5% compounded annually. How much will be in the account upon Eduardo's retirement? what role do individuals play in a capitalist system? Ben worked for 14 consecutive days, earning an average wage of $230 per day as an independent contractor. During the first 8 days, Ben averaged $220 per day and his average wage for the next 5 days was $200. How much did he earn on the last day? square root of 10 [tex](128 + 2[/tex] What are different ways to describe speed and velocity Arnold is a bank employee. He has told his colleague Adolf about his intention of embezzling some funds from the bank. Instead of advising Arnold against committing such a crime, Adolf has been encouraging his friend to go ahead with the embezzlement. Which type of incomplete crime is Adolf committing in this scenario? Suppose Maria wants to breed parakeets that are yellow with patterned feathers. However, when she bred several parakeets that were yellow with patterned feathers, she found that there were four different offspring phenotypes.Phenotype Numberpatterned yellow wings 18solid yellow wings 6patterned white wings 6solid white wings 2Number of genes and alleles?2 genes; 2 alleles each1 gene; 4 alleles4 genes; 1 allele eachWhich phenotypes are coded for by the same gene? Different genes are separated by semicolons?yellow and white; patterned feathers and solidyellow and patterned feathers; white and solidall by the same geneeach by a separate gene What is the volume of the triangular prism below? V = ____ ft3 Identify and define the root in the word belligerent HELP ME PLZ What are the two definitions of the word Silo? Simplify: 6x - 3y + 5y - 10x A) -16x + 2y B) -16x - 8y C) -4x + 2y D) -4x - 8y The first people were____people are nowA. about the same size asB smaller thanC much heavier thanD larger than Read and choose the correct option that answers the question.En mi casa no usamos plstico. Usamos botellas y envases de vidrio para tirar menos basura y para tener un ambiente y unos ocanos limpios.Based on the text, what is most likely true? one number is 7 more than twice the other number. if the sum of the two numbers is 19, find the two numbers What is the literal meaning of "Nothing Gold Can Stay"? Write a brief summary of the poem (three to four sentences). Use examples from the text in your response. Solve this problem. A florist sells holiday bouquets that use roses and carnations in a ratio of 2 to 7. She receives a shipment of 343 carnations. How many roses will the florist need