Which of the following is NOT a reason why supply chain infections areconsidered especially dangerous?
a. If the malware is planted in the ROM firmware of the device this can make it difficult or sometimes even impossible to clean an infected device.
b. Users are receiving infected devicesat the point of purchase and arecompletely unaware that a brand newdevice may be infected.
c. It is virtually impossible to closelymonitor every step in the supply chain.
d. Supply chains take advantage of thetrusted "chain of trust" concept.

Answers

Answer 1

Answer:

D. Supply chains take advantage of the trusted "chain of trust" concept.

Explanation:


Related Questions

Of the hosted virtualization products reviewed, only ____ cannot be used for snapshots. Group of answer choices VMware Workstation Pro

Answers

The part of the hosted virtualization products reviewed, where only Microsoft Virtual PC cannot be used for snapshots.

What are hosted virtualization products?

Hosted virtualization is known to be an app that uses an operating system before it can deploy the hypervisor.

Note that  Microsoft Virtual PC is known to be a new  Windows Virtual PC made by  Microsoft virtualization technology that does not support the use of  snapshots.

Learn more about Applications from

https://brainly.com/question/24847835

A user is trying to access a file in a shared Windows folder. The user can open the share but cannot open the file in the share. You check the sharing permissions and the user has Change permission to the share. Why can't the user open the file

Answers

Answer:

they have  to change their settings

Explanation:

allow all

Explain what a Magnetic Resonance Imaging machine does.
If your answer is correct I will give a brainlist thingy.

Answers

Answer:

Magnetic Resonance Imaging, better known as MRI, is a machine mostly used in the medical field. It performs many tasks such as forming pictures of the anatomy of the human body and processes of the body. MRI can also scan a person's brain to figure out if there is a tumor or not.

☆anvipatel77☆

•Expert•

Brainly Community Contributor

Write a function mergingelements which adds each element in array1 to the corresponding element of array2 and returns the new array.

Answers

The mergingelements program is an illustration of functions and arrays

Arrays are used to hold multiple valuesFunctions are named code segments that are executed when called

The function mergingelements

The function mergingelements written in Java, where comments are used to explain each action is as follows:

//This defines the mergingelements function

public static int mergingelements[](int [] array1, int [] array2){

//This declares the new array

    int newArr = new int[array1.length];

//The following iterates through the arrays

    for(int i=0; i<array1.length; i++ ) {

//This adds the corresponding elements of the two arrays and append them to the new array

        newArr[i] = array1[i] + array2[i];

    }

//This returns the new array

    return newArr;

}

Read more about java programs at:

https://brainly.com/question/18554491

What terms are used to describe a machine that does not have an operating system and merely provides an interface between the user and the server

Answers

Answer:

A monitor maybe

Explanation:

I think that is the only thing that doesn't have it's own OS and display's information.

The Moon appears to be red in color during a total lunar eclipse because of the way light waves pass through Earth’s _________________.
Answer the blank
PLEASE HURRY

Answers

Answer bro must have a mental disorder its like ur thumb HEAT WAVES the  moon becomes red bc of heat waves didnt u say that anyways???

Explanation:

The Moon appears to be red in color during a total lunar eclipse because of the way light waves pass through Earth’s _________________.

Answer:Atmosphere

The Moon appears to be red in color during a total lunar eclipse because of the way light waves pass through Earth’s atmosphere.

[tex]__________[/tex]

Because the only sunlight reaching the Moon goes through Earth's atmosphere, it turns red.

#LearnWithBrainly

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?.

Answers

Answer:

Cookies.

Explanation:

It is a small text file that a website can place on your computer's hard drive to collect information about your activities on the site or to allow the site to remember information about you and your activities.

Zohan uses the following analogy to describe a concept of object-oriented programming. A button can have many uses. When it is pressed, it can cause a variety of different outcomes, such as opening a door or changing the volume. But you don't need to know what the button is going to do in order to operate it-you just push it. Which concept is he most likely talking about?

a) polymorphism
b) inheritance
c) encapsulation
d) overriding

Answers

Answer:

Polymorphism

Explanation:

You can have a basic button class that gets inherited by other classes.

class Button {

function pushButton(){}

}

class ElevatorButton extends Button{};

class BigRedButton extends Button{};

With these new classes, they inherit from the basic button class. They can decide what happens when the method pushButton() is called.

You don't need to worry about what pushButton() actually does, you can just call it if the object is of the type "Button" and you can expect it to work.

For her presentation on Italy, Matilda used a red background with light green text. When her friend critiqued her presentation, she found it difficult to read. What could Matilda do to make her slides easier to read?

a Change the background to white and the text to dark green.

b Change the background to yellow.

c Change the text to dark green and the background to black.

d Change the text to pink

Answers

A.) change the background to white and the text to dark green

Cristo has been working with a free, drag and drop style editor for a while and wants
to move beyond this to a more sophisticated style of editing software. What kind of
expanded options or features can Cristo MOST LIKELY expect with his upgraded
editing software?

A. versatility of movement, color-correction tools, tutorials

B. automatic image improvement, oil painting effect, watermark removal

C. unintentional noise, intellectual property removal. licensing

D. exclusive rights options, optical aberrations, pixilations

Answers

Answer:

c. unintentional noise, intellecetual property removal. licensing

Explanation:

the noise is too loud, its surrounding you, escape, ESCAPE HELP YOIURSELF HELP ME

لول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجلي

The expanded options or features can Cristo MOST LIKELY expect with his upgraded editing software is C. unintentional noise, and intellectual property removal. licensing.

What are The maximum not unusual place kind of highbrow?

The belongings dispute is that of infringement. This is wherein highbrow belongings is used or appropriated with out the owner's permission via way of means of another. Infringement can observe to many classes of highbrow belongings.

Some of the maximum not unusual place violations are: Infringement of patent, trademark or copyright rights. Counterfeiting of copyrights or trademarks. Misappropriating exchange secrets.

Read more about the versatility :

https://brainly.com/question/2193795

#SPJ2

What are some differences you’ve noticed and how people use technology?

Answers

Answer:

Teenagers and some adults use abbreviations such as lol. Teens usually have airpods but, people around 50 just use a phone on speaker and it is often a old phone.

Explanation:

What server roles is MOST appropriate to route files to multifunction devices?

Answers

The server role that  is most appropriate to route files to multifunction devices is  Print server.

What is a print server?

A print server is known to be a type of software application or a device that helps to print requests and do make sure that printer queue status information is in place for users and network administrators.

Note that it is often used in large firms and small or home office and it is the most appropriate to route files to multifunction devices.

Learn more about server from

https://brainly.com/question/17062016

Explain why it is important that the device registration is the last thing that is done in the initialization routine of a device driver. Likewise, explain why un-registering a device must happen first in the exit routine of a device driver.

Answers

The reason why device registration is the last thing done is that if any errors happens at the time you register device, you have to undo the registration activities and as such, it is often done last.

What is role of a device driver?

The device driver is known to be the device that gives the other part  of the operating system the needed software interface or the device class.

The reason why un-registering a device must happen first in the exit routine of a device driver is because if there is an issue, one has to settle it first before registration as one does not want error.

Conclusively, If any kind of errors is seen when a person wants to register the device, the person must undo any kind of registration that has been performed before that error occurs.

Learn more about device registration from

https://brainly.com/question/16010611

There are many Deaf-owned restaurants, including the Big Mango Café, in the WHAT

Answers

There are many Deaf-owned restaurants, including the Big Mango Café, in the world today.

What is Deaf Restaurants?

These are known to be Restaurants that are known to be run by Deaf  people. It is said to be Conquering the World as a lot of more, restaurants that is more that 25 of them are been managed or served by  people who are Deaf.

Note that they often sells Food of all kinds and as such, there are many Deaf-owned restaurants, including the Big Mango Café, in the world today.

Learn more about restaurants from

https://brainly.com/question/17619957

#SJ1

explain four features of presentation packages​

Answers

You have add more for anyone to be able to answer this, sorry

How to add page numbers in word without deleting header?.

Answers

Answer:

Double-click the header or the footer area (near the top or bottom of the page). Go to Header & Footer > Field. In the Field names list, select Page, and then select OK. To change the numbering format, go to Header & Footer > Page Number > Format Page Numbers.

Explanation:

---- Credit Microsoft Support

How to bypass securly or fortiguard (fortinet)


If you have either of these at your school you have realized that they are HORRIBLE.


Go to


Latest(dot)cf

Or

Securly(dot)fail


The "(dot)" means a period uhm. They wont let me put links 3 so I guess we'll have to make due with what we got :D


For unblocked search engines

AOL search.

Thats it<3

Oh and also fire fox


That's it for now. These websites may get banned so have fun with them.


(games directory is temporally down :( )

Answers

Answer:

thanks for whatever you just said!! <3

Explanation:

Dumpster diving is a low-tech means of gathering information that may be useful for gaining unauthorized access or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving

Answers

Train employees to shred papers containing sensitive information

press ctrl+d press space keep repeating until.... what does this phrase mean what is it telling me to press

Answers

Answer:

Well it just favorited this page ;_;

Explanation:

Which of these social media resources focuses primarily on tips for creating inclusive Condit

Answers

Answer:

Create Accessible video and social media focuses primarily on tips for creating inclusive content.

Hi! I need help with a survey thing I'm doing I just need a few people and I have posted in a different place as well but I hoped someone could help me out her as well. here's te question.
give an example of previous experiences you've had that involved a model?(These can be school related or from your personal life.)
what was the setting and real-world use) ?
what were the basic components of the model ?
What assumptions are built into the model and what are the limits of the model, or what can the model fail to explain?
* DOESN'T HAVE TO BE RELATED TO ANY SUBJECT IN PARTICULAR I JUST SELECTED COMPUTER AND TECH CAUSE THATS THE CLASS I'M DOING THIS FOR.

Answers

Answer:

Explanation:

1. All Computer Science and tech courses rock. However, they won’t cover all the skills you might need in a job. For example, if you’re planning to go into software development, you might learn a considerable amount of programming languages, but you may need to go beyond that for work.

You may have to understand and get the hang of new programming languages on your own, without anyone to teach you. It might be a good idea to look for introductions.

So schedule your time properly and after completing your core assignments, hit G.o.o.g.l.e, and find out what type of computing skills are tech companies looking for. Particularly, look into further details on the exact requirements at those specific companies you dream of working for.

You could also make little websites or programs just for yourself, to test your abilities and push yourself further.

If want to study Information Technology at top-ranked universities, check programmes offered by some of the best universities ranked by The Times Higher Education.

2. Try to get your assignments done well in advance of deadlines, ideally have them ready a week in advance. Otherwise, you’ll just get tired, your code won’t work, and you’ll fail the assignment.

Computer Science and tech is one of those areas where it is absolutely necessary to keep working throughout the semester because sometimes you’ll need to take a break to get some clarity as to why something isn’t working. So do yourself a favour and work all the way through the semester.

That doesn’t mean you should spend every minute studying; it means you’ll have to be constant with your learning progress throughout the year. You’ll do far better this way.

3. What do you learn during Computer Science degrees? Most tech courses are not all theory compared to courses from other types of degrees. Even if Computer Science and Information Technology degrees include theoretical classes, their approach is far more practical.

For instance, right after a theoretical class, you will have to apply that knowledge through practical exercises in a computer laboratory.

Sure, you may have to work on essays, but they will always have to include practical work or projects – both successfully combined, with logical explanations for each step and chapter from your work.

4. Being able to work on your own and independently motivate yourself is great, and you’ll need that. But don’t forget that you’re not alone, and its’ highly unlikely you’ll be alone in the workplace as well. You’re likely to be part of a team.

And team work takes some skills you’ll need to brush up on and work constantly. Once you’ll find a good study group, you’ll surely enjoy to meet with your peers, share ideas and work on interesting projects. After all, that’s just the classical way innovation starts: with a few genius minds that come together and work on a new invention until it becomes trademark.

5. If you study a Computer Science degree, it may seem pretty daunting as you'll need to learn more, study more, do more. But don’t forget to live your life. Have fun, meet up with friends, go clubbing or travelling, get involved in some student activities.

Unit 7 - Planning and Designing a Website

1. Usability is how easy it is for a visitor to use your website.

True
False

2. You should not plan for mobile viewers to access your website.

True
False

3. Websites should be intuitive to grant ease of access to the user.

True
False

4. Most users spend 1-3 minutes viewing a website for the first time to decide if they will use it again.

True
False

5. Simplicity is a great tactic to make important information stand out on a webpage.

True
False

Answers


Am not sure about no.2 and no.4
But am going to answer
1.true
3.true
5.true

Which of the following would you use if an element is to be removed from a specific index? A) an index method B) a del statement C) a slice method D) a remove method

Answers

A del statement uses an element is to be removed from a specific index?

What is a a del method?

The del statement is known to be a Python keyword that is often used to remove or delete any  object.

Note that this del method is used specifically to delete any element that is present at a specific index, not looking at  what that element may be.

Learn more about index from

https://brainly.com/question/5992428

#SPJ1

What is the most common form of host-based IDS that employs signature or pattern-matching detection methods

Answers

The two primary methods of detection are signature-based and anomaly-based. Any type of IDS (HIDS or NIDS) can detect attacks based on signatures, anomalies, or both. The HIDS monitors the network traffic reaching its NIC, and the NIDS monitors the traffic on the network.

A _______________ involves the exclusive use of a rented computer and connection to the Internet that is housed in the web hosting company's premises.

Answers

Answer:

Its B 100% sure because i took the test

Explanation:

Answer:

A dedicated Web server

Explanation:

A dedicated Web server involves the exclusive use of a rented computer and connection to the Internet that is housed in the web hosting company's premises.

Why would a programmer use this code block?
on start
O A. To cause an event at the beginning of a game
B. To cause an event when the player enters a specific input
C. To select a parameter for a game's appearance when it starts
D. To hold a sprite's data in a game's program for future use

Answers

C. To select a parameter for a games’s appearance when it starts.

Answer:

THE ANSWER IS B.

Explanation:

Best definition of an input device

Answers

Answer:

physical piece of hardware that connects to a primary device, such as a computer, in order to provide user input.

Explanation:

You have a new hard disk that you want to put two different OSs on but each OS requires a different file system. What procedure must you perform before you can install the two OSs

Answers

Answer:

brianly

Explanation:

becouse l m not anderstand a contions

The identifiers in the system-provided header files such as iostream, cmath, and iomanip are defined in the namespace ____.

Answers

Answer:

std

Explanation:

Assuming this is a C++ question, those are all std libraries.

std::cout is in the <iostream> header for example.

Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.
a. True
b. False

Answers

Answer: True

Explanation: I would know i have gotten dosed plenty of times on video games

A.True because IP address is very different no IP address are the same that how u get tracked by cops
Other Questions
Write the equation of the line that passes through the points (-3, -5) and(-2,-4). Put your answer in fully simplified point-slope form, unless it is a verticalor horizontal line. Find the greatest common factor of 34 and 36. Which type of program is the spanish equivalent of a soap opera Which pieces of information may be found on a person's credit report?Select each correct answer.past due billssocial security numbermarital statusmedical historycriminal recordmortgage payment Which of the following would a groundwater hydrologist study? O a pondO a lakeO an aquiferO a river All of the following are criterion for team success when using collaboration IS except ______.a) Completing the work on timeb) Satisfying experiencec) Completing the work within budgetd) Non- meaningful experiencee) Growth in team capability Enter the correct answer in the box. Simplify the expression (6^4)^2. Alejandro will deposit $1,750 in an account that earns 6.5% simple interest every year. His sister Anallency will deposit $1,675 in an account that earns 7.5% interest compounded annually. The deposits will be made on the same day, and no additional money will be deposited or withdrawn from the accounts. Which sibling will have more money at the end of four years? In Lord of the Flies, how many dead people are washed out by the tide? GIVING BRAINLEST TO THE PERSON THAT CAN EXPLAIN HOW TO DO THIS THE BEST :) If 45.0 mL of a 4.00 M sodium sulfate (Na2SO4) solution is used for a reaction, how many moles of solute were present in the solution?____ moles I think my brain is messed up right now please help me with this 1. What was the purpose of the declaration issued by the Allies at Potsdam? (1 point)A. The Allies wamed Japan that Allied forces would continue its island hopping strategy toward the Japanesemainland.B. The Allies wamed Japan to surrender or suffer the consequences.C. The Allies announced that the Soviet Union was entering the war against Japan.D. The Allies announced that Japan had surrendered following the dropping of the atomic bombs. 0r2Question 3You've been saving and currently have $20,000 in a savings account earning 1.5% APR. What is the value after 10years?.You've been saving and currently have $20,000 in a savings account earning 1.5% APR. What is the value after 10years? is the theoretical or the experimental probability greater for the coin landing on tails? While daydreaming is technically classified as a lower-level awareness activity, Dr. Williams actually thinks this type of thinking and visualization is an advanced ability.TrueOr False Evaluating information sources is a skill that can be used over the course of a lifetime for any personal or professional need.TrueFalse Who was the chief organizer of the spy ring that passed secrets to the Soviets through Klaus Fuchs? Julius Rosenberg David Greenglass Morton Sobell Harry Gold Read these sentences.It took her weeks to arrange the plants within their hierarchy. Finally her work paid off,and she was able to identify any plant in the forest.Which of the following dictionary entries BEST clarifies the meaning of the wordhierarchy in this sentence?Select one.OCnoun: a classification systemverb: to organize somethingnoun: members of a religious groupnoun; the highest position in a system of authority The increasing economic, cultural, political, and social connections between people around the world is called __________.A.the world marketplaceB.socializationC.connectivityD.globalizationPlease select the best answer from the choices provided.