IdeasCuriosas - Every Question Deserves an Answer Logo

Questions in computers-and-technology

[Answered] Explain the memory device used in the first generation of computers. Describe any two limitations of this generation.

[Answered] The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion? Multiple Choice: A) DDoS B) Packet sniffers C) Phishing D) Rootkit

[Answered] _____ is the time utilized by a dialog work process to access data from the database and return to the presentation layer. (A) Response time (B) Presentation time (C) Delay Time (D) None of these

[Answered] How do breach and attack simulation technologies help white-hat hackers test security? A. They execute thousands of attack techniques continuously to reveal weaknesses. B. They are more sophisticated tools that illegitimate hackers do not have access to. C. They enable white-hat hackers to charge companies more while doing less work. D. They focus on infiltration and make it easier to provide one-dimensional analysis.

[Answered] b. Reflections 1. What safety measures can you take to protect your personal information and privacy online? 2. What are some examples of respectful and disrespectful online behavior?

[Answered] 1. What is Website security? a. The protection of personal and organizational public-facing websites from cyberattacks. b. The protection of personnel and user public-facing websites from cyberattacks. c. Both A & B 2. What is Cloud Computing? a. It's a connection between two servers b. It enables remote access, primarily through the Internet, to shared resources; (e.g., services) typically being maintained by a third-party (the cloud provider). c. It's a Virtual Private Network d. It's a database that provides information on software and hardware listing

[Answered] 1. HTML tags are enclosed in ____. 2. ____ tags have both opening tag and closing tag. 3. ____ tags contain only the opening tag. 4. The ____ tag defines the header section of web page. 5. HTML stands for ____. 6. HTML files are saved with a ____ file extension. 7. The ____ tag contains the content that is displayed on the web page. 8. ____ markup language used to create web page. 9. ____ tag used to define what is to be shown on the title bar when the web page is opened. 10. ____ is a collection of web pages. 11. Write the output:

[Answered] 1. Write any four features of a computer: i. ii. iii. Automation iv. Storage capacity 2. What is software? 3. Why does a computer need software? 4. Name any four application software: i. ii. iii. iv. 5. What do you mean by formatting?

[Answered] 3. The colourful image on your desktop is known as: a. Icon b. Pointer c. Wallpaper d. Screen Saver 4. This button resizes the window back. a. Restore down b. Close c. Maximize d. Minimize 5. Mouse pointer is known as a. Tool activator b. Symbol of wait c. Tool magnifier d. Delta

[Answered] A. Tick the correct option. 1. Which of these is a moving pattern or animation on the screen? a. Background b. Screen saver c. Icon d. Clock 2. Which of these is a long bar at the bottom of the desktop? a. Clock b. Taskbar c. Start button d. Menu bar 3. Which of these is a mouse pointer used for pointing and selecting? a. Busy arrow b. Normal c. Text select d. Four-headed B. Match the following mouse pointer shapes with their functions: 1. a. Used for pointing, and dragging the items 2. b. Used for moving pictures. 3. c. Computer is busy and wants you to wait 4. d. Used for inserting text in a document