Your browser does not support JavaScript!

EndlessBird

EndlessBird is Mathematics student 🧮
Last login
1 day ago
Joined
2023-11-19
EndlessBird latest posts

1 day ago - An illegal action in tennis wherein the player hits the ball before it bounces.

3 days ago - refers to the move of hitting the ball in a high arc.refers to the move of hitting the ball in a high arc.

3 days ago - Which parameter or parameters areWhich statement describes a difference between the operation of inbound and outbound ACLs? used to calculate OSPF cost in Cisco routers?

3 days ago - Which three statements are generally considered to be best practices in the placement of ACLs?

3 days ago - Information protection employs security solutions, _______________, and other technologies, as well as policies and processes, to secure information.

3 days ago - This issued guidelines in its risk assessment framework that recommend a shift toward continuous monitoring and real-time assessment. Select one: a. National Institute of Standards and Technology b. Cyber Security Association c. National Cyber Security Alliance d. Cyber Risk Monitoring Group

3 days ago - This is a type of attribute that is madeThis is a schema that pertains to the actual storage of data and its form of storage like files, indices. of more than one simple attribute.

3 days ago - Which of the following joins are mWhich of the following is the correct example of passing a privilege (INSERT and UPDATE) to user HR coming from a user scott?utually exclusive.

3 days ago - What is the conventional level of significance typically adopted in psychology?

4 days ago - Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and this describes the discipline dedicated to protecting that information and the systems used to process or store it.

4 days ago - This consists of the cyber-physical systems that modern societies rely on.

4 days ago - his refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.

4 days ago - A significant portion of data can be sensitive information, whether that be __________________, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.

4 days ago - IA is a protection of information and information systems from ______________ access, use, disclosure, disruption, modification, or destruction.

4 days ago - means that someone cannot deny having completed an action because there will be proof that they did it.

4 days ago - This advises that companies must be prepared to “respond to the inevitable cyber incident, restore normal operations, and ensure that company assets and the company’s reputation are protected.”

4 days ago - This ensures that internal networks are secure by protecting the infrastructure and inhibiting access to it.

4 days ago - These are all common examples of network security implementation except one.

4 days ago - What is the possible output since this transaction is been saved by using the commit statement?

4 days ago - Which of the following is not true writing PL/SQL that contains subquery?

4 days ago - Supposed that the DBA create a report as shown below: What type of join condition the DBA used? SELECT e.employee_id, e.lastname,e.department_id, d.department_id,d.location_id FROM employees e, departments d WHERE e.department_id between 20 AND 50;

4 days ago - This is used to enable a currentlt disable constraint in the table definition.

4 days ago - SELECT EMPLOYEES.EMPLOYEE_ID, EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,DEPARTMENTS.LOCATION_ID FROM EMPLOYEES JOIN DEPARTMENTS ON( EMPLOYEES.DEPARTMENT_ID (+)= DEPARTMENTS.DEPARTMENT_ID);

4 days ago - s power is generating from the speed and velocity of the forward and upward movements of arms, legs and body.

4 days ago - IDENTIFICATION. Read the question carefully and type what is being asked in the space provided. Another name for a shuttlecock.

4 days ago - Ang halimbawa nito ay ang pagbabago ng wika sa lugar (llokano sa La Union, Pangasinan, llocos, sa ilang bahagi ng Baguio) Select one: a. sosyal b. okupasyunal c. heograpikal d. operasyonal

4 days ago - Ang halimbawa nito ay ang pagbabago ng wika sa lugar (llokano sa La Union, Pangasinan, llocos, sa ilang bahagi ng Baguio)

4 days ago - Similarly to the form_error() function, returns all validation error messages produced by the Form Validation Library.

4 days ago - Most web application frameworks are based on the model-view-controller (MVC) pat tern. Select one:

4 days ago - ICodeIgniter's Pagination class is very easy to use, but it is not 100% customizable, either dynamically or via stored preferences.

4 days ago - A rule reference that returns FALSE if the form element does not match the one in the parameter.

4 days ago - Which of the following is correct from the given statement below: //$this->db->limit(10);

4 days ago - $that->db->insert_id() function returns the auto incremented or last inserted id from the query. Select one:

4 days ago - Method that accepts the email's body or content Method that accepts the email's body or content

4 days ago - Which version of NAT allows many hostA network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem?s inside a private network to simultaneously use a single inside global address for connecting to the Internet?

4 days ago - The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic?

4 days ago - Which of the following describes a What two functions describe uses of an access control list?VLAN?

4 days ago - TRUE or FALSE. A host can be assigned it IP address information in one of the two way. Statically and dynamically assigned. In statistically assigned IP address, the DHCP server provides a valid IP address.

5 days ago - Information Assurance (IA) is the study of how tWVo protect your information assets from destruction, degradation, manipulation and exploitation.

5 days ago - s the inherent technical features and functions that collectively contribute to an IT infrastructure achieving and sustaining confidentiality, integrity, availability, accountability, authenticity, and reliability.”

5 days ago - TIt is for storing non-numeric data that is brief, generally under 256 characters. The database designer can identify the maximum length of the text.

5 days ago - I level is concerned with performing day to day business transactions of the organization.

5 days ago - A switch will send a packet to another router; in other cases, it will send it directly to its destination.A switch will send a packet to another router; in other cases, it will send it directly to its destination.

5 days ago - In this stage, mainly concentrate on building a strong relationship with suppliers of the raw materials required for production. Select one:

5 days ago - Types of Si units which is the simple measurement for time, length, mass, temperature, amount of substance, electric current, and light intensity. Select one:

3 weeks ago - This is the fundamental entity which introduces abstraction in a Database Management System (DBMS). Select one:

3 weeks ago - Supposed that the DBA created a user named as HRD_MGR and granted a create session, then afterwards created a role name as HRD_AST with a privilege of using all DML operation then pass this privilege to HRD_MGR USER as shown below: >Create ROLE HRT_AST; >Grant insert, update, delete ON employees TO HRD_AST >grant HRD_AST to HRD_MGR What is the possible output?

3 weeks ago - Supposed that a user performs the query as shown below, what will happen to the data? UPDATE EMPLOYEES SET JOB_ID = ‘IT’ WHERE MANAGER_ID IS NULL; SAVEPOINT UPDATE_IT; UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’ WHERE DEPARTMENT IN (50,90); SAVEPOINT UPDATE_IT; COMMIT; ROLLBACK;

3 weeks ago - What will be the output if the user uses this PL/SQL. UPDATE WORKERS SET DEPARTMENT = (SELECT DEPARTMENT FROM EMPLOYEES WHERE DEPARTMENT =’HRD’);

3 weeks ago - Based on the table EMPLOYEES, DEPARTMENTS and LOCATIONS. From the given select statement below: What is/are the full name of employee whose LOCATION_ID is equal to 1700? SELECT (LASTNAME||','||FIRSTNAME) AS "FULL NAME", DEPARTMENT_ID, DEPARTMENT_NAME, LOCATION_ID FROM EMPLOYEES NATURAL JOIN DEPARTMENTS;