What company handles security for a lot of the e-commerce on the internet and also maintains two root name server clusters?

Answers

Answer 1
Verisign The Verisign company manages the "a" and "j" root name servers (IPv4 addresses of 198.41.0.4 and 192.58.128.30, IPv6 addresses of 2001:503:ba3e::2:30 and 2001:503:c27::2:30 respectively). The company is currently based in Dulles, Virginia. Their primary business is DNS services since August 9, 2010 they sold their PKI certificate services and infrastructure to Symantec.

Related Questions

Project managers have the overall responsibility for planning, executing, and completing a project.
A) True B) False

Answers

The given statement "Project managers have the overall responsibility for planning, executing, and completing a project." is True because Project managers are responsible for ensuring that a project is completed within its budget, scope, and timeframe.

Project managers have the overall responsibility for planning, executing, and completing a project, ensuring that the project's objectives are met within the stipulated time and budget constraints. Project managers must identify and manage risks, monitor progress, and make adjustments as needed to keep the project on track. They must also ensure that all deliverables meet the requirements and quality standards specified in the project plan.

In the planning phase, project managers work on defining the project's scope, setting goals, and developing a detailed project plan. This involves coordinating with stakeholders, establishing a timeline, identifying required resources, and outlining the necessary tasks and responsibilities.

During the execution phase, project managers oversee the implementation of the project plan by allocating resources, monitoring progress, and adjusting the plan as needed to address any unforeseen issues or changes. They communicate with the project team and stakeholders, making sure everyone stays on track and works towards achieving the project's objectives.

Finally, project managers are responsible for the completion of the project. This involves ensuring that all project deliverables have been met, conducting a thorough review of the project's performance, and conducting a lessons-learned analysis. The project manager also takes care of project closure activities, such as releasing resources, finalizing documentation, and celebrating the project's success.

In conclusion, project managers have the overall responsibility for planning, executing, and completing a project, as they are instrumental in guiding the project through its various stages while ensuring that it achieves its intended goals.

Know more about Project managers here :

https://brainly.com/question/30457233

#SPJ11

Create one of these on your desktop start menu and use it to quickly open a folder, data file, program, or other object?

Answers

A shortcut is a used to quickly open a folder, data file, program, or other object. They are very convenient to have and make navigating through a computer extremely easy.

A new version or edition of a software product is referred to as a software ___________.

Answers

Final answer:

A new version or edition of a software product is known as a software innovation, a process that improves upon a product's existing features or performance. New software versions are upwardly compatible, enabling users to open older files but necessitating an upgrade to share files with those using the latest version.

Explanation:

A new version or edition of a software product is referred to as a software innovation. The process of software innovation involves incrementally or radically modifying an existing software product to improve its features or performance. One important aspect of software versions is that they are designed to be upwardly compatible, meaning the new version can read files created by older versions. However, older versions may not be able to read files created by the new software, which can compel users to upgrade to the latest version to maintain compatibility with files shared by colleagues or friends.

Which are characteristics of a good topic sentence?

Answers

A good topic sentence provides the reader with an indication of what will follow in the rest of the paragraph.
It contains both a topic and a controlling idea or opinion. 
It is clear and easy to follow.
It does not include supporting details. It is to the point. 
A good topic sentences engages the reader by using interesting vocabulary.
I hope that this helps. 
Please mark Brainliest if you believe that I deserve so.

I need help to make this code to make it remove all instances of the specified letter from the original sentence

Answers

Here is my solution. I did the following:

- changed the setRemover into a constructor, since the comment seems to hint that that is expected.
- changed the lookFor type into a String, so that it can work with the string replace overload. That's convenient if you want to replace with an emtpy string. The char type won't let you do that, you can then only replace one char with another.
- Added a static Main routine to use the class.

import java.lang.System.*;

public class LetterRemover 
{
   private String sentence;
   private String lookFor;

   public LetterRemover() {}
   
   // Constructor
   
   public LetterRemover(String s, char rem)
   {
       sentence = s;
       lookFor = String.valueOf(rem);
   }
   
   public String removeLetters()
   {       
       String cleaned = sentence.replace(lookFor, "");       
       return cleaned;
   }
   
   public String toString()
   {
       return sentence + " - letter to remove " + lookFor;
   }

   public static void main(String[] args) 
   {
        LetterRemover lr = new LetterRemover("This is the tester line.", 'e');
        System.out.println(lr.toString());
        String result = lr.removeLetters();        
        System.out.println("Resulting string: "+result);
   }
}

A collaborative web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.

Answers

A collaborative Web page that is designed to be edited and republished by a variety of individuals is called ad Wiki. A wiki is a server program that allows users to collaborate in forming the content of a Web site. The term comes from the word "wikiwiki," which means "fast" in the Hawaiian language.The simplest wiki programs allow users to create and edit content.

You can add chart and axes titles on the chart tools format tab or with the chart elements buttom. true or false

Answers

Select the chart. Navigate to the Chart Layouts group on the DESIGN tab. Open the drop-down menu named 'Add Chart Element'. In Excel 2010 you have to go to the Labels group on the Layout tab and click the Axis Title button. From Axis Title options choose the desired axis title position: Primary Horizontal or Primary Vertical.

Which kind of desktop uses the same case to house the screen and processing circuitry?

Answers

Final answer:

All-in-One computers combine the screen and processing circuitry in one case, offering a space-saving design.

Explanation:

All-in-One computers use the same case to house the screen and processing circuitry. These desktops combine the components of a traditional desktop computer, such as the motherboard and storage, into the back of the monitor, creating a compact and streamlined design.

For example, the Apple iMac is a popular model of an All-in-One computer where the monitor contains all the essential hardware components, reducing the need for separate towers or CPU units.

One key advantage of All-in-One computers is their space-saving design, making them ideal for environments where space is limited, such as office cubicles or home workstations.

Random access memory (ram) is also sometimes called _____ storage.

Answers

It is also sometimes called Volatile storage

Excel allows you to rotate text in a cell counterclockwise by entering a number between 1 degree and ____ degrees.

Answers

Excel allows to rotate text n a cell countervclockwise by entering a number between 1 degree and (+-) 90 degrees.

A public key is part of what security measure?

Answers

A public key or the asymmetric key which is used for the authentication process. It consists of a pair of keys in which one key encrypts and the other decrypts. It come under Public Key Infrastructure (PKI) and is a part of INFORMATION SECURITY measures. PKI is the management solution for the keys.

Write a program that loops one thousand times. add all the even numbers and display the results. add all the odd numbers and display the results.

Answers

# Python v3

odd = 0
even = 0

for i in range( 1000 ): # Note: zero indexed!
    if( i % 2 ):
        even += i
    else:
        odd += i

print( "The even numbers add up to %d" % even )
print( "The odd numbers add up to %d" % odd )

Which of the following could be done to a computer that is slow to access stored data to make it faster?

Increasing the amount of onboard cache
Increasing the size of the hard drive
Decreasing the size of the processor
Decreasing the amount of bus width

Answers

Answer:

Increasing the amount of onboard cache

Explanation:

got it right:)

It is okay to use a dust rag when cleaning the inside of a computer.

Answers

no because using a dry old dust rag can make a static shock when cleaning a computer because any sort of electric shock to a computer's motherboard will kill it rendering it useless

Under normal operations, cisco recommends that you configure switch ports on which vlan

Answers

 

You can configure switch ports on default VLAN under normal operations. Cisco switches always have VLAN 1 as the default VLAN, which is required for many decorum communications between switches like spanning-tree protocol for example. It is obligatory not to delete or even change the default VLAN.

 

 





Write a function called printstars. the function receives an int parameter . if the parameter is positive, the function prints (to standard output ) the given number of asterisks; otherwise the function does nothing. the function does not return a value . thus, if printstars(8) is called, ******** (8 asterisks) will be printed. the function must not use a loop of any kind (for, while, do-while) to accomplish its job. instead, it gets the job done by examining its parameter , returning if the parameter 's value is not positive. if the parameter is positive, it prints a single asterisk (and no other characters ) then (recursively) calls itself to print the remaining asterisks.

Answers

Jhgffghgfyyfhiggjhfgvhj

What is the key benefit of dhcp manual ip address allocation over manually configuring the ip address by person?

Answers

Saving 3 minutes of configuration & maintenance over the life of the computer unless it's moved to a different network.

NEED HELP AGAIN

When you see the =C7*$B$3 formula, what will happen when it is copied to the cell directly below the active cell using the fill handle?
    
  A. Both cell references will remain the same.

  B. The C7 cell reference will remain the same and $B$3 will increase to $B$4.

  C. The C7 cell reference will increase to C8 and $B$3 will increase to $B$4.

  D. The C7 cell reference will increase to C8 and $B$3 will remain the same.
 

Answers

the answer to the question is D)

Answer:

D. The C7 cell reference will increase to C8 and $B$3 will remain the same.

Explanation:

When you have a formula in a cell that you need to put in the ones below that one, you have the option to drag the fill handle into the cells you need.  This will make the formula to appear in those cells and it will change according to the number of the row. However, if you need that one or more value to remain the same, you have to put a dollar sign before the letter and another one before the number to lock them so when you drag the formula, those values won't change. So, acording to this, when you see the =C7*$B$3 formula and it is copied to the cell directly below the active cell using the fill handle, the C7 cell reference will increase to C8 and $B$3 will remain the same.

Stella likes using social networking websites. Which Netiquette practice should Stella follow?
A. Stella should choose from a variety of colors make her post more entertaining
B. Stella should always use abbreviations and shortened words to reduce the post length
C. Stella should obtain permission from her friends before posting their photographs
D. Stella should occasionally use more sarcastic and witty remarks to make her post funny

Answers

The answer should be C. A friend can sue you even if you know them and decide to take a pretty picture of them to put on your social media, it can even be  because they don't like the way they look in the photo. 

Answer:

The correct option to the following question is C.) Stella should obtain permission from her friends before posting their photographs

Explanation:

Netiquette refers to an Internet etiquette. In other words, the use of a good manner in an online communications such as e-mail, blogs, forums, and social networking site to the name of few. It is an important to use the netiquette because the communication online is non-verbal communication.

To what does the term "netiquette" refer? Question 4 options: A set of guidelines that encourages common sense, politeness, and general rules for e-mail messages A set of U.S. laws that specify conetent forbidden from transmission in e-mail messages A set of typographical conventions that govern user practices in e-mail messages

Answers


A set of guidelines that encourages common sense, politeness, and general rules for e-mail messages

Why is it unlikely that you will find the ip address 192.168.250.10 on the internet?

Answers

Answer:

This is a private IP address not available on the network.

Explanation:

Why is it unlikely that you will find the IP address 192.168.250.10 on the internet? This is a private IP address not available on the network. If no DHCP server is available when a computer configured for dynamic IP addressing connects to the network, what type of IP address is assigned to the computer?

Stores of data that are so vast that conventional database management systems cannot handle them, and very sophisticated analysis software and supercomputing-level hardware are required, are known as ____. these data include not only data in corporate databases but also web-browsing data trails, social network communications, sensor data, and surveillance data.

Answers

Maybe an international database, where all nations are invited to contribute information, THEREFORE, there would be a vast amount of data.

In a windows ____ , each computer maintains a list of users and their rights on that particular computer.

Answers

server?
.................

A dendrochronologist interprets:

1. pollen grains
2. tree rings
3. fossil plants
4. rock formations

Answers

2 because it’s tree rings

the answer is #2 tree rings

_____ options are available in the Home tab in the Paragraph grouping.
a. Themes
b. Line spacing
c. Margins
d. Column

Answers

Line Spacing options are available in the Home tab in the Pargraph grouping

Answer:

b. Line spacing

Explanation:

In Microsoft word and other word processing applications, line spacing can be found in the home tab in the paragraph group.

Line spacing allows you to properly format the spacing between lines in your paragraph, which enables text to be readable.

A picture of the paragraph group with line spacing in a circle has been uploaded.

 

Moving packets from source to destination across multiple networks is called

Answers

Moving packets from source to destination across multiple networks is called a Router.

Select all that apply. Which two sections of the orchestra displayed the lowest timbre in Britten's piece? woodwinds brass strings percussion

Music App

Answers

bass and percussion

Answer:

woodwinds and strings

Explanation:

Controlled ____ makes a relational database work.

Answers

Which is not a component of a database that describes how data is stored?

Your friend has asked you to provide one tip for accepting constructive criticism. Which of the following is the best technique? A) Become defensive about the criticism B) Reflect upon the criticism C) Resist seeking solutions to the behavior that prompted the criticism D) Tune out the critic's criticism

Answers

Answer:

b. reflect upon the critisism

Explanation:

i got it right :)

have a great day!

When a friend has asked you to provide one tip for accepting constructive criticism. The best technique is to reflect upon the criticism. The correct option is B.

What is constructive criticism?

Constructive criticism is straightforward, truthful, and simple to apply. It offers concrete illustrations and solutions for effective positive change. This kind of criticism also identifies areas where the recipient can enhance their conduct to reduce potential issues in the future.

Giving feedback in the form of constructive criticism is beneficial since it offers precise, doable recommendations.

Constructive criticism offers specific suggestions on how to make improvements in place of broad counsel. Constructive criticism is direct, to the point, and simple to implement.

Therefore, the correct option is B. Reflect upon the criticism.

To learn more about criticism, refer to the below link:

https://brainly.com/question/8936925

#SPJ5

True or false: you cannot change the default margin size for word documents.

Answers

False the answer is for that question
Other Questions
An atom with 7 protons, 6 neutrons, and 7 electrons has an atomic mass of _____ amu. (Enter a whole number.) How many protons are in an element with an atomic number of 8 and a mass number of 18 Why did colonists resent the tea act A ___________ jury is one whose members are irreconcilably divided. What are 5/6 and 7/9 written with their least common denominator (LCD)? How was the second continental congress similar to the first? Mc)how did the u.s. government respond to entrance into world war ii? Given the area of a square is 225 square feet, what is the length of each side A topic list is a list of important content and material which will be covered on a test.true or false? The factored form of 4a3b5 16a5b2 + 12a2b3 is ? What is the voltage drop across a 3 k resistor connected to a 9v power source? How does Rikki-Tikkis character fulfill the first step of a heros journey, according to the archetypal character traits. What methods revolutionized agriculture? How did farming technology and innovations contribute to the formation of the Wheat Belt? Read the excerpt below and answer the question. "A maid brought water soon in a graceful golden pitcher and over a silver basin tipped it out so they might rinse their hands..." What is the meaning of this excerpt, which is repeated numerous times throughout The Odyssey? Homer wants us to know that the people at the feast practiced good hygiene. Homer wants to show off how wealthy the kings were, using golden pitchers to wash their hands. Homer wants to emphasize the proper etiquette of hospitality when hosting a guest. Homer simply cant think of another way to say that people washed their hands before eating. 1ST ANSWER THAT IS CORRECT GETS BRAINLIEST!!!!Which term describes the process of water moving from plant leaves to the atmosphere? Air pressure Humidity Transpiration Density Add write the double fact you used to solve the problem 8+7 Using context clues, choose the meaning of the italicized word in the following sentence. Haughty, or self-important, is how the students described the new math teacher.A ModestB ConceitedC ReservedD Humble what type of evidence does the student use in paragraph 2 of the essay sin x= 4/15 round to nearest tenth find x En los arroyos (brooks) del campo nos gusta beber _____ agua limpia. A.los B.el C.la D.las Steam Workshop Downloader