Complete the sentence.
A _______ error might appear when you are attempting to view a secure web page

Answers

Answer 1

Answer:

An internal server error


Related Questions

You want to copy data from one cell or range to an adjacent cell or range in your spreadsheet, without using a shortcut key. Which of the following can you drag on your spreadsheet to do this?

Answers

How can you insert a new row into your data without disturbing an adjacent set of data on the same sheet? Highlight only the data where you'd like to insert a row. Right-click > Insert > Shift cells down.

Jon wants to set up a trihomed DMZ. Which is the best method to do so? A. use dual firewalls B. use a single firewall with only two interfaces C. use a single three-legged firewall with three interfaces D. use dual firewalls with three interfaces

Answers

Answer:

The correct option is C) Use a single three-legged firewall with three interfaces

Explanation:

DMZ is an acronym for a demilitarized zone.

A DMZ network is one is situated between the internal network and the Internet. It is supported by an Internet Security and Acceleration (ISA) server.

The interfaces you'd get with the DMZ network are

A public network (Internet Protocol-IP) address  with a public interfaceAn internal network interface with a private network (IP) address  A DMZ interface with a public network (IP) address  

Unlike the back-to-back DMZ settings, a trihomed DMZ is unable to use private IP addresses. To use the trihomed DMZ, public IP addresses are a must suitable requirement.

Cheers!

Which of the following is NOT an example of application software?
Internet Explorer web browser
Photoshop image editing program
Microsoft PowerPoint presentation software
Windows operating system

Answers

Application software is a type of software that also carries out another personal, educational, and business function, and its further discussion can be defined as follows:

Each application is designed to support the user in a particular process that could be associated with productivity, creativity, and communication.In this question except for Windows all "web browser,  Photoshop, and presentation software" is a type of Application software, that is run on OS.  Windows is a software accumulation known as just an OS that controls a PC (personal computer).

Therefore, the final answer is "Windows operating system ".

Learn more:

brainly.com/question/2949220

Question # 6 Fill in the Blank You designed a program to create a username using the first three letters from the first name and the first four letters of the last name. You are testing your username program again for a user whose name is Paula Mano. The output should be

Answers

Its PuaMano

Explanation:

got it wrong and it shows this answer for edge

Identify the parts of a spreadsheet by using the drop-down menus to select the part that corresponds to the labeled diagram to the right.

A

B

C

D

E

Answers

I believe d is the answer !

Answer:

A- Row

B- Column

C- Workbook

D- Cell

E- Sheet

Explanation:

Got a 100% on this, the person above is incorrect.

What is the output of the following code:
lang=
['Python','C','C++, JAVA,ASP'PHP',VB', Oracle
'MySQL)
list1 = lang(2:-2]
list2 = langl-2:-5)
list3 = langl: : 3]
print(list)
print(list)
print(list3)​

Answers

Answer:

Syntax error.

Explanation:

There are many typing mistakes in this source code.

How do commands inside an onEvent run different from commands outside?

Answers

Answer:

This is probably the most important reason. In an event-driven architecture, there can be no question that an event raised represents something that has happened.

Now, because Commands are something we want to happen, and Events are something that has happened, we should be using different verbs when we name these things. This drives separate representations.

8.6 Code Practice: Question 1
Write a function named buildArray that builds an array by appending a given number of random two-digit integers (10-99). It should accept two parameters — the first parameter is the array, and the second is an integer for how many random values to add, which should be input by the user.

Print the array after calling buildArray

Answers

In python 3.8:

import random

def buildArray(arr, nums):

   i = 0

   while i < nums:

       arr.append(random.randint(10,99))

       i+=1

arr = []

numbers = int(input("How many values to add to the array:\n"))

buildArray(arr, numbers)

print(arr)

I hope this helps!

The function named buildArray that builds an array by appending a given number of random two-digit integers (10-99) and accept 2 parameters is represented below

import random  

def buildArray(array, integer):

   i = 0

   while i < integer:

       array.append(random.randint(10, 99))

       i += 1

   return array

print(buildArray([], 12))

The code is written in python.

A function is declared called buildArray. This function accept 2 parameters which are arrays and integer.

i is use to declare a variable assigned to zero.

while i is less than the integer(one of the parameter), random number between 10 and 99 is appended to the parameter array.

The value of i keeps on increasing until it becomes less than the integer.

The filled array is returned.

Finally, we call the function with the required parameters.

The bolded portion of the code are keywords in python.  

read more: https://brainly.com/question/18612252?referrer=searchResults

Computer identity theft differs from theft in the real world in what major way?
A. Identity theft puts you in more physical danger.
B. Identity theft can affect your credit without your knowledge.
C. The banks will not assume your losses due to fraud.
D. Banks will replace your credit cards more quickly with identity
theft.

Answers

Computer identity theft is different from theft in the real world because B. Identity theft can affect your credit without your knowledge.

Computer identity theft simply means the use of someone's else private information by another person. It should be noted that identity thieves usually apply for loans by using an individual's credit card.

Computer identity theft is different from theft in the real world because identity theft can affect your credit without your knowledge. Identify thieves can also open bank accounts and use the credit cards in other people's names.

Learn more about theft on:

https://brainly.com/question/20609642

Answer:

B. Identity theft can affect your credit without your knowledge.

Explanation:

It means fruit- trees garden.

Answers

Answer:

What does?

Explanation:

Do you have a question?

Which of the following ideas would not be appropriate for an essay
comparing two dog breeds?
A. Terriers are feisty and smart, which can cause headaches for their
owners.
B. My dog Sally would play fetch for hours.
C. With a couple of exceptions, terriers are smaller than retrievers.
O D. Broadly speaking, retrievers are docile and friendly.

Answers

Answer:

B.

Explanation:

The following ideas would not be appropriate for an essay comparing two dog breeds:  My dog Sally would play fetch for hours. Thus option (B) is correct.

What is an essay?

An essay is defined as a brief formal piece of writing and an essay deals with a particular subject. It is generally written to try to influence the reader using selected research evidence.

In general, an academic essay has three parts:

An introduction part ,that provides the reader an idea of what they are about to learn and presents an argument in the form of a thesis statement

A body part, or middle section, that provides evidence used to prove and persuade the reader to accept the writer's particular point of view

A conclusion that summarizes the content and findings of the essay.

The following ideas would not be appropriate for an essay comparing two dog breeds:  My dog Sally would play fetch for hours. Therefore, option (B) is correct

Learn more about an essay here:

https://brainly.com/question/20426054

#SPJ5

Which precaution should you take while working on a computer

Answers

Answer: Maintain a cool temperature to avoid sweating

Explanation:

What are the lines of communication on a motherboard?

Answers

Answer:

buslines

Explanation:

hybfndndndjdkd

Which of the following is true of functions? * 2 points A. Programs written with functions run more quickly B. Functions can help remove repeated code from a program C. Replacing repeated code with a function will reduce the number of commands the computer needs to run D. Functions are called once but can be declared many times

Answers

Answer:

I’m sure if I remember that this is “B.”

Explanation:

I have taken computer science class before so I remembered!

The option that is true of functions is B. Functions can help remove repeated code from a program.

It should be noted that the fact that programs are written with functions doesn't mean that they will run quickly.

Functions can help remove repeated code from a program. Also, replacing repeated code with a function doesn't reduce the number of commands the computer needs to run.

Read related link on:

https://brainly.com/question/17691320

i need help with the rest also

Answers

Answer:

??? blackkkkkkkkkkkkkkkkk

Where should citations be included in your research paper? Select all that apply.

In the header

At the end of every paragraph

As footnotes

In a separate Works Cited page

(EASY!!! BUT I NEED HELP PLEAASE!!!)

Answers

Answer:

in a separate works cited page

PLEZ ANSWER QUICK
Another name for a web page's address is _____.

ISP

web server

HTTP

URL

Answers

The answer is URL. ........

Answer:

URL is the other name for a web page's address

HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT

Answers

Answer:

Explanation:

It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation.  Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.

plz mark as brainliest

Write code which takes inputs and creates two Rectangle objects (using the edhesive.shapes.Rectangle class) and compares them using the equals method.

JAVA!!

Answers

Answer:

System.out.println("Enter length:");

Scanner scan = new Scanner(System.in);

Double x = scan.nextDouble();

System.out.println("Enter 2 lengths:");

Double a = scan.nextDouble();

Double b = scan.nextDouble();

Rectangle rect = new Rectangle(x);

Rectangle rect2 = new Rectangle (a,b);

if (rect2.equals(rect)){

 System.out.print("Congruent Rectangles");

}

else {

 System.out.print("Different Rectangles");

}

 }

}

Explanation:

Hi, I couldn't delete my questions so I'm just editing them so you don't have to do it.

Answers

Ok that got h in by going go off do us do

write the seven tasks of previntng maintenance?​

Answers

Answer:

These are testing, servicing, calibration, inspection, adjustment, alignment and installation. Every maintenance team member should be conversant with and apply them accordingly. A preventive maintenance is a crucial component of every company's TPM program.

HELP!!!!!
Your colleague has made a suggested change to an important document you are both working on. You disagree with their suggested change. They will be reviewing the changes you make before the final version of the document is submitted to your boss. You both work remotely and are in radically different time zones. What is the best step to take next?

Answers

Leave the room and let someone else figure it out!

Icon view, list view, and details view are all common views provided by which kind of program?
a web browser to view web pages
a word processor to view headings
a file browser to view folders
a file manager to view files and folders

Answers

Answer: The standard program that uses common views such as the icon view, list view, and details view would be the program known as "File Explorer" (Windows) or "Finder" (Mac). This program uses all the views to make selecting and tracking down certain files a much more painless and easier process to complete.

Explanation:

boom : )

Answer: Maybe C

Explanation:

Create a for-loop which simplifies the following code segment: penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25); penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25); penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25);

Answers

Answer:

for(var i=0; i<3; i++) {

  penUp();

  moveTo(100,120);

  turnTo(180);

  penDown();

  moveForward(25);

}

Explanation:

The i variable is the loop dummy. The code block will be executed 3 times.

How do information systems help organizations?

Answers

Answer:

Information systems assist in disseminating information by allowing managers and other organization leaders to store data in folders and documents that can be seamlessly shared with the appropriate employees.

Explanation:

HURRY IM TIMED the ability for search engines to return search results in relevancy ranking in an evolving capability true or false

Answers

Answer:

The answer is True

Explanation:

I took the quiz and got it right.

Which of the following statements best compares and contrasts the role of editors in a television news room and editors at a newspaper?

a.) Both television and print editors work to ensure the quality of production; however, television editors must have a background in film media.
b.) Both television and print editors must make sure content is accurate and appropriate; however, print editors must also consider the length of the content.
c.) Both television and print editors must make sure their sources are reliable; however, fewer people read print news, so fewer would know if a print editor makes a mistake.
d.) Both television and print editors work under tight deadlines, which cause a great deal of stress; however, print editors finish their work sooner than television editors.
Need this now please, thank you!!!!

Answers

Answer: It is A

Explanation:

why is it when you put earbud aux cords in a phone or computer they sound weird until you move the aux cord? Then it is somehow clear. Why?

Answers

Answer:

that might just be the headphone cord itself or it might be the port on the pc/phone

Explanation:

i had this happen with my old droid razr hd i thought it was the aux cord on my speaker and head phones but i used the same things on a friends phone and they worked just fine and this might be do to an old  or broken port on the phone /c my phone headphone port got used almost everyday and it was just the port you can replace this on some tech or you could just use bluetooth if the tech doesent have it buy and adapter.

            hope this helps!!!

what is media ethics. Explain two forms of maintaining media ethics with examples​

Answers

Media ethics is the best division of applied ethics dealing with the specific ethical principles and standards of media, including broadcast media, film, theatre, the arts, print media and the internet. The field covers many varied and highly controversial topics, ranging from war journalism to Benetton ad campaigns. In relation to news coverage it includes issues such as impartiality, objectivity, balance, bias, privacy, and the public interest. More generally, it also includes stereotyping, taste and decency, obscenity, freedom of speech, advertising practices such as product placement, and legal issues such as defamation.

Choose the term that describes each step of the cycle.

------- : gets next instruction

---------- : interprets instruction

----------- : carries out instruction

------------ : saves result of instruction

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to tell the best and suitable terms for the given descriptions in the question.

As we know that a computer program is based on sets of instructions. The CPU carries out the processing using the fetch decode and execute cycle.

It is responsible for implementing a sequence of instructions called a computer program that takes input, processes them, and outputs the result based on processing.

A CPU mainly has three components such as control unit, Arithmetic logic unit,  and register.

The control unit controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle such as Fetch, Decode, Executes, and Storage.

So the correct terms of this question are:

Fetch: Gets next instruction

Decode: interprets the instruction

Execute: Carries out instruction.

Store: Save results of instruction.

Answer:

A). Fetch : gets next instruction

B). Decode : interprets instruction

C). Execute : carries out instruction

D). Store : saves result of instruction

Explanation:

I just did the Test on EDGE2020 and it's 200% correct!  

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)  :)

Other Questions
someone please help... A company expects to sell 15,000 units in the first quarter, 18,000 units in the second quarter, and 20,000 units in the third quarter. The company desires to maintain an inventory at the end of each quarter equal to 10% of next quarter expected sales. How many units does the company plan to produce in the second quarter? Which of the following words best describe Primitive art?a. simple and directb. garish and boldc. disturbing and boisterousd. flowing and elegant HELP PLZ PLZ PZZZZZZZZZZZ In an old experiment, Jean Baptista van Helmont grew a plant in a potthat he filled with 200 pounds of soil. After several years, the plantgrew to weigh 169 pounds. The amount of soil in the pot did notchange; it still weighed 200 pounds. Based on your knowledge ofphotosynthesis, how did the plant gain most of its weight?A. The plant gained weight by absorbing nutrients from the soil.B. The plant gained weight by producing oxygen and storing it.C. The plant used carbon dioxide to make organic compounds likeglucose, which increased the plant's weight.D. The plant made carbon dioxide from organic compounds likeglucose, which increased the plant's weight. Can somebody plz answer this question in 3 sentences thanks!Why do we seek God?WILL MARK BRAINLIEST WITH BEST ANSWER TY!!! :D Pls help...Write a Nonfiction Narrative Write a narrative about the night of November 9, 1989, from the point of view of Harald Jger.Be sure to use narrative techniques such as dialogue, pacing, and description to develop events and characters and to put the reader in the moment.Include transitions to create cohesion throughout the narrative, and end with a conclusion reflecting on the experience.Source 1: Reagans Remarks on East-West Relations at the Brandenburg Gate in West Berlin, June 12, 1987(1) Behind me stands a wall that encircles the free sectors of this city, part of a vast system of barriers that divides the entire continent of Europe. From the Baltic, south, those barriers cut across Germany in a gash of barbed wire, concrete, dog runs, and guard towers. Farther south, there may be no visible, no obvious wall. But there remain armed guards and checkpoints all the samestill a restriction on the right to travel, still an instrument to impose upon ordinary men and women the will of a totalitarian state. Yet it is here in Berlin where the wall emerges most clearly; here, cutting across your city, where the news photo and the television screen have imprinted this brutal division of a continent upon the mind of the world. Standing before the Brandenburg Gate, every man is a German, separated from his fellow men. Every man is a Berliner, forced to look upon a scar.(2) And now the Soviets themselves may, in a limited way, be coming to understand the importance of freedom. We hear much from Moscow about a new policy of reform and openness. Some political prisoners have been released. Certain foreign news broadcasts are no longer being jammed. Some economic enterprises have been permitted to operate with greater freedom from state control. Are these the beginnings of profound changes in the Soviet state? Or are they token gestures, intended to raise false hopes in the West, or to strengthen the Soviet system without changing it? We welcome change and openness; for we believe that freedom and security go together, that the advance of human liberty can only strengthen the cause of world peace.Source 2: Harald JgerThe Man Who Opened the Berlin Wall(1) Harald Jger was on duty as the East German border guard officer in charge of the Bornholmer Strasse crossing of the Berlin Wall on November 9, 1989. A few hours earlier, in keeping with the pressure to liberalize that was mounting across eastern Europe, East Berlin politburo member Gnter Schabowski had announced that East Germans could travel to the West with correct travel documents. However, he ended his announcement with the words immediately and without delay.(2) These words caused great confusion and led to thousands of East Germans coming to checkpoints and asking if they could go to West Berlin. Mr. Jger tried several times to get clarification from his superiors, but no one was quite sure what was allowed. Eventually, he was told to start letting the noisiest East Berliners through but make their passports invalid. This only led to a noisier crowd.(3) As the crowd grew and grew, he feared a stampede. Even more, he feared a bloodbath, as all of the East German guards were heavily armed. Mr. Jger feared that they must do something or people would be hurt. Finally, at 11:30 p.m. on November 9, 1989, Mr. Jger gave the order, Open the barrier, and in so doing unwittingly entered history as the man who opened the Berlin Wall. Thousands and thousands of East Berliners streamed into West Berlin to freedom. The next day, Berliners began to physically tear the wall. were Serbs a nation before the year 1830 What invention do you believe has impacted the world?3 Arguments Thesis statement, please 16. Which is not a feature associated with valley glaciers?horncirquearroyoarte Where did Jim Crow laws exist A country has elections every other year to elect representatives. The people running for office all belong to the same political party. Would this type of government be considered more like a democracy or more like a dictatorship? A. It would be considered more like a dictatorship because elections are only held every other year. B. It would be considered more like a dictatorship because the choice of representatives is limited to one party. C. It would be considered more like a democracy because the people are given the opportunity to vote for their favorite candidate. D. It would be considered more like a democracy because political parties are allowed to exist. What is the formula for area of a parallelogram?Use x for multiplication and / for division is necessary. which action occurs in presidential governments but not in parliamentary governments? What is the ancient language(s) found on the large stone tablet in Rosetta Arrange the following in order of increasing atomic radius: Mg, Na, P, Si, and Ar. If Balenciaga advertised a sale that gave customers a discount, what is the new price of a pair of $1500 sunglasses? A landscape architect is designing a rectangular flowerbed to be border with 28 Plants that are placed 1 m apart. He needs an inner rectangular space in the center for plants that must be 1 m From the border of the bed and that require 24 square meter for planting. What should the overall dimensions of the flowerbed be? If sin t = -8/17 and t is a quadrant III angle, find cot t Most operating systems perform these tasks. coordinating the interaction between hardware and software allocating RAM to open programs creating and maintaining the FAT modifying word processing documents correcting spreadsheet formulas displaying the GUI