5. An entrepreneur who continues to find new and better ways of doing things is ____.

A. Confident
B. Innovative
C. Persistent
D. Wholesale​

Answers

Answer 1

Answer:

B innovative

Explanation:

new and better are synonymous with innovation


Related Questions

Which of the following Python methods is used to perform hypothesis testing for a population mean when the population standard deviation is unknown?

a. uttest(dataframe, null hypothesis value)
b. ztest(dataframe, null hypothesis value)
c. prop_1samp_hypothesistest(dataframe, n, alternative hypothesis value)
d. ttest_1samp(dataframe, null hypothesis value)

Answers

Answer:

B: ztest(dataframe, null hypothesis value)

The Python method that is used to perform a test of hypothesis for a population mean with an unknown population standard deviation is d. ttest_1samp(dataframe, null hypothesis value).

A t-test is normally applied when the population standard deviation is not known.  The researcher will use the sample standard deviation.

While the z-test can also be used in Python to perform hypothesis testing with a known population standard deviation and a sample size that is larger than 50, only the t-test can be applied with an unknown population standard deviation or a sample size less than 50.

Thus, the only Python method to carry out hypothesis testing with unknown population standard deviation is the t-test, which is given in option d.

Learn more about hypothesis testing at https://brainly.com/question/15980493

Discuss any five positive and five Negative impact
of ICT on society​

Answers

Answer:

The technology of information communication has the capacity to transform society. It plays a key part and provides the infrastructure needed to achieve each of the United Nations Sustainable Development Goals. It also allows financial integration by m-commerce and lets people connect instantly to millions.

ICT has a particularly important impact on business. It allows people to exchange knowledge and advice immediately and establish a website or online shop at a low cost, thus reducing the obstacles to starting a business dramatically. As such, it is a major factor in change and the maturity of ICTs is strongly connected to economic growth.

Explanation:

Effects of ICT

As a human beings, we are always associated in our everyday life with many essential things. The use of ICT equipment in our lifestyle has simplified many time-consuming calculations and difficult tasks, and social contacts have been strengthened. ICT has affected life by enhancing the timely distribution of media information and improved home and workplace communications via social networking, e-mail, etc.

The quality of human life has been greatly improved by ICT. For example, it could take a few days for a letter to come to the recipient, but a single minute for an e-mail to reach. ICT offers a broader understanding and information for each facility  24 Hrs X 7 days. In the following, ICT affects different fields of daily living.

Positive Impacts of ICT:

As domestic and home businesses.As social connectivity.As E-learning/ As educationAs for shopping/tradingAs for banksAs a job/jobs

Negative Impacts of ICT:

Face-to-face interaction reduced.Social Decoupling.Physical activity/health issues reduced.Cost.

An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.

Answers

An electronic [tex]\sf\purple{spreadsheet}[/tex] is an application you use to perform numeric calculations and to analyze and present numeric data.

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

An electronic spreadsheet is an application you use to perform numeric calculations and to analyze and present numeric data.

What is electronic spreadsheet?

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Microsoft Excel, Sheets, and Apple Numbers are a few examples of electronic spreadsheets.

Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.

You might also keep in mind that while exporting data into a spreadsheet, some data types might change.

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Thus, the answer is electronic spreadsheet.

For more details regarding spreadsheet, visit:

https://brainly.com/question/8284022

#SPJ6

Select all that apply to Enums: Group of answer choices While mainly a readability feature, we can technically use Enum to do things like spoof a boolean type in C allowing us some level of functionality Enums let us build a series of any kind of constant Enums allow us to print names for integers instead of numbers Enums are great for representing states and other common constants like colors Enums let us specifically value each constant we create Flag question: Question 59 Question 59

Answers

Answer:

-- While mainly a readability feature, we can technically use Enum to do things like spoof a Boolean type in C allowing us some level of functionality.

-- Enums are great for representing states and other common constants like colors.

-- Enums let us specifically value each constant we create.

Explanation:

Enums is a part of a programming language which helps a developer or a programmer to defined a set of the named constants. Using the enums will help in making it easier to document the intent and also to create set of distinct cases.

Option 1 is applicable as in the Boolean there are only TRUE and FALSE values. By using enum one can add more state like that of being difficult or normal or easy.

Option 4 is applicable because enums are used to represent various states and also other constants.

Option 5 is also applicable they allow the developer to create each value constant.

A pointer can be used as a function argument, giving the function access to the original argument.
A. True
B. False

Answers

Answer:

True

Explanation:

A pointer can be used as a function argument, giving the function access to the original argument.

my iphone s6 is plugged in but isnttttt charging and the chager works on my ipad waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Answers

Answer:

Could be a defect on the charge port for the Iphone s6. There are inexpensive way to fix that problem. Super cheap parts and kits to help online to buy.

How laggy is you're game cause I even lag in offline games this is just a random question. ​

Answers

Answer: its bad

Explanation:

Answer:

Lagging in offline games suggests there is something wrong with the computer, not the internet. There are various speed tests you can use to determine the speed of your internet! One being https://www.speedtest.net/ which is a more well known and trusted site. Depending on how old your computer is or if it is a laptop not build for games can influence your gameplay experience greatly.

you recieve a phone call from the sterlization monitoring company informing you that the last spore test you sent has failed. What should you check to determine the possible cause

Answers

Answer: The type sterilization that was used and how well it was performed

Explanation:

If there's a phone call from the sterilization monitoring company that the last spore test sent has failed, to determine the possible cause, I'll have to type sterilization that was used and how well it was performed.

The sterilization technique used will be analysed, and there'll also be a check for possible human errors. Once thus is done, the possible reason for the failure of the last spore that was sent can then be determined.

Write a python program that will accept monthly salary amounts greater than zero but less

than or equal to 400,000.00 until the user enters the character ‘e’. After the user

enters the character ‘e’, calculate the net pay of all salaries by deducting income tax at

a rate of 25%, pension of 5% and housing contribution of 2% from each salary

entered. Additionally, print the number of salaries that were entered in the program

along with the number of salaries that exceed 300,000.00

Answers

Answer:

b=0

c=0

lol=list()

while True:

   salary=input("Enter your salary: ")

   if salary=="e" or salary=="E":

       print("Thankyou!!")

       break

   else:

       a=int(salary)

       if a>=300000 and a<=400000:

            c=c+1

       if a<0 or a>400000:

           print("Your salary is either too small or too big ")

       if a>0 and a<=400000:

           a=a-(25/100*a)-(5/100*a)-(2/100*a)

           lol.append(a)

           b=b+1

           if a>=300000:

                c=c+1

print(lol)

print("The number of salaries entered is: "+ str(b))

print("The number of salaries that exceeded 300000 is: "+str(c))

Which ONE of the following role players provides technical backup, trouble shooting and
computer literacy training?
1. Parents
2. Teachers
3. ICT Coordinator
4. Subject specialist​

Answers

Answer:

C, ICT coordinator

Explanation:

 

ICT Coordinator provides technical backup, trouble shooting and computer literacy training.

ICT Coordinator

This individual seems to be in charge of such gear as well as applications, as well as broadband connections.

This same coordinator also assists overall ICT policy development in schools, such as the formation of an ICT management committee, responsibility division, as well as communication with stakeholders.

Thus the response above i.e., "option 3" is correct.

Find out more information about ICT Coordinator here:

https://brainly.com/question/25168859

4. All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent
through visual and auditory channels.
Communication includes both the verbal and nonverbal messages sent and received.
The goal of effective communication is mutual understanding.
You can improve your communication by improving your understanding of yourself, others,
and the context of the communication.
When you are listening to another person speak, you can avoid sending any messages by not
speaking and not making eye contact.

Answers

Answer:

D

Explanation:

Communication are happen when 2 people are response each other

It is not true that when you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact. The correct option is 4.

What is communication?

The process of communicating information, concepts, ideas, or sentiments between two or more people through a variety of means and channels, including verbal and nonverbal communication, is referred to as communication.

It is a myth that you may avoid transmitting any messages when you are listening to someone else speak by remaining silent and avoiding eye contact.

Your body language and nonverbal communication, such as your facial expressions and eye contact, can still convey information to the speaker even if you are not replying verbally or establishing eye contact.

Hence, even if a message is unintended or nonverbal, all types of communication entail sending and receiving messages.

Thus, the correct option is 4.

For more details regarding communication, visit:

https://brainly.com/question/22558440

#SPJ2

Your question seems incomplete, the probable complete question is:

All of the following statements are true EXCEPT one. Which

statement is NOT true?

Select the best option.

Communication occurs between senders and receivers within a context by messages sent through visual and auditory channels.Communication includes both the verbal and nonverbal messages sent and received. The goal of effective communication is mutual understanding.You can improve your communication by improving your understanding of yourself, others, and the context of the communication.When you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact.

Compare and contrast the older multiplexing techniques such as frequency division and time division multiplexing with the newer techniques such as discrete multitone and orthogonal frequency division multiplexing. What appears to be the trend in these newer protocols?

Answers

Answer:

As compared to new multiplexing techniques, older techniques like FDM frequency-division multiplexing (FDM) may be a technique by which the entire bandwidth available during a communication medium is split into a series of non-overlapping frequency sub-bands, each of which is employed to hold a separate signal.

Explanation:

Especially used for Radio and tv Broadcasting and TDM ( Time-division multiplexing (TDM) may be a method of transmitting and receiving independent signals over a standard signal path by means of synchronized switches at each end of the cable in order that each signal appears on the road only a fraction of your time in an alternating pattern, especially used for telegraphy) are simple; they'll be suffering from noise and their transmission speeds are high. New techniques are far more complex, they will be suffering from more noise and transmission speeds are very high as compared to older techniques.

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
email address
web address
UNC path
O All will be automatically converted,

Answers

Answer:

d. All will be automatically converted.

Explanation:

A hyperlink is a link created in one document and that leads to another document mostly by clicking on that link. In Microsoft Outlook, some text formats are automatically converted to hyperlinks which are shown by first underlining the text and then changing the text color to blue. Some of the text formats that are turned to hyperlinks are:

i. email addresses

ii. web addresses

iii. UNC path: This is a path specifying the location of a particular document or resource on a computer or server. It has the following format:

\\name--of--server\resource-path-name

Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0 Volume for 4.5, 2.1, 3.0 is: 9.45 Relevant geometry equations: Volume

Answers

Answer:

Explanation:

The following is written in Java. It takes in the three values as parameters and then uses the formula for calculating the volume of a pyramid. Finally, returning the volume to the user. A test case has been provided in the main function and the output can be seen in the attached picture below.

class Brainly {

   public static void main(String[] args) {

       double output = calc_pyramid_volume(4.5, 2.1, 3.0);

       System.out.println(output);

   }

   public static double calc_pyramid_volume(double base_length, double base_width, double pyramid_height) {

       double volume = (base_length * base_width * pyramid_height) / 3;

       return volume;

   }

}

A group of computer scientists wants to create a fixed-length compression algorithm. The simplest way to achieve compression is to use a fixed-length code generator. The idea behind this type of code generator is to assign a fixed-length bit sequence to each symbol of the alphabet. As part of this group of computer scientists, your goal is to write a program to determine the alphabet used by the message to be compressed (set of different characters in the input message), and the frequency of each symbol in the alphabet, using conditionals, loops, and arrays.

Answers

Answer:

Here the code is given as follows,

Explanation:

OUTPUT:  

Message: AAAABBBCCDDDDDDDE  

Number of symbols in the alphabet = 5  

Characters in the alphabet = A,B,C,D,E  

Number of bits per symbol = 3  

Histogram showing the frequency of the symbols in the alphabet  

A | ****  

B | ***  

C | **  

D | *******  

E | *

Write a public static method named print Array, that takes two arguments. The first argument is an Array of int and the second argument is a String. The method should print out a list of the values in the array, each separated by the value of the second argument.
For example, given the following Array declaration and instantiation:
int[] myArray = {1, 22, 333, 400, 5005, 9}; printArray(myArray, ", ") will print out 1, 22, 333, 400, 5005, 9
printArray(myArray, " - ") will print out 1 - 22 - 333 - 400 - 5005 - 9

Answers

Answer:

Here is the output.

Explanation:

import java.util.Arrays;  

public class Main{  

   public static void main(String[] args){        

       int[] array={43,42,23,42,4,56,36,7,8,676,54};

       System.out.println(Arrays.toString(array));

       printArray(array,"*");

       System.out.println(""+getFirst(array));

       System.out.println(""+getLast(array));

       System.out.println(Arrays.toString(getAllButFirst(array)));

       System.out.println(""+getIndexOfMin(array));

       System.out.println(""+getIndexOfMax(array));

       System.out.println(Arrays.toString(swapByIndex(array, 1,2)));

       System.out.println(Arrays.toString(removeAtIndex(array,3)));

       System.out.println(Arrays.toString(insertAtIndex(array,3,65)));

   }  

   //---1----

   public static void printArray(int[] arr, String sep){  

       for(int i=0; i<arr.length-1;i++){  

           System.out.print(" "+arr[i]+" "+sep);  

       }  

       System.out.println(" "+arr[arr.length-1]);  

   }  

   //---2----  

   public static int getFirst(int[] arr){  

       return arr[0];  

   }

   //---3----  

   public static int getLast(int[] arr){  

       return arr[arr.length-1];  

   }  

   //---4-----  

   public static int[] getAllButFirst(int[] arr){  

       int[] anotherArray=new int[arr.length-1];  

       for(int i=1; i<arr.length;i++){  

           anotherArray[i-1]=arr[i];  

       }

       return anotherArray;

   }

//---5------  

   public static int getIndexOfMin(int[] arr){  

       int index=0;  

       int min=arr[0];  

       for(int i=1; i<arr.length;i++){  

           if(min>arr[i]){  

               min=arr[i];  

               index=i;  

           }  

       }

       return index;  

   }  

   //---6------  

   public static int getIndexOfMax(int[] arr){  

       int index=0;  

       int max=arr[0];  

       for(int i=1; i<arr.length;i++){  

           if(max<arr[i]){  

               max=arr[i];  

               index=i;  

           }  

       }  

       return index;  

   }  

   //---7------  

   public static int[] swapByIndex(int[] arr, int a , int b){  

       int temp=arr[a];  

       arr[a]=arr[b];  

       arr[b]=temp;  

       return arr;  

   }  

   //---8------  

   public static int[] removeAtIndex(int[] arr, int index){  

       int[] anotherArray = new int[arr.length - 1];  

for (int i = 0, k = 0; i < arr.length; i++) {  

if (i == index) {  

continue;  

}  

anotherArray[k++] = arr[i];  

}  

// return the resultant array  

return anotherArray;  

   }  

//---9------  

   public static int[] insertAtIndex(int[] arr, int index, int element){  

       int[] anotherArray = new int[arr.length + 1];  

for (int i = 0, k=0;k < arr.length+1; k++) {  

if (k == index) {  

anotherArray[k]=element;  

               continue;  

}  

anotherArray[k] = arr[i++];  

}  

// return the resultant array  

return anotherArray;  

   }  

//---10------  

   public static boolean isSorted(int[] arr){  

       for(int i=0; i<arr.length-1;i++){  

           if (arr[i+1]<arr[i]){  

               return false;  

           }  

       }  

       return true;  

   }  

}

five technology tools and their uses​

Answers

Answer:

Electronic boards

Videoconferencing ability

Search engines

Cloud services

Computing softwares

Explanation:

Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :

The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.

Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.

Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.

Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.

Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.

Jill is configuring the AutoArchive feature in Outlook 2016. What is the default setting in relation to when AutoArchive
will run?
o 7 days
0 14 days
30 days
O Never

Answers

Answer:

(b) 14 days

Explanation:

In the presence of thousands of mails each day or week, controlling what items to keep in an archive for cleaning up purposes becomes important. To do this, Outlook comes with an option called AutoArchive. The default setting in relation to when AutoArchive will run is 14 days. To change this setting, user will need to do the following:

i. Navigate to File  > Options > Advanced

ii. Under the AutoArchive menu, click on the AutoArchive settings

iii. Change the settings however way they want.

Answer:

That's correct it's 14 days

Explanation:

:) hope it helps

Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
coworker for immediate handling. What should she do?
O Configure a response for external senders.
O Configure a response for internal senders.
O Only send during a specific time range.
O Configure an Automatic Reply Rule.

Answers

Answer:

Configure an Automatic Reply Rule

Explanation:

The Rule feature in Outlook enables a user to respond immediately to a message, to move a message, or to flag a a message.

The Automatic Replies (Out-of-Office) feature can also be used to let colleagues inside the organization know when a user is out of office and the arrangements that they have made

Also, Using the Out-of-Office dialogue box, under the Files tab, Automatic Replies can be configured using the Rules button to add a rule that forwards all messages from the particular client to the email address of a coworker for them to take care of immediate, while sending an automatic reply to the sender about being out of office and that the mail has been forwarded to a coworker to handle

Therefore, Kylee can configure an Automatic Reply Rule

How does a junction table handle a many-to-many relationship?

by converting the relationship to a one-to-one relationship
by moving the data from the source table into the destination table
by directly linking the primary keys of two tables in a single relationship
by breaking the relationship into two separate one-to-many relationships

Answer: 4
by breaking the relationship into two separate one-to-many relationships

Answers

Answer:

two" (and any subsequent words) was ignored because we limit queries to 32 words.

Explanation:

please mark as brainliest

Answer:

By breaking the relationship into two separate one-to-many relationships

Explanation:

I just did it / edge 2021

Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "non-negative" otherwise. Ex: If userVal is -9, output is:
-9 is negative. PLEASE USE C++

Answers

Answer:

PROGRAMMING APPROACH:

Define the necessary header file using namespace.Define the main() method.Declare variable inside the function().Print result.

Explanation:

Required C++ Code:

#include<iostream>

#include<string>

using namespace std;

int main()

{

  string condStr;

  int userVal;

  cin>>userVal;

  condStr=(userVal<0)?("negative"):("non-negative");

  cout<<userVal<< " is "<< condStr <<"."<<endl;

}

OUTPUT:

-2

-2 is negative.

explain any two factors to consider when classifying computer systems​

Answers

Answer:

The following classifications can be made of the computer systems:

1. According to size.

2. Functionality based on this.

3. Data management based. 

Explanation:

Servers:-

Servers are only computers that are configured to offer clients certain services. Depending on the service they offer, they are named. For example security server, server database.

Workstation:-

These are the computers which have been designed mainly for single users. They operate multi-user systems. They are the ones we use for our daily business/personal work.

Information appliances:-

They are portable devices that perform a limited number of tasks such as basic computations, multimedia playback, internet navigation, etc. They are commonly known as mobile devices. It has very limited storage and flexibility and is usually "as-is" based.

What is food technology​

Answers

Answer:

is the application of food science to the selection, preservation, processing, packaging, distribution, and use of safe food. Related fields include analytical chemistry, biotechnology, engineering, nutrition, quality control, and food safety management.

Explanation:

A) Why should assembly language be avoided for general application development?
B) Under what circumstances would you argue in favor of using assembly language for developing an assembly language program?
C) What are the advantages of using a compiled language over an interpreted one?
D) Under what circumstances would you choose to use an interpreted language?

Answers

Answer:

(A) Assembly language should be avoided for general application development for the following reasons:

i. It is difficult to write assembly language codes. It does not contain many tools and in-built functions to help with the development of these applications.

ii. Since general application development requires that the application be machine independent, writing such applications in assembly language (which is a low level, machine dependent language) might be a pain as it would require that the writer have sufficient knowledge of hardware and operating systems.

(B) The following are the circumstances where assembly language should be used:

i. Assembly languages are low level languages that are very close to machine languages that the machine or processor understands. Therefore, when writing codes for programs that should directly communicate with the processor, assembly language should be used.

ii. Since assembly language codes are machine dependent, when there is a need to write applications for target machines, they should be used.

iii. If there is a need to have very great control of certain features of your application and resources to be consumed such as amount of RAM, clock speed e.t.c, assembly languages are a great tool.

(C) Some of the advantages of compiled language over an interpreted language are:

i. Compiled languages are way faster than interpreted languages because the compiled languages are converted directly into native machine codes that are easy for the processor to execute. Put in a better way, with compiled languages, codes are compiled altogether before execution and therefore reduces the overhead caused at run time. Interpreted languages on the other hand executes codes line after line thereby increasing the overhead at run time.

ii. Since codes are compiled first before execution in compiled languages, nice and powerful optimizations can be applied during the compilation stage.

(D) Interpreted languages could be chosen over compiled languages for the following reasons:

i. Interpreted languages are much more flexible and easier to implement than compiled languages as writing good compilers is not easy.

ii. Since interpreters don't need to convert first to intermediary codes as they execute these codes themselves, programs built with interpreters tend to be platform independent.

Anyone wanna play league of legends, i play top and mid

Answers

Answer:

u get work

Explanation:

Modify a list Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph' ["Sam', 'Ann', 'Joe'l 1 user_input = input() 2 short names = user input.split() 3 short_names - short_names.pop(0) 6 print (short_names) based

Answers

Answer:

The modified program is as follows:

user_input = input()

short_names = list(user_input.split(" "))

short_names.pop(0)

short_names[-1] = "Joe"

print(short_names)

Explanation:

This gets the user input

user_input = input()

This converts input to list

short_names = list(user_input.split(" "))

This removes the first item of the list

short_names.pop(0)

This updates the last item to "Joe"

short_names[-1] = "Joe"

This prints the updated list

print(short_names)

I NEED HELP I'LL GIVE BRAINLEST

Direction can be applied to animations but not transitions.


True

False

Answers

Answer: True

Explanation: direction can be applied only to animations. direction can be applied only to transitions. direction can be applied to both animations and transitions.

Answer:

I think it's true but I'm not 100% sure.

Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.

Answers

Answer:

128 KB      

Explanation:

Given data :

The block size = 512 bytes

Block pointer size = 2 bytes

In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.

Therefore, the maximum number of block pointer in 1 block :

[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]

[tex]$=\frac{512}{2}$[/tex]

= 256

Thus, a block can hold maximum 256 pointers.

It is given the level of indexing is one. So,

Maximum size of the file =  maximum number of block pointers in 1 file x block size

                                          = 256 x 512

                                          [tex]$=2^8 \times 2^9$[/tex]

                                          [tex]$=2^{8+9}$[/tex]

                                           [tex]$=2^{17}$[/tex]

                                          [tex]$=2^7 \times 2^{10}$[/tex]

                                          [tex]$=128 \times 2^{10}$[/tex]

                                          = 128 KB   (∵ 1 KB = [tex]2^{10} \ B[/tex] )

Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.

१८. तलका शीर्षकमा १५० शब्दसम्मको निबन्ध लेख्नुहोस् :
(क) सुशासन र विकास

Answers

Answer:

n

Explanation:

Answer:

kkkkkkkkikkkkkkkkkkkiikkiiii

Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?
A. DMA.
B. BIOS.
C. CPU.
D. IPsec.
E. I/O.

Answers

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

Other Questions
A skier of weight 700 N is pointed down a ski hill that has a slope angle of 25 above horizontal.What is the component of his weight pulling him down the slope.O 634NO 326NO 296NO 700N Explain the effects of disposing electronic equipments to the environment Just before take-off, the plane is speeding up along the ground.Which statement is true?Force B is zero.Force B is greater than force D.Force D is equal to force B Find the volume of the prism.2 m The ________ is the internal hereditary code that tells which _________ will be expressed. Find f(2) if f(x) = 2x + 1. Following a study using deception, how does the researcher attempt to restore an honest relationship with the participant?a. by apologizing to the participant and offering monetaryb. compensation for any discomfort or stressc. by debriefing each participant in a structured conversationd. by reassuring the participant that all names and identifiers will be removed from the datae. by giving each participant a copy of the Belmont report A population of insects can be modeled by the equation y = 12,000 + 8000 sin(). What is the greatest number of insects you will find? URGENT PLS!!consider the system: 5x+3y = 12 , x-7y=10 using elimination method, what is the value of 38y? A kingfisher bird that is perched on a branch a few feet above the water is viewed by a scuba diver submerged beneath the surface of the water directly below the bird. Does the bird appear to the diver to be closer to or farther from the surface than the actual bird Find the value of x. please can anyone help me out!! What is a way to prevent eutrophication? Helppppppp me please Why was Cambdia dragged into the Vietnam war? How do the Yangzi and Yellow River Valleys play into the development of Chinese civilization? a. They serve as the places where civilizations were able to grow the strongest. b. They serve as the origin of where ancient people learned to grow and harvest rice. c. They are considered the most learned areas of all of Chinese civilization. d. They are the only places in China that allow for ancient people to practice agriculture. e. They can be considered the core regions in the development of civilization. The graphs of f(x) and g(x) are shown below.o o00f(x)425212-2 -1-23-4g(x)-6-8-12-147What are the solutions to the equation f(x) = g(x)? what is the order of the elements of plots? what is the equation that matches this table? can somone pls help me