Answer:
A and C
Explanation:
yes its correct I know what I'm doing
Who invented Napier's Bones and when? Write its functions. field of comm
Explanation:
Napier's Bone was invented by Scottish mathematician John Napier in 1617 AD.... It's function is that it was very useful for finding multiplication at that time...
Type the correct answer in the box. Spell all words correctly.
What text results in variable whitespace?
[blank] text results in variable whitespace
The option that explains the term above is that Fully justified text results in variable whitespace.
What is meant by whitespace?The Definition of the term white space is known to be the areas or parts of a page that do not have print or pictures.
Therefore, we can say that The option that explains the term above is that Fully justified text results in variable whitespace.
Learn more about whitespace from
https://brainly.com/question/11902037
#SPJ1
The __________ River is Europe’s longest river.
Answer:
The Volga river is Europes longest river.HOPE IT HELPSAnswer:
The volga river in the eastern part of europe
Work related information posted to social networking sites or discussed in public may create ___________ that can be exploited by the unauthorized recipient.
Answer:
Work related information posted to social networking sites or discussed in public may create Vulnerabilities that can be exploited by the unauthorized recipient .
Work-related information posted to social networking sites or discussed in public may create a vulnerability that can be exploited by the unauthorized recipient.
What are social networking sites?Individuals have the chance to make acquaintances and develop relationships thanks to social networking. Families who live far apart from one another have used it as a vital tool to connect and stay in touch.
Users of professional networking sites can search for employment using their connections to identify ones that match their skills. One's profile can be viewed by other users and potential employers, who can also provide recommendations.
Therefore, Social networking site posts or public conversations involving work-related topics may expose a vulnerability that an unauthorized recipient may use against you.
To learn more about social networking sites, refer to the link:
https://brainly.com/question/2083119
#SPJ2
One of your team members works long hours and behaves very formally, especially when the manager is around. this
team member is likely to be from . select 2 options.
-the united states
-norway
-sweden
- china
-japan
Based on the given scenario, team member is likely to be from:
ChinaJapanWhat is a formal behavior?A Formal speech or behavior is known to be a very serious one instead of one been relaxed or friendly.
Note that this is often used in official situations and Based on the given scenario, team member is likely to be from China and Japan because their way of life and relating to business conduct is always straight to the point, serious and no jokes.
Learn more about formal behavior from
https://brainly.com/question/8838403
#SPJ2
What is the best approach when time is a constraint in a project?
Answer:
Time: The schedule for the project to reach completion Basically, the Triple Constraint states that the success of the project is impacted by its costs, time, and scope. As a project manager, you can keep control of the triple constraint by balancing these three constraints through trade-offs.
Explanation:
which item is developed last in the cyclical process?
Answer:
Design Process
Explanation:
The multistep process by which designers and engineers design, build, and taste a new product is called the Design Process. There are multiple steps, including exploring, designing, planning, making, testing, and revising.
Answer:
Explanation:
Because of the issues that have been sketched above, a number of other methods of project management have emerged in recent years. These methods are particularly suited for IT-development projects. Examples of these relatively new streams within project management include DSDM, RUP, eXtreme Programming (XP), RAD and agile project management (McConnell, 1996; Kroll, 2004; Chromatic, 2003; Stapleton, 2002, [ii], [iii])
Although the above-mentioned methods of project management differ according to a number of aspects, they are essentially the same. Because the path toward the final goal of IT projects has proved so uncertain, these methods assume that the goal will be achieved in a number of short cycles. This is the background for the term cyclical project management for these methods
Which type of computer is used microprocessor
The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a
The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.
What is TCP/IP protocol suite?The TCP/IP protocol suite is known as the Internet Protocol Suite (IPS), this is because it is said to receives from the layer above in form of data, and places its own header in front of it.
Therefore, The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.
Learn more about Internet Protocol from
https://brainly.com/question/17820678
#SPJ4
What is the acronym of COMPUTER
Answer:
See ExplanationExplanation:
Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. So, in simple words you can say that computer is an electronic device which is used for fast calculation.
A two-dimensional array arr is to be created with the following contents. Boolean[][] arr = {{false, true, false}, {false, false, true}};
The code segment that can be used to correctly create and initialize arr is:
boolean arr[][] = new boolean[2][3];arr[0][1] = true;arr[1][2] = true;What is two-dimensional array?A two-dimensional array is known to be very similar to one-dimensional array.
It is one that can be visualized as a grid or table that is made up of rows and columns.
Note that in the above statement, The code segment that can be used to correctly create and initialize arr is:
boolean arr[][] = new boolean[2][3];arr[0][1] = true;arr[1][2] = true; is correct.See full question below
A two-dimensional array arr is to be created with the following contents. Boolean[][] arr = {{false, true, false}, {false, false, true}};
Which of the following code segments can be used to correctly create and initialize arr ?
boolean arr[][] = new boolean[2][3];
arr[0][1] = true;
arr[1][2] = true;
Learn more about two-dimensional array from
https://brainly.com/question/26104158
#SPJ1
The code section that may be used to successfully create and initialize arr is:boolean arr[][] = new boolean[2][3]; arr [0][1] = true . arr[ 1][2]=true;
What is a two-dimensional array?A two-dimensional array is understood to be very much like a one-dimensional array. It is one that may be visualized as a grid or desk this is made of rows and columns.
Note that withinside the above statement, The code section that may be used to successfully create and initialize array is:
boolean arr[][] = new boolean[2][3];arr[O][1] = true Irr[1][2] = truueRead more about the array :
https://brainly.com/question/24275089
#SPJ4
What does playstation network is currently undergoing maintenance?.
Answer:
it means it's being fixed and you need to wait till its done
Explanation:
Hope this helps
which is a key component to participating in a school-to-work program?
The key component to participating in a school-to-work program is known as Job shadows.
What are job shadows?Job shadowing is known to be a kind of on-the-job training that gives room for an interested employee to follow closely an see or analyze another employee carrying out the work.
Therefore, one can say that the key component to participating in a school-to-work program is known as Job shadows.
Learn more about School from
https://brainly.com/question/2474525
#SPJ1
Pedro has written a program in a high-level language to do some calculations for a friend. His friend needs to use the program immediately on his laptop. Pedro does not know what software is available on the laptop. Also, his friend's internet connection is very slow. Explain which type of translator Pedro should use for his program. Give reasons why this is the best choice in this case.
In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.
Why do you need to translate a program written in a high-level language into machine language?Programming languages are known to be easy for humans to read and understand.
Note that The program (source code) need to be translated into machine language so that the computer can be able to carryout the program.
Therefore, In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.
Learn more about machine language from
https://brainly.com/question/23275071
#SPJ1
A user in a small office environment explains to you that his office implements a small Microsoft workgroup. Users commonly share folders with each other. Which access control model is represented in this example
65 DAC is the access control model is represented in the example where a user explains to you that his office implements a small Microsoft workgroup.
What is DAC?DAC is a Microsoft dynamic access control is a tool for governing data in Windows server 2012. It helps in administering the access control settings of the device.
Thus, 65 DAC is the model that is used to represent the example in which a user explains to you that his office implements a small Microsoft workgroup.
Learn more about DAC
https://brainly.com/question/20216206
#SPJ1
What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service
Answer:
code injection
Explanation:
Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.
Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)
Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)
Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests
The direction of a ratchet is reversed by _______________________.
Answer:
You can reverse the direction of a ratchet by hitting with an equal or higher amount of force it came at you with.
Explanation:
4. fill in the empty function so that it returns the sum of all the divisors of a number, without includi
a number that divides into another without a remainder.
def sum_divisors (n):
sum = 0
# return the sum of all divisors of n, not including
return sum
print (sum_divisors (0))
# 0
8
print (sum_divisors (3)) # should sum of 1
# 1
i
10
print (sum_divisors (36)) # should sum of 1+2+3+4+6+9+12+18
11
# 55
12
print (sum_divisors (102)) # should be sum of 2+3+6+17+34+51
# 114
13
14
12345678
Using the python language we have that it will be possible to write a code that sums all possible divisors of a number.
Writing the code we have;def sum_ divisors(n):
s = 0
for i in range(1, n):
if n%i == 0:
s += i
return i
See more about python at brainly.com/question/18502436
#SPJ1
By default, what appears on your screen whenever a new email arrives?.
By default, the appears on your screen whenever a new email arrives is a Desktop Alert.
What is a Desktop Alert?This is known to be a kind of a notification that often shows on your desktop when a person is said to receive a new email message, a meeting request, or others.
Note that the Desktop Alerts need to be turned on by default and as such, By default, the appears on your screen whenever a new email arrives is a Desktop Alert.
Learn more about Desktop from
https://brainly.com/question/7221406
#SPJ1
C provides a data structure, the ___________, which stores a fixed-size sequential collection of elements of the same type.
Answer:
Array
Explanation:
The array is a data structure in C that can hold a predefined quantity of the same type of element in an ordered fashion, and can be defined with the following syntax: type name[amount] = {elements}; where type is the type (like int), amount is the capacity it should be defined at, name is what you want to name the array, and elements are a comma separated list of elements to initialize the array with. You can also change the values of elements by using this syntax: name[index] = newelement; where index is which index to change, and new element is what to set it to.
PLEASE HELP!
Before you answer:
-No spam (Will be reported)
-No incorrect answers (Will be reported)
-Correct answers and explanations will be mark as BRAINLIEST
Answer:
A. True or false
1.True
2.false
3.false
4.true
5.true
1) False. Java script is easy to learn and use.
2) True. The actions performed on the objects is called Methods.
3) True. There can be multiple scripts in a single documentation.
4) False. It's the complete opposite. Single Line comments starts with double dash (//)
5) True. Java Script uses interactive elements to make the HTML pages more interactive for the users.
The hard disk that is mounted inside the system unit sometimes is called a(n) ____________________ disk because it is not portable.
Answer:
Permadisk
Explanation:
Low-level formatting ____. Group of answer choices is different from physical formatting is usually performed by the purchaser of the disk device divides a disk into sections that the disk controller can read and write does not usually provide an error-correcting code
Low-Level formatting is usually performed by the purchaser of the disk.
What is low-level formatting?Low-Level formatting can be defined as is performed at the factory which electronically creates the hard drive tracks and sectors and tests for bad spots on a disk surface.
Low-level formatting is usually performed by the purchaser of the disk device.
Therefore, B is the correct option.
Learn more about Low-level formatting here:
https://brainly.com/question/13797778
#SPJ1
Complete the sentence.
_____storage is not recommended for long-term archiving because the storage media can degrade over time.
Optical
P/E
Hard drive
RAID
The Hard drive storage is not recommended for long-term archiving because the storage media can degrade over time.
What is Long-term archiving?Long-term archiving is known to be the act of getting data, that are long-term in terms of accessibility and intelligibility.
Therefore, The Hard drive storage is not recommended for long-term archiving because the storage media can degrade over time.
Learn more about Storage from
https://brainly.com/question/24227720
#SPJ1
Which managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite your Spark code
The managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite your Spark code is f G. Cloud's.
What is Lift and shift Hadoop clusters?This is one where a person can migrate their existing Hadoop and Spark deployment so that they can use G. Cloud without having to engage in re-architecting.
The managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite your Spark code is f G. Cloud's as it is advantage fast and flexible way to put together infrastructure as a service and others.
Learn more about managed service from
https://brainly.com/question/20495853
#SPJ1
Match the Job description with the job titles.
Which option is the hexadecimal code for 100% green?
O A. (0, 255, 0)
OB. #00FF00
OC. (255, 0, 255)
OD. #FFFF00
The option is the hexadecimal code for 100% green is #00FF00. Check more about the code below.
What is the hexadecimal code for 100% green?The green hex code is known to be #00FF00.
Note that the hexadecimal number system can also be called base-16 or simply as hex as it is a number system that employs the use of 16 unique symbols to depicts a specific value.
Learn more about hexadecimal code from
https://brainly.com/question/11293449
#SPJ1
You are running a Python script that is supposed to write data to an open file, but discover that the file contents are not updating even after the script finishes. What is most likely the issue
Based on the Python script the most likely the issue is that The file was not closed using the close() method.
What is the close() method?The close() method is known to be a kind of Reader Class that is seen in Java.
Note that it is one that is used to enclose any stream and bring out the resources that are said to be busy in the stream.
Therefore, Based on the Python script the most likely the issue is that The file was not closed using the close() method.
Learn more about Python script from
https://brainly.com/question/26497128
#SPJ2
As the user moves out of the range of one access point, their wireless device must re-associate with a new access point as it comes within range. What is this process known as
_____________is a computing environment in which a service provider organization owns and manages the hardware, software, networking, and storage devices, with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. Group of answer choices Cloud computing consumerization of IT Software Service Internet of Things
Answer:
Cloud Computing
Explanation:
Cloud computing is a term that refers to a platform and a sort of service. Servers are constantly provisioned, configured, reconfigured, and deprovisioned as needed by a cloud computing system. Physical or virtual computers can be used as cloud servers. Other computer resources, such as storage area networks (SANs), network equipment, firewalls, and other security equipment, are generally included in advanced clouds. Cloud computing also refers to apps that have been enhanced so that they may be accessed through the Internet. Large data centers and powerful servers are used to host Web applications and Web services in these cloud applications. A cloud application can be accessed by anybody with a good Internet connection and a basic browser.