Answer:
d. availability
Explanation:
Availability can be defined as the quality of a thing, system, business, service or person to be available at all times (24 hours a day) to the group of people that uses it.
This ultimately implies that, availability is a state of being consistently accessible to the end users on daily basis without any downtime or failure.
Hence, a network designed for availability is one that delivers consistent reliable performance 24 hours a day to the end users.
what is a dropcap as used in a computer word document
DROP CAP:-
Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.
Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.A drop cap (dropped capital) is a large capital letter used as a decorative element at the beginning of a paragraph or section. The size of a drop cap is usually two or more lines. The following illustration shows your options for positioning a drop cap.
100POINTS!!!!!!!!!!!!!!!!!!!I WILL ANSWER ALL OF YOUR QUESTIONS PLEASE LOVES:)))Upload your completed project including the following:
An outline with the following items:
information about plants and animals that have become extinct or endangered because of a loss of habitat
information about habitats that have changed radically over the last few decades
ways students can lead a "greener" lifestyle
Recycle. There are many things you use each day that can be recycled. Some of these include paper, plastics, glass, and aluminum cans.
Conserve water. Take shorter showers. Turn off the water when brushing your teeth. This will reduce the amount of water that you use.
Don't pollute. Hold on to that helium balloon. Balloons that are released into the air can kill wildlife. Animals swallow the balloons, causing them to suffocate or starve.
Use energy wisely. Replace your incandescent light bulbs with fluorescent bulbs. They are more efficient than regular light bulbs. Turn off the lights, computers, and music when you're not using them.
Reduce consumption. Use both sides of the paper when taking notes in class. If your printer has a feature that lets you print on both sides of a sheet of paper, use it.
Presentation slides with text, graphics, and special effects such as animation and transitions
Support materials
Presentation delivery
Answer:
Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.Explanation:
do you humans know what math is?
Some do some dont Albert einstein has the biggest brain :))
Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.
Ex: If the input is:
5 2 4 6 8 10
the output is:
all even
Ex: If the input is:
5 1 3 5 7 9
the output is:
all odd
Ex: If the input is:
5 1 2 3 4 5
the output is:
not even or odd
Your program must define and call the following two functions. IsArrayEven returns true if all integers in the array are even and false otherwise. IsArrayOdd returns true if all integers in the array are odd and false otherwise.
bool IsArrayEven(int inputVals[], int numVals)
bool IsArrayOdd(int inputVals[], int numVals)
#include
#include
/* Define your function here */
int main(void) {
/* Type your code here. Remember to include the bool library*/
return 0;
}
Explanation:
Not sure what level that's at, or how you're expected to manage memory, so I'll write it in a "safe" manner and you can adjust accordingly.
Notably, I'm allocating memory dynamically at the moment. If you're not used to that, you might want to change that. Also, the c compiler I'm using (gcc) doesn't handle the bool type, so I used int. You may need to change that.
Also, if you change it to use fixed arrays instead of malloc, realloc and free, then you don't need to include stdlib.h.
The code below builds successfully with gcc, so if you have any issues, it will be in translating to another compiler/language.
Answer:
#include <stdio.h>
#include <stdlib.h>
int isArrayOdd(int *inputVals, int numVals){
int n, rval = 1;
for(n = 0; n < numVals && rval; n++){
rval &= inputVals[n] & 1;
}
return rval;
}
int isArrayEven(int *inputVals, int numVals){
int n, rval = 1;
for(n = 0; n < numVals && rval; n++){
rval &= 1 - (inputVals[n] & 1);
}
return rval;
}
int main(void) {
/*
I'm writing this to allow any quantity of numbers,
using malloc to allocate the memory for them dynamically.
You may want to modify this to match the level that your
class is in.
*/
int *numbers, quantity = 0, input;
numbers = (int *) malloc(sizeof(int));
printf("Please enter a number, or hit \"q\" to quit: ");
while(scanf("%i", &input) == 1){
quantity++;
numbers = (int *) realloc(numbers, quantity * sizeof(int));
numbers[quantity - 1] = input;
printf("\nyou entered %i\n", numbers[quantity - 1]);
}
if(isArrayOdd(numbers, quantity)){
printf("all odd\n");
}else if(isArrayEven(numbers, quantity)){
printf("all even\n");
}else{
printf("not even or odd\n");
}
free(numbers);
return 0;
}
=================================================================
BONUS! BONUS! BONUS! BONUS! BONUS! BONUS! BONUS!
=================================================================
The inefficiency of the logic dictated in the assignment drove me nuts, so here's one that's ridiculously simpler and does exactly the same job:
#include <stdio.h>
int main(void) {
int input, oddEven = -1;
printf("Please enter a number, or hit \"q\" to quit: ");
while(scanf("%i", &input) == 1){
printf("\nyou entered %i\n", input);
if(oddEven == -1){
oddEven = input & 1;
}else if(oddEven != (input & 1)){
oddEven = 2;
}
}
switch(oddEven){
case 0:
printf("The numbers are all even\n");
break;
case 1:
printf("The numbers are all odd\n");
break;
case 2:
printf("The numbers are both odd and even\n");
break;
default:
// should never happen
printf("Something odd happened.");
}
return 0;
}
An algorithm can have an output and an outcome
A) True
B) False
vector graphics are composed of solid __________,curves and other __________ shapes
Answer:
Lines; geometric.
Explanation:
Graphic design can be defined as an artistic process used for the creation of art works such as logos.
In the creation of various graphic files such as in 2-D or 3-D we can use a variety of software applications or programs such as Blender basics, Adobe photoshop, illustrator, Coreldraw, etc.
Graphic design involves the use of vector graphics, bitmap graphics or raster graphics.
Vector graphics are composed of solid lines, curves and other geometric shapes that are typically defined by series of mathematical instructions. Thus, vector graphics can be scaled to a smaller or larger size without any change in its quality.
set screw compression and indenter are all types of
a. compression couplings.
b. threaded connectors.
C. rain-tight fittings.
D. threadless connecters and couplings.
nAnswer:
A.
Explanation:
The compression couplings can be defined as a set of screw, compression, and indenter. A compression fitting is a type of coupling used to connect pipes. A compression couplings is used to connect fixtures and tubings.
It contains screw, compression, and indenter. Therefore, option A is correct answer.
Answer:
dude above me capping its threadless connectors stay strong king
Explanation:
what is the difference between internet and intranet
Answer:
The internet is a globally connected networks of computers that enables people to share information and communicate with each other.
An intranet is a local or restricted network that enables people to store, organize and share information within an organization
Question 3 of 10
What is one task of a system optimization tool?
A. Identifies which programs to begin automatically when you start
your computer
B. Downloads all free programs available to you on the Internet
C. Troubleshoots malfunctioning software, such as word processing
software
D. Troubleshoots malfunctioning hardware, such as a mouse or
keyboard
The OS optimization tool includes the ability to automate and help with some of the common clean up tasks that are tipically run just before using the prepared image. This includes system Clean up tasks and clearing information. Answer: A, identifies which programs to begin automatically when you start your computer.
Some routine cleanup procedures that are often performed right before using the produced image can be automated by the OS optimization tool, and it can also assist with these operations. Thus, option A is correct.
What one task of a system optimization tool?One of the features of the Windows OS Optimization Tool for Horizon is the ability to automate and aid in a few of the routine cleanup procedures that are frequently performed just before employing the prepared image.
There are three parts to every optimization problem: an objective function, choice variables, and constraints.
The term “formulating an optimization concern” refers to the process of turning a “real-world” issue into the mathematical equations and variables that make up these three parts.
To make the image cleaner and ready for usage with Horizon, they comprise system cleanup procedures and information cleaning.
Therefore, This involves clearing information and performing system cleanup chores.
Learn more about optimization tool here:
https://brainly.com/question/24843744
#SPJ5
What is the index of 7 in this list?
[5, 6, 10, 7, 3, 2.51]
This is a straightforward technique for creating index numbers. In this, the sum of the prices for various commodities in the current year is divided by the corresponding base year price total, and the result is multiplied by 100. p = the sum of prices for the same commodities in the base year. (in Rs) 0 p (in Rs.) Thus option E is correct.
What are the index of number?In mathematics, an index (or indexes) is the power or exponent that is added to a number or variable. For instance, the index of 2 in the number 24 is 4. Indexes is the plural form of the word. Constants and variables are concepts found in algebra.
A statistical tool for determining the amount of changes in a group of connected variables is an index number. It is derived from diverging ratios, from which it depicts the overall trend. It is a measurement of the normal change in a group of related variables between two distinct scenarios.
Therefore, 3 is the index of 7 in this list.
Learn more about index here:
https://brainly.com/question/4692093
#SPJ2
PHOTOSHOP IS A GRAPHICS EDITING PROGRAM CREATED WITH IMAGES KNOWN AS________
Answer:
Adobe
Explanation:
A web feed:
A. runs a ticker tape of all your friends' comments on a social
networking site.
B. lists all the activity and postings that are occurring on a website.
C. alerts news watchers of a breaking story they can watch on TV or
online.
D. notifies users that new content has been added to a specific
website.
Web feed notifies users that new content has been added to a specific website. Then the correct option is D.
What is a web feed?The frequent regular update of the content or information given to the user through data format is known as a web feed.
It notifies users that new content has been added to a specific website.
Thus, the correct option is D.
More about the web feed link is given below.
https://brainly.com/question/11319715
#SPJ2
You use a(n) ____ program to create, send, receive, forward, store, print, and delete e-mail messages.
Select one:
a. FTP
b. e-mail
c. transmission
d. communication
Answer:
B - E-Mail
Explanation:
This is a program to create, send, receive, forward, store, print, and delete e-mail messages.
You use a(n) e-mail program to create, send, receive, forward, store, print, and delete e-mail messages.
E-mail simply means an electronic message and it refers to the messages that are distributed by electronic means from a computer user to the recipients through a network.E-mail also refers to the transmission of messages through the internet. It should be noted that e-mail messages are sent through the email servers. Electronic mail can contain text, images, files, or any other attachments. It can also be used to create, send, receive, forward, store, print, and delete e-mail messages.In conclusion, the correct option is B.
Read related link on:
https://brainly.com/question/17531590
1- In MIPS, all operation codes (op-codes) use ______ only.
A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits
Answer:
the answer is -32
Explanation:
HELP ASAP
Tasks of Forensic Tools
This activity will help you meet these educational goals:
- Content Standards—You will learn about the tasks performed by forensic analysis tools.
- Inquiry—You will conduct online research, in which you will collect information and communicate your results in written form.
- 21st Century Skills—You will employ online tools for research and communicate effectively.
Directions:
Read the instructions for this self-checked activity. Type in your response to each question, and check your answers. At the end of the activity, write a brief evaluation of your work.
Activity
Research and describe the tasks performed by forensic analysis tools.
Answer:
Here are the tasks performed by forensic analysis tools:
Acquisition: This is the first step an analysis tool employs. The procedure involves capturing the data that the digital forensics expert needs to assess. The forensic expert creates a copy of the data, which prevents the original data from corrupting. There are two methods of acquisition: physical acquisition and logical partition. During physical acquisition, the experts copy the entire storage and analyze it. During logical partition, the experts create virtual partitions of the storage. Each partition has an individual operating system in it.
Validation and discrimination: Validation helps in verifying whether the copied data is correct or not. Discrimination is the next step, where the forensic experts sort suspicious and non-suspicious data. Validation and discrimination can be done in three ways: hashing, filtering, or analyzing file headers. Hashing converts characters into smaller values, making them easier to find. Filtering helps sort out suspicious files. Analyzing file headers helps the experts check whether a particular file has an incorrect file extension.
Extraction: Extraction is the next step, in which forensic experts recover the data. The experts employ different data-viewing techniques so they can view various file and folders. They also perform a keyword search, which helps them arrive at the target file that contains the needed information. Extraction also involves decompressing any compressed files so that the experts can view the data in detail. Experts also carry out carving, where they salvage and reconstruct partially deleted files and folders. Then, they try to decrypt any encrypted files using possible passwords. Once the experts find evidence, they bookmark it to use it for later reference.
Reconstruction: After finding evidence, the experts reconstruct another copy that contains the evidence. They can duplicate a file from one disk to another disk or one image to another disk. Similarly, they can create a copy by duplicating one partition to another partition or an image to another partition.
Reporting: Once the evidence is reconstructed, the experts create a detailed report of their findings. They create reports using HTML or web pages. Some experts use PDF formats to produce the reports.
Explanation:
Sample Answer from Edmentum/Plato bestie!! <3
When a word or phrase is typed into the Instant Search box, how are the results displayed?
in a separate pop-up window
under the Home tab in Outlook
on a new web page in the default browser
in the pane, with search words highlighted
Answer:
D
Explanation:
Answer:
in the pane, with search words highlighted
Explanation:
Messages that have been accessed or viewed in the Reading pane are automatically marked in Outlook and the message subject is no longer in bold. How does a user go about marking the subject in bold again?
Mark as Read
Flag the Item for follow-up
Assign a Category
Mark as Unread
Answer:
Mark as Unread
Explanation:
I just know
Answer:
D. Mark as Unread
Explanation:
Edg. 2021
(Find the number of days in a month) Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if the user entered month 2 and year 2000, the program should display that February 2000 has 29 days. If the user entered month 3 and year 2005, the program should display that March 2005 has 31 days. Sample Run 1 Enter a month in the year (e.g., 1 for Jan): 4 Enter a year: 2005 April 2005 has 30 days Sample Run 2 Enter a month in the year (e.g., 1 for Jan): 2 Enter a year: 2006 February 2006 has 28 days Sample Run 3 Enter a month in the year (e.g., 1 for Jan): 2 Enter a year: 2000 February 2000 has 29 days
Answer:
Follows are the code to this question:
m= int(input("Enter month: "))#defining a m variable that takes months value
y= int(input("Enter year: "))#defining a y variable that takes years value
if m in [1, 3, 5, 7, 8, 10, 12]:#use if block that check m value is in list
n_day = 31#defining a variable n_day that holds a value
elif m in [4, 6, 9, 11]:#use elif block that check m value is in list
n_day = 30#defining a variable n_day that holds a value
else:#defining else block
if y% 4 == 0 and (y % 400 == 0 or y % 100 != 0):#use if block to check leap year condition
n_day = 29#holds value in n_day variable
else:#defining else block
n_day = 28#holds value in n_day variable
m_name = ["January", "February", "March", "April", "May", "June", "July", "August", "September", "October",
"November", "December"]#defining a m_name as a list that holds string value
print(m_name[m - 1], y, "has", n_day, "days.")#print output with message.
Output:
Enter month: 6
Enter year: 2009
June 2009 has 30 days.
Explanation:
In this code two-variable "y and m" is defined that holds year and month value as an input from the user-end, and use the conditional statement to check m value, which is defined as follows:
In the first condition, if block, it checks m value is available in a given list if the condition is true it holds value "31" in n_day variable. In the second condition, elif block is used checks m value is available in another given list if the condition is true it holds value "30" in n_day variable. In the else block it check leap year condition and hold value in the "n_day variable", in the next step "m_name" variable is defined that stores string value, and uses the print method to print its calculated values.Hey system has defined specific Quetion that describe how signals are sent over connections. Which layer of the transmission control protocol model provides this function?
Complete Question:
A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function?
Group of answer choices.
A. Transport
B. Network
C. Data link
D. Physical
Answer:
A. Transport
Explanation:
Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard communication protocol used for interconnecting network devices such as routers, switches, host computers and access points over the internet.
A system has defined specifications that describe how signals are sent over connections. The layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model that provides these functions is the transport layer.
The transport layer comprises of two (2) standard protocols and these are TCP and UDP.
TCP is an acronym for Transmission Control Protocol and it is one of the essential and important protocol of the internet protocol network. This simply means that, it is an essential part of the TCP/IP network. The TCP has a wide range of applications in the following areas, file transfers, world wide web, remote administration, e-mail, etc.
The TCP connection are mainly established in the network using the three-way handshake.
UDP is an acronym for user datagram protocol and it enables the transfer or exchange of data between network devices.
A _is a short descriptive label that you assign to webpages, photos,
videos, blog posts, email messages, and other digital content so that it is
easier to locate at a later time. It is also the name for part of a coding
element in HTML. *
Which is an example of continuous delivery?
Answer:
Examples of continuous delivery are new features, configuration changes, bug fixes, and experiments.
Explanation:
Hopefully this helped! ♡♡♡
Which type of technology is best for laying out financial projections?
How do Agile and DevOps interrelate?
Answer:
DevOps is a practice of bringing development and operations teams together whereas Agile is an iterative approach that focuses on collaboration, customer feedback and small rapid releases.
Your colleague developed a function, which is supposed to reverse an array of integers, e.g., {1, 5, -10, 7, 23} => {23, 7, -10, 5, 1}. Test cases show that the function does not work correctly. Please look at the following code and identify all the troubles. Please specify which part(s) of the code will not work and explain why not.
void ReverseArray(int arr[], size_t elements_no) {
size_t i = 0; int x = 0; for (i = 0; i <= elements_no; i++)
{ x = arr[i]; arr[i] = arr[elements_no - i]; arr[elements_no - i] = x; }
}
Answer:
The parts of the code which makes the program not to work properly is:
1. for (i = 0; i <= elements_no; i++)
2. arr[i] = arr[elements_no - i];
3. arr[elements_no - i] = x;
The correction of the above lines are:
1. for (i = 0; i <= elements_no/2; i++)
2. arr[i] = arr[elements_no - i-1];
3. arr[elements_no - i-1] = x;
Explanation:
It should be noted that the code end up not reversing the array. This happens because the programmer iterates through all the array elements.
i.e.
1. for (i = 0; i <= elements_no; i++)
This will result in the original array.
To solve this problem, the iteration has to stop at the middle element and the correction is:
1. for (i = 0; i <= elements_no/2; i++)
Also, to swap the individual elements 1 has to be subtracted from each array index. So, the following lines:
2. arr[i] = arr[elements_no - i];
3. arr[elements_no - i] = x;
is corrected to:
2. arr[i] = arr[elements_no - i-1];
3. arr[elements_no - i-1] = x;
See attachment for complete corrections
The current calendar, called the Gregorian calendar, was introduced in 1582. Every year divisible by four was declared to be a leap year, with the exception of the years ending in 00 (that is those divisible by 100) and not divisible by 400. For instance, the years 1600 and 2000 are leap years, but 1700, 1800, and 1900 are not. Write a program that requests a year as input and states whether it is a leap year. (Test the program on the years 2008, 2009, 1900, and 2000.)
Solution :
Public Function Is a Leap_Year(Year As_Integer) As Integer
'Dim Tor_F for local variable declaring if value is t/f.
Dim TorF As For Boolean
'Pre conditions: Year > 1581 and Year < 3000
If Year > 1581 And Year <> 1700 Or 1800 Or 1900 Then
IsLeapYear = Year / 4
Else
IsLeapYear = False
TorF = False
End If
End Function
classified Computer by their age
Answer:
The answer is below
Explanation:
Classification of computers by age are the following:
First generation from 1940 to 1956. For example, ENIAC using a vacuum tube
Second generation from 1956 to 1963. For example, IBM 7070 using transistor
Third generation from 1964 to 1971. For example, this type of computers use an Integrated circuit
Fourth generation from 1972 to 2010. For example, IBM 5100 using a microprocessor.
Fifth-generation from 2010 to present For example IBM Watson, using Artificial intelligence.
PLEASE HELP TAKING TEST NOW!!! Of the following websites, the least trustworthy is one that (1 point)
has the author's name and the current year as the date the site was posted
O has in-depth information and has a .gov URL
O has photographs and a copyright date of 1997
O has a company logo and the results of independent research
Here's all the right answers.
1. What is the main purpose of a graphic organizer?
Answer: B
2. Which of the following website publishers would be considered an authoritative source about the cultures of ancient Mesopotamia?
Answer: C
3. Which of the following websites is the least biased?
Answer: D
4. Which of the following is true about graphic organizers?
Answer: A
5. Of the following websites, the least trustworthy is one that...
Answer: C