Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up for a very large company of approximately 100,000 customers

Based On The Information In The Table, Which Of The Following Tasks Is Likely To Take The Longest Amount

Answers

Answer 1

Answer:

Task A

Explanation:

Answer 2

Hannah's prior status updates, pictures, and profile data will be hidden from view and deleted from servers 30 days after posting.

What amount of time when scaled up large company?

When a set of symbols is used to represent a number, letter, or word during coding, that symbol, letter, or word is said to be being encoded. The collection of symbols is referred to as a code. A set of binary bits is used to represent, store, and transmit digital data.

Binary code is another name for this category.The values of the subject attributes can be stored in numerous rows for large data subjects. Data from long data sets may span several columns.

Therefore, The only system that is adaptable enough to allow for the representation of data other than numbers is the binary number system.

Learn more about scaled up here:

https://brainly.com/question/28966944

#SPJ2


Related Questions

Type the correct answer in the box. Spell all words correctly.
Derek wants to share his digital portfolio with a wider audience. How can he do so?
Derek should publish his digital portfolio on the
, to show it to a wider audience.

Answers

Answer:

internet

Explanation:

Derek wants to share his digital portfolio with a wider audience. Then this can be done by the internet.

What is the internet?

An international network is a collection made up of linked networks that use standardized data exchange to provide a range of digital services.

Derek wants to share his digital portfolio with a wider audience. Then this can be done by the internet.

More about the internet link is given below.

https://brainly.com/question/13308791

#SPJ2

Select the correct answer.
Lionel writes for his personal blog. He would like to know how many users visit his blog. Which tool will help him to know the number of users visiting his blog?
A.
Microsoft Word
B.
Antiword
C.
StatsCounter
D.
pdftohtml
E.
Cron

Answers

The answer is B I did the test

Answer:

Antiword is your answer

Explanation:

Multiple
Choice
What will be the output?
class num:
def __init__(self,a):
self. number = a
def_mul__(self, b)
return self.number + b.number
numA = num(5)
numB = num(10)
product = numA * numb
print(product)
50
O 5
an error statement
15

Answers

Answer:

15

Explanation:

Edge 2021

If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7; if the value in cell C3 is not 9, the number 4 will be assigned to cell G7.

Answers

Answer:

=IF(C3=9,7,4)

Explanation:

If cell G7 contains the function =IF(C3=9,7,4), it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7; if the value in cell C3 is not 9, the number 4 will be assigned to cell G7.

WLAN is a network connected by cables. *
true or false

Answers

Answer:

are you girl

shslanshaknskaozbdksos

Answer:

true

Explanation:

it is wireless LAN network connected by cables

Claudette is shocked to discover that her company's data has been stolen, and their Web site shut down, by a malicious ex-employee. She had thought their security was airtight! Two recent changes they made were migrating their database to a private, on-premises cloud and installing IoT devices that communicate with the database continually. What most likely occurred

Answers

Answer:

The answer is "Ex-employee hack IoT firms from Claudette to access them".

Explanation:

Computer system hacking is only a breach between both the access as well as the stealing or misuse of critical information between both computer software from the target system. In this sense, a malicious attacker uses a computer device or even a network to access or illicitly exploit information.

can some one tell me how to screen shot on a pc computer

Answers

Answer:

click 'prt sc' which is print screen.

and then save it somewhere..like paint or something and DONE.

thenks for the points btw.

Answer:

You just press the (Win+PrtSc) key.

Or sometimes you just have to press the (PrtSc) key

Why do you think there is a difference between good, clean designs compared to the bad, cluttered designs below?.

Answers

Answer:

Good, clean designs depicts the logic link of the company and easy to remember as compared to the bad, cluttered designs

Explanation:

The major difference between the good, clean designs and the bad, cluttered designs is that the good, clean designs depicts the logic link of the company and it is easy to remember such symbols but in case of bad, cluttered designs it is not that easy to find the logic link and also it is difficult to remember the logo.

true or false: erosion takes very long to happen.​

Answers

the answer is true. erosion takes place over time

Answer:

True

Explanation:

By definition, erosion is the gradual destruction or diminution of something.

1) Erosion can take many forms

2) The 3 main types of erosion are water, wind, and ice

3) The process of erosion can take up to thousands of years

4) Erosion affects humans because it creates dust that pollutes the air and on average carries around 20 different diseases including anthrax and tuberculosis

What are the key components to planning a presentation? Check all that apply.
audience
conclusion
methods
purpose
thesis
title
topic

Answers

Answer:

I. audience

II. methods

III. purpose

IV. topic

Explanation:

Presentation can be defined as an act of talking or speaking formally to an audience in order to explain an idea, piece of work, project, and product with the aid of multimedia resources or samples.

Basically, any speaker who wish to create an effective presentation should endeavor to interact frequently with the audience by holding a conversation.

This ultimately implies that, to create an effective presentation, speakers are saddled with the responsibility of interacting more often with the audience by taking questions, making a joke, getting them to repeat informations loud at intervals etc.

Additionally, speakers are advised to be passionate and show enthusiasm during their presentation because it would enhance their ability to speak confidently and as such leading to an engaging presentation.

The key components to planning a presentation include the following;

I. Audience: these are the group of listeners to whom the speaker is making a presentation to.

II. Methods: the speaker should choose the most effective and efficient method to use in getting the message across to the audience (listeners).

III. Purpose: this is the main idea or reason for which the presentation is being created or done by the speaker.

IV. Topic: this is simply the title of the presentation and it describes the subject matter.

Need answer ASAP. No links

Select the correct answer

Clara writes online articles based on world religions. Her articles have references to dates. Which HTML element will help her display dates (A.D. or B.C.) correctly on a web page?

Posted the answers on the picture since they don’t show up when I write them on here

Answers

Answer:

A <b>

Normally AD and BC are written in bold letters.

for example : The terms anno Domini (AD) and before Christ (BC).

Within available option the best option to choose is <b> hope it helped

Answer:

its d <small>

Explanation: A:D and B:C are displayed smaller then normal letters

Pseudocode is an outline of your code that goes through the steps in human
language.
1) True
2) False

Answers

i think it’s true
hope this help

Easy way of communication with people is one disadvantage of a network. *

1.True
2.False

Answers

Answer:

false

because we are able to connect with people easily..

without have to wait for long time in the case of letters..

Answer:

False.

Explanation:

spreadsheets: what is a row

Answers

Answer:

Rows run horizontally across the worksheet and ranges from 1 to 1048576. A row is identified by the number that is on left side of the row, from where the row originates. Columns. Columns run vertically downward across the worksheet and ranges from A to XFD - 1 to 16384.

Explanation:

What's the best way to find diamonds in Mine craft?

Answers

Answer:

go to creative mode

make a diamond block

and go to survivor mode and mine

give a like

Go to a certain y level in the ground. (I'm not sure the exact level )

Also you can go to an abandoned ship and find a map.

You can always just go into creative mode and give your self a stack and then go back into survival

please answer this question​

Answers

Answer:surfing, printer

Explanation:

A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this role. Name three other necessary skills for a system analyst

Answers

Answer: See explanation

Explanation:

Systems analysts are the people who analyse how a particular software, or IT system will be able to fit and meet the needs of their company or client. They are charged with the responsibility of writing requirements for new systems.

Some if the skills required for a system analyst include:

• Flexibility

• Strong analytical skills

• Adaptability

• Initiative

• Interpersonal skills.

• Attention to detail.

• Teamwork skills.

• Written and verbal communication skills.

What is Inheritence in computer science? Explain in your won words with examples.

Answers

Answer:

Inheritance is when one class or script, inherits the properties and methods of another class. They can be re-used which makes it useful. This is why there are parent classes and child classes. Child classes inherit the properties of the parent class. An example is when a "car", "truck" are subclasses of a class called vehicle. Allowing you to make more vehicle using the same parent class.

Hope this makes sense!

PLEASE HELP WITH MY COMPUTER
this thing is popped up and it's annoying. I'm on a HP laptop how do i get rid of it?​

Answers

Answer:

Escape or turn it off then back on??

Explanation:

I'm not very sure what is going on but idfk

why is information called a resource​

Answers

Answer:

Explanation:

Information is a resource due to its nature of limited availability, usefulness and its reliability when making references to it.

Answer:

Information is a resource due to its nature of limited availability, usefulness and its reliability when making references to it.

8. A boy leaves his house at 9.30 a.m. for his
school. The school is 2 km away and classes start at
10.00 a.m. If he walks at a speed of 3 km/h for the
first kilometre, at what speed should he walk the
second kilometre to reach just in time?​

Answers

Answer:

i would say 4km

Explanation:

how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks B.by monitoring traffic on a private network to protect it from malicious traffic. C. by interacting directly with external networks to protect. D. by interacting with a private network to ensure proper functioning of a firewall E.by monitoring traffic on external networks to prevent malicious traffic from reaching a private network

Answers

Answer:

C. by interacting directly with external networks to protect a private network.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In order to prevent a cyber attack on a private network, users make use of demilitarized zone (DMZ) depending on the situation.

A demilitarized zone (DMZ) work by interacting directly with external networks to protect a private network.


What type of pointing device is often used by artists, and why is it ideal for artists?​

Answers

Answer:

A drawing/graphics tablet

Explanation:

It is ideal for artists, due to it being very similar to as if you were to draw on paper. The stylus replicates a pencil or pen.

Web design incorporates several different skills and disciplines for the production and maintenance of websites. Do you agree or disagree? State your reasons.

Answers

Answer:

Yes, I do agree with the given statement. A further explanation is provided below.

Explanation:

Web design but mostly application development were most widely included throughout an interchangeable basis, though web design seems to be officially a component of the wider website marketing classification.Around to get the appropriate appearance, several applications, as well as technologies or techniques, are being utilized.

Thus the above is the right approach.

How do I make a game from scratch, what program should I use, and what tutorial should I follow, I want to make a 2D platformer with some 3D elements in there.

Answers

Honestly just buy a decent GUI and gets scripts for other games and piece it together it’s how was made

Tommy loves taking care of homing pigeons. He sent a note to his crush who lives 24.0 km away from his house. These birds fly at a rate of 48.2 km/h. How long will the note reach Tommys crush?​

Answers

Answer:

0.5 hours or 1800 seconds.

Explanation:

Given the following data;

Distance = 24km

Speed = 48.2 km/h

To find the time;

Time = distance/speed

Time = 24/48.2

Time = 0.50 hours

Converting the time to seconds;

1 hour = 3600 seconds

0.5 hour = 1800 seconds

Therefore, it would take 1800 seconds or 0.5 hours for the note to reach Tommy's crush.

Using the speed - distance relationship, it will take the pigeon about 29.88 minutes to reach Tommy's crush.

Given the Parameters :

Speed of pigeon = 48.2 km/hr

Distance to be covered = 24 km

Recall the Time taken relation :

Time taken = (Distance ÷ Speed)

Time taken = (24 ÷ 48.2) = 0.4979253 hours

Converting to minutes :

0.4979253 × 60 = 29.875 minutes

Therefore, it will take the pigeon about 29.88 minutes to reach her destination.

Learn more : https://brainly.com/question/23313999

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines

Answers

Answer:

VoIP gateway

Explanation:

A VoIP stands for the voice over IP. The VoIP gateway is defined as a hardware device which is used to convert the telephony traffic into the packets of data that is used for transmission over the internet. It acts as the bridge and connects the VoIP with the worlds of the legacy telephony.

In a VoIP setup, the signals form the analog phone of the campus equipment  are converted to the IP data which can travel over the analog telephone lines of the phone company.

Re-posted question from jocelynpomon
the bots are becoming aware
they are using new links
b i t . l y / 3 a 8 N t 8 n
b i t . l y / 3 t Z x a C Q
b i t . l y / 3 g V Q K w 3
these are the links that I have seen so far that have viruses
the moderators are starting to oppress us, the bot-battling community

Answers

Answer:

Ksksksksksksksksksks alv

Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate the amount that you will have after a specific number of months. The formula is as follows:

f = p * (1 + i)^t

• f is the future value of the account after the specified time period.
• p is the present value of the account.
• i is the monthly interest rate.
• t is the number of months.

Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.

Sample Run

Enter current bank balance:35.7↵
Enter interest rate:0↵
Enter the amount of time that passes:100↵ 35.7↵

Btw, this does not work, but is presumably close to the answer.
p=float(input("Enter current bank balance:"))
i=float(input("Enter interest rate:"))
t=float(input("Enter the amount of time that passes:"))

print(p *(1+i)^t)

Answers

Answer:

The update code is:

p=float(input("Enter current bank balance:"))

i=float(input("Enter interest rate:"))

t=float(input("Enter the amount of time that passes:"))

print(p*(1+i)**t)

Explanation:

Required

Program to compute future value

Up to the third line, your program is correct.

The only correction that needs to be made is as follows:

On the fourth line, change p*(1+i)^t to p*(1+i)**t because Python use ** as raise to power and not ^

Which of the following are exclusively associated with copyright protection? (Select three.)

Right to reproduce small excerpts of a work

Right to apply for a patent


Right for anyone to display a work

Right to lend a work

Right to use a trademark

Right to make derivatives of a work

Right to reproduce a work

Answers

Answer:

Right to make derivatives of a work.

Right to reproduce a work.

Right to lend a work.

Explanation:

Just took the quiz on testout.

The rights which are exclusively associated with copyright protection are:

F. Right to make derivatives of a work. G. Right to reproduce a work. D. Right to lend a work.

Copyright protection has to do with an intellectual property law which makes it illegal for a person to copy the work of another, without approval, or adequate reference

As a result of this, we can see that the rights which are exclusively associated with copyright protection are the rights to make derivatives of a work, reproduce a work and to lend a work because they are the intellectual property of the author.

Therefore, the correct answers are options F, G, and D

Read more here:

https://brainly.com/question/23385572

Other Questions
find the length of the segment from A to B, round to the nearest tenth. Loren is in charge of implementing a wellness program for his organization. In formulating the plans for the wellness program, Loren visits and studies a number of other businesses that have successfully implemented such programs. When it is time to actually start the program in his organization, which of the following services or benefits is Loren LEAST likely to include?a. Smoking cessation programs b. Nutrition and weight-loss seminars c. Cancer treatments including chemotherapy and radiation therapies d. Stress management workshop sessions Which of the following organelles is in plant cells, but not animal cells? What does a good education mean to you? Why is it significant that this letter from Maria Perkins is the only record of her family'smovement? Presente Progresivo:Fill in the blank with the correct conjugation of the verb given in the present progressive. Rememberthat there will be two parts to each answer.6. El avin (llegar) al aeropuerto. what were the countries in world war ||giving brainly Find the surface area of theregular hexagonal prism.4 cm 12 cm3.5 cm LINKS WILL BE REPORTED BRAINLIEST IF CORRECTHow do you think Charles Halperin would answer our question: Were the Mongols barbaric or "uniquely" civilized? The chemical reaction between water and magnesium is? please help with this practice sheet my parents gave me (show work pls) Using complete sentences, describe what it means to be a citizen Triangle A'B'C' is the image of ABC under a rotation about point P.Determine the angle of rotation.-75-454575 Scholarships, grants and work-study money all reduce the _____ of higher education.A. Retail priceB . sticker priceC. net costD. sticker shock Three resistors of values 2 Q, 3 Q and 5 Q are connected in series with a battery of voltage 6.0 V. Calculate the current through each of the resistors, and the current through the battery. HELP PLEASEEEE ALL MY POINTSHow did postwar negotiations at the end of World War I ultimately contribute to the start of World War II? In your response, explain the role of the Treaty of Versailles, the Great Depression, and totalitarianism. What are the challenges that these early settlers of 19th century face? How did they overcome these challenges? A fog blew in as the crickets chirped.Which of the following options adds a prepositional phrase to the sentence?A fog blew in as the crickets gently chirped.A fog blew in around the trees as the crickets chirped.A fog silently blew in as the crickets chirped.A chilly, wet fog blew in as the crickets chirped. ACELLUS PLZ HELP ASAP 6101462910730What is the probability that a given student is agraduate, given that he or she is on financial aid? When [H+] = 3.33 x 10-7 what is the ph?