Page
U what is a common language that computers use
to talk with one another on- a network?
a. client b. Adapter
c. protocol d. operating
System​

Answers

Answer 1
I think it’s protocol
Answer 2
The computers use a set of protocols. Therefore, the answer is C. Protocol. I hope this helps.

Related Questions


If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color

Answers

I have no idea for that

Answer:

watermark

Explanation:

Biodiversity explanation

Answers

the variety of life in the world or in a particular habitat or ecosystem

Which of the following are risks to a network?
a Sending emails
b. Granting administrator access to a non-administrator
c. Opening files from unknown senders
d. Unwanted advertisements

Answers

Answer:

option  b and c are correct answers.

Explanation:

Let see each option in detail.

a) Sending email is not a risk.

b) Granting access is a problem because the other person can undermine the network

c) Unknow senders can send virus or other malicious code to corrupts you data.

d) Unwanted advertisement is not a big deal.

Answer:

Granting administrator access to a non-administrator  

 Opening files from unknown senders

Explanation:

Psst those are the answers

If you are working on doing senior portraits and want a lens that will give you the best shallow depth of field which lens would you choose?
a) 55mm f1.2 (focal length of 55mm, maximum aperture of 1.2)
b) 28-80mm f4.5 (Zoom lens with focal length from 28-80mm, max aperture 4.5)
c) 18mm f5.6
d) 50mm f1.4
45 points and brainliest

Answers

Answer: The answer is C     Hope this helps :)    Please mark Brainliest

Explanation:

Answer:

c) 18mm f5.6

Explanation:

For the best lens that offers the best shallow depth of field, you need to choose the one with the maximum apertature but does not zoom.

Hence choice c) has the maximum aperture and does not zoom.

Hope this helps :)

Is it important to study information systems

Answers

Answer:

There is massive importance if you want to study information study.

It can help you understand the data, organize, and process the data, using which we can generate and share information.

Explanation:

It largely depends on your interest and requirement, but a better knowledge or clue about information systems may help analyze the data especially if you want to become a data scientist, machine learning, Artificial intelligence or deep learning, etc.

It can help you understand the data, organize, and process the data, using which we can generate and share information.

A great understanding of information systems may exponentially increase the productivity, growth, performance, and profit of the company.

Most Professions get exposed to information Systems no matter what their career objective is, as it may help in having better decision making based on the information they get through data.

So, yes!

There is a massive importance if you want to study information study.

Which tab should you use to change the text font color in your presentation?

Answers

Answer:

The Home Tab

Explanation:

The attenuation of a signal is -10 dB. What is the final signal power if it was originally
5 W?

Answers

Answer:

P₂ = 0.5 W

Explanation:

It is given that,

The attenuation of a signal is -10 dB.

We need to find the final signal power if it was originally  5 W.

Using attenuation for signal :

[tex]dB=10\text{log}_{10}(\dfrac{P_2}{P_1})[/tex]

Put dB = -10, P₁ = 5 W

Put all the values,

[tex]-10=10\text{log}_{10}(\dfrac{P_2}{5})\\\\-1=\text{log}_{10}(\dfrac{P_2}{5})\\\\0.1=\dfrac{P_2}{5}\\\\P_2=5\times 0.1\\\\P_2=0.5\ W[/tex]

So, the final signal power is 0.5 W.

The final signal power if it was originally 5W is; 0.5 W

Signal Power

We are given;

Attenuation signal; dB = -10 dBOriginal signal power; P1 = 5 W

Formula for attenuation signal is;

dB = 10log_10_ (P2/P1)

Where P2 is final signal power

Thus;

-10 = 10log_10_(P2/5)

-10/-10 = log_10_(P2/5)

-1 = log_10_(P2/5)

0.1 = P2/5

P2 = 0.1 × 5

P2 = 0.5 W

Read more about signal power at; https://brainly.com/question/13315405

Jordan uses a spreadsheet to keep track of how many hits each player on a baseball team has had in each game
throughout the season. For every game, each player's name appears in a column that Jordan has titled "Player."
Next to that, a column titled "Hits" shows the number of hits for each player in a single game.
What function should Jordan use to find the average number of hits per game for player A_Clemente?
O SUMIF(Hits, "A Clemente", Player)
O SUMIF(Player, "A Clemente". Hits)
O AVERAGEIF(Hits, "A Clemente", Player)
O AVERAGEIF(Player,"A_Clemente", Hits)

Answers

Answer:

AVERAGEIF(Player, "A_Clemente", Hits)

Explanation:

The AVERAGEIF function allows users to calcule the mean value of numerical columns while also Given certain constraints within a single function call. The AVERAGEIF takes in 3 arguments.

The first is a column which houses the range of the constraint we would like to apply on our function.

The second argument is the constraint itself which should reside within the values in the range defined in the first argument.

The third argument is the numerical column whose average is calculated based on the defined constraint.

Therefore, in the scenario above, Player is the column containing player names, which it's value will later be used as a constraint

"Clemente_A" the constraint, only values pertaining to Clemente_A will be defined.

Hits, the numeric column whose value is averaged based on the constraint given.

What is the best approach to testing a website? visit all pages to verify that they load visit every page and verify all links visit the pages with hyperlinks visit all pages that appear on the navigation menu

Answers

Answer:

B. visit every page and verify all links

Explanation:

I just took the test, and only one year late.

Answer:

THe answer s b

Explanation:

Please help this computer science question(Pseudocode and Trace table)

Answers

Answer:

can u explain more specific plz

Explanation:

Janet needs to flag a message for follow-up in Outlook. Which option is not a default?

Today
Tomorrow
Next Week
Next Tuesday

Answers

Answer:

Explanation:

Today

Answer:

Next tuesday.

Explanation: Its to specific

When save a newly created template, you use which extension for the file type? .doc, .docx, .doct, .dotx?

Answers

Answer:

The main difference between the two file formats is that in DOC, your document is saved in a binary file that includes all the related formatting and other relevant data while a DOCX file is actually a zip file with all the XML files associated with the document.

A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased

Answers

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

write a an algorithm to find out volume?​

Answers

This for the algorithm of a sphere:
Define the radius of the sphere.
Define the pie and assign (22/7)
Calculate the volume of the sphere as (4/3)*pie*r3
Assign the volume of the sphere to volume_of_sphere.
Print the volume of the sphere.

Exodia
Principle of Computer Operation​

Answers

Answer:

????

Explanation:

Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose for this
purpose?
Mary needs to choose the _________
menu in order to place the text in a desired fashion around the image

Plato btw

Answers

Answer:

she needs to choose the insert menu

You manage a Windows server that has an attached printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:Sally needs to connect to a printer, print documents, and pause and resume her own print jobs.Damien needs to pause and resume documents for all users, but does not need to change printer properties.You want to assign the most restrictive permissions that meet the sales manager's requirements. What should you do

Answers

Answer:

Damien would be assign the Manage Documents permission while Sally on the other hand will be assign the permission to print.

Explanation:

Based on the information given in order for me to assign a restrictive permission that will meet the requirements of the sale manager's what I will do is for me to assign the Manage Documents permission to Damien reason been that Damien only needs to stop and resume the documents for all users in which he does not need to change the printer properties and to assign the permission to print to Sally reason been that Sally only needs to connect to a printer and to print documents in which she will then stop and resume her own print jobs.

For an interview, the most used microphone types are

A. Boom mics, long range mics
B. Strap, studio recording mics
C. Lapel or handheld
D.No mics are needed

Answers

The answer is A; hope this helps you

Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across?

Compatibility Checker
Accessibility Checker
Insights
AutoCorrect

Answers

Answer:

Accessibility Checker

Answer:

answer is accessibility checker or B on edge

Jorge is sending a message to Thomas but would like a copy sent to his external email address as well. Jorge does not want Thomas to see this copy that was sent.

Which mail field will Jorge use to achieve this goal?

To:
From:
CC:
BCC:

Answers

Answer:  BCC (fourth choice)

=================================================

Explanation:

CC stands for "carbon copy".

BCC stands for "blind carbon copy".

Filling out forms is a tedious process. It's even more tedious when you have to repeat yourself multiple times. Carbon copy paper technology allows you to fill out one form and have those inputted entries be copied to the layers below. In terms of email, a carbon copy (CC) email is just an email sent to more than one person. In the CC line, recipients can see who the other people are in the email chain.

In contrast, a blind carbon copy is where the recipients cannot see who is in the BCC line. This allows Jorge to send the message copy to an external address without Thomas knowing.

I am having trouble with doing this code on Python:Develop the Car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information.Ex: If the input is:2011 18000 2018where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:Car's information: Model year: 2011 Purchase price: 18000 Current value: 5770Note: print_info() should use three spaces for indentation.

Answers

Answer:

class Car:

   def __init__(self, model_year, purchase_price):

       self.model_year = model_year

       self.purchase_price = purchase_price

       self.current_year = 0

       self.current_value = 0

   def set_current_year(self, year):

       self.current_year = year

   def calc_current_value(self, current_year):

       if self.current_year == 0:

           return "Must first input the current year"

       depreciation_rate = 0.15

       car_age = current_year - self.model_year

       self.current_value = round(self.purchase_price - (car_age * (self.purchase_price * 0.15)))

   def print_info(self):

       print("Car's information:")

       print(f"Model year: {self.model_year}")

       print(f"Purchase price: {self.purchase_price}")

       if self.current_value > 0:

           print(f"Current value: {self.current_value}")

       else:

           print("Current value: Unknown")

Explanation:

The python program above defines the class "Car" that accepts the model year and purchase price of an instance. The class has a set method for the current year variable that is used to calculate and update the current value variable of the object. The print_info method prints the car model year, purchase price and its current value after nth years.

Select the correct answer. Which type of computer application is Apple Keynote? OA. word processor O B. spreadsheet O C. presentation OD. database O E. multimedia

Answers

Answer:

Apple Keynote is presentation Software

The correct option is C

Explanation:

Now let explain each option

Word processor:

Word processor is incorrect because it is used to type text, format it add tables and figures, For example MS Word

Spread Sheet:

Spread Sheet is incorrect as it is used for calculation. Like MS Excel

Presentation:

Key tone is a presentation software. it is used to make presentation and add animation and transition to it.

Database

Database is incorrect because databases are used for storing data. Not for presentation.

Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL

Answers

Answer:

hi

Explanation:

Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exception in Firewall and enable WinRM. PowerShell has a cmdlet that can perform all of these tasks at once.
A. Start-PSRemoting.B. Enable-PSRemoting.C. Enable-PSSession.D. Get-PSRemoting.

Answers

Answer:

B. Enable-PSRemoting.

Explanation:

Powershell is a command-line interface software used in windows operating system to manage the operations of the system. It is similar to the bash terminal scripting language in Linux and has some of the command prompt features.

The PS session is used to manage remote systems connected wirelessly to the administrative system. The command used to enable this process is "Enable-PSRemoting".

what is the purpose of writing a topic sentence​

Answers

Answer:

A topic sentence must highlight the main idea of a paragraph, letting the reader know what the paragraph will be about. The topic sentence must present an idea that will unify the rest of the paragraph while relating it back to the main thesis of the paper.

Explanation:

Answer:

To summarize the main point of paragraph

Explanation:

When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​

Answers

Code sofware your welcome

This is similar to the last problem, except that the first number on a line is an ID number that identifies an account. The same ID number may appear on any number of lines. Use a Dictionary to accumulate, for each ID, the sum of all the numbers that are on all the lines with that ID number. Call the input file id_data.txt. Write an output file called ID_sums.txt. On each line of the output fille, print an ID number and the sum. Sort the lines by the numerical order of the IDs

Answers

Answer:

Following are the code to this question:

def getSum(ID):#defining a method getSum that accept an ID

   t= 0#defining a variable t

   while ID!= 0:#defining while loop to check ID not equal to 0

       t+= ID % 10# holding remainder value

       ID = ID // 10#holding quotient value

   return t#return total value

def readRecord(S):#defining a method readRecord that hold list  

   f_Read = open("idInfo.txt","r")#defining a variable f_Read to open file

   for C_ID in f_Read:#defining for loop to hold file value  

       C_ID = C_ID.replace('\n', '')#use replace method

       S[C_ID] = getSum(int(C_ID))#use list to method value

   f_Read.close()#close file

def sortRecord(ID_List, t_List):#defining a sortRecord

   for x in range(len(ID_List) - 1):#defining for loop to calculate the length of list  

       for y in range(0, len(ID_List) - x - 1):#defining for loop to calculate the length of list

           if ID_List[y] > ID_List[y+1]:#defining if block to check value is greater

               ID_List[y], ID_List[y+1] = ID_List[y+1], ID_List[y]#swap the value

               t_List[y], t_List[y+1] = t_List[y+1], t_List[y]#swap the value

def showReport(ID, t):#defining a method showReport that accept id and t

   for i in range(len(ID)):#defining for loop to hold index value

       print(ID[i]," ",t[i])#print index value

def writeRecord(ID_List, t_List):#defining a method writeRecord that accept two list

   f_Write = open("idSorted.txt","w")#defining a variable f_Write to hold store value in file

   for i in range(len(ID_List)):#defining a for loop to store value with index

       f_Write.write(ID_List[i])#hold list value

       f_Write.write(" ")    #for space

       f_Write.write(str(t_List[i]) + "\n")# add index value

   f_Write.close()#close file

def run():#defining method run

   S = {}#defining an empty list

   readRecord(S)#passing list into readRecord method

   ID_List = list(S.keys())#defining a variable that holds key value in list

   t_List = list(S.values())#defining a variable that holds values value in list

   sortRecord(ID_List, t_List)#calling a method sortRecord by passing value

   showReport(ID_List, t_List)#calling a method showReport by passing value

   writeRecord(ID_List, t_List)#calling a method writeRecord by passing value

if "run":

   run()

Output:

Please find the attached file.

Explanation:

In the above program code, 6 method getSum, readRecord, sortRecord,showReport, writeRecord, and run method is defined, in which getSum and readRecord is used a single list store value in parameters, and in other methods, it accepts two parameter to store value in key and values form and use a txt file to store and take value.    

In the run method, an empty list s is declared, that pass into the variable ID_List and t_List, and call the method, in this program two a text file "idInfo.txt" is used, that holds some value in the file, and create another file that is "idSorted.txt", in this file it stores the value in the numerical order of the ID's.

What is a commonly used software access restriction for a computer system connected to other networks such as the internet?
a.Passwords
b. Firewall
c. encryption
d. biometric systems

Answers

Answer:

firewall

Explanation:

write algorithm and flowchart to calculate sum,difference, product and quotient of two integer number given by the user.​

Answers

Answer:

Step1: Start

Step2: Initialize the count variable to zero

Step3: Initialize the sum variable to zero

Step4: Read a number say x

Step 5: Add 1 to the number in the count variable

Step6: Add the number x to the sum variable.

Step7: Is the count variable in the memory greater than 50?

           If yes, display the sum: go to step 8.

           If No, Repeat from step 4

Step8: Stop

Explanation:

what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and credit card info is the store?

Answers

Never store the card-validation code or value (three- or four-digit number printed on the front or back of a payment card used to validate card-not-present transactions). Never store the personal identification number (PIN) or PIN Block. Be sure to mask PAN whenever it is displayed.
Other Questions
How did Winton finally mange to get their children out of Czechoslovakia? What is a Proprietary Colony? one of u guys helped me but they keep returning it saying show your work>:( z = -400i - 44.5What is the imaginary part of z? Help plz 13. Mildred is flying a kite on a 30 m string. The angle of elevation of the kite measures 40 degrees,and Mildred's hand is 2 m above the ground. About how high is the kite off the ground?a. 21.3 mc. 19.3 mb. 25 md. 23 m A school club wants to collect at least 500 canned goods for a school food drive. The club has already collected 30 canned goods.Part AIf 10 club members each collect the same number of canned goods, which inequality represents the minimum number of canned goods, n, eachclub member must collect for the club to meet the goal?10n +30 500 what type of plate boundary decreases the amount of the Earth's crust? 1A. (f = g)(x) = 2 - 4.true or false Which choice best describes the parts of the water cycle? The sun's thermal energy causes water on the earth to evaporate. The water vapor then condenses and forms precipitation. The precipitation then falls back to the surface of the earth. The ocean's tidal energy causes water to cycle on the earth. The water from the oceans evaporate and form precipitation. The precipitation then condenses back on the surface of the earth. The earth's magnetic energy causes water to evaporate. The water condenses into water vapor once it becomes precipitation. The condensation then falls back to the surface of the earth. The sun's thermal energy causes water vapor to condense. This condensation then forms precipitation. This precipitation returns to the atmosphere for the cycle to continue. Which of the following identifies the most appropriate courses to take in high school for someone interested in becoming a mechanical engineer? drafting- and math-related courses math- and science-related courses computer- and design-related courses science- and computer-related courses Which statement correctly describes the transfer of energy between the blue arrows? There is no change in energy. There is twice the gain of energy. There is a loss of energy. There is a gain in energy. Write 45 as a product of primes. Use index notation when giving your answer. I WILL GIVE BRAINLIEST Social classes is a characteristic of civilization that refers to groups of people ranked by their place in society people who come together to learn a trade men and women who enjoy spending time together citizens who vote in a similar way what is the mood of the house of hades? What mood does the author create at the beginning of "Marigolds"? Support your answer with words and phrases from the text. Solve for s.12s=72s = 17s = 27s = 3s = 7 One benefit of guerilla gardening is... a car drives at a rate of 65 mi/hr. what is the speed of the car in ft/s? note: 1 mi = 5280 ft Read each question and choose the best answer.The impact of the massacre was crucial. Before Goliad, most Texans had thought of Santa Anna as sly and clever. However, most people looked upon the executions as an atrocity, or a brutal act. Now they regarded Santa Anna as cruel. People in the United States also were furious with the Mexican army for its brutal treatment of prisoners.This description from the text suggest which of the following?The massacre thoroughly discouraged the Texans.The massacre was far more damaging to the cause of independence than the destruction of the Alamo.The massacre helped bring people together to defeat Santa Anna and Mexico.The massacre forced the United States to take military action against Mexico. Discuss the roles of the enzymes secreted by the pancreas during digestion.