Explanation:
A. Encryption. (B. Printer
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:
Answer:
Software piracy.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into two (2) main categories and these are;
I. Open-source software.
II. Proprietary software.
A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.
Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.
Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).
Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.
(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.
Answer:
a) SELECT No_of_copies
FROM ((book JOIN book_copies) JOIN library_branch)
WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';
b) SELECT branchname, No_of_copies
FROM ((book JOIN book_copies) JOIN library_branch)
WHERE title = 'The Lost Tribe'
GROUP BY branchname;
c) SELECT Name
FROM borrowers B
WHERE cardno NOT IN ( SELECT cardno FROM book_loan)
d) SELECT title, name, B.address
FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)
WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';
e) SELECT title, No_of_copies
FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)
WHERE authorname = 'Stephen King' AND branchname = 'Central';
g) SELECT DISTINCT title
FROM ((book JOIN book_copies) JOIN library_branch)
Explanation:
The SQL statements query's a book store database of seven relations using joins and subqueries to return results.
1.Choose the best answer.:
a) Broadly, computers are of ................ purpose and ................ purpose
(i) specific, general (ii) specific, broad (iii) precise, broad (iv) None of them
b) .................. computers works on continuous signals
(i) Analog (ii) Digital (iii) PS/2 (iv) None of them
c) ................ computers are the largest and most expensive digital computers.
(i) Mainframe (ii) Mini (iii) Super (iv) Apple
d) .................. is the example of mainframe computer.
(i) CYBER 205 (ii) IBM 3081 (iii) VAX (iv) IBM 9375
e) Macintosh is the OS used in .................. computer.
(i) IBM (ii) mainframe (iii) super (iv) apple
f) .............. was mainframe computer brought first time to process census data in Nepal.
i) IBM 1400 ii) IBM1401 iii) IBM1402
g) ……… computer are used in hospital for Ultra Sound.
i) Analog ii) Digital iii)Laptop iv) Hybrid
h) Nowadays, most powerful super commuter is Sunway taihulight from .......................
i) India ii) Germany iii) China iv) Nepal
Answer:
specific, generaldigitalminiCYBER 205IBMIBM1401digitalGermanyWhat is the definition of WLAN
Explanation:
A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.
WLAN stands for wireless local area network. It is a wireless connection that connects two or more devices in LAN. WLAN uses access points and routers to make a connection between devices. Wi-Fi is an example of WLAN where devices are connected wirelessly within a limited range.
stay safe healthy and happy.Lots of data can be transferred in short time, when we have,
a.High latency
b.Higher bandwidth
c.Lagging
d. Lower bandwidth
Answer: B. Higher Bandwidth
What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit
Answer:
it's D
Explanation: i had this question before and i got it right :)
Answer:
D. An initial deposit
Explanation: Hope this helps :)
What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard
Answer:
private
Explanation:
Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware programs clear out temporary Internet files uninstall unwanted apps
Answer:
Clear out any garbage file on the drive
Explanation:
Running the Disk Cleanup utility is a quick way to clear out temporary Internet files. Therefore option C is correct.
Running the Disk Cleanup utility is a quick and efficient way to clear out temporary files and unnecessary data from your computer's hard drive.
These files can accumulate over time from web browsing, software installations, and system updates, occupying valuable disk space and potentially slowing down your system.
The Disk Cleanup tool identifies and deletes temporary internet files, cached data, downloaded program files, and other unnecessary files, freeing up space and improving system performance.
However, it is important to note that Disk Cleanup does not defragment your hard drive (A), remove spyware programs (B), or uninstall unwanted apps (D), as these tasks require different tools or procedures.
Therefore option C is correct.
Know more about Disk Cleanup:
https://brainly.com/question/31937611
#SPJ6
compare shopping centre and open -air market
Answer:
The similarities between a shopping center and an open-air market are;
1. Goods are bought and sold in both a shopping center and an open-air market
2. The stores within the location have different owners
3. Buyers can move between stores for transactions
The differences between a shopping center and an open-air market are;
1) The shopping center is usually roofed, while an open-air market is usually located outdoors
2) The stores in a shopping center more often have a checkout point, while stores in an open-air market rarely make use of a checkout
3) Items found with a defect after purchase can usually be returned for a replacement in a shopping center, while it is necessary to check an item well when buying from an open-air market as returning such items is usually difficult
Explanation:
A shopping center is a complex or area that have several shop groups built together which can all be located under a roof
Professional offices, restaurants, banks, theaters, and pharmacy's can also be located in a shopping center
Open-air market is a place in the public used for the sale of food and merchandise
What is the error in the following line: (1)
age=int(input("Enter your age:")
Answer:
14
Explanation:
I got a question in computer science I don't understand, can someone please help.
Answer:
Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.
Please give brainliest, means alot!
what is peopleware?
need help
Answer:
Peopleware is a term used to refer to one of the three core aspects of computer technology, the other two being hardware and software.
PLEASE HELP !!!! 40 POINTS BUT HELP
Write a python program to build a simple BMI calculator, where your program asks the user to input the height and the weight of the user then displays the BMI and statement stating the overall health of each user . All the data should be in variables , and no functions should be used.
The program should contain the following:
Welcome message- Display your full name, project name and give a small description on your project (definition of the BMI) [2 marks]
Variables :
height variable , input by the user [2 marks]
Weight variable , input by the user [2 marks]
Use a proper data type change function , int() or float() [2 marks]
Calculate the BMI by using the input variables of the height and the weight . [4 marks]
Display the BMI with statement based on the result of the BMI , refer to the below table [6 marks]
Critical thinking :
After running the code, don't stop the program and ask the user for a new input for a new calculation .(use loop , Break )
EXAMPLE :
Do you want to make a new calculation ? if no end the program , if yes start the code again .[2 marks]
Answer:
So in a way it is about a python calculation
When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices
Answer: implicit
Explanation:
When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.
Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.
write a program to calculate the area of rectangle
Answer:
program by LET statement
Explanation:
CLS
REM to find the area of rectangle
LET L=40
LET B=20
LET AOR=L*B
PRINT "AOR=";AOR
END
Press F5
output
AOR=800
What space is space surrounding the area around the main subject.
Answer:
Positive space refers to the subject or areas of interest in an artwork, such as a person's face or figure in a portrait, the objects in a still life painting, or the trees in a landscape painting. Negative space is the background or the area that surrounds the subject of the work.
Explanation:
- The emptiness around and between the shapes or forms are called the negative spaces or ground. We often call it the background but it is more than that.
You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location
Answer: Windows Configuration Designer (WCD)
Explanation:
The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).
Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.
Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.
Answer:
Parent
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.
In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).
Write an expression that evaluates to true if the value of the int variable widthOfBox is not divisible by the value of the int variable widthOfBook. Assume that widthOfBook is not zero. ("Not divisible" means has a remainder.)
Answer:
The expression is:
if widthOfBox % widthOfBook != 0
Explanation:
Given
Variables:
(1) widthOfBox and
(2) widthOfBook
Required
Statement that checks if (1) is divisible by (2)
To do this, we make use of the modulo operator. This checks if (1) is divisible by 2
If the result of the operation is 0, then (1) can be divided by (2)
Else, (1) can not be divided by (2)
From the question, we need the statement to be true if the numbers are not divisible.
So, we make use of the not equal to operator alongside the modulo operator
defination of Wi-Fi plz
Answer:
A facility allowing computers,smartphones and other devices to connect to the internet or communicate with one another wirelessly.
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this
Answer:
The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.
Explanation:
Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?
A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.
B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access
C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.
D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.
The explanation of the answer is now provided as follows:
Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.
The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.
By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.
Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.
What is a named bit of programming instructions?
Answer:
Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
what is processing for a computer?
Answer:
is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.
what is file management?can please help me
When attaching a file or files in outlook 365 you select the attach command and then select the files location
Answer:
When you click the attachment button a window pops up allowing you to select the file/s you want to upload
You can also drag and drop file/s this is an alternative method
Explanation:
Microsoft Outlook is a personal information manager software system from Microsoft.
Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia
Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest
Answer:
Motion sensor.
Explanation:
I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor
[Plato] In A Soccer Game, You Want To Finish The First Half In Five Minutes. So, You Set The Match Duration To Ten Minutes. This Is An Example Of What Kind
Of Time Element?
A)Altered
B)Variable
C)Authentic
D)Player Adjusted
Answer: D. Player Adjusted
Explanation: The reason why the answer is player adjusted is because a player in the game is changing the time to 10 minutes.
Have a nice day!
…….. and ……...are called binary digits. (Computer Science)
Answer:
Explanation:
0 and 1 are called binary digits.
here is your answer..
What are some signs that could help you determine that a date and time was inserted as a special object instead of
typed as normal text? Check all that apply.
Answer:
i) It is difficult to put the mouse pointer's insertion point in the text
ii) A gray border appear around the time and date when you point to it
Explanation:
When the date and time is pointed to or hovered using the mouse pointer, we have, that the background of the text changes to a grey border around the text when the date and time is inserted as a special object using the insert date and time button on the insert menu in the word processing application
The mouse pointer behaves different when working with some applications, and it could be difficult to place the insertion point of the mouse pointer in the text
Therefore, the correct options are;
It is difficult to put the mouse pointer's insertion point in the text and
A gray border appear around the time and date when you point to it.
What is one similarity between compiled and interpreted programming languages? (5 points)
Both compiled and interpreted languages are translated one line of code at a time before moving to the next line.
Both compiled and interpreted languages can be shared with others while keeping the source code private.
Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.
There are no similarities between compiled and interpreted programming languages.
Answer:
Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.
Explanation:
The one similarity between compiled and interpreted languages is that they are both high-level languages.
A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.
A high-level language can either be interpreted or compiled.
An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.
So, the similarity between both languages is that they are high level languages and translate code for a computer to understand.