multi tasking is the act of doing more than one thing at the same time
Answer:
Multitasking, the running of two or more programs (sets of instructions) in one computer at the same time. Multitasking is used to keep all of a computer's resources at work as much of the time as possible
Select the correct answer.
A student is browsing a website. While browsing, he clicks on a link that takes him to another website. Which code gives the correct format of the
external link?
Answer:
(B) because on a website IT HAS TO HAVE "WWW." first
is monitor is a television
Answer: Can you rephrase the question
Explanation:
Who did Connie Macpherson think her visitor was?
Connie Macpherson thought that her visitor was her husband,Jim!
I hope it will helps you!
You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time. You want to look at a report that shows important events for the server since it was installed. You'd like to see when software was installed and if there are any hardware or application failures. What is the simplest way to view this information
Answer: Open Reliability Monitor.
Explanation:
The simplest way to view this information is to open the reliability monitor.
The Reliability Monitor shows you the stability history of a system at a glance and also allows one to see the details of the events that has an effect on reliability on a daily basis.
The reliability and problem history chart which can be seen in the Reliability Monitor helps in keeping track of the overall health of the server on a daily basis.
What do you suggest for Father's Day?
What can queries provide that viewing a table in Datasheet view cannot provide?
Answer:
D) data from more than one table
Explanation:
Just took it!
Why do people enjoy codehs
Answer: this is a moral question, but here is my view
Explanation:
we get to learn about things like java which i am currently learning for AP computer science A
Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.
Which of the following is recalling the main points of a text?
Answer:
Option A< Rote learning
Explanation:
Options for given question
a) Rote learning
b) memorizing
c) Adapting
d) Seeming
Recalling of facts is associated with rote learning in which the education is de-emphasized in the form of science
Hence, option A is correct
Rinaldo and his game design team have
Answer:
HAVE DA baby
Explanation:LLLLLLLLLLLLLLLLLLLLLETS GOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures
Please help ASAP
Answer:
clip art
Explanation:
i hope this helps you
statement
Looping
WAP to display
name 50 times.
Answer:
can you specify what program you're doing this in? I can do qbasic and maybe python
Ethan wants to change the font in his document. He should _____.
delete the text, select a font, and type
select a new font and highlight the text
highlight the text and select a new font
zoom in on the text, click on style, and make a selection
Answer:
C because it will work. I tried that a lot of time with documents.
Explanation:
Answer:
Ethan wants to change the font in his document. He should _____.
A. delete the text, select a font, and type
B. select a new font and highlight the text
C. highlight the text and select a new font
D. zoom in on the text, click on style, and make a selection
It is highlight the text and select a new font
Explanation:
When numbers are formatted in percent format, they are multiplied by _______ for display purposes.
1000
100
10
20
2. Which Interface uses
images/icons to make it easier for
the user? *
Command Line
Graphical
Voice Command
Textbased
Answer:
Voice CommandExplanation:
correct me if I am wrong✔
Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have to a top-secret file?
A. ACE
B. DAC
C. MAC
D. RBAC
Q2. Which physical access control uses a portable device that authenticates a person's identity electronically by storing some sort of personal information?
A. Infrared scanners
B. Hardware security tokens
C. Biometric devices
D. Keypads
Q3. Which implementation of Network Access Control grants access depending on a specific job role?
A. DAC
B. RBAC
C. MAC
D. PAC
Q4. Which implementation of Network Access Control is more relaxed, allowing users to determine file access privileges?
A. AAC
B. MAC
C. DAC
D. RBAC
Q5. Which type of access control sets the standard for the way security actions unfold?
A. Identity
B. Management
C. Physical
D. Technical
Answer:
1. MAC
2. Biometric Devices
3. RBAC
4. DAC
5. Management
Explanation:
Q.1) Option c) MAC
Q.2) Option c) Biometric devices
Q.3) Option b) RBAC
Q.4) Option c) DAC
Q.5) Option b) Management
What is MAC ?
The ability of individual resource owners to allow or refuse access to resource objects in a file system is constrained by the security measure known as mandatory access control (MAC).
What is a biometric device ?
An authentication and security identification tool is a biometric gadget.
What is RBAC ?
Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system.
What is DAC ?
The idea behind discretionary access control is to limit access to things based on who the subject is.
Therefore, MAC, biometric device, RBAC, DAC and Management access control sets are some of the measures for network security and access control.
You can learn more about network security from the given link
https://brainly.in/question/33317398
#SPJ2
A dictionary is also known as
Answer:
wordbook, lexicon or vocabulary
Explanation:
learned, dunno what lesson ur doing tho
Climax Medical Technology, a fast-growing global research firm, has accumulated so much client information that conventional database management systems cannot handle its customers' needs. Therefore, Climax purchased very sophisticated analysis software and supercomputing-level hardware. Climax Medical Technology is tapping the power of Group of answer choices mega IT. new age computing. super data. cyber-age databases. Big Data.
Answer:
big data.
Explanation:
It is correct to say that by implementing very sophisticated analytics software and supercomputing level hardware, Climax Medical Technology is harnessing the power of big data.
This is a tool capable of storing a large volume of data and making them available for organizational management in a structured, strategic and informative way, which helps an organization to achieve a competitive advantage in the market.
Big Data makes structured and unstructured data accessible to a company, so that they can use them intelligently for business solutions and to aid in the management and data collection process, helping to create more value and continuous improvement in an organization.
You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems
Answer:
interference
Explanation:
The most likely reason for the connectivity problems is interference. This interference can be caused by many factors but in this scenario the most likely factor would be the metal studs and all the metal used to create the ceiling/floor. Metal is a huge interference when it comes to wifi signals. Depending on the type of metal and the amount it can greatly diminish the signal strength or even completely prevent the signal from passing to it's destination, regardless of how close the destination device is located.
5.What is returned by the call go(30)?
public static String go ( int x)
{
String s = "";
for (int n = x; n > 0; n = n - 5)
S = S + x +
return s;}
Answer:
The string returned is: 303030303030
Explanation:
Given
The above method
Required
The returned string
The method returns a string that is repeated x/5 times.
Take for instance;
x = 30
The method will return a string that contains x in 30/5 (i.e. 6) times
Hence, the result of go(30) is 303030303030
describe the third generation of computers
Answer:
The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry.
The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.
Third Generation
The main features of third generation are −
IC used
More reliable in comparison to previous two generations
Smaller size
Generated less heat
Faster
Lesser maintenance
Costly
AC required
Consumed lesser electricity
Supported high-level language
Some computers of this generation were −
IBM-360 series
Honeywell-6000 series
PDP (Personal Data Processor)
IBM-370/168
TDC-316
Which media example would be best for mayas presentation
Answer: c. a diagram that explains the steps involved in photosynthesis
Explanation:
The best graphic to use would be one that explains the processes involved in the process of photosynthesis. The best option is therefore the third one as it would actually show useful information on what photosynthesis is and how plants use it to get energy.
The first option would not educate anyone on what photosynthesis is as it does not talk about the process. The second and fourth options are the same.
the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m.
The computers that communicate with each other are called [tex]\sf\purple{transmission \:control\: protocol\: (TCP)}[/tex].
[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}[/tex]
What do we call the research techniques that try to predict the future?
Explanation:
It describes the application of a statistical or machine learning technique to create a quantitative prediction about the future.
39 POINTS !
Okay so basically I have a 60 percent keyboard, and it’s LED perfect in shape jkeyboard okay.
I try connecting it to my ps4 and it’s detected but it won’t light up nor will any of the keys respond.
I have tried resetting my ps4
Iv’e tried unplugging and replacing in
I’ve tried holding FN and N to disable the n rollkey
I be tried plugging it into a pc
But nothing wors does anyone know how to fix it?
Answer:
Contact a service center electronics managementAnswer:
take it back to the store with your the receipt and get a new one
What is one common way to select a package name for a project?
Select one:
a.
Use a company's domain name for uniqueness
b.
Use a very short name to save typing
c.
Use a secret phrase like a password
d.
Use an encryption key for security
Answer:
Jeez idrk
Explanation:
Akkaqka
Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user. Before transmission, you hash the message and then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. Which protection does the private key-signing activity of this process provide
Answer: integrity
Explanation:
Hashing refers to changing a string of characters into shorter fixed-length value which represents the original string. Hashing is faster to find items in the database.
Based on the information given, the protection that he private key-signing activity of this process provide us integrity.
¿Como explicarian que es un programa y la diferencia con el concepto de software y aplicacion.
Answer:
Un programa de computadora es un conjunto de instrucciones que una computadora puede entender, escrito en un lenguaje de programación específico, en el caso de lenguajes de bajo nivel también en una arquitectura de computadora específica. En la mayoría de los casos, los programas se compilan en un formato que la computadora puede entender. A su vez, el conjunto de programas de una computadora es denominado software, mientras que una aplicación es un tipo específico de programa informático, especialmente utilizado en teléfonos móviles.
Scrieți un program care citește un număr natural n și determină suma cifrelor divizibile cu 3 ale lui n.
Date de intrare
Programul citește de la tastatură numărul n.
Date de ieșire
Programul va afișa pe ecran, c, suma cifrelor divizibile cu 3 ale lui n,
Exemplu
Intrare
7360914
Ieșire
18
When you use a business class with an object data source, the business class Group of answer choices must have attributes that match the names of the bound fields must have public properties that match the names of the bound fields must have a constructor with parameters that match the names of the bound fields must have get and set procedures that match the names of the bound fields
Answer: must have public properties that match the names of the bound fields
Explanation:
When a business class is used with an object data source, the business class must have public properties that match the names of the bound fields.
Having an attribute which match the names of the bound fields isn't necessary as well as having a constructor with parameters that match the names of the bound fields
Therefore, the correct option is B.