Answer:
The answer is "Option a".
Explanation:
In programming, the Comment is also known as the description of the source code or the program, which increases the readability of the programmer. It aims to facilitate understanding of it's code to humans, and when we this code the compilers and interpreters typically avoid it, and correct choices can be defined as follows:
In choice b, There is no use of comments in the compilation. In choice c, the multiple line comment starts with starts and ends with /* and */. In choice d, it increases the program readability.B. Imagine yourself to be a tube light. Write a short paragraph about your life. (50 to 80 words)
plese help me
Do you know LED light- I mean the tubelight that people perch and switch it on. It is used in offices, homes, schools and anywhere there are tube lights but I am something different. I am that light that shines on children’s head.
Ok, it is not actually a light in children’s head. It’s when they think of an idea so they are switching me on and they spread that means they are allowing me to shine. My head means the base is the brain that tells me that this idea is there so I shout and spread it.
Like that I was also a light in a boys head his name was Rahul. Rahul was a boy that when his mind is on studies he can top in his class but he was not understanding that he was only focusing on his sports.
One day in the classroom didi said that there is a problem that in our school there is a problem that out toilets are stinking and we need help from you children. All the lights around me were flickering because all the children were thinking of ideas. I was the only one of them who was not flickering. Rahul switched me on and let me shine, he spread it. I also know that he is not going to shatter me into pieces. He is going to persevere and he did it.
From that day, it was my daily life..on off..on off..on off..
A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooting theory that the technician will perform to resolve the laptop’s issue?
A. Document finding, actions, and outcomes
B. Identify the problem
C. Establish a theory
D. Establish a plan of action to resolve the problem
Answer:
B
.Identify the problem
MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.
Answer:
The personal preferences that can be saved are
A. Customize your bookmark bar
C Change your home page
D Enable safe browsing in your privacy setting
Explanation:
The Bookmark manager can be used for personal customization of the bookmarks in chrome
The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks
The personally preferred homepage can be selected under appearance category in the settings menu
The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.
Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos
Answer: clip art
Explanation:
The clip arts are graphic images that are pre-made illustrations for the purpose of creating any medium (designs or art). It has no restrictions to use them, it can be used by anyone, hence its copyright-free.It comes in both electronic and printed form.But mostly they are designed and distributed and used by a person in an electronic form.Hence, the complete statement is "Pre-made, copyright-free illustrations are called clip art".
Answer:
B) clip art
Explanation:
I got this question correct
Instead of using the automatic toString() method with your classes, it is usually more useful to write your own ____ version of the toString()method that displays some or all of the data field values for the object with which you use it.
a. overloaded
b. static
c. protected
d. condensed
Answer:
The answer is "Option a"
Explanation:
The overloading is the most essential aspect in the java programming This function can achieve different features with the same method term. To obtain the required information fields or entity type, the toString() function is overloaded, and the wrong choice can be defined as follows:
In option b, It is wrong because it is a keyword.In option c, It is wrong because it is an access modifier.In option d, It is wrong because it is a type of programming.1. Who is the head of the family of the Lhops?
This question is incomplete, here´s the complete question.
Read 'Untrodden World of Lhops', by John Michael Chiramal
Who is the head of the family of the Lhops?
Answer: the maternal uncle
Explanation:
The Lhops or Doyas are one of the smaller communities of Bhutan, isolated from the conventional rules of the Bhutanese society, they have the maternal uncle as the head of the family.
Not only he has complete authority over the family´s everyday life, but he´s also in charge of the children´s upbringing and providing them with an inheritance of his property.
Justify the statement "The same job title can have different job roles and different qualification criteria in different organizations." Compare job titles and their respective roles and qualifications from at least two organizations in different industries, and write a short essay explaining your reasoning.
Answer:
Below is an executive summary of this particular issue.
Explanation:
Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses. Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.Answer:
In the classified section of a local newspaper, I came across job openings for the post of a network engineer in two different companies. One was from the airline industry, while the other was from the food and beverage industry.
The airline company required an applicant to have a bachelor's degree in network administration. The job posting specified that applicants with supporting CCENT or CompTIA Security+ certifications would be preferred. The company was willing to consider candidates with no prior experience. The job responsibilities included: maintaining security, DNS, IP routing, firewalls, and troubleshooting IT-related problems. The role also required skills to manage multi-site network operations, operating systems, and other software applications in public as well as private facilities. Another responsibility was to complete the time logs in the company's records to facilitate timely and accurate billing.
For the role of a network engineer in the food and beverage industry, the required qualification was any bachelor's degree in computer science with a minimum of one year of relevant experience. Certifications were an added advantage, but they were not a necessity. The job role required skills to troubleshoot network glitches, monitor network usage, install software and hardware infrastructure, provide technical assistance to users, and suggest improvements in the system.
Explanation:
Other than hard discs and flash discs, identify other three different storage media
Answer:
A storage media is any media that can store data.
1. USB flash memory
2. Memory stick
3. Floppy disk
How do I make my kali Linux faster in my virtual box?
Answer:
If you run any operating system as a VM, it is going to be slower than if you were to run it as a native OS. You can, however, make a VM run faster by allocating more CPU cores and RAM to it in your hypervisor's (such as Virtualbox or VMWare) settings menu for your VM.
does that make sense?
What VM are you using? if your using virual box then try adding more RAM to it. I use VMware player 16 and its REALLY fast so try that. Also, go on online and look up this guy called network chuck.
Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data
Answer:
A
Explanation:
Ethernet connections allow the most mobility for users
Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access
Answer: D. The actual speed of a network can differ from the maximum advertised speeds
Explanation:
just got it correct on the test
The ___________ button represents the start of a hyperlink in Table of contents.
Answer:
An LS button
Explanation:
It appears on the (structure line 3)on the structure line, place your cursor in the white field to the right of the E button (Recall that the E button represent the entry test).
Assume the existence of a BankAccount class with a method, getAvailable that returns the amount of available funds in the account (as an integer), and a subclass, OverdraftedAccount, with two integer instance variables:
Answer: This is hard but I will research ok
Explanation:
Escribe todas las posibles combinaciones que pueden haber entre 4 bits.
Answer:
The answer is "[tex]\bold{2^n\ \ _{where} \ \ \ n \ is\ bit }[/tex]"
Explanation:
The Combinations could be produced by using n-bits [tex]2^n[/tex] . It s enables you to generate the 4-bit numbers that are:
[tex]\to 2^4 = 16[/tex] combinations.
for the 4-bit, the combination of 2 = 16, which are its possible combination and for the 10 variations appropriate 16 combinations are used, As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.
Tom walks into the accounting department and walks into a mess! User A can't access the Internet, User B has forgotten her password, User C's system is overheating to the point of smoking and the administrator is worried there might be a virus on all the systems. Whose system should he address first
Answer:
User C.
Explanation:
As per the given details, the problem of user C's system must be addressed first due to the seriousness of his case. His computer is excessively overheating up to the smoking point and if his problem is not addressed soon, it will damage the vital parts of the computer or may also explode. The other users having the problem of inability to access the internet or issue of forgotten password can be addressed later as these are minor problems that do not have as such consequences. Thus, user C is the correct answer.
Assuming that a user enters 68 as the score, what is the output of the following code snippet? int score = 68; if (score < 50) { System.out.println("F"); } else if (score >= 50 || score < 55) { System.out.println("D"); } else if (score >= 55 || score < 65) { System.out.println("C"); } else if (score >= 65 || score < 75) { System.out.println("B"); } else if (score >= 75 || score < 80) { System.out.println("B+"); } else { System.out.println("A"); } D C B A
Answer:
D
Explanation:
Using if in this way will validate one by one, and finding a true value will not validate the rest of "else if"
score = 68
if (score < 50) --> print "F"
68 < 50 --> falseelse if (score >= 50 OR score < 55) --> print "D"
68 > = 50 TRUE .... (The OR operator displays a record if any of the conditions separated by OR is TRUE)As this condition is true the system will not validate the other conditions
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud
Answer:
D) A private cloud
Explanation:
Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.
Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.
Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.
"PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a ______."
Answer: cookie
Explanation:
A cookie is a small welcome file contains the information in the form og letters and numbers.It is downloaded on to a computer when a website is visited.Hence, if a company uses a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site to generate a personalized welcome message to its visitors. This small file is called a cookie.
can a 0.90 GB storage left android phone download an app of 28 MB plsssss fast I will give you brainliest why and why not?
Answer:
Yes
Explanation:
0.9 GB = 900 MB. That is a plenty of space for a 28 MB app.
The variable dp is to refer to an array of double. Assuming the integer variable n has been assigned a value, declare dp appropriately, allocate an array of n doubles and assign the resulting pointer to dp.
Answer:
double × dp = NULL ;
int n;
n = <some value> ;
dp = new double[n]
Explanation:
According to the given question, the relevant data provided is as follows
Variable dp = Array of double
Based on the above information,
The allocation of an array for doubling n and assigned it to dp is here below:
double × dp = NULL ;
int n;
n = <some value> ;
dp = new double[n]
Hence, the above is the answer
Kris is the project manager for a large software company. Which part of project management describes the overall project in detail? Analysis report Resources document Scope Scope creep
Answer:
The given option "Resource document" is the correct answer.
Explanation:
Whenever it applies to chronology as either the documentation a resource records collection of specific documents should indeed be regarded as a component of this kind of record. The resource component encompasses a series of proclamations provided by the researcher including its memorandum, and therefore is willing to take responsibility for each other by the very same body is nonetheless accountable again for the file.The remaining three options do not apply to something like the specified scenario. And the latter is the correct one.
Answer:
Resource document
Explanation:
Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective data______program.
a. data structuring.
b. data privacy.
c. data recovery.
d. data piracy.
Answer:
b. data privacy
Explanation:
one of the importance jobs is establishing an effective data privacy program inorder to keep tracks of sensitive information or documents and how it is collected, stored, and use.
Data privacy which is also refer to as information privacy is the aspect of information technology that deals with the capacity of an organization in safeguarding the information received.
write some Drawbacks of the internet
Explanation:
Computer Virus can spread.
Data can be hacked.
It has made peoples lazy
It cannot work about electricity and mobile and computer like devices
..
Thank me if you like.. and follow me..
Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers.
Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
A. src
B. loop
C. controls
D. preload
Answer:
I think it's preload :P
Explanation:
But just be sure with some sources ok ! :♡
A binary search function is searching for a value that is stored in the middle element of an array. How many times will the function read an element in the array before finding the value?
Answer: 1 time.
Explanation:
A binary function is also known as a half-interval search is a search algorithm to find the position of a given element x within a well-sorted array []. Binary search compares the target value to the middle element of the array.It ignores half of the elements just after one comparison. it compares x with the middle element.So, the function read an element one time in the array before finding the value.
if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next 10 seconds then he has Dash velocity
Answer:
[tex]\frac{1}{3}\ m/s[/tex]
Explanation:
The computation of the velocity by using the following formula is
As we know that
[tex]Velocity = \frac{Displacement}{Total\ time\ taken}[/tex]
where,
Displacement is 10 meters
Total time taken is 30 seconds
Now placing these values to the above formula
So, the velocity of Dash is
[tex]= \frac{10\ meters}{30\ seconds}[/tex]
[tex]= \frac{1}{3}\ m/s[/tex]
We simply applied the above formula so that we can get the velocity and the same is to be considered
Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their lamp is not lit; others complain that their lamp is on, but there are no new messages. You suspect that the server is not making MWI calls. How can you quickly check whether or not this is the case
Answer:
You should run the port activity report.
Explanation:
In this scenario, several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of message waiting indicator (MWI) problems. Some have new messages, but their lamp is not lit; others complain that their lamp is on, but there are no new messages. You suspect that the server is not a making message waiting indicator (MWI) calls.
In order to quickly check whether or not this is the case, you should run the port activity report.
A message waiting indicator (MWI) can be defined as a Cisco proprietary lamp, flashing liquid crystal display (LCD) panel, or special dial tone installed on the phones of a user which enables him or her to know a voice message waiting. When a message is waiting, the phone system is notified by the Cisco Unity Connection to activate the message waiting indicator on the user's phone.
The procedure for running the port activity report are;
1. Click on "reports" in the tool menu of the Cisco Unity Connection Serviceability.
2. Then click on "port activity report" on the serviceability report page.
3. Select the necessary options and lastly, click on "generate report."
Consider the following code snippet. File hoursFile = new File("hoursWorked.txt"); Your program must read the contents of this file using a Scanner object. Which of the following is the correct syntax for doing this? Scanner in = new Scanner("hoursWorked.txt"); Scanner in = new Scanner(hoursFile); Scanner in = Scanner.open(hoursFile); Scanner in = Scanner("hoursWorked.txt");
Answer:
Scanner in = new Scanner(hoursFile);
Explanation:
The syntax to read the content of a file after the file has been created/initialized is as follows;
Scanner [variable-name] = new Scanner([object-name]);
From the question above, the [object-name] is hoursFile
Substitute [object-name] with hoursFile, the syntax becomes
Scanner [variable-name] = new Scanner(hoursFile);
[variable-name] can be anything as long as it follows variable naming convention;
From the list of given options, the option that answers the question is: Scanner in = new Scanner(hoursFile);
What are the types of computers?
Answer:There are 5 types of computers.
Explanation:(1)Super computer: are the fastest and expensive computer.super computer can do trillion calculations in every second.
(2)Mainframe: are similar to the super computers all use raw power focus on few tasks.
(3)Server computer: is a central computer that contain of collection data and program.
(4)Personal computer: is also known as a microcomputer.personal computer is all around can be used as productivity tool.
(5)Work station: are expensive computers and more complex and are intended one user at a time.
Answer:
the four types of computers are;
personal computerMainframe computersuper computersMini computersComputer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
a) true
b) false
The correct answer is True
Explanation:
Computer security is a branch of security that focuses on the security of computer systems. This includes preventing cyber attacks that could steal the information or damage the software (programming code), as well as, preventing physical attacks or damage, this includes stopping unauthorized personnel from accessing the computers or devices and limiting the damages that might occur in situations such as fires, floods, etc. Additionally, computer security is now an important factor in most companies and organizations as relevant information is saved in computers, also, many functions rely on the use of computer systems.
According to this, the statement about computer security is true because this comprises the protection of hardware, software, and information in cases such as natural disasters, intrusions, etc.
A user receives an email containing a co-workers birth date and social security number. The email was not requested and it had not been encrypted when sent. What policy does the information in the email violate
Answer:
PII
Explanation:
The information in the email violates the PII. That is Personally identifiable information. PII, are nothing but any data that could potentially be used to identify a person. Examples of which can be a full name, Social Security number, driver's license number, bank account number, passport number, and email address, etc.