Answer:
Slide Show View takes up the full computer screen, like an actual slide show presentation. In this full-screen view, the presentation is shown the way it will be seen by the audience. Graphics, timings, movies, animated elements, and transition effects are shown how they will look in the actual show.
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called
Answer: Posture assessment
Explanation:
Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.
Posture assessment has to do with how the system security is evaluated based on the applications and the settings.
Select all the correct answers.
John travels all over the country visiting various clients. He needs to access his documents and services on the go. Which of these technologies
allows him to access documents and software while on the move?
A:cloud computing
B: grid computing
C:mobile computing
D:green computing
E:virtualization
Answer:
acd
Explanation:
i cant explain
Answer:
A
C
D
Explanation:
Plato
You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database technology is best suited to hold the session state in this example
Answer: Amazon DynamoDB
Explanation:
The database technology that is best suited to hold the session state in this example is the Amazon DynamoDB.
Amazon DynamoDB is a document database which helps in delivering high quality and fast cperformance at any scale. It can be used to scale to hundreds of thousands of concurrent users as it's multi-active, and has a durable database that has built-in security.
what is a cell address in xsl sheet
Answer:
cell address is the exact location of a particular cell of ms-excle
Explanation:
A1 refers to first row and first column.
A2 refers to second row first column.
i.e.
in 'A1' : 'A' indicate column { A= first column, B= second
column, C= third column. and soon.....}
'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}
(25 POINTS)Which statement best reflects the importance of following safety guidelines?
Workplace injuries can result in losses to an organization’s profits.
OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.
Every year, thousands of people die as a result of workplace injuries.
Using equipment safely is faster and makes work more efficient.
Answer:
I think, Every year, thousands of people die as a result of workplace injuries.
Answer:
B
Explanation:
What is the difference between manual and computer typesetting?
Answer:
Manual typesetting: The form was placed in a press, inked, and an impression made on paper. During typesetting, individual sorts are picked from a type case with the right hand, and set into a composing stick held in the left hand from left to right, and as viewed by the setter upside down.
Computer typesetting: Computerized typesetting, method of typesetting in which characters are generated by computer and transferred to light-sensitive paper or film by means of either pulses from a laser beam or moving rays of light from a stroboscopic source or a cathode-ray tube (CRT).
product of -6/13 and reciprocal of -7/16 is ____________
Answer:
-250/91
Explanation:
Use a calculator
Which occurs when private details of a class are hidden from other classes or parts of the program that uses instances of the class?
inheritance
polymorphism
encapsulation
operation overloading
Answer:
Encapsulation
Explanation: got it right
Answer:
Encapsulation
Explanation:
I took the quiz.
If you are worried that team members will not keep sensitive information private, you could ask them to sign a ________ agreement.
A. Non-confidentiality
B. Security
C. Non-disclosure
Answer:
C
Explanation:
It has legal reproduction if you break it, many nannys that work for a famous person/people have to sign a non-disclosure before they're hired.
Which statement best describes a database?
Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.
I think it's a. A collection of related tables
fill in the blanks with correct pronounce
i like watches.The nice watch is for ________
Answer:
I like watches. This nice watch is for me.
Francesca wants to create a program that will produce the phrase “Hello, world” on the screen. Which of these functions should Francesca use?
Answer:
It would be print.
Explanation:
If you want to execute a function it should be print so it will show up in the output box.
An application programming interface (API) is ________. (1 point) the code the application software uses to take advantage of code written by others the currently active part of an application the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM
Answer:
an interface
Explanation:
(API) is an interface that defines interactions between multiple software applications or mixed hardware-software intermediaries.
Pascal system . write the program that will calculate the perimeter of a rectangle if its area is A (m²) and one of its sides has a length of B (m). A and B are entered from the keyboard.
Answer:
The program in Pascal is as follows:
Program Perimeter;
Uses Crt;
Var
Length : Real;
Width : Real;
Area : Real;
Perim : Real;
Begin
Clrscr;
Write('Area: ');
Readln(Area);
Write('Length : ');
Readln(Length);
Width := Area/Length;
Perim := 2 * (Length + Width);
Write('Perimeter: ' ,Perim:5:2,'.');
End.
Explanation:
This declares all variables as real
Var
Length : Real;
Width : Real;
Area : Real;
Perim : Real;
The program execution begins here
Begin
This clears the screen
Clrscr;
This prompts the user for Area
Write('Area: ');
This gets input for Area
Readln(Area);
This prompts the user for Length
Write('Length : ');
This gets input for Length
Readln(Length);
This calculates the width
Width := Area/Length;
This calculates the perimeter
Perim := 2 * (Length + Width);
This prints the calculated perimeter
Write('Perimeter: ' ,Perim:5:2,'.');
This ends the program
End.
In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the remaining 70 students are 12 or older. How many students are 10?
Answer: 10 students
Explanation:
Students younger than 10 = 50%
Students that are 10years old = 1/20 = 1/20 × 100 = 5%
Students that are older than 10 but younger than 12 = 1/10= 1/10 × 100 = 10%
Students that are 12 years or older
= 100% - (50% + 5% + 10%)
= 100% - 65%
= 35%
This means that 35% of the students are 12 years or older and we've been given the number as 70.
Let's say the total number of students is x. Therefore,
35% of x = 70
0.35 × x = 70
0.35x = 70
x = 70/0.35
x = 200
The total number of students is 200.
Therefore, the number of students that are 10years will be:
= 1/20 × 200
= 10 students
Therefore, 10 students are 10 years.
Help! ASAP! 1 Question.........°○°
Answer: I think D)?
Explanation: Or B)
Need answer ASAP!!!!
Hi,
I tried answering this. Lol. Look at the image.
Andy is working on a project to build an accounting software program for his firm. He uses old programming modules that contained code to perform various processes and links them to create a complete system. Which approach does he apply to the program design?
A.
structured programming
B.
non-structured programming
C.
top-down approach
D.
bottom-up approach
E.
modular programming
Answer:
E. modular programming
Explanation:
Andy is applying a design known as modular programming. This is basically a design in which the entire project is broken down into various parts known as modules. Each one of these modules performs a very different and unique task. As the modules are created they are linked together like pieces of a puzzle in order to form the entire project. This makes tackling a large project much easier and makes debugging problems much easier as well.
Where do animators work?
How do companies use web sites?
What is an operating system?
What is a database?
What is an app?
Chlorine has two naturally occurring isotopes that are 35cland 37cl, the accurate masses and abundance are 34.96 and 75.6%and 36.97 and 24.4% respectively calculate the relative atomic mass of cl.
[tex] \implies \huge \tt \underline \red{answer}[/tex]
Hlo
which processor is compatible with an AM2+ socket
Answer:
Amd phenom x4 9950 black edition
Explanation:
How do we calculate the BMI in python?
the formula is kg/m²
Answer:
height = float(input("Enter your height in m: "))
weight = float(input("Enter your weight in kg: "))
BMI = weight / (height/100)**2
print(f"You BMI is {BMI}")
Explanation:
The python code for calculating BMI is as follows -
height = float(input("Enter your height in m: "))
weight = float(input("Enter your weight in kg: "))
BMI = weight / (height/100)**2
print(f"You BMI is {BMI}")
Some conditions can also be added such as
if BMI <= 15:
print("You are underweight.")
elif BMI <= 30:
print("You are healthy.")
elif BMI <= 40:
print("You are over weight.")
Pleaseeee hellppp!!!!!
Answer:
credit card info and delivery address
Explanation: