You are the administrative assistant for the Psychology Department in your college, and they have assigned you to set up a small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users. For example, faculty will use the server to post and receive class assignments. Which edition of Windows Server 2016 is most appropriate for this situation?

Answers

Answer 1

Answer: Standard edition

Explanation:

Based on the information given in the question, the edition of Windows Server 2016 that is most appropriate for this situation will be the standard edition.

Since it's going to be fora small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users, the standard edition is appropriate.

Standard edition is ideal in a scenario whereby there's a non-virtualized environments or low density with regards to the population.


Related Questions

What you need to know In this program, a roll string is a number, followed by a lowercase "d", followed by another number. The first number is the number of dice to roll. The second number is the number of sides on each die. For example, 1d6 means there is one die with six sides. The total output of the roll is a random whole number between one and six, inclusive. 2d8 means there are two dice, each with eight sides. The total output of the roll is a random whole number between two and 16, inclusive. Since we are using a computer, we can have an input like 500d1000 (meaning a 1000-sided die, rolled 500 times) which would not be possible in real life.
Function: get_roll(rollstring)
This function takes an input parameter as a string that looks like "1d3", "3d5", etc. The function should return an integer simulating those dice rolls. In the case of "3d5", for example, the function will generate a random number between one and five, three times, and return the total (sum) as an integer. This function should return the value back to get_damage().
Function: get_damage(attack, defense)
This function gets the value of damage based on roll strings. Player 1 (the first roll) is always on attack; Player 2 (the second roll) is always on defense. If the defense roll is greater than the attack roll, return 0. Otherwise, return attack minus defense, as an integer. This function should call get_roll() twice, once for each Player. This function should return the value back to main_main().
Function: main_menu()
In this function, ask the user how many rounds they want to play. Next, ask the user to input Player 1 and Player 2’s dice for roll one, roll two, etc., up to the number of rolls they entered. The rolls for each round must be entered on one line with no spaces. This function should call get_damage() for each round.

Answers

Answer:

import random

def get_damage(attack,defense):

   attack_roll = get_roll(attack)

   defense_roll = get_roll(defense)

   if defense_roll>attack_roll:

       return 0

   else:

       return attack_roll-defense_roll

def main_menu():

   rounds = int(input('Enter the number of rounds to play? '))

   for round in range(1,rounds+1):

       p1=  input('Player 1 enter rollstring: ')

       p2=  input('Player 1 enter rollstring: ')

       damage = get_damage(p1,p2)

       print('Round: #{}, Damage: {}'.format(round,damage))

def get_roll(rollstring):

   dices, sides = rollstring.split('d')

   total = 0

   for roll in range(int(dices)):

       total += random.randint(1, int(sides))  

   return total

main_menu()

Explanation:

The main_menu python function is the module dice game that prompts for user input to get the number of times a round is played to call the get_damage function which in turn calls the get_roll function to simulate the dice roll and return the accumulated total of the sum of the random dice value.

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
O email address
O web address
O UNC path
O All will be automatically converted.

Answers

Answer:

UNC path seems to be the answer

Answer:

UNC path

Explanation:

The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a computer program is only a necessary and not a sufficient condition for reasonable [program] correctness. Rewrite this statement without using the words necessary or sufficient.

Answers

Answer:

A computer program is not reasonably correct if it has no error messages during translation.

 

Explanation:

First, we need to understand what the statement means, and we also need to identify the keywords.

The statement means that, when a program does not show up error during translation; this does not mean that the program is correct

Having said that:

We can replace some keywords as follows:

absence of error messages := no error messages

Assume in the for loop header, the range function has the three arguments: range (1, 10, 3), if you were to print out the value of the variable
in the for loop header, what will be printed out? List the values and separate them with a comma.

Answers

Answer:

1, 4, 7

Explanation:

The instruction in the question can be represented as:

for i in range(1,10,3):

   print i

What the above code does is that:

It starts printing the value of i from 1

Increment by 3

Then stop printing at 9 (i.e.. 10 - 1)

So: The sequence is as follows

Print 1

Add 3, to give 4

Print 4

Add 3, to give 7

Print 7

Add 3, to give 10 (10 > 10 - 1).

So, it stops execution.

Select the true statement about network protocols.A protocol determines how the sending computer notifies the receiving computer about the presence of compressed data.A protocol determines how it will be executed on every networked device.A protocol determines how the sending device notifies the receiving device that there is data to be sent.A protocol is not required for all data transmissions.

Answers

Answer:

A protocol determines how the sending device notifies the receiving device that there is data to be sent.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A protocol can be defined as a standard set of rules established by the regulatory agencies to determine how data are transmitted from one network device to another.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

A protocol determines how the sending device notifies the receiving device that there is data to be sent, regardless of any difference in terms of structure or design.

how to learn python ?

Answers

Answer:

See below.

Explanation:

To learn python programming language, first, you have to know the basic. Surely, you may recognize this function namely print()

print(“Hello, World!”) — output as Hello, World!

First, start with familiarizing yourself with basic function such as print. Then step up with arithmetic and declare or assign variable then list.

Here are example of functions:

1.) print(argument) — If argument is a string (word-typed), make sure to use “” or ‘’ or else it’ll output an error and say the argument is not defined.

print(“Hi, Brainly”) will output Hi, Brainly

print(2+3) will output 5

Numerical data or numbers do not necessarily require “ “ or ‘ ‘

print(3+3) will output 6 but print(“3+3”) will output 3+3 which is now a string.

2.) type(argument) - this tells you which data/argument it is. There are

< class ‘str’ > which is string, meaning it contains “ “ or ‘ ‘< class ‘int’ > which is integer< class ‘float’ > which is decimal (20.0 is also considered as float, basically anything that contains decimal is all float type)< class ‘list’ > which is a list. List is something that contains elements within square brackets [ ]

etc.

Make sure you also do print(type(argument)) as well so it will print out the output.

3.) Arithmetic

+ is addition

Ex. print(1+3) will output 4

   2. - is subtraction

Ex. print(5-4) will output 1

   3. * is multiply

Ex. print(4*5) will output 20

   4. ** is exponent

Ex. print(5**2) will output 25

   5. / is division

Ex. print(6/3) will output 2 — sometimes will output the float type 2.0

   6. % is modulo or remainder

Ex. print(7%2) will output 1

4.) Variables

To assign a variable, use =

An example is:

x = 2

y = 5

print(x+y) will output 7

print(type(x)) will output the < class ‘int’ >

These are examples of what you’ll learn in basic of python - remember, programming depends on experience and always focus on it. Keep practicing and searching will improve your skill at python.

1.An algorithm used to find a value in an array is called a ______________.
2.A search algorithm returns the element that we’re searching for, rather than the index of the element we’re searching for.
A.True
B.False
3.Suppose we used our searching algorithm to look for a specific element in a list. The algorithm returned -1. What does this mean?

A.Our algorithm found the element we were looking for which is -1.
B.Our algorithm did not find the element we were looking for.
C.Our algorithm found the element, but could not determine the index.
D.Our algorithm found the element at index -1.

Answers

Answer:

1.search 2.False 3.Our algorithm did not find the element we were looking for.

Explanation:

An algorithm used to find a value in an array is called a:

Search

A search algorithm returns the element that we’re searching for, rather than the index of the element we’re searching for is:

False

If we used our searching algorithm to look for a specific element in a list and the algorithm returned -1. The thing which this means is:

Our algorithm did not find the element we were looking for.

What is Algorithm?

This refers to the use of well defined instructions to execute a particular problem in sequential order.

With this in mind, we can see that algorithm is used to search for particular items and when the item is not found, then there would be a return of -1 because the element was not included in the array.

Read more about algorithms here:
https://brainly.com/question/24953880

pharmaceutical company is using blockchain to manage their supply chain. Some of their drugs must be stored at a lower temperature throughout transport so they installed RFID chips to record the temperature of the container. Which other technology combined with blockchain would help the company in this situation?

Answers

Answer:

Artificial Intelligence (AI)

Explanation:

Artificial Intelligence (AI)

In this question, the answer is "Artificial intelligence", it is used as the simulation of human intelligence processes by machines, especially computer systems, which is called artificial intelligence.

Expert systems, natural language, voice recognition, and object detection are just a few of the specific uses of AI.Its convergence of blockchain technologies such as AI can accelerate machine learning and allow AI to produce and exchange financial goods.The blockchain enables secure storage and data sharing or anything else of value. In this, the data is analyzed, and insights and derived from it to generate value.

Learn more:

Artificial intelligence: brainly.com/question/17146621

User ideas for ro blox? I prefer no numbers or underscores.

Answers

do what the other person said

Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral device should she use?
A.
voice recognition
B.
microphone
C.
mouse
D.
compact disk

Answers

C. mouse is the answer

The child’s game, War, consists of two players each having a deck of cards. For each play, each person turns over the top card in his or her deck. The higher card wins that round of play and the winner takes both cards. The game continues until one person has all the cards and the other has none. Create a program that simulates a modified game of War.
The computer will play both hands, as PlayerOne and PlayerTwo, and, for each round will generate two random numbers and compare them.
If the first number is higher, PlayerOne’s score is increased by 1 and if the second number is higher, PlayerTwo’s score is increased by 1.
If there is a tie, no score is incremented.
When one "player" reaches a score of 10, that player should be deemed the winner and the game ends.
The range of numbers should be 1-13 to simulate the values of cards in the deck.

Answers

Answer:

In Python

import random

p1 = 0; p2 =0

while(p1 <10 and p2<10):

   p1play = random.randint(1,14)

   p2play = random.randint(1,14)

   print("Player 1 roll: "+str(p1play))

   print("Player 2 roll: "+str(p2play))

   if p1play > p2play:

       p1+=1

       print("Player 1 wins this round")

   elif p1play < p2play:

       p2+=1

       print("Player 2 wins this round")

   print()

print("Player 1: "+str(p1))

print("Player 2: "+str(p2))

if p1 > p2:    print("Player 1 wins")

else:    print("Player 2 wins")

Explanation:

See attachment for complete program where comments were used to explain some lines

80. A .......... is used to read or write data.
A. CD B. VDU C. ROM D. RAM​

Answers

Answer:

Depending on exactly what they mean by read and write, both A and D are valid.  In fact, if you read that as "read or write" as being a logical OR and not the logical AND that the sentence probably intends, then all four answers could be correct.

What they probably mean to say though is "..... is used as a read/write storage medium", in which case A is the correct answer.

A.  Data can be written to or read from a CD.  This is probably the "right" answer

B. A human can "read" data from a Visual Display Unit, and the computer "write" it.  That of course is not the intended meaning though.

C.  Data can be read from Read Only Memory, but not written to.

D. Data can be both read and written to Random Access Memory, but not retained after the computer is powered off.

Find the distance between the points.


(5,-2),(-6,-2)

Answers

Answer:

-24

Explanation:

because

3(-6 -2) then

3×(-8) > -24

Return a formatted string with numbers The function below takes three numerical inputs: num1, num2, and num3. Implement it to return a formatted string with an underscore between the first two numbers and space, exclamation point, and another space between the second and third number. For example, if the inputs are 1, 2, and 3, then the function should return the string '1_2 ! 3'.

Answers

Answer:

In Python:

def ret_formatted(num1,num2,num3):

   result = str(num1)+"_"+str(num2)+" ! "+str(num3)

   return result

Explanation:

This defines the function

def ret_formatted(num1,num2,num3):

This generates the output string

   result = str(num1)+"_"+str(num2)+" ! "+str(num3)

This returns the result string

   return result

For this exercise, you are going to complete the printScope() method in the Scope class. Then you will create a Scope object in the ScopeTester and call the printScope.
The method will print the name of each variable in the Scope class, as well as its corresponding value. There are 5 total variables in the Scope class, some of which can be accessed directly as instance variable, others of which need to be accessed via their getter methods.
For any variable that can be accessed directly, use the variable name. Otherwise, use the getter method.
Sample Output:
The output of the printScope method should look like this:
a = 5
b = 10
c = 15
d = 20
e = 25
public class ScopeTester
{
public static void main(String[] args)
{
// Start here!
}
}
public class Scope
{
private int a;
private int b;
private int c;
public Scope(){
a = 5;
b = 10;
c = 15;
}
public void printScope(){
//Start here
}
public int getA() {
return a;
}
public int getB() {
return b;
}
public int getC() {
return c;
}
public int getD(){
int d = a + c;
return d;
}
public int getE() {
int e = b + c;
return e;
}
}

Answers

Answer:

Explanation:

The following is the entire running Java code for the requested program with the requested changes. This code runs perfectly without errors and outputs the exact Sample Output that is in the question...

public class ScopeTester

{

public static void main(String[] args)

{

       Scope scope = new Scope();

       scope.printScope();

}

}

public class Scope

{

private int a;

private int b;

private int c;

public Scope(){

a = 5;

b = 10;

c = 15;

}

public void printScope(){

       System.out.println("a = " + a);

       System.out.println("b = " + b);

       System.out.println("c = " + c);

       System.out.println("d = " + getD());

       System.out.println("e = " + getE());

}

public int getA() {

return a;

}

public int getB() {

return b;

}

public int getC() {

return c;

}

public int getD(){

int d = a + c;

return d;

}

public int getE() {

int e = b + c;

return e;

}

}

The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis_ but there is a large variety of best practices that do not appear to be in place. Which of the following would be BEST to ensure all systems are adhering to common security standards?
A. Configuration compliance
B. Patch management
C. Exploitation framework
D. Network vulnerability database

Answers

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

Which lighting technique can often heighten a dramatic story?

No lighting.
Front lighting.
Natural lighting.
Side or back lighting.

Answers

Answer:

side or back lighting

Explanation:

big brain

Computers were originally invented to
Group of answer choices
A.to share information on the Internet.

B.make complex mathematical calculations possible and make tasks easier for humans.

C.to play video games.

Answers

Answer:

B

Explanation:

It's B because why would it me made to play video games

Answer:

B

Explanation:

A, the internet didnt exist yet, so it cant be this

C, video games would require computers, so its ruled out on a similar basis as the previous

Why would an organization need to be aware of the responsibilities of hosting

personal data in its platforms?

Answers

Answer:

Providing transparent services for platform customers. Following data protection regulations to avoid disruptions from lack of compliance.

How many people has the largest cyber attack killed?

Answers

More that 1,000,000,000

Answer:

I think it's MyDoom?? I heard it's the most dangerous cyber attack in history since it caused 38 billion dollars.

User ideas for ro blox?

Answers

Answer:

You can put random people, or something you like to do, like Soccer2347 (that was just an example) or your favorite animal, Horse990. But Rob lox has to approve it first

Explanation:

Answer:

You can do a lot of usernames despite the fact that a lot of them have also been taken already. You can do something like your favorite food, sport, etc, and combine it into a couple words, and then add numbers to the end if the name has been taken already.

There is a nickname feature too which let's you name yourself whatever you want.

Consider the following code segment, which is intended to create and initialize the two-dimensional (2D) integer array num so that columns with an even index will contain only even integers and columns with an odd index will contain only odd integers.
int[][] num = /* missing code */;
Which of the following initializer lists could replace /* missing code */ so that the code segment will work as intended?
A. {{0, 1, 2}, {4, 5, 6}, {8, 3, 6}}
B. {{1, 2, 3}, {3, 4, 5}, {5, 6, 7}}
C. {{1, 3, 5}, {2, 4, 6}, {3, 5, 7}}
D. {{2, 1, 4}, {5, 2, 3}, {2, 7, 6}}
E. {{2, 4, 6}, {1, 3, 5}, {6, 4, 2}}

Answers

Answer:

A. {{0, 1, 2}, {4, 5, 6}, {8, 3, 6}}

Explanation:

From the options, we can see that the array is a 3 by 3 array and the array index (whether row or column) begins at 0.

So, the column index for this array is 0, 1 and 2.

Column number 0 and 2 will be treated as the even column while column number 1 will be treated as the odd columns.

Of all options (a) to (e), option (a) fits the requirement of the question; hence; (a) answers the question.

Answer:

A

Explanation:

because the index is even

1. How important is e-mail communication to you? Why?

Answers

Answer:

Communicating by email is almost instantaneous, which enhances communications by quickly disseminating information and providing fast response to customer inquiries. It also allows for quicker problem-solving and more streamlined business processes.

can someone write the answers pls :(?

Answers

Answer:

A:  job sharing.

B: part-time working.

C:  flexible hours.

D:  compressed hours.

A: Payroll workers, Typing pool workers, Car production workers, Checkout operators, Bank workers

B: Website designers, Computer programmers, Delivery drivers in retail stores, Computer maintenance staff, Robot maintenance staff.

3: Can lead to unhealthy eating due to dependency on ready meals, Can lead to laziness, Lack of fitness/exercise, Manual household skills are lost.

4: Microprocessor controlled devices do much of the housework, Do not need to do many things manually, Do not need to be in the house when food is cooking, Do not need to be in the house when clothes are being washed, Can leave their home to go shopping/work at any time of the day, Greater social interaction/more family time, More time to go out/more leisure time/more time to do other things/work, Are able to do other leisure activities when convenient to them, Can encourage a healthy lifestyle because of smart fridges analysing food constituents, Do not have to leave home to get fit

Explanation:

I tried really hard to solve these. I hope this answers your questions. can you make me the brainliest, that all I ask since I answered it for you. Pleasure solving these. C:

What is the fastest way to copy the format from one cell to multiple other cells?
Double-click on the Format Painter.
Single-click on the Format Painter.
Use Copy and Paste commands.
Use Cut and Paste commands.

Answers

use copy and paste commands.. i think! hope this hells

Double clicking on the format pointer is the fastest way to copy the format from one cell to multiple other cells. Thus, the correct option is A.

What is Format pointer?

The format pointer holds a value which represents the memory address of an available data item in the file. If the data item from the file becomes unavailable. For example, because it is in a program which has been canceled then the pointer format is considered to hold a value which is incompatible with the format options.

Use the Format Painter to quickly apply the same formatting, such as the color, font style and size, or border style, to multiple pieces of text or graphics in the data item. With the help of format painter, a person can copy all of the formatting from one object and apply it to another object think of it as copying and pasting for formatting.

Therefore, the correct option is A.

Learn more about Format painter here:

https://brainly.com/question/29563254

#SPJ2

How should employees behave during interactions with clients and co-works

Answers

Answer:always be nice and welcoming

Explanation:

with the utmost respect, you are supposed to respect and listen to your superiors, they are paying you and giving you a job after all, they can easily take it.

What was one of the main advantages of BPR at Chevron?​

Answers

Answer:

Business process re-engineering improves performance of chevron at end-to-end process and saves company's fifty million dollars by reducing operation cost.

solve x + 4 / x - 3 = 4 , step by step explanation will mark as brainliest ​

Answers

Answer:

I didn't get the exact answer..but hope this help

U $ er Ideas for R 0 B 1 0 X?

Answers

Answer:

umm huh

Explanation:

english please

Answer:

i play ro blox add me wwekane9365

Explanation:

Question 2 (10 points)
enables you to view data from a table based on a specific
A-
criterion
Query
Report
Form
All of the above

Answers

Answer: Query

Explanation:

A query simply enables one to view data from a table based on a specific criterion.

We should note that a query is simply referred to as a precise request that is used when retrieving information with the information systems.

When requesting for the data results, and also for the request of some certain action on data, the query is used. If the user wants to perform calculations, answer a particular, make adjustments to w table etc, the query is used.

Other Questions
art teacher has 450 sheets of construction paper on first day of school. students used 18 sheets during each school day. how many school days did the construction paper last? Which equation describes the line of best fit for the scatter plot? A.) y=2.7x B.) y=2.7x-4 C.) y=0.37x D.) y=0.37x-4 CAN SOMEBODY PLEASE HELP ME!! How do you think the United States wanted to be seen after the Monroe Doctrine was released? Hurry Timed!!! Help pls!!! 20 points!!! Read the passage. Then answer the question. Excerpt from Clarence Darrow's closing argument in Illinois v. Nathan Leopold and Richard Loeb, August 22-25,1924" (Question---> What is Darrow's argument in this excerpt? How well does Darrow support his argument? Use evidence from the text to support your response. Your response should be at least one or two complete paragraphs. ( You'll have to expand the picture to read it) Will Mark Brainliest. A. does 24 ft = 2in ? Find the area of the shape shown below 5 3.5 2 2 2 2 Please write the function(x) from the given rules:a. Twice the input value plus three. B. The input value minus five. C. To get the output, multiply the input by two, then add four. Water freezes at 32 degreesGroup of answer choicesFahrenheitCelsuisKelvin How do researchers identify the major problems and functions of the brain? Explain four methods In the first quadrant, you start at (3,5)and move 3 units right and 2 units downWhat point will you end up on? .....um help????? please? ....id.k what this is asking. Why would having the Bible written in the language a people speak be beneficial? For instance, what if you sat down to read the Bible and it was written n Greek. 2 At the hot dog stand it costs $18.39 for five hot dogs and six bags of chips. If it costs $4.63 forone hot dog and two bags of chips, how much is a hot dog? Usa test prep Summer at the lake: Sure to be a hit 20) Identify the statement that does NOT accurately describe this ClarkBenson passage.A)The passage is a review or critique.B) The passage offers supported opinions.C) The passage is persuasive and informative.D)The passage contains quoted dialogue from themovie Sickle-shaped red blood cells result from a mutation in the gene that codes for hemoglobin. This mutation results in sickle-cell anemia. A partial sequence of bases from a normal hemoglobin gene and a sequence that results in sickle-cell anemia are shown below From the table shown below the most effective use ofirrigating a crop appears to be:(a) Flood irrigation(b) Drip irrigation(c) Sprinkler irrigation(d) Perforated pipe irrigation for the arthritic sequence 5,9,13,17,21,... how many terms would you need to get to 129 Next Question I only have 40 minutes to complete the rest of these. Help Asap Please. Again I will award 100pts and Brainly to whoever can get me the slope intercept form to these two cordinate points. This is timed. And I risk failing the class if I don't get these questions answered. Plz help. Can someone please help me with math.