Answer:
hello the options to the question are missing here are the option
a. Trade in the computer for another computer that has wireless installed 4
b. Purchase a second computer that has wireless
c. Purchase a wireless expansion card and install it in your system
d. Purchase a USB wireless adapter and connect it to your PC by way of a USB port
Answer : Purchase a wireless expansion card and install it in your system (c)
Purchase a USB wireless adapter and connect it to your PC by way of a USB port ( d )
Explanation:
A wireless expansion card : A wireless Expansion card are added to a system via expansion slots. they are added to a system without a WiFi adapter and it is quite affordable
USB wireless adapter : A USB wireless adapter overrides the computer's built-in wireless function of a system and it gives a faster and more reliable connection via the USB ports.
If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
A. DANMAT certificate
B. DANSUB certificate
C. HAZMAT certificate
D. CHEMMAT certificate
Answer:
HAZMAT certificate
Explanation:
If you face an investigation where dangerous substances might be around, you may need to obtain a HAZMAT certificate.
Hazmat is the shortened form of the word "hazardous materials," which the United State Department of Transportation recognized as materials that could adversely affect people and also the environment. Hazmat certification is required to be obtained by workers who remove, handle, or transport hazardous materials. This comprises careers in transportation and shipping, firefighting and emergency rescue, construction and mining, as well as waste treatment and disposal. Workers who are also in manufacturing and warehouse storage may also come across hazardous substance or materials risks while on their jobs. Certification involves having the knowledge of the risks and safety measures for handling these materials.
Answer:
(C) HAZMAT certificate
Explanation:
HAZMAT stands for Hazardous Materials. These are materials that could adversely affect people and the environment. Examples are synthetic organic chemicals, heavy metals and radioactive materials. People who work in certain industries such as construction and mining, firefighting, waste treatment and disposal e.t.c, are required to have this certificate.
The certification involves training workers in these industries in the use of, risk involved, and way of handling of these materials when they are encountered at work.
The purpose of validating the results of the program is Group of answer choices To create a model of the program To determine if the program solves the original problem To correct syntax errors To correct runtime errors
Answer:
To determine if the program solves the original problem
Explanation:
Required
Essence of validating a program
From list of given options, only the above option best describes the given illustration.
When a program is validated, it means that the results of the program are tested to meet the requirements of the user;
For a program to be validated, it means it has passed the stage of error checking and correction; whether syntax or run time errors;
However, when modifications are made, the program will need to be re-validated to ensure that it comports with its requirements.
The CPU control unit is responsible for A. obtaining instructions B. interpreting instructions C. all logic functions D. both A and B
Answer:
D. Both A and B
Explanation:
Because it controls the input and output of data, check the signals have been delivered successfully, and make sure that data goes to the correct place at the correct time.
Which operating system problem might cause the desktop background to change
unexpectedly? Choose the answer.
A boot failure
B startup loop
C malware D incompatibility
It should be noted that the operating system problem that might cause the desktop background to change is D incompatibility.
What is operating system problem?The operating system problem serves as those error that can affect the operation of the operating system in computer.
This System errors are caused by malfunctioning hardware components as well as corrupted operating system modules and one of this is compatibility.
Learn more about operating system problem at;
https://brainly.com/question/17506968
)You have been asked to do voice-overs and ""wild lines"" for a film. What is your position on the film crew? Boom operator Sound board operator Production sound mixer Sound designer
Answer:
Sound designer.
Explanation:
A boom operator is responsible for positioning of the microphone.
A sound board operator is responsible for playing pre-recorded sound effects.
A production sound mixer records all sounds on the set.
A sound designer creates and edits new sounds.
In conclusion, it must be a sound designer as this best fits the role.
Assume that a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions. How much faster should we run the floating-point instructions to execute entire program 1.25 times faster
Answer:
the floating-point instructions should be run 1.5 times faster in order to execute entire program 1.25 times faster
Explanation:
Given that:
a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions.
Let the integer be the total execution time = V
The floating-point instructions = 60%
The integer instruction = 40%
The time spent on the floating-point instruction = 60/100 × V
= 0.6 V
The time spent on t he integer instruction = 40/100 × V
= 0.4 V
However; How much faster should we run the floating-point instructions to execute entire program 1.25 times faster
If we are to execute the entire program 1,25 times faster;
The new execution time = V/1.25
Assuming the new time spent on floating-point instruction = W
∵
W + 0.4 V = V/1.25
W = V/1.25 - 0.4 V
W = (V - 0.5V)/1.25
W = 0.4V
the new time spent on floating-point instruction = W = 0.4 V
The speed required to make the floating -point instruction to run faster = 0.6V/.4 V
= 1.5
Hence, the floating-point instructions should be run 1.5 times faster in order to execute entire program 1.25 times faster
Patrick Stafford's article argues that the growth of mobile phone usage "has given developers the ability to great robust and engaged communities" that help a game's chance of success.
a. true
b. false
Answer:
The statement is False.
Explanation:
In his article published on the 31st Aug 2010, Patrick suggests that a 100% penetration rate for any market is now possible due to the growth of the use of mobile phones.
The strategy of accessing the market using mobile ads, according to Patrick, is called Mobile Marketing.
In his article, Patrick provides statistics which help buttress his position that a good number of mobile phone users are ready to respond positively to mobile ads.
While it is implied that this concept has increased the chances of mobile games as a product being successful, nowhere in the article did Patric mention "games".
Cheers!
the typing area is bordered on the right side by bars in ms word
Answer:
Explanation:
PTA NHI
TLS does not require mutual authentication. Only server must authenticate its public key to the client. Client is authenticated by the application via a password. The most common way for public key authentication would be a. a photo ID. b. a password. c. a certificate. d. biometrics.
Answer:
c. a certificate.
Explanation:
Public key infrastructure authentication is intended to make transactions occurring through the internet as secure as possible. Public keys are usually assigned to entities like business firms or individuals, and digital certificates are given to them as proof that they have been authenticated.
A certificate authority has the role of signing, storing, and issuing digital certificates. A software or humans could be charged with the responsibility of actually ensuring a key to user binding if all conditions are satisfied.
The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
a. in multiple sessions of communications one after the other. For example, if someone has 12 keys, they can use it for twelve video calls one after the other.
b. such that one of them is picked up at random at a time.
c. some as private keys, some as public keys.
d. for different rounds of encryption for the same plaintext to strengthen the cipher.
Answer:
Option(d) is the correct answer to the given question .
Explanation:
There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.
The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.The Option (b) is wrong because In the key scheduling we do not used the the random key for the encryption process .The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.
When introducing new devices to the network, the organization's security policy requires that devices be monitored to establish normal traffic patterns for the device. Which of the following is generated from initial monitoring?
A. SLA
B. Baseline
C. Forensic log
D. Vulnerability assessment
Answer:
The answer is "Option B".
Explanation:
The Baseline measurement is an essential characteristic of effective coal company monitoring programs to assess the degree of mining effects and keep on improving effect monitoring the system will continue to be modified via periodical analyses, and the wrong choices can be defined as follows:
In choice A, it is wrong because it used in 3D printing technology. In choice C, it is used to analyze the log entities, that's why it is wrong. In choice D, it is used to analyze the security weaknesses, that's why it's wrong.Consider the following statements. If the input is 95, the output of the following code will be: #include #include using namespace std; int main () { float score; string grade; cin >> score; grade = "Unknown"; if (score >= 90) grade = "A"; if (score >= 80) grade = "B"; if (score >= 70) grade = "C"; else grade = "F"; cout << grade; }
Answer:
The output will be "C"; without the quotes
Explanation:
Given
The program above
Required
What will be the output if user input is 95
The output will be 95;
Analysis
1. Initially, grade = "Unknown"
grade = "Unknown";
2. Because user input is greater than 90, grade changes its value from "Unknown" to: grade = "A"
if (score >= 90)
grade = "A";
2. Because user input is greater than 80, grade changes its value from "A" to: grade = "B"
if (score >= 80)
grade = "B";
3. Because user input is greater than 70, grade changes its value from "B" to: grade = "C"
if (score >= 70)
grade = "C";
4. This will not be executed because it specifies that if user input is less than 70; Since, this statement is false; the value of grade is still "C"
else grade = "F";
5. The value of grade is printed
cout << grade;
Jamal likes the theme he has chosen, but he wants to make his presentation more interesting before he saves it. Which command group does he need to complete the tasks listed?
Answer: Variants
Customize
Explanation:
Answer:
Variants and customize, I took the quiz just now
Explanation:
On a system with paging, a process cannot access memory that it does not own. Why? How could the operating system allow access to other memory?
Answer:
Because the page is not in its page tableThe operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page tableExplanation:
On a system with paging, a process cannot access memory that it does not own because the page is not in its page table also the operating system controls the contents of the table,therefore it limits a process of accessing to only the physical pages allocated to the process.
The operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table.that way two processes that needs to exchange data can efficiently do that . i.e creating a very efficient inter-process communication
Given a variable s that contains a non-empty string, write some statements that use a while loop to assign the number of lower-case vowels ("a","e","i","o","u") in the string to a variable vowel_count.
Answer:
Following is the program in the python language
s="Hellooo" #string initialization
k=0 # variable declaration
vowel_count=0 #variable declaration
while k<len(s): #iterating the loop
c1=s[k] #store in the c1 variable
if c1=='a' or c1=='e' or c1=='i' or c1=='o' or c1=='u': #check the condition
vowel_count= vowel_count +1; # increment the variable vowel_count
k = k+1
print(vowel_count) #display
Output:
4
Explanation:
Following is the description of program
Create the string "s" and store some characters on them.Declared the variable "k" and initialized 0 on them .Declared the variable "vowel-count" and initialized 0 on them .Iterating the while loop ,inside that loop we shifted the string "s" into the " c1" variable and checking the condition in the if block by using or operator if the condition is true then it increment the "vowel_count" variable by 1 .Finally outside the loop we print the value of "vowel_count".It's not possible to die in an alcohol-related collision if you're not in an automobile.
A. True
B. False
Answer:
B. False
Explanation:
Consumption of alcohol is not a good practice and is generally not allowed at the time of driving an automobile and is considered to be an offense as it may be injurious to health and property. As too much alcohol can create possible chances of collusions and even if the person is not in an automobile can result in a collision if tries to cross the road. Like head injuries or leg injuries can occur.CHALLENGE ACTIVITY 2.15.1: Reading and outputting strings. Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, first name. End with newline. Example output if the input is: Maya Jones Jones, Maya.
Answer:
Following are the program in Java language
import java.util.*; // import package
public class Main // main function
{
public static void main(String[] args) // main class
{
String l_name,f_name; // variable declaration
Scanner sc6=new Scanner(System.in); // scanner class
f_name= sc6.next(); // Read input
l_name=sc6.next(); // Read input
System.out.print(l_name); // display last name
System.out.print(","); // display comma
System.out.println(f_name); // display first name
}
}
Output:
Maya Jones
Jones, Maya
Explanation:
Following are the description of program
Declared a variable 'l_name","f_name" as the string type .Create the instance of scanner class i.e "sc6".Read the user input by using the instance "sc6" of the scanner class in the variable "l_name" and "f_name ".Finally by system.print() method we will display the value according to the format in the given question .How to fix the acount when it says "Uh oh, this account has been restricted because of an unusual amount of activity.
Answer:
Make sure that the email is verified. Also, usually sites do this when there are multiple log ins on multiple devices. It makes the site think that you are in multiple places at once making it seem suspicious. What i would do is clear cache and change the email and password associated with the account. If all fails contact brainly support
Instead of typing an individual name into a letter that you plan to reuse with multiple people, you should use a _______ to automate the process.
A. mail merge
B. data source
C. mailing list
D. form letter
ONLY ANSWER IF YOU'RE 100% SURE.
Answer:
A. Mail Merge
Explanation:
I had this question last year
Wrtie a program in which we will pass a value N. N can be positive or negative. If N is positive then output all values from N down to and excluding 0. If N is negative, then output every value from N up to and excluding 0.
Answer:
Following are the answer to this question:
x=int(input("Enter number: "))#defining x variable that input value from user end
if x< 0:#defining if block that check x value is less then 0
while x<0:#defining while loop print up to the value
print(x)#print value
x+= 1#add values by 1
elif x>0:#defining elif block to check value x is greater than 0
while x>0:#defining while loop to print down to value
print(x)#print value
x-= 1#subtract value by 1
Output:
when input is a positive value
Enter number: 5
5
4
3
2
1
when input is a negative value
Enter number: -5
-5
-4
-3
-2
-1
Explanation:
In the given python code, x variable is declared that input the value from the user end, in the next step if and elseif block is declared that calculates and prints its value. In the if block, it checks value is negative it uses the while loop to prints its values in the down to value form. In the elif block, it checks the positive it uses the while loop to prints its values into the up to values form.Drug addiction occurs in
age groups, from a
variety of backgrounds.
A. young, narrow
B. all, narrow
C. all, wide
Answer:
ig the answer is C :) sorry if isn't correct
any element that has a starting tag and does not have a closing tag is called a ?
pls be quick guys
Answer:
Any element that has a starting tag and doesn't have a closing tag is called a empty element.
:)
Eight-queen's problem Consider the classic puzzle of placing eight queens on an 8 x 8 chessboard so that no two queens are in the same row or in the same column or on the same diagonal. How many different positions are there so that
no two queens are on the same square?
no two queens are in the same row?
no two queens are in the same row or in the same column?
Also, estimate how long it would take to find all the solutions to the problem by exhaustive search based on each of these approaches on a computer capable of checking 10 billion positions per second.
Answer:
12 solutions16,777,21640320 waysExplanation:
A) No two queens on the same square
Placing eight queens on an 8 * 8 chessboard has a total of 92 Separate solutions but unique 12 solutions
The total no of possible solutions using the computational method is
= 64! / (56! * 8! ) ~ 4:4 * 109
but since there are 12 unique solution out of the 92 therefore
B) No two queens are in the same row
= 8^8 = 16,777,216
C) No two queens are in the same row or in the same column
= 8! = 40320 ways
It will approximately take less than a second for a computer with the capability of checking 10 billion positions per second to find all the solutions
When Adobe Photoshop was released for the first time? A: 1984 B: 1990 C: 1991 D: 1992
Answer:
B
Explanation:
Write a program that inputs a sentence from the user (assume no punctuation), then determines and displays the unique words in alphabetical order. Treat uppercase and lowercase letters the same.
Answer:
Following are the code to this question:
val={} #defining dictionary variable val
def unique_word(i):#defining a method unique_word
if i in val: #defining if condition to add value in dictonary
val[i] += 1#add values
else: #defining else block to update values
val.update({i: 1})#updating dictionary
s =input('Enter string value: ') #defining s variable for input string value
w=s.split()#split string value and sorte in w variable
w.sort() #sorting the value
for i in w: #defining loop for pass value in method unique_word
unique_word(i)#assign value and calling the unique_word method
for j in val:# defining for loop to print dictionary value
if val[j] == 1: #defining if block to check value is unique
print(j) #print value
Output:
Enter string value: my name is dataman
dataman
name
is
my
Explanation:
In the above python code, a dictionary variable "val" is declared, which is used in the method "unique_word" that uses if block to count unique word and in the else block it update its value. In the next step, s variable is declared, that the user input method to store the value and another variable "w" is defined that split and sort the string value. In the last step, two for loop is declared in which the first loop passes the string value and calls the method "unique_word", and in the second loop if block is defined that check unique value and prints its value.reate a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the Plane class and test its functionality. Write a method called CheckIn() as part of the Plane class to handle the check in process Prompts the user to enter 1 to select First Class Seat (Choice: 1) Prompts the user to enter 2 to select Economy Seat (Choice: 2) Assume there are only 5-seats for each First Class and Economy When all the seats are taken, display no more seats available for you selection Otherwise it displays the seat that was selected. Repeat until seats are filled in both sections Selections can be made from each class at any time.
Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash ('-') or a underscore '_'. For example, the string "-Yes" would return True but the string "Nope" would return False. Note: Your function will be unit tested against multiple strings. It is not enough to get the right output for your own test cases, you will need to be able to handle any kind of non-empty string. Note: You are not allowed to use an if statement.
Answer:
The program written in python is as follows:
def begins_with_line(userinut):
while userinut[0] == '-' or userinut[0] == '_':
print(bool(True))
break;
else:
print(bool(not True))
userinput = input("Enter a string: ")
begins_with_line(userinput)
Explanation:
The program makes use of no comments; However, the line by line explanation is as follows
This line defines the function begins_with_line with parameter userinut
def begins_with_line(userinut):
The following italicized lines checks if the first character of user input is dash (-) or underscore ( _)
while userinut[0] == '-' or userinut[0] == '_':
print(bool(True)) ->The function returns True
break;
However, the following italicized lines is executed if the first character of user input is neither dash (-) nor underscore ( _)
else:
print(bool(not True)) -> This returns false
The main starts here
The first line prompts user for input
userinput = input("Enter a string: ")
The next line calls the defined function
begins_with_line(userinput)
NB: The program does not make use of if statement
What happens if you attempt an operation that uses the input stream and the operation fails but the stream is OK
Answer:
The fail bit of the stream object will be set.
Explanation:
The Input Stream is been used to effectively and efficiently read data from a source .
Therefore in a situation in which an individual or a person attempt an operation that uses the input stream and the operation fails but the stream is OK this means that the fail bit of the stream object will be set . FAILBIT is generally set in a situation where the error that occured involves the loss of integrity of the stream in which it is more likely to persist even if various operation is been carried out or attempted on the stream which is why FAIL BIT can always be checked independently by calling the member function bad.
Lastly FAILBIT is as well set because of a read or write operation that fails.
Observe the things at Home in which you are using binary
conditions (ON/OFF) and Draw these things (any five).
Explanation:
All five things i can come up with her
1. Doors (we either open or close them)
2. Tap (we either open or close the valve)
3. Electric stove/cooker
4. The lid of containers
5. Shoes/ foot wears(we put them ON or OFF)
An F-1 ____________ may be authorized by the DSO to participate in a curricular practical training program that is an__________ part of an established curriculum. Curricular practical training is defined to be alternative work/study, internship, cooperative education, or any other type of required internship or practicum that is offered by sponsoring employers through cooperative _____________ with the school. Students who have received one year or more of full time curricular practical training are ineligible for post-completion academic training. Exceptions to the one academic year requirement are provided for students enrolled in _____________ studies that require immediate participation in curricular practical training. A request for authorization for curricular practical training must be made to the DSO. A student may begin curricular practical training only after receiving his or her Form I-20 with the __________ endorsement.
Answer:
1. Student.
2. Integral.
3. Agreements.
4. Graduate program.
5. DSO.
Explanation:
An F-1 student may be authorized by the DSO to participate in a curricular practical training program that is an integral part of an established curriculum. Curricular practical training is defined to be alternative work/study, internship, cooperative education, or any other type of required internship or practicum that is offered by sponsoring employers through cooperative agreement with the school. Students who have received one year or more of full time curricular practical training are ineligible for post-completion academic training. Exceptions to the one academic year requirement are provided for students enrolled in graduate program studies that require immediate participation in curricular practical training. A request for authorization for curricular practical training must be made to the DSO. A student may begin curricular practical training only after receiving his or her Form I-20 with the DSO endorsement.
Please note, DSO is an acronym for Designated School Official and they are employed to officially represent colleges or universities in the United States of America. They are saddled with the responsibility of dealing with F-1 matters (a visa category for foreign students seeking admission into schools such as universities or colleges in the United States of America).