https://ref.surveyj.co/Oware111​

Answers

Answer 1

What is the link?

IS IT A HACKING LINK


Related Questions

2. Which property is used for hiding text of the textbox?
a) Password Char b) Text Char c) Char Password d) Pass Char

Answers

Answer:

password char

Explanation:

The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.

A processor’s speed is measured in (a) or gigahertz. The (b) (higher/lower) the hertz, the faster the processing of instructions.
(a)

(b)

Answers

Answer:

(a) gigahertz(b) higher

Explanation:

As,

The processor's speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).The higher the processor's hertz a CPU has, the faster it can process instructions.

Answer:

A) Gigahertz.

B) Higher.

Explanation:

i took the test

The POR is a systematic method of documentation that includes a database, problem list, initiitial plan and progress notes.
A. True
B. False

Answers

Explanation:

The POR is a systematic method of documentation that includes a database, problem list, initiitial plan and progress notes is true

The basic idea behind DNSSEC is a. providing name resolution from a hostname to an IP address b. ensuring that only local authoritative nameservers have the authorization to contact nameservers higher in the hierarchy (i.e., TLD nameservers, root nameservers) c. encrypting each DNS response so that it cannot be read by a third-party d. authenticating that the data received in a DNS response is the same as what was entered by the zone administrator (i.e., the response has not been tampered with)

Answers

Answer:

authenticating that the data received in a DNS response is the same as what was entered by the zone administrator

Solve using Matlab the problems:

One using the permutation of n objects formula

One using the permutation of r objects out of n objects

you can make up your own questions.


Help me please

Answers

Answer:

Explanation:

% Clears variables and screen

clear; clc

% Asks user for input

n = input('Total number of objects: ');

r = input('Size of subgroup: ');

% Computes and displays permutation according to basic formulas

p = 1;

for i = n - r + 1 : n

   p = p*i;

end

str1 = [num2str(p) ' permutations'];

disp(str1)

% Computes and displays combinations according to basic formulas

str2 = [num2str(p/factorial(r)) ' combinations'];

disp(str2)

=================================================================================

Example:

How many permutations and combinations can be made of the 15 alphabets, taking four at a time?

The answer is:

32760 permutations

1365 combinations

Type the correct answer in the box. Spell all words correctly.
Which testing requires coding the test cases into a scripting language?
testing requires coding the test cases into a scripting language.

Answers

Answer:

sorry I forgot it

Explanation:

because I am now in a last position

4. Which event is used to move from one textbox to another through enter
a) Key Click b) Key Enter c) Key Down d) Key Select

Answers

Answer:

key enter

Explanation:

May this help you l think

why am i doing the investigation​

Answers

Because it’s your interest

How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.

Answers

Answer:

software code 89089999990

When we have signals within 1-2 MHz band, using a waveguide is the most preferred choice for a transmission line. T or F?​

Answers

Answer:

T

Explanation:

what is computer? write about computer.​

Answers

Answer:

Is an electronic device used for storing and processing data.

7. System software is the set of software programs that helps run the computer and coordinates instructions between application software and hardware devices. It consists of the operating system (OS) and utility programs. How does the mindset of the designer affect the design of the operating system (e.g., Windows vs. Linux)

Answers

Answer:

Explanation:

The main goal when designing an operating system (OS) is to make sure that the system is as efficient and intuitive as possible. This is the mindset that designers have when creating the operating system. However, this also creates drastically different designs between designers, mainly because one design structure will feel much more natural and intuitive to one designer but not another. Since the designer's own personal taste/mindset drastically affects the design, most companies find their target audience and survey/test various designs. This is done in order to find what features and styles best fit the vast majority of the people.

An MP3 player is an example of which of the following types of computer
operating systems?
A. Real-time OS
B. Multi-user, multi-tasking
C. Single-user, single-tasking
D. Multi-user

Answers

Answer:

B) multi user -multi tasking

Answer: A. Real time OS

Explanation: took the quiz

6. Where all controls are lie
a) Properties b) Toolbox c) Solution Explorer d) Files

Answers

Answer:

I think b is correct answer.

In order to print multiple worksheets, what needs to happen before printing?

Answers

Answer:

Explanation:

Click the File tab.

Click Print, or press the control p keyboard command.

On the Print screen, select the printer and other settings.

Click Print.

The slope and intercept pair you found in Question 1.15 should be very similar to the values that you found in Question 1.7. Why were we able to minimize RMSE to find the same slope and intercept from the previous formulas? Write your answer here, replacing this text.

Answers

I don’t get the question

26. The
operator will cause a record to
be selected only if two or more
conditions are satisfied
In MS access

Answers

Answer:

AND

The  AND operator will cause a record to  be selected only if two or more

conditions are satisfied.

OSI model layers application in mobile computing

Answers

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

Identify the class of the address, the number of octets in the network part of the address, the number of octets in the host part of the address, the network number, and the network broadcast address g

Answers

Answer:

1.

190.190.190.190

Class B

Number of octets in the network part of the address: 2

Number of octets in the host part of the address: 2

Network number: 190.190.0.0/16

Network broadcast address: 190.190.255.255

2.

200.1.1.1

Class C

Number of octets in the network part of the address: 3

Number of octets in the host part of the address: 1

Network number: 200.1.1.0/24

Network broadcast address: 200.1.1.255

Explanation:

Write a program that reads in an integer, and breaks it into a sequence of individual digits. Display each digit on a separate line. For example, the input 16384 is displayed as 1 6 3 8 4 You may assume that the input has no more than five digits and is not negative.

Answers

Answer:

The program in Python is as follows:

num = int(input())

for i in str(num):

   print(int(i))

Explanation:

This gets input for the number

num = int(input())

This converts the number to string and iterates through each element of the string

for i in str(num):

This prints individual digits

   print(int(i))

which is the another name of automatic sequence control calculator​

Answers

Answer:

IBM Automatic Sequence Controlled Calculator (ASCC)

. In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear time if we divide it into groups of 7? How about 3? Explain your answer--- the asymptotic run time in either case.

Answers

Answer:

we have that it grows more quickly than linear.

Explanation:

It will still work if they are divided into groups of 77, because we will still know that the median of medians is less than at least 44 elements from half of the \lceil n / 7 \rceil⌈n/7⌉ groups, so, it is greater than roughly 4n / 144n/14 of the elements.

Similarly, it is less than roughly 4n / 144n/14 of the elements. So, we are never calling it recursively on more than 10n / 1410n/14 elements. T(n) \le T(n / 7) + T(10n / 14) + O(n)T(n)≤T(n/7)+T(10n/14)+O(n). So, we can show by substitution this is linear.

We guess T(n) < cnT(n)<cn for n < kn<k. Then, for m \ge km≥k,

\begin{aligned} T(m) & \le T(m / 7) + T(10m / 14) + O(m) \\ & \le cm(1 / 7 + 10 / 14) + O(m), \end{aligned}

T(m)

 

≤T(m/7)+T(10m/14)+O(m)

≤cm(1/7+10/14)+O(m),

therefore, as long as we have that the constant hidden in the big-Oh notation is less than c / 7c/7, we have the desired result.

Suppose now that we use groups of size 33 instead. So, For similar reasons, we have that the recurrence we are able to get is T(n) = T(\lceil n / 3 \rceil) + T(4n / 6) + O(n) \ge T(n / 3) + T(2n / 3) + O(n)T(n)=T(⌈n/3⌉)+T(4n/6)+O(n)≥T(n/3)+T(2n/3)+O(n) So, we will show it is \ge cn \lg n≥cnlgn.

\begin{aligned} T(m) & \ge c(m / 3)\lg (m / 3) + c(2m / 3) \lg (2m / 3) + O(m) \\ & \ge cm\lg m + O(m), \end{aligned}

T(m)

 

≥c(m/3)lg(m/3)+c(2m/3)lg(2m/3)+O(m)

≥cmlgm+O(m),

therefore, we have that it grows more quickly than linear.

Scenarios are quite common where an IT professional is tasked with modify a file on many computer systems or many files on a single computer or a combination of the two. For example, a large software may need the copyright notice comment to be changed on every source file in the project. Or, a configuration file may need to be modified on every server in a multi-server deployment. Doing this task manually is not a viable way to approach the problem. Instead, a better solution is to use a scriptable environment to perform search and replace functionality on the files in question. Python is an excellent tool for this kind of task.
Description
Samba is a unix/linux file sharing suite of programs designed to provide Windows interoperable file and print sharing services. Much of the configuration for the Samba daemon is provided by the text file smb.conf (renamed to smb.txt for this assignment). After an update was deployed to three dozen linux servers it was discovered that a couple of configured parameters were incorrect. Unfortunately, since there are unique aspects to each server, copying the contents of a single file to each server is not a viable solution. To fix the problem, the IT department must connect to each server, edit the smb.conf file, and restart the smbd daemon. To automate this task, each server will have a Python script copied to it. Then an SSH session will be initiated to each server from which the script will be executed. Your task is to write the Python script.
The invocation of the script must be as follows:
python modify.py fileSpec "from" "to"
where,
modify.py is the name of your script
fileSpec is the name of the file to be modified (smb.txt)
"from" is the text to be searched for (be sure to enclose any white space in quotes.
"to" is the text the searched text is to be replaced with.
Testing the script is your responsibility. However a good test case is:
python modify.py smb.txt "password sync = yes" "password sync = no"

Answers

Answer:

Explanation:/

The example Python script that can be used to automate the modification of the smb.conf file on multiple Linux servers is shown below

What is the code?

python

import subprocess

import sys

def modify_smb_conf(file_spec, search_text, replace_text):

   try:

       # Open the file for reading

       with open(file_spec, 'r') as file:

           # Read the contents of the file

           file_contents = file.read()

       # Perform the search and replace operation

       modified_contents = file_contents.replace(search_text, replace_text)

       # Open the file for writing

       with open(file_spec, 'w') as file:

           # Write the modified contents back to the file

           file.write(modified_contents)

       # Print a success message

       print(f"Modification successful: Replaced '{search_text}' with '{replace_text}' in {file_spec}")

   except IOError as e:

       # Print an error message if there was an issue with file operations

       print(f"Error: {e}")

def main():

   # Check if the correct number of command line arguments are provided

   if len(sys.argv) != 4:

       print("Usage: python modify.py fileSpec \"from\" \"to\"")

       return

   # Extract the command line arguments

   file_spec = sys.argv[1]

   search_text = sys.argv[2]

   replace_text = sys.argv[3]

   # Call the function to modify the smb.conf file

   modify_smb_conf(file_spec, search_text, replace_text)

if __name__ == '__main__':

   main()

Read more about  code here:

https://brainly.com/question/29330362

#SPJ2

what is tha length of Mac address ?​

Answers

Answer:

short length which includes all details about the addres

When she downloads new software onto her smartphone, Talia must ensure the software is compatible with her smartphone's __________.


operating system


application software


utility software


productivity software

Answers

Answer:

operating system

Explanation:

Every smartphone has its own operating system (typically iOS or Andriod) and every app must be compatible with an operating system(s).

The rest of the options are just different types of software.

Lmk if this helps

Microsoft office can be classified under what heading of application

Answers

Answer:

Word processing software/application

pls mark as brainliest!

Have a grt day!!!

Carlos manages a Linux system that users are able to SSH into in order to perform certain tasks. However, he has just installed a critical patch and wants to reboot the server to ensure that it has fully taken effect. Which of the following commands should he use to ensure that a reboot will not interrupt any logged in users?

a. w
b. id
c. whoami
d. uname -a

Answers

The answer is "Option b" which is "id", and its further calculation can be defined as follows:

In the Linux system, the id command is being used to find out the account and main indicators and numeric IDs of a current user and any other user on the system. In this, command the User name and genuine user ID.It is used to list all the groups of which a user is a member, and also display the security context of the current user.

The wrong choice can be defined as follows:

In choice a, "w" is the use full command, which displays all users who are currently active.In choice c, "whoami" is used as our user name.In choice d, "uname-a" is used to shows information about the network.

Therefore "Choice b" is the correct answer.

Learn more:

Linux system: brainly.com/question/3133247

subratract 11100 from 1011 by using 1's complement method step by step​

Answers

10089 is gonna be your anwser

what word describes how would electronically retrieve data​

Answers

Answer: Data retrieval means obtaining data from a database management system such as ODBMS. ... The retrieved data may be stored in a file, printed, or viewed on the screen. A query language, such as Structured Query Language (SQL), is used to prepare the queries.

What is a disruptive technology? Give an example of an aspect of society that has been impacted by technological change.

Answers

Answer:

A disruptive technology sweeps away the systems or habits it replaces because it has attributes that are recognizably superior. Recent disruptive technology examples include e-commerce, online news sites, ride-sharing apps, and GPS systems.

Other Questions
6. 15. A boy takes 5 seconds to reach each point from A to B, B to C and C to D as shown in the diagram. If AB = BC = CD = 20 m then which of the following information is correct when the boy reaches point D from point A via BC? How does this event support the resolution of the story?It allows the narrator to teach her neighbors how to use chopsticks. WILL GIVE BRAINLIESTUse the distributive property to simplifythe equation below.5(2x + 3y - 2) = [ ? ]x? ]x + [ ]y - [ the singer was popular because he knew______the crowd 5. A number, when divided by 296, gives 75 asthe remainder. If the same number is divided by 37 then the remainder will be types of health services in India are they available adequately in India report writing The school canteen offers 4 types of food menu at lunch. All students should drink milk after lunch.You want to have a balanced diet at lunch. Which set menu should you choose?A. Menu-1: bread,beef,appleB. Menu-2: Chicken noodles made with cauliflower, bananaC. Menu-3: Beef halim, puri, appleD. Menu-4: rice, mashed potatoes, fried egg 2. Write a difference between pagoda style and Stupa style architecture in table in four points (PLEASE HELP ITS URGENT)What is the measure of angle x?A) 60B) 30C) 45D) 90 PLS HELP ON TIS QUESTION I WILL MARK YOU AS BRAINLIEST IF YOU KNOW THE ANSWER.A _______________ can be used to display an interval of values from a data set.A. bar graphB. any of theseC. dot plotD. histogram Drag each label to the correct location on the image.Match the subatomic particles to their correct positions in the atomic structure.protonelectronneutron what is capital city of thurki Find $ \left(\frac{5}{12}\right)^{4}\left(\frac{12}{15}\right)^{3} $.If thats to hard to read its (5/12)^4 (12/15)^3 If Earth's gravity pulls an object, causing it to accelerate to the ground, whatmust be true about Earth?A. It accelerates just as quickly in the direction away from the object.B. It is being pulled toward the object by the object's gravity.C. It accelerates just as quickly in the direction of the object.D. It is being pushed away from the object by that same force. termination of treatment groups Imagine that you and a friend are going on a two-week trip aboard a sailboat. You have plenty of room for supplies on your boat; but once you leave the shore, you won't be stopping at a port or a grocery store for at least two weeks. You have a tiny refrigerator aboard the boat (similar in size to a college dorm refrigerator) and you have a small cooking stove, along with pots and pans and a host of serving dishes.Determine what foods you'll take with you on your journey and develop a three-page supply list. As you make your list, keep in mind the shelf life of products you choose, such as milk, and the storage constraints of those perishables. You'll also want to think about nutritional values so that you stay healthy during your journey and figure that into your final supply list.Write a two-page report that explains why you chose the items on your list and how you intend to prepare them while you're at sea. Remember that your response must include your three-page supply list. ACTIVIDAD 1 (30 puntos/3 puntos cada palabra): completa el texto con las palabras delrecuadro. Complete the text with the words in the box (you will not use all the words; use each given wordonly once). roja sociable alta rubia los es dentista se tiene altosimptico azules est bonita un el marrn blancas abogada rubio Familia pequeaMi familia no es muy grande. Somos mi padre, mi madre, mi hermano, y yo. Tambin tenemos(1) __________ perro. Yo soy mayor que mi hermano, pero l es ms (2) __________. Vamosjuntos al colegio. Yo tengo trece aos y l doce. Mis padres se llaman Carlos y Marta. Mihermano se llama lvaro, y yo Noelia. Vivimos en una casa muy (3) __________. Mi padre es (4) __________, y mi madre enfermera. Por la maana, desayunamos juntos en lacocina. Me gusta desayunar con mi familia. Adems, por las maanas siempre tengo hambre. Despus del colegio, mi madre prepara una comida deliciosa. Mi madre tiene muchas amigasporque es muy (5) __________. Por la tarde, mi madre queda con sus amigas, y mi padre juegaal tenis. Mi hermano y yo hacemos (6) __________ deberes, y despus vemos la televisin. Losviernes por la tarde vamos los cuatro de compras.Mi padre (7) __________ alto, castao y tiene los ojos (8) __________. Mi madre tiene el pelo(9) __________ y los ojos marrones. Mi hermano y yo somos los dos castaos y con ojosmarrones. A mi hermano le gusta jugar a videojuegos con sus amigos. Yo prefiero salir a la calle y jugar conmis amigas en el parque. En el parque hay muchas flores. Mis favoritas son las flores (10) __________. -----------------------------------------------------------------------------------------------------------------ACTIVIDAD 2 (20 puntos/2 puntos cada verbo): completa la siguiente tabla con las formascorrespondientes de los verbos para t y usted en presente simple. Fill in the table with the right forms of the verbs for t and usted in the present simple. Verbo T Usted1. ser2. beber3. estar4. bailar5. mirar6. saludar7. subir8. llamarse9. tener10. abrir---------------------------------------------------------------------ACTIVIDAD 3 (25 puntos/5 puntos cada pregunta): escucha el audio del link y eligeverdadero o falso. https://aedue- my.sharepoint.com/:u:/g/personal/belen_garcia_aum_edu_kw/EeM3YV6SjBZLgifVlwpU8YsBgN50aGw7v0BW8uORok8Fkg?e=dQoNLT1. Jorge est soltero. Verdadero Falso2. Pablo y yo somos primos. Verdadero Falso3. Hugo es nieto de Teresa. Verdadero Falso4. Ftima es la hermana de Teresa. Verdadero Falso5. Miguel y Manuela son mis abuelos. Verdadero Falso-------------------------------------------------------------------------------- what makes a crater fire? what is oxymoron--------------------------------------------------------- Good evening everyone Help me i n my hw ,The wall of cinema hall are covered with sound absorbing materials. Why?Answer it ASAP.Good day