Answer:
The new version is kept in a special virtual space; the file is only changed when he clicks “save.”
Explanation:
I took the test and got it correct.
If I wanted to include a picture of a dog in my document, I could use
AutoCorrect
SmartArt
WordArt
Online Pictures
Answer:
Online Pictures
Explanation:
Answer:
Online Pictures
Explanation:
It's not Auto Correct obviously, Word art is with text, and Smart art is formatting or the way it looks
You are in the process of configuring an iSCSI storage area network (SAN) for your network.
You want to configure a Windows Server 2016 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec.
Which tool should you use?
A. iSCSI under File and Storage Services in Server Manager
B. iSCSI Initiator
C. Multipath I/O
D. Internet Storage Name Service
Answer: B. iSCSI Initiator
Explanation:
Based on the above scenario discussed, the tool that'll be used is the iSCSI Initiator. It should be noted that it typically functions as the iSCSI client.
The Internet Small Computer System Interface (iSCSI) initiator can be used to configure an iSCSI storage area network (SAN) for the network. Through the iSCSI Initiator, commands can be sent over an IP network. When one wants to connect to a particular iSCSI target, the iSCSI Initiator can be used.
Described FOUR (4) issues that possibly raised when the organization does
not emphasize the code of ethics concerning to the software engineering
issues?
Explanation:
1- Information theft: One of the problems that can arise when an organization does not develop an efficient code of ethics regarding software engineering is the use of confidential information for its own benefit or for the benefit of third parties.
2- Access to confidential information: An organization has private information that can only be accessed by the top hierarchy, such as management decisions, performance indexes, etc. Therefore, an unethical attitude would be a software engineer to access such information and have access to information. confidential.
3- Intrapersonal conflicts: It is possible that there is hacker interference in an organization to harm some team or collaborator, exposing facts and rumors for the generation of conflicts and exposure.
4- Asset theft: Accessing some system vulnerabilities, it is possible to access the organization's bank accounts by stealing financial assets without leaving a trace.
Interface elements include but are not limited to:
Question 10 options:
A)Navigational components, informational components, visual design
B)Input controls, informational components, visual design
C)Input controls, navigational components, visual design
D)Navigational components, containers, interaction design
E)Input controls, informational components, containers
Answer:
E
Explanation:
Interface elements include but are not limited to E. Input controls, informational components, containers.
User interface elements refer to the parts that are used in building websites and applications. They're important for adding interactivity to the interface of a user.
It should be noted that the interface elements include navigational components, informational components, input controls, and containers.
Therefore, the last option depicts this as the navigational component isn't added.
Read related link on:
https://brainly.com/question/19593397
Instructions
Which of the connection types listed is
used to support analog telephony?
Answer:
Analog telephone connections , ISDN, Voice-over-IP (VoIP) telephone connections.
Explanation:
Analog telephone connections , Integrated Services Digital Network (ISDN) telephone connections and Voice-over-IP (VoIP) telephone connections are the three network connection types that support analog telephony. Voice packets are transmitted via three cable connections to various ports in the network.
If you use microsoft windows, the windows _____ application can automatically update the operating system as well as microsoft programs installed on your computer
Answer:
Microsoft Windows 10 ... (Windows) If you accidentally delete files from your computer's hard drive, ... Upgrade to remove ads ... (Windows) Applications (or apps) in Windows 10 that you use frequently can be ... the operating system, installed programs, settings, and user files that you can later use to recover your computer.
Explanation:
Answer:
Task Manager?
Explanation:
You defined a book data type.
class book:
title = ''
author = ''
pages = 0
Which statement creates an instance of your book?
myBook.myBook = book()
myBook = new book()
myBook = book
myBook = book()
Answer:
myBook = book()
Explanation:
Correct answer edge 2020
Answer:
myBook=book()
Explanation:
took test
How is LUA different from Python?
Give an example.
This is the answer I couldn't write it here since brainly said it contained some bad word whatever.
Answer:
good old brainly think stuff is bad word even tho it is not had to use txt file since brainly think code or rblx is bad word
You should always be afraid to use the internet
True or false?
Answer:
false
Explanation:
you should be but in the same time no
Which of the following is a common use for spreadsheets?
A.
storing graphical data
B.
planning a monthly budget
C.
formatting text for presentability
D.
verifying data validity
In the GO programming language you can't declare a float, it must be a float32 or float64. Why do you think this is done if the data type is not necessary? Why do you think they used float64 instead of double? Think about the lexical analyzer and how it interprets a symbol.
Answer and Explanation:
a. Go programming language specifies data types and does not allow mixing them up. Therefore instead of just declaring a float variable, one has to be specific and declare either a float32(single precision floating point number) variable or float64(double precision floating point number). Float64 numbers occupy larger spaces and could be slower in some systems but they represent more accurate numbers.
b. Float64 is more accurate and is used by most math libraries. Float64 and double are same thing, although double precision numbers are called float64 in Go, it doesn't affect the lexical analyzer in any way.
Project 15A - Math Application
package: proj15A
Classes: Main, Circle, Rectangular
Using your new knowledge of methods and classes create a program with an interface. The program must allow a user to enter values and calculate: Areas, Perimeters, Surface Area, and Volumes for circular and rectangular shapes.
The program must have three classes. A main class, circle class and a rectangular class.
Submit all code one after the other as text into Canvas in the following order.
• main.class
• circle.class
• rect.class
I have it all done just need to finish this code
package math;
import java.util.Scanner;
public class Main
{
public static void main(String[] args)// main method
{
Scanner nScan = new Scanner(System.in);
DecimalFormat mf = new DeciamlFormat("0.0");
Circle cir1 = new Circle(0,0);
Rectangle rec1 = new Rectangle (0,0,0);
//variables
boolean runProg = true;
int choice =0;
while(runProg)
{
System.out.print("Math calculator 3000 ver1");
System.out.print("choose a mode. \n"
+ "1 circle mode \n"
+ "2 Rectangle mode \n"
+ "3 End program");
choice = nScan.nextInt();
if(choice==1) //circle mode
{
}
else if(choice == 2) //Rectangle Mode
{
}
else if(choice == 3) //Program Shutdown
{
}
else
{
System.out.println("You may only choose 1-3. Try again.");
}
}
nScan.close();
}
}
Answer:
A simple php code for the following is given below:
Explanation:
interface Calculate {
public function area($lenght,$width);
public function perimeter($length,$width);
public function surfaceArea($length_side_1,$length_side_2);
public funcction volume($length, $width, $height):
}
interface Calculate2 {
public function area($raidus);
public function perimeter($radius);
public function surfaceArea($radius);
public funcction volume($radius):
}
Class Mian{
width=please Enter the value of width
height=please Enterr the value of height
length=please enter the value of length
lenght2=please enter the value of lenth of side 2
ridus= please enter the value of radius
Circle = new circle()
Rectangle = new rectangle()
}
Class Circle implements Calculate2{
public function area(){
area= pi*r
return area
}
public function perimeter(){
perimeter=2*pi*r
return perimeter
}
public function surfaceArea(){
surfacearea= pi*r*r
}
public function volume(){}
area=area()
volume=area*height
return volume
}
Class Rectangle implements Calculate{
public function area(lenght,width){
area= length * width
return area
}
public function perimeter(lenght,width){
perimenter=2(lenght+width)
return perimeter
}
public function surfaceArea(length_side_1, withd right place){}
surface_area 2*length_side_1 f* length_side_2_
public function volume(){}
public surface volume(length,width,height)
volume= length * width * height
return volume
}
Complete each sentence to describe features of the VLOOKUP function.
The VLOOKUP function structure begins with =VLOOKUP(
To use the VLOOKUP function, the lookup value should be in the
of the table.
Answer:
Look Up Value, Table Array, First Column
Explanation:
The VLOOKUP function structure begins with =VLOOKUP(
✔ lookup value
,
✔ table array
…)
To use the VLOOKUP function, the lookup value should be in the
✔ first column
of the table.
python
You need to have some text that will repeat on 50 random images to create memes for your Twitter account. Don’t worry about having any images; just get the text to repeat for a meme that you would create. That would take you a while to do… but luckily you have for loops! Using a for loop, print “Takes one political science class. Knows how to solve the world’s problems.” for your 50 meme images, so 50 times
for i in range(50):
print("Takes one political science class. Knows how to solve the world's problems.")
I hope this helps!
what is social media
Answer:
websites and applications that enable users to create and share content or to participate in social networking.
Explanation:
Examples of fifth generation
Answer:
Intelligent systems that could control the route of a missile and defense-systems that could fend off attacks; Word processors that could be controlled by means by speech recognition; Programs that could translate documents from one language to another.
Hope this helps :)
What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time?A. Disaster organizational cost analysisB. Disaster recovery improvementsC. Disaster financial costD. Disaster recovery cost curve
Answer:
D. Disaster recovery cost curve
Explanation:
Disaster Recovery Cost Curve can be regarded as the chart to the cost of the
unavailability of information and technology as well as the the cost to the company of recovering from a disaster over time. It should be noted that recovery plan is very essential in any organization because it makes response to disaster as well as other emergency that can tamper with information system to be easier as well as minimization of any effect of the disaster on business operations.
Lets assume we are writing a system to backup a list of transactions: class Transaction 1 String TransactioniD: Date TranactionTime: Account account: enum Type(ADD, EDIT, ADMIN): Type type: Transactions are constantly added to the system as quickly as possible (hundreds a minute) and occasionally, your system will need to retrieve them but only if there is a error with the main system (once or twice per million transactions). Additionally, transactions may not come in order as some transactions take longer to process. What is the best way to store the transactions in your system? a) as a list sorted by transactionID b) As an unsorted list of transactions c) as a list sorted by transaction Time d) As a list sorted by a new systemiD int since they transactions are not coming into our system in order of time. Activate Windows Go to Settings to activate Windo e) As a 2d list with the columns sorted by Account and the rows sorted by date
Answer:
The answer is "Option d"
Explanation:
In this question, the easiest way that will save the payment on your database in such a process ID-sorting list would be to mark a payment, that's been recorded mostly on the database whenever this payment became used serial number is not transaction ID, and the wrong choice can be defined as follows:
In choice a, It is wrong because it may be processed, however, payments aren't entered through our process, which does not help remove older.In choice b, the unordered list would not enable any transaction to only be retrieved, that's why it is wrong.In choice c, it will not be helpful because the includes video is either begin or complete the payment, it will not be helpful to hold it with transaction time.In choice e, this approach won't help to identify the payments since one date will have a lot of payments over a certain account.Do you think the human race will benefit from advanced AI?
Answer:
Yes and no
Explanation:
I think that we would benefit to an extent, however we could foreseeable future where they out smart us. For our everyday lives advanced AI could be a great help to us, we just have to make sure we keep it in control.
find different between manocots and dicots clarify with example
Answer:
hope it's help you..............
A device involved in a Transmission Control Protocol (TCP) connection is ready to close the connection. The other device in the connection agrees. What has occured?
Answer:
A four-way handshake has occurred.
Explanation:
TCP or transmission control protocol is a packet-oriented protocol because all lost packets are retransmitted if not received and acknowledged by the destination host.
A four-way handshake connection is established between the server and the client, this allows for connection initiation, negotiation, and termination. The packets sent across are never lost as received packets are acknowledged by the client by sending an ACK to the transmitting server.
The TCP is a main protocol for the internet protocol suite and initiates the network implementation, by complementing the IP. It connection-oriented protocol.
The device that has connected with the TCP undergo a four-way handshake, which is the process of exchanging four messages between the access point. This allows for the generation of encryption keys that are sued to encrypt the data.Learn more about the Transmission Control Protocol.
brainly.com/question/16398493.
PLEASE HELP
what are some benefits of using graphic on web page?
Images help tell a story where describing with words is either too lengthy, or practically impossible. For instance, you could have a map of a location and various arrows and other markings to describe movements of troops during a battle of the civil war. This is one example of many that you could have as an image on a website. Describing the troop movements with words only may be really difficult to do. Plus many people are visually oriented learners, so they benefit with images every now and then. Of course, it's best not to overdo things and overload the site with too many images. A nice balance is needed.
PLEASE ANSWER
Select the correct answer.
What test was developed to filter humanlike artificial intelligence?
Answer:
Turing test is the answer
How can you get to the Excel Function Reference information? Check all that apply.
Help tab
Esc
F1
searching in the Tell Me bar
Ctrl+R
Answer: Help tab, F1, tell me bar
Explanation:
Answer:
Help tab, F1, tell me bar
Explanation:
I got it right
Write a program that performs a simulation to estimate the probability of rolling five of a kind in a single toss of five six-sided dice. Show your results when running 100 Monte Carlo trials, 10,000 Monte Carlo trials, and 1,000,000 Monte Carlo trials.Signature:probability_five_of_a_kind(num_trials)return typestring (formatted to show eight decimal places)Test case:>>> pro bability_five_of_a_kind(500_000)'The probability_five_of_a_kind is 0.00074000'
Answer:
import random
def probability_five_of_a_kind(num_trials):
sums = 0
for _ in range(num_trials):
roll_1 = random.randrange(1,6, 1)
roll_2 = random.randrange(1,6, 1)
roll_3 = random.randrange(1,6, 1)
roll_4 = random.randrange(1,6, 1)
roll_5 = random.randrange(1,6, 1)
collection = roll_1 + roll_2 + roll_3 + roll_4 + roll_5
if collection == 5:
sums += 1
prob = round(sums/7776, 8)
print(f"The probability_five_of_a_kind is {prob}")
probability_five_of_a_kind(100)
probability_five_of_a_kind(10000)
probability_five_of_a_kind(1000000)
Explanation:
The random package of the python language is used to select an integer value from the range of one to six representing the sides of a die. All six rolls are randomized and the sum. If the sum is equal to 5, the sums counter is incremented. At the end of the loop, the sum is divided by the five dices events (which is 6^5 = 7776).
Which of these could be a valid IPv4 or IPv6 address?
a
251.70.349.287
b
eeed:6654:2f34:94cf:bfa0:20c9:08e1:bfcd
c
92.169.42.163
d
67d250:4650d2:94b753:f27588:a49175:0e46be:368442:70fd8d
e
146.49.98.20.184.223
f
4b32:3b3d:6cec:8438:d20f:397c
Answer:
F
4b32:3b3d:6cec:8438:d20f:397c
An IP address is a numerical protocol address with an numerical value that is connected by a computer network for communication.
The IPv4 is a 32-bit address and the IPv6 is a 128-bit address. The IPv4 address usually represents dot-decimal notions. Each range from 0 to 255. The Ip address may be represented by hexadecimal, octal and binary decimals. Thus the valid IPv4 could be a 92.169.42.163Hence the correct option is C.
Learn more about which could be the valid IPv4 or 6.
brainly.in/question/35357295.
python code 100 Random Numbers (twice)
python code
instructions:
You need to write code that will print two bricks of numbers, one with integers, one with decimals.
import random
i = 1
while i <= 100:
print("#"+str(i)+": "+str(random.randint(1,100)), end=", ")
i+=1
print()
i = 1
while i <= 100:
print("#"+str(i)+": "+str(random.uniform(1,100)), end=", ")
i += 1
I hope this helps!
Ashley has included a bar graph in a term paper she's authoring using a word processor. To make sure that the graph is not cut off when
printed, she decides that the page with the graph should be printed horizontally. What should Ashley do?
Answer:
she should make sure to put the paper in the right way
Explanation:
A group consists of 10 kids and 2 adults. On a hike, they must form a line with an adult at the front and an adult at the back. How many ways are there to form the line?a. 4.9!b. 2.99!c. 11!d. 11!/2
Answer:
b. 2.9!
Explanation:
There are is a mistake in the question.
Suppose the group consist of 10 kids and 2 adults, the number of ways in which they can form the line is:
= 2! 10!
= 2× 1× 10!
= 2.10!
But since that is not in the given option.
Let assume that the group consists of 9 kids and 2 adults, the number of ways in which they can form the line is:
No of ways the kids can be permutated = 9 ways
No of ways the adult can be permutated = two ways.
Thus; the number of ways in which they can form the line = 2! 9!
= 2 × 1× 9!
= 2.9!
In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multiplied by the fourth power of two.
A. Fourth
B. Fifth
C. Sixth
Answer:
Your answer would be, B. Fifth digit ftom the right.
Explanation:
Binary with letters works like this,
the first 3 bits from the left, determine if the character is caps or lowercase, 010 is capital and 011 is lowercase, the next 5 are like this,
First - 2 to the power of four
Second - 2 to the power of three
Third - 2 to the power of two
Fourth - 2 to the powet of one
Fifth - 2 to the power of zero
So, given that information, the fourth digit from the right is 2 to the power of the three. The sixth digit is a bit to determine the capitalization, so the only answer left is B.
In binary, the second digit from the right is multiplied by the first power of two, and the fifth digit from the right is multiplied by the fourth power of two.
What is a binary number?The base-2 numeral system, often known as the binary numeral system, is a way of expressing numbers in mathematics that employs only two symbols, typically "0" and "1."
The character's case is determined by the first three bits from the left, 010 is capitalized, 011 is lowercase, and so on for the following 5.
First - 2 to the power of four
Second - 2 to the power of three
Third - 2 to the power of two
Fourth - 2 to the powet of one
Fifth - 2 to the power of zero
The fourth digit from the right is therefore 2 to the power of three given the information above. The only option left is B because the sixth digit is a bit to determine capitalization.
Therefore, the correct option is B. Fifth.
To learn more about binary numbers, refer to the link:
https://brainly.com/question/15766517
#SPJ2