What does filtering a record do?
O It suppress some records and shows others.
O It removes records from the document permanently.
O It sorts all the data in the record.
O It arranges all the information in one column.
Answer:
It sorts all the data in record.
Explanation:
third one is verified
3. Which property is used to select full Row of data grid view
a) Select Mode b) Mode Selection c) Selection Mode d) Mode Select
Answer:
I think a is correct answer.
Peter has discovered that the junior administrator has done something to corrupt the firewall rules on one of the Linux machines. He decides to delete all of the rules and recreate them from scratch. What is the first command that Peter should run
Answer:
the first step Peter must take is to configure the default policies for each of the built-in chains to ACCEPT.
He can do this by running the following:
$ sudo iptables -P INPUT ACCEPT
$ sudo iptables -P FORWARD ACCEPT
$ sudo iptables -P OUTPUT ACCEPT
Explanation:
If he doesn't do this, he stands the risk of being locked out of the server through the SSH.
Having done the above, he can proceed to run the following commands:
$ sudo iptables -t nat -F
$ sudo iptables -t mangle -F
$ sudo iptables -F
$ sudo iptables -X
The above will effectively flush (-F), and delete all non-default chains (-X).
Cheers
what is the best low end pc recording software
Explanation:
democreator
D3DGear
nvidia shadow play etc
HOPE SO IT HELPS YOU
Which website allows you to host your podcast for at a cost that includes your domain name? (Correct answer only)
A. Podbean
B. Blogger
C. WordPress
D. HostGator
E. Buzzsprout
Answer:
D I think it
Explanation:
Answer:
I think it is HostGator
Explanation:
I took the test and I put Podbean and it was wrong.
Output is the act of is the act of entering the data to the computer?
Answer:
Output is the act of the computer display information based on your input
Explanation:
Funny thing is that output is the exact opposite of what you just described
Arrays are commonly used to store data items. Arrays can be managed in ways that fill, iterate over, add to, and delete items from the array. Why is it useful to store multiple pieces of information?
Answer:
mark me brainlist
Explanation:
1110011*110011 binary multiplication
122113420121
Explanation:
Answer:
110110101001
Explanation:
You have to multiply them normally and then add then in a binary manner..
Remember these are binary numbers ( 1+1=0,
1+0=1, 0+0=0)
Say you have a long string and you want to collect all of the letters within it without storing duplicates. What would be the most appropriate type to store the letters in?
a. a set
b. a list
c. the original string
d. a dictionary
A set because sets do not allow duplicated elements
Write steps to Delete data from ‘Datagridview’
Explanation:
private void btnDelete_Click(object sender, EventArgs e)
{
if (this.dataGridView1.SelectedRows.Count > 0)
{
dataGridView1.Rows.RemoveAt(this.dataGridView1.SelectedRows[0].Index);
}
}
convert decimal number into binary numbers (265)10
Answer:
HELLOOOO
Alr lets start with steps by dividing by 2 again and againn..
265 / 2 = 132 ( rem = 1 )
132 / 2 = 66 ( rem = 0 )
66/2 = 33 ( rem = 0 )
33/2 = 16 ( rem = 1 )
16/2 = 8 ( rem = 0 )
8/2 = 4 ( rem = 0 )
4/2 = 2 ( rem = 0 )
2/2 = 1 ( rem = 0 )
1/2 = 0 ( rem = 1 )
now write all the remainders from bottom to up
100001001
is ur ans :)))
what is computer with figure
Answer:
A computer is an electronic device that accept raw data and instructions and process it to give meaningful results.
Consider a world named ‘Square World’. In this world a person can move only up,
down, left, right squares and only one square at a time. The squares are numbered. In
square number 3, there is our hero Yellow. His dream girl Pinky is in square number
16. There are bombs in the red squares and if someone goes there, he/she will be
busted! Yellow wants to see Pinky as quickly as possible and starts his journey from
square 3. Help him to find the shortest route. Which search technique will you use to
help Yellow? Demonstrate your idea by showing your simulation step by steps.
Answer:
Explanation:
It is hard , please any one help me.
Solve this question
How can an IS managers keep up with the endless demand for more software to support new information systems
An IS manager can keep up with the endless demand for more software to support new information systems by thinking outside the box.
To think outside the box, the IS manager should try the following strategies:
Use predetermined application components that are operating on low-code or no-code platforms.Use better software-testing practices and tools that spread programming into small sprints.Engage in shift-left testing, which enables software-testing to be done at every phase of the development process.Involve product managers and business users at the beginning of software development, making them to drive innovation that satisfies their requirements.Finally, the IS manager can utilize AI and Machine Learning to speed up the development of required software, thereby enhancing its qualities and capabilities with reduced time and costs.Thus, the IS manager must realize that there are always solutions to every software problem outside the mainstream box.
Learn more about information systems here: https://brainly.com/question/1521627
You want to remind users of the acceptable usage policy that applies to all computer systems in your organization, so you decide to display a message after the user logs in. The full path and filename to the file you would edit is
Learn more:
user logs: brainly.com/question/7580165
What is indirect program memory addressing? Explain the working of the following instructions?
a) JMP AX
b) JMP LIST[DX]
c) JMP NEAR PTR[DI+3]
The instructions operate as follows:
a)
JMP AX :
The JMP instruction is being used to execute an unconditional jump.AX is indeed the label's name. JMP AX codes are being used to transfer control of the flow program to the AX label.b)
JMP LIST:
The JMP command can be used to execute an unconditional jump, JMP LIST[DX] is the label's name. The JMP LIST[DX] program is being used to transfer control of its flow programs to the specified section. It is the segment to which the flow control is transmitted.c)
JMP NEAR PTR[DI+3]:
Unconditional jumps could be done with the JMP command as you'll see, the label is JMP NEAR PTR[DI+3]. It's being used to transmit flow control to a particular section, throughout this case [DI+3]. The close keyword indicates that perhaps the code segment would be in the line of code being nearby.Learn more:
brainly.com/question/20320915
help me please help me please
Answer:
3 one is the answer or 4 one
Answer:
none of the above
Explanation:
Every flip flop will divide the frequency by 2, so you need 2 flip flops.
What is a computer system
Answer:
A computer along with additional hardware and software together is called a computer system. A computer system primarily comprises a central processing unit (CPU), memory, input/output devices and storage devices. All these components function together as a single unit to deliver the desired output.
Explanation:
pls mark brainliest
who is considered as the father of computer science?
Charles Babbage is known as father of computer science because he designed the original programmable computer .
I hope it helps and if you want to have good answer follow me, I will be your second sight on your any problems♥️♥️
Write the Java code for the calculareDiameter method.
Answer:
* Program to find diameter, circumference and area of circle.
*/
import java.util.Scanner;
public class Circle {
public static void main(String[] args) {
// Declare constant for PI
final double PI = 3.141592653;
Scanner in = new Scanner(System.in);
/* Input radius of circle from user. */
System.out.println("Please enter radius of the circle : ");
int r = in.nextInt();
/* Calculate diameter, circumference and area. */
int d = 2 * r;
double circumference = 2 * PI * r;
double area = PI * r * r;
/* Print diameter, circumference and area of circle. */
System.out.println("Diameter of circle is : " + d);
System.out.println("Circumference of circle is : " + circumference);
System.out.println("Area of circle is : " + area);
}
}
Discuss the OSI Layer protocols application in Mobile Computing
Answer:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.
hope that helps you
please follow
please mark brainliest
Which is needed for the specific task of inserting a chart into a report?
O The Controls tab
O The Insert Image command
O The Existing Fields command
O The Property Sheet
To add charts in Access to reports, click the “Create” tab in the Ribbon. Then click the “Report Design” button in the “Reports” button group. Unlike other report controls, the chart control uses its own data source to show its data. Therefore, you can insert it into a blank, unassociated report, if desired
The invention of the integrated circuit was the first major advance in computing. The integrated circuit made it possible for all of a computer's electrical components to reside on one silicon chip.
This invention became known as the __________.
personal computer
microprocessor
client-server configuration
mainframe computer
Answer:
micro processor
Explanation:
Alexis received an email message from an unknown sender that included an attachment.
If she opens the attachment, what kind of malicious software might be activated, and what are the consequences?
Opening the attachment would release a worm, which would infect her system with a virus.
Opening the attachment would release a worm, which would infect her system with spyware.
Opening the attachment would release an active worm, which would infect her system with adware.
Opening the attachment would release a passive worm, which would infect her system with adware.
Answer:
Opening the attachment would release a worm, which would infect her system with a virus.
Answer: B. Opening the attachment would release a worm, which would infect her system with a virus.
the base on which the number n=(34)? is written if it has a value of n= (22)10
If I'm understanding the question correctly, you are looking for an integer b (b ≠ 0, b ≠ 1) such that
[tex]34_b = 22_{10}[/tex]
In other words, you're solving for b such that
3×b ¹ + 4×b ⁰ = 22
or
3b + 4 = 22
Solving this is trivial:
3b + 4 = 22
3b = 18
b = 6
So we have
34₆ = 22₁₀
Write a program that reads a list of 10 integers, and outputs those integers in reverse. For coding simplicity, follow each output integer by a space, including the last one. Then, output a newline. coral
def reverse_list (num_list):
try:
if num_list.isdigit() == True:
return num_list[::-1]
elif num_list < 0:
return "Negative numbers aren't allowed!"
except ValueError:
return "Invalid input!"
user_list = list (int (input ("Please enter ten random positive numbers: " )))
print (reverse_list (user_list))
Differentiate between email and NIPOST System
Answer: NIPOST System is sending mail physical like photos and letters and many items
Email is electronic mail sent through the internet but you can send it anywhere
Explanation:
Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.
Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?
Given:
Network IP address [tex]\bold{= 172.149.254.0 /24}[/tex]
Subnet numbers [tex]\bold{= 13}[/tex]
Calculating the borrow bits:
[tex]\to \bold{= ceil(\log_{2} 13) = 4 \ bits}[/tex]
a)
Calculating the dotted decimal value for the subnet mask:
[tex]\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\[/tex]
b)
The additional bits which will be needed to mask the subnet mask that is = 4.
Learn more: brainly.com/question/2254014
If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was integrated?
To enhance the ICT (Information Communication Technology) used by teachers, I will modify how the ICT was integrated.
The modification of how ICT is integrated will change the culture that places teaching over technology. Then, teachers will be taught how to use ICT to:
improve learning so that teachers become learning facilitatorsmotivate learners by fostering learning autonomy, making students less dependent on the teacherengage the learners by creating collaborative learningdiminish content learning so that students learn to think, create, and communicate effectivelymake learning a lifetime culture enhance the learning environment so that teachers become collaborators and co-learners with students.Thus, I will enhance the ICT used by teachers by modifying its integration to achieve better results for both teachers and learners.
Learn more about the importance of ICT here: https://brainly.com/question/13724249
what was the main purpose of napiers bone?
Answer:
Napier's bones is a manually-operated calculating device created by John Napier of Merchiston, Scotland for the calculation of products and quotients of numbers. The method was based on lattice multiplication, and also called 'rabdology', a word invented by Napier.
Answer:
The main purpose of napiers bone is to fine products and quotient of divisions.