Answer:
B -WLAN
Explanation:
Use the edit icon to pin, add or delete clips.
what is the internet revolution?
Answer:B
Explanation:
Backup software creates backups and prevents you from losing all your data, so would backup software be considered an application software or utility software?
A). application software
B). utility software
Answer:I also think it's b because it litterlottery says or a utility software so obviously a utility software WOULD be considered a utility software.
Explanation:
Option(B). Utility software is the correct answer.
Antivirus, backup software, file managers, and disk compression tools are examples of utility software. These programs evaluate and keep up computers. These programs are designed with an emphasis on how the OS functions, and they carry out tasks to make the machine run efficiently.
What is a Utility software?A computer's databases, directories, and files are all backed up using backup utility software. It frequently works by creating an exact clone of the entire disk. If data loss happens, the user might be able to recover the lost data using the computer's backup utility tool.All systems and applications on a computer system that keep it functional are referred to as utility software.The utility software on a computer consists of parts that help the operating system to organize, maintain, and manage its performance under all conditions.In addition to supporting the computer's architecture, this kind of software is distinct from application software, which carries out tasks for the user.Utility software may need the consent of a user with administrative rights on the computer before executing its functions or being replaced.An operating system and a collection of utility apps are often installed when manufacturers create a computer.Although the user has the option to replace or install other utility apps, this utility software is generally seen as a part of the operating system. A computer's databases, directories, and files are all backed up using backup utility software.Often, it functions by making an exact copy of the entire disk. Using the computer's backup utility program, the user may be able to retrieve lost data if it happens to them.
To know more click here-
https://brainly.com/question/2909686
#SPJ2
by what order of magnitude is something that runs in nanoseconds faster than what runs in milliseconds
the input nums is supposed to be an array of unique integers ranging from 1 ro nums.length (inclusive). However, there is a mistake: one of the numbers in the array is replicated, which means another number is missing. find and return he sum of the duplicate number and the missing number
The program which returns the sum of the duplicate and missing number is written in python 3 thus ;
def dup(nums):
#initialize a function which takes In a list of values as argument.
nums.sort()
#sort the values in ascending order
for i in range(1, len(nums)):
#iterate through the list
if nums[i] == nums[i-1]:
#Check for repeated values
return nums[i] + nums[i]-1
#return the sum of the repeated values - 1
nums = [4,3,3,1]
print(dup(nums))
A sample run of the program is attached.
Learn more : https://brainly.com/question/25574075
A user tries to open a movie in Windows Media Player but no image is displayed and only audio plays Which software must be installed on the computer?
There are software that are often installed in systems for audio player. The software must be installed on the computer is Codec.
Codec is simply refered to as a short form for the word coder-decoder. It is known as an algorithm that is often used when encoding data. Example an audio or video clip.The encoded data is often decoded as it is played back.
It act by limiting the size of media file and it also increases the processing power that is needed to play the file back correctly.
Learn more from
https://brainly.com/question/14338673
What is data?........
[tex]\huge\bold\green{Data\ :- }[/tex]
In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.
Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system
Answer:
he various advantages that can be associated with a password generator software are as follows: Any arbitrary long password can be generated using the complete set of symbols and not just a subset (usually the subset which is easier to type on a key
Explanation:
write down the color code for straight-through cabling. write your answer on the space provided
1.
2.
3.
4.
5.
6.
7.
8.
Answer:
1White/Green
2Green
3White/Orange
4Blue
5White/Blue
6Orang
7White/Brown
8Brown
1. A is printed at the bottom of each page.
Answer:
b is also printed at both page
Explanation:
I need to do because c can also pri Ted at all side
hope its help you
please mark as brainliest
John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered
Asymmetric cryptography is often regarded as Public-key cryptography. It often uses pairs of keys. The process that Alex should use along with asymmetric cryptography so that John can be sure that the received document is real is Digital signature algorithm.
In asymmetric cryptography, the both pair has a public key and a private key.The Digital Signature Algorithm is simply known to be a Federal Information Processing Standard for digital signatures.
DSA as it is often called is gotten from the Schnorr and ElGamal signature schemes.
It often used for digital signature and its verification and thus shows authenticity.
Learn more from
https://brainly.com/question/13567401
What are software applications?
Answer:
the first option is obviously the correct answer
Create a program using python pseudo code
You are a manager of a Wally's Training Gym and you encourage your trainers to enroll new members. Input is the trainer's last name and the number of new enrollees. Output is the number of trainers who have enrolled members in each of three categories: 0-5 new members, 6-10 new members, and 11 to 15 new members. Write an application that allows the user to enter 15 names and the number of new members they have enrolled into an array. Output is to display the number of trainers who are in each category. Use good programming techniques that you have learned throughout the course. Use appropriate variable names, use an array to store the names and number of new enrollees, and use prompts for the input and labels with the display.
The program uses a loop and conditional statements.
Loops are used for iterations, while conditional statements are used to implement conditions
The program in Python, where comments are used to explain each line is as follows:
#This creates a list for the trainer's last names
lastName = []
#This creates a list for the members enrolled by each trainer
membersEnrolled = []
#The next three lines initialize counter variables to 0
count0to5 = 0
count6to10 = 0
count11to15 = 0
#The following loop is repeated 15 times
for i in range(15):
#This prompts the user for the trainer's last name
name = input("Trainer's last name: ")
#This prompts the user for the members' enrolled
member = int(input("Members Enrolled: "))
#This appends the last name to the list
lastName.append(name)
#This appends the members enrolled to the list
membersEnrolled.append(member)
#This counts the number of members enrolled in each group
if member >=0 and member<=5:
count0to5+=1
elif member >=6 and member<=10:
count6to10+=1
elif member >=11 and member<=15:
count11to15+=1
#The next three lines print the counter variables
print(count0to5,"enrolled 0 to 5 members")
print(count6to10,"enrolled 6 to 10 members")
print(count11to15,"enrolled 11 to 15 members")
Read more about similar programs at:
https://brainly.com/question/13246781
A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would best meet the architects objectives
a. trusted platform module
b. IaaS
c. HSMaaS
d. PaaS
Answer:
a. trusted platform module
i thinks it will help you
Explanation:
Need help with these plss correct answers
Explain the difference between linear and non-linear motion. What are examples of each kind of motion?
Imagine that an animated film is going to show a character who, although frightened, climbs a narrow mountain trail. What is one of the 12 principles of animation that you learned about in this unit that the animator might want to use in this scene?
Describe how you would use the principle of “staging” in a scene in an animated film that shows a triumphant moment in a soccer game played in a large stadium.
Describe a situation where an animator might choose to intentionally violate the principle of “slow in and slow out.”
Imagine that you had been given the task of animating a crab walking along the seashore. How would you use the animation principle of secondary action to make the scene appear more realistic?
Answer: The only thing i could find was this I hope this helps you out
Timing and Spacing: The number of frames between two poses, and how those individual frames are placed.
Squash and Stretch: The flexibility of objects to exaggerate or add appeal to a movement.
Anticipation: The setup for an action to happen.
Ease In and Ease Out: The time for acceleration and deceleration of movement.
Follow Through and Overlapping Action: The idea that separate parts of the body will continue moving after a character or object comes to a full stop, and the idea that parts of the body will move at different times.
Arcs: The principle that smooths animation and moves action in a realistic way.
Exaggeration: The pushing of movement further to add more appeal to an action.
Solid Drawing: The accuracy of volume, weight, balance, and anatomy.
Appeal: The relatability (or charisma) of a character.
Straight Ahead Action and Pose to Pose: The spontaneous and linear approach to creating an action using many in-between poses along with the main poses, and the more methodical approach to creating an action using only a few poses.
Secondary Action: The actions that emphasize or support the main action of the animation.
Staging: The setting up of the scene, from placement of characters to the background and foreground elements, to how the camera angle is set up, the lighting and shadows, and more.
Explanation:
Answer:
1. Linear motion is motion in a straight line. Non-linear motion is motion that is not in a straight line. For example when you move your pen in a line it is linear.
2. They might use something to show the mountain and show how big it is. Using effects like this can bring out certain parts and bring out what really is trying to be shown in a movie.
3. The camera angle of the soccer game and the follow with the ball being shown can give a staging looking for what is coming or what is important in that time.
4. You can use it to show how fast a car is going or to show where a person is at on a map in a 3rd person view
5. I would use Arcs because it smooths out the image or video to make whatever your trying to make look more realistic.
Write two statements to assign numApples with 10 and numOranges with 3. Sample output for given program: Apples: 10 Oranges: 3
numApples = 10
numOranges = 3
print(f"Apples: {numApples}")
print(f"Oranges: {numOranges}")
The statements should assign numApples with 10 and numOranges with 3.
The code is written in python.
The variable numApples is used to assign the number of apples and numOranges is used to assign the number of oranges.
The number of apples and oranges were outputted with the print statement in python.
I used the f strings in python to concatenate strings and integers.
The bolded values in the code are python key words.
read more: https://brainly.com/question/13785329?referrer=searchResults
Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's managerial role of enforcing these functions
Answer:
Coordinating, monitoring, and allocating database administration resources
Explanation:
people and data. Defining goals and formulating strategic plans for the database administration function.
Separate database servers and web servers.
Use web application and database firewalls.
Secure database user access.
Regularly update your operating system and patches.
Audit and continuously monitor database activity.
Test your database security.
Encrypt data and backups.
The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.
Software installation and Maintenance.
Data Extraction, Transformation, and Loading.
Specialized Data Handling.
Database Backup and Recovery.
Security.
Authentication.
Capacity Planning.
Performance Monitoring.
1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?
A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.
It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.
An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.
A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.
The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.
Read related link on:
https://brainly.com/question/25747300
Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours. Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total. For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.
Answer:
something like that
Explanation:
static bunch of krap main (args) {
double hours;
double salary;
double overSalary;
print("Enter hours worked: ");
scan(hours);
if (hours <= 40) {
salary = 20 * hours;
}
if (hours > 40) {
overSalary = 30 * (hours - 40);
salary = 20 * 40 + overSalary;
}
print(salary);
}
In this exercise we have to use the knowledge of python to write a salary function, as follows:
the code is in the attached image.
In a more easy way we have that the code will be:
static bunch of krap main (args) {
double hours;
double salary;
double overSalary;
print("Enter hours worked: ");
scan(hours);
if (hours <= 40) {
salary = 20 * hours;
}
if (hours > 40) {
overSalary = 30 * (hours - 40);
salary = 20 * 40 + overSalary;
}
print(salary);
}
See more about python at brainly.com/question/26104476
the document area is where you save your file true or false
Answer:
A few popular places to save files are under “desktop” or “documents" and then in a specific folder. If you saved the file to your desktop, you do not need to go through finder to access it. You can simply minimize all your windows, and click on it there. Double click on the file and you're ready to open it.
Explanation: TRUE. A.
. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree
The root node will contain the smallest element
2. Build a MATLAB program to evaluate ln(x) between [1, 2] that guar- antees up to 10 correct decimal digits using Chebyshev interpolation. Evaluate your function on 100 points on the interval [1, 2] and calculate the absolute error fore each point using MATLAB’s log command as the exact solution. Plot your error profile. Does this agree with the expected level of accuracy?
who was the father computer
Create a raptor program that asks to user to enter 10 numbers into an array. Then display all the numbers, the smallest and the largest. Be sure to add prompts and labels to your input and display.
This is the raptor program written in Python 3.8:
########################################################
ten_numbers = [ ]
# get the ten numbers
print("Enter 10 numbers")
for i in range(1, 11):
num = int(input("[{ }] (Enter number and press enter to accept): ".format(i)))
ten_numbers.append(num)
# get the smallest and the largest
smallest = min(ten_numbers)
largest = max(ten_numbers)
# display the results
print("The list of numbers is: { }".format(ten_numbers))
print("The smallest number in the list is { }, and the largest is
{ }.".format(smallest, largest))
########################################################
The raptor program
Uses a for loop to get the 10 numbers into a list. Then, it uses the in-built Python min and max functions to get the smallest and largest numbers in the list.Learn more about Python lists here: https://brainly.com/question/24941798
Write a statement that inserts the value 'wash dog' into the list activities so that it becomes the element at index 2.
I don't have much context on it or what programming language you want so...
activities[2] = 'wash dog'
Have you ever written a program, saved a version, then later saved a different version and wish you could tell what changed
Answer:YES
Explanation:
Y
Which famous British physicist wrote A Brief History of Time?
Answer:
Stephen Hawking
what is the meaning of keyboard?
A panel of keys that operate a computer or typewriter.
Explanation:
keyboard is an input device that feeds the computer will data
The date of creation can be added to a slide using the:
a.
"Insert" tab, "Add note" group
b.
"Edit" group of the ribbon
c.
"Insert" tab, "Text" group
Answer:
The answer to your question is Insert tab Tex group.
The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.
What is a slide?A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.
In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.
Read more on slides here: https://brainly.com/question/11741377
#SPJ2
What is software and what types of softwares?
Answer:
the programs and other operating information used by a computer
Explanation:
system software and application software
Answer:
Software is a group/collection of commands that tell a computer how to work/run. Software is the contrast for hardware which is a discussed topic in the software field.
Examples of software are, an Internet browser, Operating system, Movie player, Graphics program, etc.
Cloud computing brings the ability to scale both technologically and business-wise using a pay-as-you-go paradigm, allowing the users to concentrate more resources and time on their ideas (Edlund & Livenson, 2011). Please write a technical report about the opportunities and challenges on adoption of cloud computing in a real or fictional business case.
The opportunities that can be gotten from the adoption of cloud computing include:
More resources will be available for data protection.More data security.More employment opportunities.The challenges that can be gotten from the adoption of cloud computing include:
Separation failure.Data transfer bottlenecks.Public management interface issues.It should be noted that cloud computing means the delivery of different services through the internet. Such resources include applications and tools such as data storage, databases, servers, etc.
Cloud computing is vital as it helps in enhancing data security and job opportunities. The challenges include data transfer bottlenecks, separation failure, etc.
Read related link on:
https://brainly.com/question/25532807
vA student found a book on the library bookshelf last week, and recorded the source information.
Book title: My Traitor’s Heart Author: Rian Malan
Publication date: 1990 Publisher: Bodley Head Publication city: London
Use the drop-down menus to indicate how the student should format this source on a works-cited list.
My Traitor’s Heart.
London:
Answer:
3,1,2,1
Explanation:
got it right on edge
have a nice day
:)
Answer:
1. Malan, Rian
2. London:
3. Bodley Head, 1990
4. Print
Explanation:
did it