Answer:
Real-time Scanning
Automatic Updates
Protection for Multiple Apps
Auto-Clean
Fights Against All Types of Malware
HOPE I HELPED
PLS MARK BRAINLIEST
DESPERATELY TRYING TO LEVEL UP
✌ -ZYLYNN JADE ARDENNE
JUST A RANDOM GIRL WANTING TO HELP PEOPLE!
PEACE!
The three attributes of antivirus software include auto-cleaning, automatic updates, and real-time scanning.
The information regarding the three attributes of antivirus software is as follows:
The work of the antivirus software discovered malicious software. In the auto-cleaning, it rid of the viruses that could come in the laptops.In real-time scanning, it regularly checks whether there is any malicious software or not due to this the laptop does not damage.The antivirus software required regular updates so that they could track the new threats if any also at the same time it protects your laptops.Therefore we can conclude that the three attributes of antivirus software include auto-cleaning, automatic updates, and real-time scanning.
Learn more about the software here: brainly.com/question/15937118
Convert 30 to hexadecimal
Answer:
1E
Explanation:
Here is a table to help you. Similar to a multipication table, just follow either the number 3 down to A (aka 10) or 6 x 5 and you will find your answer of
1E = 30
Robert complains that the cursor on his laptop screen often jumps around unexpectedly when he’s typing. What can he do to solve the problem?
Answer:
Disable the touchpad
Explanation:
A computer retail store has 15 personal computers in stock. A buyer wants to purchase 3 of them. Unknown to either the retail store or the buyer, 3 of the computers in stock have defective hard drives. Assume that the computers are selected at random.
(a) In how many different ways can the 4 computers be chosen?
(b) What is the probability that exactly one of the computers will be defective?
(c) What is the probability that at least one of the computers selected is defective?
Answer:
a. 1365 ways
b. Probability = 0.4096
c. Probability = 0.5904
Explanation:
Given
PCs = 15
Purchase = 3
Solving (a): Ways to select 4 computers out of 15, we make use of Combination formula as follows;
[tex]^nC_r = \frac{n!}{(n-r)!r!}[/tex]
Where [tex]n = 15\ and\ r = 4[/tex]
[tex]^{15}C_4 = \frac{15!}{(15-4)!4!}[/tex]
[tex]^{15}C_4 = \frac{15!}{11!4!}[/tex]
[tex]^{15}C_4 = \frac{15 * 14 * 13 * 12 * 11!}{11! * 4 * 3 * 2 * 1}[/tex]
[tex]^{15}C_4 = \frac{15 * 14 * 13 * 12}{4 * 3 * 2 * 1}[/tex]
[tex]^{15}C_4 = \frac{32760}{24}[/tex]
[tex]^{15}C_4 = 1365[/tex]
Hence, there are 1365 ways
Solving (b): The probability that exactly 1 will be defective (from the selected 4)
First, we calculate the probability of a PC being defective (p) and probability of a PC not being defective (q)
From the given parameters; 3 out of 15 is detective;
So;
[tex]p = 3/15[/tex]
[tex]p = 0.2[/tex]
[tex]q = 1 - p[/tex]
[tex]q = 1 - 0.2[/tex]
[tex]q = 0.8[/tex]
Solving further using binomial;
[tex](p + q)^n = p^n + ^nC_1p^{n-1}q + ^nC_2p^{n-2}q^2 + .....+q^n[/tex]
Where n = 4
For the probability that exactly 1 out of 4 will be defective, we make use of
[tex]Probability = ^nC_3pq^3[/tex]
Substitute 4 for n, 0.2 for p and 0.8 for q
[tex]Probability = ^4C_3 * 0.2 * 0.8^3[/tex]
[tex]Probability = \frac{4!}{3!1!} * 0.2 * 0.8^3[/tex]
[tex]Probability = 4 * 0.2 * 0.8^3[/tex]
[tex]Probability = 0.4096[/tex]
Solving (c): Probability that at least one is defective;
In probability, opposite probability sums to 1;
Hence;
Probability that at least one is defective + Probability that at none is defective = 1
Probability that none is defective is calculated as thus;
[tex]Probability = q^n[/tex]
Substitute 4 for n and 0.8 for q
[tex]Probability = 0.8^4[/tex]
[tex]Probability = 0.4096[/tex]
Substitute 0.4096 for Probability that at none is defective
Probability that at least one is defective + 0.4096= 1
Collect Like Terms
Probability = 1 - 0.4096
Probability = 0.5904
Word processing is the use of computer software to enter and edit text.
Answer:
True
Explanation:
Word processing software or word processing program handles functions related to entering and editing text in a text document. In essence a word processor processes text documents which includes processing entire papers, paragraphs, pages. With a word processing software text is entered in the document mainly through typing in the letters with a keyboard and a word processor allows copying, deleting and formatting text through the use of built in commands
Examples of word processing programs are Microsoft Word, AppleWorks and OpenOffice.
Read the code below.
What will the computer print if the input for year_variable is 1700?
if year_variable == 1776:
print("Your answer is correct. The Declaration of Independence was signed in “year_variable”.")
elif year_variable 1776: compute_variable = year_variable - 1776
print("Subtract “compute_variable” years from your answer for the correct answer.")
Your answer is incorrect. The Declaration of Independence was signed in 1776.
Subtract 76 years from your answer for the correct answer.
Add compute_variable years to your answer for the correct answer.
Add 76 years to your answer for the correct answer.
PLEASE EXPLAIN HOW YOU GOT IT
Answer:
D. Add 76 years to your answer for the correct answer.
Explanation:
Write the code in python and make year_variable= 1700
Since the input value is 1700, it is less than 1776. This means the elif year_variable < 1776:
would run. This line of code makes whatever the input value is to be subtracted from 1776, then produce an answer labeled as "compute_variable"
This "compute_variable" is then shown to be in a print function, where it says to add whatever the compute variable is to the input, to get the correct answer.
Answer:
The answer is D.
Explanation:
Hope it helps! =D got it on edge
how do you think someone has programmed computer calculator?
Answer:
Originally, calculator programming had to be done in the calculator's own command The most basic calculations are addition, subtraction, multiplication, and division. The more transistors an integrated circuit has, the more advanced mathematical functions it can perform.
janice has set her camera for f/4 but is trying to decide if she should switch to f/8
a. a larger aperture and smaller depth field
b. a smaller aperture and greater depth field
c. a smaller aperture and smaller depth of field
d. a larger aperture and greater depth of field
Answer:
b
Explanation:
cuz the smaller apeture and greater depth field would be better
Answer:
B a larger aperture and smaller depth of field
Explanation:
EDGE 2022
Think about some of the most memorable and forgettable games ever created. They can be games that were
discussed in this unit or otherwise. What are some of the consistent factors that made certain games
memorable to you? What were some of the consistent factors that made certain games forgettable to you?
Why? Explain.
Answer:
There can be many reasons.
Explanation:
1) Unforgettable story
2) The scenery is soooo good (for example, Legends of Zelda : Breath of the Wild)
3) The meaning behind the game.
4) Why the game was created caught your attention
Hope I helped!
01000001 01101110 01110011 01110111 01100101 01110010 00100000 01101001 01110011 00100000 00110100 00110010 00101110 There's a way to make this meaningful; find it!
Answer:
Binary Code
Explanation:
I believe this is Binary code, so if you enter this in Google, click a translator from binary code to text, and it should tell you.
when I did it, it said "Answer is 42"
Hopefully this helped any.
Quickly viewing a segment of your database right from the contacts, companies, deals, or tickets dashboard is an example of which type of segment?A. Active list.B. Saved filter.C. Static list.D. Saved list.
Answer:
D) Saved list
Explanation:
Segments are saved searches or dynamic lists that enables you to access information from multiple databases as well as search for specific field values or behavioural information.
Saved lists are used with standard objects like tickets, contacts, deals, companies etc. It allows you to quickly view or access a segment of your database right from the contacts, deals, tickets dashboard or generally objects dashboard, based on their property values.
A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle.
Answer: configuration
Explanation: hardware also known as a software.
Answer: configuration
Explanation: hardware also known as a software.
helping is caring :)
The house had a wonderful pool of ... (his/its/our) own.
Answer:
its
Explanation:
"It" used in a number of different forms of sentences and has several rules. 'It' can be used in a sentence either for a Subject or an Object. It can be used as an introductory word in a sentence when there is no mention of the subject. It used for the singular, third-person pronoun. While it has many uses and according to the question, it is used to refer to a lifeless object (home).
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information.A. TrueB. False
Answer:
A. True.
Explanation:
In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.
In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.
Jack needs to email two documents to a friend, but the files are so large his email server bounced them back as undeliverable. What is your advice?
first try to do one at a time and if they are both too large he can send them through softwares like google drive that let you have large amounts of storage with your files
Saving a file as a new filename can be accomplished through the Save As dialog box.
True False
Answer:
True.
Explanation:
A dialog box is a small window that serves as a controlling element in computers. The name dialog box is suggestive that it is a window that helps the user to communicate and response with an answer.
There are several types of common dialog box such as open dialog box, save as dialog box, print dialog box, etc.
Save as dialog box is a window that enables the user to save a file with a new name and new location. Save as dialog box can be opened by going to the File menu and click Save as. After the Save as dialog box appears, the user is able to change file name, location, etc.
Thus the statement is true.
Once you have a listing of every unique combination of salesperson, product and location, what Excel function would you use to compute the total sales for each combination of salesperson, product and location
Answer:
SUMIFS
Explanation:
As we know that the excel is used to present the data in a very attractive way by applying the formulas, pie charts, functions as a pivot table, goal seeking, macros, etc
In order to determine the total sales for each and every sales person, production and location combination we use the SUMIFS function so that the total of each column could come in an easiest and better way
You need to install several USB devices on a server. You have been asked to attach USB hubs to the computer. Only one USB port is available. How many hubs can you daisy chain using the single port?
Answer:
5 Hubs
Explanation:
Only up to 5 hubs you can have connected without problems.
List some good names for devices on your home network or on the network in your school's lab. Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.
Answer:
Following are the answer to this question:
Explanation:
The following is the list of name devices, which is used home network or the school lab.
hrtr01(home router 1). schadmrtr02(school building router 2). clpc01, and clpc02 (computer laboratory pc 1 and 2) .Uses:
Its use as descriptive names as necessary without gives potential hacks much more relevant data. It provides only areas that are essential for both device identification. It allows the name for irrelevant or redundant information doesn't over-complicated.MS Excel is a powerful spreadsheet program that helps people with complex mathematical calculations. In what ways could you use Excel for personal, work and school purposes? Give an example for all three.
Answer:
Explanation:
En Google te sale la respuesta fácilmente.
Solo pones la pregunta primero con personales, luego con laborales y así...
Y de luego los ejemplos
Which statement best describes an academic goal?
Answer:
Explanation:
Hila gets good grades and works hard to finish first in class.
Hope this helped you!
Answer:
Hila gets good grades and works hard to finish first in class.
Hope this helped you!
Explanation:
Define a public static method named s2f that takes two String arguments, the name of a file and some text. The method creates the file and writes the text to it. If all goes well the method returns true. If, however, either of its arguments are null or if there is any problem in creating or writin
Answer:
Java solution (because only major programming language that has public static methods)
(import java.io.* before hand)
public static boolean s2f(String fileName, String text){
try{
PrintWriter out = new PrintWriter(new File(fileName));
out.println(text);
out.close();
return true;
}
catch(Exception e){
return false;
}
}
If you were doing a regular expression inside a Linux command line, which special character on the keyboard would give you two possible matches using the example below: car ____ truck
Answer: car | truck
Explanation: The pipe (|) symbol used can be used in regular expression to simply imply OR. This means when used in between expression, can be used to search for all matches of the strings in which it stands in between. In the scenario above, If the pipe symbol is located in between the two strings, such as [ cars | trucks], the expression returns possible occurrence of the strings cars and trucks. It may also be used to locate and return the occurrences of more than 2 strings, such as; string1 | string2 | string3
A={a,b,c,d} B={p,q,r,s} find the value of A-B and B-A
Answer:
a-b=(a,b,c,d)
b-a=(p,q,r,s)
Memory operations currently take 30% of execution time of program A. A new widget called a "cache" speeds up 80% of memory operations by a factor of 4. A second new widget called a "L2 cache" speeds up half of the remaining 20% by a factor of 2. What is the total speed up?
Answer:
The answer is "1.24"
Explanation:
Formula:
[tex]\bold {Speedup= \frac{1}{(1 - non-speedup-portion) +(Speed up portion 1)}+\frac{(speed up-portion \ 2)}{ speedup\ 2}+ ....}\\\\[/tex]Given value:
Operations in the memory = 30%
= 0.3
80% Memory [tex]= 0.3 \times 80\%[/tex]
[tex]=[/tex] [tex]\frac{(0.3 \times 80) }{100}[/tex]
[tex]= 0.24[/tex]
Now it takes 0.06 seconds, saved 0.18 seconds.
20% of the memory operations:
[tex]= 0.3 \times 20\% \\\\= \frac{(0.3 \times 20)}{100} \\\\= 0.06[/tex]
Half of the other 20% = 0.03
It takes 0.015 seconds now, saved 0.015 seconds, saved 0.195 seconds.
It takes 0.805 seconds in the 1 second.
[tex]Speedup = \frac{1} {0.7 + 0.3\times \frac{0.8}{4}} + 0.3\times0.2\times\frac{0.5}{2} + 0.3\times0.2\times0.5[/tex]
[tex]Speedup = 1.2422[/tex]
A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.
Answer:
A switch operates in the OSI reference model data link layer and uses the MAC address to forward packets
Explanation:
A network switch used in wired physical network connection, has several ports and acts as the bridge in the network of computing devices with a port naming system based on MAC addresses to forward data receives at the OSI model data link layer. By incorporating the capability of routing, switches can forward data at the network layer, known as layer 3.
An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creators to retain copyright while allowing others to:
Answer:
Copy, distribute, and remix
Explanation:
Creative Commons is not for profit international network and organisation with head quarters in America that enables the discovery of material that are openly licensed so as to be available for use by others fostering the possibility to gain educational insight to creative works to serve as foundation for their own works legally. Creative Commons provide CC licences that are accessed by content creators with a desire to share their creativity on the web.
Which of these jobs would be most appropriate for someone who majors in information technology? managing a database for a large department store developing new computing technology that will someday improve network speeds managing the computer network for a large department store designing the hardware for a military helicopter's on-board computer
Answer:
AExplanation:
managing the computer network for a large department store
The job that would be most appropriate for someone who majors in information technology is to manage the computer network for a large department store. Thus, the correct option for this question is C.
What is Information technology?Information technology may be defined as a broad study of a system and network that uses the computer's hardware, software, services, and supporting infrastructure in order to manage and deliver information using voice, data, and video.
So, the job associated with information technology may require the significant utilization of computers and networks over a huge range of numbers. Managing a database is the work of software engineers, designing the hardware for a military helicopter's onboard computer is the work of hardware engineers, etc.
Therefore, the job that would be most appropriate for someone who majors in information technology is to manage the computer network for a large department store. Thus, the correct option for this question is C.
To learn more about Information technology, refer to the link:
https://brainly.com/question/4903788
#SPJ5
qbasic write a program to input number of keyboard to purchase and display the total amount to be paid for with dry run and output step by step
Answer:
DIM cost, amount
cost=8
INPUT "How many do you want to purchase";amount
PRINT "Total cost: ";amount*cost
Explanation:
What do you mean by dry run?
The next thing Maia wants to do is to indent the first line of her paragraphs.
How does she do this?
Answer:
She moves the first-line indent marker to the right.
Explanation:
Answer: d the first-line indent to the right
Explanation:
what is meant by concentration of a solution
Answer:
The concentration of a solution means the amount of solute present in a given or specific amount of solution. (presented in percentage)
For example, the Normal Saline solution normally used for different scientific experiment or so. The saline water has 0.9% of salt (sodium chloride). This is the concentration of solution of salt.
Answer:
Concentration is the ratio of solute in a solution to either solvent or total solution.
Explanation:
Concentration basically means how much of something is in a given area. A gas, for example, can be highly concentrated in a given area, but a liquid cannot be concentrated and always takes up the same amount of space.