To find any information on the Internet, we enter specific keywords into a search engine. What happens next

Answers

Answer 1

Answer:

Answer A

Explanation:


Related Questions

How long does it take to send a 19 MiB file from Host A to Host B over a circuit-switched network, assuming:

Answers

Answer:

58.4 ms

Explanation:

How long does it take to send a 14 MiB file from Host A to Host B over a circuit-switched network, assuming:

Total link transmission rate = 31.1 Gbps.

Network is TDM, with 11 permitted users, each with an equal time slot size.

A link connection requires a setup time of 51.7 ms.

Solution:

For TDM transmission, the bandwidth is divided equally between the users for transmission.

Transmission rate of each user = 31.1 Gbps / 11 users = 2.83 Gbps = 2830 Mbps

Time taken for file transmission = file size / transmission rate = 19 Mb / 2830 Mbps  = 0.0067 seconds = 6.7 ms

Total time taken = Set up time + transmission time  = 51.7 ms + 6.7 ms = 58.4 ms

The total transmission time is 58.4 ms

what is active transport​

Answers

Answer:

the movement of ions or molecules across a cell membrane into a region of higher concentration, assisted by enzymes and requiring energy.

Here ya go ;)

Someone please help?!



Drag the tiles to the correct boxes to complete the pairs.
Match the soft skills with their descriptions.
to foster approachability among team members
to come up with creative but practical solutions
to set priorities and accomplish goals
to identify and effectively use a team's potential
to accomplish goals
leadership
analytical thinking
coordination
2
time management

Answers

Answer:

i think the 1st one is for leadership

Answer:

im taking it right now

Explanation:

funny

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

Answers

Answer:

Full control.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Hence, if a folder exists on a new technology file system (NTFS) partition, the permission which is needed by a user who needs to set security permissions on the folder is full control.

Queries in Access are utilized by users to enter data into tables and view existing records true false

Answers

Answer:

False.

Explanation:

Microsoft Access can be defined as a software application or program designed by Microsoft corporation to avail end users the ability to create, manage and control their database.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Database schema is the logical design of a database. In database management, the term "schema" is used to denote a representation of data while the term "instance" is used to denote an instance of time.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

Datasheet View in Access are utilized by users to enter data into tables and view existing records.

What the five types of initiatives that are necessary when putting together and implementing an IT strategy

Answers

Answer:

Pre-implementation

Planning

Execution

Completion

Control

Explanation:

The pre-implementation stage speaks volumes on the breakdown of the implementation stages and how it is being formulated. It shows a stepwise identification of important implementation carriers and the responsibility of the IT organization. Their focus is to determine the content and human resources that are required to implement the strategy being formulated.

The purpose of the planning implementation stage is to plan and agree on specific goals by considering all stakeholders. There is also a need to set deadlines, time-to-time evaluation, and effective coordination of the stakeholders.

The execution phase enforces the implementation plan. As the name implies, it builds a comprehensive plan by focusing on the target group to maintain and ensure a structural and systematically conducted work environment.

The completion phase includes all actions necessary to bring out the results within the organizzation. Initially, there is a need to agree on the dimension of the IT strategy, the time dimension, and the detailed dimension.

The last phase which is the control deals with the logic of setting appropriate quantitative and qualitative control measures so as to allows continuous implementation control and navigation implementation control.

is a colon (:) and semicolon (;) important in CSS declaration?

Answers

Answer:

YES

Explanation:

this is very important

AM GIVING BRAINLIEST! Assume you have entered the following after a prompt. >>> import time
How would you pause a program for 5 seconds?

pause(3)
time.pause(5)
time.sleep(5)
sleep(3)

Answers

Answer:

time.sleep(5)

Explanation:

For Python, not sure what program your teacher is asking about.

The Python time sleep function is used to delay a program's execution. To stop the running of the program for a certain amount of time in seconds, we can use the sleep function in Python. Thus, option C is correct.

What time sleep () in Python?

Python comes with built-in functionality for sleeping your program. The sleep() function in the time module allows you to pause the caller thread's execution for however long you choose.

The current thread's execution can be paused for a given amount of time in milliseconds by using the sleep() function. The millisecond argument value cannot be negative. If not, it raises an Illegal Argument Exception.

The current thread is put on hold for a set amount of time via sleep. This is an effective way to give other threads of an application or other apps that could be executing on a computer system access to processor time.

Therefore, time.sleep(5) pause a program for 5 seconds.

Learn more about Python here:

https://brainly.com/question/178238

#SPJ2

g How safe is to have a LinkedIn account where you have published all the important information about yourself

Answers

Answer:

LinkedIn is very safe

Explanation:

LinkedIn is very safe, that being said you should never post private information about yourself anywhere that you do not want others to see/know. LinkedIn is a job recruiting and networking site, meaning that all the information that you have or will be publishing there should be related to your career. There is no reason for you to publish private information such as document numbers, social security number, address, bank account info, etc.

Answer:

The concept you are looking for is "digital footprint" and it goes far beyond any one social network.

Any information that is public can be used against you. You have to make an assessment about the risk/reward of making data public, and once it is public, you have to treat anyone using that information as public, too. Too often people think that if someone knows something about them, then they can be trusted, an "insider".

How many questions have you seen so far other than this one?

Answers

Answer:

18 other questions were answered by myself and Aristotle

Answer:

id.k

Explanation:

thanks for the points

9.
How many total numbers can be represented with an 8-bit binary (base-2) system?
Α. 127
Β. 128
C. 255
D. 256

Answers

Answer:

C. 255

Explanation:

The binary code for 255 is 11111111 which is the largest binary number that can be represented in 8 bits. This means you can represent a total of 255 numbers. (0-255)

Drag each tile to the correct box.
Match the device to its correct classification. Choose pairs that will use up all the tiles.
output
input
dual
peripheral
printer
monitor
modem
mouse

Answers

Answer:

Answers In explanation but don't know about dual

Explanation:

Input: mouse peripheral

Output: Monitor printer

Both: Modem

Answer:

Modem- Dual

Mouse- Input

Monitor- Output

Printer- Peripheral

Explanation:

I took the test

A company wants to build a new type of spaceship for transporting astronauts to the moon. What should the company do first?

Answers

Answer:

Think of some ideas of how their gonna create the new spaceship

Explanation:

Because I'm Smort (typo intended)

Answer: The steps: ask to identify the need and constraints, research the problem, imagine possible solutions, plan by selecting the most promising solution, create a prototype, test and evaluate the prototype, and improve and redesign as needed. Also called the engineering design process.

Explanation:

Consider all of the ways that you interact with the internet during a normal month in your life: websites, banking, apps, etc. Of all of those interactions, explain which one you think is LEAST secure and describe how much “risk” you experience using it. Then explain which interaction you feel is MOST secure?

Answers

Answer:

Website, are probably the least secure because depending on what site you click on it can be an add for a different website. You can risk ending up on a site you didn't want to. I think that banking apps are the most secure, because its mostly through your bank so it would have to be secure.

Explanation:

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with

Answers

Question:

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.

Answer:

Written in Python

listlent = int(input("Length of List: "))

mylist = []

mylist.append(listlent)

for i in range(listlent):

    num = int(input(": "))

    mylist.append(num)

   

evens = 0

odds = 0

for i in range(1,listlent+1):

    if mylist[i]%2==0:

         evens=evens+1

    else:

         odds=odds+1

       

if(evens == 0 and odds != 0):

    print("All Odds")

elif(evens != 0 and odds == 0):

    print("All Even")

else:

    print("Neither")

Explanation:

This prompts user for length of the list

listlent = int(input("Length of List: "))

This initializes an empty list

mylist = []

The following iteration reads the list items from the user

mylist.append(listlent)

for i in range(listlent):

    num = int(input(": "))

    mylist.append(num)

   

The next two lines initialize even and odd to 0, respectively

evens = 0

odds = 0

The following iteration if a list item is even or odd

for i in range(1,listlent+1):

    if mylist[i]%2==0:

         evens=evens+1

    else:

         odds=odds+1

This checks and prints if all list items is odd        

if(evens == 0 and odds != 0):

    print("All Odds")

This checks and prints if all list items is even        

elif(evens != 0 and odds == 0):

    print("All Even")

This checks and prints if all list items is neither even nor odd

else:

    print("Neither")

Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journals, textbooks, and so on. Include data values that describe various attributes of the material, such as the number of pages and the names of the primary characters. Include methods that are named appropriately for each class and that print an appropriate message. Create a main driver class to instantiate and exercise several of the classes.

Answers

Answer:

Following are the code to this question:

please find the attached file.

Explanation:

In this code, four class "novels, magazines, technical journals, and textbooks", is defined, in which it holds their respective default constructor and the get and set method to hold the string and integer value, and in the book class the main method is defined, that creates its object and a switch to for search value and print its value.

The Matlab Script should:1. Clear the command window2. Clear the workspaceQuestion 1: Why do we clear the command window and workspace at the beginning of a script

Answers

Answer:

This is done for the simple reason of having more space to work on

Explanation:

This is done for the simple reason of having more space to work on. By clearing the command window and workspace you provide yourself with sufficient space to create new commands without the clutter of the previous commands. This also prevents your focus from shifting towards old commands and allows you to simply focus on the commands you are currently working on. This does not clear all variables from the script, it only clears the current screen but the previous commands can still be accessed by using the up-arrow key

Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services are running determine what exploits have been committed determine what systems are up and running

Answers

Answer:

Network footprinting is used to ______________________.

test for vulnerabilities.

Explanation:

Network footprinting is the technique that reveals system vulnerabilities and how the vulnerabilities can be exploited.  Hackers use footprinting to determine the location and objective of a network.  The discovery of this specific information about the organization can lead to the hacking of the network.  Network footprinting relies on loopholes to create vulnerabilities in a network and plans for cyberattack.

What is the difference between MySQL and MariaDB?

Answers

Answer:

Explained below

Explanation:

They are both server database.

MySQL Server database has two licensing options namely GPLv2 and Enterprise. Whereas, MariaDB Server database is one that has only one license which it is licensed to namely GPLv2.

Now, the license for both of them differs in that the one for MySQL Server database comes with some available features and support. Whereas, the one for MariaDB comes with the full-featured package.

What item appears in a user’s My Unresolved items after synchronization using Salesforce for Outlook? (2 answers)

Answers

The avialble options are:

1. Notes not associated to a record

2. Emails not associated to a record

3. Contacts not assigned to an account

4. Cases not assigned to a contact

Answer:

1. Contacts not assigned to an account

2. Emails not associated to a record

Explanation:

Given that any items that are not automatically assigned to Salesforce records are found in My Unresolved Items.

Hence, usually, Items such as Contacts, Events, Emails, and Tasks are found in a user's My Unresolved Items after synchronization using Salesforce for Outlook.

Thereby, in this case, the correct answers are:

1. Contacts not assigned to an account

2. Emails not associated with a record

A medical record that contains computer-generated reports, collects data, and shares data with outside agencies is a

Answers

Answer:

Electronic Health Record

Explanation:

ELECTRONIC HEALTH RECORD is a medical record which helps to collect patients data pertaining the patients medical information and history such as the patient diagnosis, the treatment that was given to the patient and the medication given to the patient, by then sharing the collected and store medical data or information with external agencies in order to reduce any medical mistakes that may want to arise and to as well provide high quality health care service to the patient as regards to the patient already stored medical history on the ELECTRONIC HEALTH RECORD.

What name is given to the assurance that requested information is available to authorized users upon request

Answers

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

Write a c program using loops to generate following output.

12 x 2 = 24
11 x 2 = 22
10 x 2 = 20
9 x 2 = 18
8 x 2 = 16
7 x 2 = 14
6 x 2 = 12
5 x 2 = 10
4 x 2 = 8
3 x 2 = 6
2 x 2 = 4
1 x 2 = 2

Answers

Answer:

#include <stdio.h>

int main()

{

for (int n = 12; n > 0; n--) {

 printf("%d x 2 = %d\n", n, n * 2);

}

}

Explanation:

Only one loop.

_____ software enables team members to prioritize and track tasks by providing features such as boards, timelines, and calendars.

Answers

Answer:

task management

Explanation:

_______ workplace cultures emphasizes everyone being in agreement.

Answers

Answer:

Calm

Explanation:

Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order functions to simplify the design.

Answers

Answer:import functools

# open your file

file = open("integers.txt", 'r')

file = file.read()

# put numbers into a list

file = file.split()

# convert list into integers

file = list(map(int, file))

# use lambda function to get average.

print(functools.reduce(lambda x, y: x+y / len(file), file, 0))

Explanation:

All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____. Group of answer choices

Answers

Complete Question:

All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____.

Group of answer choices.

A. OLE DB

B. ODBC

C. SQL Server

D. Access

Answer:

D. Access

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Some examples of data providers included with .NET for accessing and manipulating data in databases are;

A. OLE DB: this is an acronym for Object Linking and Embedding Database. OLE DB was designed and developed by Microsoft corporation and it comprises of various application programming interfaces (APIs) used for data access.

B. ODBC: it is an acronym for Open Database Connectivity and it was designed and developed by Microsoft corporation used for data access through structured query language (SQL).

C. SQL Server: it is a domain-specific language server designed and developed for managing the various data saved in a relational or structured database.

What type of device is a projector?

Input
Memory
Output
Storage

Answers

Answer:

MEMORY

Explanation:

yeahhhh

Answer:

Output

Explanation:

A projector is an Output device.

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().

Answers

Answer:

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().

Explanation:

You will write a flowchart, and C code for a program that does the following:1. Within main(), it asks for the user’s annual income.2. Within main(), it calls a function called printIt() and passes the income value to printIt().  3. The printIt() function evaluates the income, and if the number is over 90000, prints a congratulatory message.  If the income is not over 90000, it prints a message of encouragement, like “You WILL make $50,000, if you keep going.”Here is what the output looks like.File SubmissionUpload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

In which area is composing for games different from composing for movies?
A. looping scores
B. royalties earned
C, temp tracks
D. adaptive scores

Answers

Answer: royalties earned

Explanation:

In areas such as the looping scores, temp tracks and adaptive scores, there are similarities when composing for games and when composing for movies.

The area where there is difference when composing for games and composing for movies is the royalties earned. The interest that is earned on royalties for both cases are different.

Other Questions
Which document would be best created using Word online AnimationGraphResumeSpreadsheet Build a model that shows the details of the 20-year mortgage when the loan amount, APR, and loan date are given. Assume that payments are made on the third workday of each month (disregarding federal holidays). the weight of a small bag of raisins of 3.0 times the weight of a large bag. The large bag weight 8.0 of a pound. what is the weight of the small bag? solve this problem any way you choose.I just want the answer Ryan earns $5 for each small dog he walks and $8 for each large dog he walks. Today he walked 8 dogs and made a total of $49. How many small dogs did Ryan walk?Ryan walkedsmall dogs. Choose the graph of the solution to this inequality - 6x < 21 PLEASE HELP!!!What is the y-intercept of the line shown?A coordinate plane is shown. A line passes through the y-axis at -1 and through the point 1 comma 2.100.51 The partial factorization of x2 x 12 is modeled with algebra tiles.An algebra tile configuration. 4 tiles are in the Factor 1 spot: 1 is labeled + x, 3 are labeled +. 1 tile is in the Factor 2 spot and is labeled + x. 20 tiles are in the Product spot: 1 is labeled + x squared, 3 are labeled + x, the 4 tiles below + x squared are labeled negative x, and the 12 tiles below the + x tiles are labeled negative.Which unit tiles are needed to complete the factorization? 8. The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $20,000 per year forever. If the required return on this investment is 8%, how much will you pay for the policy A tank that is 30% full contains 651 gallons of water. How much water does the tank hold when it is full?Question 1 options:1,620 gallons2,160 gallons1,627.5 gallons2,170 gallons How is the periodic table useful today? Julio's father is 4 times as old as Julio.In 10 years, he will be 2 less than Julio's agetimes 3. How old are Julio and his father? is defined as: inquiry or investigation into a subject in order to discover or revise facts, theories,applications, etc.a. Rehearsalb. PlagiarismC. Researchd. Articulation 5a. Find the value of x. Round to the nearest tenth (1 decimal place).45.X5Your answer Need help with this math question pls help me will mark brainiest btw The 1992 Los Angeles riots were motivated by popular anger over which ofthe following?A. Military actions in the Middle EastB. Islamic terrorist attacksC. Political corruptionD. Excessive police violence Oliver's plane landed at the airport at 8:00 at night. The plane ride was 9 hours and 39 minutes,What time did the airplane leave? Move numbers to the clock to show the time, 4m 3m 17m m 7m = 12 i need help asap pls If line p has a slope of -1/2, what is the slope of a line ;perpendicular to p? parallel to p? help will give brainliest