Answer:
Web Conferencing
Explanation:
When you collaborate or meet with people online, it is called a virtual meeting or collaboration.
What are virtual meetings?They are meetings or collaborations done without the participants having to meet physically.
Instead, the participants meet via one or a combination of platforms specifically designed for such a purpose. These platforms include Discord, Slack, and so on.
More on virtual meetings can be found here: https://brainly.com/question/15293394
#SPJ2
The area of a parallelogram is 18 square units.one side of the parallelogram is 24 units long.The other side is 6 unit long. which could b the parallelograms height select all apply
Answer:
[tex]Height = \frac{3}{4}\ unit[/tex]
[tex]Height = 3\ units[/tex]
Explanation:
Given
Shape: Parallelogram
[tex]Area = 18 unit^2[/tex]
[tex]Side\ 1 = 24 units[/tex]
[tex]Side\ 2 = 6 units[/tex]
Required
Determine possible heights of the parallelogram
Area of parallelogram is:
[tex]Area = Base * Height[/tex]
Make Height the subject of formula
[tex]Height = \frac{Area}{Base}[/tex]
When Base = 24 units;
[tex]Height = \frac{18}{24}[/tex]
[tex]Height = \frac{3}{4}\ unit[/tex]
When Base = 6 units;
[tex]Height = \frac{18}{6}[/tex]
[tex]Height = 3\ units[/tex]
When Base = 24 units
When Base = 6 units
Height: 3
Define the missing member function. Use "this" to distinguish the local member from the parameter name.
#include
using namespace std;
class CablePlan{
public:
void SetNumDays(int numDays);
int GetNumDays() const;
private:
int numDays;
};
// FIXME: Define SetNumDays() member function, using "this" implicit parameter.
void CablePlan::SetNumDays(int numDays) {
/* Your solution goes here */
return;
}
int CablePlan::GetNumDays() const {
return numDays;
}
int main() {
CablePlan house1Plan;
house1Plan.SetNumDays(30);
cout << house1Plan.GetNumDays() << endl;
return 0;
}
Answer:
Here is the complete member function:
void CablePlan::SetNumDays(int numDays) { //member function of class CablePlan which take numDays as parameter
this->numDays = numDays; // refers to the fields numDays of CablePlan class using this keyword
return; }
Explanation:
The complete program is:
#include <iostream> //to use input output functions
using namespace std; //to identify objects like cin cout
class CablePlan{ //class
public: //public methods of class
void SetNumDays(int numDays); //method of class CablePlan that takes numDays as parameter to set the days
int GetNumDays() const; // method of class CablePlan to get no of days
private: //private data member of class CablePlan
int numDays; //private data member of class CablePlan that holds no of days
};
// FIXME: Define SetNumDays() member function, using "this" implicit parameter.
void CablePlan::SetNumDays(int numDays) { /
this->numDays = numDays; // used to refer to numDays variable of CablePlan class using this keyword
return;}
int CablePlan::GetNumDays() const { //define member function GetNumDays
return numDays;}
int main() { //start of main function
CablePlan house1Plan; //creates object of CablePlan class
house1Plan.SetNumDays(30); //uses object to call member function of CablePlan passing value 30 to it in order to set no of days
cout << house1Plan.GetNumDays() << endl; //uses object to call member function of CablePlan to get the no of days (numDays)
return 0;}
Here this keyword is used to refer to the field i.e. numDays of CablePlan class. This distinguishes local member numDays from parameter numDays using this with -> symbol.
'this' pointer retrieves the object's numDays which is hidden by the local variable numDays . The output of this program is:
30
Answer:
this.numDays = numDays;
Explanation:
You just need one line of code. "this." to access the class member, and the "." is the member access operator.
being a java developer what do you think, "would multi-threading play a vital role in maintaining concurrency for efficient and fast transactions of atm or will slow down the atm services by making it more complicated?”.
Answer:
I would state that performance is not the main challenge of an atm, nor is multi-threading. Robustness and provable correctness is of greater importance, and those are much easier to achieve using a single-threaded solution.
the penalties for ignoring the requirements for protecting classified information when using social networking services are _______ when using other media and methods of dissemination?
Answer:
the same as
Explanation:
Classified information is confidential information that a government deems to be protected.
There are certain penalties for the person if they ignore any protection measure for classified information when using social networking services and the penalties are the same as if someone uses other media and methods of dissemination.
Hence, the correct answer for the blanks is "the same as".
The penalties for ignoring the requirements for protecting classified information when using social networking services are the same as when using other media and methods of dissemination.
Penalties is the way of punishing an offender for doing wrong.
It is of necessity to ensure that all sensitive data are kept in a confidential manner as the punishment for someone who ignored all the important condition for protecting sensitive data or information are all the same as when using the following:
•Social networking services
•Media such as Radio,Television
• Methods of dissemination such as Newspaper publication, Publishing in journal
Learn more here:
https://brainly.com/question/17199136
At the Network layer, what type of address is used to identify the receiving host?
Answer:
IP Address
Explanation:
At the Network layer, the IP address is used to identify the receiving host. It identifies the senders and receivers of data in a network.
IP Address is used to assign every node in a network which is used to identify them. Its two main purposes are 1. Address location 2. Identification of network interface.
A company's computers monitor assembly lines and equipment using ________ communications.
Answer:
Machine to machine communications
Explanation:
Machine to machine communication is a type of communication that exists among the technical devices. The communication is linked either with the help of wire or through wireless. The information is communicated and transmitted with this form of communication. Human involvement or intervention is not required during the transfer of data.
what are the advantages of providing static and dynamic views of software process as in the rational unified process
Ani need free points cus i have zero sry
Explanation:
Write a recursive function that accepts an integer argument, n. The function should display n lines of text on the screen, with the first line showing n spaces followed by an asterisk, the second line displaying n-1 spaces followed by an asterisk, to the nth line which shows 1 space and 1 asterisk.
You want to register the domain name ABCcompany.org, but the registration service is not allowing you to do that. What's the most likely reason for this
Options :
The domain name is registered to someone else.
Domain names must end in ".com".
You are not the legal owner of ABC Company.
Domain names must be all in lowercase.
Answer:
The domain name is registered to someone else.
Explanation: In the scenario above, ABCcompany.org represents the domain name of a particular person or establishment which provides access to the website of the owner. The domain name given to an individual or website must be distinct, that is no two different organizations or persons can use exactly the same domain name. Domain names can end with :. com, org, ng and various other and they aren't case sensitive. Therefore, the inability to register the domain name abive will likely stem from the fact that the domain name has is already registered to someone else.
The domain of a website is the name of the website. The most likely reason why the domain cannot be registered is that, it has already been registered/taken by someone else.
There are several reasons why a domain cannot be registered.
The most important reason is that:
When a domain is taken, no other person can have access to that domain until its expiry (and not renewed). So, when a domain has been taken, you will not be able to register such domain.
Another reason is that:
Insufficient funds is another reason, if the domain is not a free domain.
Read more about website domain at:
https://brainly.com/question/11392666
Suppose your network support company employs 75 technicians who travel constantly and work at customer sites. Your task is to design an information system that provides technical data and information to the field team. What types of output and information delivery would you suggest for the system?
Answer and Explanation:
Technicians who travel constantly and are most likely working from remote locations would require information support that is ready and available as at when needed (24/7). The following would help them access technical information easily:
Internet knowledge based system: this could be like a encyclopedia for technicians where they could easily search up information they need for their work from anywhere.
Web-based system : this can help technicians ask or search for technical information online and also communicate and give out information to other technicians.
fax and email: a ready and available email support system and fax would boost information availability to technicians
Based on the information given, the system that should be implemented should be one where the information will be stored in a database.
Also, the system will have an application that the technicians will use to login into the system. It should also be noted that the system will be divided based on the technician's roles.
In this case, the technicians will have different access that they can use to get the data from the database.
Lastly, encryption should be used to secure the data.
Learn more about database on:
https://brainly.com/question/13691326
You have been hired to upgrade a network of 50 computers currently connected to 10 Mbps hubs. This long-overdue upgrade is necessary because of poor network response time caused by a lot of collisions occurring during long file transfers between clients and servers. How do you recommend upgrading this network?
Answer:
Following are the answer to this question:
Explanation:
A network adapter and network switches were also recommended because only 50 computer systems are accessible users could choose a router as well as two 24-port network cables. It could connect directly to a server or one computer with your router.
It can attach some other machines to a switch. If it is connected with the wireless router to the router so, it implies the ethernet port if you've had a landline installed two wireless networks throughout the location which can be easily accessed because the wired network will link all computers to all of it.
Switches could be managed or unmanaged unless circuits were also taken into account. It provides more implement strategies and remotely the controlled device can already be controlled as well as configured by the manager. In the CISCO and Dell controlled port devices, it also available for sustainabilty, that is used by the 24-port switches and for household or smaller networks, that's why we can upgrade it
In which of the following situations would you want to use GOMS/KLM as an evaluation tool?
A. Shopping mall movie rental kiosk assuming the user rarely ever rents movies
B. Amazon's create an account process
C. A teacher evaluation form that a student fills out once
D. None of the above
E. All of the above
Answer:
B. Amazon's create an account process
Explanation:
The Keystroke-Level Model (KLM) is a cognitive modeling tool which can be used in predicting the performances carried out by human on interface designs. It's the most "practical" of the GOMS methodologies.
This model tends to predict how long it will take for the completion of a routine task by an expert user. There should be no errors.
So, Option B is correct because GOMS/KLM is an evaluation tool which fits in the evaluation of Amazon's create an account process.
different uses of quick access toolbar
Modern car odometers can record up to a million miles driven. What happens to the odometer reading when a car drives beyond its maximum reading?
Answer:
It would go to 1000000. Explanation:Unlike old vehicle odometers that will reach 999999 and stay there(though it is very unlikely to reach that figure) new vehicle odometers have the seventh digit reading and when it passes 999999 it would clock to 1000000.
But in reality it is less likely for vehicles to reach the 999999 mark and most vehicle owners do not get to see their vehicles reach this mark as the vehicle will either be scrapped or abandoned before it gets to that million mile
Further, the ideal behind this million miles is due to the act of bad guys who tend to spin vehicle odometers to falsify their readings making it seem as though it has not gone a long mile.
The odometer reading of a modern vehicle resets to Zero, once it's maximum odometer reading is reached.
The odometer is a recording instrument in a car which is used to measure and keep a record of the total distance a car or wheeled machine such as bicycles has covered since their manufacture. The odometer is different from a speedometer which shows the current speed at which a car is moving. The odometer keeps track of distance, such that it takes the Cummulative sum of the distance covered usually in miles. The odometer resets to 0 once it's maximum value is exceeded.Learn more : https://brainly.com/question/21087757?referrer=searchResults
A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet.
Which of the following should be used in the code? (Select TWO.)
A. Escrowed keys
B. SSL symmetric encryption key
C. Software code private key
D. Remote server public key
E. OCSP
Answer:
D. Remote server public key
E. OCSP
Explanation:
Options D and E are correct because the above question states that its "verifying that a key is valid". This means that it didn't specify which key. Therefore, it sensible that the application wants to verify the validity of the remote host's key. So, in order to use OCSP to verify the validity of that key, that app actually needs the public key of the remote server.
what is difference between ssd and hdd
Answer:
HDD is old-school storage device that uses mechanical platters and a moving read/write head to access data.SSD is a newer, faster type of device that stores data on instantly-accessible memory chips..SSD is little expensive than HDD and gives better performance
Answer:
Differed performance level's
Which of these communication avenues is not regulated by the Federal Communications Commission (FCC)?
1. Radio
2. Internet
3. Television
4. Satellite
George, a user, has contacted you to complain that his issue has not been resolved. He has already contacted your department twice today. What should you do first?
Answer:
Apologize for the inconvenience and proceed with any necessary assistance.
Explanation:
Remember, the rules of business communication entails a friendly disposition to clients. We note here that George is a user or what we may client, and has an unresolved complaint.
Consequently, apollogizing to him may open him further into the details of the issue as you now work to resolve his complaints.
A mobile base station (BS) in an urban environment has a power measurement of 15 µW at 175 m. If the propagation follows an inverse cube-power law (Section 3.2.2), what is a reasonable power value, in µW, to assume at a distance 0.7 km from the BS?
Answer:
The reasonable power will be "0.234 μW".
Explanation:
The given values are:
P = 15 μW
d = 175 m
As we know,
Propagation follows inverse cube power law, then
∴ [tex]Power \ \alpha \ \frac{1}{d^3}[/tex]
⇒ [tex]Power=\frac{K}{d^3}[/tex]
On substituting the estimated values, we get
⇒ [tex]15\times 10^{-6}=\frac{K}{(173)^3}[/tex]
⇒ [tex]K=15\times (175)^3\times 10^{-6}[/tex]
Now,
"P" at 0.7 km or 700 m from BS will be:
⇒ [tex]P=\frac{K}{d^3}[/tex]
⇒ [tex]P=\frac{15\times (175)^3\times 10^{-6}}{(700)^3}[/tex]
⇒ [tex]P=0.234 \ \mu W[/tex]
which behavior would best describe someone who has good communication skills with customers?
A. Interrupting customer frequently,
B. Talking to customers more than listening
C. Following up with some customers
D. Repeating back what customer say
Answer:
2
Explanation:
hope this helps you! :)
The answers B which is Talking to customers more than listening!
PLS MARK AS BRAINLIEST