Answer:
d . commercial potential
Explanation:
The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.
This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.
100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate
Answer:
The two factors are:
The default gateway The routersExplanation:
Default gateway:
The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.The routers:
A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.50 POINTS TO WHOEVER CAN HELP ME! When your friend Sarah turns on his computer, she hears four beeps. The computer won’t fully boot. Sarah has a Dell computer with a quad-core processor and has recently upgraded her RAM. Apply the troubleshooting methodology to help her understand and resolve this problem; I have them listed below: Identify the Problem Internet Research Establish a Theory of Probable Cause Test the Theory Establish a Plan of Action Implement the Solution or Escalate Verify Full System Functionality Document Findings
Answer:
Unplug everything
unscrew and remove side panel
pop-out each memory card, blow on them and pop them back in (be sure the tabs lock back down)
Explanation:
Somehow one of the memory cards must have jiggled lose, even though they looked fine at first
Answer:
this is a memory card fail this could mean many different things like dust, but it ussualy isn't that serious if she has a new RAM, and if there is a problem she should have a warranty on her new RAM card
What can you use on the Internet to look for information?
Answer:
I use Wikipedia to know anything
Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest rating.
Answer:
The given statement is false.
Explanation:
A Website reputation seems to be a built-in feature or tool. It retains knowledge about users, through visiting pages. The committed resources for this site depending on either the website as well as the basic details about its design. The reputation including its Website has been used to strengthen the safety of phishing attacks or malicious content.Therefore the solution given above is the right one.
Identify characteristics of structured programming design. Choose all that apply.
The code is easy to test and debug.
It creates a program made of modules that can be called when needed.
The code is difficult to modify due to the use of modules.
It uses logic flow.
The code is easier to follow.
The code is easier to modify.
Answer:
The correct options are;
The code is easy to test and debug
It creates programs made of modules that can be called when needed
It uses logic flow
The code is easier to follow
The code is easier to modify
Explanation:
The approach of structural programming is one such that the problem is well understood and the solution is economical
Features of structural programming includes;
Error debugging are facilitated by structural programs and as such testing to debugStructural program creates program modules that are reusableStructural programs can be easily modified hence maintainedStructural program emphasizes on logicThe structural program code is easily read and understood, and therefore, it is easier to followAnswer:
A.B.D.E.F.
Explanation:
pretty much everything except C.
:)
What is the "online disinhibition effect"?
Answer:
Online disinhibition is the lack of restraint one feels when communicating online in comparison to communicating in-person.
How do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)
Answer:
Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.
However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.
Explanation:
Here's how to set Call Forwarding on your android
Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok'An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks everyone to choose a card with estimated number of ideal days to complete a user story and then reveal the card. If estimates were widely different, the facilitator would immediately ask for re-estimates until all the estimates converge. What did the facilitator do wrong?
A. Participants used ideal days as the unit for the estimates.
B. Participants re-estimated immediately after everyone revealed their cards.
C. Cards were revealed when the process should have been anonymous.
D. The facilitator did nothing wrong and played by the rules.
Answer:
The answer is "Option B"
Explanation:
In the given-choices, the only option B is correct because by reassessing instantly, the team loses is its advantage of debating its projections and how it chose those assessments, and the wrong choice can be defined as follows:
In choice A, Mostly as a unit for the projections, respondents should not use the ideal days. In choice C, Whenever the procedure should've been anonymous, no cards were released. In choice D, Its mediator was incorrect and the laws were followed.The website allrecipes is a clearinghouse for recipes of all kinds, with users being able to post new ones as well as try and comment on the recipes of others. Members can get personalized recommendations and find ways to use ingredients they already have on hand. The allrecipes website would be considered
Answer:
The right answer is "web community ".
Explanation:
A digital community, commonly known as a social community as well as a web community, seems to be a virtual environment where representatives predominantly communicate over the internet. They become web-based community centers for stakeholders, specialists, collaborators, and many others to resolve issues, post feedback, including communicate with someone on the goods, services, and reputation of an organization. For several internet platforms, a "gang of silly superstitions" can feel most comfortable.What purpose does the underlined portion of this excerpt
serve in the argument that Americans should agree to pay
more taxes to raise money for entering the war?
Answer:
The below mentioned portion is missing from the question
A part of the sacrifice means the payment of more money in taxes. In my Budget Message I shall recommend that a greater portion of this great defense program be paid for from taxation than we are paying today. No person should try, or be allowed, to get rich out of this program; and the principle of tax payments in accordance with ability to pay should be constantly before our eyes to guide our legislation.
The passage provides the reason why extra taxes must be collected should America decide to join the war or it introduces the claim that patriotic Americans should be willing to sacrifice and pay extra taxes.
which of the following is not a selection tool in Adobe photoshop
a) Rectangular marquee tool
b) Single row marquee tool
c) Double row marquee tool
d) Single column marquee tool
The one that is not a selection tool in Adobe Photoshop is the single-row marquee tool. The correct option is b.
What is Adobe Photoshop?When working with pixel-based graphics created for print, the web, and mobile apps, Photoshop is your go-to program. With the help of robust editing tools, you can adjust exposure and color balance, crop and align photographs, change the colors in your shot, erase imperfections from a portrait, and integrate numerous images into a single scene.
Photoshop is still one of the greatest photo editing programs for beginners to learn, despite the fact that you can feel intimidated by it as a novice photographer. Adobe Photoshop is an editing program that works with layers, which can take some getting accustomed to but is worthwhile.
Therefore, the correct option is b) Single row marquee tool.
To learn more about Adobe Photoshop, refer to the link:
https://brainly.com/question/17356292
#SPJ6
1. Here is a program segment to find the quantity base . Both base and exp are entered at the keyboard. System.out.println("Enter base and exponent: "); double base = IO.readDouble();// read user input double exp = IO.readDouble(); // read user input /* code to find power, which equals baseexp */ System.out.print(base + " raised to the power " + exp); System.out.println(" equals " + power); Which code is a correct replacement for /* code to find power, which equals baseexp */ ?
Answer:
The correct code to this question can be de4fined as follows:
double power;
power = Math.pow(base, exp);
Explanation:
In the given question the choices were missing, that's why we defined the correct code only.
In the given code a two double variable "base and exp" is declared, that input the value from the user-side, and store its value into there respective variables. In the next step, "power", that is a double variable is declared, which uses the "Math.pow" function that calculates given values power and prints its value.please find the attachment of the full code.
You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices
Complete Question:
You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?
Group of answer choices
A. ARP
B. SMTP
C. SNMP
D. Telnet
Answer:
C. SNMP.
Explanation:
In this scenario, you administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. Also, you want the routers on the network to send you notices when they have exceeded specified performance thresholds. Hence, you should use the SNMP to enable the routers to send the notices.
SNMP is an acronym for simple network management protocol, which is a standardized application-layer protocol that is used for monitoring and organizing management information about network devices on either a wide area network (WAN) or local area network (LAN).
Basically, the SNMP helps to provide a common language for network devices such as switches, routers, printers, servers etc to share information with a network management system.
A simple network management protocol (SNMP) is part of the Transmission Control Protocol and Internet Protocol (TCP⁄IP) suite.
In a response of approximately 50 words, explain why it would be essential for the successful A/V technician to participate in additional coursework, presentations and seminars offered by equipment manufacturers as well as annual conferences attended by colleagues in the industry.
Answer:
The A/V technician should participate in the additions coursework, seminars and presentations offered by the equipment manufacturers because it would give him more knowledge about the various products launched by the manufacturers, after the coursework it would be easier for him to repair the new range of products. It is important for the technicians to stay updated with the latest technical changes in the industry.
What steps are needed for word to create an index
Answer:
Do this:
Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...
Click the References tab.
In the Index group, click the Insert Index button. The Index dialog box appears. ...
Click the OK button to insert the index into your document.
Answer:
Position the insertion pointer where you want the index to appear.
(the insertion point is the point where the next characters typed from the keyboard will appear)
If you want the index to start on a new page, create a new page in the program you're using
Then you click the References tab.
In the Index group, click the Insert Index button.
When the Index dialog box appears, click the OK button to insert the index into your document.
(Rocks Mineral
When limestone undergoes several changes, it forms
2
(marblelse
PA
For
the
are underground natural resources.
3. Metals are extracted from their
4. Molten rock inside the earth is called
5.
is used in making glass.
L
(magmalla
(Limestone/Sla
Yo
# Science-5
Answer:
TENDRIAS QUE PONER LA PREGUNTA MEJOR
Explanation:
Why is access to equipment so important to the education of an A/V technician? (Select all that apply).
A. A/V technicians have to learn how to use many different types of devices.
B. A/V technicians must become familiar with many different software programs.
C. A/V technicians for large companies often have to buy their own equipment.
D. A/V technicians are not always provided the equipment they need by their employers.
Answer:
The correct option is;
A. A/V technicians have to learn how to use many different types of devices
Explanation:
Sound recording, mixing boards, video monitors, projectors, speakers, and microphone equipment are set up and operated by audiovisual (A/V) technicians during concerts, live sport games, business meetings and conventions, TV and radio outdoors shoots and for on location assignments as well as equipment maintenance for universities and other organization. As such A/V it is essential for A/V technicians to develop manual dexterity on a wide variety of audiovisual equipment.
Answer:
For this one it is A: A/V Technicians have to learn how to use many different types of devices
but it may be worded differently, and if so its:
D:They need to learn how to use a wide variety of different types of equipment.
Explanation:
edg2021
15 points please help!!!!
David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive platforms can David use for this presentation?
David can use an interactive or a for his presentation.
Answer:
Powerpoint presentation
Explanation:
Powerpoint presentation is a part of Microsoft office that is established by Microsoft. PowerPoint. It is used to present the company visions, missions, key points in a short and in an attractive way by using the various designs, pictures, audio clips, etc
Here David wants to create an interactive presentation so he should use the powerpoint presentations so that he could present the company visions, objectives, etc
Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?
Options:
A Infrastructure mode
B Ad hoc mode
C a wireless access point
D static IP addresses
E APIPA
Answer:
A. Infrastructure mode
C. a wireless access point
Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.a) trueb) false
Answer:
The answer is "Option a".
Explanation:
In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.
Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.
in object oriented programming what is a constructor?
a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object
Answer:
The answer is A.
Answer:
A. the attributes that allow a programmer to imagine a new object
Explanation:
Got the answer right on the test!
How a student can use computer to improve academic performance?
Answer:
k Nishant
Explanation:
he can learn many things internet by using computer he change his self by learning about many things
Answer:
A student can use it by searching up things with his/her computer.
Browse for different new things everyday that gives knowledge.
Ask questions.
Do new things everyday.
A computer can easily input grades and send data.
Explanation:
Okay.
You find a list of websites that relate to your chosen topic and click on the first one. You ask yourself the three questions presented in this lesson to see if this site is reliable: 1) Who wrote it? There isn't an author listed anywhere that you can find. 2) What type of site is it? The site name ends in . 3) How current is the information? You see the site was updated yesterday. Is this website reliable and worth examining further? True or False?
Answer:
False
Explanation:
Information reliability is essential in production. sourcing information from a reliable source is base on several criteria. They are; the author of the resource file, the type of media platform holding the information, the frequent revision of the information, additional support or collaboration to publish public information, etc.
A government website ( with the site-address ending with a '.gov' ) which is concurrently revised by the institute, gives a piece genuine and reliable information, whereas a commercial website with no author and just recently revised or published, would be judged as an unreliable source of information
learn to accept your mistakes even when you have done your
Answer:
besttttttttttttttttttttttt
Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?a. /23b. /24c. /27d. /28
Answer:
The answer is "Option c"
Explanation:
In the given question only option c is correct because "/27" is the IP "255.255.255.224" is the same as "/27" in the terminology in CIDR, in which it uses the compact IP address as well as corresponding prefix expression and it terminology consists of an IP with a slash ('/') or a decimal number. Its count of 1-bit proceeding to the mask traditionally referred to it as the network mask.
how can development in ICT be utilized to speed up the development and integration efforts
Answer:
Explanation:
1. Sustainability and scale
2. Lack of knowledge
3. Pace of change
4. Funding
5. Changing roles and norms
What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom
Answer:
The correct option is;
D.) Zoom
Explanation:
The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera
The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.
Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.
Declare an array of int values westboundHollandTunnelTraffic that can store the number of vehicles going westbound through the Holland Tunnel - on a particular hour (numbered 0 through 23) - on a particular day (numbered 0 through 6) - on a particular week (numbered 0 through 51) - over the last ten years (numbered 0 through 9). The innermost dimension should be years, with the next being weeks, and so on.
Answer:
Following are the declaration of the array:
int westboundHollandTunnelTraffic [10] [52] [7] [24]; //defining an integer array that holds days, week, hour, and year value
Explanation:
In the above-given code, an array that's name is " westboundHollandTunnelTraffic " is declared and the type of the storing elements in the array is an integer.
In this array, it first stores the year's value, and in second, it stores week values, in third, it stores day value, and the last it stores hours value.
A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function
Answer:
"Transport" is the correct answer.
Explanation:
Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.So that the above would be the correct approach.
can we draw a formula triangle for velocity?
Answer:
Yes we can actually draw a formula triangle for velocity
Explanation:
I can't explain why but if u wanna calculate the velocity of something using a diagram then you will draw a trapezium and in that trapezium there are two triangles and a rectangle so you will split it into two triangles and trapezium so I think we can actually draw a formula triangle for velocity