give the difference between functional and functional tools in the middle of to the circle give importance​

Answers

Answer 1

Answer:

hakkuna matata is the radious of a circle


Related Questions

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

Answers

Answer:

Explanation facility

Explanation:

Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails

please answer me fast ​

Answers

Answer:

Btp

Explanation:

this will help you more

Answer:

BTP is the simplest and the most conventional model of topology

PTP

BTP✓✓✓

PTB

PTT

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Answers

Answer: Install the latest firmware updates from the device manufacturer.

Verify that your network's existing security infrastructure is working properly

Explanation:

Since the person is concerned about the security of these devices, in order to increase their security posture, the latest firmware updates should be installed fom the device manufacturer.

The firmware is the software program or set of instructions which is programmed on a hardware device. Installing the latest update is necessary in order to prevent third party use or hacking. Also, it's vital to check the network's existing security infrastructure in order to check if it's working properly.

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

when do we use SAVE and SAVE AS in saving artwork in adobe illustrator?
PLEASE HELP ASAP

Answers

Answer:

to save in different format

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Answers

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

which one of the following is not hardware​

Answers

Firewall is not hardware. It is only software.

Answer:

There r no options

Explanation:

I think the application r not the hardware.

your organization has multiple remote offices. the users at the remote office often remotely connect to the application servers. which of the protocols should you enforce for encrypted communicationa

Answers

Answer:

RDP

SSH

Explanation:

RDP and SSH can both be used for remote encrypted communication. RDP protocol( called remote desktop protocol) is owned by Microsoft. It allows it's user access to the network through a GUI RDP software that allows you to connect to another computer on the network, the client server. RDPs operate over encrypted channels and is therefore secure.

SSH(called secure shell protocol) is used on Unix like OS systems to connect over unsecured network. SSH uses cryptographic encryption that increases security for it's client-server architecture. It's an improved version of RSH and Telnet which didn't make use of encryption when sending data over the network.

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Answers

Answer:

"Private" is the right solution.

Explanation:

Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.

Answer please in order

Answers

Answer:

analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.

Explanation:

Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.

Generally, it travels faster through solids than it does through either liquids or gases.

Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.

what is computer engineering

Answers

Answer:

Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.

Explanation:

Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.

Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.

In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology

please answer me fast​

Answers

Answer:

microsoft

Explanation:

this may help u

Answer:

Microsoft

because its a 2013 worldwide partner conference and Microsoft server operations

The part (or statement) of a recursive function that decides whether the recursive loop is terminated is called: (Select all that apply)

Answers

Answer:

The base case

Explanation:

Required

The part that determines the termination of a recursion

This part of a recursion is referred to as the base case.

Take for instance, the following:

factorial(int n) {

   if (n < = 1) {         return 1; }

   else {             return n*factorial(n-1);    }  }

The base case of the above is     if (n < = 1) {         return 1; }

Because the recursion will continue to be executed until the condition is true i.e. n less than or equals 1

A number of computers have been reported to be getting incorrect IP addresses. After doing some investigation, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next

Answers

Answer:

Establish a plan of action to find the DHCP server.

Explanation:

The troubleshooting process can be defined as the sequential steps that are to be taken while trying to proffer a solution to a problem, usually on computer systems.

The seven (7) steps of the troubleshooting process in ascending order are;

1. Identify the problem.

2. Establishing a theory of probable cause of the problem.

3. Test the established theory to determine cause.

4. You should establish a plan of action to resolve the problem while identifying its potential effects.

5. Implement a solution.

6. Verify full system functionality.

7. Document findings, actions and outcomes.

In this scenario, the step in the troubleshooting process that should be performed next is establishing a plan of action to resolve the problem by finding the unauthorized dynamic host control protocol (DHCP) server issuing the incorrect internet protocol (IP) addresses.

You work as a computer technician for a production company that travels all over the world while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply

Answers

Answer: Input Voltage

Explanation:

Based on the information given, since the power supply to install in the system is being determined, the input voltage is the most important characteristic to consider when choosing a power supply.

The input voltage indicates the type of voltage and the electrical current that's required to power a device safely and effectively.

What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer

Answers

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

What is the Role of an algorithm?

Answers

Answer:

Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.

pls Mark me as brainliest trust me

What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools

Answers

Answer:

A resource that offers dozens of canned reports built around marketing best practices

Explanation:

Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.

The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from

Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices

If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False

PLEASEE HELP

Answers

Answer:

false , those are called passive railways

When power is completely removed from your computer

Answers

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

When an application has multiple uses what is it known as?
A. Minimum Features
B. Full Featured
C. Limited Features
D. Maximum Features

Answers

B.Full featured application

If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the ____________________.

Answers

Answer:

attack vector

Explanation:

If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the attackvector.

The DuPage Freight Shipping Company charges the following rates: Weight of Package Rate per Pound 2 pounds or less $1.10 Over 2 pounds, but not more than 6 pounds $2.20 Over 6 pounds, but not more than 10 pounds $3.70 Over 10 pounds $3.80 Design a program that does the following: asks the user to enter the weight of a package and displays the shipping charges. 1. Prompt the user for the weight of a package 2. Determines the rate per pound in a getRate module 3. Calculates and displays the total shipping charge in a getTotal module Hint - you may want to use a global variable for this! Please submit three things:

Answers

Answer:

The program in Python is as follows:

def getRate(weight):

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

   return rate

def getTotal(weight,rate):

   total = weight * rate

   print("Total: ",total)

weight = float(input("Weight: "))

rate = getRate(weight)

getTotal(weight,rate)

Explanation:

This defines the getRate function

def getRate(weight):

The following if conditions determine the corresponding rate based on the value of weight passed to the function

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

This returns the rate back to the main method

   return rate

The getTotal module begins here

def getTotal(weight,rate):

This calculates the total charges

   total = weight * rate

This prints the calculated total

   print("Total: ",total)

The main begins here

This gets input for weight

weight = float(input("Weight: "))

This gets the rate from the getRate function

rate = getRate(weight)

This passes values to the getTotal function

getTotal(weight,rate)

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

Other Questions
large pies cost 3.25 eachsmall pies cost 1.80 eachfive children together buy 2 large pies and 1 small pie. they share the cost equally - how much does each child pay Which theme do these lines best represent?Dealing with lifes difficulties can lead to a loss of hope.Where fear is present, wisdom cannot be.Knowledge can help us prepare for the future.Look for the positive in all situations. can someone tell me if why these triangles are similar The following data are from the financial statements of the Riverton Company. Current assets $55,000 Total liabilities $95,000 Total assets 125,000 Net income 18,000 Current liabilities 25,000 Sales 275,000 At what rate must a cylindrical spaceship rotate if occupants are to experience simulated gravity of 0.58 g Certain ketones such as fructose can be oxidized by Benedict's reagent under basic conditions to form what type of compound True or false: If you are changing a larger unit into a smaller unit, like cm into mm, the decimal is moved to the right because you are multiplying by a power of ten what are the advantages and disadvantages of rdp houses that are provided by the government ? Please answer correctly Passage AHume argued that we have no rational basis for believing in miracles. But think about all the many miracles of modern medicine that have improved human health and dramatically extended the average lifespan during this century! Hume was simply wrong.Passage BMost people will tell you that it is important for kids to go to school. But those people are wrong. The dictionarydefines "kid" as denoting young goats. Surely, it is a bad idea to fill our schools with goats!Passage CThis newspaper headline says, "Earliest chocolate use has been found in what is now U.S." But that can't be true: The cacao plant isn't native to North America, whereas it has been grown and harvested in Central and South America for nearly 2,000 years. Surely, the earliest use of chocolate occurred somewhere south of what is now the U.S.Passage DMinneapolis is north of St. Louis, and New Orleans is south of St. Louis. Therefore, New Orleans is south of Minneapolis.Passage EPolice officers in this city swear an oath to "serve and protect" its citizens. Obviously, to "serve and protect" does not involve undue force or physical assault. So, the allegations that these police officers physically assaulted the defendant must be false.Passage A,B,C,D,E: DOES/DOES NOT commit a fallacy. Specifically, it DOES OR DOES NOT commit the fallacy of equivocation, and it DOES OR DOES NOT commit the fallacy of amphiboly. A bottle maker believes that 23% of his bottles are defective.If the bottle maker is accurate, what is the probability that the proportion of defective bottles in a sample of 602 bottles would differ from the population proportion by less than 4%? Round your answer to four decimal places. Far behind does anyone know this? three friends, akira,bruno and carmela pooled thier money to start a lemonade stand. akria contributes $25, bruno contributed $20 and carmela contributed $35. after a month, thier lemoneade stand had earned 2000, and they want to distribute this money in the same ratio as the money that was invested. how many dollars will brouno recieveplz explian How is the Great Plains region important to the US development You are hanging a picture on a wall that is 56 1/4 inches long. If the picture frame is 18 2/3 inches long, how much wall space is left? Write your answer as a mixed number. What is the image of (-6, -2) after a dilation by a scale factor of 4 centered at the origin? Porque estoy vivo?En este mundo Find the cosine of angle A to the nearest 100th. Mary Katherine has a bag of 3 red apples , 5 yellow apples and 4 green apples , Mary takes a red apples out of the bag and does not replace it. What is the probability that the next apple she takes out is yellow Question 7 of 10 Which of the following activities often starts the scientific process? O A. Summarizing data B. Asking questions O C. Publishing articles O D. Learning new vocabulary SUBI About 9% of the population has a particular genetic mutation. 900 people are randomly selected. Find the standard deviation for the number of people with the genetic mutation in such groups of 900.