Answer:Cloud storage
Explanation:I think that the cloud storage would be his best choice, because there are free cloud storages for use and all you need is access to the internet to upload or download files from them.
Universal containers uses a custom object named Insight, which is the child in a master-detail relationship with the opportunity object. Sales teams use this object to create requests for analysts who conduct supporting research regarding an opportunity. Sales teams use Salesforce1 mobile app and want to easily create new insight records from their phones. What should a consultant recommend to meet this requirement
Answer:
A. Create a custom object tab.
Explanation:
The custom object refers to an object in which a person creates to store the data and information i.e relevant for the business organization
While the custom object tab is a tab in which the data stored is displayed in the records of the custom object
Therefore according to the given situation, since the sales teams used the mobile app and want to create new insight records by using their phones
So for meeting this we should recommend creating a custom object tab
Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis
Since Ned is trying to decide how he wants to connect the nodes on the network he created, the two options that he has are option b and C:
b. Through hard cabling or wireless radio waves.
c. Through ethernet cables or Bluetooth.
What kind of cable does a computer system typically use to connect to a network?A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.
Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.
Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.
Learn more about ethernet from
https://brainly.com/question/28156384
#SPJ1
Businesses today suceed or fail based on their ability to
Answer:
their ability to Innovate with technology to meet their customers needs
Explanation:
Which of the following BEST describes Information Technology (IT)?
IT refers to everything that involves computers.
IT deals with how to turn information into meaningful decisions.
IT has to do with collecting and utilizing data.
IT refers to designing, creating, and improving software.
Answer:
The correct option is;
IT refers to everything that involves computers
Explanation:
Information technology (IT) are technology related to computing or computing systems
Information technology (IT) is the creation, processing, securing, exchanging, and storing of electronic data through the use of network, storage, computing, and other physical devices. Information technology refers to operations performed within enterprises and business organizations and includes telephone and computer technologies (all of which involves computing) as opposed to entertainment or personal usage of the technology.
how to print the output of "WELCOME" by using python codes with arrays.
Answer:
Following are the code to this question:
arr=['WELCOME']#defining list arr and assign string value
print (str(arr)[2:-2])#use print method that uses slicing to remove bracket and quotes
Output:
WELCOME
Explanation:
The Array data type is used to store the same type of value, but in python, the array is not used, instead of using an array we use the list, that stores multiple data types.
In the above code "arr", that is list is declared, that store a string value.
To print its value, we use the print method, inside this, we use slicing to remove brackets and quotes.
How are the waterfall and agile methods of software development similar?
Both methods allow project teams to complete small portions of the entire project in small sprints and work on different steps simultaneously.
Both methods focus on development rather than planning, in order for project teams to work more quickly.
Both methods have project teams work on one step at a time and move on when the previous step is completed and approved.
Both methods require documentation so project teams stay on track and keep control over what version of the project they are working on.
Answer:
In the question "first and last", that is "option 1 and 4" is correct.
Explanation:
In the given question the numbering of the choices is missing. if we numbering the choices, then the first choice is on the 1 number, the second choice is in 2 and so on, in which the correct and the wrong choice can be defined as follows:
In point 1, Both method, it divides the project into small parts, at it the working is easy, that's why it is correct. In point 4, Both method, it requires the documentation, that's why it tracks the project. In point 2 and 3, both were wrong because it focuses on both development and planning, and in Waterfall when one part is complete then it will go on the next part, but in the Agile, it does not use this technique.Which are characteristics of pseudocode? Select all that apply.
O helps in working out inputs and outputs of the solution
used in modeling the solution
presents algorithms informally, such as in English
presented in the programming language
Answer:
A,B,C
Explanation:
IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID
Answer:
Following are the answer to this question.
Explanation:
It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.
Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for writing programming code. They are usually strong problem-solvers. They spend most of their work hours running experiments in a laboratory. They must hold advanced degrees in computer science.
Answer:
First two statements: yes. Last two: not so much.
But many of the better ones do have advanced degrees, but some don't.
The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.
It should be noted that statements are true about software engineers are;
They are responsible for writing programming code. They are usually strong problem-solvers.Software engineering can be regarded as branch of computer science which is responsible for the development as well as the building of computer softwares, these could be applications software or system software.
The engineers that carry out this process is referred to as software engineers and they are responsible for responsible for writing programming code.
We can conclude that software engineers are strong problem-solvers.
Learn more about software engineer at:https://brainly.com/question/25757629
With a C program (memory map), data in _____ is initialized by the kernel to arithmetic 0 or null pointers before the program starts executing. The C declaration (for example, "long sum[1000];") appearing outside any function causes this variable to be stored in _____.
Answer:
The answer is " Uninitialized data segment ".
Explanation:
It (memory map) field whenever a C program is locked to run, the kernels must allocate information into 0 or null pointer in this section until the process runs. This variable, that is outside of any function, has been stored in uninitialized data item by the C statement (like, "long amount[1000];").
If we did not declare the data segment, it also called bss, in which all block which begins with the symbol and is called for an old assembly language operator.
Payroll deductions are the same for all employees. True False
Answer:
The answer is "False".
Explanation:
The Payroll deductions are the amount of each pay period, that is paid out of the paycheck of the employee. It is also considered as the money, which is deducted from its employees' paychecks so, if paid by the employers.
All staff members are not identical. Workers' paychecks determine the amount individuals receive during each pay cycle. It also is referred to it as payroll retainers.
As a chemical engineer, what would you be most likely to do in your job?
design robots to perform repetitive tasks
sterilize food processing equipment
design sewer treatment plants
combine microorganisms and enzymes to create new medicines
Answer:
The correct option is;
Design sewer treatment plants
Explanation:
Chemical engineers, also known as a process engineer, are involved in the design and development of cost beneficial ways of utilizing energy and materials which can mostly be established as a chemical manufacturing process
The chemical engineer works by applying scientific principles to resolve and provide amicable solutions to the production usage, disposal, and waste management, of chemical and other related materials
Chemical engineers conducts research into the usage of materials and production process.
A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a
Answer:
A reverse proxy.
Explanation:
A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a reverse proxy.
In Computer Networking, a single server can be configured to appear as the endpoint for many other servers acting behind it through the use of a reverse proxy.
Hence, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.
[tex]3x - 5 = 3x - 7[/tex]
Answer:
x = -1/2
Explanation:
Hey there!
To solve for x we need to simplify the following,
3x - 5 = 7x - 3
-3x to both sides
-5 = 4x - 3
+3 to both sides
-2 = 4x
Divide both sides by 4
-1/2 = x
Hope this helps :)
main components of Adobe photoshop are. ...............
a) title bar
b) tool bar
c) menu bar
d) all of this
Answer:
The correct option is;
d) All of this
Explanation:
The main components of Adobe Photoshop are;
1) Title bar displays the name of the application, as well as the name of the current document and it is located at the top of the document window
2) Tool bar is the component of the interface design in which on-screen buttons, menus, icons, and other features for input and output are placed
The tools palette is the toolbar in Adobe Photoshop
3) Menu bar consists access to the basic components such as file, edit, image, layer, used to create new jobs, compose, and edit images.
Answer:
It is all of this.
Explanation:
Here it is
The quicksort is an example of a divide and conquer algorithm in that it divides the sorting problem into smaller problems by dividing the list of items to be sorted into smaller subsets. The pivot is the mechanism that is used to segment the list. Describe how the quicksort works including a discussion of the pivot, how it is selected, and why the pivot is important to the quicksort.
Answer:
The quicksort pivot is an arbitrary element within the collection that is being sorted. Using the pivot point, the collection of elements is partitioned into two smaller lists of elements. Using some logic, the smaller elements are placed left of the pivot point, and larger elements are placed to the right of the pivot point. Ideally, you would prefer you pivot point to be a median of your dataset to optimize the creation of the two sublists into a balanced state.
Cheers.
The pivot of a quicksort algorithm ought to always be the element in the middle. Some algorithms will choose the item in the center as the pivot, while others will choose the first or last element.
What is quicksort algorithm?Quicksort is a sorting method that operates in-place. It was created by British computer scientist Tony Hoare and is still a widely used sorting algorithm.
When properly implemented, it can be slightly faster than merge sort and two or three times faster than heapsort.
The quicksort pivot can be any element in the collection being sorted. The collection of elements is divided into two smaller lists of elements using the pivot point.
Smaller elements are placed to the left of the pivot point, while larger elements are placed to the right of the pivot point.
To optimize the creation of the two sub-lists into a balanced state, you would prefer your pivot point to be the median of your dataset.
Thus, this way quicksort works.
For more details regarding quicksort algorithm, visit:
https://brainly.com/question/13257594
#SPJ2
You administer computers on a Microsoft Windows 2003 TCP/IP network. On the network, you want to use a domain name-to-Internet Protocol (IP) address name resolution system that provides a central database on a server to resolve domain names to IP addresses. Which options should you implement on your network
Answer:
The answer is "Using the Domain Name System(DNS)".
Explanation:
It is the name database whereby web domain names were located or converted into their IP addresses. Its domain name maps its username used by users and finds a site at a user's IP range for the location of a site.
It includes the internet and also has DNS for any time search on the internet if they know this or not. It should recall the IP address of every device to access on the specific web site which you needed, that's why we can say that the DNS is used to implements on the internet.Which part of project management involves determining the overall work? Breakdown Incomes Scope Time
Answer:
Incomes
Explanation:
Project management has to do with the process of achieving a set goal with the help of a team within a specified time. Most times, the main problem that comes with project management is completing the project within the available constraints.
No project can start up without funds, which in this case is called income and this is the part of the project that determines the overall work.
Answer:
It's not income I just got it wrong I'm not really sure but I would assume it is breakdown I'm sorry if I'm wrong if I'm right please reward me brain list.
Which of the following has the honor of the first robot-human handshake in space?
a. Robonaut 2
b. Baxter
c. Shakey
d. Robosapien
Answer:
option a
Robonaut 2
Explanation:
it is also known as R2
hope it helped you:)
What features in Excel are the same as in Word?
What features are differ?
Answer:
Following are the difference and similarity between word and Excel:
Explanation:
The similarity in word and excel:
The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the Spreadsheet (tablet program). In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.The difference in word and excel:
In a word, it includes an application for text processing, and excel would be used for the tablet program. The word is used to create documents like assignments file data files, while excel is being used for the manipulation of numbers by mathematical equations.Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod
Answer:
FOR i% = 1 TO 100
IF ((i%\3) = i%/3) AND ((i%\7) = i%/7) THEN
PRINT i%
END IF
NEXT i%
Explanation:
Of course using MOD would be cleaner, but another way to check if a number is integer divisable is to compare the outcome of an integer division to the outcome of a floating-point division. If they are equal, the division is an integer division.
The program outputs:
21
42
63
84
are teaching a class on computer hardware to new IT technicians. You are discussing the component on an Advanced Technology eXtended (ATX) motherboard that supports communication between the central processing unit (CPU) and random access memory (RAM). Which component provides this functionality
Answer:
The chipset of the motherboard.
Explanation:
The chipset that is on the motherboard handles all the data flow management of the system. This includes all communications that will occur on the motherboard including communication between the CPU and the RAM.
The chipsets themselves are designd by the companies that create the CPUs but are integrated on the motherboards created by third-party vendors.
Hope this helps.
Cheers.
Convert
1. 116° to K
2. -39° to K
3. 450K to C°
Peter took a selfie in his room. He was a wearing a light blue shirt. But he failed to realize that that shirt would clash in color with the light blue walls in his room. He wants to edit this photo using editing software. Which tool can Peter use to darken the background in his photo?
Answer:
A wand tool is to do that in an editing software.
Answer: Peter should use the burn tool
I need help on my new iPhone 7 that I got I transfer my Sim card from my Samsung But before And after I put my Sim card in it was saying this please help...and yeah:( I’ll let give you fifty ..
Answer:
Sometimes phones do this, did you take it to the phone store?
Explanation:
In order to send and receive iMessages to your iPhone.
iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.
if your computer is gliching what do you do to stop it and some times it turnes off what do you do
Answer:
You can take it to the shop to fix it since it happens often ig
Explanation:
I Hope This Helps bro
j. A computer on a network that acts as the central storage location for
programs and data used on the network
Answer:
Una unidad central (en inglés mainframe) es una computadora grande, potente y costosa, usada principalmente por una gran compañía para el procesamiento ...
Explanation:
ternary operators of computer
please explain.
Answer:
It's a compact way of doing an if-else statement.
General Format is
<condition> ? <if condition is true> : <else>;
Example:
I could rewrite:
if(a==1) temp = 1;
else temp = 999;
as
temp = (a==1) ? 1 : 999;
Which of the following means to find and fix errors in code?Which of the following means to find and fix errors in code?
Debug
Document
Error check
Restore
Answer:
Its A
Debug
Explanation:
I took the test
"What is the longest time (with extensions) a developer can have to file a final map after receiving tentative map approval?"
Answer:
The answer is "Five years (Two years)".
Explanation:
It supplies with proactive maps of approved modifications beyond the limits of plan may be expanded by the submission of final maps, reflecting the stages of the initial proactive plan, up to ten years with both the chief administrator.
Its provisional submission of a map, that will include the request forms or other resources provided at the request of the city administrator and the office. It also allows the phasing for the current map, that has been accepted.