Matthew is a computer technician and it is important to have a storage that contains all of his necessary tools. What kind of storage BOX would that be

Answers

Answer 1

Tool box

Hope this helps! :)


Related Questions

What is a benefit of using a client/server network?
Cheap to maintain
Easy to install
Has a central, powerful computer
Unable to share files

Answers

Answer:

Has a central powerful computer

Explanation:

When operating a client - server network, a certain access mediun is created such that clients can access information, materials and services from a central computer, this poses great advantage in the area of security and control. Clients would be able to gain access from this central computer using either a local or wide area network. The accessibility provided through this powerful, central computer allows the the network to monitor what actions are being performed and make appropriate restrictions on the network, hence, preventing the invasion of malware and viruses. Hence, the central control is a great feature of a client - server network.

use of concave mirrors​

Answers

Explanation:

concave lens use for shaving mirrors and satellite

write an algorithm to find perimeter of circle

Answers

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

E) ¿Entiende usted que tendría repercusión legal un mal manejo de los datos del cliente por parte de la empresa? ¿Por qué?

Answers

Answer:

Efectivamente, un mal manejo de los datos del cliente por parte de la empresa tendría repercusiones legales que afectarían negativamente a la compañía. Esto es así porque un eventual mal manejo de los datos personales de los clientes implicaría una filtración de dichos datos hacia el resto del público, con lo cual los datos personales y privados de cada cliente se verían expuestos en forma pública, generando así posibles daños a estos a través de la mala utilización de dicha información por parte de terceros malintencionados.

Investigate the many ways that hardware and software can cause an interrupt to occur. Are ALL interrupts treated equally or do some have priority over others?​

Answers

Answer:

Following are the responses to the given question:  

Explanation:

This list is based mostly on the processor. Then you'll be ordered. An interrupt of a particular cable (wire) is produced for PC-ish CPUs (IRQ 0 - 31 for some intel processors). The bigger challenge is a lower number.

Strange factors have included a system clock, power business, 0, some reserved for use by CPU testing, serial/parallel/... ports and also some terminated/error/state/new devices requests device Thus a key touch on the keyboards could create an interrupt that was direct on old devices.

Henry wants to use handheld computers to take customers' orders in her restaurant. He is thinking of using custom written, open source software. Describe what is meant by custom written software.

Answers

Answer: See explanation

Explanation:

Custom written software refers to the software that's developed for some particular organization or users. It's crates in order to meet the unique requirements of a business.

Since Henry is thinking of using custom written, open source software, then a custom written software will be used. Examples of custom written software will be automated invoicing, bug tracking software, E-commerce software solutions etc.

Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.

Answers

Answer:

NIST SP 800 30

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.

This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

whats the answer :)?
i will give brainslist​

Answers

Answer:

Transmission medium is the answer

What is a signature?

a distinctive characteristic of a virus or virus family

an anti-spyware feature of Windows 7

a computer program that replicates itself and damages a computer system

a program that tracks a user’s activities online

Answers

Answer:

option a

never heard of b, c would be called a virus and d a cookie

write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)​

Answers

Answer:

The program is as follows:

10 INPUT RADIUS, BASE, HEIGHT

20 CIRCLE = 3.142* RADIUS * RADIUS

30 TRIANGLE = 0.5* BASE * HEIGHT

40 PRINT CIRCLE

50 PRINT TRIANGLE

60 STOP

Explanation:

The program description doesn't tally;

In other words, it is impossible to calculate the area of a triangle using the radius of a circle.

So, I designed the program to get input for radius, base and height.

Get input for radius, base and height

10 INPUT RADIUS, BASE, HEIGHT

Calculate area of circle

20 CIRCLE = 3.142* RADIUS * RADIUS

Calculate area of triangle

30 TRIANGLE = 0.5* BASE * HEIGHT

Print area of circle

40 PRINT CIRCLE

Print area of triangle

50 PRINT TRIANGLE

End of program

60 STOP

what are the advantages of saving files in a cloud?
Please help!! ​

Answers

When using cloud storage, one of its main advantages is the accessibility and its ability to not get deleted as easily. Once a file is uploaded to the cloud, you can access it from almost any device as long as you have connection. And it’s not as easy from something to get accidentally deleted, as there is a backup.

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?
A. MAC filtering
B. 802.1X
C. WPA2
D. EAP-FAST

Answers

Answer:

C

Explanation:

WPA2 builds on its predecessor, WPA, and is specifically designed to meet the most demanding enterprise security needs. ... Furthermore, because WPA2 is backwards- compatible with WPA, organizations that have already implemented the WPA standard can migrate to WPA2 at their own pace.

A channel or path through which the data or information is transferred form one place to another in a computer network is called

Answers

Answer: Data Transmission mode defines the direction of the flow of information between two communication devices.

Explanation:

It is also called Data Communication or Directional Mode. It specifies the direction of the flow of information from one place to another in a computer network.

A channel or path through which the data or information is transferred form one place to another in a computer network is called communication channel.

What is communication channel?

Information is transported from one network device to another over a communication channel.

Data is transported across wired channels using cables and wires. Without using cables or wires, wireless channels transmit data from one device to another.

Data communication is the process of transferring data from one device to another via a transmission medium of some kind.

The system bus is a network of wires and connectors that carries data between a computer's primary memory and its processors.

For data and control signals travelling between the main parts of the computer system, the bus offers a communication path.

Thus, communication channel is the path for data transfer.

For more details regarding communication channel, visit:

https://brainly.com/question/13649068

#SPJ6

Software and technology that allow people to work together on a task are known as

Answers

Collaborative software or groupware.

Answer:

Collaborative software

Choose the term that matches each description.

_____________ allows users to interact with computer hardware and application software.

______________allows users to complete specific tasks, such as creating a document.

______________allows programmers to create new applications.

Answers

Answer:

operating systems, word software, computer concepts for end users

Explanation:

operating systems allow users to interact with computer hardware and application software.

word software allows users to complete specific tasks, such as creating a document.

computer concepts for end users allows programmers to create new applications.

The answer is "operating systems, word software, and end-user computer concepts", and its further explanation can be defined as follows:

The OS includes and administers all applications and software which a computer or mobile device could indeed execute, meaning the governance of the device software or hardware.The software for word processing is used for manipulating texts like a resume or report these text documents. Usually, you type in text and the software offers copy, delete, and numerous page layout devices.Study tools and coding areas allow finished to tailor apps to their needs and understanding instead of expert developers.

Thus, the answer is "operating systems, word software, and end-user computer concepts".

Learn more:

brainly.com/question/17798901

5 QUESTIONS, BRAINLIEST, PLEASE ANSWER

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher told her to write a program that prompts the user for information. Which function should she use?

input()
int()
main()
print()
Question 2(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number with a decimal?

float()
int()
print()
string()

Answers

Answer:

1. Input() is the correct answer

2.Most programming languages have a data type called a string, which is used for data values that are made up of ordered sequences of characters, such as "hello world". A string can contain any sequence of characters, visible or invisible, and characters may be repeated. ... A string can be a constant or variable .

3.The int() function converts the specified value into an integer number.

4.CandyCost = int(input("How much is the candy?"))

5.int()

ANSWERS

Answer:

Cheri's should use  input()

A way to store a sequence of letters, numbers, or symbols

Jabari hould  use float()

Which function converts the user's input to a number with a decimal it is float()

candyCost = input("How much is the candy?")

hvhblfffffffff
eafafaefafsa

Answers

What’s the question?? Or which language is this

who invented the system of logarithm in 1614 AD​

Answers

Answer:

JOHN NAPIER

Explanation:

The method of logarithms was publicly propounded by John Napier in 1614, in a book entitled Mirifici Logarithmorum Canonis Descriptio (Description of the Wonderful Rule of Logarithms). The book contained fifty-seven pages of explanatory matter and ninety pages of tables related to natural logarithms.

Answer:

Joost Bürgi

Explanation:

He invented it but John Napier worked on it earlier than Bürgi.

PLEASE I NEED HELP FAST

Answers

Answer:

your answer will be src=

Identify characteristics of object-oriented programming design. Choose all that apply


-It breaks the solution into independent objects.


-it is a simple, uncomplicated approach to programming.


-It uses objects that send data to other objects.


-It supports a modular design that encourages the reuse of code.

Answers

Answer:

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Explanation:

Object-Oriented programming (OOP) is a programming language type that makes use objects and classes in its construct. With object-oriented programming software is structured as classes which are both reusable and simple code blueprints used for the creation of instances of the objects of the program

An object oriented program design breaks the solution of the problem the program is solving into independent objects, such that the objects are made of classes which are modular and reusable code

Therefore, the correct options are;

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Answer:

all expect b

Explanation:

The remove() method in the Queue interface ________. Group of answer choices retrieves, but does not remove, the head of this queue, returning null if this queue is empty retrieves and removes the head of this queue, or null if this queue is empty retrieves, but does not remove, the head of this queue, throwing an exception if this queue is empty retrieves and removes the head of this queue and throws an exception if this queue is empty

Answers

Question:

The remove() method in the Queue interface ________.

A. retrieves, but does not remove, the head of this queue, returning null if this queue is empty

B. retrieves and removes the head of this queue, or null if this queue is empty

 

C. retrieves, but does not remove, the head of this queue, throwing an exception if this queue is empty

D. retrieves and removes the head of this queue and throws an exception if this queue is empty

Answer:

D. retrieves and removes the head of this queue and throws an exception if this queue is empty

Explanation:

In Java, the Queue interface is found in the java.util package and inherits from the Collection interface. It is used to store elements which are processed in the order in which they are inserted. This means that the first element will be processed first.

The Queue interface has many methods. Some of them are;

i. add(): allows elements to be added to the queue.

ii. remove(): retrieves and removes elements from the head of the queue. The head of the queue points to the first element of the queue. If the queue is empty, the remove() method throws an exception called the NoSuchElementException

iii. poll(): retrieves and removes the element at the head of the queue. Unlike the remove() method, if the queue is empty, a null is returned.

iv. peek(): retrieves but does not remove the element at the head of the queue. Just like the poll() method, a null is returned if the queue is empty.

how many sections of a job description are there

Answers

Answer:

6

Explanation:

job title, job purpose, job duties and responsibilities, required qualifications, preferred qualifications and working conditions.

En la 4ta revolución industrial se caracteriza con 3 procesos de aprendizaje o criterios, los cuales son:

Answers

Explanation:

-Uso de herramientas digitales

-La inteligencia artificial

-El análisis de datos para formar personas altamente competitivas

I get such an error when I turn on the computer, how can I fix it?

Answers

Answer:

Use the HLL ( Java C++ ) code to fetch the commands of that program, then translate them using any translatory program such as Microsoft notepad.

Or:

Download any utility software such as Avast, thunderbird, Dr. Solomon, or Norton software

Then install it to memory.

list 5 uses of computer​

Answers

Answer:

if you a student..then you need it for sure

Explanation:

Microsoft Office

Doing assignment

doing report

answer online test/quiz

movie

make money

typing

play game

in what century was plastic invented ?​

Answers

in the year 1907 plastic was invented

The lines that can be formatted to display on the edges of cells are called _______.

style lines
edge lines
borders
underlines

Answers

Answer:

borders

Explanation:

Borders can be formatted in cells of excel or goog.le sheets. You can change width, shape, color, and whole plethora of things!

The lines that can be formatted to display on the edges of cells are called [tex]\boxed{ borders . }[/tex]

a. style lines

b. edge lines

c. borders

d. underlines

[tex]\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}[/tex]

Write a loop that continually asks the user what food the user has in their refrigerator until the user enters apples, in which case the loop ends. It should acknowledge the user in the following format. For the first food, the user might say "hamburger," so your response would be, "You have a hamburger with a total of 1 food(s) if they enter hamburger, and so on until they enter “apples” at which point the loop ends. ---- make sure you save your file as "may28.py" *

Answers

(Disclaimer: I am not a professional, so it might not be the most concise answer possible, but I did run the Python script and it works)

Answer:

user_input = input("What food do you have in your refrigerator? ").lower()

count = 0

while True:

   if user_input != 'apples':

       count += 1

       print(f'You have a {user_input} with a total of {count} food(s)\n')

       user_input = input("What food do you have in your refrigerator? ")

   else:

       break

low frequency radio wave travel in straight line and high frequency radio wave can travel in all direction true or false​

Answers

Answer:

The correct answer is True.

Explanation:

The electromagnetic spectrum consists of various waves. The Radio waves are categorized to be at the low-frequency end of this spectrum.

Radio Waves have multiple communication uses. Some of them are television and radio broadcasting, communications, and satellite transmissions.

Radio waves are not harmful to biotic life when absorbed by living matter and their transmission is unimpeded by air. Their transmission can also be absorbed, deflected, reflected, refracted, or diffracted by air molecules and the earth's surface.

Cheers

how is a trade off best described ?

dilema
compromise
demand
complication

Answers

I think the answer is compromise <3
Other Questions
These marbles are placed in a bag and twoof them are randomly drawn.What is the probability of drawing two pinkmarbles if the first one is placed back in thebag before the second draw?Give your answer as a ratio, reduced tosimplest terms.[?]Hint: Multiply the probability of the 1st Event by theprobability of the 2nd Event to get your answer.Enter theal speedthe time.Sundeep travels by train to a meeting in Barcelona.Barcelona is 270 km from where he lives. He catches the trainat 9:45 a.m. The train travels at an average speed of 120 km/h.At what time will the train arrive in Barcelona? 5. List four expenses usually found on a family's budget. Future pension liabilities are estimated based on all of the following except a.expected employee compensation levels. b.federal withholding income tax. c.employee life expectancy. d.employee turnover. help asap pls ----------------------------------- Also tell me the graph from the second/third photo not the equation Need help really badly please help . hi how are you? will you kindly help me with this only one? Complete the following for the Passages: (Does or Does not) commit a fallacy; specifically, it (Does or Does not) commit a false cause fallacy.Passage AThis lever releases the parking brake and allows the car to move. When I got out of my car, I definitely engaged the parking brake. So either someone pulled the brake-release lever before my car went rolling down the hill, or else the brake itself was defective.Passage BMost of the time, after a priest administers last rites to an ill patient, the patient dies soon thereafter. Hence, there should be a law against priests administering last rites!Passage CEvery time I am awake at 6:10 AM or earlier, my neighbor's sprinklers come on at exactly 6:10 AM. My neighbor said she wants her sprinklers to come on at 6:10 AM. So if I want to honor my neighbor's wishes, I should make sure that I am awake at 6:10 AM or earlier.Passage DThe pastor of my church said that existentialism denied absolute truth and undermined the ideaof genuine moral standards. As far as I can tell, existentialism is a movement in philosophy that consists in some rather complex philosophical theories. So, I'll just take my pastor's word for it that existentialism is bad.Passage EThat pilot who safely landed a commercial airliner in the Hudson River has been called a hero and was even invited to attend the president's State of the Union address. But there are hundreds of pilots in northern Alaska, Canada, and other remote areas who deliver supplies via seaplane and often land safely on water. Why don't they get invited to attend the president's State of the Union address? Which is most likely an example of pseudoscience?A doctors study shows that insulin released constantly in the body regulated blood sugar better than injected insulin.An experiment concludes that two populations of squirrels look similar but are not closely related.Data shows that dogs live longer by using a certain brand of dog food.Most people believe that drinking milk can soothe heartburn. The range of the data: 6, 14, 20, 16, 6, 5, 4, 18, 25, 15, and 5 is Read the excerpt from the Haida creation myth.But in Ravens travels, he saw that there was no one to take care of the earth. He landed on a beach and stopped to think about how to solve this problem. Nearby, he saw a huge clam shellit seemed to be making noise! Curiously, Raven approached and saw a group of tiny creatures in the shell.Read the excerpt from the Maori creation myth.Ts descendants became the Mori, the humans who are able to master anything that they decide to conquer: the forest, the sea, the food, and the earth. Only Tawhiri escapes Ts wrath, and still today the Mori battle against the hurricanes he sends from above.Based on these excerpts, how do the Haida and Maori cultures view the relationship between humans and the environment?The Haida believe they exist to serve nature, while the Maori believe they must live in harmony with their surroundings.The Haida believe they must overcome the elements of nature, while the Maori believe they must be kind to their surroundings.The Haida believe they created their surroundings, while the Maori believe they are more powerful than nature.The Haida believe they were picked to be responsible for the earth, while the Maori see themselves in conflict with nature. Please help Ill give brainliest Is Integer a Rational Number? Yea thank for the answer name business sector in which kpm is operating Help put the words in the blanks lll give Brainlist !!!! Help quickExample: 1. *Answer* 2. *answer* Find the Value of x what is the value of x? Ramesh went from place A to place B and then from place B to place CA is 10.8 km from B and place B is 15.5 km from place C, Rahul went from place A to place D and then place D to place C, distance between place A and D is 11.7 km and distance between place D and place C is 18.2 km, Who travelled more distance and by how much, also calculate the total distance between place A and place D and express the total distance in M,CM and KM. Hari is accused ........... stealing money.