Answer:
i. True
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.
PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.
Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.
In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).
A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.
Neymar machine that Run on electricity
"Neymar" = "name a"?
if so, well, there are many, like the little glowing box you use the type questions to the brainliest community, let it be a phone, a pc, or a molded Nintendo
if you meant Neymar indeed, I'm not sure if he runs on electricity, unless he is a soccer playing android somehow.
You are going to purchase (2) items from an online store.
If you spend $100 or more, you will get a 10% discount on your total purchase.
If you spend between $50 and $100, you will get a 5% discount on your total purchase.
If you spend less than $50, you will get no discount.
Givens:
Cost of First Item (in $)
Cost of Second Item (in $)
Result To Print Out:
"Your total purchase is $X." or "Your total purchase is $X, which includes your X% discount."
Answer:
Code:-
using System;
using System.Collections.Generic;
class MainClass {
public static void Main (string[] args) {
int Val1,Val2,total;
string input;
double overall;
Console.Write("Cost of First Item (in $)");
input = Console.ReadLine();
Val1 = Convert.ToInt32(input);
Console.Write("Cost of Second Item (in $)");
input = Console.ReadLine();
Val2 = Convert.ToInt32(input);
total=Val1+Val2;
if (total >= 100)
{
overall=.9*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else if (total >= 50 & total < 100)
{
overall=.95*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else
{
Console.WriteLine("Your total purchase is $"+total);
}
}
}
Output:
In the revised version of the library system with Book and Periodical, Question 16 options: a) Book is a subclass of Periodical b) Periodical is a subclass of Book c) Book and Periodical are subclasses of LoanableItem d) Book and Periodical implement LoanableItem
Answer:
c. Book and Periodical are subclasses of LoanableItem
Explanation:
Books are kept in library in a periodical manner. Both classes are not superior, they are subclasses of LoanableItem. Library uses common guide which makes it easy to find a book.
To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure
Answer:
Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.
Explanation:
To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.
For example, we may need to store the address of an entity employee in a structure.
How to use the AI System ?
ANSWER:
· New artificial intelligence systems are being developed to help teachers administer more effective testing that could uncover some of these often-hidden conditions. Once they can be properly identified, educators can tap into the resources available for a learning disability. Students can use AI to give reliable feedback.
Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?
Answer:
public void removePrefixStrings(List<String> list , String prefix) {
if(list==null || list.size()==0)
return;
for(int i=0; i<list.size();) {
if(list.get(i).startsWith(prefix))
list.remove(i);
else
++i;
}
}
Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2
Then removal is also n
So the total time complexity is O(n3)
Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.
Answer:
c
Explanation:
(viii) Word does not allow you to customize margins.
true/false:-
If every company is now a technology company, then what does this mean for every student attending a business college
Answer:
Explanation:
There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.
But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.
Help Pls
I need about 5 advantages of E-learning
Answer:
Explanation:
E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...
E-learning leads to better retention. ...
E-learning is consistent. ...
E-learning is scalable. ...
E-learning offers personalization.
Answer:
E- learning saves time and money
E-learning makes work easier and faster
E- learning is convenient
E- learning is consistent
E- learning is scalable
Explanation:
when you learn using the internet, you save a lot of time by just typing and not searching through books
A backbone network is Group of answer choices a high speed central network that connects other networks in a distance spanning up to several miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to thousands of miles). a network spanning exactly 200 miles with common carrier circuits.
Answer:
a high speed central network that connects other networks in a distance spanning up to several miles.
Explanation:
A backbone network functions just like the human backbone providing support for network systems by offering a network infrastructure that allows small, high speed internet connectivity. It is a principal data route between large interconnected networks which offers connection services spanning several miles. Most local area networks are able to connect to the backbone network as it is the largest data connection on the internet. This backbone networks are mainly utilized by large organizations requiring high bandwidth connection.
What is system software? Write its types.
Answer:
There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)
Answer:
There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)
Explanation:
thanks for question
How do i connect WiFi on windows xp without icon?
Answer:
Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task
Question Completion with Options:
A. device flow correlation
B. simple detections
C. application blocking list
D. advanced custom detections
Answer:
The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:
C. application blocking list
Explanation:
The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks. Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.
continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.
The Janitorial and Cafeteria departments are support departments. Samoa uses the sequential method to allocate support department costs, first allocating the costs from the Janitorial Department to the Cafeteria, Cutting, and Assembly departments. Determine the proportional (percentage) usage of the Janitorial Department by the:
Complete Question:
Departmental information for the four departments at Samoa Industries is provided below. Total Cost Cost Driver Square Feet Number of employees Janitorial $150,000 square footage serviced 200 Cafeteria 50,000 Number of employees 20,000 Cutting 1,125,000 4,000 120 Assembly 1,100,000 16,000 The Janitorial and Cafeteria departments are support departments Samoa uses the sequential method to allocate support department costs, first allocating the costs Department to the Cafeteria, Cutting and Assembly departments Determine the proportional (percentage) usage of the Janitorial Department by the a. Cafeteria Department b. Cutting Department c. Assembly Department
Answer:
Samoa Industries
Proportional (percentage) usage of the Janitorial Department:
Cafeteria = 50%
Cutting = 10%
Assembly = 40%
Explanation:
a) Data and Calculations:
Total Cost Cost Driver Square Feet Number of
employees
Janitorial $150,000 Square footage serviced 200 40
Cafeteria 50,000 Number of employees 20,000 12
Cutting 1,125,000 4,000 120
Assembly 1,100,000 16,000 40
Proportional (percentage) usage of the Janitorial Department:
Cafeteria = 50% (20,000/40,000 * 100)
Cutting = 10% (4,000/40,000 * 100)
Assembly = 40% (16,000/40,000 * 100)
Cost Allocation of the Janitorial Department:
Cafeteria = 50% * $150,000 = $75,000
Cutting = 10% * $150,000 = 15,000
Assembly = 40,% * $150,000 = 60,000
Total = $150,000
Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swinging their hand in a fist each time. When both players say three, the players throw one of three gestures: Rock beats scissors Scissors beats paper Paper beats rock Your task is to have a user play Rock-Paper-Scissors against a computer opponent that randomly picks a throw. You will ask the user how many points are required to win the game. The Rock-Paper-Scissors game is composed of rounds, where the winner of a round scores a single point. The user and computer play the game until the desired number of points to win the game is reached. Note: Within a round, if there is a tie (i.e., the user picks the same throw as the computer), prompt the user to throw again and generate a new throw for the computer. The computer and user continue throwing until there is a winner for the round.
Answer:
The program is as follows:
import random
print("Rock\nPaper\nScissors")
points = int(input("Points to win the game: "))
player_point = 0; computer_point = 0
while player_point != points and computer_point != points:
computer = random.choice(['Rock', 'Paper', 'Scissors'])
player = input('Choose: ')
if player == computer:
print('A tie - Both players chose '+player)
elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):
print('Player won! '+player +' beats '+computer)
player_point+=1
else:
print('Computer won! '+computer+' beats '+player)
computer_point+=1
print("Player:",player_point)
print("Computer:",computer_point)
Explanation:
This imports the random module
import random
This prints the three possible selections
print("Rock\nPaper\nScissors")
This gets input for the number of points to win
points = int(input("Points to win the game: "))
This initializes the player and the computer point to 0
player_point = 0; computer_point = 0
The following loop is repeated until the player or the computer gets to the winning point
while player_point != points and computer_point != points:
The computer makes selection
computer = random.choice(['Rock', 'Paper', 'Scissors'])
The player enters his selection
player = input('Choose: ')
If both selections are the same, then there is a tie
if player == computer:
print('A tie - Both players chose '+player)
If otherwise, further comparison is made
elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):
If the player wins, then the player's point is incremented by 1
print('Player won! '+player +' beats '+computer)
player_point+=1
If the computer wins, then the computer's point is incremented by 1
else:
print('Computer won! '+computer+' beats '+player)
computer_point+=1
At the end of the game, the player's and the computer's points are printed
print("Player:",player_point)
print("Computer:",computer_point)
1) Declare an ArrayList named numberList that stores objects of Integer type. Write a loop to assign first 11 elements values: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024. Do not use Math.pow method. Assign first element value 1. Determine each next element from the previous one in the number List. Print number List by using for-each loop.
Answer:
Explanation:
The following is written in Java and uses a for loop to add 10 elements to the ArrayList since the first element is manually added as 1. Then it calculates each element by multiplying the previous element (saved in count) by 2. The program works perfectly and without bugs. A test output can be seen in the attached image below.
import java.util.ArrayList;
class Brainly {
public static void main(String[] args) {
ArrayList<Integer> numberList = new ArrayList<>();
numberList.add(0, 1);
int count = 1;
for (int i = 1; i < 11; i++) {
numberList.add(i, (count * 2));
count = count * 2;
}
for (Integer i : numberList) {
System.out.println(i);
}
}
}
You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to configure the proxy server settings as follows: Port: 9000
Answer:
okay if I am it administration I will port 10000
To configure the computer in the lobby to use the corporate proxy server, you will need to follow these steps:
Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save
What is Proxy Server?A proxy server is a device or router that acts as a connection point between users and the internet.
Proxy Server settings would be the same for both Wifi and Ethernet connections, explaining about the configuration in Windows Operating System.
Open the internet browser on the laptop and go to the settings or preferences page. The exact location of the proxy settings will vary depending on the browser you are using.
In the settings or preferences page, look for the "Proxy" or "Network" section.
In the proxy settings, select the option to use a proxy server.
Enter the address of the corporate proxy server in the "Server" or "Address" field.
Enter the port number "9000" in the "Port" field.
Save the changes and close the settings or preferences page.
Test the proxy server configuration by attempting to access a website. If the configuration is correct, the laptop should be able to access the internet through the proxy server.
Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save
To learn more about the Proxy Server settings click here:
https://brainly.com/question/14403686
#SPJ12
What does the AVERAGE function calculate? the total sum of a list of values the arithmetic mean of a list of values the total number of values in a list the percentage of values in a list
Answer:
B) the arithmetic mean of a list of values
Explanation:
on Edge
The Average function calculates the arithmetic mean of a list of values. Therefore, option B is the correct option.
What is the average?In its most general definition, an average can be considered as the representative number or figure from the whole list. The average of a list containing multiple values is obtained by adding all the values and dividing them up by the total number of values.
The ultimate objective of calculating the average is to discover the value that represents the whole list. Average is also known as mean, and it works as a central value in the list, which is comprehensive in nature. It works as an approximate or rough estimate, which helps us in making decisions in daily life.
Thus, the average function calculates the arithmetic mean of a list of values. Therefore, option B is the correct option.
To learn more about the average, visit the link below:
https://brainly.com/question/11265533
#SPJ2
How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array
Answer:
Explanation:
260 cost units, Big O(n) complexity for a push
cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]
Answer:
please translate
Thank you✌️
Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented here. Write a program called primes.js that implements this algorithm. Have the program find and display all the prime numbers up to n = 150
Answer:
Explanation:
The following code is written in Javascript and is a function called primes that takes in a single parameter as an int variable named n. An array is created and looped through checking which one is prime. If So it, changes the value to true, otherwise it changes it to false. Then it creates another array that loops through the boolArray and grabs the actual numberical value of all the prime numbers. A test case for n=150 is created and the output can be seen in the image below highlighted in red.
function primes(n) {
//Boolean Array to check which numbers from 1 to n are prime
const boolArr = new Array(n + 1);
boolArr.fill(true);
boolArr[0] = boolArr[1] = false;
for (let i = 2; i <= Math.sqrt(n); i++) {
for (let j = 2; i * j <= n; j++) {
boolArr[i * j] = false;
}
}
//New Array for Only the Prime Numbers
const primeNums = new Array();
for (let x = 0; x <= boolArr.length; x++) {
if (boolArr[x] === true) {
primeNums.push(x);
}
}
return primeNums;
}
alert(primes(150));
What is the iterative procedure of recursive and nonrecursive?
Answer:
nonrecursive
Explanation:
Question: Name the person who originally introduced the idea of patterns as a solution design concept.
Answer:
architect Christopher Alexander is the person who originally introduced the idea of patterns as a solution design concept.
The person who originally introduced the idea of patterns as a solution design concept named as Christopher Alexander who was an architect.
What is architecture?Architecture is referred to as an innovative technique or artwork based on buildings or physical structures that aims at creating cultural values for upcoming generations to understand the importance of history.
The external layout can be made to best support human existence and health by using a collection of hereditary solutions known as the "pattern language." It creates a set of helpful relationships by combining geometry and social behavior patterns.
Christopher Alexander, a British-American engineer and design theorist of Austrian heritage, is renowned for his several works on the design and construction process introduced the idea of patterns as a solution design concept.
Learn more about pattern language architecture, here:
https://brainly.com/question/4114326
#SPJ6
Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.
Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?
Given:
Network IP address [tex]\bold{= 172.149.254.0 /24}[/tex]
Subnet numbers [tex]\bold{= 13}[/tex]
Calculating the borrow bits:
[tex]\to \bold{= ceil(\log_{2} 13) = 4 \ bits}[/tex]
a)
Calculating the dotted decimal value for the subnet mask:
[tex]\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\[/tex]
b)
The additional bits which will be needed to mask the subnet mask that is = 4.
Learn more: brainly.com/question/2254014
An engineer is designing an HTML page and wants to specify a title for the browser tab to display, along with some meta data on what tools the page should use. These items would best fit in which of the following sections
a. The element
b. The element
c. The
element
d. The
An HTML is made up of several individual tags and elements such as the head, body. form, frame and many more.
In an HTML page, the meta element and the title element are placed in the head element.
An illustration is as follows:
< head >
< title > My Title < /title >
< meta charset="UTF-8" >
< / head >
The head element contains quite a number of elements and tags; some of them are:
metatitle stylescriptbaseAnd so on.
Hence, in order to use a meta-data element, the meta element has to be placed within the head element.
Read more about HTML elements at:
https://brainly.com/question/4484498
advantages of computational skill
Explanation:
algorithmic thinking - developing a set of instructions or sequence of steps to solve a problem;
evaluation - ensuring a solution is fit-for-purpose;
decomposition - breaking a problem down into its component parts;
Explain how you would find a book on a given subject in the library.
Answer:
In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.
Which support function under Tech Mahindra is governing data privacy and protection related requirements
Answer:
Privacy Policy
Explanation:
PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.
Given that support functions are functions which assist and in a way contribute to the company goal.
Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.
The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.
What should businesses do in order to remain competitive under the current Cloud
landscape?
Answer:
Cloud Landscape
They must evangelize the benefits of cloud computing to company executives in order to assist them in developing and extracting business benefits that will give them a competitive advantage and increase profits
Explanation:
The most successful organisations carefully plan out a multiyear effort to improve their cloud adoption, focusing on multiple streams of work across several stages of maturity.
Cloud computing governance is difficult even when only one cloud provider is involved, and it becomes even more difficult as organisations move toward multi cloud.
Continuous workload placement analysis involves reassessing workloads at a regular cadence, evaluating whether the current execution venue sufficiently meets the organization’s needs and if migrating to an alternative model provides higher value without adding significant risk to the organization’s operations
They must evangelize the benefits of cloud computing to company executives in order to assist them in developing and extracting business benefits that will give them a competitive advantage and increase profits.
In this question, the response is "Cloud Landscape" which can be defined as follows:
The organizations should adopt these new technologies to benefit from the digital transformation offered by the cloud.New enterprises were embracing cloud computing management strategies, placing established companies at risk.In the multi-year efforts for improving cloud security were meticulously planned by even the most successful enterprises. In several contributing to higher at various maturity levels are addressed.The multi-cloud plan enables governance of cloud computing increasingly challenging, even and there is only one cloud service provider involved in the agreement.Learn more:
cloud computing: brainly.com/question/16026308