Answer:
The right approach is "Overriding".
Explanation:
The overriding function seems to be a programming application that enables a classroom as well as children to successfully implement some technique that's been given by another one of their parents or super classes.The overriding method must be named, signed, and parameter-like inside your parent process throughout the child one.Thus the above is the correct answer.
Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a "paper license" and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit on the number of times the key can be used. You decide to update all 20 users.
Which of the following are possible consequences of this decision? (Select TWO.)
• The software will eventually stop working properly for the 10 extra updates you installed.
• You risk losing your job.
• The software company will never detect the violation so negative consequences are unlikely.
• There are no consequences. By law, you are allows 1 to 3 activations per user.
• Your company is exposed to litigation by violating the software license agreement.
Answer: You risk losing your job.
You expose your company to litigation by violating the software license
Explanation:
The possible consequences of the decision are you risk losing your job and your company is exposed to litigation by violating the software license agreement. The correct options are b and e.
What is a software update?The software will never be flawless. It should come as no surprise that developer companies regularly offer updates to encourage fixes in software and video games. These adjustments are accomplished via programs referred to as "patch," which literally translates to "mend."
Almost all software has issues like bugs and vulnerabilities when it is released, even if it has been rigorously tested through numerous trial versions. Here's when the patch is useful: It will create a number of patches to fix issues found by programmers or even regular users.
Therefore, the correct options are
b. You risk losing your job.
e. Your company is exposed to litigation by violating the software license agreement.
To learn more about the software update, refer to the link:
https://brainly.com/question/1090549
#SPJ5
write a program to check the password( qbasic)
Answer:
Assuming this is in python:
def check_password(password):
correct_password = "qbasic"
if password == correct_password:
return True
else:
return False
def main():
user_input = input("Type in your password: ")
if check_password(user_input):
print("Correct!")
else:
print("Wrong, try again")
main()
Explanation:
Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.
Have a good day :)
Helpppppppppppppphuhuh
Answer:
B
Explanation:
You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.
If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.
What are the factors affecting the life of ballast? Explain.
Answer:
When it's too hot or too cold.
Explanation:
When a bulb of the wrong size or voltage is used in the fixture, the ballast often overheats, causing the light to shut off. The bulbs and the fixture must also match in frequency, or the ballast becomes overworked and overheated.
You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.
Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients
configure network access policies on the RADIUS server
Explanation:
write one function each of caps lock and shift keys.
Answer:you can use the shift key to use symbols instead of numbers on the top numbers part of the keyboard
Explanation:
Some Examples are ( ) $ &
full form of ip ........?
You are working as a Solutions Architect in a large healthcare organization. You have many Auto Scaling Groups that you need to create. One requirement is that you need to reuse some software licenses and therefore need to use dedicated hosts on EC2 instances in your Auto Scaling Groups. What step must you take to meet this requirement
Answer:use launch template with your ASG
Explanation:
explain the types of computer on the basis of model
XT(extra technology) computer: it cannot support GUI Based operating system. its processing speed is 477MHz
AT(advanced technology):it supports GUI Operating system. Its processing speed is 2GHz
PS/2:is a laptop computer which is rechargeable
and battery powered. it's operated with OS/2 operating system.
PLEASE MARK AS BRAINLIEST
Answer:
XT Computers (Extended Technology)
AT Computers (Advanced Technology)
PS/2 Computers (Personal System 2)
Explanation:
XT Computers :
The computers having 8086 or 8088 microprocessor and processing speed of 4.77 Mhz are known as XT Computers. These computers are outdated now because they cannot run on latest software versions.
AT Computers :
The computers having 80286 or later versions of microprocessors are known as AT Computers. Their storage capacity as well as speed is much higher than XT computers. Besides that they have math co-processor to support main processors to perform complex mathematical calculations.
PS/2 Computers:
IBM developed another model of computer in 1990 that have much advanced architecture design that AT computers. They are known as PS/2 computers. They are much faster than AT computers. Most of the laptop computers based on PS/2 model use OS/2 or UNIX operating system and 1.44 MB floppy diskette.
Write technical term of following statements: a.The set of programs to perform specific task. b.A feature of computer which tells multi-functioning capability of computer. c.The first calculating machine designed for the manipulation of census data. d.The first computer programmer.
Answer:
a) Application software
d) Lady Augusta Ada Lovelace
b) (it may be versatility
What does this mean? it is coming after i ask a question
Don't use such phrases here, not cool! It hurts our feelings :(
Answer:
To my own opinion I think it means that when you're answering a question here in brainly I think they are referring that your message is rude but sometimes you are not rude but I don't know. Maybe it could be some difficult technical problems.
Recall when you built your information sending device. Why did we decide to send a message as a sequence of two options rather than modifying our devices to represent more options
Learn more:
brainly.com/question/13187838
the contribution of Charles Babbage in the history of computer
Equi Technologies offers cloud computing services to several data centers around the world. It hosts services in the cloud, which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies. In the context of cloud computing services, it is evident that Equi Technologies provides _____.
Answer:
The answer is "Software as a service".
Explanation:
The software license strategy permits access to the software via a remote server through subscription-based access to the software. Rather than installing software on each user's PC, SaaS lets them access applications via the Internet.
For a number of reasons, it could save you money. Purchase/installation costs and also ongoing maintenance and upkeep are avoided, which is the primary benefit. SaaS apps may be easily downloaded and managed without breaking the bank on hardware parts and upgrades.
Analog computers are general purpose computers : true ? or false ?
Answer:
false
Explanation:
Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.
Fault tolerance refers to
how a network fails.
how well a network recovers after a failure.
mirror operations.
servers.
Answer:
servers
Explanation:
because it good for servers
Answer: How well a network recovers after a failure.
Explanation:
What is the primary difference, if any, between a web master and a web producer? While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system. While a web producer maintains a company’s websites, the web master maintains a company’s entire web-based system. While a web master maintains a company’s web presence, the web producer maintains all technology at a company. While a web producer maintains a company’s web presence, the web master maintains all technology at a company.
Answer:
While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system.
I'm assuming that's A
why the internet is not policed
Answer:
The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work
what is known as Ip address
Answer:
IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.
Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone
After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?
No, additional data cannot be included in a chart once it has been created; the user should delete the chart and create a new chart.
Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Yes, click the chart, select the additional rows or columns of data to add, and press Enter on the keyboard.
Yes, double-click the chart and select Properties from the list; in the Properties box, insert the new data range to include in the chart.
Answer: Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Explanation:
Excel allows one to be able to update the data in a graph because the designers knew that information needs to be updated sometimes.
This is why there is an option to use the Data button in the Data group which is under the Design tab to increase or decrease the data range that is to be used in the chart which means that a new row of data could even be added.
You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.
Answer:
I will choose a option tin best
Answer: Install a WorkGroup to allow each device to control what is shared and with whom.
Explanation:
Ben is working in an IT services organization that uses the National Institute of Standards and Technology (NIST) functional impact categories to describe the impact of incidents. During a recent construction project, a contractor plugged a network device to the same switch twice, resulting in a network loop and taking down the organization's network for one-third of its users. Which functional impact category should Ben use to classify the event given in the scenario
Answer:
Medium
Explanation:
The functional impact category in NCCIC Cyber Incident scoring system considers incident impact to the organization. This category isn't severe and can result from such things as minor network breakdowns in the organization. It is given a priority score according to the scoring system of medium which is yellow in the priority level.
Which of the following stores the operating system?
O Von Neumann center
O Bluetooth center
O the cloud
O random access memory
Answer:
The Cloud
Explanation:
Clouds are basically computers offsite. The cloud is used for many things, Like storage, to running applications which needs an operating system to work. Just like the device you are using right now to use Brainly. It needs an operating system to install a web broswer or app to acess a service. Hope this helps!
the paint 3D program is used for drawing picture true or false
Answer:
The answer is TRUE we use paint program to draw.
Explanation:
#swag
Which is the correct html for creating a hyperlink pls answer
Answer:
c
Explanation:
The correct HTML for creating a hyperlink is <a>http://www.w3c.org</a>. The correct option is c.
What is a hyperlink?The coding that organizes a web page's content is called HTML (HyperText Markup Language). Content may be organized using paragraphs, a list of bulleted points, graphics, and data tables, among other options.
A hyperlink in computers, or simply a link, is a digital pointer to information that the user can follow or be directed by tapping or clicking. A hyperlink directs readers to either the entire document or a specific section within it. Text having links is known as hypertext. An anchor text is a text from which a link is made.
Therefore, the correct option is c. <a>http://www.w3c.org</a>.
To learn more about hyperlinks, refer to the link:
https://brainly.com/question/9483034
#SPJ2
Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END
Answer:
full and then I would like this
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as
Answer:
Reconnaissance
Explanation:
4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,
Answer:
[tex]\sigma_x = 5.68[/tex]
Explanation:
Given
[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]
Required
The standard deviation
First, calculate the mean
[tex]\bar x =\frac{\sum x}{n}[/tex]
So, we have:
[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]
[tex]\bar x = \frac{64}{8}[/tex]
[tex]\bar x = 8[/tex]
The standard deviation is:
[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]
So, we have:
[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]
[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]
[tex]\sigma_x = \sqrt{32.2857}[/tex]
[tex]\sigma_x = 5.68[/tex]
write a c program to display the series: 1,8,27,64,125
num_list = [1, 8, 27, 64, 125]
for x in range ( len( num_list) ) :
print (num_list[x])