Answer:
Parameter
Explanation:
q: When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.
a: Parameter
Explain how communication has helped to the staff in organization to reach their maximum delivery of service with efficience and effectiveness
Answer:
i don't know
Explanation:
The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development.
Explanation:
With the great advances in computer systems today it is possible that we can connect and interact with people who are on the other side of the planet, we can study virtually without having to attend a university or school in person, we can even work from our own homes without having to travel to our workplace, which allows us to reduce transportation costs and time.
The above benefits have been possible thanks to the evolution of computer systems.But just as the evolution of computer systems brings great benefits, it also carries great risks for the future, in recent years there has been a considerable increase in cyber attacks, therefore it is necessary an advanced cybersecurity system that allows to quickly control and protect from external threats to organizations; As well as it is necessary to emphasize training in computer systems for people of all educational levels so that they are prepared and can give proper use to computer systems and thus also learn to protect themselves from cyber fraud.
Shawn's supervisor has tasked him with determining how the company can increase the security of its Wi-Fi. Shawn plans to present several options to his supervisor and ask her to check his work. Which of the following is not a strong security method? (Select TWO.)
a. Disabling SSID
b. WPS
c. MAC filtering
d. Setting encryption
Answer:
The not strong security methods are:
a. Disabling SSID
b. WPS
Explanation:
When you disable SSID, you only make your Wi-Fi secure for the less determined attackers. By disabling the SSID (network name), those who are less technically inclined are prevented from connecting to the network but, this will not deter a more determined and technically savvy adversary. The best two options are MAC filtering and setting encryption. WPS (Wi-Fi Protected Setup) enables the process of connecting to a secure wireless network from a computer or other device easier instead of making it harder.
(viii) Word does not allow you to customize margins.
true/false:-
Peter is a new business owner. Because Peter is on a strict budget, he uses an older Novell NetWare server. The NetWare server still relies on the legacy IPX/SPX network protocol suite. Peter needs to connect his server to the Internet. He decides to use a gateway instead of a router. What is the likely motive behind Peter's decision
The most likely motive of Peter's decision to use a gateway for connecting his serve to the internet is to get a wireless connection for the internet.
A gateway server is used to communicate to the internet service provider. It is used to receives the data. It helps to sends the data to the router in order to translate as well as distribute the wireless devices.
In the context, Peter who is on a strict budget uses gateway system to connect to the internet and he uses the older version of Novell NetWare server.
Learn More :
https://brainly.in/question/35731153
What is software? Why is it needed?
Explanation:
Software is a data and information collection of computer.
It needs to protect computer from viruses.
I hope this helps you
Which of the following is not a data visualization technique?
Answer:
Normalization
Explanation:
From the options given :
Boxplot is a data visualization techniqye used for representing numerical data in the form of a box such that it adequately conveys the five number summary if the dataset which are the minimum, maximum, lower quartile, median and upper quartile, it also depicts the presence of outlines.
Scatter plot are used depict the relationship between two variables on the x and y axis of a graph. Each point is a representation of the (x, y) value pairs of the observation.
Tag clouds are usually used to represent word, metatdata and other free form text using different colors and font sizes to give information about the data.
Normalization is the odd option out as it is used to restructure data in other to promote integrity of data.
Which option is used in order to configure switchboards for a complex database?
Switchboard Manager
Global Options
Quick Search
Database Formatter
worth 100 points
Answer:
switch board manager
Explanation:
If i took my SIM card out of my phone and put it in a router then connect the router and my phone with Ethernet cable would the ping change???
Answer:
ummmmmmmmmmmmm nooooo???
Write down the short history of COMPUTER?
Answer:
Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer",he conceptualized and invented the first mechanical computer in the early 19th century.
disadvantage of monolithic programming
Answer:
=Tight coupling between components, as everything is in one application.
=Less reusability.
=Large code base; tough for developers and QA to understand the code and business knowledge.
=Less Scalable.
=Does not follow SRP (Single Responsibility Principle)
=More deployment and restart times.
Suppose a program written in language L1 must be executed on a machine running a program running in language L0. What important operation must take place
Question Completion with Options:
a. Translation of the entire L1 program into L0 code
b. Translation of the L0 program into L1 code
c. Creation of a language L3 that interprets L0 instructions
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Answer:
The important operations that must take place in this scenario are:
a. Translation of the entire L1 program into L0 code
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Explanation:
Translation enables decoding to take place. This means that the L1 program is decoded into a language that the L0 program can understand and execute. Without this translation, the higher level language of L1 will not be understood by the machine language of the L0 programs. Translation of a code creates a shared understanding, thereby easing program execution. Code translation is simultaneously accompanied by interpretation.
Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
Take action.
Take a break.
Evaluate.
Complete the task.
Consider solutions and list ideas.
Understand the task or need.
Ask a coworker for help.
Take action.
Evaluate.
Complete the task.
Consider solutions and list ideas.
Understand the task or need.
help me please help me please
Answer:
3 one is the answer or 4 one
Answer:
none of the above
Explanation:
Every flip flop will divide the frequency by 2, so you need 2 flip flops.
Explain how mobile phone production could be more sustainable
Answer:
Sustainable design - the key features for sustainable phones are: use of sustainable and recycled materials, the use of less energy and efficient charging, durability, and last but not least they should be easy and inexpensive to repair.
Answer:
One of the best ways to change this is to voice your concern to cell phone manufacturers for more sustainable products. Request smartphones that are made with fewer hazardous chemicals, manufactured in plants powered by renewable energy, and that contain recycled materials.
Explanation:
7. Which control is used to display multiple records in List Form
a) Data Grid View b) Textbox c) Label d) Button
Answer:
I think a is correct answer.
Answer:
A
Explanation:
Draw AND, OR, XOR and XNOR gates with truth table and logic gates.
.
Answer:
see picture. let me know if you have questions.
Write and application that reads five integers from the user and determines and prints the largest and the smallest integers. Use only the programming techniques your learned in this chapter (use only if statements) 1.2. Modify your first program to add 2 more functions, the first function should determines the largest number and the second smallest. Both new functions must get invoked from the main function.
Answer:
#include <stdio.h>
#include <limits.h>
/* Define the number of times you are going
to ask the user for input. This allows you
to customize the program later and avoids the
hard coding of values in your code */
#define NUMVALS 5
int main(void)
{
int i = 0;
int curval = 0;
/* Set your initial max as low as possible */
int maxval = INT_MIN;
/* Set your initial min as high as possible */
int minval = INT_MAX;
/* Loop through and ask the user for the defined
number of values */
for (i = 0; i < NUMVALS; i++)
{
/* Ask the user for the next value */
printf("Enter the next value: ");
/* Get the next value from the user */
scanf("%d", &curval);
/* Check to see if this is our biggest or
smallest value yet */
if (curval > maxval)maxval = curval;
if (curval < minval)minval = curval;
}
/* Output the results */
printf("The smallest value entered was: %d \n", minval);
printf("The largest value entered was: %d \n", maxval);
/* End the program */
return 0;
}
Explanation:
Select the true statement about the motherboard.
It executes the commands sent to it by the application software.
It acts as a storage point for read-only memory (ROM).
It acts as the working memory of the computer by transferring data from the hard disk for processing.
It provides much of the electrical connection between different computer parts.
Answer:
it executes the commands sent to it by the applica software .
The motherboard provides much of the electrical connection between different computer parts.
What is a motherboard?This is known to be a kind of printed circuit board that is made up of some key parts or aspect of a computer or any kind of device.
Conclusively, it is one that is made up of It connectors that is a place where other circuit boards can be placed and as such act to provides much of the electrical connection between different computer parts.
Learn more about motherboard from
https://brainly.com/question/12795887
#SPJ2
How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records, but not allow her to delete the records
What is the definition of: a computer network? data communications? telecommunications? a local area network? a personal area network? a metropolitan area network a wide area network? network management? convergence? g
Answer:
The answer is below
Explanation:
1. Computer Network: this is a system of interconnection of computers and computing devices that utilizes wires or radio waves over certain reachable locations.
2. Telecommunications: this is known to be the system or combination of telephones device and networks that transmit telephone signals.
3. A local area network: often referred to as LAN, is a system of networks that covers a smaller area usually within a room, floor, building, or campus.
4. Personal area network: often referred to as PAN, this is a network that covers few distances, usually between wireless devices like PDAs, laptops, and other devices.
5. Metropolitan area network: often referred to as MAN, this is a system of the network that serves quite a larger area, usually between that serve an area of 1 to 30 miles radius. For example, a typical city.
6. Wide area network: often referred to as WAN, this is a system of a large network that covers a large area such as parts of states, many states, countries, and the world at large.
7. Network management: this is defined to be a process of designing, installing, and supporting a computer network, such as computer hardware and software
8. Convergence: this is known to be a connection, combination, and integration of two or more computer technologies in a single device or system for operation.
How do i connect WiFi on windows xp without icon?
Answer:
Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.
Book information (overriding member functions) Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a PrintInfo() function that overrides the Book class' PrintInfo() function by printing not only the title, author, publisher, and publication date, but also the edition and number of volumes. Ex. If the input is: The Hobbit J. R. R. Tolkien George Allen & Unwin 21 September 1937 The Illustrated Encyclopedia of the Universe James W. Guthrie Watson-Guptill 2001 2nd 1 the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe Author: James W. Guthrie Publisher: Watson-Guptill Publication Date: 2001 Edition: 2nd Number of Volumes: 1 Note: Indentations use 3 spaces. LAB ACTIVITY 11.14.1: LAB: Book information (overriding member functions) File is marked as read only Current file: main.cpp cin >> numVolumes; main.cpp Book.h 25 26 27 28 29 30 31 32 33 34 35 36 myBook. SetTitle(title); myBook. SetAuthor(author); myBook. SetPublisher(publisher); myBook.SetPublicationDate(publicationDate); myBook.PrintInfo(); Book.cpp Encyclopedia.h myEncyclopedia. SetTitle(eTitle); myEncyclopedia. SetAuthor(eAuthor); myEncyclopedia. SetPublisher(ePublisher); myEncyclopedia. SetPublicationDate(ePublicationDate); Encyclopedia.cpp
Answer:
hansnmakqkai8aiaiakqklqlqlqlqlqqqw
Which statement is most likely to be true about a computer network?
A network can have several client computers and only one server.
A network has to have physical cables connecting the devices in the network.
A network can have several servers and only one client.
A network can consist of a single computer with no other devices in communication with that computer.
Which statement is most likely to be true about a computer network?
A network can have several client computers and only one server.
Explanation:
a network can have several client computers and only one server
CONDUCT INTERVIEWS
Using your interview questions, interview at least three business professionals. Here are some useful tips for conducting the interviews:
Schedule an appointment for the interview for a time and place that is quiet and convenient.
Be on time and be prepared with paper and pen. You may also bring a recording device.
Be friendly and courteous; remember that the interviewee is giving you her valuable time!
Ask your questions clearly.
Don't interrupt!
Try to stay focused, but if something interesting comes up, go with it.
Take good notes. Ask the interviewee to repeat what she said if necessary, but only do this when it is something important.
Obtain all the information needed before ending the interview. If necessary, review your notes with the person.
Thank the interviewee for her time.
Write a description of the interviews in this text box.
Note that conducting a professional interview with business professionals is quite tasking and it does require skills and boldness,
Note that the questions that one need to ask are questions that are based on the field of those business professionals, the company, your background, their dreams and aspirations and as such one should not be personal about it.
What are the interview questions asked?The interview questions prepared were:
Do they have the skills, expertise, and experience to carry out the job?.Are they happy and interested in current job and the current firm they are working with?.Can I fit into their team, organization culture, and firm?. etc.Learn more about interview from
https://brainly.com/question/8846894
To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure
Answer:
Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.
Explanation:
To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.
For example, we may need to store the address of an entity employee in a structure.
A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
A. Sensitive scanned materials being saved on the local hard drive
B. Faulty printer drivers causing PC performance degradation
C. Improperly configured NIC settings interfering with network security
D. Excessive disk space consumption due to storing large documents
Answer:
D. Excessive disk space consumption due to storing large documents.
Explanation:
When a company is planning to use NAFDs in its office rather than paper work, the efficiency of employees will increase as unnecessary paper work takes time in handling and printing. When data is stored on disks there is a risk that employees store large or irrelevant files in the disk which will create storage issues.
Write a program to print all odd numbers between 20 and 50(Qbasic)
cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]
Answer:
please translate
Thank you✌️
Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name of the most expensive fruit. Each item of the dictionary includes: A key: the name of the fruit A value: the price of the fruit.
Answer:
The program is as follows:
def get_price(fruits):
AllPrice = fruits.values()
value_iterator = iter(AllPrice)
mostExpensive = next(value_iterator)
for item in fruits:
if fruits[item]>=mostExpensive:
mostExpensive = fruits[item]
fruitName = item
print(fruitName)
fruits = {}
n = int(input("Number of Fruits: "))
for i in range(n):
name = input("Fruit name: ")
price = int(input("Fruit price: "))
fruits[name] = price
get_price(fruits)
Explanation:
This defines the get_price function
def get_price(fruits):
This gets all price in the dictionary fruit
AllPrice = fruits.values()
This passes the values to a value iterator
value_iterator = iter(AllPrice)
This initializes mostExpensive to the first price in the dictionary
mostExpensive = next(value_iterator)
This iterates through the elements of the dictionary
for item in fruits:
If current element is greater than or equals most expensive
if fruits[item]>=mostExpensive:
Set most expensive to the current element
mostExpensive = fruits[item]
Get the corresponding fruit name
fruitName = item
Print fruit name
print(fruitName)
The main begins here
This initializes the fruit dictionary
fruits = {}
This gets input for the number of fruits
n = int(input("Number of Fruits: "))
This is repeated for every inputs
for i in range(n):
Get fruit name
name = input("Fruit name: ")
Get fruit price
price = int(input("Fruit price: "))
Append name and price to dictionary
fruits[name] = price
Call the get_price function
get_price(fruits)