Answer:
to save in different format
when files on storage are scattered throughout different disks or different parts of a disk, what is it called
Answer:
File Fragmentation or Fragmented Files
open accomplishing your task I was able to
Answer:
WTH KINDA QUESTION IS THIS !
I DON'T UNDERSTAND DUDE
Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly
Explanation:
1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem
2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.
The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:
One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.In conclusion, the above method will be used for the troubleshooting.
Read related link on:
https://brainly.com/question/18275236
can I play the game the last of us with this spec:
what is the fullform of ETA in computer term
Answer:
Estimated Time of Arrival.
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet
Answer:
The given statement is true.
Explanation:
The honeynet is indeed a decoy network comprising a honey trap or even more. It appears to be a real network with multiple systems but is housed on one or a few servers, each of them together in one setting, which is why it is termed a honeynet when more than one honeypot is linked to an amount of honey pot system on one subnet. In the IDSs (Intrusion Detection Systems), a padded cell system has been used which is like a honeycomb.
If you set the Decimal Places property to 0 for a Price field, and then enter 750.25 in the field, what does Access display in the datasheet
Answer:
The answer is "750".
Explanation:
Throughout this question the even though it used to provides the precise decimal which is used as the representation or rounding requirement in software such as billing, it also used to represents only the 750, demonstrating the nearest rounding of the given technique, that's why the solution is 750.
What are the characteristics of an attachment in an email?
O The attachment will always appear in the body of the message.
O The paperclip icon indicates an attached file.
O Bold red type indicates an attached file.
O The attachment can only be viewed if it is in HTML format.
A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do
Answer:
Install a second server and load balancer
Explanation:
Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.
Which type of attack cripples the network and prevents legitimate users from accessing network resources
Answer:
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.
Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.
1
What is a DDoS attack?
1.1 – Understanding a DDoS Attack
The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.
1.2 – What is the Goal Behind a DDoS Attack?
The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:
The website can become slow to respond to legitimate requests.
The website can be disabled entirely, making it impossible for legitimate users to access it.
what can be the maximum possible length of an identifier 3163 79 can be of any length
Answer:
79 characters
Explanation:
The programming language is not stated, but a little search online shows the question is about python programming language
Literally, identifiers are the names given to variables, arrays and functions.
In most programming languages (e.g. python), identifiers are case-sensitive.
i.e. Abc is a different identifier when compared to abc.
Having said that, python allows up to 79 characters to name an identifier.
Meaning that, the length of a variable name (or array, or function, etc.) can be up to 79 characters, and it cannot exceed 79 characters.
With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have other words within the search. Group of answer choices exact match phrase match broad match modified broad match
Answer:
modified broad match.
Explanation:
A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.
At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.
There are different types of matching techniques used in configuring a search engine and these includes;
I. Exact match.
II. Phrase match.
III. Broad match.
IV. Modified broad match
When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.
Hence, the name modified because it avail users other options by including other words within the search.
Write code using the range function to add up the series 3, 6, 9, 12, 15, ..... 66 and print the resulting sum. Expected Output 759
Answer:
The program is as follows:
total = 0
for i in range(3,67,3):
total += i
print(total)
Explanation:
This initializes the sum of the series to 0
total = 0
This iterates through the series with an increment of 3
for i in range(3,67,3):
Add up all elements of the series
total += i
Print the calculated sum
print(total)
Cuando se introduce una fórmula en una celda primero que hay que introducir es
Answer:
El signo =.
Explanation:
La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.
Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.
plz help me to do 4 number
Answer:
A is an abbaccus. B is Blaze Pascal. C is The Jacquard Loom. D is Charles Babbage. E is The Manchester Baby.
Explanation:
Your friend want to make a copy of your new game you bought the previous day .
Why should you prevent him from doing that?
Answer:
It is copyright infringement
Explanation:
Required
Why you should prevent your friend from copying a software you bought
When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.
This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.
Software written to meet the specific needs of a company is known as
Answer: system
Explanation:
System software refers to the software that's written to meet the specif needs of a company. It is designed in order to provide a platform for the other software and run the hardware and the application programs of a computer.
Examples of system software are game engines, industrial automation, search engines, etc.
An item that contains both data and the procedures that read and manipulate it is called a(n) ________.
Answer:
Object
Explanation:
An item that contains both data and the procedures that read and manipulate it is called an object.
hubs hardware advantage's and disadvantages
Answer:
answer in picture
hope it's helpful
Why does a computer need programs?
A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
Group of answer choices.
A. It can communicate with networks inside a particular company with subnets.
B. It can communicate on the local network as well as on the Internet.
C. It has a public IP address that has been translated to a private IP address.
D. It cannot communicate outside its own network.
Answer:
D. It cannot communicate outside its own network.
Explanation:
Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.
Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.
When a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.
Generally, a computer cannot communicate outside its own network when it is assigned an IP address of 169.254.33.16.
Write a basic notation for
[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]
Answer:
[tex]a = (b + c)/(2 * c)[/tex]
[tex]z = x/(y + c)[/tex]
[tex]c = (9 * c + 32)/5[/tex]
Explanation:
Required
The expression in basic
To do this, we use () to group items, / as divide and * to combine factors
So, we have:
[tex](a)\ a = \frac{(b + d)}{2c}[/tex]
In basic, it is:
[tex]a = (b + c)/(2 * c)[/tex]
[tex](b)\ z = \frac{x}{y + c}[/tex]
In basic, it is:
[tex]z = x/(y + c)[/tex]
[tex](c)\ c = \frac{9c + 32}{5}[/tex]
[tex]c = (9 * c + 32)/5[/tex]
A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.
Answer:
tictactoe[1][1]
Explanation:
To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::
Given a 2 - dimensional 3×3 array of integers :
Creating a dummy array assigned to the variable tictactoe :
[1 2 3]
[4 5 6]
[7 8 9]
We have a 3×3 array, that is 3 rows and 3 columns.
The middle element in the middle row is located in the second row ;second colum
Row and column Indexes starts from 0
Middle element in the middle row is the value 5 and it corresponds to :
tictactoe[1][1]
We call the variable name and the we use one square box each to house the row and column position.
You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?
Answer:
Vulnerability scanner
You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.
What is a vulnerability scanner?Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.
A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.
If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.
To learn more about vulnerability scanners click here:
https://brainly.com/question/10097616
#SPJ12
Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?
Answer:
Access Quick Access commands using the More button.
Explanation:
To ensure that a command she frequently uses is added to the Quick Access toolbar Robyn would need to "Access Quick Access commands using the More button."
To do this, Robyn would take the following steps:
1. Go / Click the "Customize the Quick Access Toolbar."
2. Then, from the available options, he would click on "More Commands."
3. From the "More Commands" list, click on "Commands Not in the Ribbon."
4. Check the desired command in the list, and then click the "Add" button.
5. In the case "Commands Not in the Ribbon" list, did not work out Robyn should select the "All commands."
en que consiste excel
Answer:
Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?
Answer:
Explanation:
In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.
Communication media that use an antenna for transmitting data through air or water are called _____.
Answer:
Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.
Explanation:
douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html
copy and paste that it might help!
outline the steps involved in changing the colour of a theme
Answer:
Right click on the desktop and click on personalize option and then click on window color. After that window color and appearance window appears. select a color scheme you want. Go to Appearance and personalization, click on theme and select any theme from the list and click on ok.
write a program to generate following series in qbasics 100,81,64,....1
Answer:
[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]
it's square root number you multiple times by 2