which one will be the correct answer​
pls tell

Which One Will Be The Correct Answerpls Tell

Answers

Answer 1

Answer:

option c clean boot. it is correct.

Answer 2
Option c, clean boots is the correct answer

Related Questions

what is the use of a piano​

Answers

To produce music using the keys provided with the instrument?
It sharpens fine motor skills, improves dexterity and hand-eye coordination. Music has also been shown to reduce heart and respiratory rates, cardiac complications, and to lower blood pressure and increase immune response. Playing the piano also makes your hands and arm muscles much stronger than the average person.

Cuando se introduce una fórmula en una celda primero que hay que introducir es

Answers

Answer:

El signo =.

Explanation:

La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.

Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.

define Microsoft Excel 2010​

Answers

Answer:

a very very old Microsoft application that only people on old pc's use now

Explanation:

Answer:

Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.

This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.

Explanation:

In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.

Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.

The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.

You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?

Answers

Answer:

Vulnerability scanner

You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.

What is a vulnerability scanner?

Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.

A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.

If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.

To learn more about vulnerability scanners click here:

https://brainly.com/question/10097616

#SPJ12

Write code using the range function to add up the series 3, 6, 9, 12, 15, ..... 66 and print the resulting sum. Expected Output 759

Answers

Answer:

The program is as follows:

total = 0

for i in range(3,67,3):

   total += i    

print(total)

Explanation:

This initializes the sum of the series to 0

total = 0

This iterates through the series with an increment of 3

for i in range(3,67,3):

Add up all elements of the series

   total += i

Print the calculated sum    

print(total)

The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer:

Compactness

Explanation:

Have a nice day!

Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File

Answers

Answer:

Explanation:

1.Save and Save As

The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name

2.Blank Document and Template

Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template

3. Existing File and Recently Open File

Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist

a computer takes a lot of time to do complex calculation​

Answers

Question:

A computer takes a lot of time to do complex calculation.

Answer:

False!

Hope it helps you

6. By default,how the table headings are placed. (2 Points)
bold and italic
bold and centered
bold and underlined
bold and aligned​

Answers

They are all bold and what ever else

como se llama el arte de pintar en las cuevas sus actividades de caceria

Answers

shsibdhebduduebsisodbduei


Select all that apply: Our primary objectives in functional programming are: Group of answer choices Functions should be as pure as possible following a pattern of Input->Processing->Output To model algorithms in a state-machine like format Removing state from programming Modeling data into a fact-base to be queried Raising our abstraction towards math Code free of side effects Modeling data into classes/objects that intercommunicate to solve software issues

Answers

Answer:

Functions should be as pure as possible following a pattern of Input->Processing->Output

To model algorithms in a state-machine like format

Code free of side effects

Explanation:

Functional programming is a popular concept in most popular programming languages such as Lisp that makes use of functions in separating code that aims to define and solve a particular problem which is part of a bigger problem. Functional programming focuses on what to solve, ie what is the problem rather than how do we solve it. It divides up code in meaningful blocks that makes it a lot more understandable, allowing big problems to be solved in tiny bits and not an overwhelming whole. Functional programming adopts the state-machine like format as it makes use of input and alters state as necessary(not hard coded). It also removes side effects issues that may be experienced when a function affects or mutates variables(global variables) that may be outside its block.

Human Resources can be classified into four groups namely________, ________, _______ and _____________.

A. skilled, advanced, professional and services.
B. semi-skilled, simple, services and sustain.
C. professional, advanced, unskilled and simple.
D. professional, unskilled, semi-skilled and skilled.
as i said before they have no topic for fcm but can you help plzz

Answers

Answer:

Option D

Explanation:

Human resources can be classified into four groups namely professional, unskilled, semi-skilled and skilled.

What is the correct order or a technological system?

A Input, Output, Process
B Output, Process, Input
C Input, Process, Output
D Process, Resources, Output


POV : the topic is fcm aka family consumer management i don't see any topic for that so i put a different one plz help

Answers

Answer

C

Explanation:

In a system you have to send on input data, then the application processes it and then it returns your output

A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

Answers

Group of answer choices.

A. It can communicate with networks inside a particular company with subnets.

B. It can communicate on the local network as well as on the Internet.

C. It has a public IP address that has been translated to a private IP address.

D. It cannot communicate outside its own network.

Answer:

D. It cannot communicate outside its own network.

Explanation:

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

When a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

Generally, a computer cannot communicate outside its own network when it is assigned an IP address of 169.254.33.16.

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?

Answers

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.

i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))

Answers

Answer:

grade = int(input("What grade are you in?")

if grade == 9:

print ("Freshman")

elif grade == 10:

print ("Sophomore")

elif grade == 11:

print ("Junior")

elif grade == 12:

print ("Senior")

else:

print ("Invalid")

Explanation:

You fail to provide the complete code. So, I will rewrite the code from scratch

The complete question requires that the level is printed based on the input grade.

The code has been added in the answer section.

The explanation is as follows:

[Thus gets input for grade]

grade = int(input("What grade are you in?")

[If grade is 9, this prints Freshman]

if grade == 9:

print ("Freshman")

[If grade is 10, then level is sophomore]

elif grade == 10:

print ("Sophomore")

[If grade is 11, then grade is Junior]

elif grade == 11:

print ("Junior")

[If grade is 12, then level is senior]

elif grade == 12:

print ("Senior")

[All other inputs are invalid]

else:

print ("Invalid")

A__________is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

Answers

Answer:

global information system (GIS)

Explanation:

A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Communication media that use an antenna for transmitting data through air or water are called _____.

Answers

Answer:

Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.

Explanation:

douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html

copy and paste that it might help!

Which type of attack cripples the network and prevents legitimate users from accessing network resources

Answers

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.

Answers

Answer:

case-based.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.

In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal

Answers

Answer:

Answer would be, PSTN (public switched telephone network)

give the difference between functional and functional tools in the middle of to the circle give importance​

Answers

Answer:

hakkuna matata is the radious of a circle

can I play the game the last of us with this spec:​

Answers

No . Take my advice
no the cpu is not powerful enough to support a game

1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal

Answers

Answer:

1. Integrated circuit.

2. Smart card.

3. RFID.

4. Digital ink pen.

5. Electronic Paper Display.

6. Radio transceiver

Explanation:

1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.

2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.

3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.

4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.

5. Electronic Paper Display: display or sign with the ability to update the information electronically.

6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.

A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.

Answers

Answer:

tictactoe[1][1]

Explanation:

To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::

Given a 2 - dimensional 3×3 array of integers :

Creating a dummy array assigned to the variable tictactoe :

[1 2 3]

[4 5 6]

[7 8 9]

We have a 3×3 array, that is 3 rows and 3 columns.

The middle element in the middle row is located in the second row ;second colum

Row and column Indexes starts from 0

Middle element in the middle row is the value 5 and it corresponds to :

tictactoe[1][1]

We call the variable name and the we use one square box each to house the row and column position.

What is the purpose of "display:table"?

Answers

Answer:

Modern browsers use CSS to style all their markup.

How would they render a <table> element if CSS had nothing that could express the appearance of one?

(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).

They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.

You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width

Convert to different number system as mentioned.(17)10=(?)2​

Answers

“convert to a different number system as mentioned” there was no number system mentioned, but if you are just trying to find 17 * 10 = x * 2

all you need to do is find that 17 * 10 = 170 and 170/2 is 85 so

17 * 10 = 85 * 2

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture, curate, and consume customer information to improve their services?

Answers

Answer: Data and Insights

Explanation:

Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.

Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.


4. What are the things that a computer literate understands?name them

Answers

[tex]{\blue{OII}}[/tex]

[tex]{\green{TUDO}}[/tex] [tex]{\red{BEM ?}}[/tex]

The activities that the computer scientist develops Data structuring, development and design. CG. Numerical analysis and development of algorithms. Database management. CG.

[tex]{\red{TCHAU }}[/tex]

❤❤

With ok g hey Ed F egg to TK up TK A
Other Questions
help!!!!!Describe the graph of the function. y = VX-6 +2I NEED HELP ASAP Wagner Assets Management Group holds 3 stocks in their investment portfolio. The amount of the investment and beta of each stock is listed below. Stock Investment Beta A $ 200,000 1.50 B 300,000 ?? C 500,000 1.20If the beta of the portfolio is 0.75, what is the beta of stock B? Complete the function for this graph. Why do sun authors use a linear rather than a nonlinear plot structure How do you respect your neighbours? Write any 4 points. Which of the following is a polynomial? I need help with the practice question at the bottom. Thank you. HELPPPPPPP PLEASEEEEEEE A tailor had 5000 buttons.He sawed 9 buttons on each shirt and had 2048 buttons left.Then,he sold all shirts at $36 each.find the total amount collected by the tailor? a)Watt (W) is a derived unit. b)The atomic clock is suitable for measuring time. c)There is fluctuation in time measured by a pendulum clock. d)The weight of an object is more at pole and less at equator of the earth. e)The weight of an object on the moon is about one-sixth the weight it would have on the earth. f)In average, the weight of 1 kilogram mass on the earth surface is 9.8 N.please answer all questions A - H, please! thank you. Based on the following selection, what is a shared obligation among every member of a firefighter team?As members of a team, firefighters, EMTs, and paramedics must be respectful of their teammate's safety. Additionally, they need to be committed tothe care and welfare of the public good. Team members are like a family, and each member must treats others as they wish to be treated.Protect team members' homesO Protect team members' safetyO Protect team members' financesProtect team members' educationPleaseeee help The most long-lasting strategic alliances Multiple Choice (1) involve collaboration with suppliers or distribution allies, or (2) conclude that continued collaboration is in their mutual interest, perhaps because new opportunities for learning are emerging. aim at insulating the partners against the impacts of the five competitive forces and industry driving forces. are those whose purpose is helping a company master a new technology. are those formed to enable the partners to be consistent first movers or fast followers. aim at teaming up with world-class suppliers or else companies with world-class know-how in product innovation. The second step in developing a Performance Measurement Baseline (PMB) is to: Define and scope the work Schedule the work Prepare the Integrated Program Management Report (IPMR) Budget the work I need help figuring out what the answer is. A 0.060 kg ball hits the ground with a speed of 32 m/s. The ball is in contact with the ground for 45 milliseconds and the ground exerts a +55 N force on the ball.What is the magnitude of the velocity after it hits the ground? write any two example of sociocultural development. (a) The heights of male students in a college are thought to be normally distributed with mean 170 cm and standard deviation 7.The heights of 5 male students from this college are measured and the sample mean was 174 cm.Determine, at 5% level of significance, whether there is evidence that the mean height of the male students of this college is higher than 170 cm.[6](b) (i) The result of a fitness trial is a random variable X which is normally distributed with mean and standard deviation 2.4 . A researcher uses the results from a random sample of 90 trials to calculate a98% confidence interval for . What is the width of this interval?[4](ii) Packets of fish food have weights that are distributed with standard deviation 2.3 g. A random sample of 200 packets is taken. The mean weight of this sample is found to be 99.2 g. Calculate a 99% confidence interval for the population mean weight.[4](c) (i) Explain the difference between a point estimate and an intervalEstimate. [2](ii) The daily takings, $ x, for a shop were noted on 30 randomly chosen days. The takings are summarized by x=31 500 and x2=33 141 816 .Calculate unbiased estimates of the population mean and variance of the shops daily taking. [4 If K is the midpoint of JL, JK = 8x + 11 and KL = 14x 1, find JL. write twelve thousand twelve hundred and twelve in numbers