Answer:
B
Explanation:
keeping track of the coordinates
What allows an individual to avoid capital outlay?
paying cloud by the month
paying cloud by the year
paying cloud by the hour
paying cloud by the day
The daily payment for cloud services would be most reasonable. Hence option A is correct.
Capital Outlay refers to the expenditure or payment for the acquisition cost of capital assets.
In this case, the assets whose cost of purchase is being avoided by expenditure on cloud services is IT Server Hardware and Software which can be outsourced to companies that provide Cloud as a Service.
Cloud Services is the provision of Cloud computing services on a pay-per-use basis.
One of the advantages of this service is that it mostly consists of self-service on-demand. Hence, no need for the physical asset which usually is very costly.
Learn more about Capital Outlay in the link below:
https://brainly.com/question/832717
5. Power Trio
by CodeChum Admin
Multiplying two numbers is a piece of cake, but how about multiplying three of them, either being a negative of positive number? With programming and proper code, these tasks are easy to handle.
You're a programmer, right? Then code this one for me!
Input
A line containing three numbers (positive or negative, may have decimal places) separated by a space.
1.6·-2·-1
Output
A line containing a decimal/float with one decimal place.
3.2
Answer:
from decimal import *
li = list(map(Decimal,input().split()))
result = li[0]*li[1]*li[2]
print(abs(result))
Explanation:
The proper or programming code to handle that multiplies three numbers is as follows:
from decimal import *
value = list(map(Decimal,input().split()))
result = value[0]*value[1]*value[2]
print(abs(result))
Code explanation:The code is written in python.
From the decimal module we have to import *. The decimal module incorporates a notion of significant places so that 1.3*1.2 = 1.56The variable value is used to store the list of the decimal inputThe variable result multiplies the three numbers in the list Finally we print the absolute value of the result.learn more on python here: https://brainly.com/question/19175881
time 20,36,48
answer please!!
Answer:
Pls subscribe my channel on yt
Name- CREATIVITY WITH MS
pls help me reach 500 subscribers
your subscription really matters
After subscribing pls make sure to comment also
I will give you 10 thanks and also if you have a channel I can subscribe it also
write a function to swap two variables using a third variable
Answer:
Explanation:
Assign var1 value to a temp variable: temp = var1.
Assign var2 value to var1: var1 = var2.
Assign temp value to var2: var2 = temp.
How can I fix this?
I’m on school Wi-Fi and “your connection isn’t private” keeps popping up every time I try to look up something, can someone please help!
Answer:
Try these
Reload page.
Clear Browsing Data.
Restart Router.
Avoid Incognito Mode.
Check Computer Date and Time.
Disable VPN.
Explanation:
Game progression is the underlying structure of a game level or mission in terms of layout, presentation of obstacles, and options for movement.
Group of answer choices
False
True
Answer:
False
Explanation:
Game progression is when a character in a game reaches a new checkpoint or level.
is a formal document containing detailed information about the destruction of your
A
data.
Which of these statements are true about Domain Controllers (DCs)? Check all that apply.
Changes that are safe to be made by multiple Domain Controllers at once are tasked by granting them Flexible Single-Master Operations.
The default Organizational Unit (OU) called Domain Controllers contains all Domain Controllers in the domain.
Delegation can be used in Active Directory.
You should always use your Domain Admin or Enterprise Admin for day-to-day use.
A domain controller is known to be a type of computer server that often responds to security authentication requests and verifies users. The true statements about Domain Controllers (DCs) are:
The default Organizational Unit (OU) called Domain Controllers contains all Domain Controllers in the domain. Delegation can be used in Active Directory.Default user groups often do exist. The Domain Controllers user group has all Domain Controllers in the domain.
Delegation can be used in Active Directory as they help to give accounts permission in the file system so that an individual can set Access.
Learn more from
https://brainly.com/question/24931494
# program-01-steps
Using steps.py in this repository for a starter file, write a Python program to calculate average number of steps per month for a year.
The input file (which you will read from the command line, see the sample program on how to read command line arguments in this repository) contains the number of steps (integer) a person took each day for 1 year, starting January 1. Each line of input contains a single number.
Assume this is NOT a leap year.
Your output must follow this format:
```
The average steps taken in MONTH NAME was 9999.9
```
Where 9999.9 represents that month's average. Be sure to output only a single decimal digit (digit to the right of the decimal)
Be sure to spell out the name of the month. First letter must be caps. For example: June
For a grade of A your program should handle a leap year by looking at the number of steps in the file, if 365 then non leap year, if 366 then leap year.
***commandlines.py***
# Python program to demonstrate
# command line arguments
# notice that the first command line argument that is passed to a program comes after the name of the program file
# it has an array index of 1 in the sys.argv array
# sys.arg[0] is always the name of the python program file
# all command line arguments are strings, so if you want to perform math you have to convert
import sys
# total arguments
n = len(sys.argv)
print("Total arguments passed: %i" % n)
# Arguments passed
print("\nName of Python script: %s" % sys.argv[0])
print("\nArguments passed:")
for i in range(1, n):
print("%s" % sys.argv[i])
# Addition of numbers
Sum = 0
for i in range(1, n):
Sum += int(sys.argv[i])
print("\n\nResult: %i" % Sum)
***steps.py***
# Named constants - create one for each month to store number of days in that month; assume this is NOT a leap year
def main():
# Open the steps file using the first command line argument to get the input file name. For example: python steps.py steps.txt would open the file steps.txt to read the steps
# Display the average steps for each month using a function to calculate and display
# Close the file.
def average_steps(steps_file, month_name, days):
# compute the average number of steps for the given month
# output the results
main()
Answer: https://www.chegg.com/homework-help/questions-and-answers/using-stepspy-repository-starter-file-write-python-program-calculate-average-number-steps--q58620888
Explanation: your awnser is in the link
What are the revised version of water mill and horse cart
Answer:
A watermill or water mill is a mill that uses hydropower. It is a structure that uses a water wheel or water turbine
Explanation:
que cambios le harias a Chrome
a digital camera is an_____
Answer:
A digital camera is a hardware device that takes photographs and stores the image as data on a memory card. Unlike an analog camera, which exposes film chemicals to light, a digital camera uses digital optical components to register the intensity and color of light, and converts it into pixel data.
Explanation:
its a hardware device.
Giả sử biến x có giá trị là x:= ‘a5’, khai báo nào sau đây là đúng:
Answer:
Sorry im not Vietnam so please explain it in English or ask someone who can speak Vietnam to help you.
a) Viết chương trình tính tổng từ 20 – 50
b) Viết chương trình tính tổng từ a – b, với a, b nhập từ bàn phím. Yêu cầu: a
không phải thông báo lỗi.
cứu tôi 2 câu này sài lệnh lặp
Answer:
Program viet_chuong_trinh_tinh_tong;
Uses Crt;
Var i,s:integer;
Begin
Clrscr;
i:=20;
While (i>=20) and (i<=50) do
Begin
s:=s+i;
i:=i+2;
End;
Writeln(S);
Readln;
End.
Explanation:
Which wireless standard runs on both the 2.4 and 5 GHz frequencies?
Answer:
Approved in 2009, Wi-Fi 4 enables operation in both the 2.4 and 5 GHz frequencies, a game changer at the time. It was the first standard to use MIMO (Multiple In, Multiple Out) and offered better speed, 300 Mbps, better range, more resistance to interference and backward compatibility with Wi-Fi 2 and
Hope this is helpful to you.......
The ________ join clause is based on all the columns in the two tables that have the same datatype.
[If you were the queen of the world .... What would you change ?]
Can anyone help me i want 5 slides powerpoint
Answer:
poverty and bad roads and help the needy
A computer uses
to follow a set of instructions
Answer:
A set of instructions that directs a computer's hardware to perform a task is called a program, or software program.
Answer:
which is called a program
Explanation:
Write the pseudocode to this flowchart.
Answer:
I don't understand
Explanation:
What are different method of selecting items??
Answer:
Hold down the "Ctrl" key and the "Shift" key. Press the right arrow key to select the word to the right, or press the left arrow key to select the word to the left. Select one character at a time by holding down the "Shift" key and and using either arrow key (right or left).
Explanation:
follow= return follow
What is the difference between packaged and tailored software
Answer:
Packaged software is a collection of programs that perform similar functions or have similar features to meet various goals and objectives. e.g Microsoft Office While tailored software is software specially developed for some specific organisation or other user. e.g Amazon, Netflix.
1. What is meant by data losing its value?
2. Explain what is meant by an automatic backup
3. Explain how phishing and pharming trick a user into giving up personal data
4. Explain how anti-virus software may help to prevent distributed denial of service attacks
5. Explain why computer security is more effective when anti-virus software end firewalls are used
6. Describe how a proxy server can help keep data safe
7. Explain the difference between symmetric and asymmetric encryption
8. Describe what a protocol is and how protocols help protect data
Explanation:
1.Data loss occurs when valuable or sensitive information on a computer is compromised due to theft, human error, viruses, malware, or power failure. It may also occur due to physical damage or mechanical failure or equipment of an edifice.
2.Automatic backup is a type of data backup model that requires little or no human intervention in backing up and storing data from a local network/system to a backup facility. Automating the backup process saves time and complexity required to manually back up a computer, network or IT environment.
3.A phishing attack is basically social engineering and identity theft that generally targets users with the aim to con them into revealing their personal and confidential information. In this technique, hackers send spoofed emails in the name of a legitimate source to victims and trick them into clicking on a malicious link or attachment to acquire their personal information.
In many instances, these phishing scams use software or security vulnerabilities to install malicious software in the targeted user’s device. In any case, the human factor remains the key element in the successful phishing attempts of these cyber crooks.
4.Equip your network, applications, and infrastructure with multi-level protection strategies. This may include prevention management systems that combine firewalls, VPN, anti-spam, content filtering and other security layers to monitor activities and identity traffic inconsistencies that may be symptoms of DDoS attacks.
5.While antivirus software helps to protect the file system against unwanted programs, a firewall helps to keep attackers or external threats from getting access to your system in the first place. Other threats travel from computer to computer without the knowledge of the user.
6.Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests. A good proxy server keeps users and the internal network protected from the bad stuff that lives out in the wild internet.
7. The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption, and the asymmetric encryption uses public key for encryption and a private key for decryption.
8. A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design.
MARK ME BRAINLIEST!!!PLSSSSS
state two advantage of using the internet
Answer:
Seemless communication with other parts of the world
Being able to share files easily
Explanation:
Answer:
communicate with family.
Able to get information from the internet.
Give an example (other than clothes) where the must-have feature could be APPEARANCE.
Answer:
Assuming you are talking about UI or something graphical on a computer screen we'll just say the must-have features (in terms of appearance) are:
The UI/Web/Graphical Designers basic knowledge of color theory so they don't end up putting #0000FF text on a #FF0000 backgroundA good font (if there is text) that looks nice with the colors usedA proper aesthetic to the software (I.E. Spotify's green on black modern/techno aesthetic)The design of mobile phones is an example of a must-have feature that is in appearance.
What are the features of appearance?Features of appearance mean the visual qualities of an object or product.
Such as:
- Color
- Shape
- Texture
- Finish
- Branding
We have,
One example where the must-have feature could be appearance is in the mobile phones design
Many consumers prefer mobile phones that not only have the latest technology and features but also look sleek and stylish.
Companies invest heavily in the design of their mobile phones to make them visually appealing to consumers.
The appearance of the phone can often be a deciding factor in the purchasing decision, even if the phone has similar features to a competitor.
Thus,
The design of mobile phones is an example of a must-have feature that is in appearance.
Learn more about appearance here:
https://brainly.com/question/15851729
#SPJ2
what is multimedia software
Answer: A program that plays or records audio files or playing or recording video files. Audio of famous speeches is a multimedia software
Explanation:
Which of these lines of code will generate a random number between 1 and 50? A. input("1-50") B. print("1-50") C. import random D. num = random.randint(1,50)
Answer:
D. num = random.randint(1,50)
Explanation:
The option given above will assign a random integer in the range of 1 through 50 to the variable number is: "number = random.randint(1, 50)"
What is a random integer in programming?This is a random sequence of integers that may be used to imitate things like shuffling a deck of cards or creating distinct behaviors every time a program runs. The RND function in BASIC generates random numbers. This yields a value between 0 and 1.
Random number creation is a technique that generates a series of numbers or symbols that cannot be realistically anticipated better than by random chance, generally using a random number generator (RNG).
Therefore, The option given above will assign a random integer in the range of 1 through 50 to the variable number is: "number = random.randint(1, 50)"
Learn more about random integers:
brainly.com/question/15247918
#SPJ3
three types of query
It is commonly accepted that there are three different types of search queries:
Navigational search queries.
Informational search queries.
Transactional search queries.
a simple C program to find the logarithm of any number in any base.....
Answer:
tera bur mast hai jwjvszvVbzNjz
What is the first phase of the project process?
A. Planning
B. Pre-planning
C. Monitoring
D. Implementation
SUBMI
A, most don't have a pre-plan process
planning is the first step because most dont have a pre planning process so in most cases, you would just plan first.
True or False
User Interface brings together concepts from interface design, visual design, and information architecture.
Answer:
true
Explanation:
qqqqqqqqqqqqqqqqqqqq