Answer:
1. Wall clocks.
2. Analog watches
3. Measuring instruments with callibration
Explanation:
Who are the founders of Microsoft?
Answer:
BILL GATES & PAUL ALLEN
Explanation:
HOPE IT HELPS!!!!!!!!!!!!!!!!!!!!!
All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.
Answer:
The correct option is;
MapReduce runs without fault tolerance
Explanation:
Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.
Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1
Answer:
The answer is "Text editor".
Explanation:
It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:
HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.Answer:
text editor
Explanation:
Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.
Answer:
Following are the letter to this question:
Explanation:
Dear Raju:
For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.
For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.
And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.
If you determine that option fits your needs, let me learn and I'll support you there.
Yours sincerely,
Dev
How are procedural and object-oriented programming approaches similar?
A. Both approaches are used when writing programs.
B. Both approaches focus on functions, modules, and processes to write programs.
C. Both approaches focus on calling attributes and behaviors to write programs.
D. Both approaches require little planning in order to write completed programs.
Answer:
A. Both approaches are used when writing programs.
Explanation:
Procedural programming (PP), also known as inline programming takes a top-down approach. It is about writing a list of instructions to tell the computer what to do step by step. It relies on procedures or routines. Object-oriented programming (OOP) is about encapsulating data and behavior into objects.
Hope this helps....
Have a nice day!!!!
Answer:
A
Explanation:
When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database
Answer:
Database
Explanation:
Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.
i wiil mark brainlist
Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
Answer:
The answer is "TLS and the DBMS".
Explanation:
In given- question there are two questions were included, which can be defined as follows:
The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of SSL, and by encrypting information and data transfer.
The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.
What do you mean by Bandwidth? Pls give full explanation
Answer:
In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.
Explanation:
Technician A says that OBDI and OBDII use different DLC connectors. Technician B says that OBDII standardizes the designations for diagnostic trouble codes (DTCs). Who is correct? Technician A Technician B Both Technician A and Technician B Neither Technician A nor Technician B
Answer:
The answer is "Technician B"
Explanation:
The OBDII is a standardized, automated framework which the USA EPA had approved and installed into its whole year of modeling (MY) 1996 and then into modern light-duty vehicles and trucks, recognized as "on-board diagnostics II."
The DTC framework is a set of problematic diagnostic codes that used alert you if a vehicle is unable to operate using an on-board Diagnostic System. If the system of the automobile identifies a problem, a special DTC code is generated as well as a position sensor is sent to the instrument cluster, that's why Technician B is correct.You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?
a. motherboard
b. CPU
c. graphics card
d. sound card
Answer:
all options
a, b and c the most important
Explanation:
Which is true of ASCII and Unicode?
Every character written in Unicode can be represented in ASCII.
Every character written in ASCII can be represented using Unicode.
ASCII requires more bytes than Unicode.
ASCII and Unicode both define accented characters.
Answer:
The correct options is;
Every character written in A S C I I can be represented using Unicode
Explanation:
All characters found in A S C I I can be found in Unicode such that A S C I I is a subset of Unicode whereby the meaning of the numbers from 0 to 127 are the same in both A S C I I and Unicode
The size of the A S C I I character in 8-bit A S C I I encoding is 8 bits while a Unicode U T F - 8 encoding has between 8 bits (1 byte) and 32 bits (4-bytes)
A S C I I assigns only 127 of the 255 possible numbers that can be stored in an 8-bits character, where the spare characters are then used by P C s for accented characters, therefore, it A S C I I does not define accented characters
Answer:
Every character written in ASCII can be represented using Unicode
Explanation:
Which decimal value (base 10) is equal to the binary number 1012?
Answer:
The decimal value of 101₂² base 2 = 25 base 10
Explanation:
The number 101₂² in decimal value is found as follows;
101₂ × 101₂ = 101₂ + 0₂ + 10100₂
We note that in 101 + 10100 the resultant 2 in the hundred position will have to be converted to a zero while carrying over 1 to the thousand position to give;
101₂ + 0₂ + 10100₂ = 11001₂
Therefore;
101₂² = 11001₂
We now convert the result of the square of the base 2 number, 101², which is 11001₂ to base 10 as follows;
Therefore converting 11001₂ to base 10 gives;
11001₂= 1 × 2⁴ + 1 × 2³ + 0 × 2² + 0 × 2 ¹ + 1 × 2⁰
Which gives;
16 + 8 + 0 + 0 + 1 = 25₁₀.
The decimal value in base 10 that is equal to the binary number 101_2 is; 5
We want to convert 101_2 from binary to decimal.
To do this we will follow the procedure as follows;
(1 × 2²) + (0 × 2¹) + (1 × 2^(0))
>> (1 × 4) + (0 × 2) + (1 × 1)
>> 4 + 0 + 1
>> 5
In conclusion, the decimal value we got for the binary number 101_2 is 5
Read more about binary to decimal conversion at; https://brainly.com/question/17546250
Which of the following is considered information? a. A single keystroke b. All the characters on a keyboard c. An individual test score d. Average of a series of test scores
Answer:
The correct option is;
d. Average of a series of test scores
Explanation:
Information is defined as the knowledge or news which has been sent by one person and received by another such as the reply for a request for the current weather at a specific geographical location
Information is data that has been interpreted, processed, organised, put into a structured and presented within a given context that can be intelligible, meaningful and useful to people.
Order the steps a user needs to follow to preview and then print a document
Answer:
Click file tab, click print tab, preview document, print document.
Answer:
Click file tab, click print tab, preview document, print document.
Explanation:
Click file tab, click print tab, preview document, print document.
An application programming interface (API) is: Group of answer choices the code the application software needs in order to interact with the CPU the currently active part of an application all other answers are incorrect the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM
Answer:
The code the application software needs in order to interact with the CPU
Explanation:
Xavier wants to use a solver to find optimal solutions for a decision problem. What should he select as X in the series of clicks for this purpose: Data tab > X > Solver > Enter Solver parameters (read on) > Check "Make Unconstrained Variables Non-Negative" > Select "Simplex LP" > Solve?
Answer:
The answer is "Analyze"
Explanation:
The term Analyze is the use of a machine or critical thinking to enable more effective management by companies and their information systems, in which the Xavier wishes to use a method for solving to find ideal decision-making strategies. Its object of the series analyses X selects, that's why the "Analyze " is correct.
What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?
Answer:
security In-depth
Explanation:
The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole
Therefore in the given situation, the security In-depth required to layered the safeguarding channels to detect the infiltration
Hence, the security In-depth is the correct answer
how can i earn money?
Answer:
You could get a job.
Explanation:
I know that it is sometimes impossible to get a job, because you are unable to get to anywhere, maybe because your family does not own a car, and it is too far to walk, so you could ask your neighbors if they need anything done, and they might pay you. If these don't work, then you could see if you could get a friend to drive you, and get a job, and see if they will be your taxi, but you pay them money for gas.
Hope that helps.
Answer:
maybe babysit
Explanation:
i earned a lot of money
what are the disadvantageous of emails
Answer:
it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.
Need internet connection.without it can't use.
it can be hacked.and also lack the personal touch..
Answer:
they can cause misunderstandings and people read with diffrent
moods
Explanation:
An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential
Answer:
d . commercial potential
Explanation:
The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.
This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.
You want to complete conversion tracking setup on your business website with Google Ads. You've already implemented a global sitewide tag. Your next step is to create event tags, which must be placed in the correct section of your web pages to properly function. Where's the event tag implemented on a web page?
Answer:
The answer is "Between the website tags immediately after the global site tag".
Explanation:
The event tag is used to log clicks as well as perceptions for adverts, not creative things, or to define the inventive data, It may insert more parameters.
These Tags are code binder clips, that are added to the site and then sent to respondents to obtain and send data. In this users could use tags to monitor scrolls, track suitable formulation, gather feedback, start generating heat maps, display advertising, to your website for all kinds of applications. The API also sends event details to Google Ads, show & Video 360, Campaign Manager, Search Anzeigen 360, and google docs that use the international site tag in the JS tag.are the network administrator for your company. You are installing a new printer in the network. When you check the print server properties, it displays the following error: Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort
Answer:
Will have to run the net start spooler command.
Explanation:
The printer spooler seems to be accountable for overseeing incoming faxes that have been in effect intended for handling by the printer. Whether this device stops operating, your printer won't publish documentation as well as the machine may not notice it either.To solve these problems, you'll need to run the net start spooler command using the least administrative effort.can anyone please help me with this
Answer:
This should do it. I assume the alignment of the numbers is not important?
<!DOCTYPE html>
<html>
<head>
<style>
table {
border-collapse: collapse;
font: 15px Verdana;
font-weight: bold;
}
table, td {
border: 1px solid black;
}
td {
width: 80px;
height: 80px;
text-align: center;
}
</style>
</head>
<body>
<table>
<tr>
<td>1</td>
<td>2</td>
<td>3</td>
<td>4</td>
</tr>
<tr>
<td colspan="2">5</td>
<td>6</td>
<td rowspan="2">7</td>
</tr>
<tr>
<td>8</td>
<td>9</td>
<td>10</td>
</tr>
</table>
</body>
</html>
You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm sure you thought it was funny back when you came up with that password (chEEzburg3rz). Write a program that tells you whether your guess is correct. If it is correct, it should grant access like this: Enter password: chEEzburg3rz Access granted....
If your guess is incorrect it should deny access like this:
Enter password: lolcatZ
Access denied
Answer:
The program written in Python is as follows (See Explanation Section for detailed explanation)
password = "chEEzburg3rz"
userpassword = input("Enter Password: ")
if userpassword == password:
print("Access granted....")
else:
print("Access Denied")
Explanation:
The programming language was not stated; However, I answered your question using Python
The line initializes the password to chEEzburg3rz"
password = "chEEzburg3rz"
This line prompts user for input
userpassword = input("Enter Password: ")
This if condition checks if user input corresponds with the initialized password
if userpassword == password:
print("Access granted....") If yes, this line is executed
else:
print("Access Denied") If otherwise, this line is executed
Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?
Answer:
The correct answer will be "Semi-structured data".
Explanation:
Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed. It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.So that the given scenario is the example of semi-structured data.
Help me what is that my phone I will mark brainslist
Answer:
Following are the ways to resolve this error:
Explanation:
To solve this error there two methods, that is available, which can be defined as follows:
The First way by the turn off screen time:
To turn off screen time goto the setting app on your iPad, iPhone, or other devices.In this, there is a screen time option in which we click on turn off the screen time, and confirm it.After that, go to the apps store and download the app.The Second way by the re-login on apple id:
To re-login on apple id first, we log out it and for logout go to setting inside this go to iTunes & app store.After open this option click apple id after the click, this click in the sign-out option after sign out re-login in by your id and password. To install the app first delete the app by a tap on the app this provides the option to delete the app, then go to the apps store. In this go to the purchase option then select the option that not in the device then download the file.What does "CYBER-COCKROACH" mean??
Answer:
The cyber cockroach is the presented external anatomy of a cockroach, with labeled views of photographs from diverse angles in place of diagrams. The cyber cockroach can be navigated around the head, thorax and abdomen with possible close up views of the legs and the images are downloadable
Cyber cockroach is a useful tool for the study of insects of the Blattodea order
Explanation:
&. Give three differences between a
web browser
and web page
Answer:
The three differences between the Web page and Web browser are given below.
Explanation:
A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the new file name you used was the same as the name you used for the report, and now your report is gone. What should you do next time to prevent this from happening
Answer:
The answer is "Set -o noclobber command before starting."
Explanation:
Whenever this prevent is happening we set the -o noclobber command, this command( -o noclobber ) is used to prevents its > driver to overwrite system files. Or whenever the user may want to violate their file in certain cases. For this case, users can use > instead of just turn -o noclobber off! Push the formal file.