Answer:
See answer below
Explanation:
He should not encourage his new technicians to document theories that were followed at the end of the troubleshooting process. This because the theory might not add to their knowledge about troubleshooting. What is paramount and needed to be documented for future references are their findings, actions taken by them and the outcome achieved through the whole troubleshooting process.
In trouble shooting, a technician aims at solving problems on computer system by following a set of steps such as establishing theory of probable cause, testing the theory to determine the cause, establishing a plan of action and implementing the solutions; in order to determine and solve the problem.
The theories here are the steps that were followed in determining and solving the observed issues hence should not be documented except the findings, actions taken and the final outcomes that were achieved.
What are the file extensions of files created with: - Microsoft Office Access - Microsoft Office Publisher
Answer:
The file extensions of files created with Microsoft Office Access is .adb for Access project
The file extension of files created with Microsoft publisher is .pub
Explanation:
The file extensions of files created with Microsoft Office Access are;
.adp = Access project
.adn = Access blank project template
.accdb= Access database for 2007, 2010, 2013, and 2016 versions
Other file extensions include
laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf
The file extension of files created with Microsoft publisher is the .pub
Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1
Answer:
The answer is "Text editor".
Explanation:
It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:
HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.Answer:
text editor
Explanation:
ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the new file name you used was the same as the name you used for the report, and now your report is gone. What should you do next time to prevent this from happening
Answer:
The answer is "Set -o noclobber command before starting."
Explanation:
Whenever this prevent is happening we set the -o noclobber command, this command( -o noclobber ) is used to prevents its > driver to overwrite system files. Or whenever the user may want to violate their file in certain cases. For this case, users can use > instead of just turn -o noclobber off! Push the formal file.
You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?
a. motherboard
b. CPU
c. graphics card
d. sound card
Answer:
all options
a, b and c the most important
Explanation:
Your computer science teacher asks you to sample a black and white image that is 4" x 6". How would you sample the image to provide a good digital approximation using the pixelation widget? What sample size would you use? How would your decision affect the digital representation?
Answer:
The largest dimensions we can make of an image with the pixelation widget is 255*255.
When an image is resized, the number of pixels in the image may be reduced or increased, which causes the image to be resampled. Resampling changes the file size.
Explanation: This is all I could find. I hope its helps Sorry.
The sample size that would provide a good digital approx. will be 255 x 255
When resizing images using the pixelation widget, the pixels of the image will either reduce or increase and the reduction/increase in the pixels will have an effect ( blurry effect ) on the image when viewed by the user. also
when an image is resized the size of original size is either larger or smaller than the resampled image.
Hence to provide a good digital approx. using the pixelation widget from an image 4" x 6" is by using a sample size of 255 x 255
Note : A picture showing the effect of pixelation is attached below
learn more : https://brainly.com/question/19038576
An application programming interface (API) is: Group of answer choices the code the application software needs in order to interact with the CPU the currently active part of an application all other answers are incorrect the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM
Answer:
The code the application software needs in order to interact with the CPU
Explanation:
¿por que la toria de lamarck sobre el alargamiento del cuello de las jirafas por el esfuerzo continuado no pasara a sus descendientes? Porfa es ciencia y ambiente estoy en el peru
Respuesta: Los caracteres adquiridos no se transmiten genéticamente porque no modifican el ADN de los organismos
Explicación:
Jean-Baptiste Lamarck al igual que Charles Darwin, propuso una teoría sobre la evolución que explicaba cambios en los organismos a través del tiempo. La teoría de Lamarck se enfocaba en condiciones en el ambiente que propiciaban cambios en los organismos. Un ejemplo de esto son las jirafas, que de acurdo a Lamarck tenían cuellos largos debido al esfuerzo continuado para comer hojas de árboles altos. Esto significa que la característica de cuello largo era adquirido por las jirafas durante su vida y según Lamarck se transmitiría a sus descendientes.
Sin embargo, se ha comprobado que los caracteres adquiridos no modifican el ADN de los organismos, por ejemplo las cirugías estéticas no cambian el ADN de una persona y por esta razón no son transmitidos a sus descendientes. Por el contrario, en las poblaciones de organismos ciertas características prevalencen en el tiempo debido a la selección natural. Esto significa que el cuello de las jirafas es el resultado que el cuello largo sea una característica beneficiosa que ha prevalecido debido a la selección natural y no de características adquiridas que son transmitidas a descendientes.
&. Give three differences between a
web browser
and web page
Answer:
The three differences between the Web page and Web browser are given below.
Explanation:
A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O
Answer:
The answer is "Option d".
Explanation:
In the question, the numbering of the choices is missing so, in the attached the file defines it numbering after that we provide its solution:
In the question the "option d" is correct, because when we call the function "stop", it ends the store space assigned to the local variables and "called" function parameters, since the variables are no longer used, so the memory is released and once the process is called, the memory is reassigned and then once again assigned when the function ends.
All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.
Answer:
The correct option is;
MapReduce runs without fault tolerance
Explanation:
Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.
i wiil mark brainlist
Identify characteristics of top-down programming design. Choose all that apply.
It assumes the problem has a simple solution.
It is good for running simple calculations.
It is simple to modify if steps change.
It is made of one or more modules.
It breaks a task into simpler and simpler steps.
Answer:
The correct option is;
It is made of one or more modules.
It breaks a task into simpler and simpler steps.
Explanation:
The implementation of top-down programming approach begins from the system defining basic modules and progresses by putting in place intermediate modules that take charge of more detailed and complex activities and processes. The intermediate modules are further streamlined into more specific programming
Therefore, the top-down programming is made of one or more modules that breaks a task into simpler and simpler steps.
Answer:
A, B, D and E
Explanation:
Technician A says that OBDI and OBDII use different DLC connectors. Technician B says that OBDII standardizes the designations for diagnostic trouble codes (DTCs). Who is correct? Technician A Technician B Both Technician A and Technician B Neither Technician A nor Technician B
Answer:
The answer is "Technician B"
Explanation:
The OBDII is a standardized, automated framework which the USA EPA had approved and installed into its whole year of modeling (MY) 1996 and then into modern light-duty vehicles and trucks, recognized as "on-board diagnostics II."
The DTC framework is a set of problematic diagnostic codes that used alert you if a vehicle is unable to operate using an on-board Diagnostic System. If the system of the automobile identifies a problem, a special DTC code is generated as well as a position sensor is sent to the instrument cluster, that's why Technician B is correct.You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm sure you thought it was funny back when you came up with that password (chEEzburg3rz). Write a program that tells you whether your guess is correct. If it is correct, it should grant access like this: Enter password: chEEzburg3rz Access granted....
If your guess is incorrect it should deny access like this:
Enter password: lolcatZ
Access denied
Answer:
The program written in Python is as follows (See Explanation Section for detailed explanation)
password = "chEEzburg3rz"
userpassword = input("Enter Password: ")
if userpassword == password:
print("Access granted....")
else:
print("Access Denied")
Explanation:
The programming language was not stated; However, I answered your question using Python
The line initializes the password to chEEzburg3rz"
password = "chEEzburg3rz"
This line prompts user for input
userpassword = input("Enter Password: ")
This if condition checks if user input corresponds with the initialized password
if userpassword == password:
print("Access granted....") If yes, this line is executed
else:
print("Access Denied") If otherwise, this line is executed
What does "CYBER-COCKROACH" mean??
Answer:
The cyber cockroach is the presented external anatomy of a cockroach, with labeled views of photographs from diverse angles in place of diagrams. The cyber cockroach can be navigated around the head, thorax and abdomen with possible close up views of the legs and the images are downloadable
Cyber cockroach is a useful tool for the study of insects of the Blattodea order
Explanation:
Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque
Answer:
c.) stack
Explanation:
Answer:
the answer is c stack not only dose stack make the most since but i also got it right on edge 2020
Explanation:
IblMessage.txt=welcome to fiji.what is the error in the coding and what type of error is it?(explain)
Answer:
The correct syntax (assuming WinForms) is
lblMessage.Text = "Welcome to fiji";
The given statement fails to follow the syntax of literal strings, which should be in quotation marks. (depending on the framework and programming language, the txt property may also be incorrect, as well as the missing semi-colon).
As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she checked last week. This surprises her, since she didn't make any changes to her TCP/IP configuration. The user has had no problems running her web browser. You immediately know that:
Answer:
D. Her computer is a DHCP client.
Explanation:
Since in the question it is mentioned that IP address is different as compared in the previous week also the user did not make any changes with respect to the TCP/IP configuration and the system is working well
So this situation represents that the user computer is a client of DHCP as it deals with the client-server protocol in which it automatically generates the IP i.e Internet protocol along with the IP address
Hence, the correct option is d.
Who are the founders of Microsoft?
Answer:
BILL GATES & PAUL ALLEN
Explanation:
HOPE IT HELPS!!!!!!!!!!!!!!!!!!!!!
The properly marked source document states: (C) Operation Panda will take place on 29 September. The new document states: (C) On 29 September, Operation Panda will commence. What concept is used to derivatively classify the statement in the new document?
Answer:
The answer is "Contained in"
Explanation:
Its term refers to the classified information of the extraction process, even though outlined in an authorized categorization instruction origin without extra explanation or review, and incorporates these data in a new document.
In this concept, the information appears in the extracted word-for-word, its definition of 'in' will apply, or if its data has been paraphrased or restated from the current text, that's why we can say that this concept derivatively classifies the statement in new documents.
Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?
Answer:
The correct answer will be "Semi-structured data".
Explanation:
Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed. It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.So that the given scenario is the example of semi-structured data.
What are the Typical application
of mini computer
Answer:
calls, messages, photos, emails
Explanation:
as in mobile phones
Answer:Minicomputers are used for scientific and engineering computations, business-transaction processing, file handling, and database management, and are often now referred to as small or midsize servers.
Explanation:
You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules will you most likely need for this motherboard? A. DIP B. SIMM C. DIMM D. SODIMM
Answer:
The answer is "Option C"
Explanation:
The term DIMM stands for the Dual In-Line Memory Module, which is a kind of memory, that is used in computers. It is a small board of flash memory that uses the 64-bit memory bus because the SIMM has only a 32-bit path. It enables DIMMs to simultaneously transfer more information, and the wrong choices can be defined as follows:
In choice A, It is used in sockets, that's why it is wrong. In choice B, It is wrong because it is used in 32 bits only. In choice D, It is wrong because it is used in the expansion of memory.When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database
Answer:
Database
Explanation:
Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.
Yara needs to provide step-by-step instructions to her staff on how to use a new system for
conducting performance reviews. What is the best tool for communicating this information?
A) Spreadsheet
B) Email
C) Direct messaging
D) Slides
Answer:
D) Slides
Explanation:
A slide is exactly one page of presentation commonly used in PowerPoint. It is usually shown via a series of image slides on a projected screen.
This is the best tool Yara needs to provide step-by-step instructions to her staff on how to use a new system for conducting performance reviews.
Slides would be very helpful as they would show the steps one at a time to the members of Yara's staff so they can learn better and faster.
are the network administrator for your company. You are installing a new printer in the network. When you check the print server properties, it displays the following error: Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort
Answer:
Will have to run the net start spooler command.
Explanation:
The printer spooler seems to be accountable for overseeing incoming faxes that have been in effect intended for handling by the printer. Whether this device stops operating, your printer won't publish documentation as well as the machine may not notice it either.To solve these problems, you'll need to run the net start spooler command using the least administrative effort.What type of edge does UML use to denote interface implementation? Group of answer choices A dotted arrow from the interface to the class terminated with a triangular tip. A dotted arrow from the interface to the class terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with a triangular tip.
Answer:
A. A dotted arrow from the class to the interface terminated with a triangular tip
Explanation:
Which is true of ASCII and Unicode?
Every character written in Unicode can be represented in ASCII.
Every character written in ASCII can be represented using Unicode.
ASCII requires more bytes than Unicode.
ASCII and Unicode both define accented characters.
Answer:
The correct options is;
Every character written in A S C I I can be represented using Unicode
Explanation:
All characters found in A S C I I can be found in Unicode such that A S C I I is a subset of Unicode whereby the meaning of the numbers from 0 to 127 are the same in both A S C I I and Unicode
The size of the A S C I I character in 8-bit A S C I I encoding is 8 bits while a Unicode U T F - 8 encoding has between 8 bits (1 byte) and 32 bits (4-bytes)
A S C I I assigns only 127 of the 255 possible numbers that can be stored in an 8-bits character, where the spare characters are then used by P C s for accented characters, therefore, it A S C I I does not define accented characters
Answer:
Every character written in ASCII can be represented using Unicode
Explanation:
How are procedural and object-oriented programming approaches similar?
A. Both approaches are used when writing programs.
B. Both approaches focus on functions, modules, and processes to write programs.
C. Both approaches focus on calling attributes and behaviors to write programs.
D. Both approaches require little planning in order to write completed programs.
Answer:
A. Both approaches are used when writing programs.
Explanation:
Procedural programming (PP), also known as inline programming takes a top-down approach. It is about writing a list of instructions to tell the computer what to do step by step. It relies on procedures or routines. Object-oriented programming (OOP) is about encapsulating data and behavior into objects.
Hope this helps....
Have a nice day!!!!
Answer:
A
Explanation:
Xavier wants to use a solver to find optimal solutions for a decision problem. What should he select as X in the series of clicks for this purpose: Data tab > X > Solver > Enter Solver parameters (read on) > Check "Make Unconstrained Variables Non-Negative" > Select "Simplex LP" > Solve?
Answer:
The answer is "Analyze"
Explanation:
The term Analyze is the use of a machine or critical thinking to enable more effective management by companies and their information systems, in which the Xavier wishes to use a method for solving to find ideal decision-making strategies. Its object of the series analyses X selects, that's why the "Analyze " is correct.