Answer:
20
Explanation:
I hope it helps choose me the brainst
You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to configure the proxy server settings as follows: Port: 9000
Answer:
okay if I am it administration I will port 10000
To configure the computer in the lobby to use the corporate proxy server, you will need to follow these steps:
Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save
What is Proxy Server?A proxy server is a device or router that acts as a connection point between users and the internet.
Proxy Server settings would be the same for both Wifi and Ethernet connections, explaining about the configuration in Windows Operating System.
Open the internet browser on the laptop and go to the settings or preferences page. The exact location of the proxy settings will vary depending on the browser you are using.
In the settings or preferences page, look for the "Proxy" or "Network" section.
In the proxy settings, select the option to use a proxy server.
Enter the address of the corporate proxy server in the "Server" or "Address" field.
Enter the port number "9000" in the "Port" field.
Save the changes and close the settings or preferences page.
Test the proxy server configuration by attempting to access a website. If the configuration is correct, the laptop should be able to access the internet through the proxy server.
Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save
To learn more about the Proxy Server settings click here:
https://brainly.com/question/14403686
#SPJ12
What should businesses do in order to remain competitive under the current Cloud
landscape?
Answer:
Cloud Landscape
They must evangelize the benefits of cloud computing to company executives in order to assist them in developing and extracting business benefits that will give them a competitive advantage and increase profits
Explanation:
The most successful organisations carefully plan out a multiyear effort to improve their cloud adoption, focusing on multiple streams of work across several stages of maturity.
Cloud computing governance is difficult even when only one cloud provider is involved, and it becomes even more difficult as organisations move toward multi cloud.
Continuous workload placement analysis involves reassessing workloads at a regular cadence, evaluating whether the current execution venue sufficiently meets the organization’s needs and if migrating to an alternative model provides higher value without adding significant risk to the organization’s operations
They must evangelize the benefits of cloud computing to company executives in order to assist them in developing and extracting business benefits that will give them a competitive advantage and increase profits.
In this question, the response is "Cloud Landscape" which can be defined as follows:
The organizations should adopt these new technologies to benefit from the digital transformation offered by the cloud.New enterprises were embracing cloud computing management strategies, placing established companies at risk.In the multi-year efforts for improving cloud security were meticulously planned by even the most successful enterprises. In several contributing to higher at various maturity levels are addressed.The multi-cloud plan enables governance of cloud computing increasingly challenging, even and there is only one cloud service provider involved in the agreement.Learn more:
cloud computing: brainly.com/question/16026308
Question: Name the person who originally introduced the idea of patterns as a solution design concept.
Answer:
architect Christopher Alexander is the person who originally introduced the idea of patterns as a solution design concept.
The person who originally introduced the idea of patterns as a solution design concept named as Christopher Alexander who was an architect.
What is architecture?Architecture is referred to as an innovative technique or artwork based on buildings or physical structures that aims at creating cultural values for upcoming generations to understand the importance of history.
The external layout can be made to best support human existence and health by using a collection of hereditary solutions known as the "pattern language." It creates a set of helpful relationships by combining geometry and social behavior patterns.
Christopher Alexander, a British-American engineer and design theorist of Austrian heritage, is renowned for his several works on the design and construction process introduced the idea of patterns as a solution design concept.
Learn more about pattern language architecture, here:
https://brainly.com/question/4114326
#SPJ6
In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:What is your name? AmandaHow old are you? 15Hello Amanda! You were born in 2005.
Answer:
def main():
name = input("What is your name? ")
if not name == "" or "":
age = int(input("What is your age? "))
print("Hello " + name + "! You were born in " + str(2021 - age))
main()
Explanation:
Self explanatory
Leo is planning the new backup strategy for a subsidiary his company is purchasing that does not currently have a backup strategy in place. He decides that a full backup should be run once per week. Once per day, everything that has changed since the last full backup will be archived. Once per hour everything that has changed since the last backup of any type will be backed up. Which of the following describes the backups that will be run every hour?
a. Differential
b. Variable
c. Incremental
d. Flexible
Answer:
C. Incremental backup
Explanation:
An incremental backup is a type of backup where the succeeding copies of the data is made up of only those positions that have changed since the previous or prior copies were made. Such backups are desired since they limit the usage of space for storage and these types of back ups are faster to do that the differential backup.
When we bring this explanation to this question, we can easily see that the backup that is being carried out is done on everything that has changed since the last backup (previous backup). Therefore this is an incremental backup.
A business should choose the platform as a service (PaaS) cloud model when: a. it designs its own applications but doesn't customize the operating system b. it doesn't need any operating system c. it doesn't design its own applications and doesn't customize the operating system d. it designs its own applications and customizes the operating system e. it doesn't design its own applications but customizes the operating syste
Answer:
a. it designs its own applications but doesn't customize the operating system.
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Infrastructure as a Service (IaaS).
2. Software as a Service (SaaS).
3. Platform as a Service (PaaS).
Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.
The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.
Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).
Some of the advantages of Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.
Basically, platform as a Service (PaaS) providers (vendors) usually provide their clients (software developers) with server and data storage, operating system, data center, networking resources, etc., while the software developers design, deploy and manage their software applications.
Hence, a business should choose the platform as a service (PaaS) cloud model when it designs its own applications but doesn't customize the operating system.
What does the AVERAGE function calculate? the total sum of a list of values the arithmetic mean of a list of values the total number of values in a list the percentage of values in a list
Answer:
B) the arithmetic mean of a list of values
Explanation:
on Edge
The Average function calculates the arithmetic mean of a list of values. Therefore, option B is the correct option.
What is the average?In its most general definition, an average can be considered as the representative number or figure from the whole list. The average of a list containing multiple values is obtained by adding all the values and dividing them up by the total number of values.
The ultimate objective of calculating the average is to discover the value that represents the whole list. Average is also known as mean, and it works as a central value in the list, which is comprehensive in nature. It works as an approximate or rough estimate, which helps us in making decisions in daily life.
Thus, the average function calculates the arithmetic mean of a list of values. Therefore, option B is the correct option.
To learn more about the average, visit the link below:
https://brainly.com/question/11265533
#SPJ2
Wilh the aid of the the diagram using an algorithm to calculate table 2 of multiplication
Answer:
See attachment for algorithm (flowchart)
Explanation:
The interpretation of the question is to design a flowchart for times 2 multiplication table (see attachment for the flowchart)
The explanation:
1. Start ---> Start the algorithm
2. num = 1 ---> Initializes num to 1
3. while num [tex]\le[/tex] 12 ---> The following loop is repeated while num is less than 12
3.1 print 2 * num ----> Print the current times 2 element
3.2 num++ ---> Increment num by 1
4. Stop ---> End the algorithm
Brandon has configured one of the applications hosted on his cloud service provider to increase the number of resources as needed. Which of the following describes this capability?
a. Continuity
b. Adaptability
c. Vertical scaling
d. Horizontal scaling
Answer:
The description of this capability is:
d. Horizontal scaling
Explanation:
The capability that Brandon has achieved is horizontal scaling, which involves the increasing of the resources of cloud applications to meet his increasing demand for cloud services. Vertical scaling involves the addition or subtraction of power to a cloud server, which practically upgrades the memory, storage, or processing power. But to scale horizontally, more resources are added or subtracted. The purpose of horizontal scaling is to spread out or in the workload of existing resources and either increase or decrease overall performance and capacity.
When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.
when an external device becomes ready to be serviced by the processor the device sends a(n) interrupt signal to the processor
Select the correct answer.
Which of these statements is true of dynamic design diagrams?
A.
They demonstrate objects.
B.
They demonstrate relationships.
C.
They demonstrate the behavior of system aspects.
D.
They include structure diagrams.
Answer:
They demonstrate the behavior of system aspects.
The statement true regarding the dynamic design diagram is that it demonstrates the behavior change in the system. Thus, option C is correct.
What is a dynamic design diagrams?A dynamic design diagram is given as the model that has been expressing the development of the operations, actions, and the behavior of the system over time.
The dynamic design diagram is thereby the demonstration of the behavior of system aspects. Thus, option C is correct.
Learn more about dynamic design, here:
https://brainly.com/question/14956129
#SPJ2
In MS_Excel , assume you have data base of employees with their ages,How you could checked the employee is continuous in work or not depending on his age? A) By using AND function. B) By using IF function. C) By using OR function. D) By using IF and AND functions
Answer:
C) By using OR function
Explanation:
Given
Employees database
Required
Check for employees that are continuous in work or not depending on age
The solution to this question lies in the question itself.
From the question, we are to check for
....employees that are continuous in work or not depending on age
Notice that the question does not imply the usage of an if-function but, the usage of an or function as indicated by the text in bold.
So.
If an employee is continuous in work, the function will return true
If an employee does not depend on age limit, the function will return true
The function will return false, if both conditions are not true
Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the array. Then, fill the array with values using the pointer (Note: Do NOT use the array name.). Enhance the program by prompting the user for the values, again using the pointer, not the array name. Use pointer subscript notation to reference the values in the array.
Answer:
#include<iostream>
using namespace std;
int main()
{
int a[20],n;
int *p;
cout<<"\n enter how many values do you want to enter:";
cin>>n;
for(int i=0;i<n;i++)
{
cout<<"\n Enter the "<<i+1 <<"th value :";
cin>>*(p+i);
//reading the values into the array using pointer
}
cout<<"\n The values in the array using pointer is:\n";
for(int i=0;i<n;i++)
{
cout<<"\n (p+"<<i<<"): "<<*(p+i);
//here we can use both *(p+i) or p[i] both are pointer subscript notations
}
}
Output:
1) Declare an ArrayList named numberList that stores objects of Integer type. Write a loop to assign first 11 elements values: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024. Do not use Math.pow method. Assign first element value 1. Determine each next element from the previous one in the number List. Print number List by using for-each loop.
Answer:
Explanation:
The following is written in Java and uses a for loop to add 10 elements to the ArrayList since the first element is manually added as 1. Then it calculates each element by multiplying the previous element (saved in count) by 2. The program works perfectly and without bugs. A test output can be seen in the attached image below.
import java.util.ArrayList;
class Brainly {
public static void main(String[] args) {
ArrayList<Integer> numberList = new ArrayList<>();
numberList.add(0, 1);
int count = 1;
for (int i = 1; i < 11; i++) {
numberList.add(i, (count * 2));
count = count * 2;
}
for (Integer i : numberList) {
System.out.println(i);
}
}
}
1. You purchase a new desktop computer that does not have wireless capability, and then you decide thar you want to use a wireless connection to the internet. Give two solutions to upgrade your system to wireless.
2. You are replacing a processor on an older motherboard and see that the board has the LGA1155 socket. You have three processors on hand: Intel Core i3-2100, Intel Core i5-8400, and Intel Core i5-6500. Which of these three processors will most likely fit the board? Why?a. 4.b. 5.c. 6.d. 7.
Answer: 1.) You can use a USB WiFi adapter, install a dedicated PCIe WiFi card, or upgrade to a new motherboard with built-in WiFi. (That's three solutions but just want to give you flexibility with your problem.)
Answer: 2.) None of the processors would fit because they all have different series sockets. (The i5 processors have LGA1151 sockets and the i3 has an LGA1156 socket.)
Explanation: 1.) Usb WiFi adapter, dedicated PCIe WiFi card, OR a new motherboard with built-in WiFi
2.) None of the processors work
Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?
Answer:
public void removePrefixStrings(List<String> list , String prefix) {
if(list==null || list.size()==0)
return;
for(int i=0; i<list.size();) {
if(list.get(i).startsWith(prefix))
list.remove(i);
else
++i;
}
}
Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2
Then removal is also n
So the total time complexity is O(n3)
Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented here. Write a program called primes.js that implements this algorithm. Have the program find and display all the prime numbers up to n = 150
Answer:
Explanation:
The following code is written in Javascript and is a function called primes that takes in a single parameter as an int variable named n. An array is created and looped through checking which one is prime. If So it, changes the value to true, otherwise it changes it to false. Then it creates another array that loops through the boolArray and grabs the actual numberical value of all the prime numbers. A test case for n=150 is created and the output can be seen in the image below highlighted in red.
function primes(n) {
//Boolean Array to check which numbers from 1 to n are prime
const boolArr = new Array(n + 1);
boolArr.fill(true);
boolArr[0] = boolArr[1] = false;
for (let i = 2; i <= Math.sqrt(n); i++) {
for (let j = 2; i * j <= n; j++) {
boolArr[i * j] = false;
}
}
//New Array for Only the Prime Numbers
const primeNums = new Array();
for (let x = 0; x <= boolArr.length; x++) {
if (boolArr[x] === true) {
primeNums.push(x);
}
}
return primeNums;
}
alert(primes(150));
Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer the following [3] a) What are the security risks for which a customer needs to be careful about? b) What kind of infrastructural set up will be required to set up a cloud? c) What sort of billing model will such customers have?
Answer:
perdonnosee
Explanation:
Write a demo test to verify the above Rectangle object accessible from demo test main program and can execute display() method to output.
Answer:
Explanation:
The Rectangle class was not provided in this question but after a quick online search I was able to find the class code. Due to this I was able to create a test code in the main Method of my program to create a Rectangle object and call it's display() method. The Test code and the output can be seen in the attached image below. While the code below is simply the Main Test Program as requested.
class Brainly {
public static void main(String[] args) {
Rectangle rectangle = new Rectangle(20, 8);
rectangle.display();
}
}
What type of address do computers use to find something on a network?
What happens when a dataset includes records with missing data?
Answer:
However, if the dataset is relatively small, every data point counts. In these situations, a missing data point means loss of valuable information. In any case, generally missing data creates imbalanced observations, cause biased estimates, and in extreme cases, can even lead to invalid conclusions.
It makes data analysis to be more ambiguous and more difficult.
Missing data is simply the same as saying that there are values and information that are unavailable. This could be due to missing files or unavailable information.
A dataset set with missing data means more work for the analyst. There needs to be a transformation in those fields before the dataset can be used.
Generally speaking missing data could lead to bias in the estimation of data.
A data scientist is a data expert who is in charge of data. He performs the job of data extraction, data analysis, data transformation.
read more at https://brainly.com/question/17578521?referrer=searchResults
what is operating system?
Answer:
operating system (os)is translator between the operator (user)and the computer
Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of job. It also maintains a file of estimates given for jobs not yet performed; this file contains a customer number, name, address, proposed date of job, and proposed price. Each file is in customer number order.
Required:
Design the logic that merges the two files to produce one combined file of all customers whether past or proposed with no duplicates; when a customer who has been given an estimate is also a past customer, use the proposed data.
Answer:
Hre the complete implementation of python code that reads two files and merges them together.
def merge_file(past_file_path,proposed_file_path, merged_file_path):
past_file_contents=load_file(past_file_path)
proposed_file_contents=load_file(proposed_file_path)
proposed_customer_name = []
for row in proposed_file_contents:
proposed_customer_name.append(row[1])
with open(merged_file_path,'w') as outputf:
outputf.write("Customer Number, Customer Name, Address\r\n")
for row in proposed_file_contents:
line = str(row[0]) +", " + str(row[1]) + ", " + str(row[2]) +"\r\n"
outputf.write(line)
for row in past_file_contents:
if row[1] in proposed_customer_name:
continue
else:
line = str(row[0]) + ", " + str(row[1]) + ", " + str(row[2]) + "\r\n"
outputf.write(line)
print("Files merged successfully!")
# reads the file and returns the content as 2D lists
def load_file(path):
file_contents = []
with open(path, 'r') as pastf:
for line in pastf:
cells = line.split(",")
row = []
for cell in cells:
if(cell.lower().strip()=="customer number"):
break
else:
row.append(cell.strip())
if len(row)>0:
file_contents.append(row)
return file_contents
past_file_path="F:\\Past Customer.txt"
proposed_file_path="F:\\Proposed Customer.txt"
merged_file_path="F:\\Merged File.txt"
merge_file(past_file_path,proposed_file_path,merged_file_path)
rules used in naming variables in object oriented programming
Answer:
Explanation: Name your variables based on the terms of the subject area, so that the variable name clearly describes its purpose.
Write a program that asks the user to enter 5 test scores. The program will display a letter grade for each test score and an average grade for the test scores entered. Three functions are needed for this program.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
double average(double s1, double s2, double s3, double s4, double s5){
double avg = (s1 + s2 + s3 + s4 + s5)/5;
return avg;}
char lGrade(double score){
char grade;
if(score>= 90 && score <= 100){ grade ='A'; }
else if(score>= 80 && score <= 89){ grade ='B'; }
else if(score>= 70 && score <= 79){ grade ='C'; }
else if(score>= 60 && score <= 69){ grade ='D'; }
else if(score < 60){ grade ='F'; }
return grade;}
int main(){
double s1,s2,s3,s4,s5;
cin>>s1>>s2>>s3>>s4>>s5;
double avg = average(s1,s2,s3,s4,s5);
cout<<s1<<" "<<lGrade(s1)<<endl;
cout<<s2<<" "<<lGrade(s2)<<endl;
cout<<s3<<" "<<lGrade(s3)<<endl;
cout<<s4<<" "<<lGrade(s4)<<endl;
cout<<s5<<" "<<lGrade(s5)<<endl;
cout<<avg<<" "<<lGrade(avg)<<endl;
return 0;}
Explanation:
The three functions to include in the program are not stated; so, I used the following functions in the program
1. The main function
2. average function
3. Letter grade function
The average function begins here
double average(double s1, double s2, double s3, double s4, double s5){
This calculates the average
double avg = (s1 + s2 + s3 + s4 + s5)/5;
This returns the calculated average
return avg;}
The letter grade function begins here
char lGrade(double score){
This declares the grade
char grade;
If score is between 90 and 100 (inclusive), grade is A
if(score>= 90 && score <= 100){ grade ='A'; }
If score is between 00 and 89 (inclusive), grade is B
else if(score>= 80 && score <= 89){ grade ='B'; }
If score is between 70 and 79 (inclusive), grade is C
else if(score>= 70 && score <= 79){ grade ='C'; }
If score is between 60 and 69 (inclusive), grade is D
else if(score>= 60 && score <= 69){ grade ='D'; }
If score is less than 60, grade is F
else if(score < 60){ grade ='F'; }
This returns the calculated grade
return grade;}
The main begins here
int main(){
This declares the 5 scores
double s1,s2,s3,s4,s5;
This gets input for the 5 scores
cin>>s1>>s2>>s3>>s4>>s5;
This calls the average function for average
double avg = average(s1,s2,s3,s4,s5);
This calls the letter grade function for the 5 scores
cout<<s1<<" "<<lGrade(s1)<<endl;
cout<<s2<<" "<<lGrade(s2)<<endl;
cout<<s3<<" "<<lGrade(s3)<<endl;
cout<<s4<<" "<<lGrade(s4)<<endl;
cout<<s5<<" "<<lGrade(s5)<<endl;
This calls the average function for the average
cout<<avg<<" "<<lGrade(avg)<<endl;
hãy giúp tôi giảiiii
Answer:
fiikslid wugx uesbuluss wuz euzsbwzube
Which support function under Tech Mahindra is governing data privacy and protection related requirements
Answer:
Privacy Policy
Explanation:
PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.
Given that support functions are functions which assist and in a way contribute to the company goal.
Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.
The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.
A technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue
Answer:
The answer might be C.
Explanation:
Virtualization software (hyper-v, vm ware, virtual box) has a power button to power on the virtual machine, so in the real world you would press the power button. But the virtual CPU is the closet thing to a power button.
a which is the smallest chunk of information of computer can work with
Answer:
I still mad for that spam
Explanation:
Answer:
The bits are the smallest chunk of info that is used by computers.
Explanation:
Bit: A short abbreviation for binary digit which is the smallest unit of data.
You're welcome.
I hope I helped you.
Explain how you would find a book on a given subject in the library.
Answer:
In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.