The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer 1

Answer:

Compactness

Explanation:

Have a nice day!


Related Questions

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes

Answers

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

define Microsoft Excel 2010​

Answers

Answer:

a very very old Microsoft application that only people on old pc's use now

Explanation:

Answer:

Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.

This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.

Explanation:

In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.

Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.

The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Answers

Answer:

Access Quick Access commands using the More button.

Explanation:

To ensure that a command she frequently uses is added to the Quick Access toolbar Robyn would need to "Access Quick Access commands using the More button."

To do this, Robyn would take the following steps:

1. Go / Click the "Customize the Quick Access Toolbar."

2. Then, from the available options, he would click on "More Commands."

3. From the "More Commands" list, click on "Commands Not in the Ribbon."

4. Check the desired command in the list, and then click the "Add" button.

5. In the case "Commands Not in the Ribbon" list, did not work out Robyn should select the "All commands."

Technology is used today in manufacturing,health care , and the transportation industry,but education has not yet embraced it? true or false

Answers

Answer:

True! its answer raise to a correct sentence..

Hope the will come to anyone's need..

Answer:

False

Explanation:

Technology in the form of digital tools are now being used in education in many countries for example: Japan, China, India and Korea. Some educational systems are using computers and internet systems.

hope it helps!

Adobe gives away the Acrobat Reader to build a market for the sale of software that creates Acrobat files. This is an example of:

Answers

Group of answer choices.

A. firms giving away products for half of a two-sided market to seed the market.

B. one market attempting to conquer a new market by making it a subset, component, or feature of its primary offering.

C. firms spreading costs across increasing units of production or in serving multiple customers.

D. firms taking advantage of complementary products developed for a prior generation of technology.

E. markets, once considered distinctly separate, beginning to offer similar features and capabilities.

Answer:

A. firms giving away products for half of a two-sided market to seed the market.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

An open-source software is a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.

In this scenario, Adobe giving away the Acrobat Reader to build market for the sale of software that creates Acrobat files. Thus, this is an example of firms giving away products for half of a two-sided market to seed the market.

Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File

Answers

Answer:

Explanation:

1.Save and Save As

The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name

2.Blank Document and Template

Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template

3. Existing File and Recently Open File

Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist

when files on storage are scattered throughout different disks or different parts of a disk, what is it called

Answers

Answer:

File Fragmentation or Fragmented Files

Elabora un argumento sobre como nuestras acciones impactan en la calidad del aire y promueven acciones a favor del cuidado del ambiente y la salud

AYUDAAAAA!!!!!!!!

Answers

Answer:

Reduzca la cantidad de viajes que realiza en su automóvil. Reduzca o elimine el uso de chimeneas y estufas de leña. Evite quemar hojas, basura y otros materiales. Evite el uso de equipos de jardín y césped que funcionen con gas.

#CarryOnLearning

explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace

Answers

Answer:

The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.

Convert to different number system as mentioned.(17)10=(?)2​

Answers

“convert to a different number system as mentioned” there was no number system mentioned, but if you are just trying to find 17 * 10 = x * 2

all you need to do is find that 17 * 10 = 170 and 170/2 is 85 so

17 * 10 = 85 * 2

A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used

Answers

Answer:

Hybrid cloud

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Infrastructure as a Service (IaaS).

2. Software as a Service (SaaS).

3. Platform as a Service (PaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

A hybrid cloud combines both the features of a private and a public cloud to provide cloud-related services to the end users.

In this scenario, a company runs sensitive technologies locally while it entrusted technologies that are less sensitive to a broader user base.

Hence, the cloud delivery model which is being used here is a hybrid cloud.

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

computer can do work very___​

Answers

Answer:

Explanation:

quickly      

Answer:

fast......................

Change the case of letter by​

Answers

Answer:

writing it as a capital or lower case.

Explanation:

T - upper case

t - lower case

not sure if that is what you meant or not

Answer:

Find the "Bloq Mayus" key at the left side of your keyboard and then type

Explanation:

Thats the only purpose of that key

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Answers

Answer: Install the latest firmware updates from the device manufacturer.

Verify that your network's existing security infrastructure is working properly

Explanation:

Since the person is concerned about the security of these devices, in order to increase their security posture, the latest firmware updates should be installed fom the device manufacturer.

The firmware is the software program or set of instructions which is programmed on a hardware device. Installing the latest update is necessary in order to prevent third party use or hacking. Also, it's vital to check the network's existing security infrastructure in order to check if it's working properly.

Which practices promote efficient keyboarding? Check all that apply.

curving your fingers a little when you rest them lightly on the home keys
returning to the home key after you have typed another key
keeping your eyes on your hands when typing
working at a comfortable pace when typing
using your thumbs for the space bar
never using a shortcut

Answers

Answer:

Curving your fingers a little when you rest them lightly on the home keys returning to the home key after you have typed another key

Explanation:

It is important to position the fingers on the keyboard in such as way that they are prepared to move when selecting keys. The fingers should be slightly curved and the hands should be down

At the start of typing, the left fingers should be placed on the A, S, D, and F keys, while the right fingers should be placed on the J, K, J, and ; keys

Answer: both thumbs should be on the spacebar

Explanation:

which advanced boot option starts windows, but loads only the drivers necessary for basic functionality

Answers

Answer:

The correct answer is: The Safe Mode

Explanation:

Safe Mode is an advanced boot option available in Windows. It is of two categories:

Safe Mode  and Safe Mode with Networking (this option allows inter and intra network conectivity)

It is useful for troubleshooting a windows operating system to find out why it is dysfunctional.

It can be activated by pressing the F8 key as the Windows Operting system boots up, but not after.

Cheers!

Program design tools. __________ uses English-like statements to outline the logic of a computer program. __________ graphically shows the step-by-step actions a computer program will take.

Answers

Answer:

Pseudocode; flowchart.

Explanation:

Pseudocode uses English-like statements to outline the logic of a computer program. A pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

On a scale of 1-10 how would you rate your pain

Answers

Explanation:

There are many different kinds of pain scales, but a common one is a numerical scale from 0 to 10. Here, 0 means you have no pain; one to three means mild pain; four to seven is considered moderate pain; eight and above is severe pain.

One property of light that makes it possible to record the image of an object with the camera

Answers

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

como se llama el arte de pintar en las cuevas sus actividades de caceria

Answers

shsibdhebduduebsisodbduei


1.what is a computer?
2.what is input device?
3.what is output device?
4.what is system unit?​

Answers

1. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
2. a peripheral device, as a keyboard or stylus, used to enter data into a computer for processing.
3. Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered. An example of output is the electricity produced by a power plant. An example of output is producing 1,000 cases of a product.

4. A system unit is the part of a computer that houses the primary devices that perform operations and produce results for complex calculations. It includes the motherboard, CPU, RAM and other components, as well as the case in which these devices are housed.

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

What is the ghosted text or picture behind the content on the page?​

Answers

Answer:

Watermark

Explanation:

This is actually called a Watermark. It is usually used as a way of showing the name or logo of the author who owns the content that is underneath the watermark. This is done so that individuals cannot steal the owner's work and use it as their own. Usually, the owner has the original version of the content without any watermark, as well as individuals that have purchased the content or a licence to use the content for personal or commercial usage.

Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced
it.
True
Оr
False

Answers

Answer:

False

Explanation:

Digital learning tools are nowadays used In Education. Countries like Japan, China, India and Korea use computers and internet in their educational system.

Hope it helps!

1) a program that is designed to perform only one task.

Answers

Answer:

special purpose application software

Explanation:

it is a type of software created to execute one specific task.for example a camera application on your phone wul only allow you to take and share pictures.

Other example of special purpose application are web browsers,calculators,media playors,calendar programs e.t.c.

Write down the name of two attributes used along <img> tag.Single line text.​

Answers

Answer:

SRC: it specifies the URL of the image

ALT: it specifies an alternate text for an image

Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system to support automated services, and __________ are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. A. contingent IDs, system accounts B. system accounts, contingent IDs C. systems administrator accounts, contingent IDs D. control partners, system accounts

Answers

Answer: B. system accounts, contingent IDs

Explanation:

Aside from human user types, there are non human user groups. Known as account types, (system accounts) are implemented by the system to support automated services, and contingent IDs are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. The system account is refered to as the user account which the operating system creates during installation.

Therefore, the correct option is B.

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do

Answers

Answer:

Install a second server and load balancer

Explanation:

Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.

Other Questions
Un mvil recorre una trayectoria en lnea recta de 6000 metros y demora 30 minutos. Cul es su rapidez expresada en Km/h? Which ordered pair describes the location of the point shown on the coordinate system below? A.(-2,-1) B.(-1,-2) C.(-1,2) D.(-2,1) atoms May bond together to make larger what Which numbers are the means of the proportion shown RST Company produces a product that has a variable cost of $6 per unit. The company's fixed costs are $30,000. The product sells for $10 per unit. RST desires to earn a target income of $20,000. The sales level in dollars to achieve the desired target income is $ . What is the Measure of arc XY? There are two points of the form (x,-4) that have a distance of 10 units from the point (3,2). Give the x value for one of those points. what is the task of vessel cells in xylem A restaurant currently uses 62,500 boxes of napkins each year at a constant daily rate. The cost to order napkins is $200.00 per order and the annual carrying cost for one box of napkins is $1.00. If the restaurant orders the optimal (EOQ) number of boxes each time an order is placed, then the number of orders placed during the year would be Which topic or issue would be most appropriate for a four- to five-page research paper? advertising on school groundsadvertisingprint advertisingelectronic advertising What movement of the thumb would be most affected by lesion of the median nerve in the cubital fossa ? QuestionIn an ozone molecule, the three atoms must be connected, so there must at least be a single bond between them. Placedots in pairs around the oxygen atoms until each oxygen atom has eight valence electrons, starting with the atoms on theoutside and doing the central atom last if there are enough. Do not exceed the total number of valence electronsidentified in part A. Remember that the dashes between the oxygen atoms, which represent single bonds, each indicatethe presence of two valence electrons. Does change occur by diffusion or independent invention? Explain. If 5.4 J of work is needed to stretch a spring from 15 cm to 21 cm and another 9 J is needed to stretch it from 21 cm to 27 cm, what is the natural length (in cm) of the spring Get to has $12 to out gas in his car if gas costs 3.75 per gallon which ordered pair relating number of gallons of gas x to the total cost of gas In the experiment on stimulation of the isolated sciatic nerve, a compound action potential is produced. This represents _______ Question 8 of 10Which type of computer operating system would be best for a largecorporation?O A. Single-user, multitaskingB. Multi-user, multitaskingC. Single-user, single-taskingD. Real-time Compute the mean deviation of the following set of data; 9,6, 3, 9, 7, 2, 1, 5, 6, 8. At one point in history, the NBA finals required that one of the two teams win at least three of five games in order to win the Championship. If one team wins the first two games, what is the probability that the same team wins the Championship, assuming that the two teams are well matched and each team is equally likely to win each game A community group is upset because drivers speed through their neighborhood. they want the local government to to install a stop sign or a speed bump to make drivers slow down. Which option might be the best way for them to accomplish this?