Answer:
True
Explanation:
Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.
1,list all data from table customer, sale and product. 2,list Name and sex of all customer. 3,list all male customer. 4,list all male and female customer. 5,list the name and age of male customers. 6,list the name, price and color of the product.
Answer:
The SQL queries are as follows:
1. select * from customer
select * from sale
select * from product
2. select name, sex from customer
3. select * from customer where sex = 'male'
4. select name, age from customer where sex = 'male'
5. select name, price, color from product
Explanation:
Given
Tables: customer, sale, product
Required
Answer question 1 to 5
(1) All data in the given tables
To do this, we make use of the select clause to retrieve data from each of the table and * to select all data.
So, we have:
select * from customer --> This lists all data from customer table
select * from sale --> This lists all data from sale table
select * from product --> This lists all data from product table
(2) Selected details from customer table
In (1), we have:
select * from customer --> This lists all data from customer table
To retrieve selected details, we replace * with the field names.
So, we have:
select name, sex from customer
(3) Male customers
In (1), we have:
select * from customer --> This lists all data from customer table
To retrieve male customers, we introduce the where clause
So, we have:
select * from customer where sex = 'male'
(4) Name and age of male customers
In (3), we have:
select * from customer where sex = 'male'
To retrieve the name and age, we replace * with name and age. So, we have:
select name, age from customer where sex = 'male'
(5) Name, price and color of products
In (1), we have:
select * from product --> This lists all data from product table
To retrieve selected details, we replace * with the field names.
So, we have:
select name, price, color from product
An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement. True False
Answer:
True
Explanation:
An end user license agreement (EULA) is usually designed by a software developer to take the form of an electronic notification that would appear on the screen of the device of an end user when he or she is installing a software.
Furthermore, an end user has a choice to accept or decline the terms of this agreement.
Cuá es la relación entre la tecnología y la vida?
Answer:
La innovación tecnológica ha permitido que la humanidad avanzara sobre la base de disponer de unas prótesis más potentes en el divagar por la tierra
Explanation:
Hola! Dicho esto en el mundo en que vivimos hoy en día hemos podido con la tecnología inventar cosas que nos ayudan con nuestras vidas cotidianas como son los medios de comunicación, transporte, entre otros. Y para terminar de contestar la pregunta como tal pues sería algo como:
"La relación entre la tecnología y la vida es que la tecnología ayuda al ser humano en diferentes áreas tales como el transporte y la comunicación que hoy en día son un punto clave para poder vivir mejor."
¡Espero que te haya ayudado mucho!! ¡Bonito día!
Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
Resposta:
44,76 Kwh
Explicació:
1 cavall = 746 watts
Per tant, 30 cavalls es convertiran en:
30 * 746 = 22380 watts
Temps = 2 hores
La quantitat d'energia consumida s'obté mitjançant la relació:
Energia consumida = Potència * temps
Energia consumida = 22380 watts * 2 hores
Energia consumida = 44760 Wh
A quilowatts (Kwh)
44760 Kwh / 1000 = 44,76 Kwh
what is the fullform of ETA in computer term
Answer:
Estimated Time of Arrival.
Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time
Answer: B. Multi-user, multitasking.
Explanation:
Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.
The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.
Communication media that use an antenna for transmitting data through air or water are called _____.
Answer:
Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.
Explanation:
douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html
copy and paste that it might help!
Realiza un algoritmo que calcule la edad de una persona y si es mayor = a 18 que imprima mayor de edad de lo contrario que imprima menor de edad
Answer:
Explanation:
El siguiente codigo esta escrito en Java. Le pide al usario que marque la edad. Despues el programa analiza la edad y imprime a la pantalla si el usario es mayor de edad o menor de edad. El programa fue probado y el output se puede ver en la imagen abajo.
import java.util.Scanner;
class Brainly
{
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Cual es tu edad?");
int age = in.nextInt();
if (age > 18) {
System.out.println("Mayor de Edad");
} else {
System.out.println("Menor de Edad");
}
}
}
List three ways of breaking a copyright law with the illegal copy of software.
Answer:
Using itSelling it Giving it to someone.Explanation:
Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.
If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.
This sentence is an example of which type of narrative point of view? I did not know what the future held of marvel or surprise for me.
Answer: First person
Explanation:
First-person narrative point of view is the mode of storytelling whereby the storyteller recounts the events that occured based on their own point of view. In this case, pronouns such as I, we, our, us and ourselves are used in telling the story.
In the sentence given " I did not know what the future held of marvel or surprise for me" shows that the person is recounting the event based on his or her own point of view. This is therefore, a first person narrative.
What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer
Answer: Call scripting
Explanation:
A script refers to the computer language that has different commands in a file and can be executed without them being compiled.
Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.
Who is the father of computer?
Answer:
The first automatic digital computer has been designed by the English mathematician and inventor Charles Babbage. Babbage developed the Analytical Engine Plans for the mid-1830s.
Explanation:
Babbage has developed the concept of a digital, programmable computer and was a mathematician, philosopher, inventor, and mechanical engineer. Some regard Babbage as a "computer father" The inventing of its first mechanical computer, the difference engine, is attributable to Babbage, which eventually resulted in more complex electronic designs, although Babbage's Analytical Engine is the main source of ideas for modern computers. He was described as the "prime" among the numerous polymaths of his century by his varied work in another field.en que consiste excel
Answer:
Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.
While in high school, you need to complete a specific number of ___ to be accepted into a four-year college
Answer:
credits
Explanation:
I'm still in highschool
Answer:
If these are your options:
A: electives
B: Advanced Placement courses
C: course requirements
D: dual enrollment courses
It's C, course requirements
Explanation:
a passcode is created using 4 digits. how many passcodes can be created where the code has to be 5000 or greater with no digit allowed to repeat
Answer:
5000 passcodes
Explanation:
5x10x10x10 = 5000
MyProgramming Lab
It needs to be as simple as possible. Each question is slightly different.
1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.
Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].
Associate the list with the variable arith_prog.
2.
An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers if the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.
Given the positive integer distance and the integers m and n, create a list consisting of the arithmetic progression between (and including) m and n with a distance of distance (if m > n, the list should be empty.) For example, if distance is 2, m is 5, and n is 12, the list would be [5, 7, 9, 11].
Associate the list with the variable arith_prog.
3.
A geometric progression is a sequence of numbers in which each value (after the first) is obtained by multiplying the previous value in the sequence by a fixed value called the common ratio. For example the sequence 3, 12, 48, 192, ... is a geometric progression in which the common ratio is 4.
Given the positive integer ratio greater than 1, and the non-negative integer n, create a list consisting of the geometric progression of numbers between (and including) 1 and n with a common ratio of ratio. For example, if ratio is 2 and n is 8, the list would be [1, 2, 4, 8].
Associate the list with the variable geom_prog.
Answer:
The program in Python is as follows:
#1
d = int(input("distance: "))
n = int(input("n: "))
arith_prog = []
for i in range(1,n+1,d):
arith_prog.append(i)
print(arith_prog)
#2
d = int(input("distance: "))
m = int(input("m: "))
n = int(input("n: "))
arith_prog = []
for i in range(m,n+1,d):
arith_prog.append(i)
print(arith_prog)
#3
r = int(input("ratio: "))
n = int(input("n: "))
geom_prog = []
m = 1
count = 0
while(m<n):
m = r**count
geom_prog.append(m)
count+=1
print(geom_prog)
Explanation:
#Program 1 begins here
This gets input for distance
d = int(input("distance: "))
This gets input for n
n = int(input("n: "))
This initializes the list, arith_prog
arith_prog = []
This iterates from 1 to n (inclusive) with an increment of d
for i in range(1,n+1,d):
This appends the elements of the progression to the list
arith_prog.append(i)
This prints the list
print(arith_prog)
#Program 2 begins here
This gets input for distance
d = int(input("distance: "))
This gets input for m
m = int(input("m: "))
This gets input for n
n = int(input("n: "))
This initializes the list, arith_prog
arith_prog = []
This iterates from m to n (inclusive) with an increment of d
for i in range(m,n+1,d):
This appends the elements of the progression to the list
arith_prog.append(i)
This prints the list
print(arith_prog)
#Program 3 begins here
This gets input for ratio
r = int(input("ratio: "))
This gets input for n
n = int(input("n: "))
This initializes the list, geom_prog
geom_prog = []
This initializes the element of the progression to 1
m = 1
Initialize count to 0
count = 0
This is repeated until the progression element is n
while(m<n):
Generate progression element
m = r**count
Append element to list
geom_prog.append(m)
Increase count by 1
count+=1
This prints the list
print(geom_prog)
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.You want to protect the laptop from Internet-based attacks.Which solution should you use?
write history of computer virus. I will mark as brainliest answer
Answer:
The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.
What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 standard
Answer:
The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:
Sign (1 bit) = 0 (a positive number)
Exponent (8 bits) = 0111 1100
Mantissa (23 bits) = 000 0000 0000 0000 0000 0000
Explanation:
1. First, convert to the binary (base 2) the integer part: 0.
Divide the number repeatedly by 2.
Keep track of each remainder.
We stop when we get a quotient that is equal to zero.
division = quotient + remainder;
0 ÷ 2 = 0 + 0;
2. Construct the base 2 representation of the integer part of the number.
Take all the remainders starting from the bottom of the list constructed above.
0(10) = 0(2)
3. Convert to the binary (base 2) the fractional part: 0.125.
Multiply it repeatedly by 2.
Keep track of each integer part of the results.
Stop when we get a fractional part that is equal to zero.
#) multiplying = integer + fractional part;
1) 0.125 × 2 = 0 + 0.25;
2) 0.25 × 2 = 0 + 0.5;
3) 0.5 × 2 = 1 + 0;
4. Construct the base 2 representation of the fractional part of the number.
Take all the integer parts of the multiplying operations, starting from the top of the constructed list above:
0.125(10) =
0.001(2)
5. Positive number before normalization:
0.125(10) =
0.001(2)
6. Normalize the binary representation of the number.
Shift the decimal mark 3 positions to the right so that only one non zero digit remains to the left of it:
0.125(10) =
0.001(2) =
0.001(2) × 20 =
1(2) × 2-3
7. Up to this moment, there are the following elements that would feed into the 32 bit single precision IEEE 754 binary floating point representation:
Sign: 0 (a positive number)
Exponent (unadjusted): -3
Mantissa (not normalized): 1
8. Adjust the exponent.
Use the 8 bit excess/bias notation:
Exponent (adjusted) =
Exponent (unadjusted) + 2(8-1) - 1 =
-3 + 2(8-1) - 1 =
(-3 + 127)(10) =
124(10)
9. Convert the adjusted exponent from the decimal (base 10) to 8 bit binary.
Use the same technique of repeatedly dividing by 2:
division = quotient + remainder;
124 ÷ 2 = 62 + 0;
62 ÷ 2 = 31 + 0;
31 ÷ 2 = 15 + 1;
15 ÷ 2 = 7 + 1;
7 ÷ 2 = 3 + 1;
3 ÷ 2 = 1 + 1;
1 ÷ 2 = 0 + 1;
10. Construct the base 2 representation of the adjusted exponent.
Take all the remainders starting from the bottom of the list constructed above:
Exponent (adjusted) =
124(10) =
0111 1100(2)
11. Normalize the mantissa.
a) Remove the leading (the leftmost) bit, since it's allways 1, and the decimal point, if the case.
b) Adjust its length to 23 bits, by adding the necessary number of zeros to the right.
Mantissa (normalized) =
1 000 0000 0000 0000 0000 0000 =
000 0000 0000 0000 0000 0000
12. The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:
Sign (1 bit) = 0 (a positive number)
Exponent (8 bits) = 0111 1100
Mantissa (23 bits) = 000 0000 0000 0000 0000 0000
Which software system is used to store appointments, scheduling, registration, and billing and receivables
Answer:
"Practice Management System (PMS)" is the appropriate answer.
Explanation:
It's the kind of technology that has been discovered in healthcare professionals, developed to handle the day-to-day activities utilizing the desktop application.Is therefore typically utilized assurance and consulting tasks, but can also be connected to medical digital records dependent on multiple treatment practices requirements.Thus the above is the correct answer.
_____ is a feature of electronic meeting systems that combines the advantages of video teleconferencing and real-time computer conferencing.
Answer:
The answer is desktop conferencing.
Explanation:
Why is data processing done in computer?
Answer:
The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.
Explanation:
Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops
Answer:
RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.
Explanation:
Routing Information Protocol (RIP) is a type of dynamic routing protocol which finds the best path between the source and the destination network through the use of hop count as a routing metric. The path with the lowest hop count from source to destination is considered as the best route. Routing Information Protocol (RIP) is a distance-vector routing protocol.
RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.
A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used
Question options:
State Machine
Flowchart
Sequence
Global Exception Handler
Answer:
Sequence
Explanation:
Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.
You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?
Answer:
Vulnerability scanner
You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.
What is a vulnerability scanner?Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.
A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.
If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.
To learn more about vulnerability scanners click here:
https://brainly.com/question/10097616
#SPJ12
What term refers to a person using a computer to perform routine tasks other than systems administration
Answer:
end user
Explanation:
An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.
For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.
When Maggie attempted to reconcile her company's monthly sales revenue, she used a TOTALS query to sum the sales from the invoice line items for the month. But the sum of the sales produced by the query did not agree with the sum of the monthly sales revenue reported on the company's general ledger. This is best described as a problem with
Answer:
The correct answer is "Consistency".
Explanation:
It should have been continuous to have the information management service. All information must have been linked, gathered using the same technique as well as measurement but also displayed simultaneously frequencies.Throughout this query, Maggie considers the organization proceeds by a system whereby financial transactions online are not influenced by trade payables or rebates as they are separate accounts that are afterward adjusted for the business model.Thus, the above is the correct answer.
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Answer:
" CRL (certificate revocation list)" is the appropriate answer.
Explanation:
A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
Answer:
case-based.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.
In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.