Answers

Answer 1

Answer:

Second one

Explanation:

evaluation of ur problems


Related Questions

you are configuring power options on your windows 10 computer. you decide to use the high performance power plan. which of the following statements are true regarding this power plan?

Answers

Regular computing uses standard user credentials. The most powerful accounts, known as administrator accounts, should only be utilized when absolutely necessary.

What decide to use the high performance power plan?

Guest accounts should be used by people who just need momentary access to a computer.

Apply Group Policy settings to a particular user or group of users without changing how your account behaves. If many users share a Windows 10 computer, it is possible to build a User-Specific Local Group Policy (LGPO) snap-in (which can be saved as a file).

Therefore, Both the share permissions and the NTFS permissions will be considered by the system, and whichever set is more restrictive will be applied to the folder.

Learn more about Performance here:

https://brainly.com/question/26958029

#SPJ1

PLEASE HELP
Ok so I am totally dead because I fell behind in my school and it is hard for me to catch up. Does anyone have any tips. I will still give you brainily if you help. Thanks

Answers

Girl this happened to me too but all I did was try to look up info on things or examples to know how to do the work and stuff

Answer:

yes I do so first of all number #1 rule sometimes you can feel lazy and just want to give up and play video games for the rest of the day don't do that because the work that was doe that day will just keep piling up and that can make you Overwhelmed.

Fill in the blank: A keyword set to _____ match type will display your ad if the search term contains the same order of the words, but it can also contain additional words.

Answers

A keyword set to broad match type will display your ad if the search term contains the same order of the words.

Definition of Broad Match

Broad match is a keyword match type used by  search engines to help ads determine variable  terms that are eligible to match their keyword by providing a wide range of keyword searches which has relation or similarities to a particular  keyword.

Broad match generally help campaigns by ads to improve the performance to a great extent.

Other types of  keyword match types available to users are:

modified broad match phrase matchexact matchnegative match.

See related answer where  broad match is applied: https://brainly.com/question/15849818

¿Cuanto cuesta un procesador de textos?

Answers

Answer:

Too Much

demasiado

Explanation:

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

what windows mode do users interact with directly?

Answers

The Windows mode that users interact with directly is the graphical user interface (GUI).

What is GUI?

GUI stands for Graphical User Interface, and it is a type of user interface that is based on images and icons instead of text-based commands. GUI is used to make it easier for users to interact with computers and other electronic devices. GUI helps to simplify the process of using a computer by allowing users to view and interact with items on the screen using icons, menus, buttons, and other graphical elements. GUI also allows users to quickly access and manage information on their device, as well as quickly access and use applications.

This is the interface that allows users to interact with the operating system using graphical elements such as icons, buttons, menus, and windows. With the GUI, users are able to perform tasks such as opening, editing, and closing files, launching applications, searching for files, and managing settings without needing to use complex commands.

To learn more about GUI

https://brainly.com/question/23682502

#SPJ1

WILL GIVE BRAINLIEST!!!!
Casey overhears two people talking about an amazing new app. What phrase has been abbreviated when they talk about an “app”?
applied computer simulation
application software
appropriate usage format
applied technology

Answers

Answer:

Application Software

Answer:

application software

Explanation:

"Application software" is a common phrase nowadays that is being abbreviated as "app." Casey described the new app as "amazing," which means that the app could be a game, a browser, a photo editor or other programs that are deemed important and mostly exciting for the end users–people who are targeted by the software. In the situation above, they could be talking about a trendy app. New apps are being created by people over the course of years.

explain how sequence numbers are used to detect duplicate packets in the rdt 2.1 ""protocol""

Answers

In the rdt 2.1 protocol, sequence numbers are used to detect duplicate packets. The sequence numbers provide a way to uniquely identify and track the order of packets sent between the sender and receiver. This helps in detecting and discarding any duplicate packets that may be received.

In the rdt 2.1 protocol, each packet is assigned a sequence number before being transmitted. The sender increments the sequence number for each new packet sent. On the receiver side, the sequence number is used to identify the order of packets received.
When a packet is received, the receiver checks its sequence number against the expected sequence number. If the received packet has a sequence number equal to the expected sequence number, it is accepted as a new packet. The receiver sends an acknowledgment (ACK) to the sender, indicating the successful receipt of the packet.
However, if the received packet has a sequence number that is different from the expected sequence number, it indicates that the packet is a duplicate. In such cases, the receiver discards the duplicate packet and sends an ACK for the last correctly received packet.
By using sequence numbers, the rdt 2.1 protocol ensures that duplicate packets are detected and eliminated, thereby improving the reliability and accuracy of data transmission.

Learn more about packets here
https://brainly.com/question/20038618



#SPJ11

A computer program is said to learn from experience E with respect to some task T and some performance measure P if its performance on T, as measured by P, improves with experience E. Suppose we feed a learning algorithm a lot of historical weather data, and have it learn to predict weather. In this setting, what is T

Answers

Answer:

The weather prediction task

Explanation:

Note: Example: playing checkers.

E = the experience of playing many games of checkers

T = the task of playing checkers.

P = the probability that the program will win the next game.

Authentication is concerned with determining _______.

Answers

Authentication can be described as the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology serves us to access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

There are three basic kind of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.

You can learn more about authentication at https://brainly.com/question/28398310

#SPJ4

A key principle of human-computer interaction (HCI), that states that the appearance of any control should suggest its functionality, is called

Answers

Answer:

"Affordance" is the correct answer.

Explanation:

The performance or properties of such an entity that determines its possible applications which makes it abundantly clear how everything could and should always be used people are sitting or standing on something like a chair as it is very apparent.Users are allowed to experience conceptions without thinking about how to make use of other objects.

What will the following program print when run?

for j in range(2):
for i in range(6, 4, -1):
print (i)

Answers

Answer:

6, 5, 6, 5

Explanation:

The first for means it will run twice. The second one will start at 6 and -1 until it gets to 4 where it will stop before doing anything. We say the first number IS inclusive and the second number ISN'T. The second one produces 6, 5 once but happens twice because of the first for.

what is the right thing to do when you spot fake news​

Answers

Answer:

to tell the truth

Explanation:

l mean there is no reason to keep it secret

Social networking is the most popular online activity?
True
False

Answers

Answer:

true

Explanation:

It’s true because I said so

Jessica, an employee, has come to you with a new software package she would like to use. Before you purchase and install the software, you would like to know if there are any known security-related flaws or if it is commonly misconfigured in a way that would make it vulnerable to attack. You only know the name and version of the software package. Which of the following government resources would you consider using to find an answer to your question?
a. CVSS
b. CVE
c. CWE
d. NVD

Answers

The government resource that you would consider using to find an answer to your question is NVD. So, the correct option is D.

The NVD (National Vulnerability Database) is a U.S. government-backed information repository of software flaws, vulnerability management statistics, and relevant safety metadata. The NVD is a repository of safety-related knowledge and weaknesses for use by the general public, businesses, and government agencies.

The NVD enables free queries using CVE names and other attributes, as well as provides an extensive assortment of safety metrics to help businesses and government agencies identify and manage safety risks.

You can learn more about National Vulnerability Database at: brainly.com/question/20218029

#SPJ11

why we have to inspect the tools and equipment?​

Answers

Answer:

The purpose of an inspection is to identify whether work equipment can be operated, adjusted and maintained safely, with any deterioration detected and remedied before it results in a health and safety risk.

Explanation:

hopefully this Helps!

A database opened in ________ mode allows only one user at a time the ability to open and edit the database

Answers

Answer:

A database opened in exclusive mode allows only one user at a time the ability to open and edit the database.

A light source (range 400-800 nm) an optical system, a phototube, a _______

Answers

A light source (range 400-800 nm), an optical system, a phototube, and a filter are the components required to generate a photoelectric effect.

To generate the photoelectric effect, several components are needed. Firstly, a light source within the range of 400-800 nm is required. This range corresponds to the visible spectrum of light. The light source should emit photons with enough energy to dislodge electrons from the surface of a material.

Next, an optical system is used to focus and direct the light onto the target material. This system may consist of lenses, mirrors, or other optical elements to control the path and intensity of the light.

A phototube, also known as a photomultiplier tube or a photodiode, is an essential component for detecting and measuring the photoelectric effect. It consists of a vacuum tube with a photocathode that emits electrons when struck by photons. These emitted electrons are then accelerated and multiplied by a series of electrodes, producing an electrical signal proportional to the intensity of the incident light.

Additionally, a filter can be used to selectively allow specific wavelengths of light to pass through, ensuring that only the desired range of light reaches the target material.

In summary, a light source within the visible spectrum, an optical system, a phototube, and a filter are the key components required to generate and measure the photoelectric effect. These components work together to illuminate the target material, detect the emitted electrons, and convert them into an electrical signal for analysis and measurement.

Learn more about filter here:

https://brainly.com/question/30777034

#SPJ11

Which decimal number is equivalent to this binary number?
001100112

A.
15
B.
51
C.
204
D.
240

Answers

Answer:

51

Explanation:

multiply the digits with the position value starting from Rightmost

0011 0011

(0*2^7) +(0*2^6)+(1*2^5) +(1*2^4)+(0*2^3) +(0*2^2)+(1*2^1) +(1*2^0)

solve the exponents

= 0+ 0 +32+16+0+0+2+1

=51

what is firewall and what techniques that firewall use to control access

Answers

A firewall is a type of security system that keeps track of and manages all network traffic according to pre-established security rules. It employs strategies including proxy servers, application gateways, circuit-level gateways, and packet filtering.

A firewall is a type of security system that keeps track of and manages incoming and outgoing network traffic in accordance with pre-established security rules. Typically, it is employed to safeguard a network against rogue users and applications. In order to restrict access, firewalls employ methods including packet filtering, application gateways, circuit-level gateways, and proxy servers. By blocking communication based on source and destination IP addresses, port numbers, and protocol, packet filtering is a technique. Application gates are used to give specific applications controlled access. Circuit-level gateways are used to monitor connections and decide whether to permit or reject traffic based on the connections' current condition. Last but not least, proxy servers are employed to function as an intermediate between a client and a server, enhancing security and preserving user privacy.

Learn more about server here:

brainly.com/question/28384347

#SPJ4

How can presentation software be used in a business or professional setting? Choose all that apply.​

Answers

Answer:

Presentations are commonly projected onto a whiteboard a large screen.

Slides can also be printed out onto clear acetate and used with a overhead projector (0HP) to project the contact onto a screen. If this method is used each acetate side usually has to be replaced my newly.

Presentations can also be set up to play through a large did you go display in reception areas of the hotels, schools, businesses etc.

Answer:

The answers are A, B, and C

Explanation:

to automate the ticket-purchasing process at movie theaters through a kiosk

to teach lessons to high school students

to deliver a sales presentation to clients

which operating system is open source and available as distros, such as ubuntu and mint?

Answers

Answer:

The Linux operating system (or Linux OS) is an open source, freely available OS that can be installed on a wide range of devices such as desktops, servers, smartphones and tablets, supercomputers, video game consoles, and purpose-built devices from in-car entertainment systems, to the Mars Rover, to medical wearables. Explanation:

explain the process of print a file using the microsoft excel​

Answers

You can print complete or partial worksheets and workbooks one at a time or in batches. You can also print simply the Excel table if the data you wish to publish is in a Microsoft Excel table.

Instead of printing to a printer, you can save a workbook as a file. This is important if you need to print the workbook on a printer that isn't the same as the one you used to print it the first time.

Before you print, consider the following:

Before you print anything in Excel, keep in mind that there are a variety of options for getting the best print results.

Windows :

Print one or several worksheets

Select the worksheets that you want to print.

Click File > Print, or press CTRL+P.

Click the Print button or adjust Settings before you click the Print button.

Print one or several workbooks

All workbook files that you want to print must be in the same folder.

Click File > Open.

Hold down CTRL click the name of each workbook to print, and then click Print.

Print all or part of a worksheet

Click the worksheet, and then select the range of data that you want to print.

Click File, and then click Print.

Under Settings, click the arrow next to Print Active Sheets and select the appropriate option.

4. Click Print.

Print an Excel table

Click a cell within the table to enable the table.

Click File, and then click Print.

Under Settings, click the arrow next to Print Active Sheets and select Print Selected Table.

4. Click Print.

Print a workbook to a file

1. Click File, and then click Print, or press Ctrl+P.

2. Under Printer, select Print to File.

3. Click Print.

4. In the Save Print Output As dialog box, enter a file name and then click OK. The file will be saved in your Documents folder

What would the range(3, 9) function generate?

A.
3, 6, 9
B.
3, 4, 5, 6, 7, 8
C.
4, 5, 6, 7, 8, 9
D.
3, 9

Answers

Answer:

A, 3,6,9

is the answer

Explanation:

bc it count by

There are two main types of hard drive available to a computer. State what they are and describe their use.
(best answer gets to be the brainliest!)​

Answers

Answer:

Hard disk drives (HDD), which use one or more rotating discs and rely on magnetic storage, and solid-state drives (SSD), which have no moving mechanical parts, but use flash memory like the kind found in USB flash drives.

Explanation:

The __________ shows a description of an error, the name of the source code file containing the error, the error's line number and column number, and the name of the project.

Answers

In a software development project, a compiler is a tool that transforms source code into machine code. A compiler is a tool that translates a program's source code from a high-level language to machine code.

The compiler shows a description of an error, the name of the source code file containing the error, the error's line number and column number, and the name of the project. These messages can help programmers find and correct errors in their code. During the compilation process, if an error is detected, the compiler generates an error message.

The error message contains a description of the error, the name of the source code file containing the error, and the error's line number and column number. The error message also includes the name of the project and any other relevant information. These error messages are an essential tool for software developers, as they help to identify and correct errors in their code.

To know more about project visit:

https://brainly.com/question/28476409

#SPJ11

Distributed systems are also know as __________. Group of answer choices soft real time systems loosely coupled systems hard real time systems parallel computing systems

Answers

A distributed system is a system whose components are situated on different networked computers, which communicate and coordinate their actions by passing messages to one another from any system.

Distributed computing is a field of computer science that studies distributed systems. In a distributed system, the processing elements are both independent and interconnected. The interconnect allows the processing elements to coordinate their activities and to share data with one another.

For the majority of distributed systems, however, the computers are linked through a network and are typically geographically distant. In contrast to tightly coupled systems, where there is a lot of interaction between the processors, distributed systems are loosely coupled, which means there is less interaction between them, and there is no central clock coordinating everything.

To know more about networked visit:-

https://brainly.com/question/30363771

#SPJ11

Replace the nulls values of the column salary with the mean salary.

Answers

When data is combined across lengthy time periods from various sources to address real-world issues, missing values are frequently present, and accurate machine learning modeling necessitates careful treatment of missing data.

What is Column salary?

One tactic is to impute the missing data. A wide range of algorithms, including simple interpolation (mean, median, mode), matrix factorization techniques like SVD, statistical models like Kalman filters, and deep learning techniques.

Machine learning models can learn from partial data with the aid of approaches like replacement or imputation for missing values. Mean, median, and mode are the three basic missing value imputation strategies.

The median is the middle number in a set of numbers sorted by size, the mode is the most prevalent numerical value for, and the mean is the average of all the values in a set.

Thus, When data is combined across lengthy time periods from various sources to address real-world issues, missing values are frequently present, and accurate machine learning modeling necessitates careful treatment of missing data.

Learn more about Data, refer to the link:

https://brainly.com/question/10980404

#SPJ4

what is the valid range of index values for an array of size 7?

Answers

The valid range of index values for an array of size 7 include the following: 4) 0 to 6.

What is an array?

In Computer technology, an array can be defined as a set of memory locations or data structure on a computer system that comprises a single item of data with each memory location sharing the same name.

This ultimately implies that, the data (elements) contained in an array are all of the same data type such as:

StringsIntegers

In conclusion, we can logically deduce that 0 to 6 is a valid range of index values that must be chosen for an array of size 7.

Read more on array here: https://brainly.com/question/19634243

#SPJ4

Complete Question:

What is the valid range of index values for an array of size 7?

1) 0 to 7

2) 1 to 6

3) 1 to 7

4) 0 to 6

A small manufacturing business wants to hire a landscaping service to
maintain its lawn. The purchasing department has narrowed its choices to
Tom's Green Thumb and M&C Minions. Jillian wants to research customer
reviews before writing a recommendation. Which online search method
would be most helpful?
O
A. Use an online catalog to search for "choosing a landscaper."
) B. Use the company's database to find records of past landscaping
choices.
C. Use a search engine to search for "Tom's Green Thumb reviews"
and "M&C Minions reviews."
D. Use a search engine to search for "top 10 landscapers" or "best
landscaping tips.

Answers

Answer:

C. Use a search engine to search for "Tom's Green Thumb reviews"

and "M&C Minions reviews."

Explanation:

Reviews from a search engine are the best recommendation.

Other Questions
2. An organism's paired chromosomesarranged in order from largest to smallest is called What is the most tikely reason for the policy evaluation step to have its recommendations left ignored or unimplemented? Mirple Choice wck of probiem identifcation tuel wan between gowerment deparinen solve asap44-ton monolith is transported on a causeway that is 2500 et long and has a slope of about 4.7. How much force arallel to the incline would be required to hold the monolith this causeway? *** force The table shows a bakerys sales of sugar cookies and chocolate chip cookies sold in h hours. Solve for missing angle. round to the nearest degree A length of rope measures 3,000 millimeters. How long is it in meters? write a multi paragraph informative essay about sharks What do erythrocytes lack in their mature state? Write a paragraph (120-140 words) about the reasons of conflicts between teenagers and their parents how was the humanist movement in northern Europe different from the humanist movement in Renaissance Italy? Why did the gods decide to capture and jail"the winds? a client's cervix is fully dilated and effaced. the head of the fetus is at 2 station. which client action would the nurse encourage during contractions? Describe what hydrogen bonds connect in the double helix Consider the following system in a 1.00 L container: A(g) + B(g) = 2C(g) The equilibrium concentrations at 200C were determined to be: [A] = 0.200 M [B] = 3.00 M [C]=0.500 M How many moles of A must be added to increase the concentration of C to 0.700 M at 200C? The concentration of barium ion, Ba2+, in solution is 0.010 M.a) What concentration of sulfate ion, SO42, is required to begin precipitation of BaSO4?b) When enough SO42 has been added so that the concentration of sulfate ion in solution reaches 0.015 M, what concentration of Ba2+ will remain in solution? BRAINLIEST!!! pls help :/ Would be possible to design a large, complicated, high-quality objectlike a carthat could be made completely by 3D printing? A cell has 6 chromosomes during G1. During G2 it has how many chromatids and strands of DNA? Please read and an3. Many Jacks use hydraullc power.A) O TrueB) O False Suppose f(x) = -5x+4x18.(a) Then f(-x) =(b) For all x, f(-x) = A. f(x) B. -f(x) C. None of the above (c) Is J an even function, an odd function, or neither even nor odd? A. Even B. Odd C. Neither Question is in the picture pls help