Answer:
The contents of shared folders might include both programs and data files. Common files may be stored and accessed using shared application folders, which simplify administration and offer a single area for users to store and access common data. If all data files are consolidated in a single shared folder, users will have an easier time finding them.
Explanation:
Hope it helps:)
how to match this things
1.we will cross bridge when we get to it ------- proactive,not reactive
2.privacy not displayed after collection of data---privacy embeeded into deisgn
3.we will have preticked check box on share my personal data with 3rd party-----visiboty and transparency
4.in acall recording privacy ntoice not shown to participants who were not part of invite but joined----privay by default
A proactive organization anticipates and responds to possible obstacles and opportunities.
This requires a clear vision of where you want to go as well as a strategy. Proactive organizations are forward-thinking and always looking for new ways to innovate and improve.
Learn more about privacy at:
https://brainly.com/question/27034337
#SPJ1
Choose the type of malware that best matches each description.
to be triggered
:infects a computer or system, and then replicates itself, but acts independently and does not need
: tricks the user into allowing access to the system or computer, by posing as a different type of file
infects a computer or system, and then replicates itself after being triggered by the host
Answer:
B - tricks the user into allowing access to the system or computer, by posing as a different type of file
Answer:
Worm: infects a computer or system, and then replicates itself, but acts independently and does not need to be triggered
Trojan horse: tricks the user into allowing access to the system or computer, by posing as a different type of file
Virus: infects a computer or system, and then replicates itself after being triggered by the host
Explanation:
Suppose a computer runs at least two of following processes: A for movie watching, B for file downloading, C for word editing, D for compiling
Answer: This may not be the answer you are looking for but, In order for a computer to run multiple things at once you need to have a memory cell that is kept at a cool 13.8 Degrees celsius for it to work at max capacity.A internal fan to keep the internal parts at 15.3 degrees. The Arctic F12 and Arctic F12-120 is a good fan for that.
Explanation:
Please send a response to this email! This is for an assignment on appropriately answering to negative feedback at work. "Your report on SHG is, frankly, substandard. We can’t send it out the door when it lacks last month’s sales figures, and it is even missing the data on user interactions. This is just not acceptable, and I don’t see how you can continue to work here if you can’t complete the simplest of your job duties."
Answer:
Explanation:
Receiving negative feedback about your work can be challenging, but it's important to approach it with professionalism and a willingness to improve. Here is a possible response to the feedback:
Thank you for bringing your concerns to my attention. I understand that the report I submitted on SHG was not up to the standards expected by the team, and I apologize for any inconvenience this may have caused. I appreciate your feedback and take full responsibility for the errors in the report.
I understand that the missing sales figures and user interaction data are critical components of the report, and I will work diligently to ensure that this information is included in any future reports. I am committed to improving my performance and ensuring that my work meets the expectations of the team.
Please let me know if there are any specific areas in which I need to improve or any additional resources that I can access to help me do my job better. I value your input and look forward to working with you to improve the quality of my work.
Thank you again for your feedback, and I am committed to doing my best to address any concerns you may have.
How is LUA different from Python?
Give an example.
This is the answer I couldn't write it here since brainly said it contained some bad word whatever.
Answer:
good old brainly think stuff is bad word even tho it is not had to use txt file since brainly think code or rblx is bad word
how i want to be good in coding for subject c programming? anyone has a suggestion?
Answer:
Get more details about Standard Library Functions in C.
Use logical variable names to avoid any confusion.
Don't forget to check a complete guide for Variables in C.
Explore how Escape Sequence in C make your coding better.
I'm giving one hundred points, and marking brainliest for the answer that helps! I cant do python, please write the correct code for all these problems, if you know python:
8. Calculate compound interest using following formula
A = P (1 + r/n) (nt)
where P =5000
r= 5%
n=12
t=10
9. Write a program to calculate an individual's gross pay.
Gross pay equals hourly pay rate times number of hours worked.
10. Write a program to swap the values of two variables.
For example: If variable a = 40 , b = 50 but after swapping the values will interchange a will become 50 and b will become 40
Luke is setting up a wireless network at home and is adding several devices to the network. During the setup of his printer, which uses 802. 11g standard, he finds that he can't connect to the network. While troubleshooting the problem, he discovers that his printer is not compatible with the current wireless security protocol because it is an older version of hardware.
What wireless network security protocol will allow Luke to use the printer on his wireless network?
a. WPA
b. WEP
c. WPA2
d. WPA-PSK+WPA2-PSK
The wireless network security protocol that will allow Luke to use the printer on his wireless network is WEP. The correct answer is option b.
WEP (Wired Equivalent Privacy) is a security protocol that is used to secure wireless networks. It was introduced in 1999 and was widely used in the early days of wireless networking. However, it is an older version of hardware and is considered less secure than newer protocols such as WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access 2).
Since Luke's printer is an older version of hardware, it is not compatible with the current wireless security protocol. Therefore, using WEP will allow Luke to use the printer on his wireless network.
Learn more about wireless network security:
brainly.com/question/30087160
#SPJ11
Which of these are examples of an access control system? Select all that apply.
Some examples of access control systems are: Card-based access control systems, Biometric access control systems, Keypad access control systems, Proximity access control systems
Access control systems are used to limit or control access to certain areas or resources by determining who or what is authorized to enter or exit. In modern-day society, access control systems are widely used in both commercial and residential settings to enhance security and safety. Some examples of access control systems are discussed below.
1. Card-based access control systems- These are the most common types of access control systems. In card-based systems, authorized personnel are issued an access card that contains a unique code or number. When the person swipes the card through a reader, the system checks if the card is valid and then unlocks the door.
2. Biometric access control systems- In this system, the user's unique physical characteristics are used to identify them, such as fingerprints, voice, face, or retina scans. Biometric systems are highly accurate and provide enhanced security.
3. Keypad access control systems- Keypad systems use a secret code entered through a keypad. The code can be changed frequently to prevent unauthorized access.
4. Proximity access control systems- Proximity systems use a small chip or key fob that emits a radio signal to a reader mounted near the door. When the signal is received, the door unlocks. These are just a few examples of access control systems. There are other systems like security guards, smart cards, RFID-based systems, and more.
For more such questions on Proximity access, click on:
https://brainly.com/question/30733660
#SPJ8
The only item on the desktop of a new Mac is the hard-drive icon.
True or false?
Answer:
False
There are many more items on the desktop of a new Mac than the hard-drive icon.
Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correct answer. But when Adam tests the program, it always outputs that it took the user one guess, even when it takes many guesses. What error did Adam most likely make, and how should it be fixed? The difference between a for loop and a while loop is that a for loop is a loop that happens for a certain number of times. A while loop happens until a certain condition is met. How do you know when to use each one? Give specific examples in your answer. What are some programs that you have used that have condition-controlled loops and count-controlled loops? Why is it important that if, elif, and else statements appear in the proper order? What are some situations where you might find it useful to use the “!” symbol in a program?
Answer:
There are two ways in which programs ... count-controlled loops; condition-controlled loops ... Sometimes it is necessary for steps to iterate a specific number of times. ... A count-controlled loop is used when the number of iterations to occur is ... the variable 'count' is used to keep track of how many times the algorithm
Explanation:
Answer:
Adam most likely forgot to add a while loop to the guessing code or didn’t add it properly, meaning that instead of letting him guess multiple times it just continues the code, all he needs to do is add a while loop to fix the line of code.
Explanation:
hope this helps
Can someone help me fix my code for this question? got pretty far but now i'm stuck on the syntax error.
In this lab, you use what you have learned about parallel arrays to complete a partially completed C++ program. The program should:
Either print the name and price for a coffee add-in from the Jumpin’ Jive Coffee Shop
Or it should print the message Sorry, we do not carry that.
Read the problem description carefully before you begin. The file provided for this lab includes the necessary variable declarations and input statements. You need to write the part of the program that searches for the name of the coffee add-in(s) and either prints the name and price of the add-in or prints the error message if the add-in is not found. Comments in the code tell you where to write your statements.
Instructions
Study the prewritten code to make sure you understand it.
Write the code that searches the array for the name of the add-in ordered by the customer.
Write the code that prints the name and price of the add-in or the error message, and then write the code that prints the cost of the total order.
Execute the program by clicking the Run button at the bottom of the screen. Use the following data:
Cream
Caramel
Whiskey
chocolate
Chocolate
Cinnamon
Vanilla
The Gdb one is what i have so far but i can't figure out what i'm doing wrong as far as syntax.
To be able to complete the code that can be used to searching a coffee add-in in an array as well as printing its name and price, look at the example of the implementation in C++ that is given below
What is the syntax error?In the code that is known to be given, one can declare as well as initialize two arrays - addIns that can be used for saving the names of coffee add-ins, as well as the prices for saving of the prices of the all of the corresponding add-ins.
Therefore, We can be able to collect input from a given customer for the coffee add-in they need to order. Finally, we can be able to make use of an if-else statement to be able to print the name and price of all ofthe add-i.
Learn more about syntax error from
https://brainly.com/question/28957248
#SPJ1
how many jobs can you get without a college degree
C++ program
Sort only the even elements of an array of integers in ascending order.
Answer: Here is one way you could write a C++ program to sort only the even elements of an array of integers in ascending order:
Explanation: Copy this Code
#include <iostream>
#include <algorithm>
using namespace std;
// Function to sort only the even elements of an array in ascending order
void sortEvenElements(int arr[], int n)
{
// create an auxiliary array to store only the even elements
int aux[n];
int j = 0;
// copy only the even elements from the original array to the auxiliary array
for (int i = 0; i < n; i++)
if (arr[i] % 2 == 0)
aux[j++] = arr[i];
// sort the auxiliary array using the STL sort function
sort(aux, aux + j);
// copy the sorted even elements back to the original array
j = 0;
for (int i = 0; i < n; i++)
if (arr[i] % 2 == 0)
arr[i] = aux[j++];
}
int main()
{
// test the sortEvenElements function
int arr[] = {5, 3, 2, 8, 1, 4};
int n = sizeof(arr) / sizeof(arr[0]);
sortEvenElements(arr, n);
// print the sorted array
for (int i = 0; i < n; i++)
cout << arr[i] << " ";
return 0;
}
Use the drop-down menus to complete statements about how to use the database documenter
options for 2: Home crate external data database tools
options for 3: reports analyze relationships documentation
options for 5: end finish ok run
To use the database documenter, follow these steps -
2: Select "Database Tools" from the dropdown menu.3: Choose "Analyze" from the dropdown menu.5: Click on "OK" to run the documenter and generate the desired reports and documentation.How is this so?This is the suggested sequence of steps to use the database documenter based on the given options.
By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.
Learn more about database documenter at:
https://brainly.com/question/31450253
#SPJ1
Can any one make her/his own 5 E-learning questions related to any subject. Plss don't copy from any website.
Answer:
Your pupils will be totally engaged in learning if you use the 5E Approach while creating lesson plans. Your children will be inspired to share their learning with others and study ideas, concepts, and tactics together if you follow the 5 stages of engage, explore, explain, elaborate, and assess.
Explanation:
in my own words
Which of the following is an example of critical reading?
Select all that apply:
Accepting textual claims at face value Considering an argument from a different point of view
Reviewing an argument to identify potential biases
Skimming a text to locate spelling errors or typos
Looking for ideas or concepts that confirm your beliefs
Answer:
Which of the following is an example of critical reading? Select all that apply:
a.Accepting textual claims at face valueb.Considering an argument from a different point of viewc. Reviewing an argument to identify potential biasesd. Skimming a text to locate spelling errors or typose. Looking for ideas or concepts that confirm your beliefs
True or False: Nanomemory applies to computers.
Answer:
True
Explanation:
The Huawei developed Nanomemory Card (used for phones) can also be used for computers. A nanomemory card is just like an SD card, it provides you with extra storage space. Computer memory is also measured in nanomemory, so it can be used. Therefore, the answer to the question is True.
Best of Luck!
Select the correct locations on the image. Adrian wants to delve into database administration. Which certifications would help him along this career path? PMP Oracle DBA PRINCE2 CSPM MCITP
you can pick multiple
Answer:
Oracle DBA and MCITP
Which of the following is NOT a reason to include comments in programs?
a. Comments help the computer decide whether certain components of a program
are important.
b .Comments help programmers debug issues in their own code
c. Comments help document how code was written for other programmers to use
d. Comments enable programmers to track their work throughout the development
process
Answer:
A Would be correct!
Explanation:
The reason for this is because in a code when you use the comment out the compiler will skip over it and will not do anything and will skip it. So the comment can help the computer do anything!
HOPE THIS HELPED MAKE ME THE BRAINLIST!
Using programming concepts, the option that is NOT a reason to include comments in a code is:
a. Comments help the computer decide whether certain components of a program are important.
-------------------------
Usually, codes are very long, and each person is responsible for a part of the problem. The parts have to be intervened with each other, and thus, sometimes a programmer will have to look at another part of the code, not coded by him. Thus, for the programmer and other people working in the project to understand, comments are important.Additionally, the comments are used to help the programmers debug their own code, as they can go part by part and see what is done in each part, also helping them work throughout the development process.In a program, there may be some components that end up not being necessary, but this is not decided by comments, and thus, option A is not a reason to include comments in programs.A similar problem is given at https://brainly.com/question/13527834
Your company failed to send a overnight delivery that was promised to a customer. When the customer calls to complain, you should take all of the following steps EXCEPT
When the customer calls to complain, you should take all of the following steps blame the overnight delivery service for the error.
Why should blaming the overnight delivery service be avoided?Blaming the overnight delivery service for an error when a customer calls to complain should be avoided. While it may be tempting to shift responsibility, it is not an effective or customer-centric approach. Instead, it is important to empathize with the customer, actively listen to their concerns, and take ownership of the situation.
Blaming an external service provider can create a negative impression and escalate the customer's frustration. By focusing on finding a solution, apologizing for any inconvenience caused and demonstrating a willingness to resolve the issue, the customer's concerns can be addressed more effectively.
Read more about delivery
brainly.com/question/15243454
#SPJ1
bills is replacing a worn-cut cable to his power table saw.what type of cable is he most likely using ?
A.PSC
B.SO
C.CS
D.HPD
Bill is replacing a worn-cut cable for his power table saw. is using is A. PSC (Portable Cord).
What is the bills?Working with frayed cables can be dangerous and may act as a form of a risk of electric shock or other hazards. To make a safe and successful cable replacement, there are some general steps Bill can follow.
A is the most probable type of cable he is utilizing from the provided choices. A type of cord that can be easily carried or moved around. Flexible and durable, portable cords are frequently utilized for portable power tools and equipment.
Learn more about bills from
https://brainly.com/question/29550065
#SPJ1
Write a Python program that gets a number using keyboard input
The Python script prompts the user to input a number via keyboard and saves it as "number":
The Python Programnumber = input("Enter a number: ")
Keep in mind that the string nature of this input() function implies that you must convert it into a numerical form, such as int() or float(), if mathematical manipulation is desired.
Python is a comprehensive, high-level interpreted programming language that saw its genesis dating back to 1991. Noted for its usability, readability and versatility, this widespread language has established usage in various sectors such as web development, data science, machine learning and more.
What's more, Python has an extensive standard library and an affluent pool off community members who have donated to an array of open-source packages and tools.
Read more about programs here:
https://brainly.com/question/26134656
#SPJ1
From a database point of view, the collection of data becomes meaningful only when it reflect
What Is Used To Identify Spelling errors in the document?
Answer: Spell check
Explanation: Spell check identifies and corrects misspelled words. It also allows you to search a document yourself for words you've misspelled.
Carla wants to add the existing field "Order ID Number" to an Access form. Which steps will allow her to complete
this task in Design view?
in the Design section, select the Format tab → select Add Existing Fields → cut and paste the field "Order ID
Number" into the form
O in the Design section, select the Form Design Tools tab → select Add Existing Fields — drag and drop the field
"Order ID Number" into the form
O in the Form Design Tools section, select the Arrange tab → select Add Existing Fields → cut and paste the field
"Order ID Number" into the form
O in the Form Design Tools section, select the Design tab → select Add Existing Fields → drag and drop the field
"Order ID Number" into the form
Mark this and return
Next
Submit
Answer:
in the Design section, select the Form Design Tools tab → select Add Existing Fields — drag and drop the field
"Order ID Number" into the form
Explanation:
I just took it
TLS does not require mutual authentication. Only server must authenticate its public key to the client. Client is authenticated by the application via a password. The most common way for public key authentication would be a. a photo ID. b. a password. c. a certificate. d. biometrics.
Answer:
c. a certificate.
Explanation:
Public key infrastructure authentication is intended to make transactions occurring through the internet as secure as possible. Public keys are usually assigned to entities like business firms or individuals, and digital certificates are given to them as proof that they have been authenticated.
A certificate authority has the role of signing, storing, and issuing digital certificates. A software or humans could be charged with the responsibility of actually ensuring a key to user binding if all conditions are satisfied.
PLEASE HURRY!!!
Look at the image below!
The value of category will be normal because the if statement is false and the first elif statement is false but the second elif statement is true.
Read this outline for an argumentative essay about government.
1. People have different ideas about the role of government.
A. The primary_purpose of government is to provide social services.
2. Government should provide services for
people who are poor or elderly.
A. Government can effectively provide the services that poor and elderly people need.
B. Food stamps keep people from going hungry.
C. Medicare and Medicaid provide health care.
D. Some people believe social services are an entitlement and not a right,
but many people could not survive without them.
Government's main role is provide to social services, such as food stamps.
The underlined sentence in the outline is the
O claim.
• conclusion.
Answer:
First option.
Explanation:
The underlined sentence in the outline numbered 1 (People have different ideas about the role of government) is the introduction.
What is an introduction?The essential concept of an outline for a particular piece of writing, such as an essay, is presented in a single brief sentence for the body paragraphs. In this manner, it is positioned at the start and briefly summarizes the thesis of an article.
Because it appears at the beginning of the outline and contains the key notion that unifies all the other ideas offered in the subsequent phrases, the sentence with the asterisk (*) serves as the introduction. Government can effectively provide the services that poor and elderly people need.
Therefore, The underlined sentence in the outline numbered 1 (People have different ideas about the role of government) is the introduction.
Learn more about an introduction, here:
brainly.com/question/18119893
#SPJ5
PHP Create a for loop that initialize with the variable $i = 10 The loop outputs $i as long as $i is greater than 1 using for loop Use echo statement to output $i Make sure to use operator based on the desired condition mentioned (increment $i++ / decrement $i–) Make sure each line of code ends with a semi colon i.e ;
Answer:
The PHP code is as follows
<?php
for ($i = 10; $i>1; $i--)
{
echo $i.' ';
}
?>
Explanation:
The code is self explanatory and doesn't require comments before it can easily understood.
The program starts with a php opening tag <?php
And it ends with the closing tag ?>
The interpretation of the question is to print integer values from 10 to 1
To do this, an iteration is needed.
The above program makes use of a for loop iteration.
Analysis;
for ( -> This shows that it is a for loop iteration
$i = 10; -> Iterating variable $i is initialized to 10 (that is; printing will start at 10)
$i>1; -> Iteration is valid while $i is greater than 1 (e.g. 2,3,4...10)
$i-- -> For every Iteration, decrease $i by 1
) -> End of Iterating condition
echo $i.' '; -> This line prints the valid values of $i. In this case, the values of $i is from 10 and stops at 2
The output is as follows
10 9 8 7 6 5 4 3 2