Answer:
what are the answers?
it just says A, B. C. or D.
Explanation:
What two choices do you have when you open the Remote tab of the System Settings?
Answer:
remote assistance and remote desktop
Explanation:
^
what is the number of times a receiver is exposed to a media vehicle in a given time period? A) Potency B) Reach C) Coverage D) Frequency E) Audience contact
D) Frequency. Frequency refers to the number of times a receiver is exposed to a media vehicle in a given time period.
Frequency measures the repetition or the number of times an individual or target audience is exposed to a particular media vehicle, such as an advertisement, within a specific timeframe. It helps determine how often a message is delivered to the target audience. Frequency is an essential factor in advertising campaigns, as repeated exposure can reinforce the message and increase the likelihood of the audience retaining and responding to it. By managing frequency effectively, advertisers can optimize their reach and impact on their target audience.
Learn more about media here:
https://brainly.com/question/14047162
#SPJ11
1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this statement? Provide evidence to support your position, (2 points)
Answer:
true
Explanation:
everything is computerized. banks, shopping, financial business records, ect
which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?
The correct response is d. Slide Sorter. You may easily rearrange or divide your slides into sections by dragging and dropping them around the grid-like display of your slides thanks to the slide sorter.
You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view. The "Slide Sorter" button in the "Presentation Views" button group on the "View" tab of the Ribbon is another option. The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here. All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in PowerPoint's Slide Sorter view are also available in the Normal view's slide thumbnails pane. Click a slide thumbnail in the Slide Sorter window to choose a slide. Click and drag the slide thumbnails in this view, then release them where you want them to be. This will reorder the order of the slides in your presentation. The selected slide opens in Normal View, where you can edit its content, if you double-click a slide thumbnail in PowerPoint's Slide Sorter view or if you choose a slide thumbnail and then press the "Enter" key on your keyboard. In the Slide Sorter window, click the desired slide thumbnail to choose it for deletion. Then, use your keyboard's "Delete" key. Alternatively, you can erase the slide by doing a right-click. then from the pop-up menu, choose the "Delete Slide" option.
Learn more about Slide Sorter here
https://brainly.com/question/16910023
#SPJ4
Which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?
a. Normal
b. Outline
c. Slide Show
d. Slide Sorter
Choose the correct option. i) An object thrown from a moving bus is on example of
(A) Uniform circular motion
(B) Rectilinear motion
(C) Projectile motion
(D) Motion in one dimension
age
The answer is option C: "Projectile motion."
Projectile motion refers to the motion of an object that is thrown or launched into the air and follows a parabolic path under the influence of gravity. An object thrown from a moving bus is an example of projectile motion because it is launched into the air and follows a curved path due to the force of gravity.
Option A: "Uniform circular motion" refers to the motion of an object moving in a circular path at a constant speed.
Option B: "Rectilinear motion" refers to the motion of an object moving in a straight line.
Option D: "Motion in one dimension" refers to motion that occurs along a single straight line, rather than in two or three dimensions.
Hope This Helps You!
suppose that a system administrator at sls read the details of this case. what steps should he or she take to improve the company's information security program?
To improve the company's information security program need to create a comprehensive security policy and implement strong firewalls.
STEP :
1. Create a comprehensive information security policy that outlines acceptable use of company resources and data.
2. Educate all staff on the importance of protecting data and the risks of not doing so.
3. Implement access control procedures such as multi-factor authentication, password complexity requirements, and regular password changes.
4. Implement strong perimeter security measures such as firewalls, intrusion detection systems, and antivirus software.
5. Establish regular auditing and monitoring of the system to detect any unauthorized access or usage of data.
6. Establish a process for responding to security incidents, including reporting, investigation, and remediation.
7. Implement a secure backup and recovery system to protect against data loss.
8. Establish an incident response team to investigate and respond to any security incidents.
9. Regularly review and update the security policies and procedures to ensure compliance with changing regulations.
10. Develop a policy for the secure disposal of confidential data.
To know more about security :
https://brainly.com/question/28581015
#SPJ4
You have $5 and earn $1.75 for each roll of wrapping paper you sell. Write an equation in two variables that represents the total amount A (in dollars) you have after selling r rolls of wrapping paper
Answer:
A = 5 + 1.75r
Explanation:
Amount you have = $5
Earning per roll of wrapping paper = $1.75
Let
r = number of rolls of wrapping paper
A = Total amount earned
A = 5 + 1.75r
Equation that represents the total amount A (in dollars) you have after selling r rolls of wrapping paper is
A = 5 + 1.75r
Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is more than or equal to 10 one is added to it. the result is displayed the process is repeated until the number 0 is entered.
Answer:
please find the attachment of the flowchart.
Explanation:
In this question, a start block is used to start the program, in the parallelogram box we input the value from the user end and in the diamond box, we check the input is not equal to 0. In the next diamond box, it checks the given input value and print value, and at the last, we stop the code.
Please find the program and its output in the attached file.
What web browser feature would be particularly useful when using public computers?
A web browser feature which would be particularly useful when using public computers is: C. Privacy browsing.
What is a web browser?A web browser can be defined as a type of software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.
What are public computers?Public computers can be defined as the type of computers that are typically used by the general public and as such are less secured than personal computers.
In this context, we can infer and logically deduce that privacy browsing is a web browser feature which would be particularly useful when using public computers.
Read more on privacy browsing here: https://brainly.com/question/6970507
#SPJ1
Complete Question:
What web browser feature would be particularly useful when using public computers?
A. Session restore
B. Pinned tabs
C. Privacy browsing
D. All of the above
Assign a pointer to any instance of searchChar in personName to searchResult.
*/
int main() {
char personName[100] = "Albert Johnson";
char searchChar = 'J';
char* searchResult = 0;
/* Your solution goes here */
searchResult = strchr(personName, searchChar);
if (searchResult != 0) {
cout << "Character found." << endl;
}
else {
cout << "Character not found." << endl;
}
return 0;
}
/*
strchr() is a function that allows us to search for a specific character in a string. This function returns a pointer to the first occurrence of the character in the string.
What is occurrence ?Occurrence is a term that is used to refer to an incident or event that takes place. It is also used to describe a phenomenon that happens at a certain time or place. Occurrences can be anything from an unexpected event, to a natural phenomenon, to a random occurrence. Occurrences can be positive, negative, or neutral. For example, an occurrence could be a natural disaster, a momentous event such as a wedding, or a random occurrence that seems to happen out of nowhere.
In this case, we are searching for the character 'J' in the string "Albert Johnson".
We can assign the pointer returned by strchr() to the pointer "searchResult". This will assign the address of the first occurrence of 'J' in the string to searchResult.
*/
To learn more about occurrence
https://brainly.com/question/30562157
#SPJ4
How can Mario complete his task without leaving the word application?
Answer:Use the Thesaurus feature to find a synonym of the word.
Explanation:i just got the same question.
Answer:Use the Thesaurus feature to find a synonym of the word.
Explanation:
advantages and disadvantages of a watch tower
Watchtower refer to a high place or building that give view about an area.
The Advantages of watchtower are;Its provide a high and safe place from which someone can observe the surrounding area. In some cases, non-military towers, such as religious towers, may also be used as watchtowers.It gives overview of all the surrounding area.Disadvantages include;
Invade of Emergency, coming done from the watchtower can be difficult. it won't be fast and easy.What is Watchtower?Watchtower refer to a high building built which give someone good overview of the area around the place they are guarding.
Learn more about watchtower from the link below.
https://brainly.com/question/755944
Explain something you found easy in GMetrix in preparation for the IBC. Explain something you found difficult in GMetrix in preparation for the IBC.
When preparing for a certification exam, GMetrix is utilized to pinpoint areas that need improvement.
What is GMetrix?GMetrix is defined as a platform for performance-based testing and exam preparation that aids in obtaining IT certification qualifications. It is intended to aid students and professionals in their certification preparation by offering practice tests.
The easy in GMetrix in preparation for the IBC is certification become easy and the difficult is that the person who are not eligible for certification also get certification.
Thus, when preparing for a certification exam, GMetrix is utilized to pinpoint areas that need improvement.
To learn more about GMetrix, refer to the link below:
https://brainly.com/question/28313092
#SPJ1
6
Select the correct answer.
Jorge needs to print out an essay he wrote, but he does not have a printer. His neighbor has a printer, but her internet connection is flaky. Jorge is
getting late for school. What is the most reliable way for him to get the printing done?
O A. send the document to his neighbor as an email attachment
О в.
share the document with his neighbor using a file sharing service
OC.
physically remove his hard disk and take it over to his neighbor's
OD. copy the document onto a thumb drive and take it over to his neighbor's
Since Jorge needs to print out an essay, Jorge should D. Copy the document onto a thumb drive and take it over to his neighbor's
What is the printer about?In this scenario, the most reliable way for Jorge to get his essay printed would be to copy the document onto a thumb drive and take it over to his neighbor's.
Therefore, This method does not depend on the internet connection, which is flaky, and it also avoids any potential issues with email attachments or file sharing services. By physically taking the document over to his neighbor's, Jorge can ensure that the document will be printed on time.
Learn more about printer from
https://brainly.com/question/27962260
#SPJ1
Please help! ESSAY: TELESCOPES
Research the critical new developments in telescopes. Write a 200-word paper on the new developments.
OLEASE DONT EXPLAIN HOW TO DO IT, AND WRITE ME AND ACTUAL ORIGINAL ESSAY :)
Answer:
Telescopes have been used to observe space since the 1600s and have been continually improved and developed to give us a better understanding of the universe. Over the past few decades, there have been many critical new developments in telescopes that have allowed us to explore further and gain a deeper understanding of the universe.
One major development has been the use of mirrors to reflect and focus light to achieve greater magnification and resolution. This has allowed telescopes to observe distant objects in greater detail and at greater distances. Another major advancement has been the use of segmented mirror designs that allow for larger apertures and thus larger fields of view. This has allowed for greater coverage of the night sky and for more accurate observations.
In addition, the introduction of adaptive optics has allowed for telescopes to adjust their focus in real-time to compensate for atmospheric turbulence, allowing for much sharper images. Another development has been the introduction of space telescopes, allowing us to observe the universe without the interference of the Earth's atmosphere. The Hubble Space Telescope and the James Webb Space Telescope are examples of this type of telescope.
Finally, the development of space-based observatories has allowed for greater accuracy in observation than ever before. These observatories use multiple telescopes to observe a single object, allowing for greater accuracy and detail.
All of these developments have allowed us to observe the universe in greater detail and to gain a deeper understanding of its many mysteries. Telescopes have become increasingly powerful and precise, and have allowed us to explore further and deeper than ever before.
when using a(n) ____ join, only rows that meet the given criteria are returned.
the answer is "inner"
hope this helps!
where can you view detailed information about threats that have been detected on protected endpoints?
The Threats tab is a place where you can view detailed information about threats that have been detected on protected endpoints.
What is a threat tab?
The Threats tab on the Endpoint information screen allows you to view all security threats detected on a specific endpoint.
Threat detection refers to an IT organization's capacity to recognize threats to a network, its applications, or other assets with speed and accuracy. Understanding the hazards that exist in the cyber world is the first step in developing an efficient threat detection and response strategy.
Therefore, You can read comprehensive details regarding threats that have been found on protected endpoints under the Threats page.
To learn more about threat, refer to the link:
https://brainly.com/question/29941324
#SPJ1
Can someone help me please and please answer all the questions and explain :D
Answer:
1. is A. 2. is C. 3. is A.
Explanation:
Filters remove all data that does not match the requirements.
you have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. how many assignable host addresses are on each subnet?
Given a subnet mask of 255.255.255.240, this indicates that the first 28 bits of the network address are used for the network portion, and the remaining 4 bits are used for the host portion.
How to calculate the number of assignable host addresses?
To calculate the number of assignable host addresses on each subnet, we need to determine the number of host bits, which is 4 in this case. The number of assignable host addresses is calculated using the formula:
2^(number of host bits) - 2
Substituting the value of 4 for the number of host bits, we get:
2^4 - 2 = 14
Therefore, there are 14 assignable host addresses on each subnet with the given network address of 133.233.11.0 and subnet mask of 255.255.255.240.
To learn more about subnet mask, visit: https://brainly.com/question/28256854
#SPJ1
Which of the following things could you do in order to tell if a pair of colors has strong contrast? A. Look at the colors on the visual spectrum. B. Put text or images of one color on top of the other color. C. Find out if they are additive or subtractive colors. D. Find out the Munsell numbers of each color.
Answer:
B
Explanation:
I'll be honest, I'm not 100% sure this is correct but I'm pretty sure it is. Good Luck :)
What is a named bit of programming instructions?
Answer:
Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
given a string matrix we in that need to find the
number which is occured two times or more than two times and and
give the sum of those numbers
Sample input::
[1 3 4
3 6 8
8 6 8]
Output:
3+8=11"
Plea
Given a string matrix, we need to find the number that occurred two times or more than two times and give the sum of those numbers. In order to do this, we can take the following approach:We can convert the string matrix into an integer matrix. We can create an empty dictionary. We will iterate through each element in the matrix.
If the element is not present in the dictionary, we will add it with the value 1. If the element is already present in the dictionary, we will increment its value by 1. After iterating through the matrix, we will iterate through the keys of the dictionary and add the sum of the keys whose values are greater than or equal to 2. The sum of these keys will be the desired output.
Here is the implementation of the above approach in Python: matrix = [[1, 3, 4], [3, 6, 8], [8, 6, 8]]d = {}# Convert string matrix to integer matrix for i in range(len(matrix)): for j in range(len(matrix[i])): matrix[i][j] = int(matrix[i][j])# Populate dictionary with occurrences of each number for i in range(len(matrix)): for j in range(len(matrix[i])): if matrix[i][j] not in d: d[matrix[i][j]] = 1 else: d[matrix[i][j]] += 1# Calculate sum of numbers that occurred 2 or more times sum = 0for key in d: if d[key] >= 2: sum += key print(sum) In the given problem, we have a matrix of strings and we need to find the numbers that occurred two or more times and sum them up. To solve this problem, we first need to convert the string matrix into an integer matrix. We then need to iterate through each element in the matrix and populate a dictionary with occurrences of each number in the matrix.
To know more about matrix visit:
https://brainly.com/question/29132693
#SPJ11
Which is a factor that limits or restricts a design?
A. brainstorm
B. trade-off
C. constraint
D. process
Answer:
The answer is Brainstorm.
Write a loop that continually asks the user what pets the user has until the user enters rock in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have a dog with a total of 1 pet(s) if they enter dog, and so on
Loops are program statements that are repeated as long as the loop condition is true.
The loop in Python, where comments are used to explain each line is as follows:
#This initializes the number of pets to 0
count = 0
#This gets input for the pet name
pet = input("Pet: ")
#This is repeated until the user enters "rock"
while pet.lower() != "rock":
#This increases the number of pets by 1
count+=1
#This prints the pet and the number of pets
print("You have a",pet,"with a total of",str(count),"pet(s)")
#This gets input for the pet name
pet = input("Pet: ")
Read more about loops at:
https://brainly.com/question/19344465
Please Tell Me How To Code This
A supermarket wants to install a computerized weighing system in its produce department. This system produces a label for fruits and vegetables (see below).
Input Screen: Ask the following questions for input. You will be using the Scanner Class for this step.
- Please enter each of the following: - Date in the form of MM/DD/YY
- Description of Item (accept a string as input, but you will only print the first 3 letters from the String. Ex. Input: banana and Output: ban)
- Weight of item (accept a decimal as input)
- Price per pound if item (accept a decimal as input) o Output Screen: Print the output exactly as you see if below.
- Things to note: For the date use the replace command to replace /'s with -'s.
- The description of the item, use the substring command to print only the first 3 letters.
The program is an illustration of string manipulations.
String manipulation involves splitting and replacing characters of a string.
The program in Java, where comments are used to explain each line is as follows:
import java.util.*;
public class Main{
public static void main(String[] args) {
//The next two lines declare all variables, as strings and double
String ddate,desc;
double weight, price;
//This creates a scanner object
Scanner input = new Scanner(System.in);
//This prompts the user for date, and also gets its input
System.out.print("Date (MM/DD/YY): "); ddate = input.nextLine();
//This prompts the user for item description, and also gets its input
System.out.print("Description: "); desc = input.nextLine();
//This prompts the user for price per pound, and also gets its input
System.out.print("Price per pound: "); price = input.nextDouble();
//This prompts the user for weight, and also gets its input
System.out.print("Weight: "); weight = input.nextDouble();
//This replaces all slashes (/) in the date by dash (-)
ddate = ddate.replace("/", "-");
//This prints the first three characters of the item description
System.out.println("Description: "+desc.substring(0, 3));
//This prints the date
System.out.println("Date: "+ddate);
//This prints the item price per pound
System.out.println("Price per pound: "+price);
//This prints the item weight
System.out.println("Weight: "+weight);
//This prints the total price of the item
System.out.println("Total: "+(weight*price));
}
}
At the end of the program, all user inputs are printed
See attachment for sample run.
Read more about similar programs at:
https://brainly.com/question/15520075
Which technology below can be used to set up passwordless SSH logins by distributing a server SSH certificate
One technology that can be used to set up passwordless SSH logins by distributing a server SSH certificate is the SSH Public Key Authentication method.
SSH Public Key Authentication is a secure method for logging into a remote server without the need for a password. It involves the use of public-private key pairs. In this scenario, the server's SSH certificate would be generated and signed by a trusted certificate authority (CA). The server's public key would then be distributed to the clients who wish to connect to the server.
The clients would generate their own key pairs and add their public keys to the server's authorized_keys file. When a client attempts to connect to the server, the server verifies the client's identity by using the client's private key to encrypt a challenge provided by the server. If the server can successfully decrypt the challenge using the client's public key, the client is authenticated and granted access without requiring a password. This method provides a higher level of security compared to traditional password-based authentication and eliminates the need to remember and manage passwords for SSH logins.
Learn more about SSH certificate here:
https://brainly.com/question/33365211
#SPJ11
Define the term Project brief? why is it important to do planning?
Answer: the project brief is a document that provides an overview of the project.
Explanation: It says exactly what the designer, architect, and contractor needs to do to exceed your expectations and to keep the project on track with your goals and your budget.
what is pirating means in technical terms?
Answer:
the illegal copying, distribution or use of software
Pirating refers to the unauthorized copying, distribution, or use of copyrighted material, such as software, music, movies, or books, without the permission of the copyright holder.
Here,
In technical terms pirating refers to the unauthorized copying, distribution, or use of copyrighted material.
This can include activities such as downloading or sharing copyrighted content without paying for it or using cracks to bypass licensing or copy protection mechanisms.
Pirating is considered illegal and unethical because it infringes upon the rights of the copyright holder and can result in legal consequences.
Know more about pirating,
https://brainly.com/question/29769277
#SPJ6
Given the list (7, 23, 12, 8, 5, 6), what is the order of the elements after the third insertion sort swap?
in cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as:
in cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as resource pooling.
What is computing resources?The simplest computational resources are computation time, which is the total number of steps required to solve a problem, and memory space, which is the amount of storage used while solving a problem, although many more complex resources have been developed. An action on any legitimate input is typically used to characterize a computational problem[citation needed]. Examples of issues are "with an integer n, find whether n is prime" and "compute the product of x and y given two values" The quantity of computer resources required to solve an issue will grow as the inputs are larger. As a result, the resources required to solve a problem are stated in terms of asymptotic analysis, where the resources are determined as a function of the input's size or length.
To know more about computing resources, visit:
https://brainly.com/question/30090250
#SPJ4