Answer:
37deg
Explanation:
Answer:
37n
Explanation:
MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.
Answer:
The personal preferences that can be saved are
A. Customize your bookmark bar
C Change your home page
D Enable safe browsing in your privacy setting
Explanation:
The Bookmark manager can be used for personal customization of the bookmarks in chrome
The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks
The personally preferred homepage can be selected under appearance category in the settings menu
The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.
What is the outcome of the following code snippet? boolean val1 = true; boolean val2 = false; while (val1) { if (val1) { System.out.println("Hello"); } val1 = val2; } No output will be displayed because of a compilation error. Hello will be displayed only once. Hello will be displayed infinite times. No output will be displayed even after successful compilation of the code snippet.
Answer:
Hello will be displayed only once.
Explanation:
Look at the picture*
A customer calls you and states that her laptop screen is very dim. In order to avoid going to the client's site, which of the following is the first action you should recommend to the customer to perform?
1. Use function keys
2. Set encryption
3. Restart the system
4. None of above
it depends on the brand of laptop,If it is standard use function key if not None of the above
Importance of taking correct body measurement....
Taking correct body measurements is of key importance especially to models and future models. So that they remember about the leftover weight in their body from thanksgiving , now when they take correct body measurements , they are aware and will counter such things to be better.
Case-Based Critical Thinking
Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers. 43. Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
a. src.
b. loop.
c. controls.
s. preload.
Answer:
B. Loop
Explanation:
The use of loop which is a boolean attribute in HTML is an instruction that specifies a replay of the video once it has ended. It is inputted in this format;
<video controls loop>
<source src="dance.mp4" type=video/mp4">
</video>
To add a video to the HTML web page, the <iframe> element is used. the source would also indicate the video URL. The specification of the dimensions, that is the height and width of the video are also written. The code is now closed with the </iframe> element.
(x - 1) (x² + x + 1)
Answer:
x³ - 1
Solution 1: We are given two expressions: the first is (x² + x + 1) and the second (x - 1). We multiply the two term by term till all the terms in the first expression are exhausted. Start with the x² term from the first expression, multiply it by x of the second expression and put down the product. Next you multiply the same x² term by -1 of the second expression and write the result. Repeat the process for the other two terms ( x and +1) in the first expression. Having completed the multiplication process, simplify and arrive at the final result.
∴ (x² + x + 1) (x - 1)
= [x².x + x² (- 1) + x.x + x(-1) + 1.x + 1(-1)]
= x³ - x² + x² - x + x - 1 ,which after cancellation of equal terms,
= x³ - 1 (Proved)
Solution 2: Here we use the relevant formula which may be quoted verbally as follows: The difference of the two cubes of any two quantities is equal to the product of two expressions, one of which is the difference of the two quantities, and the other the sum of their squares increased by their product.
If the two quantities are x and 1,
Then the difference of the cubes of x and 1 = x³ - 1³ = x³ - 1
One expression = difference of x and 1 = x - 1
Other or second expression
= (sum of squares of x and 1 + product of x and 1)
= x² + 1² + x.1 = x² + 1 + x = x² + x + 1
∴ By the above theorem
x³ - 1 = (x² + x + 1) (x - 1)
Explanation:
1
TIME REMAINING
01:51:06
Zubair needs to change some of the data in a table that he has created. How should he go about selecting a row in
the table?
Moun the mourn nointor in a noint hefore the text in a cell
Which of the following patterns should be used for the delimiter to read one character at a time using a Scanner object's next method? Scanner in = new Scanner(. . .); in.useDelimiter("[^0-9]+"); Scanner in = new Scanner(. . .); in.useDelimiter(""); Scanner in = new Scanner(. . .); in.useDelimiter("[^A-Za-z]+"); Scanner in = new Scanner(. . .); in.useDelimiter("[A-Za-z]+");
Answer:
The method to this question can be defined as follows:
Scanner in = new Scanner(. . .);
in.useDelimiter("");
Explanation:
Following are the code to the question:
import java.util.*; //import package for user input
public class Main //defining class Main
{
public static void main(String ax[])//defining the main method
{
Scanner in = new Scanner("Database");//crearing Scanner class object that pass value in its parameter
in.useDelimiter(""); //using useDelimiter
System.out.println(in.next()); //use print method to print single character value
}
}
Output:
D
Code explanation:
In the above code inside the main method scanner class object "in" is created that pass value "Database" in its parameter. In the next step, useDelimiter is used that uses the scanner class object and single space n its parameter. In the last print, the method is used that prints object value.A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundancy. What topology would BEST meet the CIO's requirement?
Answer:
"Mesh topology" is the correct answer.
Explanation:
A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use in an oral presentation including the length of the presentation, the size and layout of the room, and the available equipment. What is the last aspect?
Answer:
The answer is "audience aptitude and experience "
Explanation:
The presentation is the ability to provide a variety of audiences with successful and stimulating interactions. The main objective of an oral presentation is to talk formally to a live audience about a particular subject. You have to write an oral speech that engages the audience and fulfills your goals.
In this type of presentation, the Listener-centric concept is effective as the productivity of a speaker is enhanced by creating and presenting the speech throughout the proper manner.
Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)
A. The web server at 192.168.0.10 is reachable from the source host.
B. The default gateway between the source host and the server at 192.168.0.10 is down.
C. There is a problem with the web server software on web-s1.cisco.com.
D. A router is down between the source host and the server web-s1.cisco.com.
E. DNS cannot resolve the IP address for the server web-s1.cisco.com.
......Explanation:
ascsmlmcm
Based on the information, it is clear that the web server at the IP address is reachable, yet there may be a DNS goal issue for its space name. Option A and E is the correct answer
How is the web server part of the problem?The problem can be understood in two ways based on the information provided:
A. The web server at 192.168.0.10 is reachable from the source.
This is not entirely set in stone by the fruitful ping order reaction to the IP address of the web server. Assuming that the web server was inaccessible, the ping would fall flat.
E. DNS cannot resolve the IP address for the server web-s1.cisco.com.
This may be induced by the truth that the specialist utilized the IP address (192.168.0.10) rather than the space title (web-s1.cisco.com) to test the network. On the off chance that DNS was working appropriately, the expert would have utilized the space name all things being equal.
As a result, we are able to conclude from the exhibit that the web server at the specified IP address can be reached; however, there may be a problem with DNS resolution for the server's domain name.
Learn more about web servers here:
https://brainly.com/question/29490350
#SPJ2
Assuming that a user enters 68 as the score, what is the output of the following code snippet? int score = 68; if (score < 50) { System.out.println("F"); } else if (score >= 50 || score < 55) { System.out.println("D"); } else if (score >= 55 || score < 65) { System.out.println("C"); } else if (score >= 65 || score < 75) { System.out.println("B"); } else if (score >= 75 || score < 80) { System.out.println("B+"); } else { System.out.println("A"); } D C B A
Answer:
D
Explanation:
Using if in this way will validate one by one, and finding a true value will not validate the rest of "else if"
score = 68
if (score < 50) --> print "F"
68 < 50 --> falseelse if (score >= 50 OR score < 55) --> print "D"
68 > = 50 TRUE .... (The OR operator displays a record if any of the conditions separated by OR is TRUE)As this condition is true the system will not validate the other conditions
Which of the following for-loop headers results in equivalent numbers of iterations: A. for (int q = 1; q <= 100; q++) B. for (int q = 100; q >= 0; q--) C. for (int q = 99; q > 0; q -= 9) D. for (int q = 990; q > 0; q -= 90) a. A and B. b. C and D. c. A and B have equivalent iterations and C and D have equivalent iterations. d. None of the loops have equivalent iterations.
Answer:
b
Explanation:
C and D have equivalent iterations
C: D:
99 990
90 900
81 810
72 720
63 630
54 540
45 450
36 360
27 270
18 180
9 90
___________is used for drawing 3D objects in the field of Science and Engineering.
A)CAT
B)CAD
C)MRI
D)None of these
Answer:
the answer is C mri hope this helps
Explanation:
Answer: C (MRI)
Explanation:
3D modelling Softwares are used
There are two kind of 3-D Modelling Software
Parametric & Non Parametric
Parametric - Maintain the relation between Different dimensions as defined on changing any dimension (constraint based).
non-parametric Does not have constraint ( its jike like moulding something from Sand , add any where , remove from any where).
A user receives an email containing a co-workers birth date and social security number. The email was not requested and it had not been encrypted when sent. What policy does the information in the email violate
Answer:
PII
Explanation:
The information in the email violates the PII. That is Personally identifiable information. PII, are nothing but any data that could potentially be used to identify a person. Examples of which can be a full name, Social Security number, driver's license number, bank account number, passport number, and email address, etc.
write some Drawbacks of the internet
Explanation:
Computer Virus can spread.
Data can be hacked.
It has made peoples lazy
It cannot work about electricity and mobile and computer like devices
..
Thank me if you like.. and follow me..
1) What is Net beans
Answer:
it's a software
Explanation:
NetBeans IDE lets you quickly and easily develop Java desktop, mobile, and web applications, as well as HTML5 applications with HTML, JavaScript, and CSS. The IDE also provides a great set of tools for PHP and C/C++ developers.
what are the different categories of a computer
Answer:Computer is a machine that can be program to manipulate the symbols.
Explanation:There are five different categories of a computer.
(1)super computer (2) mainframe (3) personal computer (4) workstation
(5) minicomputer
(1)super computer: super computer is the term fastest computer available current time.super computers are very expensive and specialized computer.
(2)mainframe : mainframe computer is perform to the execute the program the currently.
(3) personal computer: The most popular use for personal computer playing games and surfing internet.
(4)workstation: This type of computer used for the engineer applications desktop publishing , software development.
(5)minicomputer: The general a minicomputer is multiprocessing system it is a midsize computer.
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
Answer:
Hybrid
Explanation:
Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.
Administrator access initiative brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.
a) true
b) false
Answer:
False.
Explanation:
Web Accessibility Initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.
It is one of the features of the World Wide Web Consortium (W3C) develiped in 1997 and is aimed at developing standards and support materials to assist in understanding and implementing accessibility for users with disabilities.
3. Write the qbasic program for following:
[10]
a) To find square of 3.
b) To print and display square and cube of 4.
c) To print and display simple interest where principle is 4000 rs, time is 2 years and
rate is 5%.
d) To find sum, subtract, product and division of 8 and 4
e) To find and print sum and product of two input numbers.
it's a really important assignment and I will need all the answer. I will follow, give 5 star and a heart for the first person who gives the answer. please be quick. it is important
Answer:
Hi there!!!
I hope it helps you...
Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. What can she do to make the games work properly in Windows
Complete Question:
Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode.
Group of answer choices;
A. Reboot into Safe Mode
B. Run compatibility mode for 640 x 480 resolution.
C. Reduce her screen resolution to 640 x480
D. Reboot into Low Resolution Mode
Answer:
B. Run compatibility mode for 640 x 480 resolution.
Explanation:
In this scenario, Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. In order to make the games work properly in Windows, Missy should run compatibility mode for 640 x 480 resolution.
The video graphics array (VGA) is the standard graphics or display interface used for computer monitors. It was developed in 1987 by IBM and it had a standard display resolution of 640 x 480 pixels.
Hence, if the output of a software program (games) looks fuzzy or is not being displayed properly, you should run compatibility mode for 640 x 480 resolution. This is to enable low resolution video mode on the computer.
The VGA mode is very basic because only minimal video drivers are being loaded on the windows.
A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take first?
a. Check the printer connection
b. Stop and start the printer
c. Reboot the computer
d. Clear the print queue
Answer:
d. Clear the print queue.
Explanation:
If a user reports that he cleared a paper jam and now cannot print. Also, the technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. The first and most appropriate action the technician should take is to clear the print queue.
In computer technology, a printer is an electronic output device (peripheral) that is used for the printing of paper documents (texts and images).
The print queue is the directory or location where the printing sequence for a printer is stored or backed up. If it was ensured that the power cord of the printer is properly plugged in, the paper jam is cleared and the papers are properly seated, then the next action to take is clearing the printing queue. Once, the printing queue is cleared and becomes empty, the printer will begin to print.
Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by authorized users?A. Access control lists (ACLs) on log data drivesB. Deployment of write once read many (WORM) drivesC. Disk encryption using hardware security modules (HSM) on log data drivesD. Implementing the principle of least privilege on log data drives
Answer:
Option B (Deployment of write once read many (WORM) drives) is the appropriate one.
Explanation:
SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x modulo 2 (remainder is either 0 or 1) Assign x with x divided by 2
Answer:
Following are the code to this question:
def binarynumber(num):#defining a method binarynumber that accepts a parameter num
x=""#defining a string variable x
if (num!=0):#defining if condition to check number not equal to 0
while (num>=1):#defining a loop that check value is grater then equal to one
if (num %2==0):#defining if condition to check num is even
x=x+"0" #add string value 0 in num variable
num=num/2 #divide the value by 2
else:#defining else block
x=x+"1"#add string value 1 in num variable
num=(num-1)/2#first subtract 1 into num variable then divide the value by 2
else:
x="0"#assign string value 0 in num variable
return "".join(reversed(x))#return value
num = int (input ("Enter any number: "))#defining num variable that input the integer value
print (binarynumber(num))#using print method to call method binarynumber with passing num parameter
Output:
Enter any number: 12
1100
Explanation:
In the above python code a method "binarynumber" is declared, in which the "num" variable passes as the parameter inside the method a string variable "x" is declared that stores all converted values. Inside the method and if the block is declared that checks number value is not equal to 0 if this condition is false then it will add string value and reverse its value. Or if the condition is true it defines a while loop that calculates the given number binary digits and returns its value. At the last step, the num variable is declared that inputs the integer value from the user end and calls the method by using the print method.A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments can access the printer, the accounting group is unable to print to this network printer. Which of the following would the technician use to resolve the problem?
a. The printer needs a maintenance kit repalced.
b. The TCP/IP print spooler service need to be restarted.
c. The security settings for the print spooler need to be modified to include the department.
d. Replace the network cable on the printer
Answer: c. The security settings for the print spooler need to be modified to include the department.
Explanation:
The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .
If all the other departments can access the printer, but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group .
Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.
Which of the following statements are true? Select one or more: a. A socket is a kind of opening. b. A socket represents one endpoint of a network connection. c. A program uses a socket to communicate with another program over the network. d. Data written by a program to the socket at one end of the connection is transmitted to the socket on the other end of the connection, where it can be read by the program at that end.
Answer:
a. A socket is a kind of opening.
b. A socket represents one endpoint of a network connection.
c. A program uses a socket to communicate with another program over the network.
d. Data written by a program to the socket at one end of the connection is transmitted to the socket on the other end of the connection, where it can be read by the program at that end.
Explanation:
A socket is an endpoint in the network node of a computer network that serves the role of sending and receiving data written by a program across the network. The application programming interface specifies the attributes of a socket, through the socket descriptor. The socket address serves the purpose of making the socket identifiable by other hosts.
The socket address consists of the transport protocol, IP address, and port number. Just like a port serves as the endpoint in hardware, so does the socket also function as an endpoint in a network connection.
Word Separator
Write a program that accepts as input a sentence in which all of the words are run together but the first character of each word is uppercase. Convert the sentence to a string in which the words are separated by spaces and only the first word starts with an uppercase letter. For example the string "StopAndSmellTheRoses." would be converted to "Stop and smell the roses."
Answer:
Following are the code to this question:
value=input("Enter string value: ")#defining string variable for input value from user
val= ""#defining another string variable val
i=0#defining integer variable and assign value 0
for x in value:#defining loop for proving spacing in value
if x.isupper() and i > 0:#defining if block to check value upper and greatern then 0
val+= " "#proving spacing in string value
val += x.lower()#convert another value into lower case
else:#defining else block
val += x#hold value in val variable
i += 1#increment i variable value
print (val)#print value
Output:
Enter string value: StopAndSmellTheRoses
Stop and smell the roses
Explanation:
In the above python code, a string variable "value" is defined that inputs the value from the user end, and another variable "val" is defined for saving calculated value.
In the next step, for loop is declared, that uses if block to check input value and convert the input value first letter into uppercase and print all value with space. If the condition is false it will return the user input value.
Lee finishes entering all the data. Next, he wants to format the header row so it is easier to read and stands out from the rest of the table. What should Lee do to accomplish this task?
Answer:
A: Add shading to the top row
B: Change the style of the table
Explanation:
Just got the question myself and got the answer from it
Answer:
A B
Explanation:
i just did the assignment└|∵|┐♪
Assuming that a valid price should be between 30 and 50, what does the following code snippet do? final int MIN_PRICE = 30; final int MAX_PRICE = 50; int price = 0; Scanner in = new Scanner(System.in); System.out.print("Please enter the price: "); price = in.nextInt(); if (price < MIN_PRICE) { System.out.println("Error: The price is too low."); } else if (price > MAX_PRICE) { System.out.println("Error: The price is too high."); } else { System.out.println("The price entered is in the valid price range."); } This code snippet ensures that the price value is between 30 and 50. This code snippet only ensures that the price value is greater than 30. This code snippet only ensures that the price value is less than 50. This code snippet ensures that the price value is either less than 30 or greater than 50.
Answer:
This code snippet ensures that the price value is between 30 and 50.
Explanation:
If the price is not between 30 and 50 then the output will be "Error: ...."