An intranet is an internal corporate network built using Internet and World Wide Web standards and products.
What is the definition of intranet?This is known to be small or restricted computer network used by a group to communicate with one another is described as an intranet. An intranet is a private computer network that only employees of a specific workplace can access. noun.
The kind of internet utilized privately is an intranet. Since it is a private network, only authorized users can access the intranet. The intranet has a small user base and only offers a little amount of information to its users. various network types
An intranet is a computer network used exclusively by employees of a company for information exchange, improved communication, teamwork tools, operational systems, and other computing services.
Therefore, An intranet is an internal corporate network built using Internet and World Wide Web standards and products.
Learn more about intranet from
https://brainly.com/question/13139335
#SPJ1
this is computer programming and it confuses me very much
Answer:
Using a loop or using the power function from a math library.
Explanation:
Really the question needs a bit more context. But if you want to calculate [tex]a^{b}[/tex]
and b is a whole number, you could create a loop with b steps and keep multiplying by a.
Alternatively, you can use a power function such as pow(a,b) from math.h in the C programming language.
Computer applications can help us to stay organized, but they can also add a lot of complexity! What are some ways you use applications to help streamline your life? What else would you like to use to further improve your organization?
The ways that a person can use applications to help streamline your life are:
It helps a person to delegate one task.It helps to De-clutter a person's workspace.It helps to make a system for a regular task. It helps to break as well as cut down one's communicationIt helps to plan out your week.What else would you like to use to further improve your organization?Application's that can give constructive feedback. ...Applications that helps to Organize and optimize tasks. .What is the meaning of computer application?Computer Application is known to be a term that connote a kind of an identifiable computer software process that is often used to make as well as gets back communications or transactions on a person's behalf or on behalf of an organization which it stands for.
Therefore, The ways that a person can use applications to help streamline your life are:
It helps a person to delegate one task.It helps to De-clutter a person's workspace.It helps to make a system for a regular task. It helps to break as well as cut down one's communicationIt helps to plan out your week.Learn more about Computer applications from
https://brainly.com/question/24264599
#SPJ1
Janitor and Cashier classes have a print function that is similar. How can we refactor this code to reduce repetition?
A sample code to show how to refactor a code to reduce repetition if two classes have a print function that is similar:
The Codepublic abstract class DeviceMessageBase
{
public void Connect()
{
// do connect things
}
public void WaitMessage()
{
// do wait message things
}
public void ParseMessage()
{
// do parse message things
}
public abstract void ProcessMessage();
}
public class DeviceMessageNavigator : DeviceMessageBase
{
public override void ProcessMessage()
{
//**//NAVIGATE MESSAGE(Pass it to somewhere else)**
}
}
public class DeviceMessagePrinter : DeviceMessageBase
{
public override void ProcessMessage()
{
//**//PRINT MESSAGE**
}
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
What character, when used at the beginning of the constructor name in a class, makes the class variables have a scope limited to the function?
* (an asterisk)
# (a pound sign)
$ (a dollar sign)
_ (an underscore)
Answer:
_ (an underscore)
Explanation:
The underscore character.
__init_ and __str__ have double underscore characters at the beginning and end of the function name.
Correct answer edge 2020
Answer:
The answer to your question is _ (an underscore).
I hope this helps you out and I hope that you have a wonderful day.<3<3<3
Explanation:
the basis of modern technology is traditional technology
Answer:
A customized innovation is of specialized advances where some unique things are added to extend it. The present day advances have been based on the fundamental structures purposes and working of the traditional technologies.
Hence, it can be concluded that “The basis of modern technology is traditional technology”
HOW TO WRITE IN MACHINE STENO?
1.we have a meeting in our office during the afternoon.
2.inbetween of the left and rightwe have the vowel.
3.The left side of the keyword is didecated to the beginning of the syllable.
Answer:
so first download the app if u have a mac it's easy
Explanation:
app name I guess you know so u can easily find and get it
Imagine that you are designing a smishing scam that involves sending text to people to entice them to go to a website and provide personal information that
you can use to access their checking account.
Open a new Microsoft® Word document and craft a text message that would be difficult for people to ignore.
Design a simple web page that would look legitimate to people who bank at your bank and that would capture their checking account number and PIN.
Answer:
Explanation:
i attached picture down check it below
Which of the following is NOT an e-reader you would use as an alternative to carrying around a set of textbooks?
Answer:
Which of the following is NOT a benefit of a word processing application?
Explanation:
You want to see data on charters flown by either Robert Williams (employee number 105) or Elizabeth Travis (employee number 109) as pilot or copilot, but not charters flown by both of them. Create the table that would result from applying the SELECT and PROJECT relational operators to the CHARTER table to return only the CHAR_TRIP, CHAR_PILOT, and CHAR_COPILOT attributes for charters flown by either employee 105 or employee 109.
Answer:
So, what is the question?!
Explanation:
Question # 1
Multiple Choice
What will be the output of the following program?
def average(a, b):
total = a + b
return total / 2
ave = average(7,11)
print("Total", total)
print ("Average", ave)
A. an error statement since total's scope is limited to the average function.
B. Total 18
Average 9
C. Total18
Average9
D. an error statement since average is a keyword.
Answer:
an error statement since total's scope is limited to the average function.
Explanation:
The scope of total is the function average. Code outside of the function does not have access to its value.
Correct answer edge 2020
Answer:
an error statement since total's scope is limited to the average function.
Explanation:
The scope of total is the function average. Code outside of the function does not have access to its value.
Correct answer edge 2020
Unitary method question 1) If the cost of 32 copies is Rs 960, how much more cost is of 3 dozen copies ?
Answer:
the cost of 3 dozen copies is Rs 1080.
Explanation:
32 copies =Rs 960
1 copy =Rs 960÷32
= Rs 30
3 dozen = 3 × 12. =36
36 copies = 36 × 30
= Rs 1080
The term structure, as it relates to programming, refers to the decisions you make to design your program to best meet its objective. Coral provides features to create clean, efficient code. How can the basic if/elseif/else control statements help meet structural design objectives in your code?
Answer:
Explanation:
if/elseif/else control statements help accomplish efficient code since it provides a condition. The program analyzes the code and determines if certain criteria are met, if so then it continues down a certain pre-defined path which would be the most efficient path towards the main program objective. If these criteria are not met then the code would follow the next most efficient path. This is all controlled through if/elseif/else statements. They ultimately provide various options for reaching the final objective in an order of most efficient to least efficient.
the acronym PC stands of
Answer:
personal computer
Explanation:
It stands for personal computer
how do i create a business process flow chart?
Answer:
Determine the main components of the process. ...
Order the activities. ...
Choose the correct symbols for each activity. ...
Make the connection between the activities. ...
Indicate the beginning and end of the process. ...
Review your business process diagram.
Explanation:
Which steps can you take to remove all the data you've just typed from a cell?
Click the cell, then press Delete.
Click Undo on the Quick Access Toolbar.
Click Cut on the Clipboard group.
Press Ctrl+Z.
Press Ctrl+Shift.
Explanation:
Ctrl+Z
Click and press Delete
Click Undo
select the correct answer
> var direction = []; directions.push("walk to corner");//1 directions.push("turn right");//2 directions.push("walk one block");//3 directions.push("turn left");//4 directions.push("walk to gray house");//5 directions.push("go down the strairs");//6 directions.push("knock on the pink door");//7 console.log(directions); "knock on the pink (7) ["walk to corner", "turn right", "walk one block", "turn left", "walk to the gray house", "go down the astairs" door",]
is dis code correct
Answer:
no it's not correct.........
________________ is one example of a career that is available within the web and digital communications path.
Question 13 options:
Multimedia artists and animators
Engineer
Police Officer
Programmer
Answer:
multimedia artists and animators
HELP
Question 1 (1 point)
GIF, JPG, and TIFF are raster-based.
O True
O False
It is true. GIF and JPG are mostly rasted (can be a vector), and TIIFF is rasted.
Environment varies firm to firm
of
Select one:
O True
tion
False
Answer:
true
...................
project members are called change agents. why?
A project members are called change agents because they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.
What does being a change agent mean?In regards to business, a change agent is known to be called any body be it a man or a woman that helps to promotes as well as supports a new method of doing things inside of the company, even if it is the use of a new method, the taking in of a new management structure or the changing of an old business model to those of a new one.
Therefore, based on the above, A project members are called change agents because they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.
Learn more about project members from
https://brainly.com/question/24248709
#SPJ1
Give five (5) words that describes about computer.
Explanation:
C=Commonly
O=Operated
M=Machine
P=Particularly
U=Used for
T=Training
E=Education
R=Research
hope it helps you
What is machine learning?
What is the missing line of code?
class vehicle:
self.model = strModel
self.color = strColor
def
_str_(self):
return self.model +
+ self.color
Answer:
def__init__(self,strModel,strColor):
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Answer:
Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.
Typically you will not find biometric devices in _________ security buildings. Low High Minimal Medium
Answer:
Low
Explanation:
Biometrics security systems are hardware scanners that are useful for capturing the biometric of individuals as a means of verifying identity. These scans would be matched against the saved database and in turn access would be approved or denied to the system. In other words, biometric security gives the human body the “key” to unlock your access into buildings.
You will not find such devices in low security buildings.
If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
A. O(N)
B. O(logN)
C. O(logN)+O(N)
D. O(NlogN)
Answer:
D. O(NlogN)
Explanation:
The computation of the overall algorithm cost is as follows:
Given that
O(logN) + O(N) × O(logN) + 1
In the case of complexity we considered the high order that dominates the other terms
Thus, that term would be
O(N) × O(logN)
It could be rewrite as
O(NlogN)
Hence, the correct option is D.
All the other options are wrong
Answer:
D. O(NlogN)
Explanation:
the overall algorithm cost would be: O(NlogN).
The Window logo at the top left hand side of the page is known as
Answer:
The title bar is a horizontal bar located at the top of a window in a GUI. It displays the title of the software, name of the current document or file, or other text identifying the contents of that window.
Explanation:
Write a program that takes in three integers and outputs the median value (not the largest or smallest value). End the output with a newline. Ex: If the input is: 7 1 4 the output is: 4
in C++ please
Imani needs to copy text from one document into another document. She needs the pasted text to retain its original appearance. When she pastes the text, she should use which of the following settings?
Keep Text Only
Use Destination Theme
Merge Formatting
Keep Source Formatting
Answer:
Keep Text Only
Explanation:
Because why would it be any of the other ones so it would be that
Imani must transfer text from one paper to another. She ought to preserve the formatting from the original content when she pastes it. Hence, option D is correct.
What is a Document?A file produced by a software program is a computer document. Originally used to describe only word processing documents, the term "document" is now used to describe all saved files. Text, photos, music, video, and other sorts of data can all be found in documents.
An icon and a filename are used to identify documents. The filename gives the file a specific name, whereas the icon depicts the file type visually. The majority of filenames for documents also contain a file extension, which indicates the file type of the document. For instance, a Photoshop document might have a.PSD file extension, whereas a Microsoft Word document would have a.DOCX file extension.
To get more information about Document :
https://brainly.com/question/2901657
#SPJ6