Answer:
The personal preferences that can be saved are
A. Customize your bookmark bar
C Change your home page
D Enable safe browsing in your privacy setting
Explanation:
The Bookmark manager can be used for personal customization of the bookmarks in chrome
The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks
The personally preferred homepage can be selected under appearance category in the settings menu
The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.
I’m trying to get answers from Brainly and it’s not showing up. I’ve been refreshing the browser, but it’s the same. I’ve never had this problem before can someone help me out here?
Answer:
We are having the same problem
Explanation:
A network administrator has statically configured the LMI type on the interface of a Cisco router that is running Cisco IOS Release 11.2. If the service provider modifies its own LMI type in the future, what step must the network administrator take
Answer:
The answer is "The LMI model should be compatible with the supplier dynamically for the network manager".
Explanation:
The term LMI stands for the "Local Management Interface", it is a Cisco technology, in which the signaling protocol was used in between routers and transmission frame switches to share data in timekeepers, global addressing, multipathing as well as the present state of virtual socks for various purposes, in which it is mainly used for "dynamically setting, in which the network administrator provides compatibility with the service provider".
You are instructing a user on how to properly use a new laptop. He asks about the special function keys that are used to perform tasks such as toggling the display or adjusting the display brightness. Which key should the user strike in combination with the special function keys
Answer:
The Fn key.
Explanation:
In this scenario, you are instructing a user on how to properly use a new laptop. He asks about the special function keys that are used to perform tasks such as toggling the display or adjusting the display brightness.
The user should strike the "Fn" key in combination with the special function keys.
In Computer science, the special function keys found on the top row of a keyboard are the F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11, and F12 keys. Each of the special function keys just like their name suggests are used to perform different tasks respectively as defined by the operating system of a computer.
Fn is an acronym for function. In order to use the special function keys, a user must first hold down the Fn key before pressing the specific special function key which then triggers functions configured to use this key.
For instance, "Fn+F2" is to reduce brightness on the Windows operating system. Also, "Fn+F12" is to increase audio volume on the Mac operating system.
"PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a ______."
Answer: cookie
Explanation:
A cookie is a small welcome file contains the information in the form og letters and numbers.It is downloaded on to a computer when a website is visited.Hence, if a company uses a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site to generate a personalized welcome message to its visitors. This small file is called a cookie.
G Suite for Education offers which benefits to educators? (Select all that apply.) Select All Correct Responses Android apps available on select chromebooks Domain admin can install apps All apps are approved by your organization App permissions reviewed by domain admin for student safety
Answer:
The correct options are;
1) Android apps available on select chrome books
2) Domain admin can install apps
3) App permissions reviewed by domain admin for student safety
Explanation:
Select Chrome books work with android apps including does part of G -Suite for Educators such , Class room, Contacts, Drive, Vault, Docs, For ms, Sheets
Domain administrators can manage school owned devices and applications including installing an app
Part of managing the domain includes the review of per missions for apps for student safety.
a small storage device that can be carried in a pocket
Answer:
USB is a small storage device that can be carried in a pocket
You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to the existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?
Answer:
Internetwork
Explanation:
Internetwork refers to the interconnection between the multiple networks of the computer through which the message could be exchanged with one another and in this, no hardware network is required. The other word of the internetwork is internet
Therefore in the question it is mentioned that you want to double the workstations i.e 50 to 100. Also, new peoples would be work in a distinct unit of business
So this situation represents the internetwork
A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install.
Which of the following steps should the user take next?
A. Back up all user data and perform a factory reset.
B. Check for sufficient available storage space.
C. Disable full device encryption.
D. Generate a new public key.
The correct answer is B. Check for sufficient available storage space.
Explanation:
One of the factors that can cause it is not possible to install a new app is insufficient storage as space in the mobile device is needed to save the app. This can be easily solved either by deleting apps and other content or expanding the memory available through a Micro SD card. Also, before attempting any major procedure such as a complete reset it is important to check the storage space availability. In this context, the user should check for sufficient available storage space (option B) because this might be the cause of the issue she is experiencing; also, this is a basic step before considering others such as performing a factory reset.
Your program will read in an existing text file. You want the program to terminate if the file does not exist. Which of the following indicates the correct code for the main method header? public static void main(String[] args) throws FileNotFoundException public static void main(String[] args) throws UnknownFileException public static void main(String[] args) public static void main(String[] args) throws FileMissingException
Answer:
FileNotFoundException
Explanation:
write a qbasic program to count the number of words present in the given word
Answer:
1.1
Explanation:
Write the full forms of the following:
a. GIGO
b. MHz
c. BBS
d. CBT
e. KB
f. ICU
g. CAI
h. WBT
i. IPM
j. CAS
k. ICT
l. ATM
Answer:
The abbreviation of the given points is described below.
Explanation:
GIGO stands for "Garbage In/Garbage Out".MHz stands for "Megahertz".BBS stands for "Bulletin Board System".CBT stands for "Computer-based training".KB stands for "Knowledge Base".ICU stands for "Intensive Care Unit".CAI stands for "Common Air Interface".WBT stands for "Web-based training".IPM stands for "Intel Power Monitor".CAS stands for "Channel Associated Signaling" and "Customer Alert Signal".ICT stands for "Information and Communication Technology".ATM stands for "Automatic Teller Machine".Answer:
Answer:
The abbreviation of the given points is described below.
Explanation:
GIGO stands for "Garbage In/Garbage Out".
MHz stands for "Megahertz".
BBS stands for "Bulletin Board System".
CBT stands for "Computer-based training".
KB stands for "Knowledge Base".
ICU stands for "Intensive Care Unit".
CAI stands for "Common Air Interface".
WBT stands for "Web-based training".
IPM stands for "Intel Power Monitor".
CAS stands for "Channel Associated Signaling" and "Customer Alert Signal".
ICT stands for "Information and Communication Technology".
ATM stands for "Automatic Teller Machine".
THANKS
0
Explanation:
A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooting theory that the technician will perform to resolve the laptop’s issue?
A. Document finding, actions, and outcomes
B. Identify the problem
C. Establish a theory
D. Establish a plan of action to resolve the problem
Answer:
B
.Identify the problem
What is the output of the following code fragment? int i = 1; int sum = 0; while (i <= 11) { sum = sum + i; i++; } System.out.println("The value of sum is " + sum); The value of sum is 65. The value of sum is 66. The value of sum is 55. The value of sum is 56.
Answer:
The value of sum is 66
Explanation:
i = 1
sum = 0
while (i <= 11) {
sum = sum + i;
i++;
}
i = 1
sum = sum + isum = 0 + 1sum = 1i = 2
sum = sum + isum = 1 + 2sum = 3i = 3
sum = sum + isum = 3 + 3sum = 6i = 4
sum = sum + isum = 6 + 4sum = 10i = 5
sum = sum + isum = 10 + 5sum = 15i = 6
sum = sum + isum = 15 + 6sum = 21i = 7
sum = sum + isum = 21 + 7sum = 28i = 8
sum = sum + isum = 28 + 8sum = 36i = 9
sum = sum + isum = 36 + 9sum = 45i = 10
sum = sum + isum = 45 + 10sum = 55i = 11
sum = sum + isum = 55 + 11sum = 66i = 12 --> does not comply with the condition "i < = 11", the while loop is over
What is a path and how do you know that it is filled and selected
Explanation:
A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.
For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.
Pete would like to respond only to users within his organization with an automatic reply. He is configuring the automatic response. Which option should he select? Outside my organization tab Inside my organization tab Only send during this time range Do not send automatic replies
Answer:
It is inside my organization tab
Explanation:
Correct on edg
There are tabs for sending automatic responses to university employees under the “Inside My Organization” and “Outside My Organization" headings in Outlook and OWA, respectively. You have the option of setting several messages for each. Thus, option B is correct,
What impact organization with an automatic reply?You can interact with your current and new clients about crucial information they might need in order to do business with you by turning on automated answers. By visiting your Inbox, you can update and disable automated responses whenever you want.
People who send you emails may worry why you haven't responded if you will be out of the office or otherwise unavailable to check them.
With the help of the Automatic Replies tool, you may write a response that will be sent once to each individual that messages you. Outlook Online is covered by this article.
Therefore, It is inside my organization tab.
Learn more about automatic here:
https://brainly.com/question/20778111
#SPJ2
Thanks to the availability of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers who no longer struggle to find information they need to make sound decisions or do their jobs.
a. True
b. False
Answer:
False
Explanation:
The advent of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers who no longer struggle to find information they need to make sound decisions or do their jobs.
It has made information flowing through companies to be readily available to executives, managers and workers. It helps workers to make sound decisions and discharge their duties effectively.
What are green skills .Write about some of the areas in which green skills contribute to the sustainable development?
Answer:
Green skills also known as skills for sustainability are the combination of knowledge, values, attitudes, technical skills required in order to promote sustainable societies and economies as well as to protect the environment in daily endeavors including industrial, business and communal activities to meet environmental regulations and reduce the impact of climate change
Explanation:
The development of alternative wind, water, and solar power supply to support fossil fuel based power generation is shaping the energy economy dynamics in developing countries that have lower penetration of commercial electricity and had to make use of environmentally unfriendly and expensive power generating sets with limited power supply duration
Green kills has improved power penetration to very remote locations in such economies as well as promoted the attainment of sustainable development goals.
What is the output of the following code snippet? final int COST = 583; int digit = COST % 10; if (digit != 500) { System.out.println("500"); } else { System.out.println("Not 500"); } There is no output due to compilation errors. 500 Not 500 500 Not 500
Answer:
500
Explanation:
COST = 583583 % 10 = 3
digit = 3if (digit != 500) then print "500"
3 != 500 ---> System.out.println("500");
Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their lamp is not lit; others complain that their lamp is on, but there are no new messages. You suspect that the server is not making MWI calls. How can you quickly check whether or not this is the case
Answer:
You should run the port activity report.
Explanation:
In this scenario, several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of message waiting indicator (MWI) problems. Some have new messages, but their lamp is not lit; others complain that their lamp is on, but there are no new messages. You suspect that the server is not a making message waiting indicator (MWI) calls.
In order to quickly check whether or not this is the case, you should run the port activity report.
A message waiting indicator (MWI) can be defined as a Cisco proprietary lamp, flashing liquid crystal display (LCD) panel, or special dial tone installed on the phones of a user which enables him or her to know a voice message waiting. When a message is waiting, the phone system is notified by the Cisco Unity Connection to activate the message waiting indicator on the user's phone.
The procedure for running the port activity report are;
1. Click on "reports" in the tool menu of the Cisco Unity Connection Serviceability.
2. Then click on "port activity report" on the serviceability report page.
3. Select the necessary options and lastly, click on "generate report."
Vulnerabilities and risks are evaluated based on their threats against which of the following?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Data usefulness B Due care C Extent of liability D One or more of the CIA Triad principles
Answer:
The answer is "Option D".
Explanation:
The CIA Trilogue is a model for interpretation of security policies within an organization that is designed for direct confidentiality, integrity, and availability. This design is also sometimes related to it as the AIC triad, which avoids overlap with the central intelligence community.
In option A, it is used to process and analyze the data, that's why it is wrong. In option B, It is wrong because it tracks the measurement of financial assets, determines risks in an organization, and focus on areas for further study. In option C, It is wrong because it is regulated by contracts.Are bops safe for organisations ? State your views on it
Answer:
Explanation:
Crew members need to remember that blowout prevention equipment is heavy any very unforgiving. Working around BOPs (nippling up or down, ram replacement, etc.) puts workers in a high hazard area. All personnel involved in the operation must be fully alert and knowledgeable in their tasks. All crew members should participate in the Pre-Job Safety meeting. Communications are critical in this operation and all personnel should be aware of the signals to be used.
Which statement about comments is false? Select one: a. Lengthy comments can cause poor execution-time performance. b. Comments do not cause any machine language object code to be generated. c. Comments may begin and end with /* and */, respectively. d. Programmers insert comments to document programs and improve program readability.
Answer:
The answer is "Option a".
Explanation:
In programming, the Comment is also known as the description of the source code or the program, which increases the readability of the programmer. It aims to facilitate understanding of it's code to humans, and when we this code the compilers and interpreters typically avoid it, and correct choices can be defined as follows:
In choice b, There is no use of comments in the compilation. In choice c, the multiple line comment starts with starts and ends with /* and */. In choice d, it increases the program readability.Tom walks into the accounting department and walks into a mess! User A can't access the Internet, User B has forgotten her password, User C's system is overheating to the point of smoking and the administrator is worried there might be a virus on all the systems. Whose system should he address first
Answer:
User C.
Explanation:
As per the given details, the problem of user C's system must be addressed first due to the seriousness of his case. His computer is excessively overheating up to the smoking point and if his problem is not addressed soon, it will damage the vital parts of the computer or may also explode. The other users having the problem of inability to access the internet or issue of forgotten password can be addressed later as these are minor problems that do not have as such consequences. Thus, user C is the correct answer.
Scenario: The Internet Explorer 8 browser is being used to display a web page with an audio player but the audio element displays nothing on the page. Read the following code snippet and select the reason for the incorrect display from the choices below.
width="160" height="150">
Sparky the Dog (.mov)
A. The controls attribute should be controls="yes"
B. There are too many source elements.
C. The file extension .ogg is incorrect.
D. The MIME type values are incorrect.
Answer:
nose
Explanation:
what is the base number of binary, decimal and octal?
Answer:
Explanation:
Answer:
0 and 1
Explanation:
What is the function of a primary key in a table? (A.)to uniquely identify each record in the table,(B.)to uniquely identify foreign keys in the table,(C.)to secure table data,(D.)to secure the foreign keys in the table
Answer:
A. To uniquely identify each record in the table
Explanation:
From the list of given options, the option that best describe the primary key is A.
For better understanding of what primary key is all about, I'll make use of the following illustration.
Take for instance; the following relational table fields and records
SN ----- Name ----- Age
1 ------- John ---------15
2------- Peter ------- 17
3 ----- Ruth ----------16
If I've set the primary key of the above table to be SN, this means that no two records can have the same SN because each SN value is unique to every row.
Similarly,if I've set the primary key as Name, then there can only be one occurrence of John, Ruth or Peter because each of these are unique to their rows.
Answer
A.)
Explanation:
hope this helps
Which of the following statements is true? a. Predicate methods typically test a condition and modify the object on which they're called. b. Predicate methods typically do not test a condition and do not modify the object on which they're called. c. Predicate methods typically test a condition and do not modify the object on which they're called. d. Predicate methods typically do not test a condition and modify the object on which they're called.
Answer:
C
Explanation:
Predicate methods typically test a condition and do not modify the object on which they're called.
Research on the possibility of “AI technology” in various field of mathematics education
Answer:
In the last few years, there have been many initiatives to integrate AI technology to improve education.
Explanation:
For example, in Uruguay, the Plan Ceibal developed the “Mathematics Adaptive Platform”, which produces personalized feedback based on an analysis of the student´s skills, and has already shown a positive result on the learning process. The advantages perceived were the immediate response, independence of the students, easy corrections, and the promotion of group work.
In Ecuador, evaluations in language and mathematics were used to develop personalized lessons through AI software in the project “Más Tecnología”, also with positive outcomes.
In Kenya, Maths-Whizz also provides a personalized AI tutor that shapes the learning experience based on the student´s abilities.
Finally, China´s Next Generation Artificial Intelligence Plan aims to make that country the world’s capital of AI technology by 2030 by increasing enrolment in AI studies and integrating it into the study of different disciplines such as mathematics.
1. Who is the head of the family of the Lhops?
This question is incomplete, here´s the complete question.
Read 'Untrodden World of Lhops', by John Michael Chiramal
Who is the head of the family of the Lhops?
Answer: the maternal uncle
Explanation:
The Lhops or Doyas are one of the smaller communities of Bhutan, isolated from the conventional rules of the Bhutanese society, they have the maternal uncle as the head of the family.
Not only he has complete authority over the family´s everyday life, but he´s also in charge of the children´s upbringing and providing them with an inheritance of his property.
Suppose that instead of swapping element A[i] with a random element from the subarray A[i..n], we swapped it with a random element from anywhere in the array: PERMUTE-WITH-ALL (A) 1, n = A.length 2, for i = 1 to n 3, swap A[i] with A[RANDOM(1, n)] Does this code produce a uniform random permutation? Why or why not?
Answer:
The answer to this question can be defined as follows:
Explanation:
Its Permute-with-all method, which doesn't result in a consistent randomized permutation. It takes into account this same permutation, which occurs while n=3. There's many 3 of each other, when the random calls, with each one of three different values returned and so, the value is= 27. Allow-with-all trying to call possible outcomes as of 3! = 6
Permutations, when a random initial permutation has been made, there will now be any possible combination 1/6 times, that is an integer number m times, where each permutation will have to occur m/27= 1/6. this condition is not fulfilled by the Integer m.
Yes, if you've got the permutation of < 1,2,3 > as well as how to find out design, in which often get the following with permute-with-all chances, which can be defined as follows:
[tex]\bold{PERMUTATION \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ PROBABILITY}[/tex]
[tex]\bold{<1,2,3> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 4/27= 0.14 }\\\bold{<1,3,2> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}\\[/tex]
[tex]\bold{<2,1,3> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}\\\bold{<2,3,1>\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}[/tex]
[tex]\bold{<3,2,1> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 4/27=0.14}[/tex]
Although these ADD to 1 none are equal to 1/6.