Answer:There are 5 types of computers.
Explanation:(1)Super computer: are the fastest and expensive computer.super computer can do trillion calculations in every second.
(2)Mainframe: are similar to the super computers all use raw power focus on few tasks.
(3)Server computer: is a central computer that contain of collection data and program.
(4)Personal computer: is also known as a microcomputer.personal computer is all around can be used as productivity tool.
(5)Work station: are expensive computers and more complex and are intended one user at a time.
Answer:
the four types of computers are;
personal computerMainframe computersuper computersMini computersA user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verifies the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select two.)
A. IPCONFIG /REGISTERDNS
B. IPCONFIG /FLUSHDNS
C. IPCONFIG /RELEASE
D. IPCONFIG /RENEW
E. IPCONFIG /ALL
Answer:
a
Explanation:
none
WHAT ARE THE CONTENTS THAT WE SHOULD USE FOR THE PRESENTATION OF DIGITAL WORLD
Answer:
Introduction
Importance
Advantages
Disadvantages
Effects
Conclusion
What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network? Group of answer choices
Answer:
Network Access Control
Explanation:
A Network Access Control (NAC) system can deny network access to, quarantine, or restrict resources to a device before allowing the device access to a network. This keeps insecure nodes from infecting the network. For more information check out cisco's resources regarding NAC and it's uses and implementations.
1. Write a try-catch block. In try block, do the following thing: if the balance is less than 100, throw an InsufficientFund exception; else print out the message saying that there are enough money in the account. In catch block, simply print out the message saying that there is not enough money in the account.
2. Write a template function template
T max(T& variable1, T& variable2)
That returns the larger value of variable1 and variable 2.
Assume that class T has overloaded the operator >.
Answer:
(Assuming C++):
#1
try{
if (balance < 100)
{
throw "InsufficientFund";
}
else
{
printf("Sufficient funds in account.\n");
}
}
catch{
printf("Insufficient funds in account.\n");
}
---------------------------------------------------------------------------------------
#2
template <typename T>
T max (T& variable1, T& variable2)
{
return variable1 >= variable2 ? variable1 : variable2;
}
Explanation:
For this, the answer assumes the use of the C++ language since not specified in the problem.
For #1, the use of the try-catch statement is simply to check the value of the funds within an account. The question ask to check if the balance is under 100, to throw an "InsufficientFund" exception to be caught by the catch loop. Otherwise, print there is enough funds. If the exception is caught, the catch loop should simply print insufficient funds to the console. The above code accomplishes each of these things by assuming a variable called "balance" holds the value of the account and has already been declared. Additionally, the code uses the printf function to display the messages to the screen (Assuming stdio.h header has been included).
For #2, a template function called max was created to determine if variable1 or variable 2 had a greater value, and return the greatest variable. The code uses the ternary operator to test the expression greater than or equal to and returns variable1 if greater or equal, otherwise, it returns variable2.
Side note, I haven't coded in C++ in years so some syntax may be wrong, but either way this is the concept of the two questions asked (I think I'm syntactically correct though).
Cheers.
Which is an aspect of structural-level design? A. scaling B. player-adjusted time C. difficulty level D. radiosity
Answer:
D. radiosity
Explanation:
This is because in computers the definition of radiosity is an application of the elemental method of solving the equation for other particular scenes with surfaces that gradually reflects light diffusely.
Answer:
its d
Explanation:
im right
which is most harmful computer virus define
Answer:
Spyware is the most harmful virus.
It enters into someones computer as a spy and steals the ones personal information, data and other codes.
Explanation:
Mental state shift involves what?
Answer:
It involves a matter involving doubt, uncertainty, or difficulty that may be solved, problem ... getting into a frame of mind to be creative and solve problems.
Explanation:
Hope i am marked as brainliest answer
You should not define a class field that is dependent upon the values of other class fields: Group of answer choices In order to avoid having stale data. Because it is redundant. Because it should be defined in another class. In order to keep it current.
Answer:
The answer is "In order to avoid having stale data".
Explanation:
In this question, only the above-given choice is correct because follows the class-object concept, and the wrong choices can be defined as follows:
In this question, the second and third choices are wrong because its class field data value is not redundant, it should not define in another class.The third choice is also wrong because it can't define the class field to keep it current._____ should be scanned for viruses
Answer:
Computers/laptops should be scanned for viruses.
Your question has been heard loud and clear.
People's blood , the plasma in the people's blood should be scanned for viruses.
Thank you owo
Write a pseudocode algorithm which inputs numeric scores and outputs how many of them are over 100. The end of the data is signalled by a user input of -1.
Answer:
calculateCountGreaterThan100()
{
declare variable count with zero
while True
{
input numeric values from user
if user inputted value > 100
increment the count
if user inputted value == -1
break the loop
}
print the value of count
}
Explanation:
First of all, let us have a look at the meaning of a pseudocode:
A pseudocode is nothing but a informative way of expressing our code in simple plain English.
It is not written in programming language so it does not have any syntax rules.
Here, we are asked to write pseudocode algorithm for inputting numeric scores and output the number how many of them are greater than 100. The end of numbers is signalled by a user input of -1.
The answer is:
calculateCountGreaterThan100()
{
declare variable count with zero
while True
{
input numeric values from user
if user inputted value > 100
increment the count
if user inputted value == -1
break the loop
}
print the value of count
}
Here, we have declared a variable with initial count as 0.
Then, in a loop we are taking input from user in which user is giving integer input.
If the value is greater then zero, the count is incremented.
If the value is -1, we come out of the loop and then print the count value.
Pseudocode algorithm are algorithms that are implemented using pseudocodes, and it does not obey the syntax of a programming language.
The Pseudocode algorithmThe pseudocode algorithm is as follows:
count = 0
input num
while num != -1:
if num > 100:
count++
print(count)
The flowThe flow of the above pseudocode algorithm is as follows
First, variable count is initialized to 0Next, we take input for numNext, a loop is repeated until the input is -1During each loop, the inputs over 100 are countedLastly, the count of inputs greater than 100 is printedRead more about pseudocode algorithm at:
https://brainly.com/question/11623795
An Administrator wants to make a list of all prospects who complete the Contact Us form but only wants them to be added the first time they complete the form. If a prospect is ever removed from the list, they shouldn't be able to get added back to it. What is the best way to create this type of list
Answer:
The answer to this question can be defined as follows:
Explanation:
The easiest way to build such a list is by using an algorithm rule, where the prospects who complete the form are then matched with the rule and added to the list because the developer would also like to list of the all applicants, who fill out all the contact us Application, but still only prefer to also have them added when they fill-up the form first. When an outlook is ever omitted from the list, it should not be included.
A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution?
A. Power down the system and replace the CPU.
B. Power down the system and replace the power supply.
C. Install an additional case fan for proper ventilation.
D. Remove the side panel for proper ventilation.
Answer:
The answer is "Option B".
Explanation:
When the technician detects a smoke smell, which is coming from the computer system it means it will sort to solve this problem the technician will shut the system down and substitute electricity, at this, it overcomes the problem, and wrong choices can be defined as follows:
In choice A, It is wrong because in this system component may be destroyed.In choice C and D both are wrong because it is not a software and side panel problem.-__________ attribute specifies the height of the image.
Answer: The height attribute specifies the height of an image.
Explanation: Hope That Helps! (:
Instead of using the automatic toString() method with your classes, it is usually more useful to write your own ____ version of the toString()method that displays some or all of the data field values for the object with which you use it.
a. overloaded
b. static
c. protected
d. condensed
Answer:
The answer is "Option a"
Explanation:
The overloading is the most essential aspect in the java programming This function can achieve different features with the same method term. To obtain the required information fields or entity type, the toString() function is overloaded, and the wrong choice can be defined as follows:
In option b, It is wrong because it is a keyword.In option c, It is wrong because it is an access modifier.In option d, It is wrong because it is a type of programming.What did early computers use to store each bit?
Answer:
A vacuum tube
What is the role of bpo in growth of Indian economy ?
Answer:
BPO Role in India's Economic Growth
The role played by BPOs in boosting India's economy shows that the IT and ITeS sector have been contributing largely to the economic growth of India. The growth in the contribution of BPOs to Gross Domestic Product has shown a steady rise from 1.2% to 5.4%.
Are bpos safe for organisations ? State your views on it
Answer:
No
Explanation:
Business process outsourcing is the act of contracting aspects of a business that are considered secondary to third-party vendors. These aspects of the business could range from Information Technology to accounting or quality assurance. Business process outsourcing has its advantages and disadvantages.
While it ensures flexibility and cost savings in the business, I believe that;
1. Releasing sensitive information about a business to people who are not within the confines of a business, could result in a breach in data handling. Sensitive information can no longer be entirely controlled by the business owners once in the hand of outsourced contractors. Information might get into the hand of hackers who can compromise business activities.
2. Given that some BPO's might require sourcing workers from countries abroad, and also considering the fact that different countries have different criteria as to what constitutes data handling breaches, it might sometimes be hard to enforce safety standards.
3. Quality control might also not be easy to achieve, and could be worsened by language and communication barriers.
4. If the organizations do not track their expenses religiously, they might end up spending more on outsourcing than they would have with employees. This might because they underestimated the pricing.
To handle these safety issues, the business owners might have to develop some very stringent methods of regulating Business Process Outsourcing.
How does vibrancy affect a web page design? - Changes the emotion of the page - Decreases site traffic - Increases reading difficulty - Keeps color choices similar
Answer:
It changes the emotion of the page.
Which of the following are examples of interpreted languages? Each correct answer represents a complete solution. Choose two. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Markup B Compiled C Query D Scripted
Answer:
The answer to this question can be defined as follows:
Explanation:
The given question has more than one question and some of the choices are missing so, their correct solution and the question with the choices can be defined as follows:
1)
Interpreted languages:
The interpreted language is a kind of programming language, in which most of the applications carrying out instruction freely and openly, without having compiled a program. so, the types of the programming language are " PHP, Perl, Ruby, and Python"
2)
The answer is "Post a glossary or FAQ page".
explanation:
This section is used to covers the data. It is used as the goal of the company or business to obtain answers to these questions. Those who may also use your FAQ page for a first contact point for clients who are searching for answers before contacting you directly.
please find the attachment.
You’ve just completed a survey of the wireless signals traversing the airspace in your employer’s vicinity, and you’ve found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
A. Rogue access point
B. War driving
C. Bluesnarfing
D. Hidden node
Answer:
A. Rogue access point
Explanation:
A rogue access point is a point that is wireless and installed on a network that is safe and secure without taking any permission from a local administrative network (LAN). It could be done by an employee or a person who is a malicious attacker
Therefore according to the given situation, since there is an unauthorized AP i.e too strong which is mid of 100-acre campus so it would be a threat of Rogue access point and the same is to be communicated to the boss
A virus does not harm the ________ of a computer
Answer:
Hardware part
Explanation:
The hardware part of computer is not harmed by virus.
I hope this will be helpful for you
Answer: Hardware part
Which statement about tensile stress is true? A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object. B. Forces that act perpendicular to the surface and squeeze an object exert a tensile stress on the object. C. Forces that act parallel to the surface exert a tensile stress on the object. D. Forces that decrease the length of the material exert a tensile stress on the object.
Answer:
The correct option is;
A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object
Explanation:
A material under tensile stress has axial forces tending to stretch the material and cause elongation. It is the force per unit area externally applied that results in stretching
The definition of tensile stress is the magnitude or amount of applied force on an elastic material divided by the cross-sectional area of the material perpendicular to the direction of the applied force
Therefore, the tensile stress comprises of forces that act perpendicular to a given surface pulling the sections apart.
Using a material on the internet for your assignment without acknowledging the source is known as A. Plagiarism B. Piracy C. Ethical D. Copyright
Answer:
A. Plagiarism
Explanation:
Plagiarism is simply the act of representing an author's thoughts , ideas , expression , writings as one's own.
While investigating a 4-year-old PC that is taking an unusually long time to boot, a technician discovers that the BIOS is rediscovering the hardware system at every boot. What should the technician do to resolve the problem
Answer:
learn and train it to make it boot faster
Explanation:
Well we know that the PC is old and it takes a long time to boot also the BIOS is rediscovering the hardware system at every boot so he should make it reboot and learn and train it to make it boot faster
Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can constantly read all information entering the computer through the NIC by decoding the information encapsulated in the data packet. Passive sniffing is one of the types of sniffing. Passive sniffing refers to:
Answer:
The right answer will be "Sniffing through a hub".
Explanation:
Packet sniffer seems to be a device that listens for transmitted data on what seems like a channel. Sniffing enables the detection of data by individual people as it has been transferred throughout a cable. Appropriate nodes are using this methodology to make a diagnosis of connection issues, or even just harmful programs to obtain confidential information, like authentication and encryption.