Pls help me pls I’m struggling

Pls Help Me Pls Im Struggling

Answers

Answer 1
you have it correct

Related Questions

A user is configuring an email client application and decides to use the TCP/IP suite protocol that will store all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. This protocol will store the email messages on the email server until the user explicitly deletes them.Which of the following TCP/IP port numbers will the client application typically use while using this protocol to contact the email server?A. 21B. 80C. 110D. 143

Answers

Answer:

D. 143

Explanation:

A server that allows the entire management of an email account through more than one email client such that the clients the messages of the clients are stored on the server pending being deleted by the user, is an IMAP server

The port that the IMAP server listens to is the port number 143, therefore, the client application typically makes use of port 143 while using the TCP/IP protocol to contact the email server

After completing initial diagnostic procedures and allocating system resources, a startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility. This option is commonly referred to as a:

Answers

Answer:

Boor sequence

Explanation:

Write either True or False. a) Software is touchable part of computer system. b) System software provides easy interaction between user and computer c) Every computer needs to have own operating system. d) A computer can only understand the program written in assembly language. SANJIWANI Computer Book 7​

Answers

Answer:

A: False B: False C: True D: False

Explanation:

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe

Answers

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

1. .……............. can be considered as raw data.

(a) Sithum’s G.C.E. (O/L) examination results

(b) Z-Score of G.C.E. (O/L) examination results

(c) The average marks of students of G.C.E. (O/L) examination

(d) The top ten total marks of students of G.C.E. (O/L) examination

Answers

Answer:

(a) Sithum's G.C.E. (O/L) examination results

Explanation:

Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete

Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.

Which of the following are characteristics of centralized version control systems? Select 3 options.

A full copy of all project files is stored on each developer's computer.

Changes to the project are stored in a log file on each developer’s computer.

It allows many developers to work on the same project from anywhere at the same time.

Project files are maintained in a central repository.

The process may require file locking, depending on file type.

Answers

Answer:

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Explanation:

The two main types of version control system are the centralized version control system and distributed control system

The centralized version control system is a control system whereby all programmers work on and make their individual changes to a single single copy of the project stored and maintained in a central repository, such as a server

In order to solve the problem of several developers working on each others work simultaneously, a centralized version control system makes use of the lock-modify-unlock model

The three options are therefore;

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Answer:c d e

Explanation:

What is the top 3 cloud provider in the world with statics or data including the example and reason(s).

Answers

Answer:

Amaz*n

Micros*ft

G*ogle

Explanation:

The top three cloud providers in the world right now with respect to our answer above have the following popular products: Amaz*n web services(AWS), Go*ogle Cloud Platform(GCP), Micros*ft Azure services. Why? These guys, notably Amazon(being number 1 cloud provider in the world) are largerly pioneers when you think anything "the cloud". Amazon for instance is known for its great reliability and large investment into cloud infrastructure and services. Simply put, these guys have the deepest pockets and market to keep being the top cloud providers in the world. They are the world's most valuable companies in the world with Amazon and Microsoft worth over 1 trillion dollars. A noteworthy statistic, Amazon's most profitable business, AWS has grown at a steady rate of 30% in the last year, raking over 10 billion dollars in first quarter of 2020.


What types of customizations have you or would you make to your operating system, and why?

Answers

Answer:

Explanation:

I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.

A java program is composed of data members and functions.​
true or false ?

Answers

Answer:

true

Explanation:

A company developed a web application and deployed it on a fleet of EC2 instances that uses Amazon SQS. The requests are saved as messages in the SQS queue, which is configured with the maximum message retention period. However, after thirteen days of operation, the web application suddenly crashed and there are 10,000 unprocessed messages that are still waiting in the queue. Since they developed the application, they can easily resolve the issue but they need to send a communication to the users on the issue. What information should they provide and what will happen to the unprocessed messages?

Answers

Answer: Tell the users that the application will be operational shortly and then all the received requests will be processed when there's a restart of the web application.

Explanation:

After the development of the application, even though the issue can be resolved, a communication needs to be passed across to the users.

The information that should be provided is that the users should be told that the application will be operational shortly after which the received requests will be processed when there's a restart of the web application.

Which of the following statements about software licensing are true? Select 3 options.

A. Both proprietary and open-source software can be modified and redistributed.

B.Free software does not come with a license.

C.Open-source software allows developers to create new software more quickly and inexpensively.

D. Proprietary software licenses are more restrictive than open-source software licenses.

E. An end-user license agreement protects both the owner of the software and the purchaser.

Answers

Using software licensing concepts, it is found that the correct options are given by:

A. Both proprietary and open-source software can be modified and redistributed.

C.Open-source software allows developers to create new software more quickly and inexpensively.

D. Proprietary software licenses are more restrictive than open-source software licenses.

------------------------

A proprietary software is owned by an enterprise(can be both an individual and company) that produced it, while a free software means that anyone can make changes in it.Changes can also be made in a proprietary software, just an authorization from it's owner is needed, and thus, option A is correct.Both types have licenses, and thus, option B is incorrect.Since anyone can change it, in an open-source software the developers can create new software quickly, while proprietary licenses are more restrictive, thus, options C and D are correct.An end-user license agreement protects the owner of the software from it being changed without permission, that is, just the owner, thus option E is incorrect.

A similar problem is given at https://brainly.com/question/14721871

Answer: these are the correct answers

Explanation:

what is a computer in daily life​

Answers

Answer:

The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to convert raw facts and data into meaningful information and knowledge. Computer science is explored and challenged by humans daily. The computer is like an electronic magical device for our life.

Explanation:

Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?

Answers

Answer:

Platform as a Service (PaaS).

Explanation:

Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Basically, cloud computing comprises three (3) service models and these include;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

In this scenario, the type of service Don's company signed up for is called Platform as a Service (PaaS).

what is computer hardware?list any 4 computer hardware​

Answers

The parts of computer which can be touched ,seen and felt are commonly known as computer hardware.
Any 4 computer hardware are:-
1. CPU
2. Motherboard
3. Keyboard
4. Mouse,etc

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as

Answers

Answer: transaction cost

Explanation:

Transaction costs refers to the expenses that are incurred when a good or service is bought or sold. Transaction cost is the labor that's required in bringing a product to the market.

Transaction cost is the costs that are incurred when a firm buys on the marketplace what it cannot make itself.

Transaction costs are the costs that are incurred which don’t accrue to the participant of the transaction.

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

whats an MAR? lolz better not take my points #bonkers

Answers

Answer:

[tex]\huge\mathcal{\fcolorbox{aqua}{azure}{\red{✿ʏᴏᴜʀ- ᴀɴsᴡᴇʀ ♡❖}}}[/tex]

A Medication Administration Record (MAR, or eMAR for electronic versions), commonly referred to as a drug chart, is the report that serves as a legal record of the drugs administered to a patient at a facility by a health care professional. The MAR is a part of a patient's permanent record on their medical chart

▓▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓

[tex]\boxed{\pmb{\green{\sf{MAR}}}}[/tex]

medication administration record:-

 A computer-generated schedule for administering medications to a patient for a defined period of time, including dosing, timing of administration and details about the physician’s orders.

▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓▓

In order for two queries to be UNION-compatible, they must: Select one: A. both have the same number of lines in their SQL statements. B. both output compatible data types for each column and return the same number of rows. C. both return at least one row. D. both return exactly one row.

Answers

Answer: B. both output compatible data types for each column and return the same number of rows.

Explanation:

In order for two queries to be UNION-compatible, they must be both output compatible data types for each column and return the same number of rows.

It should be noted that two relations are union compatible when both relations have the same attributes and also the domain regarding the identical attributes are thesame.

Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variable names, and lowercase for constants and functions c. lowercase for variable names and constants, and uppercase for functions d. uppercase for variable names and constants, and lowercase for functions

Answers

Answer:

b) uppercase for variable names, and lowercase for constants and functions  

Explanation:

Given

Programming language: prolog

Required

The case type for variables, constants and functions

In prolog,

Variable names begin with uppercase

e.g. Name, NAME

While constants and functions begin with lowercase

e.g. name, addnumbers()

Hence, (b) is correct

What is the positional weigh of the digit 7 in the octal number 7642 ?​

Answers

Answer:

111 is the answer..i hope it helps

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?

Answers

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

What If smart phones / computers didn't exist?

Answers

Answer:

If the smart phones/ computers do not exist we wouldn't be able to communicate with the peoples or with our family members in the case when we are far from them. It has given us acess to : entertainment, family bonding social surrogacy e.t.c. Social interactions would be enhanced, and all the social dramas would not exist as much as it does now. Thus, it has a significant role in our life.

how big is an iphone xr

Answers

Answer:

the iPhone xr display measure in at 6 .1 inches

the phone measures up to 6.1 in

Distinguish between afax and a telephone call (5points)​

Answers

Answer:
A fax is an exact copy of a document made by electronic scanning where as a telephone call is a communication or conversation via a telephone

Write the contribution of Charles Babbage in the history of computer.​

Answers

Answer:

The main contributions of Charles Babbage are;

1 ) He invented difference engine and analytical engine.

2) He gave basic concept of of mathematics in his analytical engine.

3) He also keep the concept of using binary digits in his machine.

4) He had led to the the foundation of modern computer in his analytical engine including the concept of of input, processing and output

Hope it helps.... :)

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers

Answers

Answer:

Log inSign up

Server Unit 5 Quiz

STUDY

Flashcards

Learn

Write

Spell

Test

Play

Match

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers?

Tap card to see the definition

Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

Tap again to see the term

You want to create policies in a new GPO that affect only computers with Windows 8 installed. You don't want to reorganize your computer accounts to do this, and you want computers that are upgraded to Windows 10 to fall out of the GPO's scope automatically. What can you do?

Tap card to see the definition

Configure a WMI filter on the GPO that specifies Windows 8 as the OS. Link the GPO to the domain.

Tap again to see the term

1/20

Created by

Bannieboy

Tags related to this set

IT Essentials: PC Hardware And Software

Marketing

Right Click

Inheritance

Terms in this set (20)

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers?

Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

You want to create policies in a new GPO that affect only computers with Windows 8 installed. You don't want to reorganize your computer accounts to do this, and you want computers that are upgraded to Windows 10 to fall out of the GPO's scope automatically. What can you do?

Configure a WMI filter on the GPO that specifies Windows 8 as the OS. Link the GPO to the domain.

You have just finished configuring a GPO that modifies several settings on computers in the Operations OU and linked the GPO to the OU. You right-click the Operations OU and click Group Policy Update. You check on a few computers in the Operations department and find that the policies haven't been applied. On one computer, you run gpupdate and find that the policies are applied correctly. What's a likely reason the policies weren't applied to all computers when you tried to update them remotely?

You need to configure the firewall on the computers.

No computers in an OU seem to be getting computer policies from the GPO linked to the OU, but users in the OU are getting user policies from this GPO. Which of the following are possible reasons that computer policies in the GPO aren't affecting the computers? (Choose all that apply.)

-The Computer Configuration settings are disabled.

-The computer accounts have Deny Read permission.

An administrator would like to configure a computer to load policy information that is stored locally to speed system start-up. What client-side feature should the administrator select?

Group Policy caching

A junior administrator deleted a GPO accidentally, but you had backed it up. What should you do to restore the deleted GPO?

Right-click the Group Policy Objects folder and click Manage Backups.

You want to create an HTML report that shows which policies and GPOs are applied to a particular user and computer. Which command should you use?

gpresult

Users who log on from a branch office connected to the DC via a slow WAN link are complaining of slow logon times when you assign applications via group policies. What can you do to speed their logons?

Configure asynchronous processing when a slow link is detected

The wiring and connectors that carry the power to a motor must be in good condition. When a connection becomes loose, oxidation of the copper wire occurs. The oxidation ____. A. acts as an electrical resistance and causes the connection to heat more B. has no effect on the electrical connection C. decreases the resistance D. none of the above

Answers

Answer: A. acts as an electrical resistance and causes the connection to heat more.

Explanation:

The wiring and connectors that carry the power to a motor must be in good condition. It should be noted that in a case whereby the connection becomes loose, then the oxidation of the copper wire occurs and thee oxidation will act as an electrical resistance and then results in the connection to heat more.

In such case, this has an effect on the electrical connection and increases the resistance. Therefore, the correct option is A.

Which of the following are characteristics of distributed version control systems? Select 3 options.

Developers must be connected to the internet to make changes to the project files.

A full copy of all project files is stored on each developer’s computer.

Project files are maintained in a central repository.

It allows many developers to work on the same project from anywhere at the same time.

The process may require file locking, depending on file type.

Answers

Answer:

Explanation:

Distributed Version Control Systems are a must for any development team. Some of the characteristics of these systems include

Project files are maintained in a central repository.

It allows many developers to work on the same project from anywhere at the same time.

A full copy of all project files is stored on each developer’s computer.

It is somewhat similar to a Centralized Version Control system, with the main difference being that every team developer has a complete project copy in their own system. This allows them to work on the project without access to the internet. Instead, they make changes and update their own server version. This updated version later gets pushed to the centralized server.

Answer:

1. It allows many developers to work on the same project from anywhere at the same time.

2. Project files are maintained in a central repository.

3. A full copy of all project files is stored on each developer’s computer.

Explanation:

i did the assignment

Other Questions
QuestionAlice drove her car 279 miles in 6 hours. Write this rate as a reduced fraction. What is the answer?? I need help Please help any one its urgent the question is given below . If you gave me correct answe're I will mark as brainliest. Determine the [OH] of a solution that is 0.115 M in CO32. For carbonic acid (H2CO3), Ka1=4.3107 and Ka2=5.61011. The Nernst equation at 20oC is: Eion= 58 millvolts/z. [log10 (ion)out/(ion)in]Calculate the equilibrium potential for Cl- if the concentration of Cl- outside of the cell is 100 and the concentration inside of the cell is 10 mmol/liter.a. 58 millivoltsb. +58 millivoltsc. -116 millivoltsd. 0 A group of students is arranging squares into layers to create a project. The first layer has 5 squares. The second layer has 10 squares. Which formula represents an arithmetic explicit formula to determine the number of squares in each layer ? Kevin's supervisor, Jill, has asked for an update on today's sales, Jill is pretty busy moving back and forth between different store locations. How can Kevin most effectively deliver an update to her ? a) Call with a quick update Ob ) Send a detailed text message c ) Book a one-hour meeting for tomorrow morning d) Send a detailed email Assuming no change in government spending, an decrease in taxes of $100 billion with an MPC of 0.90 will add a total of $_____________ billion to the economy after the multiplier effect.A. 800B. 400C. 500D. 900 When the US government becomes aware of economic changes, the discovery is most likely to influence anh ch hy phn tch phn ng ca ngi tiu dng trong ln tng gi xng gn y nht All companies try to have happy workers as they know the relationship between satisfaction and performance. This is why they are focusing on motivating their employees in a variety of ways. From what you have learned please suggest what companies should do to have a working place that could effectively motivate their employees. The correct geometry around oxygen in CH3OCH3 is(a). linear. (b). bent. C). tetrahedral/(a). trigonal planar what is the hcf of 40,50??? Prepare summary journal entries to record the following transactions for a company in its first month of operations. a. Raw materials purchased on account, $100,000. b. Direct materials used in production, $42,000. Indirect materials used in production, $15,000. c. Paid cash for factory payroll, $50,000. Of this total, $36,000 is for direct labor and $14,000 is for indirect labor. d. Paid cash for other actual overhead costs, $8,250. e. Applied overhead at the rate of 120% of direct labor cost. f. Transferred cost of jobs completed to finished goods, $68,175. g1. Jobs that had a cost of $68,175 were sold. g2. Sold jobs on account for $97,000. The base of a triangular prism has an area of 35 m2. This triangular prism has a height of 7 m. What is the volume of this triangular prism? Match the following description with the appropriate type of respiration: a. occurs in the mitochondria b. resting muscles depend on this type of respiration c. lactic acid builds up in muscle fibers d. rapidly produces ATP for short time periods e. produces large quantities of ATP but takes longer to synthesize1. anaerobic respiration 2. aerobic respiration Four wires (red,green, blue and yellow) need to be attached to a circuit board. A robotic device will attach the wires. The wires can be attached in any order, and the production manager wishes to determnine which order would be the fastest for the robot to use. Required:Use the multiplication rule of counting to determine four choices for the first wire, three for the second wire, two for the third and only one for the fourth. what is bigger 35% or 2/5 Giving mouth-to-mouth resuscitation to a drowning victimLow riskO High risk in huckleberry finn when does he find a call to adventure