Answer:
D. The method for retrieval is dependent on the specific app or device’s operating system.
The type of software used in soa architecture is often referred to as what?.
Answer:
software-as-a-service
Explanation:
poob bn vbyfcfgxfc jghjg jhgh
Answer:
Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.
Explanation:
How to edit slides into video.
Answer:
use videostar. or funimate. but for school use powerpoint
Explanation:
All variables are----------------------------------------------- help please
Answer:
variables are any characteristics that can take on different values, such as height, age, species I think
Answer
A variable basically works as a "placeholder" for anything that might change a majority of the time.
Examples
In science one may call a factor in a experiment that is subject to change a variable.
In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.
In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.
with the ________ delivery model, cloud computing vendors provide software that is specific to their customers’ requirements.
Cloud Computing is simply known to be a type of computing. Software-as-a-Service (SaaS) delivery model, cloud computing vendors provide software that is specific to their customers’ requirements.
Software-as-a-Service (SaaS) is simply define as a type of cloud computing vendors that gives software that is particular to their customers' needs.It is the most used service model as it gives a broad range of software applications. It also gives web-based services to its user.
Learn more from
https://brainly.com/question/14290655
if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should you use
The Smart glove is known to be a very common hardware. The sensor that an individual can use, is the Inertial Measurement Unit (IMU) sensors.
Inertial Measurement Unit (IMU) sensors is a type of sensor that capture alltogether the motion of hand and wrist movements.It is known to contain some bending sensors that is used to detect bending in one direction or another.
All the sensors are often linked to a computer system that put together the amount of individual finger movement of the patient.
Learn more from
https://brainly.com/question/20591341
where on a computer is the operating system generally stored?
The operating system on a computer is generally stored at hard disk.
Typically, a data structure known as the Interrupt Vector Table stores the addresses of interrupt handlers (IVT). When an interrupt happens, the processor refers to the IVT, a table of fixed addresses in memory.
An interrupt is a signal sent to the processor of a computer or other digital device by a hardware component or software function to get the processor's attention. By allowing the processor execute numerous tasks at once, interrupts enable hardware devices to connect with the processor and software to run more effectively.
The interrupt handler, which is normally included in the operating system kernel, receives control when an interrupt occurs, causing the CPU to pause its ongoing task execution. The interrupt handler responds to the interrupt, which may entail resolving an error condition, processing data from a device, or performing input/output tasks. The processor resumes working on the interrupted job once the interrupt has been handled.
Learn more about Interrupt here:
brainly.com/question/29770273
#SPJ6
Read what is in the commets.
Answer:
I'm a little confused on what you are asking, could you please explain.
You receive a worksheet in which the rows are numbered 1, 2, 3, 5,6. This means that row 4 is _____.
People often hide cells of worksheet due to different reasons. This means that row 4 is hidden.
A worksheet is commonly know as a sheet of paper/computer sheet with which work is done or performed.
An individual can hide any worksheet so that it can be removed from their view. The data in hidden worksheets is not visible to the person, but it can still be referenced from other worksheets and workbooks. One can unhide hidden worksheets if need be.
Learn more from
https://brainly.com/question/17106092
If the value is set to equals to current entry then
a) the argument remains unchanged
b) the argument always changed
c) the argument will be deleted
d) the argument can be ignored
I will definitely mark you Brainliest for answering the correct answer!
Answer:
this is a fallacy
a is the answer
What is the difference between compliled and intebrated language?
(class 8th Subject Computer chapter 9 Control Structures In Python)
Answer:
A compiled language is a programming language whose implementations are typically compilers and not interpreters. In this language, once the program is compiled it is expressed in the instructions of the target machine. There are at least two steps to get from source code to execution. While, an interpreted language is a programming language whose implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions. While in this language, the instructions are not directly executed by the target machine. There is only one step to get from source code to execution.
I hope this helps.
Answer:
1.
Compiled Language:
A compiled language is a programming language whose implementations are typically compilers and not interpreters.
Interpreted Language:
An interpreted language is a programming language whose implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions.
2.
Compiled Language:
In this language, once the program is compiled it is expressed in the instructions of the target machine.
Interpreted Language:
While in this language, the instructions are not directly executed by the target machine.
3.
Compiled Language:
There are at least two steps to get from source code to execution.
Interpreted Language:
There is only one step to get from source code to execution.
4.
Compiler Language:
In this language, compiled programs run faster than interpreted programs.
Interpreted Language:
While in this language, interpreted programs can be modified while the program is running.
Need help with 3.2 lesson practice questions (edhesive)
Answer:
Doesn't have a questionExplanation:
THANK YOUUConceptually, a page table is an array. What is found in each element of the page table array, and how is it interpreted?.
An array is the group of data structure which has a similar data elements of the same data type. In this type of data structure, the information can be quickly recalled by making use of the index number so that each individual data can be retrieved.
With this in mind, we can see that a page table has to do with the data structure which is stored in a virtual memory so that the Operating System can access their virtual and physical address.
See attached image for a better visual description.
Please note that your question is incomplete so I gave you a general overview so that you would better understand the concept.
Read more about page table here:
https://brainly.com/question/15409133
it literALLY HAS NOTHING TO DO WITH MY ASSIGNMENT
Ansgokublue
Explanation:
What permissions are needed in order to use a work online that is in the public domain?
A.
Written permission from the creator
B.
A legal agreement attached to the work
C.
A justification through fair use
D.
None
The term “public domain” refers to creative materials that are not protected by intellectual property laws such as copyright, trademark, or patent laws. ... Anyone can use a public domain work without obtaining permission, but no one can ever own it.
You are the administrator for a network with a single Active Directory domain called westsim. All computer accounts reside in organizational units (OUs) that correspond to departments. You have previously deployed a WSUS server in your location to specify the approved list of updates. All client computers are configured to download updates from your local WSUS server. You decide that you need to configure a separate update approval list for all computers in the Marketing department. You want the update list to be automatically identified based on the department membership for the computer. What should you do
help me.............
Answer:
Explanation:
Sure
10 toes? Is that what you asked?
5 oceans entirely in the world.
300 bones in a baby and 206- In an adult body
What would the objective of the game be?
What would the operation of the game be?
What obstacles would your players experience?
What outcomes would you like to see in the game?
What sorts of themes, lessons, or skills would you like to express through your game?
What kind of person do you think would enjoy playing your game?
Answer:
Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.
the use of technology to observe a user's actions often without the user's knowledge is known as:
A) Unauthorized access
B) Industrial espionage
C) Computer surveillance
D) Denial-of-service attack
Answer:
C
Explanation:
Computer surveillance refers to spying that allows the viewer to gain access of all activity on the given computer.
Yahoo Messenger is an example of a/an __________ service on the Internet.
Answer:
Yahoo Messenger is an example of a service on the Internet.
THE BONUS QUESTION PART FOUR:
what is the most popular game that's lived for soo long
Answer:
Senet
Explanation:
Write any four causes of cyber crime
If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account
A lot of services are being provided over the Internet. If you do not want to use your Internet service provider (ISP) for your email account, you can you acquire a webmail account through online services
An online service is simply known as body that gives access to various types of data for different uses through the use of the the Internet.Examples are: online banking, news, shopping, social media networks, e-mail etc.
This services done online gives an avenue in which subscribers can communicate with one another via exchanging e- mail messages or through online conferences or forums.
Learn more from
https://brainly.com/question/9930336
you need to use task manager to analyze memory utilization on a windows system. for example, you need to see how much system ram is currently in use and how much is available. click on the tab in task manager that you would use to do this.
Answer:
Performance tabExplanation:
If you press on the performance tab you should be able to see how much memory is in use and how much is free. For example 50% or 8GB/16GBtax preparation software can help prepare and file your taxes by _________.
A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital needs.Which myNav module will help this client?
myNav is to be present inn the Accenture software. It aim is to helps companies manage the human, technology and business dimensions of cloud change. The myNav module that will help this client is Cloud Advisor.
Cloud Advisor is simply known to be one of the many modules within the myNav platform. It was set up to handle the difficulties of cloud for digital transformation.
These Advisors are known worldwide community of technical resources. They have a thorough knowledge of cloud technologies and practices.
Their mission is to know the trends, regulatory implications, and our clients' needs so as to help them to set goals and create plans to achieve their desired outcome.
Learn more from
https://brainly.com/question/24918185
what is an operating system that controls some aspects of the computer?
(not very well phrased, ik, it's coming from a crossword for one of my classes assigned as a snow day thing. looking for a seven letter word)
central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections.
Answer: Windows
Explanation:
examples of operating systems include
windows
mac
linux
windows has seven letters
Which of the following is not a good practice for effective Internet searches? Search for specific keywords that define your topic Use quotation marks to search for exact phrases Be general in your search query to get as many results possible Use or - to include or exclude different topics
Answer:
Be general in your search query to get as many results possible
What color object would reflect more light?
O Red
O Black
O Blue
o White
Answer:
White
Explanation:
Red absorbs all light except red light, which it reflects
Black absorbs all light
Blue absorbs all light except blue light, which it reflects
White reflects all light because it has all colors except black.
Hope you do well!
What are the steps to complete an internet search?
Answer:
step one: open your search engine
step two: type what you wanna search for in the text box
step three: press enter
and that's it