As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After several days, you notice that the system locks up and reboots from time to time. You suspect that a recent update is causing the problem. How can you quickly restore the computer to its state before the updates

Answers

Answer 1
Answer is restore the system using a restore point.
Explained: System Restore lets you roll your system settings back to a specific date when everything was working properly.

Related Questions

Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of this cipher.

Answers

A simple substitution cipher takes each vector ([tex]e_i[/tex]) and assigns it to the vectors [[tex]e_{\pi (i)}[/tex]] in a one-to-one function so as to make them equivalent.

What is the Hill cipher?

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector ([tex]e_i[/tex]) and assigns it to the vectors [[tex]e_{\pi (i)}[/tex]] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: https://brainly.com/question/13155546

#SPJ1

if ( (ans == 'Y' && errors < 5) || numTries < 10 ) // note uppercase 'Y' count++; Which combinations of values result in count being incremented after the statement is complete?

Answers

The correction options to the case abode are:

Option B. ans = 'Y' (upper case)

errors = 6

numTries = 5

Option C. ans = 'y' (lower case)

errors = 4

numTries = 5

Option D. ans = 'Y' (upper case)

errors = 100

numTries = -1

What is Coding?

Computer coding is known to be the act that entails the use of computer programming languages to instruct the computers and machines on a given number of instructions on what need to be  performed.

Note that in the statement above,  the combinations of values results in count being incremented after the statement is complete is option B, C and D.

See full question below

Learn mode about coding from

https://brainly.com/question/22654163

#SPJ1

In demand paging, when an excessive number of pages are moved back and forth between main memory and secondary storage, it is called ____.

Answers

A thrashing occurs where an excessive number of pages are moved back and forth between main memory and secondary storage,

What is a thrashing?

This is a phenomenon that occurs when the virtual memory is rapidly exchanging data for data on hard disk often at the exclusion of most application-level processing.

Hence, in a computer, the thrashing occurs where an excessive number of pages are moved back and forth between main memory and secondary storage.

Read more about thrashing

brainly.com/question/12978003

#SPJ1

An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 This binary value is then converted to hexadecimal; the hexadecimal value for "A" will be?​

Answers

Answer:

a = 0x61 = 01100001, shifted: 11000010, hex: 0xC2

l = 0x6C = 01101100, shifted: 11011000, hex: 0xD8

g = 0x67= 01100111, shifted: 11001110, hex: 0xCE

Explanation:

The ascii character codes were actually for lowercase letters, whereas the assignment uses uppercase letters.

A technician is testing a connector in a circuit with a voltmeter. With the power on in the circuit, the meter reads 12 volts when the leads are placed on each side of the connector. This indicates that the connector _____.

Answers

Since the technician is testing a connector in a circuit with a voltmeter and the others, one can say that this indicates that the connector is open.

What does an open connection implies?

Connecting to an open network is one that connote that one can opens their device to others using or on that same wireless network.

Note that Since the technician is testing a connector in a circuit with a voltmeter and the others, one can say that this indicates that the connector is open.

Learn more about open connection from

https://brainly.com/question/5338580

#SPJ1


What penalties can occur for a first offense DUI
that did not result in a fatal injury?

Jail time

Must apply for a new license after
revocation

Charged with a felony

Your vehicle impounded

Fines

Alcohol or drug treatment program

Install an Ignition Interlock Device on your car

Suspension or revocation of your driver's license

(Nevada) You check Boxes

Answers

The penalties that  an occur for a first offense DUI that did not result in a fatal injury are:

Your vehicle impounded.Fines.Alcohol or drug treatment program.Suspension or revocation of your driver's license.

What is the penalty for first time DUI?

When a person has a first-offense DUI, the effect for conviction generally is made up of three years of informal probation, fines and taking or completing a first offender alcohol program.

Therefore, The penalties that  an occur for a first offense DUI that did not result in a fatal injury are:

Your vehicle impounded.Fines.Alcohol or drug treatment program.Suspension or revocation of your driver's license.

Learn more about DUI from

https://brainly.com/question/988799

#SPJ1

Got a assignment and need help to do it or figure it out. Its too make 2 python codes that run for
1. Write a program to ask the user to input the number of hours a person has worked in a week and the pay rate per hour.

2. Jennifer wants to carpet her new room with a carpet. Create a program that will work out the area of any sized room, (l x w) Save as area of rectangle.py
Need help with it.

Answers

Answer:

Explanation:

For input,

val = input("Enter your value: ")

print(val)

Haven't done python in while so I can't help with second one.

C++ code only
Inventory Items:
We're going to do an inventory management system. In the real world, this would use a database, not a file. A single inventory item contains:
item names (or description), like "socks, - red" or "socks - blue". This has to be a character string that WILL include spaces.
item numbers that are unique to the item, similar to UPC codes, like 121821 or 128122. Even though they look like numbers, they are really character strings.
a price, like 4.99, a double.
a quantity on hand, like 13, an integer.
Your program will need to manage arrays of these items.
-----------------------------------------------------------------------------------
Menu:
Your code need to have the following features, all accessible from a menu.
Add a new inventory item to the data into the array in memory. You'll type in the inventory number, description, quantity and price. This will also update the number of items on the menu screen.
List the inventory (in the array in memory) on the screen in neat columns. Display it in chucks of 15 items with a pause in between.
Search the inventory (in the array in memory) for an item by inventory number. If found, print the stored info, otherwise print 'not found'.
Calculate the total value on hand of the inventory (in the array in memory). The sum is the accumulation of all the (quantities * prices).
Save the array in memory to a disk file. It can then be loaded later.
Read from a disk file to the array in memory. This will overwrite the array in memory with new information from the disk. If you data isn't saved, it will be lost. That how is SHOULD work!
----------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
Menu Sample:
56 items stored
1) Add an item to memory
2) Search memory for an item
3) List what's in memory
4) Total value on hand
5) Save to a file
6) Read in from a file
0) Exit Program
Enter Choice:
-------------------------------------------------------------------------------------------------------------------
How to store the arrays: Parallel Arrays Option
You can maintain 4 arrays, one for each type. You will need to be careful to keep the items in the same position.
string descriptions[1000];
string idNumbers[1000];
float prices[1000];
int quantity[1000];
In this scenario, an item will be spread over the 4 arrays, but all at the same index.
------------------------------------------------------------------------------------------------------------------------------
How to store the data on the disk:
You are required to use the following text based format
Socks - Blue (in the inventory file)
74627204651538
4.99
27
Yellow Socks
25435567456723452345
7.99
27
Each individual item is stored in 4 separate lines. Records follow each other directly.

Answers

Using the computational language C++ it is possible to write a code is possible to create a function that stores items like this:

Writting the code in C++:

//Header files

#include <iostream>

#include <string>

#include <fstream>

using namespace std;

//Class inventoryItem

class inventoryItem

{

public:

//Variable declaration

string itemName;

string itemNumber;

double itemPrice;

int itemQuantity;

};

//implementation of menuItems() function.

void menuItems()

{

// Display the Menu

cout << "=============================\n";

cout << " 1) Add an item to memory\n"

<< " 2) Search memory for an item \n"

<< " 3) List what's in memory\n"

<< " 4) Total value on hand\n"

<< " 5) Save to a file\n"

<< " 6) Read from a file\n"

<< " 0) Exit Program" << endl;

}

//main method.

int main()

{

//variable declaration.

int mnuChoice, cn = 0, d;

string n;

double sum = 0, c;

int temp;

string a, b;

string inputBuffer;

inventoryItem items[100];

ifstream inventoryFile("inventory.txt");

if (inventoryFile)

{

//store the data from the file to memory.

while (!(inventoryFile.eof()))

{

inventoryFile >> items[cn].itemName;

inventoryFile >> items[cn].itemNumber;

inventoryFile >> inputBuffer;

items[cn].itemPrice = atof(inputBuffer.c_str());

inventoryFile >> inputBuffer;

items[cn].itemQuantity = atoi(inputBuffer.c_str());

cn++;

}

inventoryFile.close();

ifstream inventoryFile("inventory.txt");

ofstream fout;

fout.open("inventory.txt");

do

{

menuItems();

cout << cn << " items stored." << endl;

// Prompt and read choice form the user

cout << "Enter your choice: ";

cin >> mnuChoice;

switch (mnuChoice)

{

//Add a new inventory item to the data in memory.

case 1:

// Prompt and read name of the item from the user

cout << "Enter name of the item: ";

cin >> inputBuffer;

items[cn].itemName = inputBuffer;

// Prompt and read itemNumber from the user

cout << "Enter the itemNumber: ";

cin >> inputBuffer;

items[cn].itemNumber = inputBuffer;

// Prompt and read itemPrice from the user

cout << "Enter the itemPrice: ";

cin >> inputBuffer;

items[cn].itemPrice = atof(inputBuffer.c_str());

// Prompt and read itemQuantity from the user

cout << "Enter the itemQuantity: ";

cin >> inputBuffer;

items[cn].itemQuantity = atoi(inputBuffer.c_str());

cn++;

break;

//Search the inventory for an item by inventory number.

case 2:

temp = 0;

cout << "Enter inventory itemNumber: ";

cin >> n;

for (int i = 0; i < cn&&temp != 1; i++)

{

// If found, print the stored info

if (items[i].itemNumber.compare(n) == 0)

{

// Display the stored information

cout << "Item Name" << "\t" << "Item Number" << "\t" << " Item Price" << "\t" << " Item Quantity" << endl;

cout << items[i].itemName << "\t " << items[i].itemNumber << " \t" << items[i].itemPrice << "\t " << items[i].itemQuantity << endl;

temp = 1;

}

}

// otherwise print 'not found'.

if (temp == 0)

{

cout << "Not found!!!" << endl;

}

break;

//List the inventory on the screen

case 3:

cout << "The data in the memory is:" << endl;

cout << "Item Name" << "\t" << "Item Number" << "\t" << " Item Price" << "\t" << " Item Quantity" << endl;

for (int i = 0; i < cn; i++)

{

cout << items[i].itemName << "\t " << items[i].itemNumber << "\t " << items[i].itemPrice << " \t" << items[i].itemQuantity << endl;

}

break;

// Calculate the total value on hand.

case 4:

for (int i = 0; i < cn; i++)

{

// The sum is the accumulation of all the (quantities * prices).

sum += items[i].itemPrice*items[i].itemQuantity;

}

cout << "sum value on hand: " << sum << endl;

break;

// Save the inventory data in the given file

case 5:

for (int i = 0; i < cn; i++)

{

if (i == cn - 1)

{

fout << items[i].itemName << " \t" << items[i].itemNumber << " \t" << items[i].itemPrice << " \t" << items[i].itemQuantity;

}

else

{

fout << items[i].itemName << " \t" << items[i].itemNumber << " \t" << items[i].itemPrice << " \t" << items[i].itemQuantity << endl;

}

}

break;

// Read the data from the file

case 6:

while (!(inventoryFile.eof()))

{

inventoryFile >> a;

inventoryFile >> b;

inventoryFile >> inputBuffer;

c = atof(inputBuffer.c_str());

inventoryFile >> inputBuffer;

d = atoi(inputBuffer.c_str());

// Dsiplays the data in the file

cout << a << " " << b << " " << c << " " << d << endl;

}

break;

}

// Check the menu choice is not equal to 0,

//if it is equal exit from the loop

} while (mnuChoice != 0);

// File closed

fout.close();

inventoryFile.close();

}

// If the inventory file does not exist

// and then display the error message.

else

{

cout << "File does not exist!" << endl;

}

return 0;

}

See more about C++ code at brainly.com/question/17544466

#SPJ1

You are choosing between two different window washing companies. The first charges $5 per window. The second charges a base fee of $40 plus $3 per window. Based on this information, the second company is cheaper if you have more than ______ windows.

Answers

Answer:

20

Explanation:

Write a program that calculates pay for either an hourly paid worker or a salaried worker Hourly paid workers are paid their hourly pay rate times the number of hours worked. Salaried workers are paid their regular salary plus any bonus they may have earned. The program should declare two structures for the followingdata Hourly Paid Salary Bonus The program should also declare a union with two members. Each member should be a structure variable: one for the hourly paid worker and another for the salaried worker. The union should be part of another structure that also contains a flag for what portion of the union should be used. (If you have questions about this part, please email the instructor) The program should ask the user whether he or she is calculating the pay for an hourly paid worker or a salaried worker. Regardless of which the user selects, the appropriate members of the union will be used to store the data that will be used to calculate the pay Use the following flow structure and functions: Function: Main-Askes user if salaried or hourly. Calls appropriate function based on answer to gather information about the worker. Main should receive a worker pointer back. Main then calls the print function for the worker Function:getHourly-Asks the user for the hourly rate and number of hours worked, storing the answers in a new worker object, which it returns Function getSalaried-Asks the user for the salary and bonus for a worker, storing the answers in a new worker object, which it returns Function printWorker-takes a worker object, and prints out a report for the information about the worker, including the gross pay (which would be calculated) Note: Input validation not required, but would be no negative numbers, and no values greater than 80 for hours worked * Your two structures must be named "hourly" and "salaried", the union should be named Accept both capital and lowercase letters for selecting what type of worker from the user

Answers

The program that is required here is a payroll program. See the explanation below.

What is a program?

A program is a series of instructions that are given to a computer in a predetermined language with precise instruction that delivers a specific output.

What is the required program?

The program that calculates the pay - (Payroll program) is given as follows:

#include <iostream>

#include <iomanip>                                                                                                                                                                                        

using namespace std;

int main ()

{

int paycode;

int WeeklySalary;

double pay;

int HourlySalary;

int TotalHours;

int GrossWeeklySales;

int pieces;

int PieceWage;

cout << "Enter paycode (-1 to end): ";

cin  >> paycode;

while (1); {

               

                switch (paycode) {

                               case '1':

                                cout << "Manager selected." << endl;

                                cout << "Enter weekly salary: ";

                                cin  >> WeeklySalary;

                               

                                cout << endl;

                               

                                pay = WeeklySalary;

                                cout << "The manager's pay is $ " << pay;

                                cout << endl;

                               

                               

                                break;

                               

                                case '2':

                                cout << "Hourly worker selected." << endl;

                                cout << "Enter the hourly salary: ";

                                cin  >> HourlySalary;

                               

                                cout << endl;

                                cout << "Enter the total hours worked: " << endl;

                                cin  >> TotalHours;

                               

                                         if ( TotalHours <= 40)

                                                  pay = HourlySalary * TotalHours;

                                                 

                                         else

                                                  pay = (40.0 * HourlySalary) + (TotalHours - 40) * (HourlySalary * 1.5);

                                                 

                                 

                                cout << endl;

                                cout << "Worker's pay is $ " << pay;

                               

                                cout << endl;

                                break;

                               

                                case '3':

                                cout << "Commission worker selected." << endl;

                                cout << "Enter gross weekly sales: ";

                                cin  >> GrossWeeklySales;

                               

                                cout << endl;

                                pay = (GrossWeeklySales *.57) + 250;

                                 

                                cout << " Commission worker's pay is $ " << pay;

                                 break;  

                               

                                case '4':

                                cout << "Pieceworker selected." << endl;

                                cout << "Enter number of pieces: ";

                                cin  >> pieces;

                               

                                cout << "Enter wage per piece: ";

                                cin >> PieceWage;

                               

                                pay = pieces * PieceWage;

                               

                                cout << "Pieceworker's pay is $ " << pay;

                                break;

                                                               

                         

}

                               

}

system ("pause");

return 0;

}

Learn more about programs at;
https://brainly.com/question/1538272
#SPJ1

The users, groups, and roles that have access to a server are called ______________________________.

Answers

Answer:

With the Exclusive Lock, a data item can be read as well as written. Also called write lock. An exclusive lock prevents any other locker from obtaining any sort of a lock on the object. They can be owned by only one transaction at a time

Explanation:

True or false: When a change in one key variable causes a change in another key variable, the incremental approach cannot be used for the analysis.

Answers

It is false to state that when a change in one key variable causes a change in another key variable, the incremental approach cannot be used for the analysis.

What is the incremental approach?

An approach this is based on the precept that the ones concerned in a mission have to on the outset attention on the important thing enterprise goals that the mission is to attain and be inclined to suspend detailed consideration of the trivia of a selected solution is known as the incremental approach.

Thus, It is false to state that when a change in one key variable causes a change in another key variable, the incremental approach cannot be used for the analysis.

Learn more about incremental approach:

https://brainly.com/question/14949779

#SPJ1

Your task is to design a method int[] allMatches(int[] values, int size, int a, int b) that returns all values between a and b inclusive in the partially filled array values. For example, if an array a contains 11, 3, 9, 4, 2, 5, 4, 7, 6, 0, then the call allMatches(a, 8, 3, 7) should return an array containing 3, 4, 5, 4, 7. Note that the 6 is not included because it is past the size of the partially filled array. Arrange the pseudocode below in the right order. Not all lines are useful.
ArrayValues. Java Tester.
java for (int v: values)
{ public class ArrayValues public static intti allatches(int[1 values, int size, int, int b) {
} for (int k = 0; k < size; k++) {
int v = values[k]; for (int k = 0; k < size; k++) {
int v = values[k]; for (int v: values) {
result[1] = v; 1++;
}
int count = 0; )
} if (a int[] result = new int[count);

Answers

The program that returns all values between a and b inclusive in the partially filled array values is illustrated below.

What is a program?

A computer program means a sequence or set of instructions that is in a programming language for a computer to execute.

Here, the program based on the information given will be:

count = 0

for each v in values

if a <= v <= b

 count++

result = new int[count]

i = 0

for each v in values

if a <= v <= b

 result[i] = v

 i++

return result

Java code:

public class ArrayRange {

public static int[] allMatches(int[] values, int size, int a, int b) {

 int count = 0;

 for (int i = 0; i < size; i++) {

  if(values[i] >= a && values[i] <= b) {

   count++;

  }

 }

 int result[] = new int[count];

 count = 0;

 for (int i = 0; i < size; i++) {

  if(values[i] >= a && values[i] <= b) {

   result[count++] = values[i];

  }

 }

 return result;

}

public static void main(String[] args) {

 int[] a = {11, 3, 9, 4, 2, 5, 4, 7, 6, 0};

 int[] returnedArray = allMatches(a, 8, 3, 7);

 for (int i = 0; i < returnedArray.length; i++) {

  System.out.print(returnedArray[i] + " "

Learn more about program on:

https://brainly.com/question/1538272

#SPJ1

Greg is implementing a data loss prevention system. He would like to ensure that it protects against transmission of sensitive information by guests on his wireless network. What DLP technology would best meet this goal

Answers

The DLP technology that would best meet Greg goal is known as Network-Based DLP technology.

What are Network-Based DLP technology?

Network DLP is known to be a form of device that is often used to hinder vital information from being moved outside any form of corporate network and it is one that is enforced in a lot of regulated industries where compliance requirements are put in place.

Therefore, The DLP technology that would best meet Greg goal is known as Network-Based DLP technology.

Learn more about DLP technology  from

https://brainly.com/question/15177750

#SPJ1

Make up a python program that can do the following
Write a program to ask the user to input the number of hours a person has worked in a week and the pay rate per hour.​

Answers

Answer:

hrs=input("Enter Hour:")

rate=input("Eenter Rate per Hour:")

pay=float(hrs)*float(rate)

print("Pay:", pay)

Explanation:

Question 2 (6.67 points)
According to many experts, how often should files be backed up?
Once a week
Once a month
Once a year
Daily

Answers

ANSWER
Once a week
ExPLNATION
Because in one month or more everything can happen and in on day you can not use your file for a day so the correct answer is Once a week

All of the following are true about in-database processing technology EXCEPT Group of answer choices it pushes the algorithms to where the data is. it makes the response to queries much faster than conventional databases. it is often used for apps like credit card fraud detection and investment risk management. it is the same as in-memory storage technology.

Answers

All of the aforementioned are true about in-database processing technology except: D. it is the same as in-memory storage technology.

What is an in-database processing technology?

An in-database processing technology can be defined as a type of database technology that is designed and developed to allow the processing of data to be performed within the database, especially by building an analytic logic into the database itself.

This ultimately implies that, an in-database processing technology is completely different from in-memory storage technology because this used for the storage of data.

Read more on database here: brainly.com/question/13179611

#SPJ1

Define a void function named drawDonut to draw a donut that can be called with this syntax: drawDonut( x, y, diameter, color ); The function should draw a circle for the donut at the given position, diameter, and color, then put a white hole in the center at 1/4 of the specified diameter. Make 3 calls to drawDonut in start to make 3 different donuts at different locations, and sizes. Make one donut yellow, another orange, and the last one brown.

Answers

The void function is depicted as given below. See the definition of a void function.

What is a void function?

Void functions are constructed and used in the same way as value-returning functions, except that they do not return a value once the function executes. In place of a data type, void functions utilize the term "void."

A void function executes a task and then returns control to the caller, but it does not return a value.

See the attached for the full solution.

Learn more about void functions at;
https://brainly.com/question/19539019
#SPJ1

Select the correct answer.
What does virtualization do?
A.
It limits the working of the existing operating system.
B.
It creates barriers in cloud storage.
C.
It combines the existing physical servers into one logical server.
D.
It runs any operating system on your existing operating system.

Answers

Answer:

D.it runs any operating system on your existing operating system

Explanation:

because virtualization is a windows version for virtual machine.

Andrew likes to know what the weather will be like. To get a weather forecast on his Android smart phone, he has a reminder _______. Andrew thinks of this as a remote control for his app. a. podcast b. network c. widget d. RSS feed

Answers

Andrew has a reminder widget. Andrew thinks of this as a remote control for his app.

What is a widget?

A widget is known to be a kind of element that is used by a graphical user interface (GUI) that shows information or gives a specific way for a user to be able to communicate with the operating system or any kind of application.

Note that Andrew has a reminder widget. Andrew thinks of this as a remote control for his app.

Learn more about widget from

https://brainly.com/question/260819

#SPJ1

What type of trust model is used as the basis for most digital certificates used on the internet?

Answers

The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

What is the trust model of the Internet?

The trust model of the internet is known to be one that is made up of tradeoffs.

Note that Distributed trust is seen as the system that is made up of transactions and it is one that is backed up by an extended community and onw where there is no trusted third parties.

Hence, The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

See full question below

What type of trust model is used as the basis for most digital certificates used on the Internet?

A. third-party trust

B. distributed trust

C. related trust

D. managed trust

Learn more about digital certificates from

https://brainly.com/question/24931496

#SPJ1

Write a function called printRange() that accepts two integers as arguments and prints the sequence of numbers between the two arguments, surrounded by brackets ([]) and separated by a comma and a space. Print an increasing sequence if the first argument is smaller than the second; otherwise, print a decreasing sequence. If the two numbers are the same, that number should be printed by itself.

Answers

Answer:

def printRange(start, stop, steps = 1):

   list1 = []

   if steps > start or stop:

       print("Steps is larger than start and stop value")

       return None

   if int(start) < int(stop):

       while start < stop:

           start = start + int(steps)

           list1.append(start)

       print(list1)

   elif start > stop:

       while start > stop:

           stop = stop + int(steps)

           list1.append(stop)

       print(list1)

   elif start == stop:

       print(start)

   else:

       print("Values are not integers.")

for easier viewing:

https://www.codepile.net/pile/e95verLk

If you need help understanding comment below.

Your cousin asks you to help her prepare for her computer science exam next week. She gives you two clues about a type of relational database key: No column values may be NULL, and columns must be necessary for uniqueness. Which type of key is she referring to

Answers

In the case above, the type of key that she is referring to composite primary key.

What is the key about?

A primary key is known to be one that is made up of a column, or group of columns and it is often used to know a row.

The composite primary key is made up of multiple columns, known for its uniqueness, and as such In the case above, the type of key that she is referring to composite primary key.

Learn more about composite primary key from

https://brainly.com/question/10167757

#SPJ1

Question 13 :A college has a learning management system (LMS) application that is in the cloud and maintained by the college IT department. The college has a contract with the company that wrote the LMS software to provide access to the LMS during planned maintenance periods and in the event of a disaster. This service is a cloud-based service as well. What cloud architectural model does the college use

Answers

The cloud architectural model that is being used by the college is hybrid cloud.

The types of cloud computing.

In Computer technology, there are three main types of cloud computing and these include the following:

Private cloudPublic cloudHybrid cloud

Basically, a hybrid cloud combines the features of both a private cloud and public cloud. In this scenario, we can logically deduce that the cloud architectural model that is being used by the college is hybrid cloud because both the college's IT department and the company has access to learning management system (LMS) application hosted in the cloud.

Read more on cloud computing here: https://brainly.com/question/17247526

#SPJ1

which of the following needs to be cited within the text of a paper? select all that apply

Answers

The options that require citations are:

Every work that supports the points you make in your writing. Direct quotations must be cited.Works of individuals whose ideas, theories, or research have directly influenced your work.Works that you have read and whose ideas have been incorporated in your writing.What is the citation?

A “citation” is known to be the method used to inform your readers that some material in your work came are obtained from another source.

Note that The options that require citations are:

Every work that supports the points you make in your writing. Direct quotations must be cited.Works of individuals whose ideas, theories, or research have directly influenced your work.Works that you have read and whose ideas have been incorporated in your writing.

See full question below

Which of the following require citations? Select all that apply.

Group of answer choices

Every work that supports the points you make in your writing.

 Direct quotations must be cited.

Works of individuals whose ideas, theories, or research have directly influenced your work.

Each sentence of a paragraph in your writing requires citation.

Works that you have read and whose ideas have been incorporated in your writing.

Learn more about citation from

https://brainly.com/question/8130130

#SPJ1

Is the following statement valid or invalid? Give reason if it is invalid. int 2a = 6:​

Answers

Answer:when the principle die the irrevocable power of attorney is valid or invalid

Explanation:

What is the output of the following program?
public class Test {
public static void main(String[] args) {
new A();
new B();
}
}
class A {
int i = 7;
public A() {
setI(20);
System.out.println("i from A is " + i);
}
public void setI(int i) {
this.i = 2 * i;
}
}
class B extends A {
public B() {
System.out.println("i from B is " + i);
}
public void setI(int i) {
this.i = 3 * i;
}
}

Answers

Answer:

i from A is 7

Explanation:

Well when you invoke new B (), you got a superclass for that which is A's constructor, and it invokes first. So it displays i from A is 7

With SAN technology, servers use a separate network to communicate with the storage device. Group of answer choices True False

Answers

Answer:

true

Explanation:

Draw a circuit with a 12-volt battery and two resistors(100 ohms and 200 ohms) in parallel. What is the total resistance of the circuit?

Answers

The total resistance in the circuit is 66.67 ohm.

What is a circuit?

The circuit is a path designed for the flow of current. We can see that the resistors are connected to a common junction (in parallel) as shown in the image attached to this answer.

The total resistance is obtained from;

1/Rt= 1/R1 + 1/R2

1/Rt= 1/200 + 1/100

1/Rt= 0.005 + 0.01

Rt = 66.67 ohm

Learn more about resistance:https://brainly.com/question/21082756

#SPJ1

Answer:

The total resistance in the circuit is 66.67ohm

Which type of data is used by Cisco Cognitive Intelligence to find malicious activity that has bypassed security controls, or entered through unmonitored channels, and is operating inside an enterprise network

Answers

Cisco Cognitive Intelligence often use statistical data made or use for statistical analysis in order to see malicious activity that has bypassed security controls.

What is statistical data?

This can be seen as Quantitative data that is said to be the output  gotten from an act that quantifies, such as how much. e.g.  weight, height, etc.

Cisco Cognitive Intelligence often use statistical data made or use for statistical analysis in order to see malicious activity that has bypassed security controls.

See options below

alert

session

statistical

transaction

Learn more about statistical data from

https://brainly.com/question/15525560

#SPJ1

Other Questions
Six more than a numbercubed. Steve can complete 100m dash in 10 seconds paul can run it in 12 seconds how does their times compare? Two chains of clothing stores, Impulse Clothing and Opal Essence, were founded in the same year, although some outlets of Opal Essence were operating under a different name before Opal Essence was founded. The owner of Impulse Clothing uses the equation below to represent the number of clothing stores, C, he owns x years after the brand's founding. C = 2x The owner of Opal Essence uses the equation below to represent the number of clothing stores, C, she owns x years after the original brand's founding. C = x + 5 Using graphing technology, complete the statements. The annual ferpa notification process must ensure that parents understand their rights to. Sunny View Health Care Systems files their clinic records at the clinic sites, the emergency department (ED) records on the second floor of the hospital, and the inpatient records on the fourth floor of the hospital. The type of filing system used is If oxygen is not available, the muscle fiber will produce ATP by __________. If oxygen is not available, the muscle fiber will produce ATP by __________. anaerobic catabolism synthesis of creatine phosphate oxidative catabolism using fatty acids for energy Select all the correct systems of equations.Which systems of equations have no solution?x + 4y = 23-3x = 12y + 12x + 4y = 22-x = 2y - 112x + y = 15x = 15-2y2x + y = 17-4x = 2y-343y = 10-x2x+6y=7y = 13 - 2x4x - y = -1 What are the main functions of polysaccharides in plants? A. Provide water and oxygenO B. Remove carbon and mineralsO C. Provide support and energy D. Capture water and sunlight 1) The rational function shown could be used to the number of arrests, f(x), per 100,000 drivers, for driving under the influence of alcohol, as a function of a drivers age, x.[tex]f(x)=\frac{27725(x-14)}{x^2+9} -5x[/tex]a) Describe the trend you see in the graph, in context.b)Use a graphing utility to determine the age that corresponds to the greatest number of arrests. PLEASE HELP! 40 POINTS Since Jackson's audience is mostly white citizens (Congress), and not the American Indians who are being forced off their land, why do you think the President goes out of his way to say that the Indian Removal Act will help the American Indians? In other words, what do you think his motive is in this particular case? Which of the following options is a polynomial with a root 2i and exactly 2real roots?A. F(x)=x-x +2x - 4x-8B. F(x)=x-x + 4x-4C. F(x)=x-x-6x +4x+8OD. F(x)= x + x + 4x+8 9. The length of a rectangle is 2p cm and its breadth is p cm. When the length of the rectangle is increased by 25% and the breadth is decreased by 25%, determine the percentage change in (i) its perimeter, (ii) its area. When the grocery store orders a large shipment of chocolate candy just before Valentine's Day, this type of inventory is typically called: Select all the correct answers. What were the impacts of the Cuban Missile Crisis? How did Frederick William IV of Prussia end the German side of the revolutions of 1848? What was the impact of Uncle Tom's cabin in the North?A. It led to the creation of the Underground RailroadB. It brought slavery to life for many who were not previously concerned with the issueC. It provided a safe home for slaves to escape toD. It caused the North to ban slavery What measures the market value of all final goods and services produced within a country in a given time period what do you mean by illness? An acute triangle has two sides measuring 8 cm and 10 cm. What is the best representation of the possible range of values for the third side, s?2 < s < 186 < s < 12.8s < 2 or s > 18s < 6 or s > 12.8