.
T
Which of the following objects are not contained within
an Access database?
Select one:
a Tables and forms,
b. Queries and reports.
c. Macros and Modules
d. Web sites and worksheets​

Answers

Answer 1

Answer:

17 38 ay

Explanation:

a


Related Questions

Create a program which takes two integers as input from the command line. In your code, allocate space for a 2D array dependent on user input. For example, if they enter 30 40 then your program should allocate space using double **. Once the memory is allocated, initialize the data by setting the value at index (i, j) equal to its position a

Answers

Answer:

In C:

#include <stdio.h>

#include <stdlib.h>

int main() {

int r,c;

printf("Row: "); scanf("%d", &r);

printf("Cols: "); scanf("%d", &c);  

double *myarr = (int *)malloc(r * c * sizeof(int));

double inputs = 0.0;

for (int rww = 0; rww < r; rww++){

for (int ccl = 0; ccl < c; ccl++){

 inputs= inputs+1.0;

 *(myarr + rww*ccl + ccl) = inputs; }}

return 0;}

Explanation:

This declares the rows and columns as integers

 int r,c;

This gets the number of rows

printf("Row: "); scanf("%d", &r);

This gets the number of columns

printf("Cols: "); scanf("%d", &c);  

This dynamically allocate space for array myart

double *myarr = (int *)malloc(r * c * sizeof(int));

This initializes the inputs to the array to 0.0

double inputs = 0.0;

This iterates through the array and initializes each element of the array by its index

for (int rww = 0; rww < r; rww++){

for (int ccl = 0; ccl < c; ccl++){

 inputs= inputs+1.0;

 *(myarr + rww*ccl + ccl) = inputs; }}

Aliah finds an old router that does not support channel bonding. What frequency are the channels limited to?

A.
10 MHz
B.
20 MHz
C.
40 MHz
D.
80 MHz

Answers

A because it’s slower

for java ?(Business: check ISBN-13)ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13. The last digit d13 is a checksum, which is calculated from the other digits using the following formula:10 - (d1 + 3d2 + d3 + 3d4 + d5 + 3d6 + d7 + 3d8 + d9 + 3d10 + d11 + 3d12) % 10If the checksum is 10, replace it with 0. Your program should read the input as a string.Display "invalid input" if the input is incorrect.Sample Run 1Enter the first 12 digits of an ISBN-13 as a string: 978013213080The ISBN-13 number is 9780132130806Sample Run 2Enter the first 12 digits of an ISBN-13 as a string: 978013213079The ISBN-13 number is 9780132130790Sample Run 3Enter the first 12 digits of an ISBN-13 as a string: 9780132097801320 is an invalid inputClass Name: Exercise05_47

Answers

Answer:

In Java:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 String isbn;

 System.out.print("First 1:2 digits: ");

 isbn = input.nextLine();

 if(isbn.length()==12){

 int chksum = 0;

 for(int i = 0; i<12;i++){

     if((i+1)%2==0){      chksum+= 3 * Character.getNumericValue(isbn.charAt(i));          }

     else{          chksum+=Character.getNumericValue(isbn.charAt(i));          }  }

 chksum%=10;

 chksum=10-chksum;

 if(chksum==10){

 System.out.print("The ISBN-13 number is "+isbn+"0");}

 else{

 System.out.print("The ISBN-13 number is "+isbn+""+chksum);          }   }

 else{

     System.out.print("Invalid Input");

 }     }}

Explanation:

See attachment for explanation where comments are used to explain each line

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). Ex: If the input is: 200000 210000 the output is: This house is $200000. The change is $-10000 since last month. The estimated monthly mortgage is $850.0. Note: Getting the precise spacing, punctuation, and newlines exactly right is a key point of this assignment. Such precision is an important part of programming.

Answers

Answer:

In Python:

cprice= int(input("Current price: "))

lmonth= int(input("Last month's price: "))

print("This house is $"+str(cprice))

print("The change is $"+str(cprice-lmonth)+" since last month")

print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")

Explanation:

Get current price

cprice= int(input("Current price: "))

Get last month's price

lmonth= int(input("Last month's price: "))

Print the current price

print("This house is $"+str(cprice))

Print the change

print("The change is $"+str(cprice-lmonth)+" since last month")

Print the mortgage

print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")

Subtraction + Decision and Loop
This is a twist on the previous exercise that will help you review loops and decision structures. You will again ask the user to enter two numbers. However, you will ALWAYS subtract the smaller number from the larger number to ensure that you never get a negative number for an answer. You do this by checking the numbers and switching them if they are not in the right order (larger then smaller). All of this checking, switching, subtracting, and output of the answer should occur in a function.
((( THIS WAS THE PREVIOUS EXERCISE
Function Basics - Arguments and Parameters
This is another easy exercise to test your knowledge of the fundamentals. In main(), ask the user to enter two integers. Pass those two integers to a function that will subtract one number from another. This function must also output the answer to the user.
Output:
Enter two integers (separated by a space) and this program will subtract them: [user enters: 5 7]
5 - 7 = -2
Notes and Hints:
1) From now on, you must use a function prototype for all programs that use functions. Don't expect me to ask for it in each exercise. )))
Finally, ask the user if they would like to run the program again. By now, you should know exactly what type of loop to use.
Output:
Enter two integers (separated by a space) and this program will subtract the smaller from the larger: [user enters: 7 5]
7 - 5 = 2
Do you want to run this program again? [user enters: y]
Enter two integers (separated by a space) and this program will subtract the smaller from the larger: [user enters: 5 7]
7 - 5 = 2
Do you want to run this program again? [user enters: n]
Notes and Hints:
1) As always, make sure you accept an upper or lower case 'Y'

Answers

Answer:

In Python:

def subsmall(num1,num2):

   if num1 > num2:

       return num1 - num2

   else:

       return num2 - num1

   

repeat = True

while(repeat):

   num = input("Enter two integers: ")

   nums = num.split(" ")

   print(subsmall(int(nums[0]),int(nums[1])))

   runagain = input("Run program again? ").lower()

   if  runagain == "y":

       repeat=True

   else:

       repeat = False

Explanation:

The function begins here

def subsmall(num1,num2):

This subtracts num2 from num1 if num2 is smaller

   if num1 > num2:

       return num1 - num2

If otherwise, subtract num1 from num2

   else:

       return num2 - num1

The main begins here

This initialiazes a boolean variable to true    

repeat = True

This loop is repeated until the boolean variable is false

while(repeat):

Prompt to enter two integers

   num = input("Enter two integers: ")

Split the string by space

   nums = num.split(" ")

This passes the two integers to the function and also prints the differences

   print(subsmall(int(nums[0]),int(nums[1])))

Prompt to run the program again

   runagain = input("Run program again? ").lower()

If input is Y or y, the loop repeats

   if  runagain == "y":

       repeat=True

The program ends if otherwise

   else:

       repeat = False

Who likes virtual if you do what do you like about ot

Answers

Virtual is chill cuz I don’t have to wake up at 5am for in person

Answer:

Explanation:

I do not like virtual because I like to go outside.

what is the structure of an HTML document. pls answer I don't want any links pls explain too  ​

Answers

Answer:

What is a HTML document?

It's a text document saved with the extension . html or . htm that contains texts and some tags written between "< >" which give the instructions needed to configure the web page. These tags are fixed and definite and will be currently explained in the tutorials when applied and needed.

What is HTML structure?

An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.

What is the basic structure of HTML template?

An HTML document has two* main parts: head. The head element contains title and meta data of a web document.

How is an HTML document structured?

An HTML 4 document is composed of three parts: a line containing HTML version information, a declarative header section (delimited by the HEAD element), a body, which contains the document's actual content.

Explanation :

HELLOOOO ARMY! HOPE U HAVE A WONDERFUL DAY! MAY NAMJESUS BLESS U !

Stream life goes on and dynamite we are about o reach 1B!

And trend these hashtags:

#Westankings

#scammys

AND FINALLY , SARANGAE BOROHAEEE!!!

Explanation:

An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.

Which term best describes these lines?

count = 0

loop through list

if “basketball” is found

add one to count

output count

Python 3 code
selection program
pseudocode
sequential program

Answers

The term best describing these lines is called pseudocode. Essentially a “text-based” detail (algorithmic) design tool.

Compare and contrast the advantages and disadvantages of the windows, apple and linux operating systems?

Answers

The comparison among windows, apple, and Linux operating systems are they provide is windows is the most popular among these operating systems.

What are Windows, apple, and Linux operating systems?

Linux is completely open-source, unlike Windows and macOS, so it may be altered and personalized. There are numerous variations, sometimes known as distributions because it is open-source.

You can perform tasks that Windows cannot perform. However, Windows is also good because it offers more features than Apple.

Therefore, the comparison between the operating systems Windows, Apple, and Linux shows that Windows is the most widely used of them.

To learn more about the operating system, refer to the link:

https://brainly.com/question/30214837

#SPJ1

please help me on this coding assignment i need to finish it today :)
Assume that a, b, and c are variables of type int. Consider the following three conditions.

I.
(a == b) && (a == c) && (b == c)
II.
(a == b) || (a == c) || (b == c)
III.
((a - b) * (a – c) * (b – c)) == 0
Which of the conditions above evaluates to true given that at least two among the variables a, b, and c are equal?

II and III
I only
I and II
III only

Answers

Answer:

II and III

Explanation:

(i) would only evaluate to true if all variables are equal.

(ii) evaluates to true if one or more of the clauses is true.

(iii) if two variables are equal, at least one factor will evaluate to 0, making the result of the multiplication zero and thus the expression true.

Which type of software is for sale directly to consumers in stores and online?
A. demo software
B. OEM software
C. public software
D. retail software

Answers

Answer: its b my guy

Explanation:

Consider the method get Hours, which is intended to calculate the number of hours that a vehicle takes to travel between two mile markers on a highway if the vehicle travels at a constant speed of 60 miles per hour. A mile marker is a sign showing the number of miles along a road between some fixed location (for example, the beginning of a highway) and the current location. IN The following table shows two examples of the intended behavior of getHours, based on the int parameters markeri and marker2. marker1 marke 100 220 100 700.5 Consider the following implementation of getHours. public static double getHours (int markeri, int ON 20 | 2 15. . . e no E /* missing statement */ return hours; Which of the following statements can replace /* missing statement */ so getHours works as intended?
(A) double hours = (Math.abs (markerl) - Math.abs (marker2)) / 60.0;||
(B) double hours = Math.abs (markeri - marker2 / 60.0)
(C) double hours = Math.abs (marker1 - marker2) / 60.0;
(D) double hours = Math.abs((markeri - marker2) / 60);
(E) double hours = (double) (Math.abs (marker1 - marker2) / 60);

Answers

Answer:

Replace the comment with:

(c) double hours = Math.abs (marker1 - marker2) / 60.0;

Explanation:

See attachment for right presentation of question

Analyzing the options:

(a): May return a negative result

This option will return a negative value if marker1 is less than marker2 because it subtracts the absolute value of marker2 from the absolute value marker1.

This literally is not different from marker1 - marker2

(b): Incorrect expression

This divides only marker2 by 60, then subtracts the quotient from marker1. This is not the expected expression.

(c) This option is correct

This correctly calculate the positive difference between marker1 and marker2 and the result is divided by 60.0 (note 60.0 not 60)

(d) & (e) Integer division

When a variable declared as double is divided by an integer variable or value, the result of the computation is not always accurate due to approximation

what are the main technologies that have contributed to the growth and commercialization of the internet .​

Answers

Answer:

Explanation: The main forces that led to the commercialization of the internet are its demand and the importance of the Internet.

TCP and IP technologies allowed for the connection of many networks to form on large network. This tech used packets and provided error-recovery mechanisms. Hence many small networks were combined to form the internet.

There are several technology of the Internet and the World Wide Web. The hand of projects in computer networking, mostly funded by the federal government.

The projects made communications protocols that shows the format of network messages, prototype networks, and application programs such as browsers.

The advent of computer devices and telephone network was the underlying physical infrastructure upon which the Internet was built. The commercialization and exponential growth of the internet started in the early 1990s.

It was due to high meetup of technologies, including the development of personal computers with graphical operating systems, widespread availability of internet connection services, the removal of the restriction of commercial use on NSFnet, etc.

Conclusively, These happenings combined to give the commercial push for an easy way to share and access information.

Learn more from

https://brainly.com/question/22600646

Deidre is studying for a history exam. She reads the chapter in her textbook that covers the material, then realizes she needs to learn the names, dates, and places mentioned in the reading.

Which note-taking tool will help Deidre quickly find the names, dates, and places later when it is time to review?

a sticky note
a highlighter
electronic notes
flash cards

Answers

Answer:

B: Highlighter

Explanation:

Just answered on edge, hope this helps

Answer: B) A Highlighter

Explanation:

____ occurs when weaker companies are eliminated and the strong companies survive

Answers

Answer:

sounds like a monopoly but is there a word bank?

Explanation:

"the exclusive possession or control of the supply of or trade in a commodity or service."-Oxford dictionary

22. The Disc Drive is also known as the:

Answers

Answer:

HDD Hard Disk Drive

Explanation:

Create a class called Jack that extends Leo. This class must have the following behaviors/methods. You must use the inheritance to reuse the methods from the parent classes. Solution without using the inheritance will get zero points. re-writting the code that already exists will get zero credit. A call to the methods in the parent classes must be donemethod description
method1 display "Jack 1 Leo 1 "
method2 displays "Don 2 Jack 2"
method3 displays "Jack 3 Leo 3 Don 2 "
toString displays" Jack 3 Leo 1"

Answers

Answer:

public class Leo{

public String method1(){

return "Jack 1 Leo 1";

}

public String method2(){

return "Don 2 Jack 2";

}

public String method3(){

return "Jack 3 Leo 3 Don 2";

}

public String toString(){

return "Jack 3 Leo 1"

}

}

public class Jack extends Leo{

}

Explanation:

Leo is the parent class and jack inherits all of its attributes from Leo

So when you call the following code in the main method:

Jack j = new Jack();

System.out.println(j.method1);

it should print Jack 1 Leo 1

This is because the program first checks if method 1 exists in the Jack class

Because it doesn't exist it then goes to the parent class which is Leo.

And in the Leo class method1 displays "Jack 1 Leo 1 "

So it prints that

function _one(array)
Create a JavaScript function that meets the following requirements:




Please give your function a descriptive name
o ( _one is not acceptable, and is only displayed here for illustration purposes)
Receives an array of integers as an argument
The function removes all duplicates (if they exist) from the array and returns it to the caller.
Assume the input array parameter will have at least one element in it.
Examples :
_one([33])
➔ [33]
_one([33, 33, 1, 4])
➔ [1, 4]
_one([33, 33, 1, 4, 1]) ➔ [4]​

Answers

Answer:

function removeRepeaters(list){

   var goodList = [], badList = {}, used = {}, n;

   // ensure that the argument is indeed an array

   if(!Array.isArray(list)){

        throw "removeRepeaters: Expecting one argument of type Array";

   }

   // loop through the array and take note of any duplicates

   for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;

   // now loop through again, and assemble a list of non-duplicates

   for(n in list) if(badList[list[n]] == undefined) goodList[] = list[n];

   return goodList;

}

Explanation:

I assume you're familiar with trinary operators, but just in case, that's what's happening in this first for loop:

for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;

this is the same as saying:

for(n in list){

   if(used[list[n]] == true){

       badList[list[n]] = true;

   } else {

       used[list[n]] = true;

   }

}

This loop flags all of the values in the list that are duplicated.  Note that both "badList" and "used" are declared as objects instead of arrays.  This allows us to compare keys in them with an == operator, even if they're not defined, making it a convenient way to flag things.

Note that I haven't tested it, so I may have overlooked something.  I suggest testing it before handing it in.

8.10 Code Practice: Question 2
Edhesive

Answers

Answer:vocab = ["Libraries", "Bandwidth", "Hierarchy", "Software", "Firewall", "Cybersecurity","Phishing", "Logic", "Productivity"]

print (vocab)

for i in range (1, len (vocab)):

   count = i - 1

   key = vocab[i]

   while (vocab[count] > key) and (count >= 0):

       vocab[count+1] = vocab[count]

       count -= 1

       vocab [count+1] = key

       print(vocab)

Explanation: bam baby

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

vocab = ["Libraries", "Bandwidth", "Hierarchy", "Software", "Firewall", "Cybersecurity","Phishing", "Logic", "Productivity"]

print (vocab)

for i in range (1, len (vocab)):

  count = i - 1

  key = vocab[i]

  while (vocab[count] > key) and (count >= 0):

      vocab[count+1] = vocab[count]

      count -= 1

      vocab [count+1] = key

      print(vocab)

See more about python at brainly.com/question/26104476

You should always keep a backup of data stored in the cloud because the cloud provider does not automatically do this True or false???

Answers

Answer:

False

Explanation:

PLEASE QUICK IM TIMED.
Write a program that assigns the value 14 to a variable. Then print out the type of the variable. What will the output of the program be?

Answers

This is for Python

Code:

variable = 14

print(type(variable))

Output:

<class 'int'>

Assume that the final grade for a course is determined based on this scale - A: 900 points, B: 800-899 points, C: 700-799 points, D: 600-699 points, F: 599 or fewer points. Write a function named get_letter_grade() that takes the number of points the student has earned as a parameter. It should return a string containing (only) the letter grade the student will receive.

Answers

Answer:

In Python:

def get_letter_grade(points):

   if points>=900:

       grade ="A"

   elif points>=800 and points < 900:

       grade ="B"

   elif points>=700 and points < 800:

       grade ="C"

   elif points>=600 and points < 700:

       grade ="D"

   else:

       grade = "F"

   return grade

Explanation:

This defines the function

def get_letter_grade(points):

The following if-else if conditions check the score to determine the appropriate grade

   if points>=900:

       grade ="A"

   elif points>=800 and points < 900:

       grade ="B"

   elif points>=700 and points < 800:

       grade ="C"

   elif points>=600 and points < 700:

       grade ="D"

   else:

       grade = "F"

This returns the grade

   return grade

Which of these is NOT an Al technology?
a. Facial recognition
b. Nature
c. Robotics
d. Animat
the only thing that computers ur​

Answers

Explanation:

The answer is B since facial recognition uses cameras that scan who you are. Robotics is controlled by someone with a remote or a simple command.

The set of three integer values for the lengths of the sides of a right triangle is called a Pythagorean triple. These three sides must satisfy the relationship that the sum of the two sides is equal to the square of the hypotenuse. Find all integer Pythagorean triples for side1, side2, and the hypotenuse, all no larger than 500. Use a triple-nested for loop that tries all possibilities. This program is an example of brute force computing. You will learn in more advanced computer science courses that there are many interesting problems for which there is no algorithmic approach other than using sheer brute force. This program does not need any input from the user. Write at least one bool function that takes the 3 sides of the triangle and returns true or false based on if it is a right triangle or not.

Answers

Answer:

In Python:

def  Pythagorean_triple(hyp,side1,side2):

   if hyp**2 == side1**2 + side2*2:

       return True

   else:

       return False

               

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

for i in range(1,501):

   for j in range(1,501):

       for k in range(1,501):

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

Explanation:

This defines the function

def  Pythagorean_triple(hyp,side1,side2):

This checks for pythagorean triple

   if hyp**2 == side1**2 + side2*2:

Returns True, if true

       return True

   else:

Returns False, if otherwise

       return False

               

The main method begins

This prints the header

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

The following is a triple-nested loop [Each of the loop is from 1 to 500]

for i in range(1,501): -->The hypotenuse

   for j in range(1,501): -->Side 1

       for k in range(1,501):-->Side 2

This calls the function and prints the required output i.e. the sides of the triangle and True or False

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months. After a year, he was not allowed to update the software. However, he could continue using it. Why did the updates stop?

Answers

Group of answer choices.

A. The software was corrupt and resulted in a bug.

B. He purchased a license with maintenance for a year.

C. The organization discontinued the software.

D. He purchased an open-source license.

E. He purchase a perpetual non-maintenance license.

Answer:

B. He purchased a license with maintenance for a year.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

In this scenario, Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months. However, after a year, he was not allowed to update the software but he could continue using it.

This ultimately implies that, Wesley purchased a licensed software with maintenance for a year and as such he would stop receiving an update from the software developer after his subscription expired.

please answer in python language​

Answers

print("Choose an option: ")
print(" [1] $1,000,000")
print(" [2] 0.01 x2/day")
answer = int(input("> "))

if answer == 1:
print("Here's your $1,000,000")
elif answer == 2:
initial = .1 # initial investment of a penny
final = ( initial * 2**30 ) - initial
print('A penny will be $' + format(final, '.2f'), 'in 30 days.')
else:
print(" - invalid option.. exiting")
exit(0)

there is a structure called employee that holds information like employee code, name, date of joining. Write a program to create an array of the structure and enter some data into it. Then ask the user to enter current date. Display the names of those employees whose service is 15 or more than 15 years according to the given current date.

Answers

Answer:

The program in C is as follows:

#include<stdio.h>

#include<conio.h>

struct employee{

char empname[50]; int empcode, day,mon,yr;

}employees[30];

int main(){

int total;

printf("Numbers of Employees : "); scanf("%d",&total);

for(int kt=0;kt<total;kt++){

printf("Employee Code : "); scanf("%d",&employees[kt].empcode);

printf("Name: "); scanf("%s",employees[kt].empname);

printf("Date of Joining [dd mm yyyy]: "); scanf("%d%d%d",&employees[kt].day,&employees[kt].mon,&employees[kt].yr); }

int year;

printf("\nCurrent Date [Year only]: "); scanf("%d", &year);

printf("Code\t\t\t Name\t\t\t Date of Joining\n");

for(int kt=0;kt<total;kt++)

if((year - employees[kt].yr) >= 15)

printf("%d\t\t\t %s\t\t\t %d/%d/%d\n",employees[kt].empcode,employees[kt].empname, employees[kt].day,employees[kt].mon,employees[kt].yr);

}

Explanation:

See attachment for explanation where comments were used to explain some lines

Select all the correct answers.
Mark is unable to connect to the internet or to any of the computers on his network, while nearby computers don’t have this problem. Which three issues could be causing the problem?

slow transmission of data
improper cable installation
faulty software configuration
interference between the signals on cables close to each other
improper connection of a network cable to the jack

Answers

Answer:

I. Improper cable installation.

II. Interference between the signals on cables close to each other.

III. Improper connection of a network cable to the jack

Explanation:

The standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. Thus, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

In this scenario, Mark is unable to connect to the internet or to any of the computers on his network, while nearby computers don’t have this problem. Therefore, the three issues which could be causing the problem are;

I. Improper cable installation: this involves not installing the ethernet cable in the correct destination port.

II. Interference between the signals on cables close to each other: interference usually results in the disruption in network signals.

III. Improper connection of a network cable to the jack: the right connectors such as RJ45 should be used.

The Zoom feature allows you to either increase or decrease the size of your document on the screen,
Please select the best answer from the choices provided
True or false

Answers

The answer will be (True) hope this helps!


Have a wonderful day!

Kyla, a business analyst uses test scripts while testing an application before it is released to the client. Why do business analysts use test scripts?
A.
to perform acceptance testing
B.
to code functions correctly
C.
to write a test plan
D.
to create a test environment
E.
to review and update test cases

Answers

Answer:

D. to create a test environment

Explanation:

After releasing it will be "production"

Other Questions
PLEASE HELP IM BEING TIMED! I WILL GIVE BRAINLIEST The table and the graph below each show a different relationship between the same two variables, x and y:How much more would the value of y be on the graph than its value in the table when x = 12? 150 300 450 600 help pls, fast to, thx Is Follow me! a complete sentence? Calculate the force of Earth's gravity on a spacecraft 3.00 Earth radii above the Earth's surface if its mass is 1500 kg.Answer in Newtons.F= ? N A square sandbox has sides that are 10 feet long. What is the sandbox's area? Ahmed multiplies 8 by 1.15. Which number he is trying to find? A spinner has 3 equal sections that are purple, green, and blue. What is the probability of not landing on blue? When an equation in one variable is solved using a system of equations, the solution is always the of each intersection. HELP FAST!! please help me i need help really bad thank you i will give u the brainly answer How can you tell if a pattern is quadratic or linear? PLEASE HELPI will give brainliest to right answer Sierra has enough fencing to make three chicken coops shown each has the same perimeter which has the greatest area? A student is writing a research paper about the events leading up the Gulf War. Why is it important for the student to verify all the sources cited in the paper?A. to convince the audience to support the students perspectiveB. to ensure the facts in the sources are reliable and validC. to ensure there is a variety of primary and secondary sourcesD. to determine if there are evidence biases in the sources Which of the following is not associated with a tRNA molecule?anti-codonamino acidtranscriptiontranslation Pls help.A video producer might be asked to....A. Here all the actors.B. Decide whitch films should be made.C. Make suggestions to the director about plot.D. Remove anything that should not be in the film. What statement best describes the role of independent voters in the electoral system A triad is a three-note chord. It is written on three successive staff lines or three successive spaces of the staff. The three notes of a triad are named (from bottom to top) root, third, and fifth, these are built from the first, third, and fifth notes of the scale.You may use whole notes to construct your triads. Make sure that you include all of the symbols such as sharps, flats, treble clef, and bass clef. Identify your triads with capital letters symbolizing the major triads. Factorise this pleasee x2+ 11x+ 18