Answer:
now you can give them brainlist by clicking on the crown on their answer! :)
Explanation:
What device to use when downloading a large file?
Discuss the main characteristics of the database approach and how it differs from traditional file systems.
The database system allows the creation of a single depository of information, which is updated periodically and which can be used simultaneously by many users, since this type of system allows the effective sharing of all data stored in its depository . In addition, this is a secure system and is very difficult to break into. This is because of the efficiency of the software used to maintain it. However, the use of these softwares can be a little complicated for users, in addition to requiring a high economic cost to obtain them.
The traditional file system, in turn, each user must obtain their own file related to the application they want to run. This may seem dull in comparison to the database, but it is advantageous as it does not require any spending on software, as it is simple and there are several cheap and efficient tools and editors on the market. However, this system is not so safe, it can cause isolation of data and even data inconsistency, which disrupts the entire system.
How many different Microsoft Windows file types can be infected with a virus?
What term is used to describe an individual's money and personal property? budget income assets finances
Answer:
Pretty sure it's assests.
Explanation:
Income - Intake of money.
Budget - How much money you can spend.
Finances - Things you need to pay ort fund.
An asset is made up of the set of quantifiable goods and properties, which are owned by a person or a company.
What is an asset?A right that has financial value is called an asset, which is a resource with value that someone owns.
Characteristics of an assetThe assets are recorded in the accounting balances, forming the credit.The assets will receive a monetary value each, this valuation will depend on different criteria.Therefore, we can conclude that the asset is the set of personal property, rights and other resources owned by a person.
Learn more about an asset here: https://brainly.com/question/16983188
A stop sign is a example of:
A. An advertisement
B. An animated text
C. An audio text
D. A visual text
Answer:
A visual text
Explanation:
This is because it is used to send information through something you can see. Visual text is an image, word or picture that doesn't move used to share information. So because a stop sign can't move and it uses words to share information it is an example of a visual text.
HOPE IT HELPED
Write a MATLAB function named average_of_scores_with_drops The function will have two inputs and two return values. The first input will be a list of scores. The second input will be a postive integer representing the number of scores to drop. It will not be larger than the length of the list. Your function should determine the average of the scores after dropping the specified number of lowest scores. The first return value must be a real number equal to the average score. The second return value must be the number of items that were averaged. Notes: Example Test Case: SCORES
Answer:
-%Define the function.
function [avg, ele_left] = average_of_scores_with_drops(input_list, drop_element)
%Sort the list.
input_list = sort(input_list);
%Compute the length of the list.
len_list = length(input_list);
%Declare and initialize the variable.
sum = 0;
%Increase the element to be drop by 1.
i = drop_element + 1;
%begin the for loop.
for k = i : length(input_list)
%Add the elements.
sum = sum + input_list(k);
%End of the for loop.
end
%Compute the elements left after dropping the dropped element.
ele_left = length(input_list) - drop_element;
%Compute the average of the elements left.
avg = sum/ele_left;
%End of the function defined.
end
%Run the following code in the command prompt.
%Call the function and return the average
%score and the number of elements
%whose average is computed.
[average_score , number_of_items] = average_of_scores_with_drops([8 6 1 2 3 5 10], 2)
SAMPLE OF OUTPUT
average_score = 6.40000000000000
number_of_items = 5
cellular digestion associated by what organelles?
Answer:
lysosomes
Explanation:
Cell Digestion and the Secretory Pathway. The primary sites of intracellular digestion are organelles known as the lysosomes, which are membrane-bounded compartments containing a variety of hydrolytic enzymes.
what are the earliest invention in human history
Answer: Tools, Boats, Hand made bricks.
Explanation: The tools were the first technological advancement, the boats were the next, them hand made bricks for construction.
Help me for this question
Answer:
Answer C
Explanation:
You are welcome
The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely
Answer: Operational Manager
Answer: operational manager
Explanation: APEX
When following maintenance procedures, it is important to carefully read the procedures and to complete
each step before moving to the next step.
True or
False
What does an output allow a computer to do
Output devices allow the computer system to interact with the outside world by moving data into and out of the system.
Answer:
the previous answer belowed me looked it up online LOL
but im taking this quiz rn and the answer is either Display information or Recieve information thanks bye
Explanation:
Web pages are accessed through a software program called a _____.A) web crawlerB) web browserC) web serverD) web app drawer
Answer: B) web browser
Explanation: A web browser may be explained as a software program or application available on various operating systems such as windows, Mac, Android, iOS among others. This program acts as an interface between information available on websites or pages and users. This application takes a specified uniform resource locator or web address as input and outputs the information available on a web page. Google Chrome, Internet Explorer, Microsoft edge, opera mini, Safari, Firefox and so on.
Which color indicates the private, trusted segment of a network?
A. Green.
B. Orange.
C. Red.
D. Blue.
Answer:
A. Green.
Explanation:
In order to distinguish or represent different levels of networks, SmoothWall open source firewall solution, made use of three distinct colors to indicate different meanings. These are:
1. The red color is used to reveal that, there is no connection or network
2. Orange color reveals the untrusted segment of the network but shares the Internet connection
3. Green color indicates the private, trusted segment of a network
Hence, in this case, the correct answer is option A. Which is GREEN
Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, search for, and process information? MP3 player. Hard drive. Flash drive. Personal computer.
Answer:
It's personal computer
Explanation:
I got it right on my assignment
The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups. Active Directory Administrative Center Active Directory Domains and Trusts Active Directory Sites and Services Active Directory Users and Computers
Answer:
Active Directory Users and Computers
Explanation:
Active Directory Users and Computers is a term that describes Microsoft Management Console that is utilized in conducting and managing Active Directory, the objects; which comprises of the users and computers, the Organizational Units, together with their characteristics.
Hence, the Active Directory Users and Computers utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups.
People convicted of cyberbullying in most states
face no punishment for their actions.
face varying degrees of punishment.
are taught how to use technology positively.
are forced to do community service.
Answer: The Answer is B. face varying degrees of punishment.
Hope this helps! ^^ (also i know this is the right answer because i got it correct)
Answer:
b
Explanation: the punishment depends on the severeness , so we dont know the exact punishment
true false) keybord has two shift keys.
Answer:
True, looking at 'em right now!
Explanation:
You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?
Answer:
texts and music are best compressed using lossy compression and videos are best compressed using lossless compression
Explanation: texts and music are best compressed using lossy compression because there are not many details to leave out while pictures and videos are best compressed using lossless compression because they need to be in good quality
Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos
A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.
This type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.
However, a lossless compression is such that even after the file size is reduced, the quality remains unchanged. This type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.
Hence;
Lossy compression should be applied to text messages and musicLossless compression should be applied to images and videosRead more about file compressions at:
https://brainly.com/question/13663721
paragraph on how atms work
What are three things to consider in programming design?
the problem being addressed, the goals of the project, and the programming language that will be used
the problem being addressed, the goals of the project, and the age of the end users
the age of the end users, the programming language that will be used, and the programming style of the
programmers working on the project
the age of the end users, the goals of the project, and the programming style of the programmers working on the
project
The issue being solved, the project's objectives, and the users' ages. The project's programmers' programming styles, the programming language they will use, and the age of the intended customers.
What is programming language?Programming language is defined as a computer language used to converse with computers by programmers (developers). Orthogonality or simplicity, available control structures, data types, and data structures, syntactic design, support for abstraction, expressiveness, type equivalence, strong versus weak type checking, exception handling, and limited aliasing are among the characteristics of a programming language.
Clarity, simplicity, and unity offer a way to express algorithms as well as a framework for thinking about them. Every possible feature combination has value thanks to orthogonality. Surprisingly, it may frequently be reduced to three basic programming constructs known as loops, selects, and sequences.
Thus, the issue being solved, the project's objectives, and the users' ages. The project's programmers' programming styles, the programming language they will use, and the age of the intended customers.
To learn more about programming language, refer to the link below:
https://brainly.com/question/12696037
#SPJ5
_______tools enable people to connect and exchange ideas.A) Affective computing. B) Social media. C) Debugging D) Computer forensics.
Answer:
B) Social media.
Explanation:
Social media is well, a media, that allows you to share things with people and have discussions.
The parameter passing mechanisn used in C is
Answer:
Hope you understand this answer
Pass by value is the answer
When does the VB.NET programming environment start to operate?
A. once a VB.NET project is compiled
B. once a VB.NET project is created in the Microsoft Visual Studio environment
C. once a VB.NET project is debugged
D. once a VB.NET project folder is opened
E. All of the above are correct
Answer:
B. once a VB.NET project is created in the Microsoft Visual Studio environment.
Explanation:
Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.
What is true about connectionless packet switched networks? a. each datagram must contain both source and destination addresses b. without a connection, datagrams may not arrive in sequential order at the destination c. establishment of a connection between communicating points is not required prior to exchanging datagrams, thus reducing overhead communications d. all of the above are true
Answer:
d. all of the above are true
Explanation:
Connectionless Packet Switching is a term that is used in computer networking operations to describe the breaking of information exchange path into a various packet of small sizes acquired and refined over network switches and routers, which is then transferred from one subsequent node to the other. It is sometimes referred to as Datagram Networks
However, during this operation, Connectionless Packet Switching must satisfy the following amongst others:
1. each datagram must comprise both source and destination addresses
2. without a connection, datagrams may not come in sequential order at the destination
3. establishment of a connection between communicating points is not needed prior to exchanging datagrams, thus reducing overhead communications
Therefore, considering the available options, the correct answer is option D
Question #1
What do you use to navigate through a file by moving the view
up and down or side to side?
O Title bar
O Ribbon
O Document area
O Scroll bar
Answer:
Answer is the Scroll Bar
Explanation:
When you are in a document, the way you move around or navigate in it is by dragging the scroll bar that is to the left of your screen or at the bottom of your screen. Hope this helps!
What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Something else? Discuss this question and provide support for your answer.
Answer:
The single greatest physical threat to information systems is:
Sabotage
Explanation:
Sabotage describes the efforts of internal persons to ensure that a system does not operate as intended or is destroyed. Among the threats to information systems, this is the greatest. The problem with sabotage is that the operators are internal, they know the system very well. They understand the weak points and the strengths of the system. They are internal terrorists to any information system. These internal saboteurs are capable of using any means to achieve their purpose. Therefore, it is necessary to scrutinize employees from time to time to discover internal risks.
The question is in the picture
Answer:
nordthaf
Explanation:
nofth
Which of the following statement about device formatting is FALSE?
A) Device manufacturers store the initial file-system data structures in the device.
B) Operating system can create multiple partitions with in a single device.
C) Volume creation is implicit when a file system is placed directly within a partition.
D) Not every partition contains a copy of the operating systems.
Answer:
The correct option is;
A) Device manufacturers store the initial file-system data structures in the device.
Explanation:
Before a storage device can be used for data storage, it is required to prepare the device for use and to make the device to become visible to the operating system by formatting of the device
New storage devices are not pre-formatted or come with a ready to use file system as there are different file systems specifically designed for particular operating systems or operating environment.
Formatting creates partitions, makes the hard drive visible to the operating system and creates a file system that is new such that the storage device can be used for storing files.
_______ tools enable people to connect and exchange ideas.
A) Affective computing.
B) Social media.
C) Debugging
D) Computer forensics.
Social media is a tool that enables people to connect and exchange ideas. Thus the correct option is B.
What is communication?Communication is referred to the exchange of information between two individuals in the form of conversation, opinion, suggestion, or advice with the help of medium or direct interaction.
Social media is referred to as a tool of communication that enables people to share their ideas, thoughts, and opinions with a wide network of people and helps them to get information about the events happening in the world.
An internet tool for interaction, information sharing, and social networking is social media. Networking software that connects people around the world is an internet-based technology, strictly understood.
Therefore, option B is appropriate.
Learn more about Communication, here:
https://brainly.com/question/22558440
#SPJ5
Social media is a tool that enables people to connect and exchange ideas. Therefore, the correct answer is option B.
The exchange of information between two people in the form of conversation, opinion, suggestion, or advice with the use of a medium or direct interaction is referred to as communication.
Social media is referred to as a communication tool that enables individuals to communicate their thoughts, ideas, and opinions with a large network of people and assists them in learning about global events.
Social media is an online medium for communication, sharing of knowledge, and social networking. According to the definition of the term, internet-based technology includes networking software that links individuals worldwide.
Therefore, the correct answer is option B.
Learn more about communication here:
brainly.com/question/22558440
#SPJ6