Answer:
application demand model
Explanation:
ong answer, but make sure to provi
you
reasoning
Sales Company:
W.D. Widgets is a small company that sells widgets. They're mostly made up of salespeople who work with lots of clients.
You've taken over as the sole IT person for this company of 80-100 people.
R teils you to provision a machine for a new employee, you order the hardware directly from a business vendor.
You keep one or two machines in stock, in case of emergency. The users receive a username that you generate for them.
You then give them an orientation on how to login when they start. You currently manage all of your machines using
Windows Active Directory. The company uses only Windows computers. When a new computer is provisioned, you have
to nistallots of sales-specific applications manually onto every machine. This takes a few hours of your time for each
15
machine. When someone has an IT-related request, they email you directly to help them.
Almost all software is kept in-house, meaning that you're responsible for the email server, local machine software, and
instant messenger. None of the company's services are kept on the cloud.
Customer data is stored on a single file server. When a new salesperson starts, you also map this file server onto their
local machine, so that they can access it like a directory. Whoever creates a folder on this server owns that folder and
everything in it. There are no backups to this critical customer data. If a user deletes something, it may be lost for
everyone.
Answer:
Umm just go what your gut tells you to do
Explanation:
write c++ program from 1to 100 to find prime numbers using statement.
#include <iostream> using namespace std; int isPrimeNumber(int); int main() { bool isPrime; for(int n = 2; n < 100; n++) { // isPrime will be true for prime numbers isPrime = isPrimeNumber(n); if(isPrime == true) cout<<n<<" "; } return 0; } // Function that checks whether n is prime or not int isPrimeNumber(int n) { bool isPrime = true; for(int i = 2; i <= n/2; i++) { if (n%i == 0) { isPrime = false; break; } } return isPrime; }
write passage on computer virus
Answer:
A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.
hope it helpsThe inFS.open(str) function has a string parameter str that specifies the _____ of the file to open.
Answer:
str represents the name of the file to open
Explanation:
Required:
What does str represents in the above syntax
Before the inFS function can be used to access or read or write into a file, the file name has to be specified.
This could be done in any of the following ways:
1. inFS.open("abc.txt")
2. str = "abc.txt"; inFS.open(str);
In (1), the file name is specified directly into the function
While in (2), the filename is passed into a string variable which is then further passed to the inFS function.
In the case of this question, method 2 is used and the str represents the name of the file
Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.
Answer:
Following are the program to this question:
import java.util.*;//import package for user input
public class Main//defining main class
{
public static String Cat (String name, String gender, int age)//defining string method Cat that accept parameter value
{
return name + ';' + gender + ';' + age;//return parameter value
}
public static void main(String[] args) //defining main method
{
String name,gender;//defining String variable
int age;//defining integer variable
System.out.println("Enter name, gender and age: ");//print message
Scanner obx=new Scanner(System.in);//creating Scanner class object for user input
name=obx.next();//input name value
gender=obx.next();//input gender value
age=obx.nextInt();// input age value
System.out.println(Cat(name,gender,age));//print return method value
}
}
Output:
Enter name, gender and age:
dani
Female
12
dani;Female;12
Explanation:
In the above-given code, a string method Cat is declared, that accepts three variable "name, gender, and age", inside the method return keyword is used that returns the parameter values.
In the main method, the above parameter variable is declared, which is used to input value from the user-end, and used the print method to print its return value.
When multiple architects work on a construction plan, which section of a construction plan will help them keep track of when the changes are made and by whom?
A.
framing plan
B.
schedule
C.
title block
D.
bill of materials
Answer:
I believe that it is . A. framing plan
Explanation:
But I am not certain But I do know that it IS NOT B..
Answer:
the answer is schedule!!!
Explanation:
A short circuit can cause _______ because there is nothing in the circuit to limit the current and absorb the electrical energy. Heat builds up quickly in the wire and power supply.
Answer:
Fire
Explanation:
You'll get a giant spark. The electricity will flow freely causing over-heating or fire.
Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them
Answer:
A, template specifics, such as horizontal or vertical menu layout
Explanation:
Answer:
D. who will be using the site and the design theme selected for them
Explanation:
I am doing the exam right now.
From a neural network with 11 input variables, one hidden layer with three hidden units, and one output variable, how many parameters (weights and biases) needs to be estimated by this model?
Answer:
40
Explanation:
Given that:
A neural network with 11 input variables possess;
one hidden layer with three hidden units; &
one output variable
For every input, a variable must go to every node.
Thus, we can calculate the weights of weight with respect to connections to input and hidden layer by using the formula:
= ( inputs + bias) × numbers of nodes
= (11 + 1 ) × 3
= 12 × 3
= 36 weights
Also, For one hidden layer (with 3 nodes) and one output
The entry result for every hidden node will go directly to the output
These results will have weights associated with them before computed in the output node.
Thus; using the formula
= (numbers of nodes + bais) output, we get;
= ( 3+ 1 ) × 1
= 4 weights
weights with respect to input and hidden layer total = 36
weights with respect to hidden and output layer total = 4
Finally, the sum of both weights is = 36 + 4
= 40
How many fnaf games did Scott Cawthon make?
Answer:
8 but he is making FNaF security breach
Explanation:
there is FNaF VR help wanted
Answer:
8 or 10
Explanation:
JAVA...Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
CODE BELOW
public class RecursiveCalls {
public static void backwardsAlphabet(char currLetter) {
if (currLetter == 'a') {
System.out.println(currLetter);
}
else {
System.out.print(currLetter + " ");
backwardsAlphabet(--currLetter);
}
}
public static void main (String [] args) {
char startingLetter;
startingLetter = 'z';
/* Your solution goes here */
}
}
Answer:
RecursiveCalls.backwardsAlphabet(startingLetter);
Explanation:
The statement that is needed is a single-line statement. Since the class RecursiveCalls is already in the same file we can simply use that class and call its function without making a new class object. Once we call that class' function we simply pass the variable startingLetter (which is already provided) as the sole parameter for the function in order for it to run and use the letter 'z' as the starting point.
RecursiveCalls.backwardsAlphabet(startingLetter);
write the code that writes access granted if the correct password, swordfish is entered and access denied! otherwise
In python 3.8:
if input("Enter password: ") == "swordfish":
print("access granted")
else:
print("access denied!")
Using direct mapping, consider a 16-bit memory addresses, and a cache with 64 blocks, where each block is 8 bytes. What is the size of offset, block, and tag
Answer:
Tag Block Offset
7 6 3
Explanation:
Using direct mapping hashing:
Memory address size = 16 bits
Number of cache blocks = 64
Size of each block = 8 bytes
Thus;
Offest field = size of each block = 2^{3} = 3 bits
Number of blocks = 64 = 2
Thus, the index field is = 2^{6} = 6 bits of block
Tag filed is of size = 16 - (3+6) = 7 bits of tag
1) Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.
2) Write a statement that defines an array of string objects nameddirections. The array should be implicitly sized, with an initialization list containing the values "Up", "Down", "Left", and "Right.
Answer:
Explanation:
The following code statements are written in Java and are simple one line statements that can be into any Java code or function. The first code statement creates a simple integer array with 4 predefined values initialized.
1) int[] miles = {1,5,9,22};
The second code statement creates a simple String array with four-string objects in it.
2) String[] nameddirections = {"Up", "Down", "Left","Right"};
What is the information that oranges contain vitamin C considered?
Answer:
Nutritional Information or Nutritional facts.
Explanation:
They are on most foods, on medicines it's called Drug Facts, and on vitamins it's called Supplementary facts!
Match the following internet related terms to their definition
Answer:
1st buble goes to web address 2nd goes to browser 3rd goes to chat 4th goes to email
Explanation:
high level languages are closer to machine language than humans yes or no
Answer:
yes
Explanation:
because they were built from humans
Write a class that specify the characteristics of a car, like type (sedan, jeep, mini, SUV, etc), gear (auto, manual), maximum speed (mph), average fuel consumption (mpg), etc. Create few objects to illustrate your desired cars.
Answer:
Answered below
Explanation:
This is written in Kotlin programming language.
//Creating the class Car. The primary //constructor declares car's properties which //are initialized when it's objects are created.
class Car(
val type: String,
val gear: String,
val maxSpeed: Double,
val avgFuelConsumption: Double)
//Creating several objects of car.
val sedan: Car = Car("sedan", "auto", 23.4, 500)
val jeep: Car = Car("jeep", "manual", 40, 350)
val mini: Car = Car("mini", auto, 26.7, 86, 234)
What does using nesting in HTML allow you to do?
Style the HTML automatically
Automatically add missing opening or closing tags to the HTML
Prevent any misspelled tag keywords from appearing in the HTML
Improve readability and find and fix problems more easily
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The given options to this question are:
Style the HTML automatically Automatically add missing opening or closing tags to the HTML Prevent any misspelled tag keywords from appearing in the HTML Improve readability and find and fix problems more easilyThe correct option to question is Option 1. i.e.
Style the HTML automatically.
Nesting HTML refers to enlist the HTML tage within HTML tag.
For example, the <p> tag is used to insert paragraph text. You can insert nesting HTML tags within the paragraph tag to style the pragraph.
such as:
<p>
<b>
This is a paragraph
</b>
</p>
The above HTML code bold the paragraph.
While the options are not correct because:
Nesting HTML does not allow to insert missing opening or closing tags to the HTML and also does not prevent appearing the misspelled tag keyword. Nesting HTML does not improve readability and find and fix the problem easily because nesting HTML mostly made the HTML more complex in terms of readability.
In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be current?
regional trends
industry politics
regional politics
industry trends
Answer:
industry politics
Explanation:
In order to be an effective employee who knows recent information on loans and laws, your information should be current in industry politics.
This ultimately implies that, an employee who wants to be well-informed and knowledgeable on recent informations on loans and laws, is saddled with the responsibility of gathering and sourcing for informations through industry politics. Thus, the employee must have been involved in working with various industry leaders and most likely to have interacted with various employees working there.
Industry politics can be defined as a group of policies, standards and regulations set by the government to promote and facilitate competitiveness among the private and publicly owned industries.
Answer:
industry politics
Explanation:
the other person is first and correct mark him brainliest!
Which will you see on the next line 9, 2, 3.5, 7]
Answer:
plenipotentiaries. It was by far the most splendid and
important assembly ever convoked to discuss and
determine the affairs of Europe. The Emperor of
Russia, the King of Prussia, the Kings of Bavaria,
Denmark, and Wurttemberg, all were present in
person at the court of the Emperor Francis I in the
Austrian capital. When Lymie put down his fork and
began to count them off, one by one, on the fingers
of his left hand, the waitress, whose name was Irma,
thought he was through eating and tried to take his
plate away. He stopped her. Prince Metternich (his
right thumb) presided over the Congress, and
Prince Talleyrand (the index finger) represented
France? please let me know if this is the answer you were looking for!!
Answer:
I guess 6.......maybe or 1 kinda.....
I am dumb for this question
How is fraudulent email spread that makes it so difficult to track?
Choose the correct term to complete the sentence
The ____ function removes the element with an index of zero.
1)popleft
2)leftremove
3)leftpop
Answer:
popleft
Explanation:
Answer: pop left
Explanation: got it right on edgen
Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?
Answer:
SQL injection
Explanation:
SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.
Using placeholders in programmed SQL statements mitigates the effects of SQL injection.
A part-time job performed while in high school must have the approval of your school counselor.
False
True
Answer:
False, it only needs approval of your parents/guardian
May I have brainliest please? :)
Answer:
False
Explanation:
Dictionaries You are given a dictionary consisting of word pairs. Every word is a synonym the other word in its pair. all the words in the dictionary are different. after the dictionary there's one more word given . Find a synonym for him. Given a list of countries and cities of each country. then given the names of the cities. for each city specify thr country in which it is located.... python
Answer:
To add values to a dictionary, specify the dictionary name with the key name in quotes inside a square bracket and assign a value to it.
dictionary_name["key_name"] = value
Explanation:
A python dictionary is an unindexed and unordered data structure. It's items a key-value pair separated by a colon and the entire dictionary items are enclosed in curly braces. Unlike a list, the dictionary does not use an index but uses the key to get or add a value to the dictionary.
Answer:
Python answer:
dict = {}
times = int(input())
for _ in range(times):
a = input()
w1, w2 = a.split()
dict[w1] = w2
dict[w2] = w1
print(dict[input()])
Explanation:
Intialize your dictionary.
Ask for how many keys you will be adding to the dictionary.
Over a for loop, take an input of keys and values and split them and add them to the dictionary.
I set the key as a value and a variable due to the fact that we are working with synonyms and if the user inputs a synonym that is only the value, we can't get another synonym out. Therefore it is better if we make each word a key and a value.
Then print a synonym of whatever the user inputs.
What is closed soruce nonproprietary hardware and software based on publicly known standards that allow third parties to create
Answer:
open system
Explanation:
An open system is a system that sets open-source standards and promotes the interoperability and portability standards between systems developing and running open-source programs.
An open-source application is a program in which its source code is readily available and free for public use and upgrade. Unlike closed-source, its users can add or update the features of the source code.
If a function is called more than once in a program, the values stored in the function's local variables do not _________ between function calls. g
Answer:
persist
Explanation:
Calling a function Within a program, can be regarded to as specifying of the name of the function when it is within a statement or it could be by the function itself, it possible for a particular function to call another function, in a case wherby a function returns a value, assignment or using the value to variable is not necessary. It should be noted that If a function is called more than once in a program, the values stored in the function's local variables do not persist between function calls
Write an if statement assigns 20 to the variable y, and assigns 40 to the variable z if the statemnet x is greater than 100
Answer:
y=20 z=40 x>100
Explanation:
not sure if this is correct but yes
A SQL data source is a control that can be used to get data from a SQL ________________ file such as a Microsoft SQL Server file. g
Answer:
The answer is "Data"
Explanation:
A Data source is essentially the wellspring of the Data. It tends to be a document, a specific Database on a DBMS, or even a live Data feed. The Data may be situated on a similar PC as the program, or on another PC some place on an organization
At least, every SQL server database has two working operating system records: a Data filet and a log Data. Data files contain Data and items, for example, tables, files, put away methodology, and perspectives. Log records contain the data that is needed to recuperate all exchanges in the Database. Data files can be assembled in file groups for portion and organization purposes.