A department requires access to the database application from monday to friday, 9am to 5 pm. last thursday at 1 pm, the application crashed, and it took six hours to fix the problem. what was the availabilty of the application during the week
Answer:
90%
Explanation:
90%
ELO 4.2 A department requires access to the database application from Monday to Friday, 9AM to 5 PM. Last Thursday at 1 PM, the application crashed, and it took six hours to fix the problem. What was the availability of the application during the week?
when working with track changes, what is the difference between simple markup and all markup?
The single markup gives distraction free view to the document, while all markup gives the visible inline changes in the document.
What is a markup in Microsoft word?Markup in Microsoft Word or MS word is the review setting that tracks the changes and the comments in the word with every character.
The single markup is given as the distraction free view of the changes to the reader, with the recording of all the changes in the document. The all markup option will show the changes in the document with different lines and color thereby tracking changes.
Learn more about markup in word, here:
https://brainly.com/question/1419927
#SPJ1
A multinational bank has many branches. A bank has large volumes of financial data to be analyzed. Therefore, a
server will be useful in such a set up. In addition, a
topology is preferable in a bank because the number of employees will keep increasing.
Answer:
34tr4
Explanation:
34tg
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.
Answer:
Network forensics
Explanation:
hide the most valuable data at the innermost part of the network.
How do we distinguish between remote and local information sources? give an example of each source? i'll give brainliest answer for who every answer it right
A local server means that you have a server setup on your current machine. A remote server is ran on a different machine
How is effective communication defined as it applies to media?
O The end user delivers the intended message.
O The end user receives the intended message.
O The end user records the intended message.
O The end user agrees with the intended message.
Answer:
B, if the person you're sending to doesn't get the point it isn't effective. The sender will always know what they're sending but if the person who gets doesn't understand then it doesn't work. They don't need to agree to it for them to understand the message.
Explanation:
What are the real-life applications of coding? at least 5 to 6 lines anyone
The real-life applications of coding is that they are used in:
Traffic LightsCoffee Machines, etc.What are useful applications of codes?Coding is known to be a tool that helps to make a composition of instructions that a computers needs to follow.
Note that in real life, Coding helps programmers to create programs, such as websites and apps that are used in Traffic Lights, etc.
Learn more about coding from
https://brainly.com/question/22654163
#SPJ1
The technique for locating the source of an error is to set up _____, which are locations where the browser will pause the program, allowing the programmer to determine the error at that position.
Answer:
I think the best fit for this would be Break points
Explanation:
Break points are useful for debugging a program. When line the break point is on executes, it pauses the program. In most IDEs it will show the call stack, all local variables, and other debug information, with break points you can step through your code to determine what is going on. Some IDEs have conditional break points where the break point only executes if the condition is true.
The technique for locating the source of an error is to set up Break points, which are locations where the browser will pause the program, allowing the programmer to determine the error at that position.
E-mail messages create a
permanent record than other forms of business communications.
Answer:
Explanation:
Business correspondence, like oral speech, refers to the verbal form of business communication. However, the message on the printer has a number of absolute advantages over oral speech. In particular, the compiler has the opportunity to put his thoughts in order and, if necessary, correct the message. More precise constructions than oral ones. In addition, the recipient has the opportunity to read the messages at any time.
For the effective conduct of business correspondence, it is necessary to know and be able to apply the norms of official correspondence, the creation, design and organization of work with letters. At the same time, it should be remembered that a business letter, like any other document created in an organization, is an achievement of its image. In order for business communication to be sufficient, it is necessary to know all the components (including, of course, business correspondence), possession covers communicative competence. The material carrier of business correspondence is a business letter.
A business letter is a document used for transmission over a distance between two correspondents, there is a place for both legal entities and individuals. The concept of "business letter" is used for the generalized name of documents of different content, drawn up in accordance with GOST, sent by mail, fax or other means. At the same time, a document is information about a material carrier that has legal force. The specifics of a business letter and its differences from documents such as a contract or an order are described in that it is less strictly regulated, but, as was said, has legal force. Therefore, letters are registered and found in organizations as outgoing and incoming documentation.
The classification of business correspondence matters in terms of significance: the appointment and discovery of documents, their seriousness and urgency, identification in solving problems, identification of the material availability and reliability of registration, etc. For the solution of business correspondence, the application of documents to the system of management documentation and categories of messages that are acceptable over communication networks is essential. The list of grounds, according to the content, the systematization of business correspondence can be applied, is very extensive. We give a classification of business correspondence according to its main basis.
A core value of _____ is the prevention of the occurrence of errors in a product or service rather than detection and correction.
A core value of Total Quality Management is the prevention of the occurrence of errors in a product or service rather than detection and correction.
What is Total Quality Management?Total Quality Management (TQM) is a control framework primarily based totally at the notion that a company can construct long-time period fulfillment with the aid of using having all its members, from low-stage employees to its maximum rating executives, attention on enhancing high-satisfactory and, thus, handing over patron satisfaction.
Along every step of the manufacturing process (from sourcing for uncooked materials, via the producing and transport stages, to the customer support stage), mistakes are constantly detected and eliminated to make sure that the very last product that is going to the client is of the very best viable high-satisfactory.
Read more about the manufacturing :
https://brainly.com/question/26373150
#SPJ1
What is a benefit of being a member of a professional organization?
Answer: A benifit of being a member of a proffesional organzation is you can refresh your knowledge by acquiring new skills through workshops, seminars, and conferences.
Explanation:
Write a program that takes a 10-digit phone number and adds a hyphen in the correct location. Using an input field for the user to enter the information. Also, use a string for instructions on how to enter the phone in the input field.
The python program will request for a ten digit number from the user and formulate a real phone number from it.
How to write a python program to form a real phone number?The program is written in python.
Therefore,
x = input("please write a ten digit number: ")
if len(x) == 10:
a = f"({x[0:3]})"
b = x[3:6]
c = x[7:]
print(a + " " + b + "-" + c)
Code explanation:The variable x is used to store the user's input.If the length of x is equals to 10, then we get the first three terms in bracket, the second three terms and the last 4 terms.Finally, we use delimiters to join the variables as required and print it out.learn more on python here: brainly.com/question/13462052
#SPJ1
You are asked to optimize a cache design for the given references. there are three direct-mapped cache designs possible, all with a total of eight words of data:
Answer:
Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with
Explanation:
Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with
What is one possible consequence of risky sharing
Answer:
B. Difficulty in your everyday relationships.
Explanation:
This is the only reasonable answer to this question.
Difficulty in your everyday relationships is one possible consequence of risky sharing, hence option B is correct.
How do relationships state risky sharing?Risk sharing is the difficulty that you share with your partner to prevent the loss and make benefits. In companies for preventing risk, they deploy premium policies.
In a relationship, if it observes difficulties in the relationship are shared with the partner it prevents their loss and makes benefits. This is the indiscriminate private information sharing by any person which relates to privacy.
In risky sharing if anyone shares your private information, address, image, and videos it is risky for you.
Therefore, difficulty in your everyday relationships is the result of risky sharing.
Learn more about risky sharing, here:
https://brainly.com/question/30565341
#SPJ2
____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced. a.Patch b.Kernel c.OS d.VFS
Patch management is designed to replace or change parts of the operating system that need to be enhanced or replaced.
What is Patch management?This is known to be the act or process of sharing and applying updates to different kinds of software.
Note that Patch management is designed to replace or change parts of the operating system that need to be enhanced or replaced.
Learn more about Patch management from
https://brainly.com/question/16270302
#SPJ4
Choose the terms that best complete the sentence.
a
usually has faster connection and transmission speeds than a
.
A local area usually has faster connection and transmission speeds than a Wide area.
What is local area address?The term LAN means Local Area Network as it is one that helps to link shared resources and Internet connection.
Note that A local area usually has faster connection and transmission speeds than a Wide area as it covers only a small area of place.
Learn more about local area from
https://brainly.com/question/25192887
#SPJ1
Help me with this question please
[tex]nested \: selection[/tex]
Explanation:
When the algorithm takes more than one decision before carrying out a task
Which email protocol allows an email client to download email messages to the local computer?.
Answer:
The protocol is called Post Office Protocol version 3(POP3)
Explanation:
Hope this helps!
Write a script that creates a user-defined database role named paymententry in the ap database. give update permission to the new role for the vendors and invoices table, update and insert permission for the invoicelineitems table, and select permission for all user tables.
Answer:
USE AP CREATE ROLE PaymentEntry
GRANT UPDATE, DELETE ON Invoices TO PaymentEntry
GRANT UPDATE, INSERT ON InvoiceLineItems TO PaymentEntry
EXEC sp_AddRoleMember db_datareader, PaymentEntry
Help me with this two questions please
Answer:
1 is def... don't know about the other one though sorry
the ________ is part of the processor that manages the movement of data through the cpu.
Answer:
The control unit is part of the processor that manages the movement of data through the cpu.
Explanation:
a colleague shared an excel file with you, and you want to display a worksheet that is hidden in it. how can you do that?
The hidden worksheet can be made visible with the right click on any worksheet and select unhide.
What is a worksheet?A worksheet in Microsoft Excel is the collection of the rows and column that has been used to organize data. The collection of worksheets is called workbook.
The hidden worksheets are not visible in the workbook, and if an individual wants to unhide the hidden worksheet, he must right-click on any worksheet and select unhide.
Learn more about worksheet, here:
https://brainly.com/question/1024247
#SPJ1
Kai recently graduated from college with a dual degree—a Bachelor’s in Game Design and Development and a Bachelor’s in Music. The goal is to find a job that will use both degrees, and there is an interview at a video game design studio tomorrow. Kai would love to be in charge of planning, authoring, and implementing the soundscape for games, including sound effects, music, and dialogue. What role at the video game studio would be a good fit?
character rigger
audio designer
artificial intelligence programmer
cinematic artist
a student is going to e-mail a file she has created and needs to reduce the file size. what tool should she use to reduce the file size?
Answer:
Compress the file to reduce the file size.
Which email protocol allows an email client to read mail stored on the mail server?.
Answer:
Internet Message Access Protocol (IMAP)
Explanation:
IMAP is used to read emails stored on a mail server, whereas POP3 allows the user to download the email onto their computer.
Hope this helps!
what are the 3 components that make up the ribbon for microsoft?
Answer:
1. Quick access toolbar (QAT)
2. tabs
3. command buttons
Explanation:
hope this helps:)
Date Underline the correct answer from the options. 1. How many basic input devices does a desktop computer have? .. a)2 b)3 c) 1 d)4 2. The computer equipmentwhich feeds the computer with data is called. a) Storage device b) Processing device c) Diskette d) Input device 3.When an output is displayed in a printed form it is termed as a) Softcopy output b) File c) Document d) Hardcopy output
4. Which computer device will convert human voice into digital voice? a) Projector b) Loudspeaker c) Microphone d) Joy. 5) All the following are hardcopy output devices except a) Photocopier b) Printer c) Projector d) Plott
Answer:
1. 3
2. D (Input Device)
3. B (File)
4. C (Microphone
A(n) ___ provides abstract methods and no other code. a. abstract class b. interface c. polymorphic class d. base class
Answer:
Abstract class.
Explanation:
I think it’s this because, the abstract class has no body.
If you were referencing an e-book what would be the proper citation format?.
Answer:
Use the standard in-text citation format of author's surname and year of publication to cite an ebook in your work. Include the author's last name and first initial, the year of publication, the italics title of the book, as well as the retrieval information or DOI number in an APA reference list entry.
Hope this helped you! I would appreciate a Brainliest if you wouldn't mind.
can I have some help?