Answer:
LAN monitor agent
Explanation:
1.What are the importance of installation procedures of Windows 7?
Answer:
Check System Requirements
Check Hardware and Software Compatibility
Determine Disk Partitioning Options
Complete a Pre-Installation Checklist
Explanation:
What is it called when a programmer includes a step in an algorithm that lets
the computer decide which group of steps to perform?
Alteration
B. Selection
OC. Sequencing
OD Storage
Selection is the step in algorithm that let's the computer decide which group of steps to perform.
What is Algorithm?This can be defined as set of instructions which are used for solving a problem or accomplishing a task.
Selection happens when there are one or more options are available in which the computer decide which group of steps to perform.
Read more about Algorithm here https://brainly.com/question/11302120
Answer:
its A
Explanation:
What is a program that includes a function parameter capable of doing?
O
A. Passing data to a function whenever it is called
B. Storing data after a function is called
C. Returning data after a function completes a task
D. Ensuring that all function calls in the program are identical
A software program that includes a function parameter is capable of: A. passing data to a function whenever it is called.
What is a function parameter?A function parameter can be defined as a special kind of variable which is used in a function to point to a data that is provided as input into the function.
This ultimately implies that, a software program that is coded by a software developer or programmer to include a function parameter is capable of passing data to a function as an input, whenever it is called.
Read more on function parameter here: brainly.com/question/20264183
how are technology and technician interrelated to each other
Answer:
the technician is the technology so connected because without the technician how can we keep the technology running
Explanation:
without the technician, nothing technological would work for a long time
A subquery whose return value depends on the row being returned in a main query is called a(n) _____ query.
Answer:
correlated
Explanation:
A correlated subquery is a method of reading each row of a table and comparing the values in each row to related data. It's utilized when a subquery has to deliver a different result or collection of results for each candidate row that the main query considers. I hope this helps! ^-^
What is output? public class vehicle { public void drive(){ system.out.println("driving vehicle"); } }
The ________ states that given two plausible explanations for the same event, one should accept the less complex version.
Answer:
Rule of Parsimony
Explanation:
A radio is basically made of two parts:
A. A gyroscope and a vacuum tube.
B. A transmitter and a receiver.
C. A cathode and an anode.
D. A motherboard and a CPU.
A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?.
Answer:
drive-by-download
Explanation:
20 points!!!!! Help, I am being timed!!!!!!!
Don't just answer for the points!
Which snippet of code is in XML?
Answer: XML files that contain the code that to be inserted, elements that control its behaviour and metadata such as the author's name.
Explanation:
Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b. cross-examined d. cross-checked please select the best answer from the choices provided a b c d
Information should be cross-checked to ensure more than one source provides the same factual information.
What is the source of information?
The source of information is the place, from where the data or information is generated. There are many sources of information, like internet, newspaper, television etc.
The options given in the problem regarding the information as,
a. repeated b. cross-examinedc. cross-lined d. cross-checkedThere are many feck news and nonfactual data is present over the internet and other source of information.
To get the factual information, one should always cross-checked the information from other sources.
Thus, the information should be cross-checked to ensure more than one source provides the same factual information.
Learn more about the source of information here;
https://brainly.com/question/26169752
Answer:
D
Explanation:
D
Question 5 of 10
Which step might be included in an algorithm for a self-driving car?
A. Ask another driver for help
B. Analyze data from the car's external cameras.
O C. Look up directions.
D. Read a physical map of the streets.
Answer:
B.
Explanation:
Jennifer is moving to nashville in a few weeks and needs to find an apartment to rent. She has looked online, talked to her new coworkers about safe areas close to work, and read through nashvilleguru. Com to gather information for her decision. She has narrowed down the area she wants to live to the gulch, which is a walkable neighborhood and friendly for young urban professionals. Now she is assessing which available apartment buildings and condos in the gulch suit her wants and needs most. Jennifer is working through which part of the consumer decision-making process?.
The part of the decision-making process that Jennifer is working through is: evaluating alternatives.
What is the decision-making process?Decision-making process can be defined as a cognitive process that involves gathering information, analyzing the information, and assessing or evaluating alternatives, so as to enable the proper selection of an optimum solution (choice).
In this scenario, evaluating alternatives is the part of the decision-making process that Jennifer is working through because she is assessing all available apartment buildings.
Read more on decision-making process here: https://brainly.com/question/1249089
What type of software might be somewhat "light" in functionality even though they
usually allow you to apply filters and special effects in a relatively straightforward
manner?
A. functionality software
B. watermark software
C. third-party software
D. proprietary software
The type of software that might be somewhat "light" in functionality even though they usually allow you to apply filters and special effects in a relatively straightforward manner is third-party software. Thus, the correct option for this question is C.
What do you mean by Software?Software may be defined as a set of instructions, data, or programs which are considerably utilized in order to operate computers and execute specific tasks with respect to the instructions. The function of the software is absolutely the opposite of the hardware.
According to the context of this question, third-party software is a computer program that is constructed or developed by different companies, organizations, etc. For example, any software program working on a Microsoft computer that was not developed by Microsoft. This reveals an example of third-party software.
Therefore, third-party software is a type of software that might be somewhat "light" in functionality even though they usually allow you to apply filters and special effects in a relatively straightforward manner.
To learn more about Softwares, refer to the link:
https://brainly.com/question/28224061
#SPJ2
1. What can you say about the picture?
Answer:
What picture?
Explanation:
Where is the picture? We need the picture in order to answer your questions
Which of the following statements will cause a compile-time error? Parent person = new Child(); person.grade(); Child person = new Child(); person.gra
The statement that will cause a compile-time error is Parent person = new Child(); person.grade();
What is compile-time error with example?A compile-time error is known to be a kind of errors that matches to that of semantics or syntax.
It is often known as Syntax errors and it occurs if the programmer does not use the steps of the syntax in the programming language, due to the above, the compiler will bring out the syntax error.
Learn more about error from
https://brainly.com/question/18497347
Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client’s desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. What is the issue with the client’s computer?
a. Spam
b. Corrupt hard drive
c. Bad hard drive driver
d. Computer virus
There are different kinds of virus. The issue with the client’s computer is Computer virus.
What is computer virus?A computer virus is known to be a kind of computer program that, when used, can recopy itself by modifying other computer programs and putting its own code.
The Examples of computer viruses are:
Worms Trojans , etc.The issue with the system that Lane is working on is virus and it can be worked on by using Anti-virus.
Learn more about Computer virus from
https://brainly.com/question/20407534
PLEASE HELP, MAKE SURE IT IS THE CORRECT WAY!! 100 POINTS!!!
Joe, a project manager, calls your extension because his computer just crashed. He lets you know that his computer will not connect to the internet, that he has lost multiple files, and he needs to get things back up and running in the next hour due to an important meeting he is scheduled to host. He is irritated because he is working on an older laptop and is getting a new one next week. He says that he knew this would happen and wishes that this laptop worked for just one more week.
He is agitated and in a panic. He is afraid that he has lost all his important documents and is blaming the company’s technology. As you ask him questions to find out more about the problem, you make the rookie mistake of asking, “Have you tried restarting your computer?” Joe explodes in a rage and screams that he already told you that he did and that you are not listening to him.
You are now in a situation where you not only need to determine the cause of the problem and fix it, but you also need to calm this individual down so that you can get clearer and more accurate information.
What do you do?
Why are telephoto lenses known for creating a pincushion effect on images?
A. because the shrinking of the image decreases on the edges of the frame
B. because the magnification of the image decreases on the edges of the frame
C.
because the shrinking of the image increases on the edges of the frame
D. because the magnification of the image increases on the edges of the frame
Answer:
D is the correct answer.
Answer: d because the magnification of the image increases on the edges of the frame
Explanation:
Why is it important to enforce access controls and to keep logs regarding who has access to data closets
Answer:
To ensure that in the event of a failure or breach, there is a record of when the equipment was accessed.
Explanation:
Hope this helps:)....if it don't then sorry for wasting your time and may God bless you:)
Answer:
it is important to enforce access controls and to keep logs regarding who has access to data closests is
Explanation:
To encure that in the event of a failure or breach, there is a record of what the equipment was accessed.
If the start index is __________ the end index, the slicing expression will return an empty string.
Answer:
"Greater than."
Explanation:
The designated end of a string cannot be reached from the start. For example, if you had a list labeled 'colors' (colors = [1,2,3,4]) and then you tried to bring back that list using colors[1:0], you will recieve an empty string. However, if the starting is lower than the final index, then your program will run. For example, if you use colors[0:1], you will be given the output: [1].
Harry’s Shoe Store has noticed a significant increase of revenue of $123,000. The manager has also determined that the total expenses equal to $128,000. Will this business net a profit or loss? _______ How much of a profit or loss? ________
Answer: Loss by $5,000
Explanation:
As you see, the loss is greater than profit. Simply subtract loss-profit
Which networking device behaves similarly to an access point that conforms to the IEEE 802.11b standard
Answer: a Hub
Explanation: Hubs are used to combine connections with ethernet cables, typically routing with switches to IDF>MDF>ISP etc.
You watch a movie where a secret agent puts a small device on a telephone line so that they can
listen to conversations between two other people. This is an example of:
O snooping.
O social engineering.
O wiretapping
O data confidentiality.
Answer:
wiretapping
have a good day :)
What is the main advantage of using templates and other presentations to create a new presentation?
A. They allow you to include more slides in a presentation.
B. They give you access to additional slide layouts that you cannot create in a blank presentation.
C. They save you time designing slides and allow you to focus more on the content.
D. They automatically fill-in content and allow you to spend more time on designing slides.
C. They save you time designing slides and allow you to focus more on the content.
hope this helps you!
A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
Answer:
completeness
Explanation:
Effectiveness of thicker,biodegradable plastic shopping bags
The Effectiveness of thicker, biodegradable plastic shopping bags is that they can last for a long time and still be able to carry shopping items even if they are exposed to natural environment.
What is the use of biodegradable plastic bags?Plastic bags are known to be part of modern technology. They are usually very thin and strong. They are able to carry a heavy load as a result of shopping.
Conclusively, Note that this type of plastic bags which are said to be biodegradable can last for a long time and still be able to carry shopping items even if they are exposed to natural environment.
Learn more about bags from
https://brainly.com/question/728465
A practice to ensure threads finish a required method before another thread starts is to use the _____ keyword in the method header.
A practice to ensure threads finish a required method before another thread starts is to use the synchronized keyword in the method header.
What is Synchronized keyword in terms of Java?This is known to be the act of giving room for only a single thread to be able to access the shared data or resource at a given timeframe.
Note that it often help users to be able to protect their data from being access by different threads and as such, a practice to ensure threads finish a required method before another thread starts is to use the synchronized keyword in the method header.
Learn more about keyword from
https://brainly.com/question/2960292
Dropdown
Complete the sentence
A good digital citizen is
Answer:
A good digital citizen is one who knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology.
Explanation:
Answer:ethical
Explanation:
i got a 100 %
I need help on this, need answer asap.
Answer:
int main() {
int _2dArray[32][32];
for (int i = 0; i < 32; i++) {
for (int j = 0; j < 32; j++) {
_2dArray[i][j] = j + i * 32;
}
}
return 0;
}
Explanation:
Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.
Good luck!