Answer:
Include multiple people in the "To" section. picture attached below.
what is the georgia connections academy administrative password? i want to install something.
Answer:
ICL has world-class customized accredited curriculum of over 75 subjects & 1 on 1 support. ICL students compete at the highest level, perform on Broadway & excel in entrepreneurship. Customize Curriculum. Cambridge Style Seminars.
write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this
please hurry i need urgent
Answer:
Algorithm
1. Begin
2. num_bottles = 0
3. While num_bottles != 500
3.1 Create bottle
3.2 num_bottles = num_bottles + 1
4. Switch off machine
5. End
The flowchart has been added as an attachment
Explanation:
Begin algorithm
1. Begin
Initialize bottles to 0
2. num_bottles = 0
Repeat loop until 500 bottles is created
3. While num_bottles != 500
Create a new bottle
3.1 Create bottle
Increment the number of bottles by 1
3.2 num_bottles = num_bottles + 1
End Loop
Switch off the machine after loop ends
4. Switch off machine
End algorithm
5. End
You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services. Which tool should you use
Answer:
Port scanner.
Explanation:
A server can be defined as a specialized computer system that provides specific services for its clients on request. An example is a web server.
A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address.
In this scenario, the tool you should use is a port scanner because it would scan all packets that are sent or received by the server i.e all packets that are being transmitted to and from the server.
You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do
Answer:
Add the URL of the web site to the local intranet zone.
Explanation:
An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.
An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.
A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.
In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.
Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.
The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.
Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions
Answer:
The company's account policy
Explanation:
If there's no common naming system, It's best to go with the company's account policy.
An end-user license agreement protects _____.
End User License Agreements are important for protecting the rights of the business owner/licensor and critical for setting the rules of use and managing the expectations of the end-user.
Answer: both the owner and the purchaser of the software
Explanation:
A user informs you that he or she never deletes any files he or she creates. How might this affect the operating system? It will cause the operating system to crash. It will cause the operating system to upgrade. It will cause the operating system to run faster. It will cause the operating system to run slower.
Answer:
Depending on the amount of files there are, the operating system will run slower because these files take up space on the hard drive, slowing it down.
Explanation:
how are the computer classified into different types
Answer:
Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.Which information is required when designing a field? check all that apply.
Answer:
Explanation:
dimensions or calculation
Your disaster recovery plan calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the least amount of backup media, but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the disaster recovery plan
Answer:
Perform a full backup once per week and a differential backup the other days of the week.
You install Windows 10 on a new computer. You update the video card driver and restart the computer. When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result. You need to configure the video card driver. What should you do first
3. Remove the screws holding the GPU in on the rear bracket. ...
4. Unlock the PCI-e slot clip.
5. Remove the GPU by lightly pulling on the card.
6. Hover the GPU over PCI-e slot.
7. Push down on the GPU to slide the connector into the slot.
8. Ensure the secure lock clicks into place.
9. Screw the rear bracket down to secure the card to the chassis.
10. Connect any required PSU cables.
11. Reattach the side panel,
Now, all you need to do is to plug in the display connectors on the rear of the case, whether they're DisplayPort, HDMI, DVI, or VGA. After that, hit the PSU power switch and boot up Windows. If the PC does not turn on or no signals get sent to the monitor, we'll need to double-check that all cables are connected correctly (both inside and on the rear of the PC), and the GPU is seated properly in the PCIe slot.To call a member function, you code a. the name of the object in parentheses, followed by the name of the function b. the name of the object, the dot operator, and the name of the function c. the name of the object, followed by the scope resolution operator and the name of the function d. the name of the object, followed by the name of the function in parentheses
Answer:
using a pointer to member function to call function
how is internet connection made possible.
Answer:
To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.
Type the correct answer in each box. Spell all words correctly.
Digital artist Frank is discussing how to enhance scanned or photographed images. Complete the following sentences while keeping in mind the topic of discussion.
You can rework or enhance scanned or photographed images using photo editing and illustration software or by using a digital____.
The device has a_____surface on which you can draw images, graphics, and animations.
Answer:
1. Tablet
2. Flat
Explanation:
Your organization uses the following tape rotation strategy for its backup tapes: The first set of tapes is used for daily backups. At the end of each week, the latest daily backup tape is promoted to the weekly backup tape. At the end of each month, one of the weekly backup tapes is promoted to the monthly backup tape. What kind of backup tape rotation strategy is being used
Answer:
- Grandfather
Explanation:
In the given scenario, the 'grandfather backup rotation strategy' is employed to have the backup of the audiotape files. This is because the entire process is segregated into three distinct sections; daily backup that keeps the track of all the files recorded every day. It is followed by weekly storage of the audio files after the week wraps up in order to save it for future usage. Lastly, 'monthly' media is backed up in order to ensure that no data is left to be backed up that might be required later. This promotes a quicker, easier, yet complete strategy for backing up the desired data files in the systems. Hence, 'grandfather-son-rotation strategy' is the correct answer.
What is office technology?
Answer:
Explanation:
Office Technology is the study of a wide range of subjects related to careers in the modern office of today. This program provides the training necessary to perform successfully in the many and varied clerical, secretarial, and office administrative positions.
the contribution of Charles Babbage in the history of computer
Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.
Answer:
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Explanation:
Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;
1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.
2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.
3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).
4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").
5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.
In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.
For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).
Which of the following are true statements about the Java wrapper classes (Select all that apply.): Select one or more: a. Objects of these type are immutable b. Objects of these types are mutable c. The wrapper classes do not have no-arg constructors d. The wrapper classes do have no-arg constructors
Answer:
a. Objects of these type are immutable.
Explanation:
Java wrapper classes are used to convert data into objects. The primitive data is not object and it does not belong to any class. Therefore Java wrapper classes help the user to convert primitive data into object. These objects are immutable and they have no arg constructor.
discuss any five barries of integrating ict tools in education
Answer:
lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers
What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders? create/develop upload/display research/define plan/design
Answer:
research/define
It is C
write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update.
Answer:
A) software
B)assembler
C)operating system
D)system software
E)data base
F)software license
G)machine code
H)ONLINE shopping apps
Shelby wants to move “ExpirationDate” to the top of the datasheet. What should she do?
What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online
Answer:
any program designed to do harm.
Explanation:
Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.
Selena owns a bakery. She wants to compare the number of pies, cookies, cakes, and brownies that she sells in one month. Which charts are appropriate for this task? Check all that apply.
Answer:
Column, Bar, And Pie
Explanation:
got it right
Why should a user preview the document before printing?
Answer:
Print preview is a useful function to users as it helps them to see how the final printed material will appear. It also gives the user the opportunity to check or adjust the layout or resolve any issues before printing the material to achieve the intended final form.The program prompts the user for five to ten numbers all on one line, separated by spaces, calculates the average of those numbers, and displays the numbers and their average to the user.
The program uses methods to:
1) get the numbers entered by the user all on one line separated by spaces;
2) calculate the average of the numbers entered by the user; and
3) print the results.
The first method should take no arguments and return a String of numbers separated by spaces.
The second method should take a String as its only argument and return a double (the average).
The third method should take a String and a double as arguments but have no return value.
IF user input is: 20 40 60 80 100
Answer:
import java.util.Scanner;
public class AverageDemo
{
public static String getNumbers()
{
String numbers;
Scanner scn = new Scanner(System.in);
System.out.println("Enter five to ten numbers all on one line, separated by spaces: ");
numbers = scn.nextLine();
return numbers;
}
public static double calcAverage(String numbers)
{
String[] values = numbers.split(" ");
double total = 0;
for (int i = 0; i < values.length; i++)
{
total += Integer.parseInt(values[i]);
}
if (values.length == 0)
return 0.0;
else
return (total / values.length);
}
// Method definition of printResults: print the results
public static void printResults(String numbers, double average)
{
System.out.printf("\nThe average of the numbers %s is %.2f\n", numbers, average);
}
// main method
public static void main(String[] args)
{
// Call the methods
String numbers = getNumbers();
double average = calcAverage(numbers);
printResults(numbers, average);
}
}
Output:
which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) shortest job scheduling , (c) priority scheduling , (d) round robin scheduling
Answer:
is correct answer
(a)first come first serve
Explanation:
What contains programming statement written in VB?
Answer:
A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.
write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this
Answer:
The algorithm is as follows:
1. Start
2. bottles = 0
3. While bottles != 500
3.1 Create bottle
3.2 bottle = bottle + 1
4. Switch off machine
5. Stop
See attachment for flowchart
Explanation:
This begins the algorithm
1. Start
This initializes bottles to 0
2. bottles = 0
The loop is repeated until 500 bottles is created
3. While bottles != 500
This creates a new bottle
3.1 Create bottle
This increments the number of bottles by 1
3.2 bottle = bottle + 1
This switches of the machine after all bottles are created
4. Switch off machine
End algorithm
5. Stop