Information collected by an organization from a variety of external and internal databases is stored in this special type of database.A. Data warehouseB. Commercial databaseC. Company databaseD. Company warehouse

Answers

Answer 1

A system known as a data warehouse is used to store data from both internal and external sources. Because they store historical data, data warehouse platforms differ from operational databases and make it simpler for business leaders to analyse data over a specific time period.

Which of the following describes a structured group of documents or data that is kept on a computer system?

A database is a collection of data that has been organised to make it simple to manage and update. Data records or files containing information, such as sales transactions, customer information, financial data, and product information, are typically aggregated and stored in computer databases.

Which of the components that the DBMS uses to gather, process, and access data is most crucial?

storage engine. The storage engine is the core component of the DBMS that interacts with the file system at an OS level to store data

To know more about database visit:-

brainly.com/question/29839039

#SPJ4


Related Questions

the turing test is used in the field of____, to determine if a computer's response cannot be distinguished from a human's response.

Answers

In artificial intelligence, the Turing test is used to determine whether a computer's response cannot be distinguished from a human response.

What does the philosophical Turing test entail?

Thus, "The Turing Test" is a behavioral test for determining if particular types of putatively minded beings actually possess mind, thought, or intelligence. The Turing Test is hardly without controversy.

How does the Turing test operate? What is it?

A sequence of questions are posed to a test subject by an interrogator during a Turing test. No physical contact is permitted because each party is segregated into their own space. The test subject's responses are assessed based on their ability to distinguish between those that a human subject would provide.

To know more about computer visit:-

https://brainly.com/question/20414679

#SPJ4

which of the following type of attacker keeps exfiltrating the data quietly, without being detected?

Answers

Advanced Persistent Threat (APT) of the following type of attacker keeps exfiltrating the data quietly, without being detected.

Option C is correct.

What exactly is an advanced persistent threat, or ADT?

An advanced persistent threat (APT) is a sophisticated, ongoing cyber attack in which an intruder steals sensitive data from a network over an extended period of time by establishing an undetected presence.

An APT attack is meticulously planned and executed with the intention of sneaking into a specific organization, circumventing existing security measures, and going unnoticed.

In comparison to a conventional attack, carrying out an APT attack necessitates a higher level of customization and sophistication. Typically, adversaries are skilled, well-funded teams of cybercriminals who target high-value organizations. They have researched the organization and found vulnerabilities with a lot of time and money.

Question incomplete:

which of the following type of attacker keeps exfiltrating the data quietly, without being detected?

A. Hacktivists

B. USB drive Digital Photo frame

C. Advanced Persistent Threat

To learn more about Advanced persistent threat (ADT):

brainly.com/question/17328761

#SPJ4

in JavaScript with HTML use the writeIn() method of the document object to display the current platform in a

tag in the webpage. hint the platform is the property of the window.navigator object contains the current platform

Answers

In JavaScript with HTML use the writeIn() method of the document object to display the current platform are: document.write('<p>The current platform is ' + window.navigator.platform + '</p>');

What is JavaScript?
JavaScript is a scripting language used to create interactive and dynamic webpages. It is a high-level, interpreted programming language that is supported by all modern web browsers. JavaScript enables web developers to create dynamic websites that are more interactive and user-friendly, allowing users to interact with the page in a more natural way. JavaScript can also be used to create mobile applications, desktop applications, and games. It is a versatile language that can be used to create everything from simple webpages to complex web applications. JavaScript is one of the most popular programming languages in the world, and it is a great choice for any web developer.

To learn more about JavaScript
https://brainly.com/question/28021308

#SPJ4

create a function addwaldo that accepts an object with keys being first names and values being last names. for example addwaldo({'luke': 'skywalker', 'harley': 'quinn', 'ryan': 'reynolds'}) should add the key 'waldo' with the value 'unknown' to the object and return the mutated object. is it working?

Answers

A function addwaldo that accepts an object with keys being first names and values being last names are:

const addWaldo = (obj) => {

   obj.waldo = "unknown";

   return obj;

}

What is function?

A function is a type of routine in programming that performs a specific task when it is called. It is a piece of code that is self-contained and reusable, meaning it can be called multiple times with different input parameters. Functions are used to break down a program into smaller, manageable parts that can be tested and debugged more easily. Functions also help reduce code duplication, as the same set of instructions can be used multiple times without having to be re-written. Functions are written in programming languages such as C, Python, Java, and JavaScript.

To learn more about function
https://brainly.com/question/19181382

#SPJ4

Which of the following resource types would be BEST suited to saving photographs from a mobile device with limited onboard storage?
A. Resource pooling
B. Cloud file services
C. Virtual desktop
D. Off-site email

Answers

B. Cloud file services would be BEST suited to save photographs from a mobile device with a limited onboard storage.

Cloud services refer to infrastructure, platforms, or software that are hosted by third-party providers and made available to end-users through the internet. The purpose of cloud computing is to provide easy, scalable access to IT services and computing resources to the end users. Cloud infrastructure include the software and hardware components needed for properly implement a cloud computing model.

As in the given case cloud file services would be best suited for the purpose of saving photos from a mobile device that has limited storage capacity because cloud services provide unlimited storage capacity.

You can learn more about Cloud services at

https://brainly.com/question/26972068

#SPJ4

1) Create a text file students.txt, contains information about an unknown number of students in 230 class as follow:


1150987 87.40 37 82.3 16
1160098 72.82 103 73.8 15
.
.
1161430 68.55 68 85.0 18


Each line contains: student-number , accumulative average so far , total credits taken , average this semester , credits registered this semester.

2) Let the program reads from the file students.txt and computes the final accumulative average for each student as follow:

Final accumulative average =

( ( accumulative average so far * total credits taken ) + (average this semester * credits registered this semester ) ) /
( total credits taken + credits registered this semester )

3) Write a function calculate that.

receives student-number, accumulative average so far, total credits taken, average this semester, credits registered this semester and returns the final accumulative average


4) Display on another text file result.txt the result as shown below:


Student Number Total New Credits finished Final Accumulative Average
-------------------- --------------------------------- -----------------------------------
. . .
. . .
. . .
. .
5) The program should display also the number of students who received an honor (Accumulative Average >=85) and the number of students whose Accumulative Average <=65.

Answers

Answer:

1. To create a text file called students.txt that contains the information about the unknown number of students in class 230, you can use a text editor such as Notepad or TextEdit to create the file and enter the information in the format specified.

2.To read the information from the students.txt file and calculate the final accumulative averages for each student, you can use Python programming language and the following steps:

. Open the students.txt file using the built-in open() function and assign the file object to a variable.

.Use a for loop to iterate over each line of the file, using the built-in readlines() method.

. Split each line of the file into individual elements using the built-in split() method.

. Assign each element to a variable, such as student_number, accumulative_average, total_credits, this_semester_average, and this_semester_credits.

. Use the final accumulative average formula to calculate the final accumulative average for each student.

. Close the file using the built-in close() method.

3. To write a function that calculates the final accumulative average, you can use the following steps:

. Define the function, and give it a name, such as calculate()

. Pass in the necessary parameters, such as student_number, accumulative_average, total_credits, this_semester_average, and this_semester_credits

. Use the final accumulative average formula to calculate the final accumulative average for each student.

. Return the final accumulative average

4. To display the results in another text file called result.txt, you can use the following steps:

. Open a new file using the built-in open() function, and assign the file object to a variable.

. Use the built-in write() method to write the student number, total new credits, finished credits, and final accumulative average to the file.

. Close the file using the built-in close() method.

5. To display the number of students who received an honor (Accumulative Average >=85) and the number of students whose Accumulative Average <=65, you can use a counter variable, and increment it each time you encounter a student with accumulative average >= 85 or <= 65. At the end of the iteration, you can print the counter variable.

The removeElement method is intended to remove all instances of target from the ArrayList object data passed as a parameter. The method does not work as intended for all inputs.public void removeElement(ArrayList data, int target){for (int j = 0; j < data.size(); j++){if (data.get(j).equals(target)){data.remove(j);}}}Assume that the ArrayList object scores and the int variable low_score have been properly declared and initialized. In which of the following cases will the method call removeElement(scores, low_score) fail to produce the intended result?A. When scores is [0, 2, 0, 2, 0, 6] and low_score is 0B. When scores is [2, 4, 0, 5, 7, 0] and low_score is 0C. When scores is [3, 4, 5, 7, 7, 2] and low_score is 1D. When scores is [8, 8, 4, 3, 3, 6] and low_score is 3E. When scores is [9, 9, 5, 9, 7, 7] and low_score is 5

Answers

When scores is [3, 4, 5, 7, 7, 2] and low_score is 1 fail to produce the intended result in ArrayList.

What is ArrayList?

ArrayList is a data structure in Java that allows for dynamic memory allocation for storing and manipulating a list of objects. It is similar to an array, but has the ability to expand or shrink its size. ArrayList also allows for random access to objects within the list. It is a part of the Java Collection Framework and implements the List interface. ArrayList is most commonly used when the size of the collection is not known in advance and can change over time. It is also useful when frequent addition and removal of elements is required. ArrayList is a resizable array and is much more efficient than traditional arrays when it comes to memory and performance.

To learn more about ArrayList

https://brainly.com/question/20464124

#SPJ4

Which of the following systemd unit-specific sections describes how to manage services or applications on the server?

Answers

The "Service" section is the systemd unit-specific section that describes how to manage services or applications on the server.

What is Service?

Service is an activity or task that is performed for the benefit of another. It can be performed by a person or a group of people and can be voluntary or paid. Service can provide tangible or intangible benefits to recipients, such as providing assistance, care, knowledge, entertainment, or spiritual or emotional support.

This section contains settings such as the type of service, the working directory, user and group ownership, and the executable to be used. Other settings such as how to handle restarts, start/stop conditions, and timeouts can also be configured in this section.

To learn more about Service
https://brainly.com/question/29044455
#SPJ4

which of the following is the core component within a database that control data storage and access requests from client applications? group of answer choices replication server query handler control module database engine

Answers

Database engine is the core component within a database that control data storage and access requests from client applications.

The software that actually sorts information, locates specific data that you ask for, and other tasks is called a database engine. Term that used to describe a distinct piece of software that ran on a main computer; in this context, it is essentially synonymous with "back-end." Oracle, DB2, and Sybase are three popular database engines. You can instruct the database engine on how to sort the data and what data to look for using separate front-end software that runs on your personal computer. This software also shows the outcomes of your commands.

When referring to the portion of the software that manipulates data as opposed to the portions of the software you interact with on the screen, the term "database engine" may be used.

Learn more about database here:

https://brainly.com/question/6447559

#SPJ4

to export query data to excel, you . a. save the query as an xlsx file b. select excel as the destination when you run the query c. click the external data tab, and then click the excel button in the export group d. click the create tab, and then click the excel query button in the queries group

Answers

Click the external data tab, followed by the excel link in the export group, to export query data to Excel.

Describe data.

Data is gathered via techniques like measurement, observation, querying, or analysis, and is raise issues as numbers or letters that may then be processed further. Data gathered in an uncontrolled in-situ setting are alluded to as field data. Data that is created during a carefully planned scientific experiment is known as experimental data. Techniques including computation, reasoning, discussion, presentation, visualization, and other types of comment are used to examine data. Raw data (or untreated data) is often cleaned before analysis: Outliers are removed, and glaring instrument or data input mistakes are fixed.

To know more about data
https://brainly.com/question/13650923
#SPJ4

Tools to manage service level agreements (SLAs) in a help desk software packageprobably are of greatest use by ____.a. a help desk managerb. a help desk agentc. a help desk clientd. any of these

Answers

Tools to manage service level agreements (SLAs) in a help desk software packageprobably are of greatest use by any of these.

What is service level agreements?
A Service Level Agreement (SLA) is a contract between a service provider and a customer. It defines the level of service expected from the service provider and the customer's responsibilities. SLAs are meant to provide a common understanding of the services to be provided, the service expectations, and the responsibilities of each party. They also provide a framework for resolving any issues that may arise during the course of the service delivery. SLAs typically include things such as availability, response times, resolution times, quality of service, and the cost of the service. By having an SLA in place, both the service provider and the customer can ensure that their expectations are met and that the service delivery is satisfactory.

To learn more about service level agreements

https://brainly.com/question/30265054

#SPJ4

when using the customize dialog box to customize tool palettes, the options in the palette groups column can only export or import which type(s) of files?

Answers

The options in the Palette Groups column of the Customize dialog box can only export or import .tpc files. This stands for "Tool Palette Customization" and is the file type used to store customizations made to a tool palette.

What is column?

A column is a vertical arrangement of data in a table, typically consisting of a heading (or label) and the data entries beneath it. Columns are used to organize data, such as a list of names, dates, prices, or other values. They are also used to store calculations, such as sums, differences, averages, and other calculations that are created from the data in the other columns. When used properly, columns can make it easier to understand and quickly access important information stored in a table.

To learn more about column
https://brainly.com/question/30144227
#SPJ4

You have just received a frantic call from a customer. She informs you that after turning her computer on, she received the following error: The SMART hard disk check has detected an imminent failure.Which of the following is the best first step to take?- Back up all important data and files- Run a reliable defragmentation tool- Run a hard drive test to verify the condition of the hard disk. It may be a false error- Correct the bad areas on the drive using chkdsk

Answers

The best first step to take is to back up all important data and files. This should be done immediately, as it may be the only way to protect the customer’s data from being lost if the hard disk fails.

What is data?

Data is an umbrella term used to describe information that has been collected and stored, either electronically or physically. Data can take many forms, such as numbers, words, images, video, and audio recordings. Data can come from many sources, both digital and physical, including sensors, surveys, interviews, photos, and more.

After the data is backed up, the customer should then run a reliable defragmentation tool to make sure the data is properly organized on the hard drive. Once this is done, the customer should then run a hard drive test to verify the condition of the hard disk and to see if the error is indeed legitimate. If the error is legitimate, then the customer can use chkdsk to correct any bad areas on the drive.

To learn more about data
https://brainly.com/question/28140546
#SPJ4

which of the following is a formal document that describes the actions and accountabilities required to implement project modifications? contingency plan risk plan change plan risk register

Answers

A change plan is a formal document that describes the actions and accountabilities required to implement project modifications.

What is project?

Project is a planned set of activities that are designed to achieve a specific goal. It can also refer to the task of setting up a specific process or system, usually with a specific budget and timeline. Projects are typically divided into stages or phases, with each stage having certain objectives and goals. Project management is an important skill that is used to ensure that projects are completed successfully and on time. This involves setting up a schedule, assigning tasks, monitoring progress, and ensuring that all resources are used efficiently and effectively. Projects can vary from small, one-time tasks to large, ongoing initiatives that require multiple stakeholders, teams, and resources.

It is developed to ensure that the effects of any changes to the project are managed in an organized and effective way.

To learn more about project
https://brainly.com/question/28995665
#SPJ4

this is a notification that your play publisher account has been terminated for violating the developer program policies and developer distribution agreement.

Answers

I understand my account has been terminated for violating policies. I apologize and accept the decision.

What are developer program and distribution agreement?

App developers who seek to create apps for Apple products must adhere to the rules and regulations outlined in the Developer Program Policies. App content, user privacy, data collecting, and advertising are only a few of the issues covered by the policies.

The developer's and Apple's legal obligations, including payment and royalty arrangements, are outlined in the Developer Distribution Agreement. In the agreement, there are also guidelines for how the software should be distributed and how any updates or modifications should be made.

These contracts make sure that the rights and obligations of each party are understood by the other and that their rights and obligations are clear.

To learn more about developer program refer :

https://brainly.com/question/28335983

#SPJ4

given a pointer to an aisle and a section index, return the section at the * given index of the given aisle. * * can assume the index is a valid index (0-3 inclusive). */

Answers

Access to variables at "computed addresses" is made possible by an instruction operand in the Indexed addressing mode. Operand is located at address of a register plus constant offset.

n(R) is the syntax, where R is a register and n is an integer. An example is 4(r5), where the operand is an address (constant 4 plus the contents of register r5). Within an instruction, encoding:

Register number equals address mode, 1

The extension word contains a constant offset.

#include <stdio.h>

#include <stdint.h>

int main(const int argc, const char * const argv[]) {

   union {

       uint64_t i;

       uint16_t ia[4];

   } u;

   u.i = 0xFEDCBA9876543210;

   printf("u.ia[0] %x\n", u.ia[0]);

}

Learn more about operand here-

https://brainly.com/question/29044380

#SPJ4

you are troubleshooting a total network outage. each active port on all switches are flashing like crazy. no computers can properly utilize the network. which of the following is **not** likely to be a contributing cause of this problem?

Answers

Likely to be a contributing cause of this problem: B. A virus on all computers.

What is contributing cause?

Contributing cause refers to a factor or set of factors that have an influence on the occurrence of an event, such as an illness, accident, or other incident. These factors can be environmental, biological, behavioral, or a combination of all three. For example, when a person develops a chronic illness, the contributing causes may include genetic predisposition, environmental exposures, lifestyle choices, or a combination of these factors. It is important to identify the contributing causes of an event in order to understand why it occurred and to develop strategies to prevent similar outcomes in the future.

To learn more about factor
https://brainly.com/question/24164256
#SPJ4

which of the following could you expect to learn about a wireless router when scanning with a wifi stumbler?

Answers

Option E: All of the above

When scanning a wireless router with a wifi stumbler, you can expect to learn the following about it.

NetStumbler (also known as Network Stumbler) was a Windows application that aided in the detection of Wireless LANs that adhered to the 802.11b, 802.11a, and 802.11g WLAN standards. It is compatible with Microsoft Windows versions ranging from Windows 2000 to Windows XP. MiniStumbler, a condensed version, is available for the handheld Windows CE operating system.

Despite its shortcomings, Netstumbler has become one of the most popular programs for wardriving and wireless reconnaissance. Because it actively probes a network for information, it is easily detected by most intrusion detection systems. Netstumbler includes GPS unit support. With this feature, Netstumbler displays GPS coordinate information alongside network information, which can be useful for finding specific networks.

Learn more about NetStumbler here:

https://brainly.com/question/25239458

#SPJ4

You have Azure AD tenant.

You need to ensure that a user named Admin1 can create access reviews. The solution must use the principle of least privilege.

Which role should you assign to Admin1?

Select only one answer.

User administrator

Groups administrator

Security administrator

Compliance administrator

Answers

You should give the "Security administrator" job to Admin1 in order to guarantee that the user can create access reviews in Azure AD while adhering to the principle of least privilege.

Which job ought to be tasked with writing access reviews?

You must be assigned to the Owner or User Access Administrator role for the Azure resources in order to create access reviews. You must hold the Global Administrator or Privileged Role Administrator position in order to create access reviews for Azure AD roles.

To access eDiscovery cases made by other administrators, whose administrator authority should be given?

An eDiscovery Administrator, as previously mentioned, belongs to the eDiscovery Manager position group and has access to all eDiscovery cases inside your company.

To know  more about administrator visit:-

https://brainly.com/question/30206212

#SPJ1

Windows 10 is limited to running mobile-style apps.
A=False

Answers

Answer: A= false

Explanation:

which of the following desktops was derived from gnome 3, follows traditional desktop metaphor conventions, and is the primary desktop environment for the mint distribution?

Answers

The cinnamon desktop was derived from gnome 3 and follows traditional desktop metaphor conventions, and is the primary desktop environment for the mint distribution.

For Linux and Unix-like operating systems, Cinnamon is a free and open-source desktop environment that is based on GNOME 3 but adheres to conventional desktop metaphor principles. In response to the April 2011 release of GNOME 3, which abandoned the traditional desktop paradigm of GNOME 2 in favor of GNOME Shell, the Linux Mint team began developing Cinnamon. After numerous unsuccessful attempts to alter GNOME 3 to fit their design goals, the Linux Mint team decided to create an independent desktop environment by cloning a number of GNOME 3 components. Launched in October 2013, Cinnamon 2.0 effectively completed the split from GNOME. Applets and desklets are no longer supported by GNOME 3.The press has largely praised Cinnamon as the defining feature of Linux Mint, highlighting its user-friendliness and low barrier to entry. Cinnamon is comparable to the Xfce, MATE, and GNOME 2 (and GNOME Flashback) desktop environments in terms of its conservative design philosophy.

Know more about Cinnamon:

https://brainly.com/question/28411133

#SPJ4

Which of the following sentences should be rephrased to use parallel language?-Our success will depend on anticipating market demand, tailoring our product to customer needs, and a cost-effective advertising strategy.-Many entrepreneurs are adventurous and create jobs for others.-A real estate agent will help you search for property, understand the procedures, and paperwork.

Answers

"Our success will depend on anticipating market demand, tailoring our product to customer needs, and a cost-effective advertising strategy", This sentences should be rephrased to use parallel language.

What is parallel language?

Parallel language is employed to show that two or more ideas in a sentence are given equal weight. It is possible that this will occur at the word, phrase, or clause level. The conventional method of joining parallel structures is to use coordinating conjunctions such as "and" or "or".

The practise of using words, phrases, or clauses that are the same or strikingly similar in form, structure, or sound is known as using a parallel structure. This conveys that two or more ideas are equally important while also making the text easier to read. Patterns are highly valued by the human brain. The desire is there nonetheless. In light of this, using parallel structures will significantly enhance your writing.

Learn more about Parallel language

https://brainly.com/question/6256251

#SPJ4

when selecting apply to all inputs for a picture mode on my lg c9, it doesn't actually transfer all settings correctly.

Answers

The C8's "Apply to all inputs" button only transfers the default profile settings (such as contrast and brightness) to other inputs; it does not transfer any changes from the "Expert Controls" or "Picture Options."

What are the best picture settings for a LG OLED c9 TV?It is best to set the contrast to 90, sharpness to 0, colour to 50, and tint to 0. Depending on the viewing environment where you will be using the TV, you should alter the OLED Light setting. The overall picture quality is unaffected by changing this option.At the TV's back or bottom, press the power button. Activate the input button. By doing this, a menu of your TV's display inputs will appear. To choose an input, use the mouse.Ensure that the TV and source device are both turned on, then unplug and reconnect the HDMI cable from one of the devices. Turn on HDMI Input Enhanced if your TV can handle the HDMI Enhanced Format and your source can handle 4K.

To learn more about transfers refer to:

https://brainly.com/question/29236106

#SPJ4

Write a program that prints out all of the powers of 2 less than one million. Hint: There are 20 powers of 2 less than one million.

Answers

To make a program, there are four steps:

Identify the Problem.Design a Solution.Write the Program.Check the Solution.

What is programming?

Writing code to support certain activities in a computer, application, or software program and giving them instructions on how to do is known as computer programming.

Programming is regarded as one of the most challenging fields to learn. It is not difficult to understand why some people find it challenging to learn how to code, given.

Therefore, to make a program, there are four steps:

Identify the Problem.Design a Solution.Write the Program.Check the Solution.

To learn more about programming, refer to the link:

https://brainly.com/question/11023419

#SPJ1

Features actually used to differentiate among choices are called ________ attributes.
A) evaluation
B) search
C) determinant
D) segmentation

Answers

Determinant attributes refer to the characteristics that are really employed to distinguish between options.

What is a Determinant Attribute?Perceptual maps should always be prepared with certain qualities in mind. The normal two-axis, four-quadrant perceptual map, in particular, depends on the determination, scoring, and input of determinate properties.Each unique attribute that makes up a product—basically, all of its features and advantages—is what makes it up. An easy table and chair set, for instance, would be constructed from various materials in a variety of colors, forms, sizes, and other characteristics. Each of these distinct product qualities contributes to the consumer's enjoyment of advantages including comfort, convenience, style, decorative appeal, durability, and other factors.There are two primary categories of characteristicsConcerning two different kinds of characteristics are:Identifying characteristics Important characteristics.Important characteristics are the features or advantages a product MUST have in order for consumers to consider it a potentially suitable option for their purchase decision. Following that, a consumer will weigh several brands as alternatives that have each of their key characteristics, and based on the brand's distinctive features, the consumer will choose the best option.

To Learn more About  Determinant attributes refer TO:

https://brainly.com/question/14782444

#SPJ4

CNT Books hired you as a productivity consultant. Currently, it employs six people who will be moving into new office space. You are to configure a network that allows them to share files and printers. Employees must also be able to control resources on their own machines. The company wants the most inexpensive solution and only minimal training for employees. Would you choose a peer-to-peer network or a server-based network? Write a list of supplies you might need to purchase to perform this task. What computer configuration tasks might you need to perform? CNT Books has expanded considerably since you got the network up and running three years ago. It now occupies an entire floor in the building, and its LAN has grown to include several servers and more than 60 workstations. CNT Books has recently purchased another book company and needs more space and computers. Expansion plans include leasing another floor four stories above the current offices in the same building and adding 35 workstations and at least one more server immediately, with additional equipment plirchases expected. What type of network is called for-LAN, WAN, MAN, or internetwork? What additional devices might be needed to ensure efficient network communication?

Answers

In this case, I would prefer peer-to-peer because it configures computers to work as part of the same group, allows file and printer sharing, and allows network discovery.

I can use net view to see other computers in the workgroup to ensure they are operational. Data can be stored, retrieved, and processed using programmable technology such as computers. When humans (human computers) used mechanical calculators like the abacus and slide rule to make numerical calculations, they were referred to be "computers" in the original sense of the word. As mechanical equipment started to replace human computers, the word was later applied to them. Modern computers are electrical machines that accept data (input), a process that data, produce output, and store (storage) the outcomes (IPOS).

The ENIAC was the name of the first digital computer and the model that most people currently use to refer to a computer. It was constructed between 1943 and 1946, during World War II, with the intention of assisting in the automation of calculations being carried out by human computers. They might obtain findings far more quickly and with fewer errors by performing these computations on a computer.

Learn more about computers here:

https://brainly.com/question/30206316

#SPJ4

column called average total. add a statement to your sql query that calculates the average total and stores it in a new column as average total.

Answers

Answer:

SELECT AVG( average_total ) as   'average total' FROM some_table;

Explanation:

For this, we need to use avg() function. We have to pass the column name as a parameter. The avg() function has the following syntax:

SELECT AVG( column_name ) FROM table_name;

Is there an an alternative to windows's TASKKILL command?

If there is, what is the name in .exe?

Answers

Answer:

The alternative to Windows's taskkill command is called Tskill.exe.

Explanation:

write code that outputs text around variable numcups as below. if the input is 2, the output should be: there are 2 cups.

Answers

The code that outputs text around variable numcups as below:

let numcups = 2;

console.log(`There are ${numcups} cups.`);

What is variables?
A variable is a symbol or name that stands for a value. It refers to a place in memory where the value is stored. Variables are used to store values that may change during the course of a program’s execution. Variables in programming are analogous to variables in mathematics, where the value of a variable can change depending on the conditions of the problem. In a programming language, variables are declared to represent a particular type of data such as integer, floating-point, or character. The declared variable can then be assigned a value, which can be changed at any time during the program’s execution. Variables are used to store information that can be used and manipulated by the program for various tasks such as output and calculations.

To learn more about variables
https://brainly.com/question/29839776

#SPJ4

you want to install windows 11 to take advantage of several new features. however, you have critical data on the os hard drive that you want to preserve while installing windows 11.

Answers

To solve this problem, First backup all the data and then reinstall or clean install Windows 11.

What is Windows 11?

In October 2021, Windows 11, the most recent major release of Microsoft's Windows NT operating system, was released. It is a free upgrade to Windows 10 for any Windows 10 devices that satisfy the new Windows 11 system requirements (2015).

Windows 11 now features a new Start menu, a separate "Widgets" panel on the taskbar, the capability to create tiled sets of windows that can be minimised and restored from the taskbar as a group, & new gaming technologies inherited from Xbοx Series X & Series S such as Auto HDR & Direct Storage on compatible hardware. The cancelled Windows 10X has had a significant impact on Windows 11.

Learn more about Windows 11

https://brainly.com/question/30278424

#SPJ4

Other Questions
Why doesn t protease digest the stomach and small intestine?. To increase self-awareness, it is helpful to do which of the following? (Choose every correct answer.)a. to evaluate the way feelings have affected previous experiencesb. to be in the habit of monitoring and analyzing feelings as they occurc. to recognize triggers and devise ways to handle them 1. A way to discover which of two classes is the base class and which is the subclass is to . a. look at the class size b. try saying the two class names together c. use polymorphism d. Both a and b are correct. 2. Employing inheritance reduces errors because . a. the new classes have access to fewer data fields b. the new classes have access to fewer methods c. you can copy methods that you already created d. many of the methods you need have already been used and tested 3. A base class can also be called a . a. child class b. subclass c. derived class d. superclass 4. Which of the following choices is the best example of a parent class/child class relationship? a. Rose/Flower b. Present/Gift c. Dog/Poodle d. Sparrow/Bird 5. The Java keyword that creates inheritance is . a. static b. enlarge c. extends d. inherits 6. A class named Building has a public, nonstatic method named getFloors(). If School is a child class of Building, and modelHigh is an object of type School, which of the following statements is valid? a. Building.getFloors(); b. School.getFloors(); c. modelHigh.getFloors(); d. All of the previous statements are valid. 7. Which of the following statements is true? a. A child class inherits from a parent class. b. A parent class inherits from a child class. c. Both of the preceding statements are true. d. Neither a nor b is true. 8. When a subclass method has the same name and argument types as a superclass method, the subclass method the superclass method. a. overrides b. overuses c. overloads d. overcompensates 9. When you instantiate an object that is a member of a subclass, the constructor executes first. a. subclass b. child class c. extended class d. parent class 10. The keyword super always refers to the of the class in which you use it. a. child class b. derived class c. subclass d. parent class 11. If the only constructor in a superclass requires arguments, its subclass . a. must contain a constructor b. must not contain a constructor c. must contain a constructor that requires arguments d. must not contain a constructor that requires arguments 12. If a superclass constructor requires arguments, any constructor of its subclasses must call the superclass constructor . a. as the first statement b. as the last statement c. at some time d. multiple times if multiple arguments are involved 13. A child class Motorcycle extends a parent class Vehicle. Each class constructor requires one String argument. The Motorcycle class constructor can call the Vehicle class constructor with the statement . a. Vehicle("Honda"); b. Motorcycle("Harley"); c. super("Suzuki"); d. none of the above 14. In Java, the concept of keeping data private is known as . a. polymorphism b. information hiding c. data deception d. concealing fields 15. If you create a data field or method that is , it can be used within its own class or in any classes extended from that class. a. public b. protected c. private d. both a and b 16. Within a subclass, you cannot override methods. a. public b. private c. static d. constructor 17. You call a static method using . a. the name of its class, a dot, and the method name b. the name of the classs superclass, a dot, and the method name c. the name of an object in the same class, a dot, and the method name d. either a or b 18. You use a method access specifier when you create methods for which you want to prevent overriding in extended classes. a. public b. protected c. final d. subclass 19. A compiler can decide to a final methodthat is, determine the code of the method call when the program is compiled. a. duplicate b. inline c. redline d. beeline 20. When a parent class contains a static method, child classes override it. a. frequently b. seldom c. must d. cannot Write an essay in which you argue whether or not failure can strengthen a person.Use evidence from history, current events, literature, or your personal experience. Remember to clearly state your opinion in a thesis statement, plan, revise, and edit your response. Which of the following is not an example of a statistic?Multiple ChoiceA list of the profits earned last year for 100 companies in the United StatesThe unemployment rate in the United States for last monthThe weekly income of the typical high school graduate compared to a typical college graduateThe average profit earned last year for the 10 top companies on the Dow Jones Index What is the GCF of 20z and 30z? Hunter recorded the mass of each rock in his collection. A dot plot has a horizontal axis labeled, Mass, in grams, marked from 35 to 45, in increments of 1. The number of dots above each value is as follows: 35, 2; 38, 2; 39, 2; 41, 1; 42, 1; 43, 2; 44, 1; 45, 1. Find the median mass. \text{ g} gstart text, space, g, end text Refer to Figure 6.1. assume tom is on budget constraint ac and the price of a hamburger is $4.00. tom's monthly income isa. $20.b. $60.c. $80.d. $100. Write the equation as a single logarithm and show your steps 3log4x-2log4y Find the root of the equation D^2=36 what is the slope through the line of (2, 6) and (8, 4) What measures did the US government take to prepare Americans for war?. What is the value of k for which the quadratic equation 3x2 KX 3 0 has equal roots?. 2(4+3(x-5))Answer: 6x-22-3(9-2(k+3)+5k)Answer: -9k-9Explain how you get the answer two issues related to the creation of the political boundaries of newly independent states. In a right triangle, the lengths of the legs are a and b. find the hypothenus ifB) a=1, b=1C) a=5, b=6 Government involvement in a modern economy is generally defended because. the marketplace always meets the needs and wants of society's members. What are the 5 factors of production and their functions?. . What artistic movement reflected uncertainty of the post WWI period? of the following choices, which would permanently remove data from media so that it is unrecoverable?