Answer:
D. isolationism
Explanation:
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
Answer:
spooler
Explanation:
A print server uses a print spooler as a software holding area for jobs waiting to be printed.
You found the prime factorization of the number 72.
Explain how you can check your answer.
You’ll get 100 points. I swear.
Answer:
Explanation:
Start dividing the number by the smallest prime number i.e., 2, followed by 3, 5, and so on to find the smallest prime factor of the number. Again, divide the quotient by the smallest prime number. Repeat the process, until the quotient becomes 1 after repeated division.
Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a backup for the database developer. But it also means that the other developers must either wait or add to a growing pile of database work. What's one possible solution to this challenge?
Members of an Agile development team often agrees on what tasks to work on and they do it together. The one possible solution to this challenge is to Have the database developer train the rest of the team so there are fewer handoffs.
Agile development team often works together as a team. They as team discuss the task yo take, when it will take place etc.
This team is all about communication, teamwork, problem-solving etc.
Conclusively, A task should be completed by one member on the team, but the team may choose to pair up when doing the work.
Learn more from
https://brainly.com/question/24383225
See full question below:
Your agile team only has one person who knows how to develop database software. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a pile of backed up work for the database developer. But it also means that the other developers must either wait or add to the growing pile of database work. What's one possible solution to this challenge?
Select an answer:
Have the database developer train the rest of the team so there are fewer handoffs.
Have the software developers split their time between other teams so they're not as productive
Encourage the database developer to work overtime to catch up with their work.
Create a large batch of work so the database developer can focus on finishing
you are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activity.you have noticed that the action you have taken needs to be improved.
action to the problem\tasks:
Answer:
answer it yourself or ask your teacker
Explanation:
this has nothing to do with computers but its for brainly. if somebody is an expert in brainly im not sure. but why do my questions keep getting deleted? my question “does not follow guidelines” but im just trying to ask a math question
Answer:
Maybe its a word or the subject you are talking about. If its a exam or ohio state test they might delete you're question.
g Write a recursive program that causes the program to crash. How calls does it take before it crashes
Answer:
Every recursive function must have a base condition that stops the recursion or else the function calls itself infinitely. The Python interpreter limits the depths of recursion to help avoid infinite recursions, resulting in stack overflows. By default, the maximum depth of recursion is 1000 .
Explanation:
Define three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files.
Security controls are measures that are put in place to control or prevent the attack of a threat on a system. The three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files are;
Physical ControlsTechnical ControlsAdministrative ControlsPhysical controls refer to the measures that are put in place so that unauthorized access to sensitive files is warded off.
It could imply Installing cameras and fingerprinting to prevent such access.
Technical controls are installed to protect the hardware and software. Systems might need to be configured and programmed in such a way that can resist any attack from threats.
Antivirus and data encryption are types of technical controls.
Administrative controls are installed through the policies and standards of operations of the organization.
Through training, new employees are educated on ways to protect the systems from attack.
Learn more here:
https://brainly.com/question/24674099
I'm surprised I haven't even got a single warning yet lol
Answer:
Thats good
Explanation:
Thanks for the points~! ;)
A new pet store wants to design a logo to be displayed on business cards, posters in the shop’s windows, and on a sign above the building. The best way to create and save this logo is as a
VML graphic.
JPG graphic.
GIF graphic.
RAW graphic.
Answer:
B
Explanation:
Answer:B
Explanation:
Companies that produce games for sale are called
A. publishers
B. promoters
C. producers
D. studios
Answer:
im pretty sure it is a. publishers
Explanation:
but dont get mad or quote me if im wrong
what is the first step in search engine optimazation process for your website
a software that interprets commands from the key board and mouse is know as
Explanation:
a virus does that............
Describe alternative storage location(s) that could be used for data backup storage. What are the advantages and disadvantages of using such locations
Answer:
fácil solo regalar a los jóvenes que y poner un stock en él
You are working part time providing computer support for a veterinarian’s office. When you arrive to work one morning, the receptionist informs you that the computer monitor is not displaying anything. List at least three steps you will perform to troubleshoot the problem, and list three possible causes.
reboot the whole computer,
Explanation:
someone being on it when they shouldn't have
A __________ is a special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent loops from happening in the first place.
Write code to assign name and density properties to currMat, and store currMat in requestedMaterials. Input first receives a name value, then a density value. Input example
The code block creates a list of tuples which holds the name and Density values of materials. The program written in python 3 goes thus ;
name = input()
#accepts name input from user
name = [n for n in name.split()]
#split the inputs
density = input()
#accepts density inputs
density = [int(d) for d in density.split()]
#split the density inputs
currMat = list(zip(name, density))
#combines the inputs into a list of tuples
requestedMaterial = currMat
#assigns to another variable
print(requestedMaterial)
A sample run of the program is attached
Learn more :https://brainly.com/question/25700348
You will complete this task in your own editor and upload a file named menu1.py to the zybook.
Write a function called menu_info that has two required parameters, both strings.
The first string is the name of a csv file with 1 row per menu item and 1 column per piece of nutritional information (including a header row) and the second string is the name of 1 menu item.
The function should read in the csv file and then return a list of lists. The first list is the header row and the second list is all of the data for the specified menu item.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the list of lists that is returned from your function call.
Your code should work for any csv file with this structure. A sample file can be downloaded in the lab.
Menu Summary
In your own editor, create a file named menu2.py that you will upload to the zybook for your submission.
Write a function called menu_summary that has one parameter, a string with the name of a file with the menu for a restaurant. \
The first row of the csv file is the headers. The second row tells you if 'healthy' is defined as a high or low value for that category, and then there is 1 row per menu item.
The function should read in the csv file and then create a dictionary where the keys are the nutrition headers and the values are the menu items (one per nutrition category) that have the 'healthiest value for that category. Return the dictionary.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the dictionary that is returned from your function call.
Your code should work for any csv file. You may download a sample file from the lab.
Answer:
abc
Explanation:
Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Sample output with inputs 2014 777: Dog license: 77702014
Answer:
I am writing the program in JAVA and C++
JAVA:
public int createLicenseNum(int customID){ //class that takes the customID as parameter and creates and returns the licenseNum
licenseNum = (100000 * customID) + licenseYear; //licenseNum creation formula
return(licenseNum); }
In C++ :
void DogLicense::CreateLicenseNum(int customID){ //class that takes the customID as parameter and creates the licenseNum
licenseNum = (100000 * customID) + licenseYear; } //licenseNum creation formula
Explanation:
createLicenseNum method takes customID as its parameter. The formula inside the function is:
licenseNum = (100000 * customID) + licenseYear;
This multiplies 100000 to the customID and adds the result to the licenseYear and assigns the result of this whole expression to licenseNum.
For example if the SetYear(2014) means the value of licenseYear is set to 2014 and CreateLicenseNum(777) this statement calls createLicenseNum method by passing 777 value as customID to this function. So this means licenseYear = 2014 and customID = 777
When the CreateLicenseNum function is invoked it computes and returns the value of licenseNum as:
licenseNum = (100000 * customID) + licenseYear;
= (100000 * 777) + 2014
= 77700000 + 2014
licenseNum = 77702014
So the output is:
Dog license: 77702014
To call this function in JAVA:
public class CallDogLicense {
public static void main(String[] args) {//start of main() function
DogLicense dog1 = new DogLicense();//create instance of Dog class
dog1.setYear(2014); // calls setYear passing 2014
dog1.createLicenseNum(777);// calls createLicenseNum passing 777 as customID value
System.out.println("Dog license: " + dog1.getLicenseNum()); //calls getLicenseNum to get the computed licenceNum value
return; } }
Both the programs along with the output are attached as a screenshot.
A developer is responsible for defining the architecture of an app. Describe three parts of that architecture.
Answer:
Application Architecture: The application architecture is designed by an application architect, who is responsible for designing application layers, formulating application specifications, and defining APIs and data interaction protocols based on the needs of business scenarios.
Explanation:
Application architecture portrays the behavior of applications and their interactions. The app architecture includes a UI layer, a domain layer, and a data layer.
What is application architecture?Application architecture is a domain in an information system that describes the interaction of the various application used for different purposes. This is designed by an application architect.
They design the application layers that include the UI, domain, and data layer that defines the APIs and other protocols that are followed to make the application work.
Therefore, application architecture defines the application interactions.
Learn more about application architecture here:
https://brainly.com/question/17347510
#SPJ2
13.12 LAB: Contains the character
Write a program that reads a character, then reads in a list of words. The output of the program is every word in the list that contains the character at least once. Assume at least one word in the list will contain the given character.
Ex: If the input is:
z
hello zoo sleep drizzle
the output is:
zoo
drizzle
Keep in mind that the character 'a' is not equal to the character 'A'.
Answer:
Explanation:
The required program prints words which have an occurrence of an inputted alphabet from a list of given words. The program written in python 3 goes thus :
character = input("Enter a character: ")
#prompts user of character of choice
words = input("Enter the words: ")
#prompts user to enter a list of words
split_words = words.split()
#split the words in the list given
for w in split_words:
#iterate through the splitted words
if character in w:
#if an occurence of the character exists in the word
print(w)
#print the word.
A sample run of the program is attached
1. A school has two separate computer networks One is used for keeping pupil and staff records
The other is for pupil to use in lessons to help in their learning and also store their work.
Pupils use the internet quite frequently in their lessons to help them with their work.Discuss the
advantages (3) and disadvantages(3) of this as far as a pupil is concerned.
Answer:
Explanation:The internet has both advantages and disadvantages
Some advantages includes:
The internet is used for research purposes,the internet enables students to learn on their own pace and basically provides vital information and online books for students to learn
Some of the disadvantages include:
Internet fraud on the part of students,exposure to ponographic materials etc.
write a program that reads a one-line sentence as input and then displays the following response: if the sentence ends with a question mark (?) and the input contains an even number of characters, display the word Yes. If the sentence ends with a question mark and the input contains an odd number of characters, display the word No. If the sentence ends with an exclamation point (!), display the word Wow. In all other cases, display the words You always say followed by the input string enclosed in quotes. Your output should all be on one line. Be sure to note that in the last case, your output must include quotation marks around the echoed input string. In all other cases, there are no quotes in the output. Your program does not have to check the input to see that the user has entered a legitimate sentence.
We use if-else structure to check if the sentence meets the requirements for each situation.
endswith() method is used to check if the sentence ends with the target character. modulo(%) operator is used to check if the sentence contains even or odd number of charactersescape character is used to print the quotation marks in the else partComments are used to explain each line of the code.
#get the user input
sentence = input("Enter a sentence: ")
#check if the sentence ends with ? and has even number of characters
if sentence.endswith("?") and len(sentence) % 2 == 0:
print("Yes")
#check if the sentence ends with ? and has odd number of characters
elif sentence.endswith("?") and len(sentence) % 2 == 1:
print("No")
#check if the sentence ends with !
elif sentence.endswith("!"):
print("Wow")
#used for other situations
else:
print("You always say \"{}\"".format(sentence))
You may see a similar question at:
https://brainly.com/question/14851610
Which process would benefit from the use of Robotic Process Automation?
Answer:
Cost-Effective. Accuracy & Quality. Consistency. Improved Analytics. Increased Employee Productivity.¿Qué tipo de información deben proteger los sitios de comercio electrónico?
Happy Thanksgiving!!!!
Yoo, you too, bro!
Have a nice time with your family
You know what? I quit...
everytime i add a question I need help with it keeps saying it was removed because of community guidlines
Explanation:
What's wrong with SontungMTP's song?
A) The passing rain
B) laylalay
C) Bigcityboy
who is a fan i know
Answer:
A
Explanation:
The application window controls include: minimize, maximize, and close
A) true
B) false
Answer:
True
Explanation:
Look at the top right of your computer while having a chrome tab open. You will see a line, a box, and a x. Hover over each and you can see the names.
Evaluate the https://mwasalat.om/en-us/ website you should mention the following criteria in evaluating the website. Look & feel Usability . Readability Traffic & Suggestions to improve the system
https://mwasalat.om/en-us/
Answer:
sorry i need points .................
Pls Help! Worth 30 Points
Answer:
Um I cant really see the questions type them in the comments then I can Help you