You have decided to roll out microsoft office to all users using a single license that covers all users. which type of license will be used?

Answers

Answer 1

The type of license which will be used for all users using a single license and covers all users is volume licensing.

What is a volume license?

A volume license can be defined as a type of license that is designed and developed to avail a software developer or publisher an ability to use a single license for various end users, while covering all installations of a software product such as Microsoft Office.

This ultimately implies that, volume licensing is a type of license which will be used for all users using a single license and it covers all users.

Read more on software here: https://brainly.com/question/26324021

#SPJ12


Related Questions

what is the minimum number of load balancers needed to configure active/active load balancing?

Answers

Answer:

2

Explanation:

The primary and secondary machines should both be actively handling connections to your virtual servers in order for active/active to entail having two load balancing appliances running concurrently. The second interpretation of active/active has to do with ones back end servers, which are all running and accepting connections behind the virtual service. This makes use of all of your available computing power for accepting connections.

The minimum number of load balancers needed to configure active/active load balancing is 2.

What are load balancers?

Load balancing is known to be a key networking solution that is often employed to share traffic across multiple servers in the case of server farm.

Note that The minimum number of load balancers needed to configure active/active load balancing is 2.

See full question below

What is the minimum number of load balancers needed to configure active/active load balancing?

- 2

- 4

- 1

- 3

Learn more about load balancers from

https://brainly.com/question/13088926

#SPJ11

A for statement contains three expressions: initialization, test, and:

Answers

A for statement contains three expressions and these are:

InitializationTestUpdate

What is a for statement?

A for statement can be defined as a type of statement that is written by a computer programmer to repeat an action or event in a software program for a specific number of time.

In Computer programming, a for statement contains three expressions and these include the following:

InitializationTestUpdate

Read more on statements here: https://brainly.com/question/18736215

#SPJ12

What do both wireless lans (wlans) and wireless wans (wwans) rely on as the communication medium?

Answers

Wireless lans (WLANS) and wireless wans (wwans) rely on as the radio frequency spectrum communication medium.

What is Radio spectrum?

The radio spectrum is known to be an aspect of the electromagnetic spectrum that is said to have frequencies from 0 Hz to 3,000 GHz.

Note that Wireless lans (WLANS) and wireless wans (wwans) rely on as the radio frequency spectrum communication medium for their functions.

Learn more about WLANS from

https://brainly.com/question/26956118

#SPJ12

what statement can you use to divide a script into multiple batches?

Answers

The GO statement can be used to divide a script into multiple batches

How to determine the statement?

To divide a script, we make use of the GO statement or the GO command.

The GO statement has no syntax because it is not a keyword in SQL.

However, it is used by the SQL to create a group or batch of instructions that would be sent into the server

Read more about SQL at:

https://brainly.com/question/25694408

#SPJ11

When a cookie is created during a website visit, it is stored:

Answers

When a cookie is created during a website visit, it is stored on the hard drive if the visitor's computer.

What is a cookie?

A cookie simply means the small blocks of data that are created by a web server.

In this case, when a cookie is created during a website visit, it is stored on the hard drive if the visitor's computer.

Learn more about cookie on:

brainly.com/question/1308950

#SPJ12

what do you mean by computer ethics?​

Answers

Answer:

Computer ethics is a field of applied ethics that addresses ethical issues in the use, design and management of information technology and in the formulation of ethical policies for its regulation in society.

Take dismal Jack la floor italianizarla pues

Jack is an accountant he can't access the spreadsheet software which is installed on the server what should jack do

Answers

Answer:

Ping

Explanation:

Jack should ping the server and check to see if it has crashed. The ping command is a networking utility that determines if an IP address or domain is accessible. Once it is determined, Jack may utilize the data to derive additional inferences. While troubleshooting internet access, pinging is generally the first line of protection. It not only tests connection, but it also counts time and ensures that all Internet Control Message Protocol packets are accountable.

When you coordinate tasks by email, you show respect for the recipient's time by:

Answers

When tasks are coordinated by email, you can show respect for the recipient's time by clearly stating your availability.

What is an e-mail?

An e-mail is an acronym for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users send and receive both texts and multimedia messages over the Internet.

As good work ethics, when tasks are coordinated by e-mail, you can show respect for the recipient's time by clearly stating your availability and providing details about time frames.

Read more on e-mail here: https://brainly.com/question/15291965

#SPJ12

7.7% complete Question An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable

Answers

The solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

What is data?

It should be noted that data simply means the representation of facts ans concepts on a formalized manner.

In this case, the solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

Learn more about data on:

brainly.com/question/4219149

#SPJ12

i) Convert 8GB to bits. Give the expression.

Answers

Answer:

64 billion

Explanation:

1gb = 1 billion bytes

so 8gb = 8 billion bytes

then

1 byte= 8 bits

so 8 billion bytes = 8 × 8 billion bits, 64 billion bits

Your friend just noticed his smartphone's battery is running low. Unfortunately, your friend isn't very knowledgeable about computers and smartphones, so he doesn't know what type of charging cable he needs. He knows his phone is running iOS 12. What kind of cable does your friend need to charge his phone

Answers

Answer:

Lightning

Explanation:

Apple Inc. designed and developed the Lightning computer bus and power connection. Apple mobile devices such as iPhones, iPads, and iPods use the Lightning connection to connect to host computers, external displays, cameras, USB battery chargers, and other accessories. Lightning is substantially smaller than its predecessor, with only 8 pins instead of 30.

Which wan connection types use digital communications over pots?

Answers

The WAN Connection that uses digital communications over pots is called; Digital Subscriber Line (DSL)

How to understand WAN (Wide area network)?

A wide area network(WAN) is defined as a telecommunications network that extends over a large geographic area.

Now, there are different means of transmitting these WAN networks but the connection type that uses digital communication over pots is called Digital Subscriber Line (DSL). This is because it digitally transmits data that is sent over the POTS copper wire infrastructure using Point–to–point (PTP) technology which experiences little to no congestion.

Read more about Wide area Network at; https://brainly.com/question/8118353

#SPJ12

webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so. true or false?

Answers

The statement that webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so is false.

What is webrooming?

It should be noted that webrooming simply means the consumer practice for researching products online before buying theme in stores.

In this case, the main idea of webrooming isn't to buy it at stores because it's cheaper. Therefore, it's false.

Learn more about webrooming on:

brainly.com/question/14988432

#SPJ12

what nat ip address is a public ip address that maps to an inside device?

Answers

The nat ip address is a public ip address that maps to an inside device is "inside global".

What is IP address?

It should be noted that IP address simply means an internet protocol address that's is associated with a computer network.

In this case, the nat ip address is a public ip address that maps to an inside device is "inside global".

Learn more about IP address on:

brainly.com/question/24930846

#SPJ12

algorithm to print the first 10 odd numbers​

Answers

Answer:

I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)

Explanation:

please mark brainliest

The programming process consists of several steps, which include:

Answers

The programming process consists of several steps, which include: Design, creation, testing, and debugging.

What are the steps in programming process?

The programming process is also made up of:

Defining the problem.Planning the solution.Coding the program.Testing the program.Documenting the program

Note also that The programming process consists of several steps, that include: Design, creation, testing, and debugging.

Learn more about programming process from

https://brainly.com/question/22654163

#SPJ12

the control plan is essential because it tells the

Answers

The control plan is essential because it tells the Process owners the way or how to sustain the project gains.

What is the aim of a control plan?

A control plan is known to be a kind of living document that states the methods to be used for quality control of any vital or critical inputs to transport outputs that can meet customer requirements.

Note that The control plan is essential because it tells the Process owners the way or how to sustain the project gains.

Learn more about control plan from

https://brainly.com/question/25453419

#SPJ11

When a file is used by a program, there are three steps that must be taken:

Answers

The three steps that must be taken:

Open the file Process the fileClose the file

What is file opening?

The act of Opening a file is one that makes a a connection to exist between the file and the program.

Note that The three steps that must be taken:

Open the file Process the fileClose the file

Learn more about program from

https://brainly.com/question/1538272

#SPJ12

Which blu-ray standard defines rewritable disks?

Answers

The blu-ray standard that defines rewritable disks is BD-RE.

What is a rewritable disk?

It should be noted that a rewritable disk simply means an erasable disk that can be reused.

In this case, the blu-ray standard that defines rewritable disks is BD-RE. It is the recordable standard.

Learn more about disks on:

brainly.com/question/20381259

#SPJ12

A router is performing basic routing functions. What will be the third step in the transmission of a packet?

Answers

The third step in the transmission of a packet is known as a network layer.

What is a router?

It should be noted that a router is a device that connects two or more packets networks.

Here, the third step in the transmission of a packet is known as a network layer. It adds another header in what is received.

Learn more about router on:

brainly.com/question/24812743

#SPJ12

Which is considered the most widely used cloud computing service?

Answers

The most widely used cloud computing service is the Amazon web services.

What is cloud computing?

It should be noted that cloud computing simply means the on-demand availability of computer resources without direct active management by the user.

In this case, the most widely used cloud computing service is the Amazon web services.

Learn more about cloud computing on:

brainly.com/question/19057393

#SPJ12

A destination port number at the transport layer identifies which application on a computer should receive the data transmission

Answers

A destination port number at the transport layer identifies which software application on a computer should receive the data transmission: True.

What is the transport layer?

The transport layer can be defined as one of the seven layers of the open systems interconnection (OSI) model and it is responsible for routing messages through an active computer network while selecting the best transmission path from the source to the destination device.

In Computer networking, a destination port number at the transport layer is saddled with the responsibility of identifying which software application on a computer should receive the data transmission.

Read more on transport layer here: https://brainly.com/question/26177113

#SPJ12

HURRY PLS
polina is a system architect and at the point in her current project where she must review the code at a high level to make sure it meets all the requirements. After that, which of the following groups will polina work with


A) the testing team

b)the CEO

Answers

Answer:

the testing team

Explanation:

because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not

Suppose a family has had a house fire in which they lost many photos, and they are worried about losing more if they have another. Which of the following is a reason this family may want to digitize their photos? Choose all that apply.

A: to make it easier to e-mail photos to friends

B: to maximize file space on their hard drive

C: to minimize risk of losing photos by backing them up in virtual space

D: to save space in their home

Answers

Answer:

C - Minimize the risk of future loss.

Explanation:

All four reasons listed are valid reasons to digitize family photos, but in this instance where this family has lost photos in a house fire before, minimizing the risk of losing photos in the future might be their primary goal.

You hide three worksheets in a workbook and need to unhide them. What is an accurate statement about this process?

Answers

The  accurate statement about this process is that "The person must unhide each worksheet separately".

How do you unhide multiple sheets in Excel?

To unhide multiple sheets, one can:

Right-click the Sheet tab at the bottom, and then click on  Unhide. Then also click all together the Shift + Up/Down Arrow keys to click multiple (or all) worksheets, and then click OK.

Note that The  accurate statement about this process is that "The person must unhide each worksheet separately".

Learn more about worksheets  from

https://brainly.com/question/25130975

#SPJ12

_____ view provides the most options for defining fields.

Answers

A table design view provides the most options for defining fields.

What is table design?

Tables are known to be a design pattern for showing a big amounts of data in rows and columns.

Note that in the case above, A table design view provides the most options for defining fields.

Learn more about  table design from

https://brainly.com/question/26961510

#SPJ12

QUESTION 9 OF 100
What does it means when you see a sign with an "X" and two
letters "R" sign posted on the roadside?

Answers

Answer:

it means go sleep on ur bed

jk

Answer:

the sign means "railroad"

Explanation:

In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources assigned to other operating systems running in the same hardware environment

Answers

Answer:

VM escape attack

Explanation:

In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.

What is open source software​

Answers

Answer:

Open Source Software

Explanation:

Open-source software is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.

Answer:

open so software is an computer software that is reliance in which copyright holding reference uses the rights use study change and disturb this software and it so scold to anyone for any propose also open source software maybe diplobed in collaborative public manner

Explanation:

helpful

What should be used to prevent javascript from accessing a session id value?.

Answers

Cookies should be used to prevent javascript from accessing session-id values.

What are cookies?

Cookies are brief text messages that a website you visit sends to your browser.

Web browsers are instructed to only send cookies using encryption using the Secure cookie property.

The session ID can be taken from the user's browser cookies during storage, frequently via cross-site scripting. The session ID may be seen while it's being sent by listening in on network traffic.

Keep in mind that every request to the server includes a session ID. Using the cookie attribute of the Document object,

JavaScript is also capable of manipulating cookies. JavaScript has the ability to read, write, change, and remove cookies that are specific to the current web page.

Hence, cookies should be used to prevent javascript from accessing session-id values.

To learn more about the cookies refer to:

https://brainly.com/question/20263903

#SPJ1

Other Questions
which of the following number is not a cube number A) 10000B)3125C)64D)729 Lightning quickly heats the air causing it to expand, which produces the sound of thunder. Sound travels approximately 1 mile in 5 seconds. Knowing D = rt, how far away is a thunderstorm when you notice a 3- second delay between the flash of lightning and the sound of thunder? Lightning quickly heats the air causing it to expand , which produces the sound of thunder . Sound travels approximately 1 mile in 5 seconds . Knowing D = rt , how far away is a thunderstorm when you notice a 3 second delay between the flash of lightning and the sound of thunder ? Forensic scientists can match missing persons and their families by matching maternal DNA to the missing individual.Which type of DNA technology is used for this purpose? I need help with question 12 Arms reduction and settling border disputes contributed to the league of nations goal of. 1. Why geography does not have unique definition and consensus among Geographers? Write the reason in accordance with the thoughts of geography. Todos quieren ir al festival a ________ una de la tarde.Which definite or indefinite article should I use if any? WILL GIVE BRAINLIEST AND THANKS A germ-line cell containing the chromosomes below undergoes meiosis to produce an egg. What genotype might be present in the egg? Assume no crossing over or nondisjunction. Note: Thereare 4 chromosomes shown here.AGAGbAgBAGBbAaGgBbGbICH &6 Read the first three paragraphs of Franklin Roosevelts request for a declaration of war.Beyond Congress, who is his primary intended audience? Read the excerpt from The Metamorphoses by Ovid.Jupiter, not thinking the punishment of Lycaon sufficient to strike terror into the rest of mankind, resolves, on account of the universal corruption, to extirpate them by a universal deluge. . . .. . . The weapons forged by the hands of the Cyclops are laid aside; a different mode of punishment pleases him: to destroy mankind beneath the waves, and to let loose the rains from the whole tract of Heaven.Read the excerpt from the adaptation "The Flood by James Baldwin."These men, [Jupiter] said to his mighty company, "are nothing but a source of trouble. When they were good and happy, we felt afraid lest they should become greater than ourselves; and now they are so terribly wicked that we are in worse danger than before. There is only one thing to be done with them, and that is to destroy them every one.So he sent a great rain-storm upon the earth.Which statement best describes how Baldwins adaptation is different from Ovids original?Baldwins text clearly explains that Jupiter destroys humankind with vast amounts of water, while Ovids text is vague about the way Jupiter destroys people.Ovids text explains that Jupiter destroys humanity out of fear, while Baldwins text claims that Jupiters actions are a result of Jupiters anger at humanity.Baldwins text shows that Jupiter has the support of the other gods, while Ovids text describes Jupiter acting alone to punish humans.Ovids text uses an omniscient narrator to describe Jupiters motivation for punishing humans, while Baldwins text uses dialogue to present Jupiters reasoning. a metaphor compares two things directly. A simile compares two things using either like or as which is a symbol in this excerpt Express cos S as a fraction in simplest terms. What type of figurative language is Romeo using to describe Juliet in this quote from Romeo and Juliet?THer eye discourses; I will answer it.I am too bold, 'tis not to me she speaks:Two of the fairest stars in all the heaven," Read these lines from Edgar Allan Poe's "The Raven.""Prophet!" said I, "thing of evil! prophet still if bird or devil!By that Heaven that bends above us-by that God weboth adore,Tell this soul with sorrow laden, if, within the distantAidenn,It shall clasp a sainted maiden whom the angels nameLenore-Clasp a rare and radiant maiden whom the angels nameLenore."Quoth the Raven-"Nevermore."According to "The Philosophy of Composition," what is the significance of thisstanza to Poe? The work function for magnesium is3.70 eV. What is its cutoff frequency?Hint: 1 eV 1.60 x 10-19 J[ ? ] 10 ) Hz] A company makes paper labels for paint cans. As shown below, each can is in the shape of a cylinderwith a height of 7 cm and a radius of 2 cm. The paper label is wrapped around the can and covers onlythe side of the can (not the top or bottom). The company uses, on average, 3612.64 cm of papereach minute making these labels. How many labels does the company make, on average, eachminute?For your calculations, do not round any intermediate steps, and use the button on a calculator. Roundyour answer to the nearest hundredth. Which type of organization has been important to Chinas economic development?sole proprietorshipsmultinational corporationsinternational aid organizationsopposition political parties Read the excerpt from Warriors Don't Cry.Those matches were big events in my life because we traveled downtown to the Robinson Auditorium, a place usually reserved for white people only. Those were the times when I got to go outside my neighborhood, outside the world where I spent most of my life. We sat in the same room with white folks, able to observe them close up. I wanted to get to know them better, to see what it was they had that put them in charge.The central idea of this excerpt is that the narratoris surprised by public race restrictions.cherishes her rare worldly experiences.enjoys time spent with her grandmother.longs to have a more diverse neighborhood. Select the correct text in the passage.Which detail best supports the idea that the people in the future are confused about where the narrator has come from?adapted from The Time MachineAs they made noby H.G. Wellseffort to communicate with me, but simply stood round me smiling and speaking in soft cooing notes to each other, I beganthe conversation by pointing to the Time Machine and to myself. Then, hesitating for moment how to express Time. il pointed to the sun and atonce a quaintly pretty little figure in chequered purple and white followed my gesture, and then astonished me by imitating the sound ofthunder.:For a moment I was staggered, though the import of his gesture was plain enough. creatures fools? You may hardly understand how it took me. You see, 1 had always anticipated that the people of the year Eight Hundred and The question had come into my mind abruptly: were theseCO Two Thousand odd would be incredibly in front of us in knowledge, art, everything. Then one of them suddenly asked me a question that showed him to be on the intellectual level of one of our five-year-old childrenasked me, in fact, if I had come from the sun in a thunderstorm!my mind and for moment I felt that I had built the Time Machine in vain. It let loose the judgment I had suspended upon their clothes, their frail light limbs, and fragile features. A flow of disappointment rushed across