The project management software that is used to organize a flow of team activities and manage lists of tasks is D) Oracle Primavera.
Oracle Primavera is a project management software solution that helps to globally prioritize, plan, manage, and execute programs, projects, and portfolios. Oracle Primavera is designed in such a way that can handle small and large projects in a number of diverse industries, such as information technology, construction, manufacturing, and energy.
Oracle Primavera is called a business intelligence software that offers a central repository for all portfolio, project, and resource data.
"
Question with missing options is as follows:
which of the following project management software is used to organize a flow of team activities and manage lists of tasks? A) SAP B) Microsoft SkyDrive C) G-oogle drive D) Oracle Primavera
"
You can learn more about Oracle Primavera at
https://brainly.com/question/11207967
#SPJ4
state five fonction of THE operating system
Answer:
An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.
Memory Management.
Processor Management.
Device Management.
File Management.
Security.
Control over system performance.
Job accounting.
Error detecting aids.
Show how components work together to achieve the goal. (a). university of sierra Leone (b). Democracy (c) College - school bus (d). Registration process at MMTU (e) Electrical fan
Answer:
Explanation:
(a) University of Sierra Leone:
The University of Sierra Leone comprises three main constituent colleges: Fourah Bay College, College of Medicine and Allied Health Sciences, and Institute of Public Administration and Management. These colleges work together to achieve the university's goal of providing higher education to students in Sierra Leone. Each college offers a range of programs and courses, and students can take courses from multiple colleges to complete their degree. The university also has a central administration that oversees the functioning of the university as a whole.
(b) Democracy:
Democracy is a form of government in which power is held by the people through the process of free and fair elections. In a democratic system, citizens have the right to vote and participate in the decision-making process of the government. The key components that work together to achieve democracy include free and fair elections, a constitution that protects citizens' rights and limits the power of the government, an independent judiciary, and a free press. When these components work together, they help ensure that the government is accountable to the people and that citizens have a say in how they are governed.
(c) College - School Bus:
A college or school bus is a specialized vehicle designed to transport students to and from school or college. The bus is equipped with features such as a stop arm, flashing lights, and warning signs to ensure the safety of students while boarding or disembarking from the bus. The bus is operated by a trained driver who follows a pre-determined route to pick up and drop off students at designated stops. The college or school administration works with the bus company to ensure that the bus schedule and routes are optimized to meet the needs of the students.
(d) Registration process at MMTU:
The registration process at MMTU (Modern Manufacturing and Technology Unit) is designed to ensure that students can enroll in courses and complete their degree requirements in a timely and efficient manner. The registration process typically involves several components that work together, including course selection, scheduling, payment, and academic advising. Students typically meet with their academic advisors to select courses and create a schedule that meets their degree requirements. They then complete the registration process by submitting their course selections and paying any required fees. The MMTU administration ensures that the registration process is streamlined and that students have access to the resources they need to complete the process successfully.
(e) Electrical fan:
An electrical fan is a common household appliance that is designed to circulate air and provide a cooling effect. The key components that work together to achieve this goal include an electric motor, blades, and a casing. The electric motor drives the rotation of the blades, which then move air through the casing and out into the surrounding environment. The blades are typically made of lightweight materials and are designed to maximize airflow while minimizing noise. The casing is designed to direct airflow in a specific direction, and may include features such as speed controls, oscillation, and remote operation. When all these components work together, the electrical fan provides an effective and efficient way to cool a room or space.
In a democracy, the people hold the reins of power through the conduct of free and fair elections.
What is Democracy?Citizens have the right to vote and participate in governmental decision-making in a democratic society.
Free and fair elections, a constitution that safeguards citizens' rights and places limitations on government power, an independent judiciary, and a free press are the main building blocks of democracy.
Together, these elements make it possible for the people to hold the government accountable and have a say in how their country is run.
Therefore, In a democracy, the people hold the reins of power through the conduct of free and fair elections.
To learn more about Democracy, refer to the link:
https://brainly.com/question/13158670
#SPJ2
1
A problem that can be solved through
technological design has been identified. A
brief has been written. What is the next step
in the design process?
O Specification writing
O To conduct background research
O To identify barriers and constraints
The design of different potential solutions
The next step in the design process will be the design of different potential solutions. The correct option is D.
What is technological design?Technological design is a distinct process with several distinguishing characteristics: it is purposeful, based on specific requirements, iterative, creative, and systematic.
A good technical design is one that requires the least amount of effort and money while meeting your business requirements, particularly in terms of development speed and turn-around time, maintenance cost, deployment complexity, scalability, or security requirements.
A problem has been identified that can be solved through technological design. A synopsis has been written. The design of various potential solutions will be the next step in the design process.
Thus, the correct option is D.
For more details regarding technological design, visit:
https://brainly.com/question/26663360
#SPJ1
According to the text, which of the following technological advancements have aided the Internet's role in media convergence?
A. The development of digital technologies that allow information to be transferred as a series of binary codes
B. The development of smaller, personal computers, made possible through the development of microchips and microprocessors
C. The development of fiber-optic cable, which allowed a massive amount of information to be transmitted extremely quickly
D. All options are correct*
All options are correct. All the statements show technological advancements have aided the Internet's role in media convergence.
The Internet has played a significant role in the convergence of media, which refers to the combining of different forms of media such as television, radio, and print into a single platform or device. This convergence has been made possible by several technological advancements, including:
A. The development of digital technologies: Digital technologies allow information to be transferred as a series of binary codes, which can be easily transmitted and stored on a variety of devices. This has made it possible for people to access a wide range of media content, such as text, audio, video, and images, through the Internet.
B. The development of smaller, personal computers: The development of microchips and microprocessors has enabled the production of smaller, more powerful computers that can be easily carried and used by individuals. This has made it possible for people to access the Internet and media content from anywhere, at any time.
C. The development of fiber-optic cable: Fiber-optic cables are made of thin strands of glass or plastic and are used to transmit data over long distances. They have a much higher capacity for data transmission than traditional copper cables, making it possible to transmit a massive amount of information extremely quickly. This has allowed the Internet to support the streaming of high-quality video and other media content.
All of these technological advancements have contributed to the Internet's role in media convergence and have made it possible for people to access a wide range of media content from a single device.
Learn more about development: https://brainly.com/question/28011228
#SPJ4
Which of these measurements could be the measurement for a D sizing drawing
A.8 1/2 * 11in
B.11. * 17in
C. 14 * 20in
D. 20 * 26in
Out of the given options, the measurement that could be suitable for a D sizing drawing is option (D) 20 * 26 inches.
D sizing refers to a set of standardized paper sizes commonly used in architectural and engineering drawings. The D size paper measures 24 inches by 36 inches, or approximately 609.6 mm by 914.4 mm. While the exact dimensions may vary slightly, D sizing typically follows this general guideline.
Among the options provided, option D) 20 * 26 inches is the closest in size to the standard D size. While it is not an exact match, it is still within a reasonable range for D sizing drawings.
This measurement offers a similar aspect ratio and can accommodate the necessary information and details typically found in architectural and engineering drawings.
Options A) 8 1/2 * 11 inches, B) 11 * 17 inches, and C) 14 * 20 inches are not suitable for D sizing drawings. They are more commonly associated with letter-sized (A4) or tabloid-sized (A3) papers, which are smaller and may not provide enough space for detailed drawings or scale representation.
Therefore, option D) 20 * 26 inches is the most appropriate measurement for a D sizing drawing.
For more questions on D sizing drawing, click on:
https://brainly.com/question/31336003
#SPJ8
A vendor conducting a pilot program with your organization contacts you for
organizational data to use in a prototype. How should you respond?
Since the vendor is conducting a pilot program with your organization contacts you for organizational data to use in a prototype, The way that you can respond is to Refer the vendor to the right personnel.
What is an example of a reference vendor?A report outlining the payment history between a company customer and its supplier or vendor is known as a supplier reference (or trade reference). It helps a supplier to evaluate your creditworthiness and determine whether you're a trustworthy customer before extending credit to you.
You can determine whether you are prepared to undertake the project fully by running a pilot program. It might highlight unforeseen difficulties that must be resolved, providing you the chance to change and improve in a way that lessens the effects of those difficulties.
Hence, An organization can discover how a large-scale project might function in practice by conducting a small-scale, brief experiment known as a pilot program, also known as a feasibility study or experimental trial.
Learn more about pilot program from
https://brainly.com/question/28920126
#SPJ1
What are some methods of cyber bullying ?
Answer:
HARASSMENT
IMPERSONATION
INAPPROPRIATE PHOTOGRAPHS
WEBSITE CREATION
VIDEO SHAMING
A sum amounts to ₹2400 at 15% simple interest per annum after 4 years fond the sum.
Answer: $1,500
Explanation:
The future value of value using simple interest is:
Future value = Value * ( 1 + rate * time)
2,400 = Value * (1 + 15% * 4)
2,400 = Value * 1.6
Value = 2,400 / 1.6
Value = $1,500
Write a program that will ask the user to input how many numbers are in a list. A loop is used to load the list
beginning with number 1. The user is then asked to enter a number between 0 and the biggest number in the list.
The original list is displayed. A function is then called that accepts 2 arguments (the list and the number entered
by the user) and then displays all numbers from the original list that are larger than the number entered by the
user. (!!IMPORTANT: a main function MUST be used for this program – the main function MUST call the display
larger function, passing the list and input value as arguments to determine and display numbers larger than the
number input by the user)
The program that will ask the user to input how many numbers are in a list is given below.
How to explain the programLst is the original empty list
# number of elements as input
n = int(input("How many numbers will be added to original list : "))
# iterating till the range
for i in range(0, n):
ele = int(input())
lst.append(ele) # adding the element
n1 = int(input("Enter a number Between 0 and "+str(n)+":")) // enter smaller number elememts
print("The list number smaller than "+str(n1)+" are :")
print(lst[0:n1])
Learn more about program on
https://brainly.com/question/26642771
#SPJ1
what does the record of a spreadsheet run
The record in a spreadsheet refers to a row of data that contains information about a specific entity or item within the spreadsheet. It represents a single entry or observation in the dataset being managed. Each record typically consists of multiple fields or columns that hold different attributes or properties related to the entity being represented.
In a spreadsheet, records are organized vertically in a tabular format, with each record occupying a separate row. The fields within a record are aligned horizontally across the columns of the spreadsheet. For example, if you are managing a sales spreadsheet, each record may represent a specific sales transaction and the corresponding fields could include information such as the date, customer name, product sold, quantity, price, and total amount.
The record of a spreadsheet is essential for organizing and managing data effectively. It allows you to store and track individual units of information in a structured manner. With records, you can easily locate and reference specific data points, perform calculations, analyze patterns, and generate reports.
Moreover, the records in a spreadsheet are highly flexible and dynamic. You can add new records as new data becomes available, modify existing records to update information, or delete records that are no longer relevant. This flexibility enables you to maintain an up-to-date and accurate dataset.
The record of a spreadsheet is crucial for performing various data manipulation tasks, such as filtering, sorting, and performing calculations. By working with records, you can extract specific subsets of data based on certain criteria, sort records based on different fields, and perform calculations or analysis on selected records.
In summary, the record of a spreadsheet represents a single entry or observation in a dataset. It consists of multiple fields that hold specific attributes or properties related to the entity being represented. Records are essential for organizing, managing, and analyzing data within a spreadsheet, allowing for effective data manipulation and analysis.
for more questions on spreadsheet
https://brainly.com/question/26919847
#SPJ11
which of the following best describes compounds.
A. They can only be separated chemically
b. they are always liquid at room temperature
c. they contain the atoms of just one element
d. they have the same properties as their elements
Answer:
A.
Explanation:
What will be the different if the syringes and tube are filled with air instead of water?Explain your answer
Answer:
If the syringes and tubes are filled with air instead of water, the difference would be mainly due to the difference in the properties of air and water. Air is a compressible gas, while water is an incompressible liquid. This would result in a different behavior of the fluid when being pushed through the system.
When the syringe plunger is pushed to force air through the tube, the air molecules will begin to compress, decreasing the distance between them. This will cause an increase in pressure within the tube that can be measured using the pressure gauge. However, this pressure will not remain constant as the air continues to compress, making the measured pressure unreliable.
On the other hand, when the syringe plunger is pushed to force water through the tube, the water molecules will not compress. Therefore, the increase in pressure within the tube will be directly proportional to the force applied to the syringe plunger, resulting in an accurate measurement of pressure.
In summary, if the syringes and tube are filled with air instead of water, the difference would be that the measured pressure would not be reliable due to the compressibility of air.
A LAN is a: O processing control unit network of computer systems that share the use of software and hardware
O type of modem O word processing software system O graphic design system
A LAN is a: B. network of computer systems that share the use of software and hardware.
What is a hardware?In Computer technology, a hardware can be defined as a physical component of an information technology (IT) or computer system that can be seen and touched such as the following;
Central processing unit (CPU)KeyboardMonitorSwitchMouseRouterWhat is a LAN?In Computer networking, a LAN is an abbreviation for local area network and it can be defined as a group of personal computers (PCs), smartphones, printers, or terminals that are located within the same area and are connected by a common network cable or communication circuit.
In conclusion, a local area network (LAN) is composed of computer systems that make use of both software and hardware.
Read more on hardware here: brainly.com/question/959479
#SPJ1
What is software and explain the five types of software
Question: What is software and explain the five types of software
Explanation: The system software which is controlled and managed by the use of set of instructions and programs is called software.
Ex: Windows 7/8/10/xp etc...
the types of software are'
system software and application software
Android.
CentOS.
iOS.
Linux.
Mac OS.
MS Windows.
Ubuntu.
Unix.
Answer:
What is system software and explain its types?
System Software
A system software aids the user and the hardware to function and interact with each other. Basically, it is a software to manage computer hardware behavior so as to provide basic functionalities that are required by the user.
WHICH OF THE FOLLOWING IS A CLASSICAL ALGORITHM APPLIED TO MEDERN CRYPTOGRAPHY
A: LINEAR SEARCH
B: PSEUDORANDOM NUMBER GENERATOR
C: BINARY SORT
D: MODULAR ARITHMETIC
The option of the CLASSICAL ALGORITHM that is known to apply to modern CRYPTOGRAPHY is known to be called option B: PSEUDORANDOM NUMBER GENERATOR.
What is a pseudo random generator in cryptography?In regard to the theoretical computer science and cryptography, a pseudorandom generator (PRG) is known to be used for a class of statistical tests.
It is said to be one that is known to be a kind of a deterministic method that is often used in the mapping if a random seed so that it can be able to be a longer type of pseudorandom string.
It is one where there is no need for statistical test in the class that can be used to tell the difference between the output of the generator as well as that of the uniform.
Therefore, The option of the CLASSICAL ALGORITHM that is known to apply to modern CRYPTOGRAPHY is known to be called option B: PSEUDORANDOM NUMBER GENERATOR.
Learn more about CRYPTOGRAPHY from
https://brainly.com/question/88001
#SPJ1
Explain expansion bus
Answer:
okay here
Explanation:
An expansion bus is an assortment of wires that allows for computer expansion with the use of an expansion board, a printed circuit board inserted into an expansion slot on the motherboard or backplane that provides additional features to a computer system.
The expansion bus is a collection of cables that facilitates the growth of a computer system by operating an expansion board, or by using a backplane, which facilitates the evolution of a computer system. In addition, the computer system will also be provided with additional features.
Hope this helps :)
digital crate to miss meat
Im sorry, this makes no sense. i think it is supposed to be an analogy, but i would need more info or background about the question
Answer:
Wait......What is the question or why did u put that??? I am so confused rn. lol
Explanation:
What are the core steps to add revisions or features to a project?(1 point)
Responses
Evaluate feasibility of the goals, create a list of functionality requirements, and develop the requirements of the feature.
Evaluate feasibility of the goals, develop programming solutions, and evaluate how well the solutions address the goals.
understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature.
Communicate with the client, create a sprint backlog, develop the project, and evaluate how well the solution fits the requirements.
The core steps to add revisions or features to a project are ""Understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature." (Option C)
How is this so?
The core steps to add revisions or features to a project include understanding the goals,evaluating the impact on the project, creating a list of functionality requirements,and developing the requirements of the feature.
These steps ensure that the goals are clear, the impact is assessed, and the necessary functionality is identified and implemented effectively.
Learn more about project management at:
https://brainly.com/question/16927451
#SPJ1
What additional uses of technology can u see in the workplace
Answer:
Here are some additional uses of technology in the workplace:
Virtual reality (VR) and augmented reality (AR) can be used for training, simulation, and collaboration. For example, VR can be used to train employees on how to operate machinery or to simulate a customer service interaction. AR can be used to provide employees with real-time information or to collaborate with colleagues on a project.Artificial intelligence (AI) can be used for a variety of tasks, such as customer service, data analysis, and fraud detection. For example, AI can be used to answer customer questions, identify trends in data, or detect fraudulent activity.Machine learning can be used to improve the accuracy of predictions and decisions. For example, machine learning can be used to predict customer churn, optimize marketing campaigns, or improve product recommendations.Blockchain can be used to create secure and transparent records of transactions. For example, blockchain can be used to track the provenance of goods, to manage supply chains, or to record financial transactions.The Internet of Things (IoT) can be used to connect devices and collect data. For example, IoT can be used to monitor equipment, track assets, or collect data about customer behavior.These are just a few of the many ways that technology can be used in the workplace. As technology continues to evolve, we can expect to see even more innovative and creative uses of technology in the workplace.
Juan is a network administrator and must set up a VPN for his company's network. To allow safe communication, he should
select Control Panel, then Network Protocols, then Internet
select the radio button, then change the adapter settings protocol
select the Security tab, then PPTP, and then Allow Protocols
select Set Up a Public Connection, then Disable Protocols
Answer:
select Control Panel, then Network Protocols, then Internet
Explanation:
Seeing as Juan is a network admin, he has access to the programs of the computer. Being tasked with setting up a VPN, he must go to the control panel, then network protocols (to see the network rules, per say), then the internet tab to finally set up the VPN.
To allow safe communication, Juan must select control panel then, network protocols, and then internet. Therefore, option A is correct.
What is VPN ?You can interact secretly and securely within your corporation using a virtual private network (VPN), which is an extension of a company's intranet over the preexisting structure of either a public or private network.
The i5/OS operating system is utilised by both businesses, and a VPN connection can give them the protection they require to communicate between their respective networks. Compared to using conventional non-switched lines, creating a VPN is more cost-effective.
To allow a safe communication, the network operator should allow the internet protocol to interpret and which can be activated from the control panel. Hence, option A is correct.
Find more on VPN:
https://brainly.com/question/29432190
#SPJ3
Explain the importance of internal and external communication when managing a cyber-attack.
When managing a cyber-attack, effective communication is crucial for mitigating the attack's impact and minimizing damage to the organization's reputation and operations. Both internal and external communication plays a significant role in managing a cyber-attack, and their importance can be explained as follows:
Internal Communication: Internal communication is vital for ensuring that everyone in the organization is aware of the cyber-attack, its impact, and their roles and responsibilities in managing the incident. Some key aspects of internal communication during a cyber-attack include:
Rapid communication: The internal communication channels should be well-established and tested regularly, to ensure that information can be disseminated quickly and accurately in the event of an attack.
Coordination: Internal communication helps to ensure that different teams and stakeholders are working together effectively to respond to the attack. For example, the IT team may need to work closely with the legal team to address any legal implications of the attack.
Empowerment: Clear and effective internal communication can help to empower employees to take the necessary actions to protect the organization's systems and data. For example, employees may need to be instructed to change their passwords or avoid opening suspicious emails.
External Communication: External communication is equally important, as it helps to maintain trust and transparency with stakeholders outside of the organization. Some key aspects of external communication during a cyber-attack include:
Crisis management: External communication helps to manage the crisis by communicating with stakeholders such as customers, partners, regulators, and the media. It's essential to be transparent about the attack and provide regular updates on the organization's response.
Reputation management: The organization's reputation may be at risk during a cyber-attack, and external communication can help to mitigate this risk. For example, prompt communication can demonstrate that the organization is taking the attack seriously and working to protect its customers and partners.
Legal compliance: External communication may be required by law or regulatory bodies. Failure to communicate promptly and effectively can result in legal and financial penalties.
In summary, effective communication, both internal and external, is essential for managing a cyber-attack. It helps to coordinate the response, empower employees, manage the crisis, maintain the organization's reputation, and comply with legal and regulatory requirements.
Need help with Exercise 6
The program based on the question requirements are given below:
The Programimport java.io.File;
import java.io.IOException;
import java.util.Scanner;
public class EncryptText {
// read file and return all content as a String
public static String readFile(String filename) throws IOException {
Scanner scanner = new Scanner(new File(filename));
String content = "";
while(scanner.hasNextLine()){
content += scanner.nextLine();
}
return content;
}
// fills entire grid with stars "*"
public static void initializeGrid(char [][] grid, int m, int n) {
for(int i = 0; i<m; i++)
for(int j = 0; j<n; j++)
grid[i][j] = '*';
}
// does the encryption
public static void fillGrid(char [][] grid, int m, int n, String filename) throws IOException {
// read file
String text = readFile(filename);
// fill entire grid with stars
initializeGrid(grid, m, n);
// i = row, j = column, for grid
int i = 0, j = 0;
// picks a char c from file text and populates the grid
for(int k=0; k<text.length(); k++) {
char c = text.charAt(k);
// even row - fill left to right
if(i % 2 == 0) {
grid[i][j] = c;
j++;
}
// odd row - fill right to left
else {
grid[i][n-j-1] = c;
j++;
}
// if end of column, go to next row and restart column
if(j == n) {
i++;
j = 0;
}
// if end of rows, stop populating grid
if(i == m) {
break;
}
}
}
// extract chars in column-major order
public static void displayGrid(char [][] grid, int m, int n) {
for(int j = 0; j<n; j++) { // cols
for(int i = 0; i<m; i++) // rows
System.out.print(grid[i][j]);
}
}
// start
public static void main(String[] args) throws IOException {
String filename = "input.in";
// define grid dimensions, m = rows, n = cols
int m = 4, n = 8;
// define the grid
char grid[][] = new char[m][n];
// call the function to fill grid
fillGrid(grid, m, n, filename);
// show encrypted text
displayGrid(grid, m, n);
}
}
Read more about programs here:
https://brainly.com/question/23275071
#SPJ1
12.2 question 3 please help
Instructions
Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in the dictionary dcn stored with a key of key1 and swap it with the value stored with a key of key2. For example, the following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
swap_values(positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria'}
Answer:
def swap_values(dcn, key1, key2):
temp = dcn[key1] # store the value of key1 temporarily
dcn[key1] = dcn[key2] # set the value of key1 to the value of key2
dcn[key2] = temp # set the value of key2 to the temporary value
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
print("Initial dictionary: ")
print(positions)
swap_values(positions, "C", "PF")
print("Modified dictionary: ")
print(positions)
Explanation:
What help in executing commands quickly
Answer:99
Explanation: Last summer, my family and I took a trip to Jamaica. My favorite part of the trip was when we went to a place called the Luminous Lagoon. We ate dinner and waited for the sun to go down. Then we boarded a boat and went out into the lagoon. That’s when the magic started.
At first we could not see very much in the darkness except for the stars in the sky. After a few minutes, however, I noticed some fish swimming in the water. They didn’t look like ordinary fish. These fish were glowing! Our guide explained that the glow came from tiny creatures in the water called dinoflagellates. These little animals are not visible to us, but their bodies produce light using something called bioluminescence, just like fireflies. There are so many of these creatures in Luminous Lagoon that the water around them seems to glow.
After our guide explained these facts to us, he told us to put our hands in the water. I was not sure if it would work, but I tried it. When I did, my hand looked like it belonged to a superhero! It was glowing bright blue. I hope someday I get to return to the Luminous Lagoon. The lights in the water were much more entertaining than the ones in the sky.
Problem:
audio
The Greek prefix dinos- means “whirling” and the Latin root word flagellum means “whip”. What does dinoflagellate most likely mean as it is used in the passage?
audio
the production of light from an organism’s body
audio
the study of creatures that live in the ocean
audio
to move around underwater water like a fish
audio
an organism with a whip-like part it uses to move around in the water
2.) Using Constants and Variables to create a Program (10 points)
You are going to write out a program below that will help calculate the total amount of money made per
week, based on a 5 day work week and making $8 per hour.
You will need to create (2) Constant variables
You will need to create (3) variables
Using Constants and Variables to create a Program is given below.
How to create the program# Establish constant values
DAYS_PER_WEEK = 5
HOURLY_WAGE = 8
# Introduce changeable parameters
hours_worked = 0
daily_earnings = 0
total_earnings = 0
# Ask user regarding hours labored each day
for day in range(1, DAYS_PER_WEEK + 1):
hours_worked = int(input(f"How many hours did you work on day {day}? "))
daily_earnings = hours_worked * HOURLY_WAGE
total_earnings += daily_earnings
# Display aggregate income for the week
print(f"You made a total of ${total_earnings} this week.")
Learn more about program on
https://brainly.com/question/26642771
#SPJ1
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?
Answer:
Redundant networks are generally more reliable.
Explanation:
The complete question is in this brainly link;
https://brainly.com/question/18302186
This is based on knowing the importance of a redundant network.
C. Redundant networks are more reliable
A redundant network is one that helps to increase the reliability of a computer system. Now, this is possible because the more critical the ISP NETWORK is, the more important it will be for the time it takes to resolve from a fault would be reduced. This implies that, by adding one redundant device to their connection, the time it will take to resolve from a fault would be drastically reduced and this will lead to a far more reliable system.Thus, redundant networks are more reliable.
Read more at; brainly.com/question/17878589
Explain how I can clear my site suggestions in the chrome app
Open the Chrome browser on your Android device, pick "Bookmarks" from the menu by pressing the "Menu" button. Tap and hold the bookmark you want to delete once the list of bookmark thumbnails shows.
What are site suggestions?As users enter keywords in a search field, suggested queries show up in a menu. As users write each letter of their search, a list of suggestions that display below the search box are updated.
On your Android device, launch the Chrome browser, then select "Bookmarks" from the menu by clicking the "Menu" icon.
Once the list of bookmark thumbnails appears, tap and hold the bookmark you want to delete.
Open Chrome on your iPhone or iPad to disable link previews.Click on More Settings.Look for and select Content Settings.Disable Show Link Previews.
Thus, this way, one can clear site suggestions in the chrome app.
For more details regarding server, visit:
https://brainly.com/question/30168195
#SPJ1
Assign a pointer to any instance of searchChar in personName to searchResult #include iostream» 2 #include 3 using namespace std; 4 5 int main() 6 har personName [190]"Albert Johnson" 7 char searchChar 1 test passed All tests passed char* searchResult nulipt r; 10 searchChar-J'; IYour solution goes here 12 13 if (sea rc h Result coutくく"character ! nullptr) { found." くく endl; 15 16 else 17 18 19 20 return 0; 21 cout << "Character not found." << endl; Run
Answer:
Following are the code to the given question:
#include <iostream>//header file
#include <cstring>//header file
using namespace std;
int main() //main method
{
char personName[100] = "Albert Johnson";//defining a char array
char searchChar;//defining char variable
char *searchResult = nullptr;//use pointer type char variable to holding value as nullptr
searchChar = 'J';//holding char value
char *ptr = personName;//using pointer type char variable that holds a value
while (*ptr) //defining while loop that checks *ptr value
{
if (*ptr == searchChar) //use if that check *ptr value is equal to searchChar
{
searchResult = ptr;//holding ptr value in searchResult
}
ptr++;//incrementing ptr value
}
if (searchResult != nullptr) //use if that checks searchResult value not equal to nullptr
{
cout << "Character found." << endl;//print message
}
else //else block
{
cout << "Character not found." << endl;//print message
}
return 0;
}
Output:
Character found.
Explanation:
In this code inside the main method, a char array is declared that holds values.
In the next step, some char variable and pointer type char variable are declared that holds values.
Inside the while loop, the pointer variable is used, and in the if the block it checks its value and holds its values.
Outside the loop, it checks searchResult value not equal to nullptr and prints the value as per the given condition.
Answer:
deez lOL LOLOLOLOL
Explanation:
Complete the sentences describing a computer innovation.
Software and technology that allow people to work together on a task are known as ____?
Answer:
Collaboration
Answer:
Software and technology that allow people to work together on a task are known as collaboration tools
Explanation:
A mid-sized company's IT security engineer is attempting to make it more difficult for their wireless network to be compromised. She is using techniques such as using a random challenge-response dialogue for authentication, timestamps on authentication exchanges, and one-time pad or session-based encryption. What form of wireless attacks is she defending against
The form of wireless attacks is she defending against is Hijack .
Hijack attack on a system?Cyber hijacking is a term that is also called computer hijacking. This is known to be a type of network security attack where the attacker often have full control of computer systems, software programs and others.
Due to the attack, the company or firm cannot have control over their system and as such the engineer in the above firm is defending against is Hijack.
The options are below
What form of wireless attack is she defending against?
Eavesdropping Insertion Hijack ReplayLearn more about Hijack from
https://brainly.com/question/23294592