"Intranets are private corporate networks extended to authorized users outside the organization" is false.
What are the corporate networks extended?Corporate networks vary from the group in that they retain formal relationships with one another through contracts (franchises, concessions, etc.) between both business units rather than through the use of financial linkages.
With an extended network, you are linked to another carrier's tower to receive service because your network does not contain any towers in that region.
Simply switch off Airplane Mode after a short period of time while keeping your smartphone in that mode.
"Intranets are private corporate networks extended to authorized users outside the organization" is false.
More about the corporate network extended link is given below.
https://brainly.com/question/14809186
#SPJ4
What should I watch on Netflix (shows for a 14 year old) ?
Answer:
The flash
Explanation:
Answer:
Im not a big horse fan but loved this show its called free rein
Explanation:
loved itttttt!
Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what are some common skills needed by Accountants? Select four options
mathematics
reading comprehension
equipment maintenance
quality control analysis
active listening
writing
Answer:
I. Mathematics.
II. Reading comprehension
III. Active listening
IV. Writing
Explanation:
O*NET is the short for Occupational Information Network and it is a comprehensive online database that is uniquely designed to provide information about job requirements, staff competencies, work styles, abilities, skills and other resources. Thus, O*NET is the primary source of occupational information for the private and public sector of the United States of America. Also, it helps to identify and develop the work styles, skills, activities and abilities of various occupations of the American workforce.
According to O*NET, some common skills needed by Accountants include the following;
I. Mathematics: an accountant is required to have a good knowledge of different mathematical concepts such as arithmetic, calculus, algebra, statistics, etc., as well as their application to the field of accounting.
II. Reading comprehension: he or she should be able to read and understand the informations contained in all work-related documents.
III. Active listening: accountants are required to pay adequate attention to the informations that are given by the customers without interjections.
IV. Writing: they should be able to compose well-written and clear textual informations about work-related activities.
Answer:
I. Mathematics.
II. Reading comprehension
III. Active listening
IV. Writing
Explanation:
In this class, it is very common for your computer screen to look like this. What is this?
Your aunt owns a store and hired you to analyze the customers. You recorded the estimated ages of customers who shopped in the store and whether they made a purchase. Some of your data values are followed. What types of analysis could you do with this data? Select 4 options.
Answer:
-percentage of customers who made a purchase
-minimum age
-average age
-maximum age
Percentage of customers who made a purchase, minimum age, average age and maximum age are the types of analysis could you do with this data. Hence, option A, B, C and E are correct.
What is data values?A data value is the material that fills the space of a record. For instance, one of the database's numerous data fields might contain a number that indicates the weight of a certain integer.
Data, such as statistics, phone numbers, or inventory counts, are undoubtedly pieces of information that a person would understand as numbers.
Data provides useful information that enhances business decisions. This information is the result of an effective data analytics strategy. Businesses may create a data culture far more easily because of the monetary worth of data.
Thus, option A, B, C and E are correct.
For more information about data values, click here:
https://brainly.com/question/16612044
#SPJ2
A company has a popular gaming platform running on AWS. The application is sensitive to latency because latency can impact the user experience and introduce unfair advantages to some players. The application is deployed in every AWS Region it runs on Amazon EC2 instances that are part of Auto Scaling groups configured behind Application Load Balancers (ALBs) A solutions architect needs to implement a mechanism to monitor the health of the application and redirect traffic to healthy endpoints.
Which solution meets these requirements?
A . Configure an accelerator in AWS Global Accelerator Add a listener for the port that the application listens on. and attach it to a Regional endpoint in each Region Add the ALB as the endpoint
B . Create an Amazon CloudFront distribution and specify the ALB as the origin server. Configure the cache behavior to use origin cache headers Use AWS Lambda functions to optimize the traffic
C . Create an Amazon CloudFront distribution and specify Amazon S3 as the origin server. Configure the cache behavior to use origin cache headers. Use AWS Lambda functions to optimize the traffic
D . Configure an Amazon DynamoDB database to serve as the data store for the application Create a DynamoDB Accelerator (DAX) cluster to act as the in-memory cache for DynamoDB hosting the application data.
What is the output from main (below) after the following function is called. void calculateCost(int count, double& subTotal, double& taxCost) // definition { if ( count < 10) subTotal = count * 0.50; else subTotal = count * 0.20; taxCost = 0.1 * subTotal; } int main() { double tax = 0.0, subTotal = 0.0; calculateCost(15, subTotal, tax); // function call cout << "The cost for 15 items is " << subTotal << ", and the tax for "<< subTotal << " is " << tax << endl; return 0; }
Answer:
Explanation:
You should contact your references _____ a job interview.
only if the interviewer asks for your references
before and after
before
after
Answer:
My research suggests that it is before and after.
You should contact your references before and after a job interview.
What is Interview?A planned interaction in which one party asks questions and the other responds is known as an interview. A one-on-one chat between an interviewer and an interviewee is referred to as a "interview" in everyday speech.
The interviewee answers the interviewer's questions by typically supplying information. Other audiences may utilize or receive that information right away or later.
This characteristic is common to many different types of interviews; even though there may not be any other people present during a job interview or an interview with a witness to an occurrence, the answers will still be given to other people later on in the hiring or investigative process.
Therefore, You should contact your references before and after a job interview.
To learn more about Interview, refer to the link:
https://brainly.com/question/13073622
#SPJ2
Which of the following is not an example of a source of information that contributes to the accumulation of big data
Answer:
Law enforcement officials request the driver's license history for a suspect they recently apprehended.
Explanation:
The option that doesn't cause accumulation of big data is that Law enforcement officials request the driver's license history for a suspect they recently apprehended.
What causes accumulation of data?Data is an information that is processed by a computer and can be stored in the computer for future use or reference purposes.
The quantity of data processed by a computer depends on the volume of the raw data that is collected and prepared before processing takes place.
From the given options;
Law enforcement officials request the driver's license history for a suspect they recently apprehended. This is just the data of a single individual which can not cause big data accumulation.Receivers in cell phones request position information from nearby cell phone towers, and this location information is communicated to cell phone companies. This involves more that one cell phone company therefore can cause accumulation of big data.Search engine providers store all search terms entered by users. This can cause accumulation of data.Hundreds of satellites stationed above the earth capture images of the earth’s surface. This can cause accumulation of data.Therefore data from a single source cannot cause accumulation of big data.
Learn more about data processing here:
https://brainly.com/question/26642156
2ND LAST QUESTION
the purpose of the ___________ element is to group together a set of one or more [h1] element so that theyre treated as a single heading
a. header
b. hgroup
c. h1group
d. group
Answer:
B
Explanation:
BRAINLIEST WILL BE GIVEN
which technique can you use on your pages to improve ratings in search engines
a. on-page
b. search review
c. off-page
d. off-site
Answer:
mine is search review
Explanation:
so u can know if its bad or good rewiev s are very helpfull
The company generates a lot of revenue and is rapidly growing. They're expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you're working.
Answer:
The most appropriate way to deal with the situation presented above is to acquire more space at the current office site at additional rent beforehand.
Explanation:
The Scaling of a revenue-generating business is a crucial task in which a lot of pre-planning and thinking is required.
In order to scale the business in the next year, the planning of it is to be carried out at the moment and proper necessary arrangements are ensured. These steps could be one from:
Looking for bigger spaces for renting for a full shift of the operationsLooking for a site office for an additional officeAcquiring more space in the current office site.This process would result in acquiring a bigger place beforehand but in order to mitigate the risk, try to keep the place in view by providing them a bare minimum advance for the additional units.
2. Which of the following is not one of the guidelines for using instant messaging?A.You can use in place of all face-to-face communication.
B.Keep messages short.
C.Never text or send an instant message when you are angry.
D.Use it for casual conversations.
Answer:
A. You can use in place of all face-to-face communication.
Explanation:
Hope this helps
list the first prime minister of St Vincent and the grenadines
Robert Milton Cato (June 3rd, 1915 - February 10, 1997)
differentiate between tabular and column form layout
In tabular form the data is displayed in a table layout following a continuous series of records. In this almost all the records are displayed in a single layout. While in columnar form the data is displayed one record at a time.
In order to multitask, a computer must have two or more processors. True or False
Answer:
False
Explanation:
:) brainliest pls
Answer:
True
Explanation:
1. What is used to change the appearance of a cell's value based on parameters set by the user?
hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me
Answer:
a pseu code is a is an artificial and informal language that helps programmers develop algorithms.
Explanation:
What is strFirst? def username (strFirst, strLast): return strFirst + strLast[0] answer = username ('Joann', 'Doe') print (answer) strFirst is a A. Parameter B. Return value C. Function
GUYS!
YOU GOTTA HELP ME CAUSE IM FLIPPIN OUT
OK SO EARLIER TODAY MY LAPTOP WASNT WORKING SO MY DAD SAID I COULD USE HIS
I HAD TO LOG INTO MY WORD ACC TO DO WORK
AND IT WOULDNT LET ME IN HIS SO I USED MINE
MY MOM HAS SAFTEY SETTINGS ON MY OUTLOOK ACCS
BUT I DIDNT KNOW IT WOULD LOG INTO EVERYTHING I THOUGHT IT WOULD ONLY LOG INTO WORD
S O O IM TRYING TO LOG OUT OF MY ACC
BECAUSE MY DAD IS VV PARTICULAR ABOUT HIS COMPUTER
HES GONNA BE MAD
SO
MY QUESTION IS
DOES ANYONE KNOW HOW TO LOG OUT OF LIKE MICROSOFT ACCS
Attached is the answer, please look.
One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data transmissions required by the Internet. while it works well for television signals, it is ineffective for data transmissions required by the Internet. none of the available options are true. none of the available options are true. it is incompatible with most modern communication systems. it is incompatible with most modern communication systems. systems used by many providers require customers to share bandwidth with neighbors. systems used by many providers require customers to share bandwidth with neighbors.
Answer:
systems used by many providers require customers to share bandwidth with neighbors
Explanation:
One of the disadvantages of cable technology is that systems used by many providers require customers to share bandwidth with neighbors. This ultimately causes many problems since cables would need to be extended to reach every single user that will be sharing the bandwidth. This would mean cables all over the place. Also, it is very difficult to limit the bandwidth per person, meaning that if anyone is using up all of the bandwidth through the cable, the rest of the individuals connected would not have the bandwidth that they need or are paying for.
Write a program that accepts an integer value called multiplier as user input. Create an array of integers with ARRAY_SIZE elements. This constant has been declared for you in main, and you should leave it in main. Set each array element to the value i*multiplier, where i is the element's index. Next create two functions, called PrintForward() and PrintBackward(), that each accept two parameters: (a) the array to print, (b) the size of the array. The PrintForward() function should print each integer in the array, beginning with index 0. The PrintBackward() function should print the array in reverse order, beginning with the last element in the array and concluding with the element at index 0. (Hint: for help passing an array as a function parameter, see zybooks section 6.23) As output, print the array once forward and once backward.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
void PrintForward(int myarray[], int size){
for(int i = 0; i<size;i++){ cout<<myarray[i]<<" "; }
}
void PrintBackward(int myarray[], int size){
for(int i = size-1; i>=0;i--){ cout<<myarray[i]<<" "; }
}
int main(){
const int ARRAY_SIZE = 12;
int multiplier;
cout<<"Multiplier: ";
cin>>multiplier;
int myarray [ARRAY_SIZE];
for(int i = 0; i<ARRAY_SIZE;i++){ myarray[i] = i * multiplier; }
PrintForward(myarray,ARRAY_SIZE);
PrintBackward(myarray,ARRAY_SIZE);
return 0;}
Explanation:
The PrintForward function begins here
void PrintForward(int myarray[], int size){
This iterates through the array in ascending order and print each array element
for(int i = 0; i<size;i++){ cout<<myarray[i]<<" "; }
}
The PrintBackward function begins here
void PrintBackward(int myarray[], int size){
This iterates through the array in descending order and print each array element
for(int i = size-1; i>=0;i--){ cout<<myarray[i]<<" "; }
}
The main begins here
int main(){
This declares and initializes the array size
const int ARRAY_SIZE = 12;
This declares the multiplier as an integer
int multiplier;
This gets input for the multiplier
cout<<"Multiplier: "; cin>>multiplier;
This declares the array
int myarray [ARRAY_SIZE];
This iterates through the array and populate the array by i * multiplier
for(int i = 0; i<ARRAY_SIZE;i++){ myarray[i] = i * multiplier; }
This calls the PrintForward method
PrintForward(myarray,ARRAY_SIZE);
This calls the PrintBackward method
PrintBackward(myarray,ARRAY_SIZE);
return 0;}
what is the main reason for adding somebody into the BCC list for an email?
Answer:
protecting email address privacy
Explanation:
for securing and privacy reasons and it is for the best
13. Place where names, addresses and email information
is stored
Answer in ur email
Explanation:
Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. B The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. C The message is transmitted as a single file and received in whole by the recipient’s device.
Answer:
A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.
Explanation:
Network packets are used to send data across a network. These can be routed in any order independently of one another as they will all eventually reach their destination device.
Describe an association or rhyming phrase you have used to remember information. Was this a useful technique for you? Why or why not?
Answer:
I used the names George Clooney and Tim Allen to remember the pairs of nitrogenous bases in DNA.
Explanation:
DNA is composed of nucleotides, however the nucleotides are formed by nitrogenous bases called Adenine, Guanine, Cytosine and Thymine. Each nucleotide has a nitrogenous base, but these bases form pairs, allowing the nucleotides to come together. The pairs are formed solely by Timine and Adenine or Guanine and Cytosine.
As I needed to remember the formation of the pairs to do my biology test, I associated the first letter of each base, with the initials of two famous names.
As Guanina is paired with Cytosine (G-C), I associated this pair with the initial letters of the name George Clooney. As Timina is paired with Adenina (T-A), I associated this pair with the initials of the name Tim Allen.
I’ll mark brainliest, thanks
Answer:
if that is a tutorial, than just hit submit, the teacher doesn't see it.
Explanation:
i do online schooling on the same website
\Yeah man, what the last guy said. On that website, teachers can't see tutorials so you can just submit it blank if you want. :)
What do fair use and copyright laws help you understand ?
Explanation:
we can understand about the systematic laws and surely we can be aware of such things also it promotes the correct use of our technology and innovations.
Select the correct answer.
Which principle of animation is prominent in this picture?
A.staging
B.arcs
C.anticipation
D. timing
The principle of animation reflected in the image is the arcs principle.
What is animation?Animation refers to the action of recreating actions and movements by using drawings or models.
What are the principles of animation?Animation is regulated by specific principles, some of them include:Anticipation: Showing the movement or position that anticipates an action.Timing: Making an action fast or slow by using a specific number of frames.Staging: Using specific elements to stage one action and avoiding unnecessary elements.Arcs: Showing the natural movement of a specific action.Based on this, the principle used in the image is the arcs because it emphasizes the natural curve or natural movement of someone playing golf.
Learn more about draw in: https://brainly.com/question/4853831
Answer:
B. arcs
Explanation:
Explain what Fahd did wrong in the scenario below. Fahd is running ten programs at once on his laptop when it suddenly freezes up. To fix this problem, Fahd buys a new battery for his laptop.
Answer:
Well first off. if the laptop froze that doesn't mean the battery is dead to the point where a simple rest of the laptop wouldn't work out.
Enumerate a couple of reasons why it would be impracticable for the external devices to be connected directly to the processor or the system bus
Answer:
(a) Difference in data transfer rates
(b) Difference in word lengths
(c) Different peripherals with different modes of operation
Explanation:
There are several reasons. Some of them have been listed in the explanation section. A brief explanation is as follows
(a) Difference in data transfer rates
Some peripherals have fast transfer rate while some have slow transfer rates compared to the processor they are being connected to. This difference in the rates implies that a high speed system bus will find it difficult to communicate with a (say) low speed peripheral.
(b) Difference in word lengths
Another consideration is the word lengths. Often times, peripherals and the bus they are being connected with will have a different word lengths.
(c) Different peripherals with different modes of operation
In computer architecture, a processor can not be used to interact with peripheral of different mode of operations. In other word, each peripheral have its own mode and will require different means of connection.