read the slides ; Table Properties are the way the table appears or looks.
If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only community, what kind of software would this be?
Answer:
Explanation:
crm
A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would best meet the architects objectives
a. trusted platform module
b. IaaS
c. HSMaaS
d. PaaS
Answer:
a. trusted platform module
i thinks it will help you
Explanation:
what is wardrobe in french
Answer:
garde - grobe
Explanation:
that's all
Match the Tools with the name of the tool.
Toolbar Options
Question 1 options:
Increase Indent
Line Spacing
Decrease Indent
Justify Text
Bullet Points
Center Text
1
2
3
4.
5
6
Answer:
1. Center Text
2. Justify Text
3. Bullet Points
4. Decrease Indent
5. Increase Indent
6. Line Spacing
Hope this helps:)
Lewis wrote an informational academic paper about deer. He rereads his work and is starting to revise for academic voice.
Which sentence needs to be revised for an academic voice?
The buck, or male deer, is a noble animal that has great speed.
Deer enjoy corn, but they get most of their nutrition from grass.
Some people think they can tame deer, but I just don’t buy it.
Deer tend to be extremely nervous and dash away when startled.
Answer: C. Some people think they can tame deer, but I just don’t buy it.
Answer:
The answer is C
Explanation:
Hope this helped! :)
three types of keys on the keyboard
Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state). The analyst wants to combine the two columns into a single column named location, with the city and state separated by a comma. What code chunk lets the analyst create the location column
The programing language, R has a unite unite function in the tidyr package. Hence, the code chunk which let's the analyst create the location column is; unite (stores, "location”, city, state, sep=",")
The syntax for the unite function is ; unite(data,col,..., sep)data = dataframe from which data is to be extracted `; stores col = name of the new column ;" location"... = dataframes to be merged ; city, statesep = seperator ; ","Hence, the required syntax goes thus :
unite (stores, "location”, city, state, sep=",")Learn more : https://brainly.com/question/25534959
True or False. A range has an address called a range address.
True
False
Answer:
im not sure so i apoligize, but i think its true
Explanation:
Select the correct answer.
Eva wants to convert a Lisp file into machine code by interpreting only a single line of code at a time. Which of these can help Eva with her work?
A.
interpreters
B.
output device
C.
compiler
D.
memory
E.
operating system
The program which would help Eva convert a Lisp file into machine code by interpreting only a single line of code at a time is: A. interpreters
Interpreters can be defined as computer software programs that are designed to translate (interpret) a programming language (code) into machine code, especially by interpreting only a single line of code at a time.
Hence, an interpreter executes the instructions that are written in a programming language (code) one after the other (instruction by instruction), before it translate (interpret) the next line of code.
On the other hand, a compiler takes the entire program (code) and interprets them.
In conclusion, an interpreter can help Eva convert a Lisp file into machine code by interpreting only a single line of code at a time.
Rea d more: https://brainly.com/question/21130620
calculate the speed when given the amount of 1TB to be transfer in 5hrs.
Answer:
Data transfer rate is the speed that a certain amount of data is transferred over a given period of time. You might want to know the transfer rate if you’re downloading something online or transferring data from one source to another. First, convert your units so the file size and transfer speed are in either bits or bytes with the same prefix (kilo, mega, giga, or tera). Then, plug your numbers into the equation S = A ÷ T in which A is the amount of data and T is the transfer time to solve for S, the speed, or rate, of transfer. You can also determine the amount of data or the transfer time if you know one of the variables plus the speed of transfer.
Explanation:
In many businesses, it is common to have a key card style access control to get in and out of the building or into other sections of the building. What major benefit does this type of centralized access control system offer that simple locks and keys cannot
Answer:
identification of who is entering the building
Explanation:
The key benefit of centralized access control system that simple locks and keys cannot offer is to:
Maintain Security of your Sites. Identify people entering or going out of firm.What major benefit does a centralized access control system have?The key benefit over key style is:
Maintain Security of your Sites.Note that is said to be the highest benefit of a building access system as it is aim to properly aid or secure a remote sites.
The key benefit of centralized access control system that simple locks and keys cannot offer is to:
Maintain Security of your Sites. Identify people entering or going out of firm.Learn more about key card style from
https://brainly.com/question/25533998
#SPJ6
Technician A says that a DPDT switch is equivalent to two SPST sets. Technician B says that
the circuit diagram of a DPDT switch is the same as an SPST switch. Who is correct?
Select one:
O a. Technician A only
O b. Technician B only
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B
Answer:
Socratic app
Explanation:
it will help you
Steve Jobs
Born
Feburary 24, 1955
Death
October 5, 20122
Steven Paul Jobs was an American inventor, designer and entrepreneur who was the co-founder, chief executive and chairman of
Apple Computer.
Apple's revolutionary products, which include the
In 1976, when Jobs was just 21, he and Wozniak started Apple Computer in the Jobs’ family garage. They funded their entrepreneurial
venture by Jobs selling his Volkswagen bus and Wozniak selling his beloved scientific calculator. Jobs and Wozniak are credited with
revolutionizing the computer industry with Apple by democratizing the technology and making machines smaller, cheaper, intuitive and
accessible to everyday consumers.
Wozniak conceived of a series of user-friendly personal computers, and — with Jobs in charge of marketing — Apple initially marketed
the computers for $666.66 each. The Apple I earned the corporation around $774,000. Three years after the release of Apple's second
model, the Apple II, the company's sales increased by 700 percent to $139 million.
In 1980, Apple Computer became a publicly-traded company, with a market value of $1.2 billion by the end of its very first day of
trading. Jobs looked to marketing expert John Sculley of Pepsi-Cola to take over the role of CEO for Apple.
The next several products from Apple suffered significant design flaws, however, resulting in recalls and consumer disappointment.
IBM suddenly surpassed Apple in sales, and Apple had to compete with an IBM/PC-dominated business world.
In 1984, Apple released the Macintosh, marketing the computer as a piece of a counterculture lifestyle: romantic, youthful,
creative. But despite positive sales and performance superior to IBM's PCs, the Macintosh was still not IBM-compatible.
Sculley believed Jobs was hurting Apple, and the company's executives began to phase him out. Not actually having had an
official title with the company he co-founded, Jobs was pushed into a more marginalized position and thus left Apple in 1985.
Answer:
what Is your question it is not clearly stated
Microcomputer hardware consists of three basic categories of physical equipment _____a. System unit, Input/output, Memory b. System unit, input/output, secondary c. Keyboard, monitor, hard_drive d. System unit, primary storage, secondary storage.
Answer:
c
Explanation:
Hope it helps!!
sure po ako dyaan
Q1. What is animation?
Answer:
The act of animating, or giving life or spirit.
Explanation:
HOPE IT HELPS............Anyone watch anime what's y'all race
While discussing the testing procedures for relays, Technician A says that if a relay does not
click or activate a circuit it is intended to operate, it can be comprehensively tested using a
voltmeter, test light, or ohmmeter. Technician B says that electronic relay testers do not
require a voltage source. Who is correct?
Select one:
O a. Technician A only
O b. Technician B only
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B
Answer:
Socratic app
Explanation:
it will help you
1. Give one reason why data is represented in binary in a computer [1]
2. How many bits in a byte? [1]
3. How many bytes are there in a MB? Include your working.
Answer:
1) Computers use voltages and since voltages changes often, no specific voltage is set for each number in the decimal system. For this reason, binary is measured as a two-state system i.e. on or off. Also, to keep calculations simple and convert into binary online, computers use the binary number system
2) 8 bits
3) 1000000 bytes
To classify wireless networks by coverage, which of the following are wireless networks?
A- WPAN
B-WLAN
C- WMAN
D- WWAN
Answer:
B -WLAN
Explanation:
Use the edit icon to pin, add or delete clips.
The input nums is supposed to be an array of unique integers ranging from 1 to nums.length (inclusive). However, there is a mistake: one of the numbers in the array is duplicated, which means another number is missing. Find and return the sum of the duplicated number and the missing number. Example: in the array [4, 3, 3, 1], 3 is present twice and 2 is missing, so 3 2
The program is an illustration of loops.
Loops are used to perform repetitive and iterative operations.
The program in Python where comments are used to explain each line is as follows:
#This intializes the list
nums = [5,4,4,2,1]
#This gets the length of the list
size = len(nums)
#This iterates through the list
for i in range(size):
#The following if condition determines the repeating number
if nums[abs(nums[i])-1] > 0:
nums[abs(nums[i])-1] = -nums[abs(nums[i])-1]
else:
repeating = abs(nums[i])
#The following if condition determines the missing number
if nums[i]>0:
missing = i + 1
#This calculates and prints the sum of the missing and the repeating numbers
print(repeating+missing)
Read more about similar programs at:
https://brainly.com/question/13549861
Detail for the configuration of your laptop and your phone
Answer:
What do u mean?
Explanation:explanation is...
by what order of magnitude is something that runs in nanoseconds faster than what runs in milliseconds
What position should you hand be on the steering wheel? yuyuyhj
Answer:
9 and 3
Explanation:
its the right way and njcs wdhiqgua wdiu posef
i will send you money
Answer:
..................................................................................................................................................
Explanation:
TRUE OR FALSE:
To make an object "active", you click on the picture,
image, or object and it shows the bounding box.
Answer:
True
Explanation:
I just know the answer because I'm a genius hehe
Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's managerial role of enforcing these functions
Answer:
Coordinating, monitoring, and allocating database administration resources
Explanation:
people and data. Defining goals and formulating strategic plans for the database administration function.
Separate database servers and web servers.
Use web application and database firewalls.
Secure database user access.
Regularly update your operating system and patches.
Audit and continuously monitor database activity.
Test your database security.
Encrypt data and backups.
The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.
Software installation and Maintenance.
Data Extraction, Transformation, and Loading.
Specialized Data Handling.
Database Backup and Recovery.
Security.
Authentication.
Capacity Planning.
Performance Monitoring.
Freeze column A and rows 1 through 3 in the worksheet
The question tells us that we are dealing with an Excel Worksheet task.
The most popular workbooks are:
"MS Excel" and "G-Sheets"The purposes of this question we will consider both.
Columns in either of the two types of worksheets mentioned above refer to the Vertical Grids which run through the sheets.
Rows on the other hand refer to the Horizontal Grids which run through the sheets. Both Columns and Rows comprise Cells.
Freezing in this sense refers to the act of ensuring that regardless of which direction the worksheet is scrolled, the frozen parts remain visible on the screen.
How to Freeze Column A and Rows 1 to 3
In "MS Excel":
Open Microsoft Excel Click on Blank WorkbookClick on Cell B4 to highlight itOn the ribbon above, click on view to display its sub-functionsselect Freeze PanesThis action will freeze the entire column A as well as Row 1 to 3. To increase the number of rows from 1-3 to 1 to 5 for instance, you'd need to return to the View Function, Unfreeze the Panes, select Cell B6 then select Freeze Panes.
In "G-Sheets"
Ensure that your computer is online, that is, connected to the internetOpen "G-Sheets"Place your mouse cursor on cell B3 and click to highlight itWith your click on View in the ribbon above. This will display the Freeze function in "G-Sheets" along with its subfunctionsSelect the "Freeze + Up to row 3". This action will freeze Rows 1 to 3.Next, click anywhere in Column ACarry out step 4 above and select "Freeze + Up to column A"For more about Freezing Work Sheets click the link below:
https://brainly.com/question/17194167
Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system
Answer:
he various advantages that can be associated with a password generator software are as follows: Any arbitrary long password can be generated using the complete set of symbols and not just a subset (usually the subset which is easier to type on a key
Explanation:
GameStop’s best Black Friday deals: games, accessories, and more
11/25/2021 7:00 PM EST
Answer:
what is the question or are you just spreading news
Explanation:
Do you trust machine learning application?
Answer:
Trusting a machine learning model, in general, can be interpreted as creating a robust model which gives largely accurate results and has a high generalization ability. Classification models learn from past experience, so the robustness of a model primarily depends on the given training set
Explanation:
Hope it helps
Please mark as brainliest