Answer:
to evaluate how to move from the current status to the desired goal
Define cloud, and explain the three key terms in your definition. Compare and contrast cloud-based and in-house hosting using the comparison presented in Q6-1 as a guide. In your opinion, explain the three most important factors that make cloud-based hosting preferable to in-house hosting.
Cloud computing is making hardware, software and data available on demand via a network.
The cloud stands for a network that, with all the computers connected to it, forms a kind of 'cloud of computers', where the end user does not know how many or which computer the software runs on or where those computers stand exactly.
In this way, the user no longer needs to be the owner of the hardware and software used and is therefore not responsible for maintenance. The details of the information technology infrastructure are hidden from view and the user has his own virtual infrastructure, scalable in size and possibilities.
Learn more in https://brainly.com/question/8645052
9. Organs are made up of vast numbers of cells that perform various tasks. When cells die within an organ,
homeostasis is interrupted. What will most likely happen so that homeostasis can be maintained?
Answer: A new cell grows
Explanation:
To what extent do you agree with the assertion that “Collection development begins with community analysis”. (Give reasons to buttress your answer).
I completely agree that Collection development begins with community analysis; this is because the goal of collection development is to meet the information needs of everybody in a user community.
Collection development is a term used to describe the gathering and maintenance of library materials and resources such as textbooks, audiovisuals, and electronic materials for the community users to assess.
Collection development involves many processes, but it is better to begin with community analysis to know what type of resources, information, or materials is needed in that community.
It is from the community analysis and conclusion reached; other steps can then be followed sequentially.
Also, note that through community analysis, one can determine the present users of the library and their major interests.
Hence, in this case, it is concluded that community analysis is vital in the collection development in library and information management.
Learn more here: https://brainly.com/question/24837376
2p + 1 = -1
please help
Answer:
this is the start of the equation
Explanation:
2p + 1 = -1
-2 -2
Answer:
I think its -1
Explanation:
2p+1=-1
2p+1-1=-1-1 minus one from each side
2p=-2 divide both sides by 2
2p/2=-2/2
p=-1
What is the relationship between the speed of an object in the amount of energy it has? explain
If known vulnerabilities in software are entry points for an attacker, why are the software vulnerabilities not corrected before the software is released?
Answer:
we dont knoqw
Explanation:
The developer hasn't had enough time to address them, these flaws are referred to as "zero days." is the software vulnerabilities not corrected before the software is released.
What is software?Software is a set of instructions, information, or computer programs that are used to operate equipment and perform certain tasks. Hardware, which is a term for a computer's external components, is the opposite of it. In this usage, "software" refers to the running scripts, programs, and apps on a device.
The procedures and software that make it possible for a computer or other electrical equipment to operate are referred to as software. Examples of the processes and programs that make up a computer system are Excel, Windows, and iTunes.
System software consists of the programs and processes required to run the computer. System software, utility software, and application software are the three subcategories of software.
Thus, The developer hasn't had enough time to address them.
For more information about software, click here:
https://brainly.com/question/985406
#SPJ2
1.(154)10=(?)2
help me! I will give 25 points.
Write a program in c++ to input a number print the sum of all the odd factors.
Answer:
#include <bits/stdc++.h>
using namespace std;
//calculate sum of odd factors
int sum(int n) {
int res = 1;
while (n % 2 == 0)
n = n/ 2;
for (int i = 3; i <= sqrt(n); i++)
{
int count = 0, total = 1 ;
int temp = 1;
while (n % i == 0) {
count++;
n = n / i;
temp *= i;
total += temp;
}
res = res*total;
}
if (n >= 2)
res *= (1 + n);
return res;
}
int main()
{
int n = 20;
cout<<"sum of odd factors is : ";
cout <<sum(n);
return 0;
}
Name:
Sup-R Game Desktop – Model EEXL
Inteel® Core i7
6GB Tri-Channel DDR3
500GB SATA-II (7200 rpm)
16x CD/DVD burner
21.5” HD widescreen monitor
NVIDIA® GeForce
Creative Sound Blaster® X-Fi Titanium
Altec Lansing speakers
Gigabit Ethernet port
3 – year limited warranty
Windows 10
1. Suppose you are reading a computer magazine and you come across the ad pictured above. By looking at the specs, you can see that: (2 Points)
The amount of RAM is ___________.
The microprocessor manufacturer is __________.
The amount of disk storage is _______________.
The amount of Solid State Drive storage is ______________
2. In the table below, list the hardware/peripheral components in the ad and check which function the component performs. (Add additional rows to the table if needed). (5 Points)
Component
Processor
Memory
Storage
Input
Output
Other
3. In the table below, list 5 functions/features you would look for in purchasing a computer and explain why each is important to you. (3 Points)
Function/Feature
Explanation as to why and size, capacity, etc. you need this feature/function
5. List and describe the factors that affect the performance of a microprocessor. Name two manufacturers of central processing units (CPUs) and some for the different models of processors that they manufacture. (5 points)
6. At the beginning of an update for your smart phone, you notice a warning that says “Make sure your device is connected to a wall outlet and do not turn the device off until the update is complete.” You suspect that the update is going to _______________ the ROM boot loader to fix a security vulnerability. (2 Points)
7. You are working on a group project and you suggest to your team that they use a ______________ storage service where members can access a shared folder. (2 Points)
8. One of the ports on your laptop is rectangular and the inside of it is blue. It is a(n) _________ port. (2 Points)
9. You need an external keyboard for your Android device, and thankfully you can add a wireless one because it has ________________ capability. (2 Points)
10. You volunteer to produce a large quantity of black-and-white leaflets for a charity organization. It is fortunate that you have access to a(n) _____________________ printer with a high duty cycle and low operating costs.
Can someone help me how to do this.
A computer program should receive students' exam details and shows the student exam grade report. The student exam details are the student ID, name, number of semesters in the university and his/her programming subject's exam score (out of 50\%) . The program should display an error message if the exam mark entered is not within the range of 0 to 50%. It calculates the percentage of exam score (out of 100%), set the exam grade and analyse the students' eligibility to join self-improvement program based on the grade and the number semester in the university. The program shall display the student ID, name, exam score over 100%, its letter grade plus the relevant self-improvement program.
The letter grade for exam is determined as follows:
A=90-100\%
B=80-89%
F=0.59\%
Three sets of output screenshots from the program runs
Design and develop the program. Your submission to ULearn must include:
D=60-69\%
The university offers 3 self-improvement programs:
Mighty Musang King
for those who just join the university for 1 semester received F in their exam.
Pseudocode OR Flowchart
2. Python Program in .py format
<for those who has been in the university for 2 semesters received grade C or D for the exam
1. A Pdf file that consists of
for those who has been in the university for 3 semesters received grade A or B for the exam
Fighting Pomelo
C= 70-79\%
Mushy Banana
Answer:
2. is answer to the question
Thiết kế biểu đồ thực thể liên kết và tập lược đồ cơ sở dữ liệu quan hệ cho các bài toán quản lý sau:
Bài toán 1. Bạn cần một cơ sở dữ liệu để quản lý thông tin về các tạp chí. Với mỗi tạp chí bạn cần quản lí tên tạp chí, số ISSN (mã số công bố của tạp chí), số phát hành và năm phát hành. Dữ liệu về các bài báo trong tạp chí bao gồm: tiêu đề bài báo, trang bắt đầu và trang kết thúc của bài báo trong tạp chí (nghĩa là bài báo bắt đầu từ trang nào, và kết thúc ở trang nào trong tạp chí). Giả thiết rằng không có hai bài báo nào có cùng tiêu đề. Mỗi bài báo được viết bởi một vài tác giả. Mỗi tác giả bạn sẽ lưu các thông tin về tên, địa chỉ email và địa chỉ cơ quan.
Answer:
sorry please write in English than i help.you i don't understand your language
The theory of plate tectonics evolved from previous theories and concepts put forward by several scientists before its conception. Which theories and concepts are part of this evolution? I. continental drift III. convection current II. seafloor spreading IV. internal structure of Earth
Answer:
I. Continental drift.
Hope this helps
Advantages of communications
Answer:
promotes team building
creates better relationship
Answer:
➨It is quick in obtaining feedback once delivered. ➨It provides complete understanding of communication delivered and there is chance to make it more clear in case of doubts in interpretation of words or ideas. ➨It is more reliable method of communication. ➨It is flexible and effective for all.
10 sentences about computer parts.
Activity 5: Binary Initial Directions:
Get the binary value of your first name
initial.Maximum of ten letters only....
Character
A B. с D E F. G H I
Decimal
65 66 67 68 69 70 71 72 73
Character N o P Q R S T U V
Decimal 78 79 80 81 82 83 84 85 86
ANSWER:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Answer:
:bombebphynyjnjtj
Explanation:
vqnafhteg
Define a class named Bits that holds a single integer variable. You will use this integer simply as a container of bits. The number of bits you can support depends on the type of integer you use. We will use an unsigned long long, which on most platforms occupies 64 bits.
what is a program or collection of programs that enable a person to manipulate a visual images on a computer
How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?
Answer:
2 MB = 2048 kb
2048 / 60 = 34.1
Explanation:
7. What was the original purpose of the network that would become the internet?
A shopping and commerce
B. social media
C. digitizing books
D. military and academic communication
Answer:
D, Mulitary and Academic communicationj
Explanation: Just did this
how do you identify the active file if more than one has been opened simultaneously and are being displayed on the screen
Explanation:
On the View tab, in the Window group, click New Window.
On the View tab, in the Window group, click View Side by Side .
In the workbook window, click the worksheets that you want to compare.
To scroll both worksheets at the same time, click Synchronous Scrolling in the Window group on the View tab.
Note This option is available only when View Side by Side is turned on.
Tips
If you resize the workbook windows for optimal viewing, you can click Reset Window Position to return to the original settings.
To restore a workbook window to full size, click Maximize at the upper-right corner of the workbook window.
View two worksheets of different workbooks side by side
Open both of the workbooks that contain the worksheets that you want to compare.
On the View tab, in the Window group, click View Side by Side.
where and when to implement such network.
i think it is a
and it is b , so haha
Steps to open ex cel
Answer:
type in goo gle, e x cel, and open
I just need question 2 answered. Someone please help I’m on a test!
Answer:
Principal photography
Explanation:
which is used for making documentation file from microsoft office package
Answer:
the word is use for making docs
Answer:
Explanation:
To create a document, open Word, select a blank document or template, and start typing. Discover professionally designed templates for Microsoft Word.
Write a method named removeDuplicates that accepts as a parameter a List of integers, and modifies it by removing any duplicates. Note that the elements of the list are not in any particular order, so the duplicates might not occur consecutively. You should retain the original relative order of the elements. Use a Set as auxiliary storage to help you solve this problem.
For example, if a list named list stores [4, 0, 2, 9, 4, 7, 2, 0, 0, 9, 6, 6], the call of removeDuplicates(list); should modify it to store [4, 0, 2, 9, 7, 6].
The method is an illustration of loops or iteration.
Loops are used to carry out repetitive operations.
The removeDuplicates method in Python is as follows, where comments are used to explain each line.
#This defines the method
def removeDuplicates(list):
#This initializes the output list
outputList = []
#This iterates through the list
for i in list:
#All elements not in the output list, are appended to the output list
if i not in outputList:
outputList.append(i)
#This returns the output list
return str(outputList)
At the end of the method, the new list contains no duplicates.
Read more about similar program at:
https://brainly.com/question/6692366
three positive impacts of computer technology in our society.
ANSWER :
• It facilities business process and other activities. It makes the work simple and less time consuming.
• We can store so many information on computer which makes easy to handle the information for business applications.
• We can perform multitasking and multiprocessing capabilities of data.
Answer:
We can perform multitasking and multiprocessing capabilities of data. We can store documents secretly on computer system. It gives error free result so that we can use it for research, engineering work and other areas.10. Ari and Caleb are best friends. One morning, Ari sees Caleb in the hallway at school and says hi. Caleb barely looks up, and when Ari asks if something is wrong, Caleb just shrugs. What type of communication is Caleb exhibiting?
A aggressive
Bnonverbal
C interpersonal
D assertive
These steps describe the procedure to delete files from your computer.
Click on the Recycle Bin.
Click on the Delete icon.
Select the file to be deleted.
Select Delete from the File menu.
Answer:
select the file to be deleted
Explanation:
If you wanted to multiply two numbers, you would use the _____ key.
-
*
=
/
what does c++ programming mean?
Answer:
It's an internal joke to say the language is basically C with some extra stuff (like classes)
the "++" is short for
C += 1 or
C = C + 1 which is a common calculation among programmers so they named it C++ to be a more commercial and attractive name than "C with classes"
Explanation: