Answer:
Archiving data files manages the size of a mailbox for
✔ local
storage.
Creating an Outlook data file
✔ protects
data files in storage on a computer.
Explanation:
Because its right.
Answer:
an increase in cloud computing
Explanation:
Which of the following guidelines about the subject line of e-mail messages is most appropriate?
1: Avoid using a subject line unless the e-mail is very important.
2: Use the subject line wisely to let your reader know the main purpose of the e-mail.
3: Try to keep the subject line very short, such as just one or two words.
4: Make sure you provide all the details in the subject line in case the receiver does not have time to read the whole e-mail.
Answer: 2: Use the subject line wisely to let your reader know the main purpose of the e-mail.
============================================================
Explanation:
The subject line is like the title of a book. You want to give a quick sense of what the email is about, but you also don't want to put the entire contents of the book in the title. The subject line only has so much room. Even less room is available if the reader is checking their email on their mobile device.
Choice 1 is false because subject lines are important. I can't think of a case where you can omit the subject line entirely (ie leave it blank), unless it's a situation where the recipient knows in advance what the topic is about. Though that may be rare.
Choice 3 is false. Yes you want to keep the subject line short, but you also don't want to be cryptic or confusing. If you can get away with using 1 or 2 words, then go ahead and do so. However, you may need more words to convey the topic of the email. Go with what feels right and try to put yourself in the shoes of the person reading your email. Ask yourself "Does this convey the message I want to send?"
Choice 4 is false. As mentioned, you do not want to put the entire email in the subject line. The exception of this rule is that if the email is really really short. For every other case, you should have a fairly short title and then go over the details in the email main body itself.
Answer:
Use the subject line wisely to let your reader know the main purpose of the e-mail.
Explanation:
i got it right on edge 2021
PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
Answer:
I need to have better photos in order to assist you...
Explanation:
I will attempt to get back with you if you can provide more clearer photos.
num1 = float(input("Enter your first number: "))
num2 = float(input("Enter your second number: "))
operation = input("What operation would you like to do? Type: add, subtract, multiply, or divide. ")
def add(n, n1):
return n + n1
def subtract(n, n1):
return n - n1
def multiply(n, n1):
return n*n1
def divide(n, n1):
return n/n1
if operation.lower() in ["add", "+"]:
result = add(num1, num2)
print(num1,"+",num2,"=",result)
elif operation.lower() in ["subtract", "-"]:
result = subtract(num1, num2)
print(num1,"-",num2,"=",result)
elif operation.lower() in ["multiply", "*"]:
result = multiply(num1, num2)
print(num1, "*", num2, "=", result)
elif operation.lower() in ["divide", "/"]:
result = divide(num1, num2)
print(num1, "/", num2, "=", result)
else:
print("Not a valid operation.")
I wrote my code in python 3.8. I hope this helps.
How do you add a space after a line in my terminal workspace?'
Example: I'd like my program to have a line space after
Line 2: "Computer Programming"
blank
Line 3: Author
blank
Line 4: Due Date
Choose all items that represent essential tasks to do after an interview is over.
Send copies of the resume and cover letter.
Construct a career portfolio.
Ask about next steps and the best way to communicate.
Phone each person interviewed.
Send a follow-up email within 24 hours.
Submit the job application.
Answer:
Ask about next steps and the best way to communicate.
Send a follow-up email within 24 hours.
Explanation:
An interview is a well-organized conversation where one participant asks questions, and the other person gives answers to those questions.
Essential tasks that need to be done after an interview is over are as follows:
1. Ask about next steps and the best way to communicate.
2. Send a follow-up email within 24 hours.
Answer:
Ask about next steps and the best way to communicate.
Send a follow-up email within 24 hours.
Logistic Regression is a type of __________ problem.
Answer:
Logistic Regression is used to solve the classification problems, so it’s called as Classification Algorithm that models the probability of output class. It is a classification problem where your target element is categorical
Explanation:
The answer is "classification" because the named the Classification Algorithm.
It was used to solve classification difficulties. You are faced with a categorization situation wherein your goal component is a category.In the presence of more than one dependent variable, it's being used to calculate odds ratios. The binomial dependent variables render this approach similar to multiple linear regression. In the end, each variable's impact on a particular event's odds ratio is calculated.Learn more:
Logistic Regression: brainly.com/question/20363984
Please help ASAP! will mark brianliest! 30 points!
Which popular VPN protocol allows segment access for users?
IPsec
PPTP
L2TP
SSL VPN
Answer:
SSL VPN
Explanation:
Secure Sockets Layer, or SSL VPN, is the second common VPN protocol.
A big plus for SSL VPNs is that they can allow segmented access for users. For example, users can be limited to checking email and accessing shared drives rather than having access to the entire network.
SSL VPNs come in two types, SSL portal and SSL tunnel.
SSL Portal VPNs
SSL Portal VPNs allow a user to securely access the web from a browser once the user logs into the VPN’s online portal using a specified method of authorization.
This type of SSL VPN gets its name because of how the user accesses it – through a single web page, or portal. The page acts as a single gateway to the other services available on the secured network.
SSL Tunnel VPNs
SSL Tunnel VPNs allow the user to not only access the web securely, but to also use applications and other network services that aren’t based on the web.
Due to their sophisticated segmentation capabilities, SSL VPNs often require more skill to implement.
VPNs are not a cure-all
Of course, what you could do is circumvent the entire debate around VPN SSL vs IPSEC. Our Gatekeeper offering is an enhanced alternative to VPN with no client, that still offers two-factor authentication to secure remote access.
Wherever you land between VPN SSL vs IPSEC, of if you join #TeamGatekeeper, having one of these tools to protect web traffic is a great way to help secure information, but it’s not an end-all be-all security solution.
After all, a VPN won’t protect your employees from social engineering attacks such as email phishing.
(hope this helps can i plz brainlist it will make my day :D hehe)
It's common to print a rotating, increasing list of single-digit numbers at the start of a program's output as a visual guide to number the columns of the output to follow. With this in mind, write nested for loops to produce the following output, with each line 60 characters wide: | | | | | | 123456789012345678901234567890123456789012345678901234567890
Answer:
The program in python is as follows:
for i in range(0,6):
for i in range(0,9):
print(" ",end='')
print("|",end='')
print()
for i in range(1,61):
print(i%10,end='')
Explanation:
See attachment for program output format
The next two instructions create a nested for loop
for i in range(0,6):
for i in range(0,9):
This prints 9 spaces
print(" ",end='')
This prints a vertical line at the top of the end of the spaces printed
print("|",end='')
This prints a new line
print()
This iterates from 1 to 60
for i in range(1,61):
This prints 1, 2, 3....9, then 0, 6 times on a straight line
print(i%10,end='')
determine the factors using computer failures and defects
Answer:
Voltage spike – This is a momentary change in the supply of electric power. It’s important to remember that the size of the transient can range from just milliseconds to longer periods of time. Even a small power glitch can damage a computer and corrupt data. If the screen goes blank during a thunderstorm, it’s likely that a voltage spike is responsible.
Circuit board fails with no visible indication of damage – This is the typical scenario: A computer goes down. A defective circuit board is suspected of the fault, but an inspection reveals no signs of physical damage. A replacement board is installed and operation resumes.
Failure to load software upgrades – Computer software often comes with various bugs, or vulnerabilities. These are simply programming mistakes, but they can make the software susceptible to viruses and glitches. When an error is discovered, the software designer sends out a “patch” that requires downloading and rebooting. Failing to upgrade the software by running the patch can lead to corruption of data.
Failure to keep virus protection up to date – There are several malware protection packages available for computer rooms or data centers. Once installed, the subscription must be maintained. One telltale sign of a malware infected computer is slow data processing.
Inadequate cooling – Computers produce heat, and the more data they process, the more heat must be eliminated. Servers, the “brains” of computers, fail under excess heat, so adequate cooling is essential.
Environment – If a computer room has a dedicated cooling system, there may be an opportunity to closely control the heat. If the cooling is shared with other equipment or the space contains offices, we often face a more challenging task. People have comfort needs different to those of computers.
Loss of Power, PDU fails – Power Distribution Units (PDU’s) are similar to power bars in homes and offices. They distribute power to different components in a computer room, and are usually located next to the server racks. PDU’s suffer a range of problems. Receptacles wear out and can be the sources of bad contacts, and moisture can lead to corrosion.
UPS batteries – Uninterruptible Power Supply (UPS) batteries are found in computer rooms. Most often, they are used to provide continuous power for a limited time, during an outage. Depending on how it’s used and the design of the battery, the life span can be as short as 4-5 years for what is considered a “10 year life” battery. Elevated room temperatures will shorten the life of any battery. Even a small facility such as a dentist office uses UPS batteries.
Transfer switch battery defective – This can be an indication that the site lacks an effective battery maintenance program. It can also be a sign that the transfer switch is “frozen” in position. Preventive maintenance could help avoid a breakdown.
Failure of standby power to synchronize (come on line) – When electric power from the grid disappears, standby power takes over in two different ways. In a small computer room, the focus is on turning computers off in a controlled manner. A fully charged UPS will provide power for 10-15 minutes to allow a computer to save its data and turn off. In a larger facility, it’s the matter of keeping cooling and power going long enough to give the standby generator an opportunity to “synchronize,” to get up to a rate of speed sufficient to power the infrastructure and continue data processing.
Diesel fuel contaminated – Most medium to large facilities have generators powered by diesel fuel, which can become contaminated and useless when a power outage occurs. Water is usually the culprit. Regular fuel testing is necessary to avoid contamination.
Storage defective – Data is stored on magnetic disks or tape. Both can be damaged during normal operation, so it’s a good practice to back up stored data on a regular basis. Backing up means creating a spare data storage. Failure of a tape or disk drive is often, but not always, proceeded by noise. Opening the unit to attempt data restoration is better left to a professional.
Sprinkler system turns on above the servers – Where a data room is protected by a water sprinkler system, a small spill can damage the electronic components. This is particularly true in cases where sprinkler heads are located directly above the servers.
Computers are crucial to business today, but there are so many things that can cause them to fail. By addressing the above common culprits, you could help reduce the overall risk of your computer systems failing.
Explantion: I hope this helps!!!!! :)
Where are the kidneys located?
a) Attached to the bladder
b) Lower back
c) Upper back
d) Middle back
e) Chest cavity
f the following is acian of health
Answer:
B
Explanation:
Your kidneys are fist-sized organs shaped like beans that are located at the back of the middle of your trunk, in the area called your flank. They are under the lower part of your ribcage on the right and left sides of your backbone.
Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appears multiple times, your program needs to filter the repeated numbers and therefore displaying the repeated numbers only once. For example, if the user enters the number 1, 4, 6, 1, 8, 4, 2, 1, 3,9 then the output of your program should be: 1, 4, 6, 8, 2, 3, 9.
Answer:
Here you go :)
Explanation:
Change this however you'd like:
array = []
for n in range(10):
x = int(input("Enter integer: "))
array.append(x)
dup = set(array)
print(", ".join(str(i) for i in dup))
If you wanted to use the numeric key pad to multiply 8 and 5 and then divide by 2, you would type
1. 8/5*2
2. 5/2/8
3. 8*5*2
4. 8*5/2
Answer:
Option 4 would be your best answer
Explanation:
The * means multiply
And the / means Divide
Hope this helps :D
____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.
Answer:
System software.
Explanation:
System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.
An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of data?
Answer:
Line graphs allow us to see overall trends such as an increase or decrease in data over time. Bar graphs are used to compare facts.
PLEASE HELP ME WITH THIS i will mark you brainlist
Answer: you have to check your email and click on the microsoft email they sent you and enter the code in the email.
Explanation: plz mark brainliest
Exercise 3.7.1: Proving statements about odd and even integers with direct proofs. info About Each statement below involves odd and even integers. An odd integer is an integer that can be expressed as 2k 1, where k is an integer. An even integer is an integer that can be expressed as 2k, where k is an integer.
The question is incomplete. The complete question is :
Each statement below involves odd and even integers. An odd integer is an integer that can be expressed as 2k+1, where k is an integer. An even integer is an integer that can be expressed as 2k, where k is an integer. Prove each of the following statements using a direct proof. (a) The sum of an odd and an even integer is odd. (b) The product of two odd integers is an odd integer.
Solution :
Odd number integers = 2k + 1, where k is integer
Even number integer = 2k
a). Odd integer + even integer
= 2k + 1 + 2k
= 4k + 1
= 2(2k) + 1
Let 2k = t, where t is integer
= 2t + 1
= Odd integer by definition
If number is 2t + 1 where t belongs to integer, then it is odd integer.
Hence proved.
b). Product of two odd integers : [tex]$2k_1 + 1,\ \ 2k_2 +1 $[/tex] where [tex]$k_1, k_2 $[/tex] belongs to integer.
[tex]$(2k_1+1)(2k_2+1)= 4k_1k_2+2k_1+2k_2+1$[/tex]
[tex]$2(2k_1k_2)+2(k_1+k_2)+1$[/tex]
Let [tex]$2k_1k_2 = a$[/tex] and [tex]$k_1+k_2 = b $[/tex]
here, a and b belongs to integers since [tex]$k_1$[/tex] and [tex]$k_2$[/tex] are integers.
We get:
2a+2b+1
= 2(a+b)+1
= 2l + 1, Let (a+b)=l and l belongs to integers.
It is odd integer by definition.
Hence proved.
Write a C console application that will be used to determine if rectangular packages can fit inside one of a set of spheres. Your program will prompt the user for the three dimensions that define a rectangular box; the length, the width, and the height. The interior diameter of a sphere is used to identify its size. Spheres are available in the following five sizes: 4- inch, 6-inch, 8-inch, 10-inch, and 12-inch. Your program will execute repeatedly until the user enters a value of zero for one or more of the rectangular box dimensions. After obtaining the dimensions of the rectangular box, your program will call a function named getSphereSize that determines if the box will fit inside one of the five spheres. The formula for calculating the diagonal of a rectangular box is:
Answer:
#include <cmath>
#include <iostream>
using namespace std;
int getSphereSize(double length, double breadth, double height) {
double diagonal = sqrt(length * length + breadth * breadth + height * height);
if (diagonal <= 4)
return 4;
if (diagonal <= 6)
return 6;
if (diagonal <= 8)
return 8;
if (diagonal <= 10)
return 10;
if (diagonal <= 12)
return 12;
return 0;
}
int main() {
double length, breadth, height;
int sphereCounts[5] = {0};
int sphereSize;
while (true) {
// Get dimensions of the box
cout << "Enter the dimensions of the box:\n";
cout << "Length: ";
cin >> length;
cout << "Breadth: ";
cin >> breadth;
cout << "Height: ";
cin >> height;
if (length <= 0 || breadth <= 0 || height <= 0)
break;
sphereSize = getSphereSize(length, breadth, height);
if (sphereSize == 0)
cout << "The box cannot fit in any of the spheres";
else
cout << "The box can fit in the " << sphereSize << "-inch sphere";
// Increment the counter
if (sphereSize == 4)
sphereCounts[0]++;
else if (sphereSize == 6)
sphereCounts[1]++;
else if (sphereSize == 8)
sphereCounts[2]++;
else if (sphereSize == 10)
sphereCounts[3]++;
else if (sphereSize == 12)
sphereCounts[4]++;
cout << "\n\n";
}
cout << "\nNumber of 4-inch spheres: " << sphereCounts[0];
cout << "\nNumber of 6-inch spheres: " << sphereCounts[1];
cout << "\nNumber of 8-inch spheres: " << sphereCounts[2];
cout << "\nNumber of 10-inch spheres: " << sphereCounts[3];
cout << "\nNumber of 12-inch spheres: " << sphereCounts[4];
cout << endl;
return 0;
}
Explanation:
The "cmath" library is included in the c++ program. The getSphereSize function is used to return the sphere size the rectangle dimension can fit into. It program continuously prompts the user for the length, breadth, and height of the rectangle and passes the values to the getSphereSize function in the while but breaks if any or all of the variable value is zero.
The sizes of the sphere objects in inches are collected in an array of five integer values of zeros and are incremented by one for every match with a rectangle.
Help plz brainliest.
Answer:
Follows are the solution to this question:
Explanation:
In this question, the equation will be written as the coefficients for each of the bases, that is from the above quantum states b is given as follows:
[tex]\to | b \rangle = 0.4 | 00 \rangle + 0.65 | 01 \rangle + 0.2 | 10 \rangle + 0.61 | 11 \rangle[/tex]
Therefore the equation can be written as in the state b:
[tex]\to \mathbf{state_b = [0.4, 0.65, 0.21, 0.61]}[/tex]
What are the challenges of giving peer feedback in peer assessment
Answer:
There can some challenges when giving and receiving peer feedback in a peer assessment. Some people can be harsh in their assessments of your work. Some students cannot take that and because of that it can cause them to question a lot of their work. People can also be wrong when it comes to the assessment
Pls awnser I will mark brainliest math
Answer:
2788 or 116
Explanation:
JAVA 6.37 LAB: Even/odd values in an array Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers in the list. The first integer is not in the list. Assume that the list will always contain less than 20 integers. Ex: If the input is: 5 2 4 6 8 10 the output is: all even Ex: If the input is: 5 1 -3 5 -7 9 the output is: all odd Ex: If the input is: 5 1 2 3 4 5 the output is: not even or odd Your program must define and call the following two methods. isArrayEven() returns true if all integers in the array are even and false otherwise. isArrayOdd() returns true if all integers in the array are odd and false otherwise. public static boolean isArrayEven(int[] arrayValues, int arraySize) public static boolean isArrayOdd(int[] arrayValues, int arraySize)
Answer:
Explanation:
Hey,
I an sorry I do not know java only python
Thanks
If we use 6 bits for representing positive and negative numbers using 2's
complement methods, what is the value of 11100?
When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comprised of computing time and the overhead time required for locked critical sections and/or to send data from one processor to another. Assume a program requires t = 100 s of execution time on one processor. When run p processors, each processor requires t/p s, as well as an additional 4 s of overhead, irrespective of the number of processors. Compute the per-processor execution time for 2, 4, 8, 16, 32, 64, and 128 processors. For each case, list the corresponding speedup relative to a single processor and the ratio between actual speedup versus ideal speedup (speedup if there was no overhead).
Choose all items that represent common website
design flaws.
menu at the top of the page
distracting background
short page-load times
too many or confusing fonts
poor navigation
dead hyperlinks
Answer:
2,4,5,6
Explanation:
just answered it
Use three or more sentences to explain to someone why they might need to use a virtual machine.
Answer:
Benefits of Virtualization
Reduced capital and operating costs.
Minimized or eliminated downtime.
Increased IT productivity, efficiency, agility and responsiveness.
Faster provisioning of applications and resources.
Greater business continuity and disaster recovery.
Simplified data center management.
An algorithm to print a set of 10 integers in ascending order
Answer:
Program - Array Sorting
Author - Vishal Solanki
Language - C Language
Date - 03/02/2018 (dd/mm/yyyy)
*/
//IDE used for this code is "Visual Studio 2017"
#include <stdio.h> //including stdio.h for printf and other functions
#include<conio.h>
int main() //default function for call
{
int a[100],n,i,j;
printf("Array size: ");
scanf("%d",&n);
printf("Elements: ");
for(i=0;i<n;i++)
{
scanf("%d",&a[i]);
}
for (int i = 0; i < n; i++) //Loop for ascending ordering
{
for (int j = 0; j < n; j++) //Loop for comparing other values
{
if (a[j] > a[i]) //Comparing other array elements
{
int tmp = a[i]; //Using temporary variable for storing last value
a[i] = a[j]; //replacing value
a[j] = tmp; //storing last value
}
}
}
printf("\n\nAscending : "); //Printing message
for (int i = 0; i < n; i++) //Loop for printing array data after sorting
{
printf(" %d ", a[i]);
}
for (int i = 0; i < n; i++) //Loop for descending ordering
{
for (int j = 0; j < n; j++) //Loop for comparing other values
{
if (a[j] < a[i]) //Comparing other array elements
{
int tmp = a[i]; //Using temporary variable for storing last value
a[i] = a[j]; //replacing value
a[j] = tmp; //storing last value
}
}
}
printf("\n\nDescending : "); //Printing message
for (int i = 0; i < n; i++) //Loop for printing array data after sorting
{
printf(" %d ", a[i]); //Printing data
}
return 0; //returning 0 status to system
getch();
}
//Ouput
/*
Array size: 10
Elements : 3 4 7 6 5 1 2 8 10 9
Ascending : 1 2 3 4 5 6 7 8 9 10
Descending : 10 9 8 7 6 5 4 3 2 1
*/
Explanation:
of what is famous Ted Nelson?
Answer:
Nelson proposed a system where copying and linking any text excerpt, image or form was possible.
Explanation:
Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.
How I know:
I goggle it.
Match the data type to the given data.
1. float
2. array
3. Boolean
4. character
false
с
c, o, m, p, u, t, er
26.2
When developing a naming convention, what is the most important quality to keep in mind?
Answer:
Files should be named consistently.
File names should be short but descriptive.
Avoid special characters or spaces in a file name .
Use Capitals and Underscore instead of periods or spaces or slashes.
What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
A. 0.067
B. 0.533
C. 8
D. 15
Answer:
8
Explanation:
Gear reduction = driven gear teeth / driving gear teeth
First stage reduction :
Driven gear teeth = 36
Driving gear teeth = 12
36 /12 = 3
Second stage reduction :
Driven gear teeth = 60
Driving gear teeth = 12
60 /12 = 5
First stage + second stage
3 + 5 = 8
Select the correct answer.
A computer using a connectionless network protocol sends too many data packets to another computer, causing loss of a few packets. As a result, the message appears jumbled to the user at the destination computer. How does TCP overcome this issue?
A.
by using flow control
B.
by using cables
C.
by using terminals
D.
by using a larger IP address
Please only answer if you are 100% sure
Answer:
D by using a larger IP address correct
Explanation:
Correct answer I hope this helps you :)