Answer:
RF devices use radio waves to transport data
Explanation:
RF devices are used to refer to equipment in the wireless communication industry that transmit data and sound using radio frequency waves from point to point. Network devices that alternatively transmit data signals over a distance using radio waves and not telephone lines or data cables are known as RF devices.
An organization would like to determine which streams will carry certain levels of fertilizer runoff from nearby agricultural
areas.
Which specialized information system does this situation represent?
Superfund Information Systems
Geographic Information Systems
Electronic Medical Record Systems
Emergency Department Information Systems
Answer:
GIS - Geographic Information System
Considering the existence of polluted air, deforestation, depleted fisheries, species extinction, poverty and global warming, do you believe that the Earth’s carrying capacity has already been reached?
Answer:
The carrying capacity of an ecosystem, for example the Earth system, is the ability of an ecosystem to provide biological species for their existence; that is, the living environment is able to provide them with a habitat, sufficient food, water and other necessities for a longer period of time.
When the populations of different species living in an ecosystem increase, the pressure on the environment increases, partly due to intensive use. The population size decreases again when the population exceeds the carrying capacity, so that a natural equilibrium is maintained. This is due to a number of factors, depending on the species involved. Examples are insufficient space, sunlight and food.
Thus, given the current conditions of pollution, extinction of species and other environmental damage caused by humans on Earth, it can be said that we are about to exceed the limit of carrying capacity of the Earth, which would imply that this, through different natural forces, would seek to stabilize said overpopulation to return the environmental environment to a state of equilibrium.
Genetics Vocabulary: no
Allele: Different versions of the same qene (Aa, Bb)
Describing the technologies used in diffrent generation of computer
Windows 98, Windows XP, Windows vista, Windows 7, Windows 8 y Windows 10.
Answer:
Evolution of Computer can be categorised into five generations. The First Generation of Computer (1945-1956 AD) used Vacuum Tubes, Second Generation of Computer (1956-1964 AD) used Transistors replacing Vacuum Tubes, Third Generation of Computer (1964-1971AD) used Integrated Circuit (IC) replacing Transistors in their electronic circuitry, Fourth Generation of Computer (1971-Present) used Very Large Scale Integration (VLSI) which is also known as microprocessor based technology and the Fifth Generation of Computer (Coming Generation) will incorporate Bio-Chip and Very Very Large Scale Integration (VVLSI) or Utra Large Scale Integration (ULSI) using Natural Language.
Explanation:
Most customers come to ThreadMeister
to buy jackets.
A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a unified threat management (UTM) device that provides multiple security features in a single network appliance: Firewall VPN Anti-spam Antivirus You join the UTM device to the company's Active Directory domain. The company's traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public Wi-Fi networks. Which weaknesses exist in this implementation
Answer: The UTM represents a single point of failure
Explanation:
Unified threat management is a method used in information security which has to do with the installation of a single hardware or software that provides several security functions.
Even though it's easy to manage from a single device, the disadvantage is that within the information technology infrastructure, there is a single point of failure.
Introduction to Database: Tutorial
10 of
Name
Nancy
Date of Birth Age Blood Type
9/17/97
17 o positive
10/23/97 17 A positive
Hobby
Talent Show Registration Unique ID
drawing and painting, music Yes
A_001
reading, creative writing Yes
A_002
William
Philip
2/22/97
18
B positive
Yes
A_003
Jean
7/25/97
17
No
A_004
playing guitar
sports
George
7/29/98
16
Yes
A_005
Allan
8/16/97
17
Yes
O positive
A negative
O positive
o positive
o negative
AB positive
computer games
sports
A_006
A_007
17
No
Roger 12/11/97
Kimberly 5/12/98
16
Yes
A_008
Anne
6/10/97
17
Yes
A_009
video games
watching TV
reading fiction
listening to music
William
5/22/98
16
O positive
Yes
A_0010
Diane
3/24/97
17
A positive
Yes
A_0011
Part A
What are the field names in the database? Explain what data type is appropriate for each field.
B I y X
Х.
Font Sizes
AA
= = 三 三 三 三
Answer: this is the best situation
Explanation: it shows the process
Answer:
PLATO ANSWER. Sample Answer
Explanation:
The field names in the database are Name, Date of Birth, Age, Blood Type, Hobby, Talent Show Registration, and Unique ID. Here are the types of data that you can enter into each field.
Name:This field has 5 to 10 characters and accepts text data only.
Date of Birth: This field accepts dates only. It uses a medium-length entry in the form of month/day/year (mm/dd/yy).
Age: This field is numerical and contains numerical data only.
Blood Type: This field contains text data, with a maximum of 11 characters.
Hobby: This field can be a memo, and it can accept large volumes of data in any format. This data type can include null values as well.
Talent Show Registration: This is a Boolean data field that contains the values Yes or No.
Unique ID: This field accepts alphanumeric data, so this, too, is a text field.
Write a program that creates a two-dimensional array named height and stores the following data:
16 17 14
17 18 17
15 17 14
The program should also print the array.
Expected Output
[[16, 17, 14], [17, 18, 17], [15, 17, 14]]
Answer:
Explanation:
The following code is written in Java and it simply creates the 2-Dimensional int array with the data provided and then uses the Arrays class to easily print the entire array's data in each layer.
import java.util.Arrays;
class Brainly {
public static void main(String[] args) {
int[][] arr = {{16, 17, 14}, {17, 18, 17}, {15, 17, 14}};
System.out.print(Arrays./*Remove this because brainly detects as swearword*/deepToString(arr));
}
}
Answer:
height = []
height.append([16,17,14])
height.append([17,18,17])
height.append([15,17,14])
print(height)
Explanation:
I got 100%.
What is data and information
Answer:
data is the unprocessed information where as information is a processed output
I need to know the diferences between PAN, LAN, CAN, MAN and WAN.
Answer:
LAN
The most basic and common type of network, a LAN, or local area network, is a network connecting a group of devices in a “local” area, usually within the same building. These connections are generally powered through the use of Ethernet cables, which have length limitations, as the speed of the connection will degrade beyond a certain length.
A WLAN, or wireless LAN, is a subtype of LAN. It uses WiFi to make the LAN wireless through the use of a wireless router.
HAN
A HAN, or home area network, is a network connecting devices within a home. These networks are a type of LAN. All the devices inside the household, including computers, smartphones, game consoles, televisions, and home assistants that are connected to the router are a part of the HAN.
CAN
A CAN, or campus area network, usually comprises several LANs. They cover a campus, connecting several buildings to the main firewall. A university could use a CAN, as could a corporate headquarters.
MAN
Even larger than a CAN, a MAN is a metropolitan area network. These can cover an area as large as a city, linking multiple LANs through a wired backhaul. An example of a MAN would be a citywide WiFi network.
WAN
In contrast to the smaller LAN and HANs, a WAN is a wide area network, covering any distance necessary. The Internet could be considered a WAN that covers the entire Earth.
Answer:
A personal area network (PAN) is formed when two or more computers or cell phones interconnect to one another wirelessly over a short range, typically less than about 30feet.
A local area network (LAN) is a collection of devices connected together in one physical location, such as a building, office, or home. A LAN can be small or large, ranging from a home network with one user to an enterprise network with thousands of users and devices in an office or school.
A campus network, campus area network, corporate area network or CAN is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area.
A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan area.
A wide area network (also known as WAN), is a large network of information that is not tied to a single location. WANs can facilitate communication, the sharing of information and much more between devices from around the world through a WAN provider.
Explanation:
explanation on top
Lillian is creating a presentation about social media and she would like to include transitions to add flair. What does she need to do to make sure her transitions are balanced?
Apply one simple transition to all of her slides.
Use a different transition for each slide.
Add a subtle transition to every other slide.
Give each slide a different duration time.
Answer:
A: Apply one simple transition to all of her slides.
Explanation:
I got it correct on a quiz I did that had this question.
What is a System software that serve as a platform/supports other programs/software in a computer system
Answer:
Operating system.
Explanation:
An operating system is a program, or rather, a macro program or set of programs, whose function is to control the computer hardware, and allow the correct operation of the software installed on it, serving as a platform for it. In this way, the operating system allows, basically, the use of the computer in a functional way by the user, who will be able to run different programs and use different hardware thanks to the previous installation of the operating system. The most common operating systems today are Windows and macOS.
HAS ANYONE HEARD OF THE GAME SCHOOL DAY
Answer:
NO BUT IT SOUNDS FUN
Explanation:
I PROBABLY HAVE NOT HEARD OF IF BC IM HOMESCHOOLED :D
Answer:
No
Explanation:
Hope you have a wonderful rest of your day!!! :)
7.2 code practice edhesive. I need help!!
Answer:
It already looks right so I don't know why it's not working but try it this way?
Explanation:
def ilovepython():
for i in range(1, 4):
print("I love Python")
ilovepython()
please actually answer don’t send me a file !!
Answer:
CSS- Styling Language
JavaScript- Scripting Language
HTML- Markup Language
Explanation:
*Also verified answers with a Computer expert and the Internet*
===================================================================
Hope I Helped, Feel free to ask any questions to clarify :)
Have a great day!
More Love, More Peace, Less Hate.
-Aadi x
Which of the following
statements about take home pay is TRUE?
Answer:
Take home pay is amount left over from your monthly paycheck after deductions.
Explanation:
It is how much you get to keep after taxes and whatnot.
It is how much you get to keep after taxes and whatnot.
What is Home pay?It is full-service pay processing capabilities and nanny-specific experience, HomePay is one of our top-recommended nanny payroll providers.
Instead of just offering you the knowledge and resources to do it yourself, its representatives manage the payroll process for you. The supplier will even set up your tax accounts if you're a new household employer, making it simpler for you to get started.
Using HomePay gives you access to payroll tax professionals who keep up with changing requirements and can save you money in the long term, even if it is more expensive than handling payroll yourself. Moreover, there are no startup or registration costs.
Therefore, It is how much you get to keep after taxes and whatnot.
To learn more about Homepay, refer to the link:
https://brainly.com/question/6868391
#SPJ2
NEXT
Internet and World Wide Web: Mastery Test
1
Select the correct answer
An instructor receives a text message on her phone. Next, she reads out the text to the whole claws. Which network component plays a similar
role by receiving a message and broadcasting it to all other computers connected to the component?
OA Switch
OB .
hub
OC bridge
OD
router
Reset
Wext
Answer:
hub is the correct answer
hope it is helpful to you
Select the correct answer.
Which animation do these characteristics
best relate? Allows you to edit, blend, and reposition clips of animation.
This animation is not restricted by time.
1. Interactive Animatino
2. Linear Animation
3. Nonlinear Animation
Answer:
1. Interactive Animatino
A network administrator needs information about printers that employees can access. Where can he find that information?
Answer:
PRINT SERVER
Explanation:
The network administrator can find the information about how many computers in the office been used by employees are connected to the Printer by checking the information held in the PRINT SERVER of the company.
The print server is program used to connect computers to printers over a network ( usually an office setting ). The program keeps record of how many computers are connected to the printer hence the administrator can get the information there..
Recommend how could you integrate positive aspects of digital literacy into your own
practice of learning.
PLEASE HELP
Answer:
please give me brainlist and follow
Explanation:
7 Ways to Teach Digital Literacy
Emphasise the importance of critical thinking. ...
Use social media for learning and collaborating. ...
Provide guidance on how to avoid plagiarism. ...
Teach students to manage their online identity. ...
Help students manage digital distractions. ...
Provide authentic contexts for practice. ...
Guide students out of their comfort zone.
Which is a characteristic of joint application design (JAD)? a. It is a unilateral activity that involves the owner of the organization. b. It ensures that the requirements collected from different functional areas of an organization for the application are multi-dimensional in focus. c. It ensures that collected requirements are one-dimensional in focus. d. It centers on a structured workshop in which users and system professionals come together to develop an application.
Answer: d. It centers on a structured workshop in which users and system professionals come together to develop an application
Explanation:
Joint Application Development refers to a methodology which has to do with an application development by a succession of workshops that is called the JAD sessions. It us used in the collection of business requirements when a new information system is being developed for a company.
Therefore, a characteristic of joint application design (JAD) is that it centers on a structured workshop in which users and system professionals come together to develop an application.
The correct option is D.
please tell me which ones go into which categories no files!!
Answer:
[tex]\begin{array}{ccc}Needs \ SSL&&Does \ not \ need \ SSL\\Brian \ accesses \ a \ file \ on \ his \ home \\ computer \from \ the \ office\\&&A \ website \ sends \ cookies \ from \ a \ server\\Dave \ browses \ a \ shopping \ website\\&&Betty \ reads \ a \ blog\\William \ logs \ in \ to \ his \ email&&Anna \ checks \ a \ term \ in \ an \ online \ dictionary\end{array}\right][/tex]
Explanation:
SSL stands for Secure Sockets Layer are network protocols used to establish authentic and encrypted between computers in a network. With the release of the Transport Layer Security, TLS, in 1999, SSL was depreciated and the two technologies are referred to as "SSL/TLS" or "SSL"
An SSL certificate signed by a certificate authority (CA) that is publicly trusted, the certificate will be trusted by operating systems and web browsers
SSL is used for logins, data transfer, secure credit card transactions, secured browsing of social media sights
Therefore, the action that has need for SSL are;
1) Brian accesses a file on his home computer from the office
2) Dave browses a shopping website
3) William logs in to his email
Does not need SSL
1) A website sends cookies from a server
2) Betty reads a blog
3) Anna checks a term in an online dictionary.
Edhesive 9.1 lesson practice answers
Answer:
1. False
2. Rows and columns
3. Grid
Explanation: Bam
Critical thinking questions Giving 30 points if you answer correctly!!!!
Answer:
1. The reason hunting seasons are displayed all over the world in cave paintings is because of the necessity to hunt. Ancient people everywhere were nomads that relied on wild animals for the majority of their calories. The paintings likely served as an expression of the importance of hunting to their culture. It could have also been used as educational material for very young children to learn about hunting as well as its importance to their community.
Explanation:
I can't do 2nd because the image was cut off, sorry.
) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message and prompt again for a valid data point. If entry has no comma Output: Error: No comma in string. (1 pt) If entry has more than one comma Output: Error: Too many commas in input. (1 pt) If entry after the comma is not an integer Output: Error: Comma not followed by an integer. (2 pts)
Answer:
In Python:
entry = input("Sentence: ")
while True:
if entry.count(",") == 0:
print("Error: No comma in string")
entry = input("Sentence: ")
elif entry.count(",") > 1:
print("Error: Too many comma in input")
entry = input("Sentence: ")
else:
ind = entry.index(',')+1
if entry[ind].isnumeric() == False:
print("Comma not followed by an integer")
entry = input("Sentence: ")
else:
break
print("Valid Input")
Explanation:
This prompts the user for a sentence
entry = input("Sentence: ")
The following loop is repeated until the user enters a valid entry
while True:
This is executed if the number of commas is 0
if entry.count(",") == 0:
print("Error: No comma in string")
entry = input("Sentence: ")
This is executed if the number of commas is more than 1
elif entry.count(",") > 1:
print("Error: Too many comma in input")
entry = input("Sentence: ")
This is executed if the number of commas is 1
else:
This calculates the next index after the comma
ind = entry.index(',')+1
This checks if the character after the comma is a number
if entry[ind].isnumeric() == False:
If it is not a number, the print statement is executed
print("Comma not followed by an integer")
entry = input("Sentence: ")
If otherwise, the loop is exited
else:
break
This prints valid input, when the user enters a valid string
print("Valid Input")
Note that: entry = input("Sentence: ") is used to get input
The users in your organization bring their own mobile devices to the office and want to be able to access the network with them. You want to protect your network from malware threats that might be on these devices. You want to make sure these devices meet certain requirements before they can connect to the network. For example, you want them to meet the following criteria: Hardware and Windows startup components are clean. The kernel is not infected with a rootkit. Boot drivers are clean. Which Windows feature can you use to protect your network from malware threats that might be on your users' mobile devices
Answer:
The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;
Device Health Attestation (DHA)
Explanation:
Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.
Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises
Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker
Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.
3. When the heart is contracting, the pressure is .highest. This is called the
a. blood pressure. b. systolic pressure.
c. heart pressure.
d. diastolic pressure.
4. What is the balance between heat produced and heat lost in the body?
a. pulse rate
b. body temperature C. respiratory rate
d. blood pressure
5. This type of thermometer uses mercury and, therefore, is considered unsafe to use.
a. ear thermometer b. infrared thermometer c. digital thermometer d. clinical
Activit ? (Day 2)
Answer:
3. b. Systolic pressure
4. b. Body temperature
5. d. Clinical
Explanation:
3. During the systole, the pressure of the blood in when the heart contracts is increased and it is known as the systolic blood pressure
4. Temperature is a measure of heat available in a body for transfer depending on the heat capacity of the body, therefore, the balance between heat produced and total heat lost is body temperature
5. The clinical thermometer is made up of mercury contained in a bulb at the end of a uniform and narrow glass tube. The increase in temperature of the mercury when the thermometer is in contact with an elevated temperature results in the expansion of the mercury which is observed when the mercury moves up the thermometer.
condition of watering a plant
Answer:
Hydration?
Explanation:
drag each type of document to the correct location on the table. Drag each document to its respective category
Answer:
What? I don't get it.
Explanation:
The correct document to be assorted as per the table of contents and nature thereof. So the Business Documents are Sales Report, Pay slip and Resignation letter. Further the Non-Business Documents are Review Article, Mathematics Assignment and Letter to classmate.
What is business documents?Business documents are a variety of files that include information on a company's internal and external dealings.
They typically play a crucial role in a company's administration since they offer both the data necessary to run the business effectively and the specifics of various business dealings with third parties.
Further examples of Business documents such as Invoices to clients, price lists, and offers are examples of business paperwork. The business documents also include the terms and conditions of the contract.
Therefore the legal structure of the firm, the location of the company, its corporate identity number, and its VAT number are business documents.
Learn more about business documents:
https://brainly.com/question/12654413
#SPJ2
In an organization, several teams access a critical document that is stored on the server. How would the teams know that they are accessing the latest copy of the document on the server? A. by using a duplicate copy B. by taking a backup C. by using a reporting tool D. by checking the version history
Answer:
D. by checking the version history
Explanation:
When you access a document that is stored on the server and it is used by several teams, you can check the version history by going to file, then version history and see version history and in there, you can check all the versions, who edited the file and the changes that have been made. According to this, the answer is that the teams know that they are accessing the latest copy of the document on the server by checking the version history.
The other options are not right because a duplicate copy and taking a backup don't guarantee that you have the latest version of the document. Also, a reporting tool is a system that allows you to present information in different ways like using charts and tables and this won't help to check that you have the latest version of the document.