Answer:
The biggest advantage of computer network is that the hardware components such as printers memory etc. can be shared by multiple computers. Hence it reduces the hardware cost of an organization
Answer:
One main method computer networking reduces the cost of computer hardware through the sharing of hardware component and resources including printers, faxes, memory space for data storage, processor, graphics capabilities, and internet access devices both locally, within a building and across sites
Computer network allows the sharing of a single resource mentioned above with several other computers, such that a single unit of each resource can be used by members of the same organization
Computer network also reduces the cost of additional space required where each computer is connected to its own components
Explanation:
In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.
Answer:
Data administration.
Explanation:
Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.
Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.
What method is used to prevent the random number generator from always starting with the same number?
seed()
random()
randint()
initialize()
Answer:
seed()
Explanation:
Since computer random isn't actually random, and is a predetermined sequence of numbers, seed() allows us to create different sequences of numbers, and thus more randomized numbers.
Hope this helps!
Answer:
the answer is seed()
Explanation:
i took the assignment
which computer is used in hospital for ultrasound?
Answer:
Pentium Powered Computer
Explanation:
Pentium powered computer
With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.
Answer:
They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements
When constructing a project network for a project with 25-100 tasks, a common industry practice is to
utilize the "yellow sticky" approach
When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequence as the parameters b. must have data types that are compatible with the parameters c. have the same names as the parameters d. all of the above e. a and b only
Answer:
a and b only
Explanation:
If you have a function foo(int a, double b) { } you can call this as foo(x,y), just as long as x is an int and y is a double.
Pratibha is working in a bank. She is creating a database to store the details of the bank customers. Which of the following fields of table Bank_Customer can be selected as primary key?
Answer:
Acc_No
Explanation:
Given
See attachment for table Bank_Customer
Required
Which field can be used as primary key
A field, once made the primary key, cannot contain duplicate entries.
This means that Pratibha has to select a field that can be unique to all customers.
From the table, we have:
Acc_No [tex]\to[/tex] No two customers can have the same account number
Cust_Name [tex]\to[/tex] Multiple customers can have the same name
DOB [tex]\to[/tex] Multiple customers can have the same date of birth
PAN_NO [tex]\to[/tex] No two customers can have the same pan number; however, pan number is often issued by tax department of a country.
Opening_Bal [tex]\to[/tex] Multiple customers can have the same opening balance,
Hence, the field to use as primary key is:
Acc_No
why the internet is not policed
Answer:
The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work
What is a single physical processor? plz help
Answer:
A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.
Explanation:
Define Data communication
Explanation:
Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses.
who is the father of computer
Answer:
Charles babbage is the father of computer
Explanation:
Charles Babbage is a father of computer
Which is not true about climatic normals?
Multiple choice question.
A)
They can differ from daily weather conditions.
B)
They are gathered at one location.
C)
They are averaged over a 30-year period.
D)
They describe average conditions.
Answer:
I think c is correct answer
Explanation:
hope it's help yu
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations
Answer:
This is a pretty obvious answer.
An unwanted e-mail sent in bulk from people or organizations.
Explanation:
Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally go up to ______________ feet above airport elevation and the outer ring begins at _______ feet above the ground and extend vertically to _________ feet above airport elevation. (NOTE #1: no commas) (NOTE #2: All values on the Sectional Charts are in MSL values)
Answer:
5 nautical mile
4000 feet
1200 feet
Explanation:
Class C Airspace has inner ring which is also an inner core has usually 5 nautical mile radius. This extends from surface area upto 4000 feet above airport elevation and outer ring starts at an altitude of 1200 feet above ground and is extended upto 4000 feet above airport elevation.
Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer
Answer:
Blocking ransomware
Explanation:
A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files
There are different types of ransomware such as blockers, wipers and cryptors
A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows
Which of these is an example of an IT career? (ik I'm trash at this kinda stuff)
Select all that apply
A
game designer
B
network engineer
C
graphic designer
D
cashier
Answer:
not d
Explanation:
IT is info tech, so it's most likly a or c(I'mma go witn c), but then again b is possible, but c still sounds most reasonable(I think)
describe how it is necessary to design documents, files, forms/inputs, reports/outputs and validation
Answer:
Explanation:
Good organization, complete information and clear writing are the most effective ways to design a document.
I hope this helps
NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.
Answer:
NBA bank data is completely destroyed since it has not maintained any backup.
Explanation:
All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.
What is ABC computer?
Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.
Explanation:
4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,
Answer:
[tex]\sigma_x = 5.68[/tex]
Explanation:
Given
[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]
Required
The standard deviation
First, calculate the mean
[tex]\bar x =\frac{\sum x}{n}[/tex]
So, we have:
[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]
[tex]\bar x = \frac{64}{8}[/tex]
[tex]\bar x = 8[/tex]
The standard deviation is:
[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]
So, we have:
[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]
[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]
[tex]\sigma_x = \sqrt{32.2857}[/tex]
[tex]\sigma_x = 5.68[/tex]
14. Applying formatting using the commands in the ribbon is called style
(page layout, override, justification)
Answer:
Override
Explanation:
Hope this helps
Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:
A. Cung cấp nước, dinh dưỡng
B. Giữ cây đứng vững
C. Cung cấp nước, oxy, dinh dưỡng và giữ cây đứng vững
D. Cung cấp nguồn lương thực
Answer:
C
Explanation:
write the name of the technologies used in all five generation
Answer:
First Generation (1940-1956)
First Generation (1940-1956)Second Generation (1956-1963)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)
Answer:
Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .
Explanation:
Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use
Answer:
A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file
Explanation:
A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer
Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format
Structured file are files that are keeps data in a uniform organized structural format
how do I answer question
Answer:
To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.
Explanation:
Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.
What is the base value of the number system that consist of the digit set {0, 1, 2, 3, 4, 5, 6, 7}?
(a) Two
(b) Eight
(c) Sixteen
(d) Seven
Answer:
B. Eight because octal number system has eight elements
1. Answer the following questions: a. What are the different types of number system? Name them.
Answer:
binary,decimal, hexadecimal and octal number system
Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.
Answer:
Use an encryption algorithm
Explanation:
An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.
Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.
the paint 3D program is used for drawing picture true or false
Answer:
The answer is TRUE we use paint program to draw.
Explanation:
#swag
16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.
Answer:
A) A function can hold multiple return statements, but only one return statement executes in one function call
Explanation:
This is because each function can only return one value, whether it be an integer, String, or other object.
However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.
Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.
Hope this helps!
The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.
The following information should be considered:
This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.Therefore, we can conclude that option A is correct.
Learn more about the function here: brainly.com/question/12431044
how do you take a screenshot on a Samsung tablet
Explanation:
to capture a screenshot press and hold the power and volume down button at the same time for approximately 2 seconds