Placing shortcut to a folder on a start menu or on the desktop can make it easier to locate and open the folder.
What are shortcuts on the desktop?
The shortcuts on the desktop serves as the tolls that help in the location of files as well as other documents and function on the desktop which help in time management when working on the computer.
It should be noted that Placing shortcut to a folder on a start menu or on the desktop can make it easier to locate and open the folder.
Learn more about desktop on:
https://brainly.com/question/24735155
#SPJ1
An enterprise's application server and web server are hosted by a cloud service provider, and their database server is in the enterprise's own cloud establishment. Which type of cloud is used by the enterprise
An enterprise's application server and web server that are hosted by a cloud service provider will use option b: Hybrid cloud as the type of cloud is used by the enterprise.
What is hybrid cloud and how does it work?Hybrid cloud is known to be a very common IT infrastructure that is made to help to link up at least one public cloud and also that of a one private cloud.
This is known to be one that helps to give orchestration, management and also the function of application portability that exist between them to make a single, cloud environment for the running of a firms' computing workloads.
Hence, based on the above, An enterprise's application server and web server that are hosted by a cloud service provider will use option b: Hybrid cloud as the type of cloud is used by the enterprise.
Learn more about hybrid cloud from
https://brainly.com/question/27838623
#SPJ1
See full question below
An enterprise's application server and web server are hosted by a cloud service provider, and their database server is in their cloud establishment. Which type of cloud is used by the enterprise?
Private cloud
Hybrid cloud
Community cloud
Public cloud
A(n) ________ engine is a specialized program that assists you in locating information on the web and the internet. group of answer choices micro search wiki cloud
A Search engine is a specialized program that assists you in locating information on the web and the internet.
What is a Search engine?This is known to be a kind of a Software type.
A search engine is also seen to be a type of a software system that is known to be designed to function or work out web searches.
Note that They tend to search the World Wide Web in a way that is systematic in nature for specific information that is said to be specified in a textual web search query.
Therefore, based on the definition given, one can say that A Search engine is a specialized program that assists you in locating information on the web and the internet.
Learn more about Search engine from
https://brainly.com/question/512733
#SPJ1
All information that is to be processed by a computer must first be entered into memory via an input device.
a. true
b. false
Hardware refers to the _________________ of a computer
Answer:
physical component
Explanation:
Well, softwares are the applications and anything installed inside the computer but hardware isn't installed, it's just been connected by wires
Cloudy computing would like to be able to link related cases together. As the admin, what would you recommend?
As the admin of a cloud computing service, I would you recommend that you ensure the use of pooled resources and efficient client-time management.
What is cloud computing?Cloud computing can be defined as a Cloud-based solutions that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives to provide various services to customers.
The types of cloud computing.In Computer technology, there are three main types of cloud computing and these include the following:
Private cloudPublic cloudHybrid cloudBasically, a hybrid cloud is designed and developed to combine the features of both a private cloud and public cloud. For instance, a hybrid cloud can be used by both the college's IT administrator and its IT consultant company which has access to the learning management system (LMS) application hosted in the cloud.
Read more on cloud computing here: brainly.com/question/17247526
#SPJ1
Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service
Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. Software as a service tier of cloud computing best describes Helen's service
This is further explained below.
What is Software?Generally, The term "software" refers to a collection of instructions, data, or programs that are used to control computers and carry out certain activities. In contrast to hardware, which refers to the tangible components of a computer, this refers to the software that runs on the device. The phrase "software" refers to apps, scripts, and programs that may be executed on a device. Software is a general term.
In conclusion, Helen is now providing her clients with a newly developed payroll system that she devised herself. Her clients log in to the AWS-hosted payroll system using the web interface that she provides for them. The layer of cloud computing known as software as a service is the one that most accurately reflects Helen's service.
Read more about Software
https://brainly.com/question/1022352
#SPJ1
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?
The term that is used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity is End-of-life.
What is an Operating System?This refers to the interface that is used to connect the application and system software in a computer and enables it to function.
Hence, we can see that when a particular operating system will no longer be supported by its manufacturer or managing entity, this is known as End-of-life.
Read more about operating systems here:
https://brainly.com/question/1763761
#SPJ1
If the columns to be matched in a join have the same name, you can use the _________ clause followed by the column name.
If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.
What is a clause?A clause is known to be a set or group of words that is said to be made up of a verb which is known to usually have other components.
Note that A clause can be made to form part of a sentence or it is said to be able to a complete sentence itself.
The period of agreement is seen as the contract period that is the number of days that exist between a given start date and its end.
Hence, based on the above, in regards to java, If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.
Learn more about Clause from
https://brainly.com/question/541212
#SPJ1
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router
In this scenario, the next step that you should perform on your router is: D. verify the LAN interface status.
What is a router?A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.
What is IP address?IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.
In this scenario, the next step that you should perform on your router is verifying the status of the local area network (LAN) interface.
Read more on router here: brainly.com/question/24812743
#SPJ1
Complete Question:
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?
Verify the WAN interface status
Check the ARP cache
Check the IP routing table
Verify the LAN interface status
Check the MAC address table
Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs
The cloud access security broker (CASB) approach which is most appropriate for Brian's needs is: D. API-based CASB.
What is an API?API is an acronym for application programming interface and it's a software intermediary (computing interface) that is made up of tools, set of executable codes, and protocols that help software applications and computers to function properly, as well enable the exchange of data.
In Computer technology, an application programming interface (API) is designed and developed to allow a network device and a server or two servers to share data and functionality within the cloud. Also, a software developer integrates an application programming interface (API) into the software.
In this context, we can infer and logically deduce that the cloud access security broker (CASB) approach which is most appropriate for Brian's needs is an API-based CASB.
Read more on API here: https://brainly.com/question/20910074
#SPJ1
Complete Question:
Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs?
A. Inline CASB
B. Outsider CASB
C. Comprehensive CASB
D. API-based CASB
explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
It means that there are people who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.
What is the joke about?This is known to be a popular joke that is often used by people who are known to be great savvy in the field of mathematics.
The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.
The binary system is one that relies on numbers that are known to be in groups of 2.
Therefore, If the speaker of the above phrase is one who is able to understand binary, that person would be able to say that that the phrase is correctly written as "there are 2 types of people that understand binary".
Learn more about binary from
https://brainly.com/question/21475482
#SPJ1
What is a brute force attack? What are the ways you can make it harder for someone to use crack your credentials using a brute force attack?
Explanation:
A brute attack is a method of cracking someone's password/credentials using a predefined set or list of commonly used passwords or from a database leak.
We can prevent our passwords from being brute forced by using a combination of password with no dictionary words and using many symbols and numbers with both upper and lower case characters.
Instruction messages clearly explain how to execute a task. Before writing instructions, be sure you fully understand the process you are explaining. The body of instruction messages should
Instruction messages is one where the body of instruction messages should arrange items vertically with numbers.
What is an Instruction messages?An instructional message is known to be one whose design is said to be a kind of a real-world application of instructional and learning theories that is made to design the tools and technologies that are also known to be used to communicate and rightly pass information
Note that based on the above, Instruction messages is one where the body of instruction messages should arrange items vertically with numbers.
See full question below
Instruction messages clearly explain how to execute a task. Before writing instructions, be sure you fully understand the process you are explaining.
The body of instruction messages should : ___________?
A. divide the instructions into steps
B. avoid numerical lists
C. arrange items horizontally
Learn more about Instruction messages from
https://brainly.com/question/13669320
#SPJ1
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with:
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with byte alignment.
Why is byte alignment important?It is known to be vital because the CPU is said to always reads the word size often (4 bytes on a 32-bit processor).
Therefore, if a person do an unaligned address access using a processor that aids it, the processor will be able to read a lot of words.
Note that the CPU is said to read each word of memory that is said to be requested of the address straddles and as such, If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is likely that we have a problem with byte alignment.
Learn more about bits from
https://brainly.com/question/19667078
#SPJ1
Generic mouse and keyboard drivers are included with the os.
a. true
b. false
Answer:
This is true!
Explanation:
Mouse and keyboard drivers are standard and are usually included with the OS.
The hardware component of a computer system consists of programs written in computer languages. a. True b. False
Answer: true
Explanation:
according to the most typical basic paradigm of programming theory, a computer program is an algorithm written in a programming language, a series of instructions satisfying certain exact conditions and requirements (predefinedness, clear execution, etc.)
Column text that is aligned to both the left and right margins is referred to as?
Answer:
The column text that is aligned to both the left and right is called Justify
Explanation:
When your are in a text editor the aligning of a text can be determinate for four options:
Left alignRight align Center alignJustify alignJustify text is align in both cases (you can proof this with a text editor and testing the differents types of alignements).
Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building
A wireless network topology which would be used by network engineers to design and provide a wireless network service for an entire college building is an: C. infrastructure.
What is wi-fi?Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.
What is a topology?A topology can be defined as the graphical representation of the various networking devices that are used to create and manage a network connection.
In Computer Networking, we can infer and logically deduce that an infrastructure is a wireless network topology which should be used by network engineers to design and provide a wireless network service for an entire college building.
Read more on topology here: https://brainly.com/question/17036446
#SPJ1
Complete Question:
Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?
ad hoc
hotspot
infrastructure
mixed mode
What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?
The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .
What is an incomplete health record or a delinquent health record?
An incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.
Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .
Learn more about chief medical officer from
https://brainly.com/question/18696862
#SPJ1
Silicone rubber and urethane caulks generally give the ____________ overall performance for exterior building envelope applications.
Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications.
What is silicone rubber made from?Silicone rubber is known to be a kind of an elastomer that is said to be made up of silicone that has silicon along with carbon, hydrogen, and oxygen.
Note that Silicone is said to be a form of an inorganic substance, while polyurethane is said to be organic in nature.
The use of thus Silicone rubber and urethane is therefore very essential to building construction.
Hence, based on the above, Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications and this is a true statement.
Learn more about Silicone rubber from
https://brainly.com/question/18902047
#SPJ1
Product with recursive methods using recursion, create a program that will allow for a user to enter 5 numbers. The program will provide the product of all 5 numbers using recursive methods. Submit screenshots of your program?s execution and output. Include all appropriate source code in a zip file. Java.
Given a product with recursive methods using recursion, the program that will allow for a user to enter 5 numbers is given below.
What program will allow for a user to enter 5 numbers is given below?import java.util.Scanner;
class Main
{
public static void main(String[] args)
{
int[] arrray = new int[5]; // variable declaration
Scanner s = new Scanner(System.in); // scanner declaration
System.out.print("Enter five numbers:");
for(int i=0;i<5;i++) // Loop runs from 0 to 4 total 5 times
arrray[i] = s.nextInt(); // Accept array elements
System.out.println("Multiplication of 5 numbers is "+multiply(arrray,4)); // calling function
}
public static int multiply(int x[], int count) // Called function
{
if(count<0)
return 1; // It return 1
return x[count] * multiply(x, --count); // recursive calling
}
}
Learn more about programs:
https://brainly.com/question/26134656
#SPJ1
A technician is troubleshooting a slow wlan and decides to use the split-the-traffic approach. which two parameters would have to be configured to do this?
Answer:
Configure the 5 GHz band for streaming multimedia and time sensitive traffic & Configure the 2.4 GHz band for basic internet traffic that is not time sensitive.
explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
In Binary language 10 stands for two. So this means that there are 2 types of people, one who understand binary and others who don't.
The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the:________
The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.
What is operational stress continuum model?The combat operational stress continuum was designed by the United States Navy and Marine Corps as indicator for injury.
It has different color depending on the severity of injurie and it is used to measure how much of deployment-related stress.
The color ranges from green which is ready to yellow which means reacting and orange which means injured.
Therefore, the combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.
Lear more on leader below
https://brainly.com/question/12522775
#SPJ1
When a device renews its dhcp lease, which two steps in the dhcp process are skipped?
When a device renews its DHCP lease, the two steps in the DHCP process that are skipped are discover and offer. The correct options are a and e.
What is the DHCP lease?DHCP is an IP address provisionally assigned to a networked device. Each client connected to the network while an IP address pool is managed using DHCP is merely “renting” an IP address.
As a result, DHCP servers only handle IP addresses that are valid for a specific amount of time. So in this discovery of DHCP and offers are skipped because they are not important.
Thus, the correct options are a and e.
To learn more about DHCP lease, refer to the below link:
https://brainly.com/question/14696764
#SPJ1
Your question is incomplete. Your most probably complete question is given below:
a discover
b renew
c request
d ACK
e offer
Trevor knows that he must be organized if he wants to develop good software. he decides to use __________ to create a budget, manage workloads, and plan the overall development of new software.
Trevor decides to use MS project to create a budget, manage workloads, and plan the overall development of new software.
What MS Project function as?Microsoft Project is known to be a kind of a project management software that is known to be often used to make schedules, project plans and also to handle resources and to know about time.
It has features is made up of Gantt charts, kanban boards, project calendars and others.
Note that Trevor wants to use Microsoft Project, which is said to be a project management tool that aid him as well as other users to plan, create, control, and handle a project's budget and resource.
Therefore, Trevor decides to use MS project to create a budget, manage workloads, and plan the overall development of new software.
Learn more about MS project from
https://brainly.com/question/2704239
#SPJ1
What does a router do with a packet that it does not have a destination network for?
A router that does not have a destination network for a packet would do the following: B.) Drops the packet.
What is a router?A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.
What is IP address?IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.
In Computer Networking, it is a standard occurrence or phenomenon for a router to drop the packet it receives when it does not have a destination network for the packet.
Read more on router here: brainly.com/question/24812743
#SPJ1
Complete Question:
What does a router do with a packet that it does not have a destination network for?
A.) Sends it to the Serial port
B.) Drops the packet
C.) Sends it back out the same interface it received it in
D.) Forwards the packet to the next hop
Participating in pi planning enables teams to gain alignment and commitment around a clear set of what?
Participating in pi planning enables teams to gain alignment and commitment around a clear set of prioritized objectives.
What is planning?Planning is a form of management function, that involves thinking regarding the activities or project to be done in other to decide beforehand on things to do.
It also involves how the task or assignment is carried out to get a specified result.
Human resource to be used, materials and possible time frame are involved in planning. It is on of the major objectives in effective business or project management.
Therefore,
Participating in pi planning enables teams to gain alignment and commitment around a clear set of prioritized objectives.
Learn more on Planning below
https://brainly.com/question/25453419
#SPJ1
What tool allows you to discover, cleanse, and transform data with built-in operations?
Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.
What is meant by data cleaning?Data cleaning is known to be the act putting together or the fixing/removing any data that is found to be incorrect, corrupted, or one that is incorrectly formatted, copied , or incomplete data that is seen inside a dataset.
Note that in combining multiple data sources, there are a lot of room for for data to be copied or mislabeled.
Watson Studio Refinery, which is known to be obtained via IBM Watson Studio is said to be a tool that allows a person to discover, cleanse, and transform data using built-in operations.
Therefore, Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.
Learn more about data cleaning from
https://brainly.com/question/13085801
#SPJ1
If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab?
If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab, ne need to Select the word.
What does it mean to format something in MS word?Formatting text in regards to Microsoft Word is known to be a term that is seen as the act of controlling how a given text appears in a document.
Note that in this, its includes the size, color, and font and thus, one need to select the word before anything or any changes can be made or can be done to it.
Hence, based on the above, If you want to format one word in a text box as bold, what do you need to do before you click the bold button on the home tab, ne need to Select the word.
Learn more about format from
https://brainly.com/question/766378
#SPJ1