Answer:
Storage.
Explanation:
I ran into this question before
Answer:
Storage
Explanation:
I've seen this question in a quiz before.
"ICT in education is very helpful for all types of learner" justify
"ICT in education is very helpful for all types of learner" because:
ICTs is one that often boast the quality of educationIt increases the learner motivation and also their engagement in learning.It boast or quickens the acquisition of a lot of basic skills.It is known to often enhance teacher training. What are the benefits of using ICT in education?ICTs are known to be a kind of transformational tools that when it is used in the right way can lead to a shift to a form of learner-centered environment.
The Advantages of ICT are:
They are known to be Cost Effective. They are known to be AutomatedThey tend to act as a Bridging of cultural divide. They help in the Creation of new jobs.Therefore, "ICT in education is very helpful for all types of learner" because:
ICTs is one that often boast the quality of educationIt increases the learner motivation and also their engagement in learning.It boast or quickens the acquisition of a lot of basic skills.It is known to often enhance teacher training.Learn more about ICT from
https://brainly.com/question/20717870
#SPJ1
explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
In Binary language 10 stands for two. So this means that there are 2 types of people, one who understand binary and others who don't.
Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service
Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. Software as a service tier of cloud computing best describes Helen's service
This is further explained below.
What is Software?Generally, The term "software" refers to a collection of instructions, data, or programs that are used to control computers and carry out certain activities. In contrast to hardware, which refers to the tangible components of a computer, this refers to the software that runs on the device. The phrase "software" refers to apps, scripts, and programs that may be executed on a device. Software is a general term.
In conclusion, Helen is now providing her clients with a newly developed payroll system that she devised herself. Her clients log in to the AWS-hosted payroll system using the web interface that she provides for them. The layer of cloud computing known as software as a service is the one that most accurately reflects Helen's service.
Read more about Software
https://brainly.com/question/1022352
#SPJ1
If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is
If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is shared content with no control.
What is the single most vital skill for effective collaboration?The one most vital skill for effective collaboration is when or to give and take critical feedback.
What is file server used for?A file server is known to be a form of a computer that is known to be responsible for the act and the storage and also the management of data files in order that other computers found on the same network can be able to access the files.
Therefore, If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is shared content with no control.
Learn more about file server from
https://brainly.com/question/19551484
#SPJ1
What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?
The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .
What is an incomplete health record or a delinquent health record?
An incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.
Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .
Learn more about chief medical officer from
https://brainly.com/question/18696862
#SPJ1
A(n) __________ is a sequence of primitive data elements stored in sequential storage locations.
An array is a sequence of primitive data elements stored in sequential storage locations
A __________ is more concerned with copying and running code, rather than the code's maintainability or documentation.
Answer: system architect
Explanation:
A system architect is more concerned with copying and running code, rather than the code's maintainability or documentation
The host computer in the computer network ?
Answer:
The host computer in the computer network is any hardware device that has the capability of permitting access to a network through a user interface, specialized software, network address, protocol stack, or any other means.
or it is a computer that offers remotely accessible services to other computers.
The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the:________
The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.
What is operational stress continuum model?The combat operational stress continuum was designed by the United States Navy and Marine Corps as indicator for injury.
It has different color depending on the severity of injurie and it is used to measure how much of deployment-related stress.
The color ranges from green which is ready to yellow which means reacting and orange which means injured.
Therefore, the combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.
Lear more on leader below
https://brainly.com/question/12522775
#SPJ1
Column text that is aligned to both the left and right margins is referred to as?
Answer:
The column text that is aligned to both the left and right is called Justify
Explanation:
When your are in a text editor the aligning of a text can be determinate for four options:
Left alignRight align Center alignJustify alignJustify text is align in both cases (you can proof this with a text editor and testing the differents types of alignements).
Trevor knows that he must be organized if he wants to develop good software. he decides to use __________ to create a budget, manage workloads, and plan the overall development of new software.
Trevor decides to use MS project to create a budget, manage workloads, and plan the overall development of new software.
What MS Project function as?Microsoft Project is known to be a kind of a project management software that is known to be often used to make schedules, project plans and also to handle resources and to know about time.
It has features is made up of Gantt charts, kanban boards, project calendars and others.
Note that Trevor wants to use Microsoft Project, which is said to be a project management tool that aid him as well as other users to plan, create, control, and handle a project's budget and resource.
Therefore, Trevor decides to use MS project to create a budget, manage workloads, and plan the overall development of new software.
Learn more about MS project from
https://brainly.com/question/2704239
#SPJ1
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?
The term that is used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity is End-of-life.
What is an Operating System?This refers to the interface that is used to connect the application and system software in a computer and enables it to function.
Hence, we can see that when a particular operating system will no longer be supported by its manufacturer or managing entity, this is known as End-of-life.
Read more about operating systems here:
https://brainly.com/question/1763761
#SPJ1
The first operation is called the ________ and its purpose is to get the first input value that will be tested by the validation loop
The first input operation is referred to as the priming read, and its main purpose is getting the first input value that would be tested by the validation loop.
The five Vs of big data.In Computer technology, big data comprises five Vs and these include the following:
VolumeVeracityValueVarietyVelocityWhat is input validation?Input validation can be defined as a process that typically involves the inspection of data that has been input (entered) into a software program, in order to ensure it is valid before it is used for any computation.
In Computer programming, the first input operation is referred to as the priming read, and its main purpose is getting the first input value that would be tested by the validation loop.
Read more on big data here: https://brainly.com/question/14273643
#SPJ1
Complete Question:
The first input operation is called the ________, and its purpose is to get the first input value that will be tested by the validation loop.
A. first input
B. loop set read
C. loop validation
D. priming read
The hardware component of a computer system consists of programs written in computer languages. a. True b. False
Answer: true
Explanation:
according to the most typical basic paradigm of programming theory, a computer program is an algorithm written in a programming language, a series of instructions satisfying certain exact conditions and requirements (predefinedness, clear execution, etc.)
Generic mouse and keyboard drivers are included with the os.
a. true
b. false
Answer:
This is true!
Explanation:
Mouse and keyboard drivers are standard and are usually included with the OS.
Vincent is attempting to remotely log into the system using openssh without success. he asks you what he can do to troubleshoot this problem. what should you recommend first?
In the case above, the command that i need to recommend first is option B. Add the -vvv option on to Vincent's ssh command.
What is SSH command?The Secure Shell (SSH) Protocol is known to be one that allows a user to be able to link up to a remotely located computer from the use of a single computer.
Note that this communication is one that often occurs via a secured encryption process. This kind of connection is one that is often used in file transfer and giving other remote commands.
Note that option B. is one that can enlist Vincent's help, and it is also one that can help him to be able to add the -vvv option on to his ssh command. This will help to give a great amount of information that will assist the person to you track down the issue.
Therefore, In the case above, the command that i need to recommend first is option B. Add the -vvv option on to Vincent's ssh command.
Learn more about open ssh from
https://brainly.com/question/17352088
#SPJ1
which things computer case contains
Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.
What is a computer case?The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.
In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.
The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.
It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.
See more about computing at: brainly.com/question/15707178
#SPJ1
Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs
The cloud access security broker (CASB) approach which is most appropriate for Brian's needs is: D. API-based CASB.
What is an API?API is an acronym for application programming interface and it's a software intermediary (computing interface) that is made up of tools, set of executable codes, and protocols that help software applications and computers to function properly, as well enable the exchange of data.
In Computer technology, an application programming interface (API) is designed and developed to allow a network device and a server or two servers to share data and functionality within the cloud. Also, a software developer integrates an application programming interface (API) into the software.
In this context, we can infer and logically deduce that the cloud access security broker (CASB) approach which is most appropriate for Brian's needs is an API-based CASB.
Read more on API here: https://brainly.com/question/20910074
#SPJ1
Complete Question:
Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs?
A. Inline CASB
B. Outsider CASB
C. Comprehensive CASB
D. API-based CASB
what is the meaning of communication
Communication is talking to another person with the medium of language. Sharing your thoughts and words with another person is called communication.
What is the importance of communication?Communication is a medium to share your feelings and thinking with another person through the means of speaking or gestures. The importance of communication is people can talk to each other and be socialized.
Humans are social animals and with the means of communication, they can socialize and live with each other.
Thus, communication is speaking to someone else in a language they can understand. Communication is when you exchange ideas and words with another individual.
To learn more about communication, refer to the link:
https://brainly.com/question/22558440
#SPJ1
Identify the part of the information processing cycle described by each of the items below.
A student types text into a word processing program.
The computer checks and compares all words entered to find misspellings.
The computer shows possible misspellings on the screen.
You save the revised document to the hard disk.
CDs and DVDs are examples of
CDs and DVDs are well known examples of storage devices.
What is a storage device?A storage device can be defined as any tool used to store data in a computer.
A student types text into a word processing program can be defined as an input whereas a computer that checks and compares all words entered to find misspellings refers to processing.
The computer shows possible misspellings on the screen may represent the output and saving documents to the hard disk is storage.
In conclusion, CDs and DVDs are examples of storage devices.
Learn more about storage systems here:
https://brainly.com/question/984226
#SPJ1
Which function is responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning?
Product management is the function is responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning.
What is agile training?This is the term that is used to refer to all of the systematic processes that a team would have to pass through because they would want to improve on the performance of that team. This is done by teaching the concepts of agile to the team or to a particular firm or an organization.
The result when implemented would be an increased performance as well as efficiency of the team that is involved. Hence the product management is responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning
Read more on agile training here: https://brainly.com/question/26079067
#SPJ1
What health issue did Feiler face that led him to consider his family? What was his family situation at this time?
The answers to the question is given below:
What health issue did Feiler face that led him to consider his family?Feiler was known to have bone cancer and this led him to see or recognize his family.
What was his family situation at this time?This was known to have caused him to to be away from his family a lot of times.
Bone tumor or cancer is known to be a kind of mass that is composed of unusual cells that are said to be growing in a bone.
A lot of tumors are treatable and it is good that one discover it early.
Therefore Feiler was said to have bone cancer and this made him to look for his family.
Learn more about cancer from
https://brainly.com/question/11710623
What creates two completely separate user interfaces on the same device, one for work and one for personal use?
A technology which is designed and developed to create two (2) completely separate graphic user interfaces on the same device, one for work and one for personal use is referred to as dual persona technology.
What is technology?Technology can be defined as a field of science that involves the process of creating, applying, and managing scientific knowledge and ideas, so as to effectively and efficiently proffer solutions to various problems and cause an improvement in human life.
What is a dual persona technology?A dual persona technology can be defined as a type of technology which is designed and developed to create two (2) completely separate graphic user interfaces on the same electronic device, one to be used for work and the other one for personal use.
Read more on technology here: https://brainly.com/question/17893201
#SPJ1
What tool allows you to discover, cleanse, and transform data with built-in operations?
Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.
What is meant by data cleaning?Data cleaning is known to be the act putting together or the fixing/removing any data that is found to be incorrect, corrupted, or one that is incorrectly formatted, copied , or incomplete data that is seen inside a dataset.
Note that in combining multiple data sources, there are a lot of room for for data to be copied or mislabeled.
Watson Studio Refinery, which is known to be obtained via IBM Watson Studio is said to be a tool that allows a person to discover, cleanse, and transform data using built-in operations.
Therefore, Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.
Learn more about data cleaning from
https://brainly.com/question/13085801
#SPJ1
If the columns to be matched in a join have the same name, you can use the _________ clause followed by the column name.
If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.
What is a clause?A clause is known to be a set or group of words that is said to be made up of a verb which is known to usually have other components.
Note that A clause can be made to form part of a sentence or it is said to be able to a complete sentence itself.
The period of agreement is seen as the contract period that is the number of days that exist between a given start date and its end.
Hence, based on the above, in regards to java, If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.
Learn more about Clause from
https://brainly.com/question/541212
#SPJ1
Vanessa is creating some graphic images for a page layout. what is the minimum resolution (in dots per inch) for graphic images that vanessa must ensure so that she gets crisp images in the final printed product?
The minimum resolution (in dots per inch) for graphic images that Vanessa exists 300.
What is Website image?Choosing high-quality images that exist interesting, include a good resolution, and stand in an appropriate size will help to create your website look better professional. Avoid images that will be easily dismissed, such as blurry images or images that exist too small.
Note that a website exists one that often utilizes about 700-800 pixels wide. this, therefore, means that an image that is said to be around 400 or 500 pixels wide will bring a lot of space and will be very big on a monitor. Note that The minimum resolution (in dots per inch) for graphic images that Vanessa stands at 300 and less than that will be too big.
In general, the term graphic guides to a design or visual image depicted on a variety of surfaces, including canvas, paper, walls, signs, or a computer monitor. They exist designed for entertainment, branding, or furnishing information. Hence, The minimum resolution (in dots per inch) for graphic images that Vanessa exists 300.
To learn more about Website image refer to:
https://brainly.com/question/26344788
#SPJ4
The complete question is,
Vanessa is creating some graphic images for a page layout. What is the minimum resolution (in dots per inch) for graphic images that Vanessa
must ensure so that she gets crisp images in the final printed product?
A 72
B.300
C. 220
D. 150
E. 120
QUESTION 44 To determine whether a character entered is a letter of the alphabet, use the ________ function. isdigit fromkeyboard alpaok isalpha None of these
In order to determine whether the character you entered is a letter of the alphabet, you should use this function: C. isalpha ().
What is a function?A function can be defined as a named portion of a block of executable code that is written to perform a specific task, which is usually a single, related action.
This ultimately implies that, a function comprises a group of related statements (executable blocks of code) that would only run and return a data whenever it is called by a software program.
In Computer programming, you should use the isalpha () function to determine whether the character you entered is a letter of the alphabet because it would return a true (a non-zero number), if the argument is a letter of the alphabet.
Read more on a function here: brainly.com/question/19181382
#SPJ1
____ is the study of how computers can potentially improve without human programming.
Answer:
Machine Learning and/or Artificial Intelligence (AI)
Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least ________ characters.
Answer: 8 characters
Explanation:
Answer:
10 characters
Explanation:
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router
In this scenario, the next step that you should perform on your router is: D. verify the LAN interface status.
What is a router?A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.
What is IP address?IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.
In this scenario, the next step that you should perform on your router is verifying the status of the local area network (LAN) interface.
Read more on router here: brainly.com/question/24812743
#SPJ1
Complete Question:
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?
Verify the WAN interface status
Check the ARP cache
Check the IP routing table
Verify the LAN interface status
Check the MAC address table