which windows server 2019 footprint installation option is ideal for use within cloud environments that require the hosting of web apps and supporting services only?

Answers

Answer 1

When merely hosting web apps and associated services are needed in cloud environments, Windows nano server is the best choice.

Which of the above Windows Server installation choices has the smallest environmental impact?

When you deploy Windows Server's Standard or Datacenter edition, you have the option of installing as little as possible with the Server Core option. Most server roles, but not all, are included in Server Core. Due to its lower code base, Server Core has a smaller attack surface and a smaller disk footprint.

What variations exist in Windows Server 2019?

Essentials, Standard, and Datacenter are the three editions of Windows Server 2019. They are intended for different sizes of enterprises with various virtualization and datacenter needs, as their names would suggest.

To know more about cloud  visit:-

https://brainly.com/question/29853772

#SPJ4


Related Questions

what will be the output of the following python code def printmax(a b)

Answers

The maximum number of results from the following Python code is 4.

Let us first understand the logic behind the code

This print max function has 2 if-else and an else statement.

The function receives two parameters.

The 1st if checks the if a is greater than b.

In the 2nd elif we check if a is equal to b.

In the else, simply b becomes maximum.

Now, let us understand the code.

def printmax(a, b):   defines a function that takes 2 parameters

if a>b:   checks if a >  b.   If it is true, then we print that a is the maximum.

elif a==b:   checks if a = b.   If it is true, then we print that a is equal to b.

else is executed if none of the if conditions are executed.

printmax(3,4)  calls the function with parameters a = 3 and b = 4.

Here,  the else is executed, since no condition is satisfied.

So, the output is 4  is maximum

Python is a popular computer programming language for creating websites and software, automating processes, and performing data analysis. Python is a general-purpose language, which means it may be used to make a wide range of programs and isn't tailored for any particular issues.

Learn more about Python here:

https://brainly.com/question/28366332

#SPJ4

The complete question is:

What will be the output of the following Python code?

1. def printMax(a, b):

2. if a > b:

3.print(a, 'is maximum')

4.elif a == b:

5.print(a,' is equal to', b)

6. else:

7.print(b, 'is maximum')

8. print max(3, 4)

A)4 is maximum

B)4

C)3

D)None of the mentioned

how to identify open ftp servers that belong to government agencies

Answers

FTP is used to represent dedicated servers with one or more FTP clients and requires TCP/IP to work. Once the customer requests the requested content be downloaded from an FTP server.

Over a TCP network or Internet connection, an FTP client enables the dual-direction transmission of data and files between two computers. The host computer serves as the client and the remote FTP server serves as the main server in an FTP client's client/server architecture. SFTP, a file transfer protocol that runs over the Secure Shell protocol (SSH), the protocol that has mostly replaced telnet, has essentially superseded FTP, which still has a few uses but has fallen out of favor on the modern internet due to security concerns.

Learn more about network here-

https://brainly.com/question/14276789

#SPJ4

the optimal page replacement algorithm is a. implemented in most virtual memory management systems. b. used only in the fifth generation computers. c. used mostly for evaluating other page replacement algorithms. d. a practical algorithm for realizing virtual memory management

Answers

The best page replacement algorithm is optimal page replacement since it yields the fewest page flaws.

What differs LRU from optimum page replacement?

The LRU page replacement algorithm monitors memory page utilization over a brief period of time. In contrast, the LFU page replacement method removes the page that has had the minimal views in a specific amount of time. The page in the memory that has been idle for the longest time is eliminated by LRU.

Which algorithm for page replacement is not actually feasible?

The algorithm known as the "Optimal Page Replacement" replaces pages that won't be accessed for a while. Despite the fact that it cannot be effectively implemented.

To know more about optimal page algorithm visit:

https://brainly.com/question/29408916

#SPJ4

what are the two viewpoints of upl

Answers

Our core conviction at UPL is that "nothing is impossible." Our CSR initiatives are guided by the two main UPL principles "Always Human" and "OpenHearts."

Crop protection and speciality chemicals are produced and distributed globally, offering farmers solutions to maximize agricultural output through cutting-edge and affordable products, giving customers better value for their money. Agrochemicals, industrial chemicals, speciality chemicals, and chemical intermediates are all produced and sold by UPL Limited, formerly known as United Phosphorus Limited, an Indian multinational corporation that also provides crop protection services. Our core conviction at UPL is that "nothing is impossible." Our CSR initiatives are guided by the two main UPL principles "Always Human" and "Open Hearts."

Learn more about speciality here-

https://brainly.com/question/28331255

#SPJ4

which protocol does putty use to establish encryption key with the ssh server

Answers

PuTTY uses the SSH protocol (Secure Shell) to establish an encrypted connection with the SSH server.

What is the  protocol?

The protocol is a set of rules and regulations that govern how two or more entities should interact with each other. It can be used for communication between computers, networks, application program, and for the exchange of data. The protocol defines the way information is formatted and transmitted, and how each end of the communication should react to the transmission. Protocols are necessary to ensure that data is transmitted accurately and reliably. By establishing a set of rules, both parties can be sure that the information being transmitted is in the correct format and is being sent and received correctly. Protocols are also necessary to ensure the security of the data being transmitted, by encrypting the information and verifying the source of the data.

To learn more about  protocol

https://brainly.com/question/29338740

#SPJ1

mary has a laptop that uses a 64-bit processor. she complains that she cannot run older 32-bit applications on her laptop, but her friend can run these older applications on her 64-laptop.

Answers

There are several reasons why Mary may not be able to run older 32-bit applications on her laptop, even though her friend can run these same applications on her 64-bit laptop. Some of the possible reasons include:

Operating System: Mary's laptop may be running a 64-bit operating system that does not support 32-bit applications, while her friend's laptop may be running a 64-bit operating system with built-in support for 32-bit applications.Hardware Compatibility: Mary's laptop may have hardware components that are not compatible with older 32-bit applications, while her friend's laptop may have more compatible hardware components.Software Configuration: Mary's laptop may have software settings or configurations that are preventing older 32-bit applications from running, while her friend's laptop may have different software settings or configurations that allow for the running of these applications.Driver Issues: Mary's laptop may have outdated or missing drivers for certain hardware components that are required by older 32-bit applications, while her friend's laptop may have more up-to-date or complete drivers.

To resolve this issue, Mary may need to upgrade her operating system to a version that supports 32-bit applications, install compatibility layers or virtualization software to run older 32-bit applications, or find alternative versions of the applications that are compatible with her laptop's hardware and software configurations.

Learn more about Operating System here:

https://brainly.com/question/24760752

#SPJ4

shivam has a broken laptop screen and needs to replace the screen. while doing research to find a new screen, he discovers that the laptop screen he is replacing does not have a backlight. what kind of screen does shivam need to order for his laptop?

Answers

OLED would be the next logical jump, but the per-inch cost is still massive and it'll probably be usurped by LED-backlit for consumer goods. Perhaps you could investigate the few remaining SED manufacturers…

Credit: https://superuser.com/questions/149355/are-there-computer-monitors-that-dont-use-backlight-technology

different software qualities always complement each other;

Answers

A good software system can be created by combining features of software like usability, performance, scalability, security, dependability, maintainability, and extensibility.

Software attributes are crucial aspects of a software system that affect its effectiveness. The software's usability is evaluated based on how simple it is to use. The software's performance is a gauge of how quickly it can complete tasks. The capacity of a piece of software to scale up or down to meet user needs and expectations is known as scalability. Security measures how protected against unauthorized access the software is. The software's ability to complete its intended tasks correctly and consistently is measured by its reliability. The software's maintainability is determined by how simple it is to update and maintain. How quickly the software may be adjusted and extended to meet evolving demands and requirements is referred to as extensibility. All these traits function a successful and efficient software system together. Software developers may guarantee that the software they develop is of the highest quality and satisfies the user's needs by combining these various features.

Learn more about software here-

brainly.com/question/29946531

#SPJ4

how to cite ohio revised code apa

Answers

To cite the Ohio Revised Code in APA, use the format: "Legislature. (Year). Title of code (Section number). Ohio Revised Code. Publisher."

APA (American Psychological Association) is a citation style used in academic writing in the social sciences. To cite the Ohio Revised Code in APA format, you need to include the following information:

Legislature: The entity responsible for creating the law code, which is usually the state or national government. In this case, it is the Ohio Legislature.Year: The year of the edition of the Ohio Revised Code being cited. For example, 2021.Title of code: The name of the specific section of the Ohio Revised Code that you are referencing, such as "Education."Section number: The number or identifier of the specific section being referenced. For example, "Chapter 3313."Ohio Revised Code: The name of the code being cited. This remains constant in all citations.Publisher: The entity responsible for publishing the Ohio Revised Code, such as LexisNexis.

This information is then arranged in the following format:

Legislature. (Year). Title of code (section number). Ohio Revised Code. Publisher.

For example:

Legislature. (2021). Education (Chapter 3313). Ohio Revised Code. LexisNexis.

In APA style, it's important to make sure you use the correct and most recent edition of the code, and that the publisher information is accurate.

Learn more about APA here:

https://brainly.com/question/30229046

#SPJ4

Using a post-test while loop, write a program that lets users enter N floating point numbers and then calculates and displays their product. The value of N must be given by the user in the beginning of the program. Python CodeHs

Answers

a = int(input("Input an integer : "))

n1 = int( "%s" % a )

n2 = int( "%s%s" % (a,a) )

n3 = int( "%s%s%s" % (a,a,a) )

print (n1+n2+n3)

is this what you want?

48.based exclusively on your review of structured and unstructured data, do you think it should be possible to implement a drug-drug interaction check in the ehr? why or why not?

Answers

Yes, it's possible to implement a drug-to-drug interactions check in the EHR because of the CPOE.

What is drug-drug interaction?

When two or more medications interact with one another, drug-drug interactions happen. There's a chance that this drug-drug interaction will have an unanticipated negative effect.

Healthcare practitioners can enter patient care orders using the computerized physician order entry (CPOE) tool, including requests for lab tests and blood testing.

Therefore, the CPOE makes it easy to incorporate drug-to-drug interaction screening in the EHR.

To learn more about drug-drug interaction, refer to the link:

https://brainly.com/question/12926373

#SPJ1

why is the first program increment (pi) the most crucial to facilitate?

Answers

The first program increment is important since it establishes the project's success. It outlines the scope, creates the processes, and sets the expectations for the project.

Because it establishes the tone for the whole project and creates the groundwork for success, the first program increment (PI) is the most important to facilitate. It is the first chance to set expectations, specify the project's parameters, and declare its purpose. Additionally, it outlines the project's procedures and processes, including the methods for tracking and evaluating activities and deliverables. The first PI provides the first chance to evaluate any potential dangers to the project. Finally, the first PI offers the chance to establish the project's timeframe and milestones as well as to foster shared understanding among stakeholders. Making ensuring the project is effectively managed and stays on course for success depends on all of these variables.

Learn more about program here-

brainly.com/question/11023419

#SPJ4

Why is Python more commonly used in data science and machine learning than Java?

Answers

Python's simplicity, adaptability, and readability make it more popular in data science and machine learning. A large range of tools and frameworks are also available, which facilitate the implementation of data science and machine learning algorithms.

One of the most widely used programming languages in data science and machine learning is Python. There are several causes for this. Python is an accessible language for those with little to no programming experience since it is simple to learn. In addition, compared to other programming languages like Java, its grammar is very clear and uncomplicated, making it simpler to read and comprehend. A vast range of modules and frameworks in Python also facilitate the implementation of data science and machine learning methods. For instance, Python contains well-known libraries for numerical computation like NumPy and SciPy as well as libraries for data analysis like Pandas and Scikit-learn.

Learn more about machine here-

brainly.com/question/7172766

#SPJ4

in what sense are u.s. farms now digital firms? explain your answer

Answers

Due to major technological advancements and the fact that they need less labor, u farms are now considered digital businesses.

Software and equipment used in farming operations have progressed. Farmers can now keep an eye on their fields, control equipment, and check agricultural yields, among other things. The administration of crops, livestock, and other agricultural operations using digital technologies is known as "digital agriculture." Digital agriculture gives farmers the chance to boost output, make long-term financial savings, and reduce risk. Due to major technological advancements and the fact that they need less labor, u farms are now considered digital businesses.

Learn more about digital here-

https://brainly.com/question/18943642

#SPJ4

which menu option would you use to insert the image file into your document? to answer, select to highlight the correct option in the answer area.

Answers

On the INSERT tab, you can add pictures, shapes, SmartArt graphics, tables, and more to take your document to the next level.

Define INSERT tab?The Insert tab contains a variety of items that you can insert into a document. Tables, word art, hyperlinks, symbols, charts, signature line, date & time, shapes, header, footer, text boxes, links, boxes, equations, and so on are examples of these items.Click the Insert Worksheet tab at the bottom of the screen to quickly insert a new worksheet at the end of the existing worksheets.To insert a new worksheet in front of an existing one, select it and then, on the Home tab, in the Cells group, click Insert, and then Insert Sheet.The INSERT() function inserts specified characters or spaces into a character string, starting at the position specified in the string.

To learn more about INSERT tab refer to:

https://brainly.com/question/29486743

#SPJ4

when two things are contact, their molecules. and transfers form the faster-moving molecules to the slower-moving molecules

Answers

Heat is the energy that is transmitted during conduction from quicker atoms to slower-moving atoms, and it actually results in temperature changes.

What are contracts ?

A contract is a written agreement that outlines specific, legally binding rights and duties that apply to a group of people that have reached a consensus. The transfer of commodities, service, money, or a commitment to transmit any of those at a later time are common components of contracts. The damaged party may seek legal remedies like damages or rescission in the event of a contract breach. A treaty is a legally binding agreement between parties under international law.Agreements must be kept, which is the foundation of contract law, a branch of the obligation law that deals with contracts. Contract law differs from jurisdiction to jurisdiction, like other areas of property courts.

To know more about contract visit:

https://brainly.com/question/18451249

#SPJ1

how to install simplerisk on virtualbox

Answers

Here is how to install Simplerisk on VirtualBox:

Download and install VirtualBox on your computerDownload the SimpleRisk virtual machine (VM) from the SimpleRisk websiteImport the SimpleRisk VM into VirtualBoxStart the SimpleRisk VM and log in using the provided credentialsFollow the setup wizard to configure SimpleRisk according to your requirementsNote that it is important to check the system requirements and compatibility before installing SimpleRisk on VirtualBox.

What is VirtualBox?

Oracle VM VirtualBox is an x86 virtualization type-2 hypervisor created by Oracle Corporation.

InnoTek Systemberatung GmbH produced VirtualBox, which was bought by Sun Microsystems in 2008, and was then acquired by Oracle in 2010.

Learn more about Virtual Box:

https://brainly.com/question/29514884?

#SPJ1

Which device can connect many computers and sends data only out of one port?
Repeater
Switch
Hub
Router

Answers

As said, a hub device connects multiple computers and only transfers data outside from one port.

What is a brief explanation of a computer?

A computer is a machine that receive data (in the form that digitalized data) and processes it in accordance with a program, piece of software, or set of instructions that specify how the information should be handled.

What use does a computer serve?

Summary. The following activities are routinely performed by computers as part of their functions: obtaining, processing, returning, and storing data. Online learning can be categorized as game controllers, automation systems, output devices, and memory sticks, in that order, to assist computer systems in carrying out these tasks.

To know more about Computer visit:

https://brainly.com/question/23275071

#SPJ4

if you want to trigger a flow when someone submits their email to a signup form, would you use a list or segment as the flow trigger?

Answers

You would use a "segment" as the flow trigger. A segment is a group of contacts that meet specific criteria, and triggering a flow for a segment allows you to automatically perform actions on all contacts in the group.

A list, on the other hand, is a simple collection of contacts, and while it can be used to segment your contacts in certain ways, it is not typically used as a trigger for a flow.

A flow in marketing automation refers to a series of automated actions that are triggered by a specific event or set of conditions. Flows are used to automate repetitive or complex tasks, allowing marketers to save time and increase efficiency.

There are several types of triggers that can start a flow, including form submissions, website visits, email opens, and more. In this case, if you want to trigger a flow when someone submits their email to a signup form, you would use a "segment" as the trigger.

A segment is a group of contacts that meet specific criteria, such as location, behavior, or demographic information. Segments are dynamic and automatically update as new data is added to your contacts' profiles. When a new contact is added to a segment, it will automatically trigger the flow. For example, if you have a segment of all contacts who have signed up for your newsletter, and you have a flow set up to send an email welcoming new subscribers, this flow will automatically trigger and send an email to each new contact who is added to the segment.

Lists, on the other hand, are a static collection of contacts, and while they can be used to segment your contacts in certain ways, they are not typically used as a trigger for a flow. With a list, you would need to manually add or remove contacts, which can be time-consuming and prone to error.

To know more about trigger flow visit: https://brainly.com/question/29458662

#SPJ4

how to pay us visa application fee in nairobi

Answers

Immigrant visa processing has restarted at the American Embassy in Nairobi. Your nonimmigrant visa application (NIV) cost can be paid online with a debit card, which is the most practical payment option.

When on the payment screen after logging into your profile, you can choose to pay using a debit card. Print your receipt after paying the visa application cost so you have it for your records.

Expect delays at most points during the visa application process for all candidates.

Basic details on DNA testing: Genetic testing may be a helpful technique for confirming the link when a biological connection is the foundation for immigration to the United States in the lack of adequate other proof. The Department presently accepts only DNA testing as a biological relationship-establishing technique.

The DNA unit will get in touch with you when it is time to go forward with instructions if DNA was suggested in your situation.

Learn more about Application here:

https://brainly.com/question/28206061

#SPJ4

team members at drop-off should be working out of which queue to address prescriptions needing action?

Answers

The team members at drop-off should be working out of To-Do Queue to address prescriptions needing action

What is the Queue about?

A To-Do queue is a list of tasks or items that need to be accomplished or completed in a specific order. This can be used in various settings, including work or personal life, to prioritize and manage tasks and ensure that nothing is overlooked or forgotten.

Therefore, The To-Do queue can be in the form of a physical list, an electronic document or software application, or a combination of both. The items in the queue can be assigned due dates, deadlines, or flagged for priority, and the list can be updated and rearranged as necessary to reflect changing priorities or circumstances.

Learn more about Queue form

https://brainly.com/question/24275089

#SPJ1

2.find an example of repetition in this sermon. what does he repeat and what is the effect he is trying to create?

Answers

Throughout the sermon, he says, "God is with us." He wants to give the listeners a sense of security data and comfort by reassuring them that God is with them at all times.

The phrase "God is with us" is used frequently by the preacher throughout the sermon. God is always with us, no matter what, and this repetition is used to underline that. He repeats the phrase "God is with us" throughout the sermon. By assuring the audience that God is with them always, he hopes to offer them a sense of security and peace. The purpose of this repetition is to reassure and comfort the listener by serving as a constant reminder that God is with them no matter what. The message of consolation and assurance that God is with them becomes more potent as a result of the repeating of this statement, which aids in forging an emotional connection with the audience.

Learn more about data here-

brainly.com/question/11941925

#SPJ4

what is an example of applying cadence and synchronization in safe

Answers

Conducting a PI planning meeting is an example of applying cadence and synchronization in safe.

In Java, synchronization refers to the ability to manage how many threads access any shared resource. The multithreading concept involves numerous threads attempting to access shared resources simultaneously in order to cause erratic outcomes. Synchronization is required for trustworthy thread-to-thread communication.

The Java language's synchronized keyword was used to provide a synchronization mechanism. The locking mechanism, which is supported by Java Virtual Machine, is constructed on top of it (JVM). Classes and variables cannot use the synchronized keyword; they can only be used with methods and blocks. A vital portion of code is created using a synchronized keyword in Java. The thread needs to get the lock on the appropriate object in order to access the vital area.

Learn more about  synchronization here:

https://brainly.com/question/14943337

#SPJ4

the number_bucket class will contain a dynamic sized lifo data structure

Answers

The number bucket class will include a dynamically sized LIFO data structure. code for the following

#include<vector>

using namespace std;

template<typename T>

class Number_bucket{

vector<T> v;

public:

Number_bucket(){

v.reserve(100);

}

void push(const T d){

v.push_back(d);

}

void pop(){

v.pop_back();

}

T top() const{

return v[v.size()-1];

}

bool isEmpty() const{

return v.size()==0;

}

int getSize(){

return v.size();

}

};

main.cpp Driver

#include<iostream>

#include "number_bucket.h"

using namespace std;

int main()

{

Number_bucket<char> s;

for(int i=0;i<5;i++){

s.push(65+i);

}

while(!s.isEmpty()){

cout<< s.top()<<endl;

s.pop();

}

Number_bucket<int> n;

for(int i=1;i<=10;i++){

n.push(i);

}

cout<<"Size of integer stack: "<<n.getSize()<<endl;

while(!n.isEmpty()){

cout<< n.top()<<endl;

n.pop();

}

return 0;

}

A data structure in computer science is a format for managing, organizing, and storing data that is typically selected to allow for quick access to data. A data structure, or algebraic structure concerning data, is more specifically a collection of data values, the relationships between them, and the functions or operations that can be applied to the data.

Learn more about data structure here:

https://brainly.com/question/24268720

#SPJ4

what is network surface in computer network

Answers

The term "network surface" refers to the components of a computer network that are susceptible to assault, including servers, routers, and other attached devices. It outlines how a network's weaknesses might be used by bad actors to their advantage.

The term "network surface" refers to the components of a computer network that are susceptible to assault, including servers, routers, and other attached devices. It outlines how a network's weaknesses might be used by bad actors to their advantage. The likelihood of a successful assault increases with the size of the network surface. The network's exposed services, protocols, and applications, as well as the underlying hardware and software, can all be included in the network surface. The operating system, service ports, and other open ports fall under this category. A bigger network surface also allows for more data to be captured, which can be advantageous for hostile actors since they can utilise it to carry out more complex attacks.

Learn more about server here:

brainly.com/question/28384347

#SPJ4

The is_positive function should return True if the number received is positive and False if it isn't. Can you fill in the gaps to make that happen?def is_positive(number):if number > 0:return Trueelse:_____

Answers

else: If the number received is less than 0, the method will return False. This is so that the function can determine whether the number is positive or not; if it is not more than 0, it must be a number that is negative or zero, which would not be regarded as a positive number.

The is positive function determines whether or not the received number is positive. This is accomplished by comparing the value to 0. The function will return True, indicating that the integer is positive, whether the number is positive or not; if it is not more than 0, it must be a number that is negative or zero, which would not be regarded as a positive number. if the value is larger than 0. The function will return False, indicating that the value is not positive, if the integer is not larger than 0. This is due to the fact that any number less than 0 is either negative or 0 and neither of them are regarded as positive numbers.

Learn more about functions here-

brainly.com/question/28939774

#SPJ4

Which of the following features of Azure networking enables the redirect of Internet traffic back to the company's on-premises servers for packet inspection?
a. User Defined Routes
b. Cross-premises network connectivity
c. Traffic Manager

Answers

network traffic can be redirected to the business's on-site servers for packet inspection using User Defined Routes. With the help of this capability, administrators may create routing rules that regulate how traffic moves across various networks.

A component of Azure networking called User Defined Routes makes it possible to reroute Internet traffic to the business's on-premises computers for packet analysis. With the help of this capability, administrators may create routing rules that regulate how traffic moves across various networks, including those that are hosted on-premises and in the cloud. Traffic can be sent to the business' on-premises servers for more granular inspection and monitoring by creating User Defined Routes. This function is particularly helpful for preventing the exposure of sensitive information to hostile actors or other unauthorised people. Additionally, it can be used to guarantee that only authorised users or machines are able to access particular network portions or services. Organizations can make sure that their on-premises environment is secure by using User Defined Routes.

Learn more about network here:

brainly.com/question/29970297

#SPJ4

A user reports trouble using a corporate laptop. The laptop freezes and responds slowly when documents occasionally disappear. The task list shows the following results: Name CPU% Memory Network % Calculator 0% 4.1MB 0Mbps Chrome 0.2% 207.1MB 0.1Mbs Explorer 99.7% 2.15GB 0.1Mbs Notepad 0% 3.9MB 0Mbs Which of the following is MOST likely the issue?
A. RAT
B. PUP
C. Spyware
D. Keylogger

Answers

Keylogger is most likely the issue. Hence, option D is correct.

What is Keylogger?

Without changing best practices and operational procedures, Oracle Cloud VMware Solution enables businesses to swiftly move their VMware installations from data center hardware to Oracle Cloud Infrastructure.

Using a fully autonomous database will make all workloads easier to manage. Utilize Autonomous Data Warehouse to create a self-service data warehouse. With autonomous transaction processing, applications' runtime costs can be reduced. Autonomous JSON Database can hasten the development of applications that focus on JSON.

Thus, option D is correct.

For more information about Keylogger, click here:

https://brainly.com/question/28610948

#SPJ1

who can view drawing markups on your 'personal' layer? a. only you b. you and 'admin' level users on the drawings tool c. you and the project's architect d. all users that have read-only access to the drawing

Answers

"who can view drawing markups on your 'personal' layer":

a. only you

"only you" implies that the personal layer and its markups are only accessible and visible to the user who created them, offering the highest level of privacy.

It depends on the specific configuration of the drawings tool and access control settings.

The options listed (a, b, c, d) could be possible, but without more information, it is difficult to say definitively. It would be best to consult the tool's documentation or seek clarification from the administrator to determine who can view markups on your personal layer.

The specific configuration of the drawings tool, as well as the access control settings in place, will determine who can view markups on your personal layer.

Option (b) "you and 'admin' level users on the drawings tool" suggests that the personal layer is accessible only to the user who created it, and to administrators who have elevated privileges and permissions within the drawings tool.

Option (c) "you and the project's architect" implies that the personal layer is accessible and visible to both the user who created it and to the project's architect.

Option (d) "all users that have read-only access to the drawing" suggests that the personal layer and its markups are accessible and visible to all users who have read-only access to the drawing.

To know more about drawing markups, click on the link below:

brainly.com/question/11999225

#SPJ4

the three-level memory hierarchy refers to? a. main memory, disk storage, and removable storage b. registers, cache memory, and main memory c. cache memory, main memory, and disk storage d. main memory, dvd, and usb sticks

Answers

The three-level memory hierarchy refers to cache memory, main memory, and disk storage.

Cache memory is the smallest, fastest, and most expensive memory and is used to store recently used information. Main memory is larger and slower than cache memory and is used to store information that is currently being used. Disk storage is the largest and slowest type of memory and is used to store information that is not frequently used.

The three-level memory hierarchy is the basic structure of computer memory and is composed of three levels of memory. Cache memory is the smallest, fastest, and most expensive type of memory, and is used to store recently used information.

Learn more about three-level memory hierarchy:

https://brainly.com/question/14207493

#SPJ4

Other Questions
how to search analytics cloud 15- quantity of helmets sold to dc bikes in 2018 in tableau Which of the following is the best version of the underlined portion of sentence 14 (reproduced below)? The First and Second World Wars dampen enthusiasm for saengerfests in the United States, as anti-German sentiment rose in the midst of these conflicts. the purpose of a statement of cash flows is to provide information about the_____multiple choice question. A. income and related expenses during the period. B. cash receipts and cash disbursements during a period. C. assets, liabilities, and stockholders' equity used during the period. D. assets used during the period. the introductory passage describes the way in which vibrio cholerae bacteria obtain genes from their prey. based on the information in the introductory passage and in the chapter, what type of gene transfer is this? Which equation is an equation of a circle with a radius of 3 and its center is at (5, -2)?Responses(x - 5) + (y + 2) = 9(x + 5) + (y - 2) = 9(x - 5) + (y + 2) = 3(x + 5) + (y 2) = 3 A major city in a particular state is a center for businesses that assemble personal computers. Components for these computers are manufactured elsewhere in the state and in other states, then shipped to this city, where the computers are assembled. An ordinance of the city imposes a special license tax on all of the many companies engaged in the business of assembling computers in that city. The tax payable by each such company is a percentage of the company's gross receipts. The state statute that authorizes municipalities to impose this license tax has a "State content" provision. To comply with this provision of state law, the city license tax ordinance provides that the tax paid by any assembler of computers subject to this tax ordinance will be reduced by a percentage equal to the proportion of computer components manufactured in the state. A prominent company assembles computers in the city and sells them from its offices in the city to buyers throughout the United States. All of the components of its computers come from outside the state. Therefore, the company must pay the city license tax in full without receiving any refund. Other city computer assemblers use components manufactured in the state in varying proportions and, therefore, are entitled to partial reductions of their city license tax payments. Following prescribed procedure, the company brings an action in proper court asking to have the city's special license tax declared unconstitutional on the ground that it is inconsistent with the negative implications of the commerce clause.In this case, the court should rule MAINTENANCEUNIT 1: Understanding SentencesStatements and Questions (page 4) Commands andExclamations (page 6) Write each sentence with thecorrect end punctuation.1. Is there a puppy in the box2. Come here, little puppy3. She will be my new friend4. Oh, you are adorableSubjects in Sentences (page 8) Predicates in Semences(page 10) Draw one line under the subject and two linesunder the predicate.5. Rick takes a picture of the dog.6. The picture looks clear.7. The dog barks happily.8. The day is warm and sunny.9. Rick snaps a picture of the trees.10. Pink flowers fall from the trees.UNIT 3: Understanding NounsSingular Nouns and Plural Nouns (page 68) PluralNouns with ies (page 70) Write singular or plural next toeach underlined noun.11. My brother is a good cook.12. He picks cherries from the tree.13. He will make pies.14. I cannot wait for dinner.15. Three ladies will eat with us. Please help me I really need it What is section 230 of the communications decency act? If the equation has one solution,what number CAN'T the value ofh be?h(- 2x + 5) = 4x + 5 the number of personal financial records a household has to organize may seem overwhelming. how long should you keep copies of your tax returns?' The share of the total FDI stock accounted for by which of the following countries increased markedly from 1980 to 2005?A. United StatesB. FranceC. United KingdomD. Netherlands briefly summarize the arguments against the effectiveness of polygraphs. why are polygraphs still used if evidence shows them to be so wrong? explain the difference between a dominant negative mutation and haploinsufficiency at the molecular level. an enzyme, encoded by gene a, converts substrate x into product y. individuals with a rare dominant mutation in gene a have severe neurological symptoms. if you could purify protein a from affected and unaffected individuals, how would you determine if the symptoms were caused by a dominant negative mutation versus haploinsufficiency. in your answer, explain your experimental results. A macroscopic sample of an element contains an incredibly large number of atoms, all of which have identical _______. Atoms of one element differ in properties from atoms of all other elements. What years do many consider the modern age of computing to have begun? a. 1960s and 1970s b. 1940s and 1950s c. 1950s and 1960s d. 1930s and 1940s Aetna strictly enforces our enrollment procedures. If you receive an Enrollment Process Exception Notice, your immediate action will be required in order to avoid any disciplinary actions, which may include___________________. how does the concept vocabulary help express both the difficulties and the possible rewards of the struggle for equality? one prediction of global warming is the melting of global ice, which may result in coastal flooding. a criticism of this prediction is that the melting of icebergs does not increase ocean levels any more than the melting of ice in a glass of water increases the level of liquid in the glass. is this a valid criticism? does the melting of an ice cube in a cup of water raise the level of the liquid in the cup? why or why not The speaker begins the poem by stating I come back to your youth, my Nana (line 1), but the primary transformation sought overall is