your system administrator shared a usb laser printer connected to your windows 11 system so other users on the network could send jobs to it. a network user has sent a large job to the printer, but the print job has stalled. you try to delete the print job, but can't. which of the following best describes the reason you cannot delete the print job?

Answers

Answer 1

You do not have the Manage documents permission.

Which printer permission would you assign to a user so that they can pause the printer?The Manage Printer permission gives access to functions such as sharing a printer, changing printer permissions, pausing and restarting the printer, changing spooler settings, and changing printer properties.It is feasible to manage printers from a central place thanks to the capability to grant access to a printer on a per-user or per-group basis. An administrator, for instance, may control a printer from a more secure, central position while restricting access to a printer in a public area.By giving a user the Manage Server access, members of the Administrators group can create a full delegated print administrator. The View Server permission is automatically assigned when the Manage Server permission is.

To learn more about printer, refer to

https://brainly.com/question/27962260

#SPJ4


Related Questions

implement the function void heap::downheap(int anindex).using your implementation, test the dequeue function in the heap class. make sure after an insertion the heap property is restored in the binary tree. your algorithm should be correct, and your code should compile.

Answers

The function void heap::downheap(int anindex) algorithm is correct, and your code should compile.

void Heap::ReHeapDown(int index, int bottom)

{     int maxnode, rightnode, leftnode;    

leftnode = index * 2 + 1;  

  rightnode = index * 2 + 2;

    if (leftnode <= bottom)    

{         if (leftnode == bottom)        

   maxnode = leftnode;      

  else  

     {          

  if (m_elements[leftnode] <= m_elements[rightnode])        

        maxnode = rightnode;      

     else  

What is algorithm in programming?

A step-by-step process called an algorithm specifies a series of directives that must be followed in a particular sequence in order to yield the desired outcome.

The fact that algorithms are typically developed independently of the underlying languages means that an algorithm can be implemented in multiple programming languages.

An algorithm has a number of qualities, including clarity, fineness, effectiveness, and language independence. An algorithm's importance is primarily influenced by how well it scales and how well it performs.

When a computer performs calculations or other problem-solving tasks, it must follow a set of instructions called an algorithm.An algorithm is formally defined as a finite set of instructions that are followed in a particular order to complete a specific task.

Learn more about algorithm

https://brainly.com/question/29558545

#SPJ4

A user pays for retail purchase by placing a smart phone next to the merchant's reader.Which of the following mobile connections is used?A. MicroUSBB. BluetoothC. LightningD. NFC

Answers

OLAP (online analytical processing) software is the software to perform various high-speed analytics of large amounts of data from a data center, data mart, or other integrated, centralized data store.

What is the use of Online Analytical Processing (OLAP)?

OLAP provides pre-calculated data for various data mining tools, business modeling tools, performance analysis tools, and reporting tools.

OLAP can help with Planning and Budgeting andFinancial Modeling. Online Analytical Processing (OLAP) is included in many Business Intelligence (BI) software applications. It is used for a range of analytical calculations and other activities.

Therefore, OLAP (online analytical processing) software is the software to perform various high-speed analytics of large amounts of data from a data center, data mart, or other integrated, centralized data store.

Learn more about Online Analytical Processing (OLAP):

brainly.com/question/13286981

#SPJ1

when you think about an ip address using classful addressing rules, an address can have three parts: network, subnet, and host. if you examined all the addresses in one subnet, in binary, which of the following answers best describes that which of the three parts of the addresses will be equal among all addresses?

Answers

Network and subnet parts.

Network and subnet parts.

When using classful IP addressing concepts, addresses consist of three parts: network, subnet, and host. Numbers in a single classful network must share the same network components in order for them to be in the same network. An address must have the same value for both the network and subnet parts. The host portion of different addresses within the same subnet is different. To understand subnets, we must quickly define IP addresses. Each device that connects to the Internet is given a unique IP (Internet Protocol) address in order for data sent over it to reach the correct device among the billions of devices connected to it. Computers read IP addresses as binary information even though they are typically expressed as a string of alphanumeric letters.

To know more about IP address, check out:

https://brainly.com/question/14219853

#SPJ4

Tobias needs to create a network for the sales department, which has 86 users, using the smallest subnet possible. Which of the following is the total number of usable IP addresses that will remain free after creating this subnet?
a. 170 b. 40 c. 168 d. 42

Answers

Since Tobias needs to create a network for the sales department, which has 86 users, using the smallest subnet possible, the option that is the total number of usable IP addresses that will remain free after creating this subnet is option c. 168.

What does an IP address mean?

Internet Protocol address is referred to as an IP address. A set of guidelines known as the Internet Protocol governs online interactions such as sending email, streaming video, and connecting to websites. On the internet, a network or device is identified by its IP address.

An Internet Protocol address is a number associated with a computer network that utilizes the Internet Protocol for communication, such as 192.0.2.1. Identification of the network interface and location addressing are the two primary purposes of an IP address.

Therefore, A subnetwork is a divided portion of a larger network. More specifically, subnets divide an IP network logically into numerous, smaller network pieces. The process for sending data from one computer to another is called Internet Protocol (IP).

Learn more about subnet from

https://brainly.com/question/29039092
#SPJ1

To avoid heating problems due to induction, the code generally prohibits installing a single conductor of an alternating current (AC) system in a metallic raceway. Which of the following single conductors of an AC system is permitted to be installed by itself in a metallic raceway?grounding electrode conductor

Answers

Despite being practical and simple to comprehend, DC is not the only "type" of electricity in use.

What is Alternating current?

Some electricity producers (most notably rotary electromechanical generators) naturally generate voltages that alternate between positive and negative polarity over time.

This "kind" of electricity is known as Alternating Current (AC), which can occur either as a voltage changing polarity or as a current changing direction back and forth.

While any DC voltage source can be represented by the well-known battery symbol, any AC voltage source can be represented by the circle with the wavy line inside it.

Why anyone would bother with AC is a question that comes to mind. It is true that there are situations where AC does not actually outperform DC.

Therefore, Despite being practical and simple to comprehend, DC is not the only "type" of electricity in use.

To learn more about AC current, refer to the link:

https://brainly.com/question/14187491

#SPJ1

TRUE/FALSE. a laptop has a wired connection to a network and is configured with a static ip address. the link light on the nic is lit, but the laptop cannot communicate with any hosts on the local network.

Answers

A laptop has a wired connection to a network and is configured with a static IP address. the link light on the nic is lit, but the laptop cannot communicate with any hosts on the local network. [TRUE].

And this is caused by an IP address conflict with another host on the network.

What is IP Conflict

IP conflicts can occur when two or more computers or other devices (which support IP addresses) on a network use the same IP address. Remember, the IP address is an identifier on the network, so it is unique or cannot be the same.

Typically, IP address conflicts occur on a local network (LAN). Every device that supports IP addresses has the potential to experience IP conflicts with other devices on a network.

We know there are two kinds of naming IP addresses, namely static IP and dynamic IP. Static IP is filled in manually, which means it won't change as long as the owner doesn't change it. Dynamic IP is an IP that is set automatically, usually only temporary and will work if connected to a router that has a DHCP server service.

Learn more about IP address at https://brainly.com/question/18722788.

#SPJ4

A C++ character constant (character literal) is enclosed in ________ quotation marks, whereas a string constant (string literal) is enclosed in ________ quotation marks.

Answers

A C++ character constant (character literal) is enclosed in single quotation marks, whereas a string constant (string literal) is enclosed in double quotation marks.

The Difference Between C++ Character and String Constants

The missing words are: Single & Double

This is because character constants represent a single character, whereas string constants represent a sequence of characters.

Character constants are useful for representing single characters, such as 'a' or '$'. String constants are useful for representing sequences of characters, such as "Hello, world!" or "The quick brown fox jumps over the lazy dog."

Learn more about Programming: https://brainly.com/question/16397886

#SPJ4

As a security analyst working for an accounting firm, you need to evaluate the current environment. Which of the following is the FIRST thing you should do?
Question 11 options:
Define the effectiveness of the current security policies and procedures.
Create reports that clearly identify problem areas to present to management.
Implement remediation steps.
Decide the best times to test in order to limit the risk of having shutdowns during peak business hours.

Answers

As a security analyst working for an accounting firm, you need to evaluate the current environment, the option that is the FIRST thing you should do is option A: Define the effectiveness of the current security policies and procedures.

What makes an effective Information Security Policy?

In my words, a good information security policy is a clear, relevant, workable, and friendly document that speaks directly to users and persuades them of the importance of handling information resources securely.

Note that a security policy, also known as an information security policy or an IT security policy, is a written statement of the guidelines, standards, and general strategy that a company uses to protect the privacy, integrity, and accessibility of its data.

Therefore, one can say that A sound security plan is based on a number of components. The ability to use it is the most crucial requirement. If a company or the people working there cannot carry out the rules or regulations contained in the security policy, it serves no purpose and as such is good for you to us the option above.

Learn more about security policies  from

https://brainly.com/question/5673688
#SPJ1

function of the organelle in question 4.

Using the diagram and your knowledge of biology, identify the following:

a. Organelle A_____

b. Substance A_____

c. Substance B_____

RT 2: Regents Review!

ections: Recall what you learned in unit 1 about designing an experiment to answer the ientist is interested in the effect that the amount of glucose given to a mitochondria n unt of carbon dioxide that is produced.function of the organelle in question 4.

Using the diagram and your knowledge of biology, identify the following:

a. Organelle A_____

b. Substance A_____

c. Substance B_____

RT 2: Regents Review!

ections: Recall what you learned in unit 1 about designing an experiment to answer the ientist is interested in the effect that the amount of glucose given to a mitochondria n unt of carbon dioxide that is produced.

scientist sets up three containers: Container 1 holds 20 mitochondria and a 0.5 %cor ainer 2 holds 20 mitochondria and a 1.0 % concentration of glucose; and Container 3 hondria and a 5.0 % concentration of glucose. 0.5 % concentration of glucose

scientist sets up three containers: Container 1 holds 20 mitochondria and a 0.5 %cor ainer 2 holds 20 mitochondria and a 1.0 % concentration of glucose; and Container 3 hondria and a 5.0 % concentration of glucose. 0.5 % concentration of glucose

function of the organelle in question 4.

Using the diagram and your knowledge of biology, identify the following:

a. Organelle A_____

b. Substance A_____

c. Substance B_____

RT 2: Regents Review!

ections: Recall what you learned in unit 1 about designing an experiment to answer the ientist is interested in the effect that the amount of glucose given to a mitochondria n unt of carbon dioxide that is produced.function of the organelle in question 4.

Using the diagram and your knowledge of biology, identify the following:

a. Organelle A_____

b. Substance A_____

c. Substance B_____

RT 2: Regents Review!

ections: Recall what you learned in unit 1 about designing an experiment to answer the ientist is interested in the effect that the amount of glucose given to a mitochondria n unt of carbon dioxide that is produced.

scientist sets up three containers: Container 1 holds 20 mitochondria and a 0.5 %cor ainer 2 holds 20 mitochondria and a 1.0 % concentration of glucose; and Container 3 hondria and a 5.0 % concentration of glucose. 0.5 % concentration of glucose

scientist sets up three containers: Container 1 holds 20 mitochondria and a 0.5 %cor ainer 2 holds 20 mitochondria and a 1.0 % concentration of glucose; and Container 3 hondria and a 5.0 % concentration of glucose. 0.5 % concentration of glucose

Assume that the variable mystring refers to a string, and the variable reversedString refers to an empty string. Write a for loop that adds the characters from myString to reversedString in reverse order (in python).

Answers

myString = myString[::-1]  is the most pythonic way to write a for loop that adds the characters from myString to reversedString in reverse order in python.

What is Loop in Python?

A for loop is used to repeat a sequence (that is either a list, a tuple, a dictionary, a set, or a string).

This is similar to the iterator method in other object-oriented programming languages than the for keyword in other programming languages.

The for loop allows us to run a set of statements once for each item in a list, tuple, set, or other data structure.

Example

Print each fruit in a fruit list:

fruits = ["apple", "banana", "cherry"]

for x in fruits:

 print(x)

To learn more about object-oriented programming, visit: https://brainly.com/question/14078098

#SPJ4

Which of the following lets you apply bold formatting to a selected cell? select all the options that apply. Select all the options that apply. Home tab Format Cells dialog box Insert tab Mini toolbar

Answers

Choose the cells that need to be prepared, then select Table from the Insert menu.Choose Format cells from the context menu after selecting the desired cells to format.

Which of the following allows you to format a selected cell in bold? The home tab is typically a tab or button that takes you back to the home part of an application or website.In Microsoft Office, the Home tab is always selected by default in Word, Excel, PowerPoint, and other Office programs.In Excel, formatting cells allows us to alter a number's appearance without altering the actual value of the number.We can format numbers using a number (0.8, $0.80, 80%, etc.) or another method (alignment, font, border, etc).Your report objects' formatting options are set in the Format Cells dialog box.You can format a row or column header's values as well as the number, font, alignment, border, and pattern.You can reveal or conceal the practical text selection tools when you choose text.

To learn more about  Format cells refer

https://brainly.com/question/18704025

#SPJ4

a victim connects to a network they think is legitimate, but the network is really an identical network controlled by a hacker. what type of network attack are they a victim of?

Answers

The type of network attack they are a victim of is the evil twin. An evil twin assault is a type of abusive Wi-Fi access point (AP) that disguises itself as a legitimate one.

What is an evil twin?

It should be noted that it operates by granting an attacker full access to sensitive information without the end user's knowledge.

As a result, Evil Twin occurs when a victim joins to what appears to be a genuine network but is actually an identical network managed by a hacker to monitor data.

Therefore, the evil twin is the type of network attack they are subjected to.

To learn more about the evil twin, refer to the link:

https://brainly.com/question/13944835

#SPJ1

in which type of rfid attack can unauthorized users listen to communication between rfid tags and readers

Answers

Kind of RFID attack that can unauthorized users listen to communication between rfid tags and readers is known as eavesdropping.

An unauthorized individual uses an antenna that is used to record communications between legitimate RFID tags and readers, in eavesdropping. This kind of attack can be showed in both directions, tag-to reader and reader-to tag. The main of attacks against RFID systems can be broken into three main categories: man-in-the-middle (MITM), cloning, and brute forcing. The highest levels of security risks to an RFID network are sniffing and eavesdropping attacks. Eavesdropping/sniffing refers to an unauthorized users listen to communication between RFID tags and readers.

Learn more about RFID at https://brainly.com/question/29538641

#SPJ4

although the internet provides unlimited sources of information and entertainment, what are we still restricted by? question 46 options: a) data limits b) text message character limits c) satellite placement d) devices that use power quickly

Answers

Although the internet provides unlimited sources of information and entertainment, the factor that are we still restricted by option c) satellite placement.

Can I immediately access the internet through satellite?

In that regard, satellite internet is comparable. Your home will have a satellite dish erected, and the internet will be transmitted from there. Satellite internet requires no cables or other equipment because it is 'directly' supplied by satellites that are circling in space. 12

Therefore, At an altitude that is of 10,900 nautical miles (20,200 km) and for a duration of 12 hours, GPS satellites travel in circular orbits. To ensure coverage of the poles, the orbits are 55 degrees slanted toward the equator of the planet.

Learn more about satellite placement from

https://brainly.com/question/15187476
#SPJ1

Bert is a network administrator for a company that has just acquired another smaller company. Upon doing an inventory of one of the branch offices of the acquired company he finds an unmanaged switch in one of the IDFs. At which of the following layers does this device operate?a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4

Answers

Layer 2 of IDF. For controlling and connecting a telecommunications connection between end-user devices and the main distribution frame, an IDF is a free-standing or wall-mounted rack.

What is IDF ?A free-standing or wall-mounted rack known as an intermediate distribution frame (IDF) is used to manage and connect a telecommunications cable between end-user devices and the main distribution frame.An IDF, which is frequently installed at a central office or on customer property, acts as a distribution point for multipair cables from the combined distribution frame (CDF) to separate cables connecting to devices located in various parts of the building. It also assists in cross-connecting user cable media to individual user line circuits.A multifloor building might have an IDF on each story, with the cabling being sent through the walls to an MDF on the first floor. The MDF would include cables that connect to neighbouring structures, a service provider, the phone company, or the network.

To learn more about IDF refer :

https://brainly.com/question/28167078

#SPJ4

the do-while loop always performs at least one iteration, even if its boolean expression is false to begin with. question 91 options: true false

Answers

The statement is True, the do-while loop always performs at least one iteration, even if its boolean expression is false to begin with.

A variation of the while loop is the do/while loop. Before determining whether the condition is true, this loop will run the code block once. If the condition is true, it will then repeat the loop. The do/while loop is used in the example below. Because the code block is executed before the condition is tested, the loop will always be run at least once, even if the condition is false.

To know more about do/while loop, visit;

/brainly.com/question/15690925

#SPJ4

in a network database, nodes may have a many-to-many relationship. group of answer choices true false

Answers

The statement "in a network database, nodes may have a many-to-many relationship" is false.

What is a network database?

A database that is organized based on record ownership, allowing records to have numerous owners and thus offering multiple access paths to the data.

A hierarchical database is a type of data architecture in which data is kept in records and structured into a tree-like parent-child structure, with one parent node having several child nodes linked together. File systems and geographic data are the two principal applications of hierarchical structure in modern computing.

Therefore, the statement is false.

To learn more about network databases, refer to the link:

https://brainly.com/question/28313857

#SPJ1

an administrator has decided to set up a vm backup job covering their oracle servers. what feature must be enabled to ensure quiescence of the oracle databases during the backup?

Answers

Enable application-aware processing feature must be enabled to ensure quiescence of the oracle databases during the backup.

What is Application-aware processing?

Veeam's proprietary "Application-Aware Processing" feature is used to quiesce applications and create a consistent view of application data within the guest operating system, ensuring there are no unfinished database transactions or incomplete read and write operations when the snapshot of VM is taken.

This procedure is based on how Microsoft VSS works and is recommended for any server running a critical business application such as Active Directory, any type of SQL server (e.g., MySQL, Postgres, etc.), or any application that is read/write sensitive.

To know more about SQL server, visit: https://brainly.com/question/16178374

#SPJ4

james, a network administrator, is tasked to enable you to dynamically discover the mapping of a layer 3 ip address to a layer 2 mac address. which utility would he use to accomplish his task?

Answers

The utility James would use to accomplish this task is the Address Resolution Protocol (ARP). This protocol allows the mapping of a layer 3 IP address to a layer 2 MAC address on a local network.

The Benefits of Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP) is an important utility that enables dynamic discovery of the mapping of a layer 3 IP address to a layer 2 MAC address. Its use is essential for network administrators who need to enable devices to communicate on a local network. This protocol is incredibly beneficial and can provide many advantages to networks and their users.

The primary benefit of using ARP is that it provides a quick and efficient way for devices to communicate on a local network. By mapping layer 3 IP addresses to layer 2 MAC addresses, devices can easily discover and communicate with one another. This allows for data to be rapidly transferred from one device to another, making it a valuable resource for networking activities.

Learn more about Address Resolution Protocol :

https://brainly.com/question/13068535

#SPJ4

The _____________ keyword is ignored by the Python interpreter and can be used as
a placeholder for code that will be written later.
pass

Answers

The pass keyword is ignored by the Python interpreter and can be used as a placeholder for code that will be written later.

What does Java's pass keyword mean?

A copy of each argument is produced in Java upon method invocation and then sent to the method. Primitive data types are handled by copying the value onto stack memory before passing it to the procedure.

Therefore, The pass keyword in Python is a complete statement by itself. This statement is ignored during the byte-compile step and has no effect. The Python pass statement, however, is unexpectedly helpful for a statement that has no effect. The final code that is used in production can occasionally benefit from pass.

Learn more about  Python interpreter from

https://brainly.com/question/28691290
#SPJ1

the file that contains sales transactions that were initiated in the system but are not yet completed is the:

Answers

The file that contains sales transactions that were initiated in the system but are not yet completed is the  Pending order master.

About transaction file

A transaction file is a data file where transaction records are kept that relate to entries in the master file.  This type of file serves to isolate regular transaction activity from master file information while allowing the database to tie the two together via key references.  This key reference is usually a single entry that is common to both groups of records such as account numbers, employee or client names, or purchase orders.  This allows the database operator to keep the master file relatively small while having access to the full transaction history for audit trails or reporting.

Corporate databases can contain very large amounts of information which typically consist of individual details of clients, suppliers and employees and records of recurring events associated with each.  

Learn more about transaction records at https://brainly.com/question/24012821.

#SPJ4

the strip() method returns a copy of the string with all the leading whitespace characters removed but does not remove trailing whitespace characters.

Answers

It's true that the strip() method returns a copy of the string with all the leading whitespace characters removed but does not remove trailing whitespace characters.

What is Whitespace character?

"White-space characters" are space, tab, line feed (newline), carriage return, form feed, and vertical tab characters that serve the same purpose as spaces between words and lines on a printed page — they make reading easier.

White-space characters and other tokens, such as operators and punctuation, delimit (bounded) tokens. White-space characters are ignored by the C compiler when parsing code unless they are used as separators or as components of character constants or string literals. To make a program more readable, use white-space characters. It's worth noting that the compiler considers comments to be white space.

To learn more about Whitespace character, visit: https://brainly.com/question/300020

#SPJ4

write a method that returns a string in the form of hour:minute:second for a given total seconds using the following header: public static string format(long seconds) github

Answers

A method that returns a string in the form of the hour: minute: second for a given total second that utilizes the given header is as follows:

class Convert {

public static String format(long seconds) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter total seconds: ");

int secs = sc.nextInt();

int hours = secs / 3600;

int minutes = (secs % 3600) / 60;

int seconds = (secs % 3600) % 60;

String timeFormat = hours + ":" + minutes + ":" + seconds;

return timeFormat;

}

}

What is the String function?

The string function may be characterized as the type of function in a computer's programming function that may significantly have a non-numerical result.

String functions are typically utilized in computer programming languages in order to manipulate a string or query information about a string successfully.

Therefore, a method that returns a string in the form of the hour: minute: second for a given total second that utilizes the given header is well described above.

To learn more about Header, refer to the link:

https://brainly.com/question/2329500

#SPJ1

in a martian civilization, all logarithms whose bases are not specified as assumed to be base $b$, for some fixed $b\ge2$. a martian student writes down \[3\log(\sqrt{x}\log x)

Answers

In a martian civilization, all logarithms whose bases are not specified as assumed . The method to solve this algorithm is as follows.

Step-by-step solution:

Changing the base of the second equation to base b:

logx/ log log x = 54

logx = 54 . log logx

[tex]b^{logx}[/tex] = [tex]b^{54 log log x}[/tex]

x = [tex](b^{log logx}) ^{54}[/tex]

x = [tex](log x)^{54}[/tex]

log[tex](log x)^{54}[/tex] = 56 * (54/84)

log x = 36

[tex](log x^{54})[/tex] = [tex]36^{54}[/tex]

x = [tex]6^{108}[/tex]

[tex]b^{36} = 6^{108}[/tex]

b = [tex]6^{3}[/tex] = 216

To learn more about algorithm, visit: https://brainly.com/question/24953880

#SPJ4

write a recursive method, countnodesgt that counts the number of nodes that have a value greater than the 2nd parameter key.

Answers

A different region of the world is represented by each node in the tree. Think about the "Great Britain" node.

This node is composed of two parts: The label's name, "Great Britain," is the most evident component.

(define world-tree

 (make-node

  'world

  (list (make-node

         'italy

         (cities '(venezia riomaggiore firenze roma)))

        (make-node

         '(united states)

         (list (make-node

                'california

                (cities '(berkeley (san francisco) gilroy)))

               (make-node

                'massachusetts

                (cities '(cambridge amherst sudbury)))

               (make-node 'ohio (cities '(kent)))))

        (make-node 'zimbabwe (cities '(harare hwange)))

        (make-node 'china

     (cities '(beijing shanghai guangzhou suzhou)))

        (make-node

         '(great britain)

         (list

          (make-node 'england (cities '(liverpool)))

          (make-node 'scotland

       (cities '(edinburgh glasgow (gretna green))))

          (make-node 'wales (cities '(abergavenny)))))

        (make-node

         'australia

         (list

          (make-node 'victoria (cities '(melbourne)))

          (make-node '(new south wales) (cities '(sydney)))

          (make-node 'queensland

       (cities '(cairns (port douglas))))))

        (make-node 'honduras (cities '(tegucigalpa))))))

Learn more about node here-

https://brainly.com/question/28269884

#SPJ4

True/False. In the cloud computing stack, a service provider hosts the application at its data center and customers access it via a standard Web browser.

Answers

In the cloud computing stack, a service provider hosts the application at its data center and customers access it via a standard Web browser is a False statement.

What is cloud computing?

In order to provide quicker innovation, adaptable resources, and scale economies, cloud computing is the distribution of computer services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence.

Hence, Service providers are people or businesses that offer services to businesses and other parties. They offer network, processing, and storage services. The service providers provide real estate, communication, educational, legal, and consulting services to organizations.

Learn more about cloud computing from

https://brainly.com/question/19057393
#SPJ1

What methodology can be applied to handle large data sets that can be terabytes in size and that are stored in clusters of computers?.

Answers

The open source Apache Hadoop framework can be used to efficiently store and handle gigabytes to petabytes of data and are stored in clusters of computers.

In comparison to employing a single powerful system for data storage and processing, Hadoop enables clustering several computers to analyze large datasets in parallel more quickly.

Utilising all of the storage and processing power of cluster servers and running distributed processes on enormous volumes of data are made simpler by Hadoop.

Applications that gather data in various formats can add data to the Hadoop cluster by connecting to the NameNode via an API function. Each file's "chunk" placement and file directory organization are tracked by the NameNode and copied across DataNodes.

Provide a MapReduce job made up of numerous map and reduce tasks that execute against the data in HDFS distributed across the DataNodes in order to perform a job to query the data. Each node runs a map operation against the specified input files, and reducers run to aggregate and arrange the output.

To learn more about Hadoop click here:

brainly.com/question/20884194

#SPJ4

What methodology can be applied to handle large data sets that can be terabytes in size and that are stored in clusters of computers?

in 2019, suddenlink in bcs had an average bandwidth per internet connection of 15.10 mb/s. in 2020, their average bandwidth was 11 mb/s. which of the following statement is true based on the above?

Answers

Bits per second of data transfer were higher in bcs connections in 2019 compared to connections in 2020.

Bandwidth

The most data that can be sent through an internet connection in a specific amount of time.

Internet speed is frequently confused with bandwidth, which is actually the amount of data that can be delivered across a connection in a given amount of time, measured in megabits per second (Mbps).

Mbps

Megabits per second, sometimes known as Mbps or Mb Mbits p/s, is the unit of measurement for broadband speeds. A megabit is one million bits, which are incredibly small pieces of data. Your internet activity should be faster the more Mbps (megabits per second) you have available.

To know more about Bandwidth, check out:

https://brainly.com/question/28436786

#SPJ4

Imagine that inside a particular function, we have allocated memory for a built-in, C-style array of doubles on the heap, and stored the resulting address in a variable named scores.
Later in that same function, we have finished with the array, and wish to deallocate the memory that has been reserved for it.
What statement must be executed before our function exits?
Imagine that inside a particular function, we have allocated memory for a built-in, C-style array of doubles on the heap, and stored the resulting address in a variable named scores.
Later in that same function, we have finished with the array, and wish to deallocate the memory that has been reserved for it.
What statement must be executed before our function exits?
dealloc[] scores;
delete scores;
dealloc scores;
delete[] scores;

Answers

Allocating and releasing memory blocks as needed can be quite convenient in C and C++. In both languages, this is undoubtedly accepted practice, and in C++ it is almost inevitable.

Allocating and releasing memory blocks as needed can be quite convenient in C and C++. In both languages, this is undoubtedly accepted practice, and in C++ it is almost inevitable. But managing such dynamic memory can be difficult and ineffective. These issues can be disregarded for desktop programs because memory is readily available in those environments. Ignoring the problems is not an option for embedded applications, which are typically real-time.

The time it takes to allocate memory may not be predictable, and the memory pool may become fragmented, leading to unexpected allocation failures. Dynamic memory allocation is typically nondeterministic. The issues will be thoroughly described in this session, along with a method for deterministic dynamic memory allocation.

To know more about dynamic memory click here:

https://brainly.com/question/28189995

#SPJ4

how would a technician adjust internet explorer (windows 7 and 8) for how much drive space is configured for caching web pages?

Answers

These how technician adjust cache on internet explorer for windows 7 and 8 :

Open the internet explorer then select tools and click on internet option, see the picture below.Click the setting on browsing historyChange to cache size as you desire. The default of internet explorer cache is 250 MBWhat is cache?

Cache is a temporary data saved on your computer in the cache memory. It help you browsing faster and reduce data usage by calling the data from cache memory then adjust it to the current website update. It is important to delete unnecessary cache to maximize your computer storage usage.

Learn more about cache at https://brainly.com/question/6284947

#SPJ4

assume that the initial values of m and n are the same in code segment i as they are in code segment ii. which of the following correctly compares the number of times that "a" and "b" are printed when each code segment is executed?

Answers

C. "A" is printed m more times than "B" correctly compares the number of times that "a" and "b" are printed when each code segment is executed.

A code segment in computing is a chunk of an object file or the corresponding area of the virtual address space of the program that includes executable instructions. It is sometimes referred to as a text segment or simply as text.  The word "segment" is derived from the memory segment, a previous method of managing memory that was replaced by paging. The code segment is a component of an object file when a program is stored in it. When a program is loaded into memory so that it can be executed, the loader allots different memory regions (specifically, as pages), which correspond to both the segments in the object files and to segments only needed at run time.

To know more about code segment, visit;

brainly.com/question/20063766

#SPJ4

Other Questions
Changing possible security and tourism outcomes According to the article, Roger Dow, U.S. Travel's president, said that the Visit U.S. Coalition sees its initiative as complementary to increased border and travel security. The coalition lobbies to present specific policy changes to the administration, including efforts to speed visa processing at the given level of security. Adjust the following graph to illustrate the effects of implementing such measures. Note: Select either end of the curve on the graph to make the endpoints appear. Then drag one or both endpoints to the desired position. Points will snap into position, so if you try to move a point and it snaps back to its original position, just drag it a little farther. Note: Select either end of the curve on the graph to make the endpoints appear. Then drag one or both endpoints to the desired position. Points will snap into position, so if you try to move a point and it snaps back to its original position, just drag it a little farther. 30 60 90 120 TOURISM Mons of visitors) SECURITY (Percent of teronrists caught) According to the adjustment of the previous graph, if the United States were to implement fast visa processing, it would allow for a tourism. level of security and True or False: By implementing such measures, the United States would no longer face a tradeoff between security and the number of visitors to the United States. True O False Anticipate the expected outcome of thymocyte development in the following TCR transgenic mice: Circle the correct answer for each question. Explain how you arrived at your answers to the right of each question_ Male TCR-transgenic mice expressing H-2Db MHC EXPLAIN YOUR ANSWERS: (a) Transgenic thymocytes ARE or ARE NOT positively selected. (b) Transgenic thymocytes ARE or ARE NOT negatively selected: (c) The peripheral blood of these mice contains: Mature transgenic CD4 T cells Mature transgenic CD8 T cells No mature transgenic cells are needed to plan workforce levels, allocate budgets among divisions, and schedule jobs and resources. group of answer choices make-to-order operations intermediate-range forecasts short-range forecasts make-to-stock operations as part of a demographic study, a college administrator needed to survey a sample of students from the college. from each major offered at the college, the administrator randomly selected 5 percent of the students with that major to participate in the survey. which of the following is the best description of the type of sample selected by the administrator? What is the message of the song Tubig at Langis Quora?. FILL IN THE BLANK. in casual conversation the word since is synonymous with ____, but in academic writing it should be used only in its temporal meaning. meteorologists are able to predict weather within probable ranges because air masses responsible for weather interact in predictable ways. the boundary at which two air masses meet is called a front, which is the main cause of stormy weather. this weather map shows conditions for severe weather. which statement best elaborates on how air masses would interact to cause severe weather? true or false: dramatists who happen to be members of an underrepresented group or specific gender group may prefer not to be identified solely, or even primarily, on that basis. after some important cellular processes, there is an abundance of carbon dioxide (co2) molecules inside the cell, but not enough molecules outside the cell. co2 molecules would , 1 of 2. move out of the cell because there is a , 2 of 2. lower concentration outside the cell than inside the cell. What is climax of Hamlet?. She used to be lazy but now she ( isn't - doesn't - don't - aren't)isn't or doesn't?please answer. i would choose isn't. What process was primarily responsible for the development of the present percentage of free oxygen in the Earth's atmosphere?. What does a 1 2 1 phenotypic ratio mean?. The following table shows the prices of a sample of Treasury bonds, all of which have coupon rates of zero. Each bond makes a single payment at maturity.Years to Maturity Price (% of face value)1 96.852%2 93.3513 89.5444 85.480a) What is the 1-year interest rate?b) What is the 2-year interest rate?c) What is the 3-year interest rate?d) What is the 4-year interest rate?e) Is the yield curve upward-sloping, downward-sloping, or flat?f) Is this the usual shape of the yield curve According to a 2011 report conducted by Yale University and George Mason University, the majority of the public surveyed in the United States agreed that global warming is occurring, and _______ believed it was caused primarily by human activities. The popularity of social media sometimes leads to a new stage in the hierarchy of effects known as ________ where loyal consumers recommend brands they have adopted.Multiple ChoiceevaluationadvocacypreferenceinterestrepurchaseAdvocacy which of the following is not normally a reason for an mnc to forecast exchange rates?a. To decide whether to obtain long-term financing in foreign currencies b. To decide whether to hedge foreign currency cash flows c. To decide whether to invest in foreign projects d. To decide whether to change the executives' compensation when the executives run foreign subsidiaries e. To decide whethere the remit earmings obtained in foreign subsidiaries You hear: voy a ir a caminar por el sendero tan pronto como llegues a casa. You select:future action. a 6.00-cm-diameter sphere with a mass of 89.3 g is neutrally buoyant in a liquid. identify the liquid. you will use absorbent cotton and oil of wintergreen, peppermint, or cloves to test for olfactory:a. accommodationb. adaptationc. identificationd. recognition