Answer:
1. A code of conduct
2. Access to resources, conferences,and, job boards
4. skills validation
Explanation:
I just answered it
A code of conduct is a collection of regulations describing an individual party's or organization's norms, standards, and duties or right procedures. The correct options are A, B, and D.
What is a code of conduct?A code of conduct is a collection of regulations describing an individual party's or organization's norms, standards, and duties or right procedures. The most prevalent policy within a company is a code of conduct. This policy outlines the company's beliefs, standards, and moral and ethical expectations for workers and third-party interactions with the firm.
From the given set of options, the options that are offered by most professional organizations are,
A code of conductAccess to resources, conferences, and job boardsSkills validationHence, the correct options are A, B, and D.
Learn more about the Code of Conduct here:
https://brainly.com/question/12990307
#SPJ2
Mention five specific techniques you can use to improve your written documents.
Answer:
The answer is below
Explanation:
There are various techniques an individual can use to improve his or her written documents, some of which considered to be specific are:
1. Understand the targeted readers.
2. Do not be ambiguous or avoid ambiguity
3. Always use active voice pattern whenever possible
4. Perform second reading, and edit where necessary
5. Avoid repetition of words too often.
The Active Directory Users and Computers tool can be used to:______.
Answer:
add users, reset passwords, enable dial-In access, and manage computersin the domain.
Explanation:
Active Directory Users and Computers is an administrative tool, that is used to perform or carry out various tasks relating to administration processes. It can be utilized in the administration of an organization memberships and company server.
Hence, the Active Directory Users and Computers tool can be used to add users, reset passwords, enable dial-In access, and manage computers in the domain.
When you want to use the current backup of all of the files, which option should be selected?
Answer:
To use the current backup of all the files, the option to select is Browse for Folders.
This gives you access to select the most current back up with the latest timestamp.
Cheers!
which of the following characters cannot be used in filename?
Answer:
# pound. % percent. & ampersand. { left curly bracket. } right curly bracket. ...
< left angle bracket. > right angle bracket. * asterisk. ? question mark. ...
$ dollar sign. ! exclamation point. ' single quotes. " double quotes. ...
+ plus sign. ` backtick. | pipe. = equal sign.
Explanation: You will get an error if you try to use these characters in a file name. - Google.
How to see the range of values of vty lines?
Answer:
To get the range of very lines in a switch or a router, in the global mode, type " line very" and the question mark after the space. It displays the ranges of valid very lines in the device.
Explanation:
Routers and switches are intermediate components of a computer network. They are used to connect various nodes and networks. For a remote connection, they use the virtual interface called vty to connect to computers for management purposes. These vty lines allows for SSH and telnet access from workstations and the range of very lines are predetermined and limited and varies for all switches and routers.
What is Game Theory?
Study of strategic decision making
elements of support for effective support of a system
the imitation of the operation of real-world process or system over time
decentralized communications model
Answer:
the branch of mathematics concerned with the analysis of strategies for dealing with competitive situations where the outcome of a participant's choice of action depends critically on the actions of other participants
Explanation:
In simple terms Game theory is the study of how and why people make decisions.
When a hardware or software interrupt occurs, the CPU calls________
Answer:
Operating system
Explanation:
An interrupt is the signal sent to the processor that interrupts the current process. It may be generated by a hardware device or a software program.With each interrupt the CPU hardware does exactly the same thing, which is what enables operating systems to take control of the current user operation.
Which of the following is the fundamental unit of the virtualized client in an IaaS deployment? a)Workload b)Workspace c)Work unit
Answer:
a. Workload
Explanation:
The most fundamental unit of the virtualized client in an IaaS deployment is the workload because it simulates the potential of a certain server to perform a specific amount of work given.
Which of the following is typically used in a flowchart to indicate a decision?
a. square
b. rectangle
c. diamond
d. oval
Decisions in flowcharts are indicated by diamonds.
What are flowcharts?It is a pictorial or symbolic representation of the processes involved in achieving an aim.
In flowcharts, the following apply:
Ovals represent the beginning or end of a processRectangles represent key steps in the processArrows are used to indicate the flow or direction of the processDiamonds represent decision-making. When one of the available options has to be taken.More on flowcharts can be found here: https://brainly.com/question/14598590
#SPJ2
Online servers that can be accessed through the internet are an example of RAM.
O True
O False
Answer:
False
Explanation:
Answer:
The answer is False because I just took a test
True or False: The correct answer to a numeric entry field will appear only if you click on the fields themselves after selecting Grade It Now. True
Answer:
True
Explanation:
The numeric entry field will appear when we click the fields after selecting Grade. The selection sort enables the sorting process and displays only the relevant information from the data. This makes finding data easy and saves time. The feature is only available when manually select grade.
The statement that a numeric entry field will appear only if you click on the fields themselves after selecting Grade is True.
This is because, sorting process helps to displays only the relevant information and this will help in locating a particular data without stress.
Therefore, it is correct that the entry field will appear only if you click on the fields themselves after selecting Grade.
Learn more about numeric entry field at
https://brainly.com/question/1538272
Which of the following best describes how computing devices represent information? A. A computer will either represent information as bits or bytes but not both B. A computer represents data as a byte which is either a 0 or a 1 C. A computer represents data as bits which is either a 0 or a 1 D. A computer represents information as bits which contain 8 bytes.
Answer:
The Answer is B
Explanation:
The reason the answer is B is because "bytes" are the correct form of storing memory in 0's and 1's.
Using concepts of data representation in a computer, it is found that the correct option is:
C. A computer represents data as bits which is either a 0 or a 1.
-----------------
In computer science, it is a common saying that "everything inside a computer is either a 0 or 1".The unit of measure that only has 0s and 1s is bits.If we load a file, either text or image, all the values at each position on the file are composed by 0's and 1's, for example.Thus, option C is correct.A similar problem is given at https://brainly.com/question/17399642
A maintenance schedule lists the procedure for defragmenting your hard drive true or false
Answer:
false
can i has brainliest
Explanation:
What is a characteristic of maintaining logs in a system? A. Logging prevents security violations, but only deals with passive monitoring. B. Logging provides access control by authenticating user credentials. C. Logging helps an administrator to detect security breaches and vulnerable points in a network
Answer:
The correct answer is C
Explanation:
When analysed, logs can help to forestall security breaches to a network it can also help to identify and resolve any vulnerabilities within the system.
Due to the number of logs generated daily, it is almost impracticable to constantly monitor all logs generated by the system.
Cheers!
Overlay analysis is ____________, taking in data from two or more layers to create a single output layer.
Explanation:
Overlay analysis is an approach, taking in data from two or more layers to create a single output layer.
For example, if we have a layer of land use and a layer of soil fertility, we can derive from the two layers the percentage of agricultural land developed over fertile soil.
Which section from the article BEST explains why humans could benefit from studying a particular type of extremophile?
Answer:
The study of extremophiles provides an understanding of the physicochemical parameters defining life on Earth and may provide insight into how life on Earth originated. The postulations that extreme environmental conditions existed on primitive Earth and that life arose in hot environments have led to the theory.NASA is studying an extremophile, Deinococcus radiodurans, which is extremely resistant to radiation. This microbe can withstand doses of radiation 500 percent higher than would be lethal to humans.
Hope this helped you!
Explanation:
You work as a network administrator for a company with 100 employees. Your company need all the employees should have a separate computer and connected to the network. (a) What is the smallest size address block that can support the all the 100 computers servers and routers in your perimeter network? (Express the network size in slash notation and dotted-decimal notation.) (b) You have decided to deploy three new servers in the perimeter network and assign them each a public IP address. If your provider sells addresses in blocks only, what size block should you request to enable you to host all of your public servers on a single subnet?(c) Are the IPv4 address 192.158.1.14 and 192.158.1.127 on the same subnet? Both have a subnet mask of 255.255.255.0
Answer:
gdghfhffhgcgchchghvb. bvhvhhvhvhgcgfhsufsjtstjsfsfshrs
Given the list of customer segments below please create a new list of the names of the segments only using(a) a for loop(b) a list comprehension(c) a map().List would look something like ['Wallstreet','Gambler','Parents'] but of course using each tool as listed:segments = [{'name': 'Wallstreet', 'average_spend': 82.01}, {'name': 'Gambler', 'average_spend': 107.00}, {'name': 'Parents', 'average_spend': 10.52}]
Answer:
new_segment = [ ]
for segment in segments:
new_segment.append({'name': segment, 'average_spend': money})
print( new_segment)
Using list comprehension:
new_segment =[{'name': segment, 'average_spend': money} for segment in segments]
Using map():
def listing(a):
contain = {'name': segment, 'average_spend': money}
return contain
new_segment = [ ]
new_segment.append(map( listing, segment))
print(list(new_segment)
Explanation:
The python codes above create a list of dictionaries in all instances using for loop, for loop in list comprehension and the map function which collect two arguments .
The user documents are stored in _______ format.
The user documents are stored in _______ format.
A. qvd.
B. qvw
C. None of the options
D. qvs.
Answer:
B. qvw
Explanation:
Given the options available, it can be inferred that the application the question is referring to is called QlikView which is a software application that is used for analytics explanation. This software applications saves documents created in a file extension specifically known as "QVW."
Hence, the right answer is that: in QlikView, the user documents are stored in QVW format.
Thus the above answer is right.
Learn more about the QVW format here:
https://brainly.com/question/10205740
Which of the following is no longer necessary when you use HTML5 to develop Webpages? Please Hurry This Is For An Assignment due in 15 minutes :>
Answer:
Installing a third-party plug-in to include video
Explanation:
Which firmware security standard can be used to store disk encryption keys?A. SLAB. TPMC. UEFID. USB
Answer:
Option B (TPM) is the appropriate choice.
Explanation:
A TPM seems to be a specific form of the protected crypto operating system which seems to be a specialized piece of hardware being used to perform cryptographic techniques such as collecting encrypted data to classified material that is typically was used to validate hardware by either the host machine.The pairing is kept or inside the chip as well as therefore can not be software-accessed.Other alternatives given weren't concerning the circumstance mentioned. So the response to the above seems to be the right one.
what is the principle that producers are entitled to make more money from a business than they invest
Answer: profit motive
Explanation: i don’t have and explanation but i just did it on apex and got it right
What are some options available in the Spelling and Grammar Checker? Check all that apply. Redo Undo Ignore All Ignore Once AutoFormat Add to Dictionary Readability statistic
Answer:
Ignore all, Ignore once, and Add to Dictionary.
So 3,4, and 6.
Explanation:
Just took it.
The options available in the Spelling and Grammar Checker include Ignore All, Ignore Once, and Add to Dictionary.
Spelling and Grammar CheckerIt is a feature on Microsoft word that enables users to check for spelling and grammar errors in their works.
Depending on if the feature is activated, words or sentences with spellings or grammatical errors are underlined in red.
Users have the option of selecting ignore once to ignore a particular spelling or grammatical error, ignore all to ignore all the spellings and grammatical errors in the document, or add to the dictionary in order to include a flagged word into the dictionary.
More on spelling and grammar checkers can be found here: https://brainly.com/question/16798012
#SPJ2
Java Programming home > 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click "Submit mode", then "Submit for grading"). Notice that the test cases fail. The first test case's highlighting indicates that output 3 and newline were not expected. In the second test case, the-5 and newline were not expected 2 Remove the code that echoes the user's input back to the output, and submit again. Now the test cases should all pass 0/2 ACTIVITY 1.14.1: zylab training: Interleaved input/output DoubleNum.java Load default template 1 import java.util.Scanner; 3 public class DoubleNum public static void main(String args) { Scorner sehr = new Scanner(System.in); int x; 7 System.out.println("Enter x: "); 9 - scnr .nextInto: 10 11 System.out.println(); // Student mistakenly is echoing the input to output to match example 12 System.out.println("x doubled is".02 Develop mode Submit mode Run your program as often as you'd like, before submitting for grading. Below, type any needed Input values in the first box, then click Run program and observe the programs cutout in the second be Enter program input (optional) of your code requires input values, provide them here Ad Cat
Answer:
The following are the code to this question:
code:
System.out.println(x); //use print method to print value.
Explanation:
In the given question, it simplifies or deletes code in the 11th line. This line has a large major statement.
In the case, the tests fail because only 1 line of output is required by the tester, but two lines are obtained instead.
It's to demonstrate that the input/output or testing requirements function throughout the model.
What is programming blocks?
Answer:
In computer programming, a block or code block is a lexical structure of source code which is grouped togethe
Explanation:
Which of the following is the correct representation of -780,030,000 in exponential notation?
If I buld a gameing cumpooter wat r al thee parts I ned????
Answer:
you will need a cpu(core processor unit), Motherboard,RAM(Random access memory), CPU Cooler, GPU(Graphics processor unit or Graphics card), PSU(Power supply unit or power supply), your gonna need storage so either ssd or hdd, and most important of all is a case and case fans, plus if you are going to have a whole setup your gonna need preipherals, so keyboard,mouse, headset, mic, mouse pad, desk, monitors,etc.
Hope this helps
When should the architect begin the analysis?
Answer:
Right after the end user and the customer finalize the negotiations.
Explanation:
The architect's analysis is extremely important to ensure that a system acts correctly and efficiently. This analysis is carried out together with the implementation of codes and security systems, which will be responsible for the defense of the system. This analysis should begin immediately after the end user and the customer have completed negotiations that define all the requirements and information necessary to start the project.
This is C++
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
(2) Extend to also calculate and output the amount of paint in gallons needed to paint the wall. Assume a gallon of paint covers 350 square feet. Store this value using a const double variable. (2 pts)
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.514286 gallons
(3) Extend to also calculate and output the number of 1 gallon cans needed to paint the wall. Hint: Use a math function to round up to the nearest gallon. (2 pts)
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.514286 gallons
Cans needed: 1 can(s)
Answer:
#include <cmath>
#include<iostream>
using namespace std;
int main()
{
double height, width;
cout<<"Enter wall height (feet): ";
cin>>height;
cout<<"Enter wall width (feet): ";
cin>>width;
//1
double area;
area = width * height;
cout<<"Wall area: "<<area<<" square feet"<<"\n";
//2
const double gallon = area/350.0;
cout<<"Paint needed: "<<gallon<<" gallons"<<"\n";
//3
cout << "Cans needed :" << round(gallon) << " can(s)";
return 0;
}
Explanation:
This line declares the height and width as double
double height, width;
This line prompts user for height
cout<<"Enter wall height (feet): ";
This line gets user input for height
cin>>height;
This line prompts user for width
cout<<"Enter wall width (feet): ";
This line gets user input for width
cin>>width;
//1 Question 1 begins here
This line declares area as double
double area;
The line calculates area
area = width * height;
The line prints the calculated area
cout<<"Wall area: "<<area<<" square feet"<<"\n";
//2 Question 2 begins here
This line declares and calculates gallon as a constant double variable
const double gallon = area/350.0;
This line prints the calculated gallon
cout<<"Paint needed: "<<gallon<<" gallons"<<"\n";
//3 Question 3 begins here
This line rounds gallon to nearest whole number and prints the result
cout << "Cans needed :" << round(gallon) << " can(s)";
Select the trait that best matches the description.
is the willingness to put a customer's needs above one's own needs and
to go beyond a job description to achieve customer satisfaction.
is the ability to make decisions based on logic instead of emotions.
M is the ability to cope during periods of stress,
is the willingness to have new and varied experiences.
Answer:1Customer service orientation
2Tough mindedness
3Emotional resilience
4Openness
Explanation:I did the assignment and got it right