Answer:
Intel is more for work and such, while AMD is foucsed on gamers. I use AMD because I play many games, but it really depends on what you use your computer for.
Explanation:
it depends Explanation:AMD wins the CPU war overall right now, but depending on your needs, an Intel processor could still be the better choice. If you want the best in overclocking, gaming or software support, or if you want productivity performance without buying a discrete GPU, Team Blue has the advantage. But if you want the best balance of price and performance in the Intel vs AMD lineup, Team Red deserves your money.
What is "fake news"? Why do officials want students to learn to recognize it? How do officials plan to help students do this?
Fakes news is any type of news that is false or incorrect. Officials are trying to teach students about fake news because fake news is everywhere. It is influencing what students do. When they see something on social media they might share it, and it will spread. It even may show them something violent or inappropriate. Officials are doing multiple things to help students, such as seminars in school, assemblies in school, etc.
Which of the following quantities has decreased with the advent of digital technology? attendance at live performances quality of music production cost of performance advertising longevity of established artists
Answer:
A. The correct answer is attendance at live performances.
Explanation:
took it on edge 2020
When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representing the direction and position of the sprite, performing an algorithm to update these values, and changing the display in the window to match the updated state of the program. All of these actions are represented by just one single block.
Which of the following terms names the phenomenon which is best described by this statement?
a) Iteration
b) Sequencing
c) Compilation
d) Abstraction
Sequencing is the term that names the phenomenon which is best described by the given statement.
Sequencing refers to the order of logical arrangement whereby an instruction is executed in the proper order. This means that one process must be completed before the next command becomes valid and executes.
From the given statement, the computer is performing various operations in sequence which are:
Retrieving values from memoryPerforming algorithmChanging the displayThese functions are done by order, using a single block.
Read more here:
https://brainly.com/question/18744767
when implementing group aba programs, it is important to monitor both processes and .
When implementing group aba programs, it is important to monitor both processes and outcomes .
What procedure might you use in applied behavior analysis?The techniques used in applied behavior analysis center on identifying specific behaviors, defining those behaviors, designing interventions to change those behaviors, putting those interventions into practice, evaluating those interventions' efficacy, and either continuing the interventions or creating procedures to maintain them.
If a program achieved its objectives, you can tell from an outcome evaluation. An analysis of the process explains how and why. The services, activities, policies, and procedures of a program are described in a process evaluation.
Therefore, one can say that it is determined whether program activities have been carried out as anticipated through process/implementation evaluation. An evaluation of the program's outcomes or outcome objectives examines the program's effects on the intended population by tracking its progress.
Learn more about processes and outcomes from
https://brainly.com/question/14704067
#SPJ1
________ is a computer application that enables a firm to combine computerized functions of all divisions and subsidiaries of the firm into a single, integrated software program that uses a single database.
Answer:
Yash Sharma Hemant Kumar
you are the manager of the eastsim domain. your active directory structure has organizational units (ous) for each company department. assistant administrators help you manage active directory objects. for each ou, you grant one of your assistants full control over the ou. you come to work one morning to find that while managing some user accounts the administrator in charge of the sales ou has deleted the entire ou. you restore the ou and all of its objects from a recent backup. you want to make sure that your assistants can't delete the ous they are in charge of. what should you do? (select two. each choice is a possible solution.) answer remove full control permissions from each ou. run the delegation of control wizard for each ou, granting permissions to perform the necessary management tasks. edit the properties for each ou. for the ou administrators, deny the delete all child objects permission. edit the properties for each ou. for the ou administrators, grant full control permissions but apply the permissions to this object only. edit the properties for each ou. for the ou administrators, allow all permissions, but deny full control permissions. edit the properties for each ou to prevent accidental deletion.
To prevent similar incidents from happening in the future, you should implement two possible solutions. The first solution is to remove full control permissions from each ou. By doing so, the assistant administrators will only have the necessary permissions to perform their management tasks, and they won't be able to delete the entire ou.
1) The second solution is to run the delegation of control wizard for each ou, granting permissions to perform the necessary management tasks. This will allow you to specify exactly what tasks each assistant administrator can perform, and they won't have the ability to delete the entire ou.
2)In addition to these solutions, you could also edit the properties for each ou. For the ou administrators, deny the delete all child objects permission. This will prevent them from accidentally or intentionally deleting the entire ou. You could also edit the properties for each ou. For the ou administrators, grant full control permissions but apply the permissions to this object only. This will allow them to have full control over their respective ous, but they won't be able to affect other ous.
3)Finally, you could edit the properties for each ou to prevent accidental deletion. This will require a confirmation prompt before deleting any objects in the ou, which will prevent any accidental deletions. By implementing these solutions, you can ensure that your assistants won't be able to delete the ous they are in charge of, and you can prevent any similar incidents from happening in the future.
For such more question on delegation
https://brainly.com/question/29725282
#SPJ11
hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.
What should Chris do?
an attacker was able to gain unauthorized access to a mobile phone and install a trojan horse so that he or she could bypass security controls and reconnect later. which type of attack is this an example of?
This is an example of a Trojan Horse attack.
What is unauthorised access?Unauthorised access is when someone accesses any type of data or information without permission. This could be physical access such as entering a secure building, or electronic access such as logging into a computer system or network. Unauthorised access could lead to a data breach or other security issue, which could have serious consequences. It is important to ensure that all access to sensitive data is secure and authorised by the appropriate personnel.
A Trojan Horse is a type of malicious software that appears to be legitimate but is actually designed to perform malicious activities, such as stealing data or allowing an attacker to gain unauthorized access. Unlike other attack methods, a Trojan Horse does not exploit any security vulnerabilities, but rather relies on the user to open the malicious file or program. Once the malicious code has been installed on the device, the attacker can then use it to bypass security controls and gain remote access. For this reason, it is important to ensure that all devices, especially those containing sensitive data, are properly protected against such attacks.
To know more about unauthorised access click-
https://brainly.com/question/28809596
#SPJ4
Every module has all of the following except _____? a. A header b. Local variables c. A body d. A return statement. local variables.
Every module has all of the following except _ local variables____ The correct option is B
What is module ?A self-contained piece of code that completes a particular purpose is known as a module. Each module has a return statement, a body, and a header. The header includes the module name as well as any global variable declarations that the module may utilize.
The code that completes the module's task is found in the body. The return statement gives the calling module back control. Local variables are declared inside a module's body and cannot be accessed from outside the module. Therefore, not every module contains local variables.
Learn more about module here : brainly.com/question/18084961
#SPJ1
PLEASE HELP ASAP PLEASE AND THANK YOU
In a computer numerical control (CNC) machine, if the tool has to move downward and then rotate counter-clockwise around the vertical axis, along which of the following axes would it move?
A. x-axis, B axis
B. z-axis, C axis
C. z-axis, A axis
D. y-axis, A axis
In a computer numerical control (CNC) machine, if the tool has to move downward and then rotate counter-clockwise around the vertical axis, it would move along the z-axis and rotate around the A axis. The correct option is C.
The z-axis typically represents the vertical axis in a CNC machine, controlling the up and down movement of the tool. Moving downward would involve traversing along the z-axis.
The A axis, on the other hand, is often used to denote rotational movement around the vertical axis.
The counter-clockwise rotation mentioned in the question would correspond to movement along the A axis.
Therefore, the correct answer is: C. z-axis, A axis
For more details regarding CNC machine, visit:
https://brainly.com/question/15593597
#SPJ1
Which code is easier to learn, Python or C++. And which one is better than the other in your opinion
from the following list, select the additional benefits of integrating erp systems with financial management systems to provide centralized access and management of financial data.
The benefits of integrating ERP systems with financial management systems are:
a. improved visibility.
c. the ability to generate financial reports.
d. greater interaction between demand and supply.
What is integrating ERP systems?The process of integrating your ERP system with other business software is known as ERP integration.
Your systems can share data and information that are essential to various business activities thanks to the integration. It is a means to automate routine tasks and boost productivity within a company.
Therefore, the correct options are:
a. improved visibility.
c. the ability to generate financial reports.
d. greater interaction between demand and supply.
To learn more about integrating ERP systems, refer to the link:
https://brainly.com/question/14403939
#SPJ1
The question is incomplete. Your most probably complete question is given below:
Check All That Apply
improved visibility
structured compliance architecture
the ability to generate financial reports
greater interaction between demand and supply
Which security feature in windows 10 prevents malware by limiting user privilege levels?.
"User Account UAC" is a security thing in Windows 10 that prevents malware besides limiting user privilege levels.
What is defined as the term user privilege levels?Privilege levels allow you to specify which commands consumers can issue after logging into a network device."
Cisco Internetwork Operating System (IOS) has 16 privilege levels ranging from 0 to 15. Users with lower privilege levels have access to fewer commands than those with higher privilege levels.User Account Control (UAC) is a generic term term for a group of technologies that make it easier to use Windows with fewer privileges, such as registry as well as file virtualization, honesty levels, and elevation prompts. Protected Administrator (PA) accounts were created with consumers in mind, enabling Windows to be utilized with standard user privileges most of the time, and yet privileges can be elevated to filled administrator rights without the need for a separate user account's credentials. If the served its purpose the elevation request, UAC adds the necessary rights to the user's security token.Thus, "User Account UAC" is a security thing in Windows 10 that prevents malware besides limiting user privilege levels.
To know more about the user malware, here
https://brainly.com/question/399317
#SPJ4
Which of the following demonstrates an information system? Tyra is using the computer to create a birthday card for her friend. Ahmad is installing new software to improve the ease of accessing the database. Shania is creating a printed handbook of company policies for new employees. Ian is making updates to the company website to include the latest product information
Answer:
B. Ahmad is installing new software to improve the ease of accessing the database.
C. Shania is creating a printed handbook of company policies for new employees.
D. Ian is making updates to the company website to include the latest product information
Explanation:
Information Systems is an organized way of assembling, processing, storing, and sharing information. It is used by organizations to run their businesses. A typical information system will feature the people who run or control the process, the tasks they are meant to perform, the procedures which govern the work done, and the technology used to achieve those goals. Information systems incorporate information technology into the running of the business. The examples cited above, illustrate the application of information systems in business affairs. For example,
1. When Ahmad installs new software to improve the ease of accessing the database, the main components of an information system which includes; people (Ahmad), the task (which entails installation of the software), the procedures (that govern software installation), and the technology (apparently a computer system), all have a role to play.
HELP
Through photographs, we can represent concepts and ideas. From the following list of concepts, choose 10.
You should display the concept or idea in some way within your photograph. For example, if one concept was "Blue," you might photograph the color blue in the sky, a blue item of clothing, a person with a sad expression (which is sometimes described as "having the blues"), and so on. Be creative!
Happy
Pink
Chair
Music
Cold
Looking out
Vegetable
School
Smile
Love
Shadow
Up
Newness
Water
Red
Season
Door/Gate
Hand
Drink
Words
Treasure
Oldness
Natural
Beauty
Little
Part Two
Select your five favorite photographs to create a presentation on a computer. For each photograph, identify the concept that you are presenting and how you have shown this concept in the photograph.
Answer:
You need to pick 10 concepts from the list and take/pick a picture you think shows the concept. You then pick 5 of your favorites from the 10 and put them on a slideshow, explaining what concept it is and how it shows it.
Explanation:
So if I did vegetable, I would take a good picture of a carrot. Then, if I picked it as one of my five favorites, I would put it on a presentation and say, "This displays the concept of vegetables. My picture shows this concept because carrots are a type of vegetable."
what is the importance of familiarizing and understanding the cells rows and format tools in the microsoft cell
Answer:
so you know the cell rows
Explanation:
duh
What is a layer, in the context of this lesson?
the ethernet word for a packet
a device for remembering something
a logical unit of a system
a computer’s most basic program
Answer:
A logical unit of a system.
Explanation:
i'm thinking your are talking about system layers such as the ISO? Layers help identify the order of how the whole system works.
A logical unit of a system is a layer, was the based on the lesson in the main motive. Thus, option (c) is correct.
What is layer?The layer refers to the layering method of breaking up the delivery of messages into discrete components and activities. Communication programs are frequently multi-tiered. Layers are useful because they allow you to add components to an image and work on them one at a time without permanently affecting the original image.
A logical unit is a device or software program that allows an end user (an application program, a terminal user, or an input/output mechanism) to connect to a network. A logical unit number is a one-of-a-kind identifier for a single or group of physical or virtual storage devices that execute.
As a result, the logical unit of a system is a layer, was the based on the lesson in the main motive. Therefore, option (c) is correct.
Learn more about on layer, here:
https://brainly.com/question/13490759
#SPJ5
Select the correct text in the passage.
Which sentences highlight the correct way of preparing baked potato?
George finds that there are no vegetables at home today except potatoes. He decides to prepare something simple with the potatoes. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour. Joe is at home with his friend Elvis. He shows Elvis how to prepare baked potatoes. He preheats oven at 150°F. He then puts potatoes in water. After cleaning the potatoes, he bakes the potatoes in oven at 150°F for 30 minutes.
Answer:
. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour.
Explanation:this is correct because got it right on the test.
1.6 code practice: question 1 edhesive
Answer: g = input("Enter a word: ")
m= input("Enter a word: ")
print(g +" " +m)
Explanation:
Need answer ASAP
In which phrase does software coding and testing happen in the spiral model?
The spiral model does not have a separate testing phase. Both software coding and testing occurs during the _____ phase.
both software coding and testing occurs during Engineering phase
how to style rule for header footer aside
You may use CSS to style the HTML header, footer, and sidebar elements. As an illustration of how to style certain elements, consider the following CSS copy code: header background-color: #333; colour: #fff;
Padding: 20px; /* Style the header element /* The footer's background colour is #333, its colour is #fff, its padding is 10 pixels, and its text alignment is centre. The aside element should be styled. Background colour is #f5f5f5, padding is 10 px, float is to the right, and width is 30%. The header and footer components in this example have distinct padding values but the identical background and text colours. The text-align attribute is also used to centre the footer. The aside element is floating to the right and has a width of 30% of its container. It also has a separate background colour.
learn more about header footer here:
https://brainly.com/question/30436948
#SPJ4
Your local changes to the following files would be overwritten by merge.
If you haven't done so, you can stash your changes temporarily, pull the remote changes, and then apply your changes back to the merged code.
What can you do to avoid losing your local changes when merging changes made by someone else in a repository?When multiple people work on the same files in a project, conflicts can occur when merging changes. Git, a popular version control system, will alert you if your local changes conflict with changes made by someone else in the repository.
To avoid losing your local changes, you should first commit and push them to the repository before pulling changes from the remote branch. If you haven't done so, you can stash your changes temporarily, pull the remote changes, and then apply your changes back to the merged code.
Learn more about merged code.
brainly.com/question/14192987
#SPJ11
solve each ratio 35:7
Answer:
5:1
Explanation:
Divide each side by 7
execute chmod 400 subdir ; ls subdirand describe what happens, and why.here i want some detail as to why i get the messages that i get
This command will change the permissions of the subdir directory to 400.
What is subdir directory?A subdirectory, also known as a subfolder, is a directory that is located inside of another directory. Subdirectories are used to organize and store related groups of files and folders. For example, if you have a website, you could create a subdirectory for each page of your website, such as a “Home” folder and an “About” folder. Subdirectories can also be used to organize documents within a larger folder, such as a “Documents” folder that contains subfolders for different topics or projects.
This will make the directory only accessible by the owner. It means that only the owner can read, write, and execute the contents of the directory. When you use the ls subdir command, you will get an error message that you don't have the permission to access the directory because you don't have the required permissions (400). This is why you get the error message.
To learn more about subdir directory
https://brainly.com/question/18917489
#SPJ4
What is the very first step that should be taken when performing work with a computer?
Answer:
You should power down the system and unplug it.
In which of the following phases of filmmaking would a production team be focused on the
process of casting? (Select all that apply).
development
pre-production
distribution
post-production
Answer:
Pre-Production
Explanation:
Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.
Which of the following are advantages of using meaningful names for variables when writing a program? Select two answers.
1. Less variables will be required as the existing ones can be renamed throughout the program.
2. It is easier for a person reading the code to identify the purpose of a variable and follow the logic of the program.
3. It is simpler for the compiler to compile the program, meaning wait times and errors are reduced.
4. The programmer is less likely to make a mistake and use a variable for the wrong purpose.
Answer:
The answer is 2 and 4, please give brainliest award.
What is a named bit of programming instructions?
Answer:
Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
Answer:
ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
Explanation:
Answer:
Plzzzzzzzzzzzzzzzz tell me what is your question I will try to solve it
we cannot share software in computer network true or false
Answer:
false
Explanation:
false but other thing is that it can be very risky increasing the chances of getting infected by a virus