Answer:
the best way to farm exotics in destiny is talking to xur and playing nightfall all day but play at least on hero or legend difficulty to get exotics faster because it is very common to get them on those difficulties and more higher difficulties.
Explanation:
The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
Answer:
Deployment
Explanation:
Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.
So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.
Answer:
Deployment
Explanation:
How we ingest streaming data into Hadoop Cluster?
Hadoop could be described as an open source program to handle big data. By utilizing the MapReduce model, Hadoop distributes data across it's nodes which are a network of connected computers. This data is shared across the systems and thus enables it to handle and process a very large amount dataset at the same time. These collection of networked nodes is called the HADOOP CLUSTER.
Hadoop leverages the power and capabilities of it's distributed file system (HDFS) which can handle the reading and writing of large files from log files, databases, raw files and other forms of streaming data for processing using ingestion tools such as the apache Flume, striim and so on. The HDFS ensures the ingested data are divided into smaller subunits and distributed across systems in the cluster.
Learn more : https://brainly.com/question/15548105
Which of the following best describes the impact of Creative Commons?
Creative Commons gives creators of digital content the ability to indicate how their works can be legally used and distributed, enabling broad access to digital information.
Creative Commons gives Internet users the right to legally use and distribute any previously copyrighted work, enabling broad access to digital information.
Create Commons provides lossless transmission of messages, enabling reliable distribution of digital information.
Creative Commons provides private transmission of messages, enabling secure distribution of digital information.
Answer:
it’s just a screenie hope it helps
5. What are Excel cell references by default?
Relative references
Absolute references
Mixed references
Cell references must be assigned
Answer: relative references
Explanation:
By default, all cell references are RELATIVE REFERENCES. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.
Of the three primary types of eating disorders the most common
Answer:
i think binge eating disorder is the most common
Explanation:
Jabari is writing pseudocode for a new video game he wants to create. What should he include in his pseudocode?
Answer:
He should include what kind of game he is trying to make.
Explanation:
9
10
11
12
13
14
15
16
17
Which of the following is a shortcut used to copy selected or highlighted contents to
clipboard. (A) ctrl+A (B) ctrl+B (C) ctrl+Y (D) ctrrl+C
The shortcut use to open a new file / documents is ---(A) ctrl+K (B) ctrl+N (C) ctrl+M
(D) ctrrl+C
The best software for payroll calculation is --- (a) MS-Excel (b) CorelDraw (c) MS-
Access (d) MS-PowerPoint
GUI means: (a) graphical user input (b) graphical user interface (c) graphical user
internet (d) graphical used interface
Which of the following is an example of a word processing software: (a) CorelDraw (b)
WordPad (c) MS-Excel (d) Word Art
Which of the physical structure of the computer is NOT related --- (a) keyboard (b)
mouse (C) scanner (d) printer
Mouse, keyboard, system unit, printer, and speaker are best refers to: (a) components
(b) parts (c) hardware (d) software
Modern computer depending upon their application are classified as special purpose
computer and Purpose computer (a) new (b) original (c) all (d) general
The basic features of first generation computer is: (a) digital tube (b) vacuum tube (c)
valve tube (d) digital valve
The answers are in the order: D, B, A, B, D, C, C, D, B
Understanding computerA computer is an electronic device that accepts data, processes data to give information and finally store the data.
It is designed to receive, process, and output information, and can be programmed to perform a variety of tasks. Modern computers typically consist of hardware components, such as the central processing unit (CPU), memory, storage, and input/output devices like a keyboard and a monitor, as well as software components, such as the operating system and applications.
Computers have become an integral part of modern society and are used for a wide range of purposes, from personal use to business, education, and scientific research.
Learn more about computer shortcuts here:
https://brainly.com/question/30590269
#SPJ1
“What is an example of the vocabulary word foreshadow?” This question could be a
a.
Potential question
c.
Flashcards question
b.
Vocabulary definition
d.
Both A and C
Please select the best answer from the choices provided
A
B
C
D
Answer:
D) Both A and C
Explanation:
Answer:
D
Explanation:
Calculate how many bytes are in a i) 750GB ii) 5Terabytes
Answer:
750GB = 750,000,000,000 Bytes5TB = 5,000,000,000,000 BytesExplanation:
I hope it helps!!!
What number does this binary code represent?
(don’t mind the 36)
In JAVA with comments: Consider an array of integers. Write the pseudocode for either the selection sort, insertion sort, or bubble sort algorithm. Include loop invariants in your pseudocode.
Here's a Java pseudocode implementation of the selection sort algorithm with comments and loop invariants:
```java
// Selection Sort Algorithm
public void selectionSort(int[] arr) {
int n = arr.length;
for (int i = 0; i < n - 1; i++) {
int minIndex = i;
// Loop invariant: arr[minIndex] is the minimum element in arr[i..n-1]
for (int j = i + 1; j < n; j++) {
if (arr[j] < arr[minIndex]) {
minIndex = j;
}
}
// Swap the minimum element with the first element
int temp = arr[minIndex];
arr[minIndex] = arr[i];
arr[i] = temp;
}
}
```The selection sort algorithm repeatedly selects the minimum element from the unsorted part of the array and swaps it with the first element of the unsorted part.
The outer loop (line 6) iterates from the first element to the second-to-last element, while the inner loop (line 9) searches for the minimum element.
The loop invariant in line 10 states that `arr[minIndex]` is always the minimum element in the unsorted part of the array. After each iteration of the outer loop, the invariant is maintained.
The swap operation in lines 14-16 exchanges the minimum element with the first element of the unsorted part, effectively expanding the sorted portion of the array.
This process continues until the entire array is sorted.
Remember, this pseudocode can be directly translated into Java code, replacing the comments with the appropriate syntax.
For more such questions on pseudocode,click on
https://brainly.com/question/24953880
#SPJ8
Suppose your training examples are sentences (sequences of words). Which of the following refers to the j^th word in the i^th training example?
We index into the ith row first to get ith the training example (represented by parentheses), then the column to get jth the word (represented by the brackets).
a. x^(j)
b. x^(j)
c. x^(i)
Answer:
a. x^<i>(j)
Explanation:
The solution has been explained in the question; however, I will provide further explanation.
The sequence to access a word is:
Training example --> Word
In other words, you first access the training example, before you gain access to the word being searched for.
Rewrite the following:
Training example --> Word
as:
ith training example --> jth word
Hence, the representation is:
\(x^{(i)<j>\)
What are the letters associated with home rows keys?
Answer:
The letters are 'a s d f g h j k l ;' .These are the letters associated with the home keys.
Answer:
In order to maximize the range your two hands can reach on a keyboard, they should be positioned in the middle of the keyboard.Your left fingers should be resting on the letters A,S,D and F.And your right fingers should be resting on the keys J,K,Land semicolon.This set of eight keys is known as home row
3. List and explain FIVE (5) types of services performed by
operating system?
The Power Query Editor cannot merge queries ?
True
False
1. Identify two real-world examples of problems whose solutions do scale well.
2. Identify two real-world examples of problems whose solutions do not scale well.
3. Identify one problem that is so complex that there is no computational solution to feasibly solve the problem in a reasonable amount of time.
1. Identify two real-world examples of problems whose solutions do scale well.
ANSWER; Real word examples of
problems whose solutions do scale well are;
- To find the smallest/ largest element in a list of data.
This is used when there is trial to find from a table the person that posseses the largest attribute.examples are salary and age.
Or it is also used when finding the highest score on a test, however,this is scalable as it can be done by both humans and machines according to the problem size but in the same fashion.
- Solving simple arithmetic equations.
Solving a simple arithmetic problem is one of an easily scaled problem, however,this depends on the number of operations and the variables present in the equation and which corresponds to daily life situations like adding, finding mean and counting.
2. Identify two real-world examples of problems whose solutions do not scale well.
Real word examples of problems which do not scale well are;
- The sorting of a large list of numbers do not scale well,this is because as the steps required increases as square or increases as more by the increase in size.
- Multiplication of matrices for various applications.example of this is like solving equations.
3. Identify one problem that is so complex that there is no computational solution to feasibly solve the problem in a reasonable amount of time.
Example of a problem that is not feasible computer-wise would be to find the optimal way or best to play the game of Chess. Here, it is possible to tell a good move but to tell the best move is computationally not possible.
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
I have already asked this before and recieved combinations, however none of them have been correct so far.
Help is very much appreciated. Thank you for your time!
Based on the information provided, we can start generating possible six-digit password combinations by considering the following:
The password contains one or more of the numbers 2, 6, 9, 8, and 4.
The password has a double 6 or a double 9.
The password does not include 269842.
One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.
Using this method, we can generate the following list of possible password combinations:
669846
969846
669842
969842
628496
928496
628492
928492
624896
924896
624892
924892
648296
948296
648292
948292
Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.
When Jenna borrows her dad's office chair, it's too big for her, so her feet dangle and don't reach the floor—which can cause what?
A: eye strain
B: carpal tunnel syndrome
C: a repetitive motion injury
D: slouching posture
Answer:
D
Explanation:
Answer:
B: carpal tunnel syndrome
Explanation:
YYou have to have your hand on the ddesk.
A sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted. A control procedure that would serve as a preventive control for this situation would be:
Answer:
a simple IF statement using Regex
Explanation:
In any coding language, a good control procedure for this would be a simple IF statement using Regex. In the IF statement you can grab the account code and compare it to a regular expression that represents the correct format. IF the account code is in the correct format (matches the regular expression), then you go ahead and save the account code for use. Otherwise, you would output an error and ask for another account code. This will prevent the program from trying to use an account code that is not valid.
The White House spokesman said that if the relevant bill was sent to the desk, US President Biden would sign to end the national emergency of COVID-19 in advance, although he strongly opposed it. The US Senate will vote on the evening of the 29th local time and is expected to pass
The requirement for the Senate to vote on the bill is a standard legislative process in the United States.
Why the senate votes on billsIn order for a bill to become law, it needs to be approved by both the House of Representatives and the Senate. The legislative branch of the US government is divided into two chambers—the House of Representatives and the Senate—each with its own set of responsibilities.
Once a bill is introduced in either chamber, it goes through a series of committee reviews, debates, and amendments before being put to a vote.
Read more on bills here https://brainly.com/question/29613391
#SPJ1
The White House spokesman said that if the relevant bill was sent to the desk, US President Biden would sign to end the national emergency of COVID-19 in advance, although he strongly opposed it. The US Senate will vote on the evening of the 29th local time and is expected to pass
Why does the senate have to vote on a bill
Give an example of a type of college, along with 3 benefits of attending that type of college.
A good example of a type of college is Community colleges and the 3 benefits of attending that type of college are:
You'll have higher marketability.Access to greater employment possibilities.Greater earning potential.in the US, what is a community college?Two-year courses at community colleges can be taken to earn an Associate of Arts (AA) or an Associate of Science (AS) degree. These universities also provide technical and vocational programs with strong ties to area secondary and high schools, civic organizations, and employers.
Note that Before moving to a four-year program, attending community college might be an economical method to test the water in higher education. But these institutions also provide a wide range of courses that let students skip college entirely.
Learn more about Community colleges from
https://brainly.com/question/9379517
#SPJ1
You have finished the installation and set up of Jaba's Smoothie Hut. Kim asks for the VPN to be setup
Three wireless access points, a 24-port switch, and a modem/router with 100 Mbps service make up the best configuration for Jaba's Smoothie Hut's dedicated internet service, which should have enough bandwidth to handle customer demand and run the business.
What is meant by VPN?A virtual private network (VPN) is a method for establishing a safe connection between two networks, or between a computer and a network, via a public or insecure communication channel like the Internet.The term "virtual private network" (VPN) refers to a service that aids in maintaining your online privacy. With the help of a VPN, you may create a private tunnel for your data and communications while using public networks. Your computer and the internet are connected in a secure, encrypted manner through a VPN. The capacity to establish a secure network connection when using public networks is known as a virtual private network, or VPN.A VPN enables you to encrypt your internet traffic and disguise your online identity. As a result, it will be more difficult for other parties to keep tabs on your internet usage and steal data.To learn more about VPN, refer to:
https://brainly.com/question/16632709
#SPJ1
In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year
Answer:
In Python:
tuition = 7180
year = 2019
rate = 0.035
for i in range(2019,2027):
print(str(year)+": "+str(round(tuition,2)))
tuition = tuition * (1 + rate)
year = year + 1
Explanation:
This initializes the tuition to 7180
tuition = 7180
This initializes the year to 2019
year = 2019
This initializes the rate to 3.5%
rate = 0.035
This iterates through years 2019 to 2026
for i in range(2019,2027):
This prints the year and tuition
print(str(year)+": "+str(round(tuition,2)))
This calculates the tuition
tuition = tuition * (1 + rate)
This increments year by 1
year = year + 1
William has been working as a senior networking professional at Mediaworks Ltd. The company has a very strict policy regarding employees' access to certain key rooms in the organization. The company wants William to provide a specific access technology to only a few selected employees so that they can access those certain rooms. Which of the following options are best suited for William in this scenario?
1. Access badges
2. Biometrics
3. Cipher Lock
4. Access control vestibule
Physical and sensible. Campuses, structures, rooms, and physical IT assets are all subject to physical access control. Connections to computer networks, system files, and data are restricted by logical access control. Thus, option A is correct.
What William to provide a specific access technology?The Managing Director of Financial Technology Investment Banking at William Blair, Jamie Hamilton, outlines how and why embedded Fintech is rapidly encroaching on the market for vertical software.
Jamie will discuss how businesses are becoming increasingly comfortable obtaining financial services directly from the software providers that support them, including payment acceptance, payment disbursement, and loans.
Therefore, Access badges re best suited for William in this scenario.
Learn more about technology here:
https://brainly.com/question/29837008
#SPJ1
Suppose I want to query for all column content in the Accounts table (i.e. first name, last name and password). What would be typed into the input field?
Suppose one needs to query for all column content in the Accounts table (i.e. first name, last name and password), What should be typed into the input field is:
SELECT first_name, last_name, password FROM Accounts;
What is the rationale for the above answer?It is to be noted that the above query retrieves the values for the columns "first_name", "last_name", and "password" from the table named "Accounts". The "SELECT" keyword is used to specify the columns that you want to retrieve, and the "FROM" clause specifies the table from which you want to retrieve the data.
The semicolon at the end of the query is used to terminate the statement.
Learn more about Queries:
https://brainly.com/question/29841441
#SPJ1
(ANSWER ASAP!! GIVING BRAINLIEST IF CORRECT :))
Before she applies for an internship with a local engineering company, what type of letter might Zaynab ask one of her teachers to write for her?
A: resignation letter
B: complaint letter
C: thank-you letter
D: recommendation letter
Answer:
D
Explanation:
She would want a teacher to write a recommendation letter. A recommendation letter vouches for the student and explains why the student would be a good fit for the job.
Answer:
Recommendation letter
Explanation:
A recommendation letter vouches for the student and explains why the student would be a good fit for the job.
While working a night job at a call center, Carlos creates an app called DineSmart, which can be used to place orders at restaurants, rate the restaurants, and make reservations. Because he receives good responses for his app, he quits hiscurrent job to focus his efforts on DineSmart. He creates a start-up called TYOP and hires three people to help himimprove DineSmart and maintain the servers that run it. In this scenario, TYOP most likely has a _____ structure.
TYOP most likely has a centralized structure in this scenario.
What phrase best sums up an organization's structure?The roles, teams, and employees of a company are outlined hierarchically in the organizational structure. Organizational structures outline the tasks that employees perform, who they answer to, and how decisions are made at all levels of the company. Your organizational structure must at the very least include the names of employees and basic hierarchies.
The definition of a functional structure is?A functional structure is a company structure based on the purpose of each position within the company and the expertise of the team members who fill each role.
To know more about structure visit:-
https://brainly.com/question/10730450
#SPJ4
Does anyone know anything about the difference between analog and digital signals?
I don't understand it and I have to write an entire essay about it. Any information would help.
Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?
Answer: NAT
Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP? One-to-many NAT allows multiple devices on a private network to share a single public IP address.
The following that allows for hundreds of computers all to have their outbound traffic translated to a single IP is the One-to-many NAT. Option C
How does One-to-many NAT works
One-to-many NAT allows hundreds of computers to have their outbound traffic translated to a single IP this is done by designating each computer to a unique port number, that is used to identify the specific device within the the network address transition NAT, where all private network gain access to public network .
The NAT device serves as translator, keeping track of the original source IP and port number in the translation table, translates the source IP address and port number of each outgoing packet to the single public IP address, This allows for a possible multiple devices to share a single IP address for outbound connections.
Learn more about One-to-many NAT on brainly.com/question/30001728
#SPJ2
The complete question with the options
Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?
a. Rewriting
b. Port forwarding
c. One-to-many NAT
d. Preservation
the incident response method segregates the infected systems and the attacker from the rest of the network. Segmentation| Content Filter | DLP Setting| Issolation.
The incident response method segregates the infected systems and the attacker from the rest of the network is isolation.
The steps in the incident response process include spotting an attack, assessing its seriousness and prioritizing it, investigating and mitigating the attack, resuming operations, and taking precautionary actions to ensure it never happens again.
An organization may be ready for both the known and unexpected by using incident response, which is also a dependable way to spot security incidents as soon as they happen. A company can create a set of best practices through incident response to stop an infiltration before it causes damage.
Running a business requires incident response because most businesses rely on sensitive data that could be harmfully compromised.
Simple viruses, unsecured employee computers and database leaks are just a few examples of incidents that could happen. Any of these occurrences could have both immediate and long-term consequences that would affect the company as a whole.
To learn more about incident response click here:
brainly.com/question/29494224
#SPJ4