What is the minimum letter grade needed in con 101 to be able to apply for the cm program?

Answers

Answer 1

B is the minimum letter grade needed in con 101 to be able to apply for the cm program.

A configuration management (CM) program is a content management and systems engineering process used to track and control IT resources and services across an enterprise.

The critical cm activities include configuration identification, configuration control, configuration status accounting, configuration audits, planning, acquisition, and support.

The con 101 is an exam that measures your ability to accomplish the following technical tasks: deploy Windows client, manage identity and access, manage compliance policies and configuration profiles, manage, maintain, and protect devices, and manage apps.

Learn more about configuration management program here:

https://brainly.com/question/28209036

#SPJ4


Related Questions

daniel is to mentor a junior admin and bring him up to speed quickly. the topic you're currently explaining is authentication. which method uses a handshake to continually verify authentication for users, programs, or systems?

Answers

The method that uses a handshake to continually verify authentication for users, programs, or systems is called "continuous authentication."

Continuous authentication is a security method that involves ongoing verification of a user's identity to ensure that the person accessing the system or application is who they claim to be. The process of continuous authentication uses biometrics, behavioral analysis, and other forms of identification to continuously monitor and verify a user's identity during their entire session. This approach is used to enhance security, prevent unauthorized access, and reduce the risk of account takeover.

Learn more about cybersecurity here: brainly.com/question/27560386

#SPJ4

Need help pleaseeee!!!!!

Need help pleaseeee!!!!!

Answers

Answer:

Attenuation

Explanation:

This means the signal is getting weaker in long cables.

I have a string of christmas lights, and one went out. The rest still work, so I decided to just ignore the light bulb that went out because you can't tell from far away. Are my Christmas lights wired in a series circuit or a parallel circuit?

Answers

Answer:

Parallel circuit

Explanation:

When lights are in parrel circuit, a good example is the Christmas lights, each of the light has its own circuit connected to the power source. Such that as on of the light filaments gets burnt, it will have no effect on the other lights since they continue to be in a closed circuit, each on its own with the source of power.

What impact does social media have on political opinions?

Answers

Social media is a persuasive communication tool that frequently works to alter or influence beliefs, especially when it comes to political views. .

What elements influence the way we think politically?Some of them include family, family background, occupation, and education. One of these aspects is "family," which is the most crucial institution where all social and political processes are passed down from generation to generation ever since the birth of the individual. The family of an individual adopts and upholds political attitudes, according to a large body of research.Because there are so many ideas, thoughts, and opinions floating about on the social media platform, social media is a persuasive communication tool that frequently works to alter or influence beliefs, especially when it comes to political views.    

To learn more about Social media refer to:

https://brainly.com/question/3653791

#SPJ4

Which one of the following is not an advantage or disadvantage of shifting to robotics-assisted camera assembly methods? Copyright owl Bus Software Copyna distributing of a party website posting probled and cont copyright violation The capital cost of converting to robot-assisted camera assembly can increase a company's interest costs to the extent that a portion of the capital costs are financed by bank loans O Robot-assisted camera assembly increases the annual productivity of camera PATs from 3,000 to 4,000 cameras per year. Robot-assisted camera assembly reduces the size of product assembly teams from 4 members to 3 members Robot-assisted assembly reduces total annual compensation costs per PAT and also reduces the overtime cost of assembling a camera O Robot-assisted camera assembly increases annual workstation maintenance costs

Answers

The option "Robot-assisted camera assembly increases annual workstation maintenance costs" is not an advantage or disadvantage of shifting to robotics-assisted camera assembly methods.

Shifting to robotics-assisted camera assembly methods can have various advantages and disadvantages. However, the specific option mentioned, which states that robot-assisted camera assembly increases annual workstation maintenance costs, does not fall under the advantages or disadvantages typically associated with this shift. It is important to note that the option suggests a negative aspect, but it does not directly relate to the advantages or disadvantages of robotics-assisted camera assembly.

The advantages of shifting to robotics-assisted camera assembly methods often include increased productivity, reduction in assembly team size, decreased compensation costs, and improved efficiency. Disadvantages may include high initial capital costs, potential financing-related interest costs, and potential challenges in maintenance and repairs. However, the mentioned option about increased workstation maintenance costs does not align with the typical advantages or disadvantages associated with robotics-assisted camera assembly methods.

Learn more about Robot-assisted camera  here:

https://brainly.com/question/27807151

#SPJ11

PLEASEEE HELP HURRY

PLEASEEE HELP HURRY

Answers

To start searching for a scholarly article on G. o. ogle Scholar, you should:

"Type the title of the article or keywords associated with it." (Option A)

What is the rationale for the above response?

Here are the steps you can follow:

Go to Go. o. gle Scholar website In the search box, type the title of the article or relevant keywords associated with it.Click the "Search" button.Browse through the search results to find the article you are looking for.Click on the title of the article to view the abstract and other details.If the article is available for free, you can download or access it directly from the search results page. If not, you may need to purchase or access it through a library or other academic institution.

Note that you can also use advanced search options and filters available on Go. ogle Scholar to narrow down your search results based on various criteria, such as publication date, author, and journal.

Learn more about G. o. ogle at:

https://brainly.com/question/28727776

#SPJ1

True or false? Software application packages function as the interface between the operating system and firmware

Answers

The statement "Software application packages function as the interface between the operating system and firmware" is FALSE. Here's why:Software application packages are software programs that perform particular tasks. They are designed to assist users in executing tasks related to a specific purpose.

They are programs that run on top of the operating system of a computer. They can be used in conjunction with the operating system to perform various tasks such as running utilities, designing images, and creating documents, among other things.The operating system, on the other hand, is a critical software component of a computer system that allows other software applications to communicate with hardware.

It is the interface between the user and the hardware of a computer system. The operating system manages the computer's memory, input/output, and file systems, among other things.In terms of firmware, it is a type of software that is embedded in a hardware device.

Firmware is responsible for enabling the device to operate and providing instructions on how it should operate. An example of firmware is the software that powers a keyboard or a printer.To summarize, software application packages, operating systems, and firmware are all essential components of a computer system.

However, they are distinct software components with unique functionalities and roles in a computer system. So, the statement "Software application packages function as the interface between the operating system and firmware" is FALSE.

To know more about statement visit:

https://brainly.com/question/17238106

#SPJ11

the security principle known as ___ gives individuals a certain level of access based on who they are.

Answers

The security principle known as "Authorization" gives individuals a certain level of access based on who they are. Authorization as a security principle is given below.Authorization is a security principle that allows individuals to obtain access to resources based on their identities or roles.

Access to resources may be granted or denied to individuals depending on the security level they possess.Authorization aids in ensuring that the right users have access to the appropriate resources. Authorization is the procedure of granting or denying a user or system a certain level of access to a resource. An entity that has been authorized can then utilize the resource in question, whereas one that has been refused authorization is denied access.

Authorization is frequently utilized in conjunction with authentication, which involves determining an individual's identity. Only after an individual's identity has been established can authorization be used to define what resources or operations a user may access or perform.Authorizing access for individuals on a need-to-know basis is important because it ensures that data is only seen by those who are authorized to see it.

To know more about level of access visit:

https://brainly.com/question/20414679

#SPJ11

Explain why modern computers consist of multiple abstract levels and describe the main functions of each level

Answers

Modern computers must be quick, effective, and safe, which is why the system was introduced with several abstract layers. Abstract classes can always be used in multilevel inheritance.

Are two abstract methods allowed in a class?

A class can only extend one abstract class in Java, but it can implement numerous interfaces (fully abstract classes). Java has a purpose for having this rule.

Can we use many abstract methods?

The abstract keyword is used to make a class abstract. It may have 0 or more non-abstract and abstract methods. We must implement the abstract class's methods and extend it. It is not instantiable.

To know more about Abstract classes visit :-

https://brainly.com/question/13072603

#SPJ4

What is the unique name given to a class called?

Answers

Answer:

A class is an extensible program-code template for creating objects.

Source: https://en.wikipedia.org/wiki/Class_(computer_programming)

,  Hope this helps:)

Have a great day!!

How can I watch you-tube on my school computer without it being blocked on the computer when it uses Lightspeed Systems Relay or do you know any playback sites that aren't blocked ?

Answers

Answer:

if u use chrome u can probably look on chrome extensions and search you-tube unblocker and add it to ur chrome

If you use a shorter focal length your subject will look more distorted than if you were to use a longer focal length ex. 24mm vs 100mm


True

False

Answers

If you use a shorter focal length your subject will look more distorted than if you were to use a longer focal length is a false statement.

Is a shorter focal length better?

The longer the focal length, the image is said to be more narrower at the angle of view and also there is a higher rate of magnification. The shorter the focal length, there is seen to be a wide  angle of view and the lower the image magnification.

Therefore, If you use a shorter focal length your subject will look more distorted than if you were to use a longer focal length is a false statement.

Learn more about focal length   from

https://brainly.com/question/1031772

#SPJ1

which tab should gemima use to open the formula dialog box

Answers

Answer:

Layout, Data, and Formula

Explanation:

ALU can only perform arithmetic operations??True or false​

Answers

Answer:

I believe the answer is True

Explanation:

Its the Logic Unit of Arithmetic. It only preforms specific operations based on the instructed fetched from the memory  

Answer:

False

Explanation:

it is false because ALU can also perform logical operators.

What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>

Answers

Explanation:

the output password is isalpha()

3 things in terms of photography to learn about.

Answers

The three important principle in photography are;

Light Subject and Composition.

What is the explanation for these terms?

Photography is about light. Without it, you couldn't even take images, let alone excellent ones.

The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.

Most of us snap photos because something catches our attention.

Unsurprisingly, that "something" is your subject.

If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.

Finally, the composition is the third and most important aspect of every shot.

Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.

Learn more about photography:
https://brainly.com/question/30685203
#SPJ1

please help me... I'd really appreciate it.

please help me... I'd really appreciate it.

Answers

Answer:

output is less

Explanation:

ODD-EVEN. Write a snippet code to solve the following. Assume that you have an array of positive integers arr. The array is already full and properly populated with positive int numbers. The array arr is of size SIZE. ( no need to declare it or fill it up, assume it is already there). You will copy all the even numbers into an array of size SIZE called even

and

You will copy all the odd numbers into an array of size SIZE called odd

You will print the total numbers on each array

Answers

Note that the code that executes the above is given as follows;

// initialize arrays

int[] arr = {2, 5, 7, 8, 10, 11, 14, 16};

int[] even = new int[arr.length];

int[] odd = new int[arr.length];

int evenCount = 0;

int oddCount = 0;

// copy even and odd numbers into respective arrays

for (int i = 0; i < arr.length; i++) {

   if (arr[i] % 2 == 0) {

       even[evenCount] = arr[i];

       evenCount++;

   } else {

       odd[oddCount] = arr[i];

       oddCount++;

   }

}

// print total numbers in each array

System.out.println("Even numbers:");

for (int i = 0; i < evenCount; i++) {

   System.out.print(even[i] + " ");

}

System.out.println("\nTotal: " + evenCount);

System.out.println("\nOdd numbers:");

for (int i = 0; i < oddCount; i++) {

   System.out.print(odd[i] + " ");

}

System.out.println("\nTotal: " + oddCount);


What is the rationale for the above response?

This code initializes an array arr with some values and creates two new arrays even and odd of the same size as arr.

It then loops through each element of arr and checks if it's even or odd, and copies it into the appropriate array. It also keeps track of how many even and odd numbers there are using evenCount and oddCount.

Finally, it prints out the values in each array and the total number of elements in each array.

Learn more about Codes at:

https://brainly.com/question/29099843

#SPJ1

HELP ME PLZZZ
What are the special concerns about cyberbullying?

Answers

Answer:

a. Low self-esteem

b. Weight loss or change appearance

What are the possible values you can store in the C# "bool" data type?
a
A or B
b
true or false
c
more or less
d
1 or 2

Answers

Answer:

d are the values that can be stored in the c#"bool"data type

suppose you have the option of running three algorithms, alg1, alg2, alg3, with running times o(1000n ln n), o(n3), 300n2, respectively. which algorithm would you select (i.e., which one is the fastest according to big-oh analysis) to run on input instances with arbitrarily large sizes n?

Answers

Since Alg1 is n squared, I am aware that it is the fastest of these algorithms. Alg2 is presumably the slowest because it is 2^n, which is known to perform very poorly, followed by Alg4 because it is n cubed.

Define the term algorithms?

An algorithm is a method used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

All aspects of information technology employ algorithms extensively. A algorithm is a series of guidelines for resolving a dilemma or carrying out a task. A recipe, that consists of detailed directions for creating a dish or meal, is a typical illustration of an algorithm. One of the most significant algorithms available now is the merge sort algorithm. It is a comparison-based sorting algorithm that overcomes an O(n2) difficulty using the divide-and-conquer strategy.

Since Alg1 is n squared, I am aware that it is the fastest of these algorithms.

Thus,  Alg2 is presumably the slowest because it is 2^n, which is known to perform very poorly, followed by Alg4 because it is n cubed.

To know more about the algorithms, here

https://brainly.com/question/15802846

#SPJ4

BTW this is for python also don't make it complicated make it easy
1. You are beginning to prepare for post-secondary education! You are looking to see if your marks are good enough to get into various schools. You will:
a. Prompt user input for their name and their marks. You will always be in exactly 4 courses and your marks will be integers (i.e. you cannot receive a 90.5% in a course).
b. Prompt the user for a post-secondary school and the average needed to get into that school.
c. If the user enters a mark or average that is not an integer, below 0, or above 100, prompt them again.
d. Calculate the average mark of the user. Round the average to one decimal place.
e. Output the user’s average, their letter grade and whether the user has a high enough average to get into the school they have entered.
Sample Input:
Name = Mr. Slater
Mark 1 = 90
Mark 2 = 90
Mark 3 = 90
Mark 4 = 90
School 1 = Queen’s
Average 1 = 85Sample Output:
Mr. Slater’s average is 90.0%! That is an A.
Mr. Slater has a high enough average for Queen’s!

BTW this is for python also don't make it complicated make it easy1. You are beginning to prepare for

Answers

Answer:

name = input('Enter name: ')

grades = [input("Enter Grade #" + str(i+1) + ": ") for i in range(4)]

dream_school = input('Enter school: ')

average = round(sum(grades)/len(grades), 1)

if average < 60:

   letter = 'F'

elif average < 70:

   letter = 'D'

elif average < 80:

   letter = 'C'

elif average < 90:

   letter = 'B'

else:

   letter = 'A'

print(name + "'s average is " + str(average) + ". That is a " + letter)

if letter == 'A': print(name + "has enough for " + dream_school)

PROJECT RISK MANAGEMENT: CASE STUDY Roy and his team identified some risks during the first month of the My R & R Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Roy has decided to be more proactive in managing risks. He also wants to address positive risks as well as negative risks ASSIGNMENT INSTRUCTIONS 1. Read the Case Study 2. Create a risk register for the project using the Risk Register Excel template attached. Identify six potential risks, including risks related to the problems described in the Case above. Include both negative and positive risks. 3. Plot the six risks on a probability/impact matrix using the template attached. Also, assign a numeric value for the probability and impact of each risk on meeting the main project objective. Use a scale of 1 to 10 in assigning the values, with 1 representing the lowest values. For a simple risk factor calculation, multiply the probability score and the impact score. Add a column called Risk Score to your risk register to the right of the impact column. Enter the new data in the risk register. Copy your impact matrix and new risk register to a word document and write your rationale for how you determined the scores for one of the negative risks and one of the positive risks. 4. Develop a response strategy for one of the negative risks and one of the positive risks. Enter the information in the risk register. Copy your risk register and impact matrix to your word document with your rationale, response strategy, and a separate paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy as well

Answers

A risk response strategy for negative risks typically involves mitigating, avoiding, transferring, or accepting the risk, while for positive risks, strategies often include exploiting, enhancing, sharing, or accepting the risk.

1. Risk Register:

- Create a table with columns such as Risk ID, Risk Description, Risk Category, Probability, Impact, Risk Score, and Response Strategy.

- Identify six potential risks related to the problems mentioned in the case study. Consider risks such as key team members leaving, uncooperative users, lack of status information, etc. Make sure to include both negative and positive risks.

- Fill in the risk register with the identified risks and their respective details.

2. Probability/Impact Matrix:

- Create a 2x2 matrix with the X-axis representing the probability and the Y-axis representing the impact.

- Assign a numeric value (ranging from 1 to 10) for the probability and impact of each risk. The higher the value, the greater the probability or impact.

- Multiply the probability score by the impact score to calculate the Risk Score. Enter this value in the Risk Score column of the risk register.

- Copy the impact matrix and the updated risk register to a Word document.

3. Rationale:

- Select one negative risk and one positive risk from your risk register for which you'll provide the rationale.

- In your Word document, explain how you determined the scores for the selected risks. Consider factors such as the likelihood of occurrence, potential consequences, historical data, expert judgment, etc.

4. Response Strategy:

- Choose one negative risk and one positive risk to develop response strategies.

- In the risk register, add a column for Response Strategy and fill in the appropriate response for each risk.

- In your Word document, describe the response strategies chosen and explain why they are appropriate for mitigating the risks.

- Additionally, outline the specific tasks required to implement each strategy, along with time and cost estimates for each task.

Remember, a risk response strategy for negative risks typically involves mitigating, avoiding, transferring, or accepting the risk, while for positive risks, strategies often include exploiting, enhancing, sharing, or accepting the risk.

Learn more about Risk Register here:

https://brainly.com/question/31942299

#SPJ11

why does my ps4 keep disconnecting from the internet

Answers

Answer:

It could be a variety of reasons depending on your form of connection. Wireless, it could be distance from router causing packet loss or disconnection. Wired, damaged or poor wire, or bad internet. What do you know about your connection?

Which of the following items can you locate in a document using the navigation pane? Choose the answer.
A) search results
B) pages
C) headings
D) all of the above

Answers

Answer:

D: All of the above

Explanation:

Which of the following items can you locate in a document using the navigation pane? Choose the answer.A)

FILL THE BLANK. a typical chilled water system is designed to operate with a leaving water temperature of ____°f.

Answers

Answer-A typical chilled water system is designed to operate with a leaving water temperature of 42°F.

When we are learning to count in school, which method do we use?
A: 9 numeral system
B: 10- base decimal method
C: Binary Number System
D: Advanced Counting System

Answers

Answer:

option no. c

Explanation:

What is your favorite comedy show?

Answers

Answer:

Saturday Night Live or The Tonight Show

Explanation:

(True or False) When you set styles in the Pages Properties dialog box, they will overwrite styles in an external style sheet?

Answers

Answer:

That will be True.

Explanation:

After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities

Answers

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

https://brainly.com/question/15899195

Other Questions
Exam A list of individual accounts with a common characteristic is known as a(n): a. General ledger b. All-purpose ledger c. Subsidiary ledger d. Special ledger e. Column balance ledger Explains the historical background of the 23rd amendment and why its provisions were included in the Constitution. PLEASE HELP ME Eight students share 12 mini oatmeal muffins equally and 6 students share 27 mini apple muffins equally. Carmine is in both groups of students.What is the total number of mini muffins Carmine gets? HELP! ONLY HAVE 4 MINS!!!!!!1 Rectangle ABCD is congruent to rectangle A"B"C"D"Which sequence of transformations could have been used totransform rectangle ABCD to producerectangle A"B" C"D" ?ORectangle ABCD was reflected across the y-axisand then across the x-axis.Rectangle ABCD was rotated 180 around theorigin and then translated 7 units down.Rectangle ABCD was translated 2 units left andthen 3 units down.Rectangle ABCD was translated 8 units left andthen 7 units down.-7-6-5-4-3-2B0432AB2OU 1. (1st Doc) What is Richard Pratt's opinion of the Carlisle School? Need help ASAP! I dont understand my Stats homework :( In a study of the accuracy of fast food drive-through orders, Restaurant A had 240 accurate orders and 73 that were not accurate. A. Construct a 90% confidence interval estimate of the percentage of orders that are not accurate.b. Compare the results from part (a) to this 90% confidence interval for the percentage of orders that are not accurate at Restaurant B: 0.211 < P in the 1980's, the afl-cio advocated a government ban on all computer at-home work. true or false according to kurt lewin's model of the change process, current behavior is maintained when: gip mnhh vi mi ngi A Venn diagram below to show the characteristics of two kingdoms of organisms. Which of these is characteristics could be described in the shaded part of the diagram? Please choose all responses that apply. Question 2 options: both are unicellular both are eukaroyotic both are heterotrophic both have cell walls both are mobile both are immobile 30 tickets are sold for a raffle with two prizes. You bought two tickets. What is the probabilitythat you will win both prizes? Distributive Property and Combining Like Terms WS2ObjectiveTo simplify algebraic expressions using the distributive property.Simplify1. 4(3x+1) 12x+42. 5(5x4)3. -(2x-1)I need to know the answer When President George W. Bush opened the Salt Lake 2002 Winter Olympic Games, he was fulfilling the role of 7th Grade MathPlease help-7 = 1/3 aFind the value of a A local charity is selling seats to a baseball game. Seats cost $16 each, and snacks cost an additional $4each. The charity needs to raise $160 to consider this event a success.Use the graph to approximate how many snacks the charity must sell if 5 seats are sold. You need 1 1/4 cups of sugar to make 20 cookies To make 6 cookies, you will need cups of sugar. Enter your answer as a fraction or whole number. solve for x solve for x solve for x A radio wave has a frequency of 3. 8 x 1010 hz. what is the energy (in j) of one photon of this radiation? (use scientific notation in your answer: 1. 0e29) A circle with radius of \greenD{1\,\text{cm}}1cmstart color #1fab54, 1, start text, c, m, end text, end color #1fab54 sits inside a \blueD{3\,\text{cm} \times 3\,\text{cm}}3cm3cmstart color #11accd, 3, start text, c, m, end text, times, 3, start text, c, m, end text, end color #11accd rectangle.