While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database?

Answers

Answer 1

Answer:

WID Connectivity

Explanation:


Related Questions

answer true or false to the following questions and briefly justify your answer: a. with the sr protocol, it is possible for the sender to receive an ack for a packet that falls outside of its current window. b. with gbn, it is possible for the sender to receive an ack for a packet that falls outside of its current window. c. the alternating-bit protocol is the same as the sr protocol with a sender and receiver window size of 1. d. the alternating-bit protocol is the same as the gbn protocol with a sender and receiver window size of 1.

Answers

The correct answer is The sender may get an ACK for a packet that is outside of its current window while using the selective repeat protocol.

With a sender and receiver window size of 1, the alternating-bit protocol is identical to the SR protocol. With a transmitter and receiver window size of 1, the alternating-bit protocol is identical to the GBN protocol. True The transmitter and receiver windows for the alternating bit protocol are both one, much like GBN. We saw that sequence numbers are required by the sender so that the receiver can determine if a data packet is a duplicate of one that has already been received. The sender does not require this information (i.e., a sequence number on an ACK) to identify a duplicate ACK in the case of ACKs. To the rdt3, a duplicate ACK is visible.

To learn more about ACK click the link below:

brainly.com/question/17004240

#SPJ4

What is the difference between animations and transitions?

Answers

The difference between animations and transitions is that animations are used to create movement and visual effects in a design, while transitions are used to create a smooth and seamless change between two states or elements in a design.

How do technology, healthcare, and/ or analytics impact society today? Please at least one positive impact and one negative impact when responding to the question, focus on the financial field, and explain how impacts society

Answers

Technology, healthcare, and analytics have significant impacts on society, particularly in the financial field.

Positive Impact: Technology, healthcare, and analytics have revolutionized the financial field, enabling numerous positive impacts. For instance, the implementation of advanced analytics and machine learning algorithms has improved risk assessment and fraud detection in financial institutions. This enhances the overall security and stability of the financial system. Additionally, automation and digitization have streamlined processes, reducing costs and increasing efficiency in areas like transaction processing, customer service, and financial reporting. These advancements have facilitated faster and more accurate decision-making, benefiting individuals and businesses alike.

Negative Impact: Alongside the positive effects, there are some negative consequences to consider. One significant concern is the potential for data breaches and privacy violations. As technology and analytics collect vast amounts of personal and financial data, the risk of unauthorized access or misuse increases. Safeguarding sensitive information and maintaining data privacy become critical challenges. Additionally, the increasing automation and adoption of AI-powered solutions in the financial field can result in job displacement. Routine tasks that were previously performed by humans may now be handled by machines, potentially leading to unemployment or the need for workers to acquire new skill sets to remain relevant in the evolving job market.

Hence, technology, healthcare, and analytics have positively impacted the financial field through enhanced efficiency, risk management, and streamlined processes. However, they also pose challenges such as data privacy concerns and job displacement, which need to be addressed to ensure a balanced and inclusive societal impact.

To learn more about technology  Click Here: brainly.com/question/9171028

#SPJ11

using the URL:http://www.armyschools.edu/news/sports.html, Identify the protocol,domain name and path.​

Answers

Answer:

domain - http (usually unsafe)

protocol - news

path - info / web

Explanation:

If you wanted to turn bold off for the remainder of the text in an html document, what tag would you use?.

Answers

Answer:

</b>

Explanation:

I got the answer from a Quizlet.

I hope this helps!

You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before extracting them. Which of the following commands would you use to do this?
A. tar uvf data79.tar
B. tar cvf data79.tar
C. tar xvf data79.tar
D. tar rvf data79.tar
E. tar tvf data79.tar

Answers

Answer:

D. tar rvf data79.tar

What is the name for the process that A student uses to choose only the relevant bits of information from their research

Answers

Answer:

Narrowing down

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the life of me. Help.

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the

Answers

I don't see a difference. Otherwise, they both are correct.

What is a counter? In typography

Answers

answer:

in typography, it is an area entirely or partially enclosed by a letter form or a symbol

explanation:

・two types: closed & open

・closed —  A, B, D, O, P, Q, R, a, b, d, e, g, o, p, and q

・open — c, f, h, s

Please answer in Java
Sale! During a special sale at a store, a 10% discount is taken off of purchases over $10.00.
Create an application that prompts the user for the dollar amount of purchases and then
returns the discounted price, if any. The program should neatly display the subtotal before
the discount, the amount of money discounted (if any), the HST applied to the subtotal and
finally the total. The program should be able to handle negative numbers and give an
appropriate message.
Sample Run #1:
Enter the purchase amount: 9.45
No discount applied.
Subtotal: $9.45
HST: $1.23
Total: $10.68
Sample Run #2
Enter the purchase amount: 15.00
10% discount applied.
Subtotal: $15.00
Discount: - $1.50
HST: S1.76
Total: $15.26

Answers

Answer:

Scanner keyboard = new Scanner(System.in);

   

       

       

        double discount = 0;

        double productPrice;

        double subTotal;

        double salesTax;

        double saleTotal;

       

       

       System.out.printf("Enter the purchase amount:");

       productPrice = keyboard.nextDouble();

       

       if (productPrice > 10) {

          discount = 10;

}

       System.out.println( + discount + "% discount applied.");

       

       subTotal = (productPrice);

       salesTax = (subTotal * 0.14);

       saleTotal = (subTotal + salesTax - discount );

       System.out.printf("Subtotal: $%5.2f\n", subTotal);

       System.out.printf("Discount; -$%5.2f\n", productPrice - discount);

       System.out.printf("HST: $%5.2f\n", salesTax);

       System.out.printf("Total: $%5.2f\n", saleTotal + salesTax);

}

}

Explanation:

Which of these should be included in a program's comments?

a. code to set the parameters of a shape

b. a description of what the program does

c. a description of how long it took to write the code

d. code for inserting a background

Answers

Answer:

B

Explanation:

Comments in code are primarily used to describe what the program does, and how chunks of the code running the program help relate to what the program does. Comments in code are not primarily used for answers d & a, which is more code, since if you comment, the compiler doesn't notice the code, so it doesn't work. Comments in code are not used for c either, since it's not really needed to write that in the comments.

What is the average number of nodes accessed in search for a particular element in an unordered list? In an ordered list? In an unordered array? In an ordered array?

Answers

Answer and Explanation:

1. In the case of the unordered list, the search algorithm is applied as the binary search would not be worked here also the time complexity for searching for n number of elements is O(n)

So the average number of nodes for the unordered list is n ÷ 2

2. For the ordered list, the same is to be considered i.e. n ÷ 2

Also it deals with the recepts of items and every item contains a relative position that represents an attribute of an item

3. For the unordered array, the same is to be considered i.e. n ÷ 2 but in this no sequence is followed

4. For the ordered array, the average number of nodes is \((log_2n) - 1\) and in this, the binary search is to be considered

Use Spreadsheet Functions and Formulas
Upload Assignment edge 2020 users. email me or drop assignment link.

Answers

Answer:

ok

Explanation:

Answer:

WHAT IS THE QUESTION

Explanation:

2. Write a program code using if...else if...else statement asking the user to enter an option between "Fiction" or "Nonfiction" books using upper case function. Accept number of copies from the user. Calculate and display the total price based on the following table Note: Total Price = Rate per book X No of copies


fiction 50
non fiction 30
other invalid​

Answers

Answer:

option = input("Enter 'Fiction' or 'Nonfiction' book: ").upper()

copies = int(input("Enter number of copies: "))

if option == "FICTION":

   rate_per_book = 50

   total_price = rate_per_book * copies

   print("Total price for " + str(copies) + " copies of fiction book: " + str(total_price))

elif option == "NONFICTION":

   rate_per_book = 30

   total_price = rate_per_book * copies

   print("Total price for " + str(copies) + " copies of nonfiction book: " + str(total_price))

else:

   print("Invalid option")

This code uses an if...elif...else statement to check the user's input for the option of "Fiction" or "Nonfiction" books. The input is converted to upper case using the upper() function to ensure that the user's input is not case-sensitive. The number of copies is accepted from the user as an integer, and the total price is calculated based on the rate per book and the number of copies. The total price is then displayed. If the user enters an invalid option, the code will print "Invalid option".

Explanation:

please write the code for this:

Enter a word: Good
Enter a word: morning
Good morning

Answers

w1 = input("Enter a word: ")

w2 = input("Enter a word: ")

print(w1,w2)

I wrote my code in python 3.8. I hope this helps.

Answer:

G_0o*4 Mrn --ing

Explanation:

G = G

_ = space

o = O

* = space

4 = D (the fourth letter in the alphabet)

Mrn = Abbrev. of Morn (ing)

-- = space

ing = ing (last 3 letters of "morning")

Hope this helps <3

what if you accidentally delete your browser history

Answers

Answer:

Nothing is ever deleted on a computer. Even though delete functions exist the data still remains somewhere in the computer, whether on the hard drive or in obscure files tucked away deep in the operating system. Recovering deleted internet history is quite straightforward if you know what you're doing.

which windows 10 feature allows a device to sleep but continue to perform basic tasks like downloading windows updates?

Answers

The Windows 10 feature that allows a device to sleep but continue to perform basic tasks like downloading Windows updates is called "Sleep Mode." In Sleep Mode, the computer's state is saved to memory, allowing it to quickly resume to the exact state it was in before it went to sleep.

Sleep mode is a power-saving state in Windows 10 that allows the device to conserve energy while still performing essential background tasks. When a device enters Sleep mode, it stops most hardware and system activity, reducing the amount of energy consumed and extending the battery life for laptops.  Sleep mode provides a convenient balance between power-saving and productivity, making it a popular feature among Windows 10 users.

Learn more about sleep mode: https://brainly.com/question/7326117

#SPJ4

The order in which feedback is presented on an aspect of a project is known as a(n) __ loop.

Answers

The order in which feedback is presented on an aspect of a project is known as a feedback loop.

A feedback loop is a process in which the output of a system is used as input for the same system in order to make adjustments and improvements. This can be seen in various aspects of a project, such as design, testing, and implementation. By using feedback loops, a project can be continuously improved and refined to meet the needs and expectations of its stakeholders.

Furthermore, feedback loops should be designed to be as transparent as possible, so that the team can have a clear view of the progress they are making and the areas that need the most improvement.

Learn more about feedback loop:

https://brainly.com/question/2902510

#SPJ11

The order in which feedback is presented on an aspect of a project is known as a feedback loop.

A feedback loop is a process in which the output of a system is used as input for the same system in order to make adjustments and improvements. This can be seen in various aspects of a project, such as design, testing, and implementation. By using feedback loops, a project can be continuously improved and refined to meet the needs and expectations of its stakeholders.

Furthermore, feedback loops should be designed to be as transparent as possible, so that the team can have a clear view of the progress they are making and the areas that need the most improvement.

Learn more about feedback loop:

brainly.com/question/2902510

#SPJ1

NEED ANSWERS ASAP 50 POINtTS!!!!
Katie wants to use VLOOKUP for a column in a table. Which value of the mode parameter should she use to look for an exact match of the searched data?
Katie should use the __ value of mode parameter for an exact match with the searched data.

Answers

Answer:

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Further Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

To achieve this, select a cell in your Excel worksheet

Type =VLOOKUP in the type bar of the Excel sheet

Select the value to look up and then select the data range

Type the column number that you want to search and then type FALSE

Press enter

Answer:

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

To achieve this, select a cell in your Excel worksheet

Type =VLOOKUP in the type bar of the Excel sheet

Select the value to look up and then select the data range

Type the column number that you want to search and then type FALSE

Press enter

are problems in code that either stop the program from running or do not
allow the program to accomplish the intended goal.

Answers

Answer:

These are problems in code that either stop the program from running or do not allow the program to accomplish the intended goal

Explanation:

your company uses computer-controlled machine tools on the factory floor as part of its assembly line. this morning, you've discovered that somebody erased a key set of machine control parameter files, and the backups you have will need to be updated and verified before you can use them. this may take most of the day to accomplish. what information security attribute is involved here?

Answers

The information security attribute that involved there is integrity.

Nevertheless it is clear that the necessary parameter files are not available, this seems to have been caused because somebody could violate the integrity requirements of those files—deleting them does not seem to have been an authorized change.

Security can be described as  a fungible, a tool, and negotiable one that offers a monetary value. This is necessarily a certificate signifying ownership of a particular asset in a variety of forms. Its very nature makes it tradable for example transferring its ownership from person to person.

Here you can learn more about security in the link brainly.com/question/28070333

#SPJ4

the conditional formatting button provides access to the _____.

Answers

The Conditional Formatting button provides access to the duplicate values conditional format, manage rules option.

What is the conditional formatting button

Conditional formatting is a tool in different computer programs that lets you change the appearance of data if certain conditions or rules are met. It allows you to change the way cells, rows, or columns look based on their values or how they relate to other information.

When you want to change how something looks in a computer program, you can click on a button called "conditional formatting". This will open up a box where you can decide what changes you want to make.

Learn more about  conditional formatting button from

https://brainly.com/question/31578432

#SPJ4

(Interest Calculator) The simple interest on a loan is calculated by the formula interest = principal * rate * days / 365;
The preceding formula assumes that rate is the annual interest rate, and therefore includes the division by 365 (days). Develop a program that will input principal, rate and days for several loans, and will calculate and display the simple interest for each loan, using the preceding formula. Here is a sample input/output dialog:
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .1
Enter term of the loan in days: 365
The interest charge is $100.00
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .08375
Enter term of the loan in days: 224
The interest charge is $51.40
Enter loan principal (-1 to end): -1

Answers

The program calculates and displays the simple interest in Python for several loans by taking input of principal, rate, and days, and using the formula interest = principal * rate * days / 365.

What is Python?

Python is a high-level, interpreted programming language that is widely used for various purposes such as web development, data analysis, machine learning, and artificial intelligence.


Here's the Python code to implement the interest calculator:

while True:

   principal = float(input("Enter loan principal (-1 to end): "))

   if principal == -1:

       break

   rate = float(input("Enter interest rate: "))

   days = int(input("Enter term of the loan in days: "))

   interest = principal * rate * days / 365

   print("The interest charge is ${:.2f}".format(interest))



1) The program uses a while loop to repeatedly prompt the user for input until they enter -1 to end the program.

2) Inside the loop, the program uses input() to get the principal, interest rate, and loan term in days from the user, and stores them in variables.

3) The program then calculates the simple interest using the formula given in the problem statement: interest = principal * rate * days / 365.

4) Finally, the program uses print() to display the calculated interest to the user.

Sample output:
Enter loan principal (-1 to end): 1000.00

Enter interest rate: .1

Enter term of the loan in days: 365

The interest charge is $100.00

Enter loan principal (-1 to end): 1000.00

Enter interest rate: .08375

Enter term of the loan in days: 224

The interest charge is $51.40

Enter loan principal (-1 to end): -1


To know more about loans visit:
https://brainly.com/question/9471571
#SPJ1

The multiprocessor system which consists of a set of processors that share a common main memory and are under the integrated control of an operating system is a _________ . Select one: a. cluster b. functionally specialized processor c. loosely coupled or distributed multiprocessor d. tightly coupled multiprocessor

Answers

Answer:

D

Explanation:

Tightly coupled multiprocessor

!WILL GIVE BRAINLIEST!
Write a Python program that prompts the user for a word. If the word comes between the words apple
and pear alphabetically, print a message that tells the user that the word is valid, otherwise, tell
the user the word is out of range.

Answers

Answer:

word = input()

if word > "apple" and word < "pear":

   print("Word is valid.")

else:

   print("Word is out of range.")

The three main parts of a computer are the CPU, Memory, and Motherboard Imagine you are explaining what a computer is to a kindergarten student. What analogy could you use to explain the hardware parts of a computer?

Answers

Answer:

the cpu is like your brain, the memory is like a library and the motherboard is like the roads in your town

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.


5 2

5 3

8 2

8 3
plz help ill give brainliest

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the

Answers

Answer:

for numB in [5,8]:

     for numA in [2,3]:

            print(numB, numA)

Explanation:

Looking at the given output it can bee sent that the first numbers are repeated twice consecutively and the second numbers in a sequence.

This means that nested loops are used.

Assuming that the indentation will be correct in the program

The code in squence is:

for numB in [5,8]:

     for numA in [2,3]:

            print(numB, numA)

Answer:

Line 1: for numB in [5,8]

Line 3: print (numB, numA)

Line 2: for numA in [2,3]

Explanation:

How to fix dark images?

I am using a phone btw​

How to fix dark images?I am using a phone btw

Answers

Answer:

Try turning in the lights in whatever room you're in.

Answer:

Clean you camera lensduhhh lmbo

Explanation:

which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use telnet?

Answers

To allow all users on the 192.168.10.0/24 network to access a web server at 172.17.80.1 without allowing them to use Telnet, you need to set up Access Control Entries (ACEs) in the Access Control List (ACL). Follow these steps:

1. Create an ACL: First, you need to create an ACL on the network device (such as a router) managing the traffic between the two networks.

2. Permit HTTP and HTTPS traffic: Web servers typically use HTTP (port 80) and HTTPS (port 443) protocols. To permit web access, create two ACEs that allow traffic from the 192.168.10.0/24 network to the 172.17.80.1 server on ports 80 and 443.

Example:
```
access-list 101 permit tcp 192.168.10.0 0.0.0.255 172.17.80.1 0.0.0.0 eq 80
access-list 101 permit tcp 192.168.10.0 0.0.0.255 172.17.80.1 0.0.0.0 eq 443
```

3. Deny Telnet traffic: Telnet uses port 23. Create an ACE to deny Telnet traffic from the 192.168.10.0/24 network to the 172.17.80.1 server.

Example:
```
access-list 101 deny tcp 192.168.10.0 0.0.0.255 172.17.80.1 0.0.0.0 eq 23
```

4. Permit other necessary traffic: If you need to allow other types of traffic between the networks, add ACEs accordingly.

5. Apply the ACL: Finally, apply the ACL to the appropriate interface on your network device, such as the router's inbound interface.

Example:
```
interface FastEthernet0/0
ip access-group 101 in
```

By following these steps, you can set up Access Control Entries that allow all users on the 192.168.10.0/24 network to access the web server at 172.17.80.1 while preventing them from using Telnet.

To know more about HTTP visit:

https://brainly.com/question/13152961

#SPJ11

You can us the (BLANK) symbol when you want to automatically add a set of numbers together in a spreadsheet

Answers

Answer:

Σ

Explanation:

What symbol can you use when you want to automatically add a set of numbers together on excel?

✓ Σ This is the Greek letter Sigma. It is used to start the Autosum facility.

Other Questions
Part (a) When r is less than a, express the current inside the imaginary cylinder I, in terms of r and J. Part (b) Express the magnitude of the magnetic field B at r in terms of the current through the imaginary cylinder I, and its radius r. Part (c) Express B in terms of J and r. Part (d) For r=0.5 a, calculate the numerical value of B in Tesla. Part (e) When r is greater than a, express the current inside the imaginary cylinder in terms of r, a and J. Part (f) Express the magnitude of the magnetic field, B, at r>a in terms of I and r. Part (g) Express B in terms of J, a and r. Part (h) For r = 2 a, calculate the numerical value of B in Tesla. the practice of a powerful nation exercising political and economic influence over a weaker country is HELP ASAP PLEASEEEWhat strategy did both Toyotomi Hideyoshi and, later, Tokugawa leyasu use to create peace in Japan?A. They both banished the daimyo from Japan.B. They both asked the daimyo to get rid of their samurai.C. They both forced the daimyo to pledge loyalty to themO D. They both commanded the daimyo to leave their families. What are chemical messengers that diffuse through tissue fluid and affect only nearby cells called? if 24.0% of a sample of radioisotope decays in 8.73 s, what is the half-life of this isotope (in seconds)? How long does it take the baton to complete one spin 151. Oxygen is released during this process Compute for the functional values Of x (1) and x (4) for the function x (t) that satisfies the initial problem: x"(t) + 2x(t) + x(t) = 2 + (t-3) u (t-3) Where: x (0) = 2, x' (0) = 1 suppose that the price of a bottle of cranberry juice increases from $2 to $2.50. as a result of the price increase, the quantity of bottles of cranberry juice demanded decreases from 100 to 90. the price elasticity of demand for cranberry juice calculated using the midpoint formula is approximately equal to: Benzene (1g, 12.5 mmol) is allowed to react with 1-chloropropane (1g, 12.5 mmol) and AlCl3. The product (1.2 g) is subjected to analysis on a GC. The chromatogram shows two produc peaks identified as n-propylbenzene (area = 65 mm2) and isopropylbenzene (area = 113 mm2). Calculate the percent yield of each of the two isomeric products obtained in this reaction. ABC Corp is partnering with a company to offer ads. The company will show the ads for free and ABC Corp only pays if the customer visits the page from that ad. ABC Corp is using the ________. after hitler occupied most of france, the remainder of the country became F(x)=-6x-3 if the input is -8, what is the output The Leona Vicario school cooperative will deliver to its 96 members this year's profits, which were $5,616. How much will each receive if the division is equitable? What did president john f. kennedy have in common with his predecessor, dwight d. eisenhower? As a corporation, you want to distribute money to shareholders as a dividend. If the dividend is taxed at a rate of 20% and the dividend is $1 per share, how much money will a shareholder of 10,000 shares get after-tax Presented below are the components in determining cost of goods sold.Determine the missing amounts.Beginning Inventory Purchases Costs of Goods available for sale Ending Inventory Cost of Goods sold$84,100 $101,500 $112,000$53,100 $116,000 $37,000 $115,000 $156,000 $30,500 Describe what a "sub-culture" is and why can it develop into such a powerful force within apolice department. which of the following statements is true about the ability of a partner to withdraw from a general partnership? what connections do you see between has situation and the information you read in the article the Vietnam War