Answer:
software
Explanation:
Answer: software
Explanation:
What task do the referential integrity settings prevent?
a) editing a non-key field in a destination table
b) sharing data from one field between two tables
c) linking a primary key to another table’s primary key
d) deleting a record that has related records in another table
Answer:
D
Explanation:
10. Two technicians are discussing recycling specifications for refrigerant. Technician A says that refrigerant oil with 5,000 parts per million (ppm) does not fall
within specifications. Technician B says that air can only have a maximum of 330 ppm. Who is correct?
O A. Neither Technicians A and B
OB. Technician B
O C. Both Technicians A and B
O D. Technician A
Two technicians are discussing recycling specifications for refrigerant Technician A is correct.
What is the recycling ?Recycling is the process of transforming waste materials into new products to prevent the waste of potentially useful materials and reduce the consumption of fresh raw materials. It is an important part of the global economy and helps to preserve the environment by reducing energy usage, air and water pollution, and reducing the amount of waste sent to landfills. Recycling can be done through mechanical means such as shredding or separation, or through chemical processes such as melting and reforming.
To learn more about recycling
https://brainly.com/question/27248056
#SPJ1
what is a common indicator of a phishing attempt?
Strangely phrased subject lines :An email subject line that contains a word or phrase that doesn't sound appropriate is the most clear sign that it is a phishing email.
Phishing efforts can be disguised in a variety of ways to persuade you to divulge your personal information. In addition to the numerous varieties of phishing, such as spear phishing, pop-up phishing, and social media phishing, it can be challenging to distinguish between a legitimate bank website and a fraudulent one, so it's critical to be aware of what to watch out for. Common signs of a phishing effort include:Despite the fact that phishing assaults have become much more complex over time, they may still be quickly identified if you know what to look fortypical phishing indicator that should raise serious red flags. Cybercriminals frequently send you unsolicited offers of free iPads, iPhones, expensive handbags and luggage, trips to exotic locales, and other items in an effort to seduce you. Anyone providing such items is nearly always a phisher seeking to obtain your personal information.
To learn more about " cybercriminals" Click on below link brainly.com/question/27146593
#SPJ4
What is not a way to lower your risk of drowsy driving?
Answer:
Taking a night time medicince (such as benedryl), or drinking alcohol beofre drviving.
Explanation:
Brainliest please :)
Being secure means that a number is hard to predict.
This makes it safer to use for computer security.
a. cytologically
b. systematically
c. cryologically
d. cyptographically
The term that accurately fits the definition is "cryptographically."Cryptographically means to create secure codes and/or messages so that they can be sent securely. This makes it safer to use for computer security.
More than 100 words: Cryptography is the science of writing codes and/or messages in such a way that they can be read only by the intended recipient. Cryptography enables people to keep private data confidential and secure from others, for example, passwords, banking details, etc. Cryptography is used in every aspect of online communications such as credit cards, passwords, websites, emails, etc.
A computer scientist named Ron Rivest, Adi Shamir, and Leonard Adleman at MIT developed a public-key cryptosystem in 1978 known as RSA encryption. Cryptography has become an essential part of digital life as it is required to keep sensitive and confidential information safe from attackers who might steal it. Cryptography plays a vital role in ensuring that the information transmitted over a network is secure and that it can only be read by the intended recipients. Cryptography also provides confidentiality, integrity, authentication, and non-repudiation for online transactions.
Cryptography is the method used to scramble data in a way that makes it unreadable unless it is decrypted using the proper key. Thus, it is used to protect information from attackers who want to read it without permission.
To know more about securely visit:
https://brainly.com/question/32133916
#SPJ11
a film camera with only one lens is known as a(n)?
Answer:
it is a single lens reflex or SLR camera
Explanation:
when describing blocks of ip addresses, what does cidr do?
Classless inter-domain routing is known as CIDR. It is an approach to IP address distribution and packet routing. An IP address's network prefix is specified via CIDR.
CIDR (Classless Inter-Domain Routing) is a more effective and adaptable method of allocating and routing Internet Protocol (IP) packets than the conventional IP address classes. A variable-length subnet mask (VLSM) is used by CIDR to distribute IP addresses, enabling more accurate distribution and greater address space use. Routing is made easier and subnets may be easily created thanks to the CIDR notation, which specifies the amount of bits in the network portion of the address. Internet Service Providers (ISPs) and network administrators manage IP addresses and routing tables using CIDR, which has evolved into the industry standard for IP address allocation and routing.
Learn more about CIDR here:
https://brainly.com/question/30775427
#SPJ4
Check the peripherals that are needed to hear music on your computer.
Answer:
speaker and sound card
edge 2021
ASKING AGAIN CAUSE I GOT A WEIRD LINK
HTML5 allows web pages authors to place a/an _________ element around a block-level element that contains child elements
a. nav
b. div
c. h1
d. a
Answer:
A. Nav
Explanation:
....,..........
5 evaluation criteria
Answer:
relevance, efficiency, effectiveness, impact and sustainability.
Which of the following are addressed by programing design? Choose all that apply.
Who will work on the programming
The problem being addressed
The goals of the project
The programming language that will be used
Answer:
Its B, D, and E
Explanation:
Hope this helps
Answer:
3/7
B
D
E
4/7
Just a page
5/7
B
C
6/7
Page
7/7
A
B
D
To create the install from media (IFM) on the existing domain controller, which of the following command should you use?
a. ntdsutil media ifm
b. ifm
c. ntdsutil ifm
d. ntdsutil ifm media
To create the install from media (IFM) on the existing domain controller, you should use the command "ntdsutil ifm media".
This command allows you to create an IFM installation media, which is a way of installing Active Directory Domain Services (AD DS) on a new domain controller without the need for a full replication of data from an existing domain controller.
IFM installation media is useful in situations where a new domain controller needs to be deployed in a location with a slow or unreliable network connection, or where there are security concerns about replicating sensitive data over the network.
By creating an IFM installation media, you can copy only the necessary AD DS files and data to the new domain controller, reducing the time and network bandwidth required for deployment. The ntdsutil command is a command-line tool that is used to manage Active Directory databases.
The "ifm" parameter specifies that you want to create an IFM installation media, and the "media" parameter specifies that you want to create a media file that can be used to install AD DS on a new domain controller. Overall, the ntdsutil ifm media command is a powerful tool that can help simplify the deployment of new domain controllers, while also improving security and reducing network bandwidth usage.
learn more about media here: brainly.com/question/31359859
#SPJ11
The definition of "HTML element" _____. defines the whole document and has a start tag (< xtml >) and end tag (< /xtml >) defines the partial document and has a start tag (< html >) and end tag (< /html >) defines the whole document and has a start tag (< html >) and end tag (< /html >) defines the partial document and has a start tag (< xtml >) and end tag (< /xtml >)
What should happen to the "Done" Product Backlog items when the Sprint is cancelled?
"Done" Product Backlog items from a cancelled Sprint should be reviewed and potentially re-prioritized by the Product Owner for inclusion in future Sprints.
When a Sprint is cancelled, the Product Owner should review the "Done" Product Backlog items that were completed during the cancelled Sprint. These items should be evaluated for potential inclusion in future Sprints based on their priority and value to the product. The Product Owner may need to consult with the Development Team to determine if any technical debt or other considerations make it necessary to revisit completed work before carrying it forward. Ultimately, any completed work that is deemed valuable and can be carried forward should be reprioritized in the Product Backlog for future Sprints.
learn more about Sprint here:
https://brainly.com/question/31230662
#SPJ11
Three of the following values could be stored as strings. When would you NOT use a
string command?
O To store a word.
O To store a list of colors.
O To store values NOT used for calculations.
O To store decimal values.
Answer:
To store decimal values
Explanation:
If values are not to be used for calculation, that is, they are not numerical data, therefore, some of them could be stored as strings. A string may contain any sequence of characters. The characters in a string may be repeated.
From the foregoing, decimals can not be stored as strings because in computer programming, a string is normally a sequence of characters, hence the answer above.
Using variable concepts, it is found that you would not use a string command to store decimal values.
---------------------------
Strings are used in programming to work with variables that are composed by text, which can include words, colors, and any variable that is not used for calculator.For decimal values, float and double variables are used, not strings, and thus, this is the option for which a string command would not be used.A similar problem is given at https://brainly.com/question/15583814
Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.
The
Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.
Here's my answer for question 1 please adjust it thanks!
def Get_Winnings(m):
if m == "1": return 75000
elif m == "2":
return 150000
elif m == "3":
return 225000
elif m == "4":
return 300000
elif m == "5":
return 375000
else:
return "Invalid"
MAIN
medals = input("Enter Gold Medals Won: ")
num = Get_Winnings(medals)
print("Your prize money is: " + str(num))
Answer:def Get_Winnings(m):
if m == "1": return 75000
elif m == "2":
return 150000
elif m == "3":
return 225000
elif m == "4":
return 300000
elif m == "5":
return 375000
else:
return "Invalid"
MAIN
medals = input("Enter Gold Medals Won: ")
num = Get_Winnings(medals)
print("Your prize money is: " + str(num))
exp: looking through this this anwser seemes without flaws and i dont follow
if you can provide what you are not understanding ican an help
please help which one is the right symbol?
Answer:
second one >
hope it helps.
Why does each record need a unique ID number?
A. A unique ID number is necessary for grouping similar item types in
a table.
B. A unique ID number helps narrow down the results returned for a
query
C. A unique ID number corresponds to other data in the same table
to make organization easier.
D. A unique ID number is essential if you want to build proper
relationships between tables.
Answer: D. A unique ID number is essential if you want to build proper
relationships between tables.
just did it
what is full form off computer
Answer:
Explanation:
Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. ... Some people say that COMPUTER stands for Common Operating Machine Purposely Used for Technological and Educational Research.
melanie is a desktop publisher who puts together all the text and images for a children's magazine. the pathway of the arts, av technology, and communication cluster that melanie works in is: question 15 options: printing technology. telecommunications. performing arts. visual arts.
Someone who has the job description such as putting together all the text and images for a children's magazine, the pathway of the arts, av technology and communication cluster is called telecommunications. So Melanie works in telecommunications.
The Telecommunications Technician is a job that has the responsibility to install, maintain, and provide a variety of telephone equipment, and install voice and data communication circuits, security cameras, panic systems, and door access.
You can learn more about The Telecommunications at https://brainly.com/question/1622085
#SPJ4
State what is meant by the terms: Parallel data transmission ......................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Serial data transmission ........................................................................................................... ................................................................................................................................................... ...................................................................................................................................................
Answer:
parallel communication is a method where several binary digits are sent as a whole, on a link with several parallel channels.
serial communication conveys only a single bit at a time over a communication channel or computer bus.
True/false: object-oriented programming allows us to hide the object's data attributes from code that is outside the object.
It is true that object-oriented programming allows us to hide the object’s data attributes from code that is outside the object.
The object-oriented programming paradigm hides the internal detail of code from the outside or outer world. In object-oriented programming, the object's inner detail is hidden from the outer world. Object details are its attribute or functions etc. Object-oriented programming allows only its object to access its own data attributes and functions. And, the object cannot access the data attributes outside of its world or scope.
For example, there is two class, Cat and Dog. Cat object cannot access the attribute data of the Dog’s object.
Therefore, the question statement is true and states that an object-oriented program allows hiding object detail from the outside world.
You can learn more about object-oriented program at
https://brainly.com/question/25555303
#SPJ4
it is used to replace numeric number of a website
greatflombles or gr8flombles or go2flombles
What device is commonly used to connect to and control multiple computers using a single keyboard, mouse, and monitor?.
Use a keyboard, mouse, and monitor to connect to and control numerous computers with a KVM switch (keyboard, video, and mouse).
Describe the monitor.
An device that shows data in either text or graphic form is a computer monitor. A discrete monitor consists of an external user control panel, a visual display, supporting circuitry, a power supply, and enclosure. Modern monitors often use LCD displays with LED backlights, which took on the function of CCFL backlit LCDs by the 2010s. The majority of monitors used CRTs up until the mid-2000s. DisplayPort, HDMI, USB-C, DVI, VGA, as well as other proprietary connections and signals are used to link monitors to computers.
To know more about Monitor
https://brainly.com/question/28315469
#SPJ4
Type the correct answer in the box. spell the word correctly.
what does xml do with the data wrapped in the tags?
xml is a hardware- and software-independent tool used to carry information and developed to describe _____ .
XML (eXtensible Markup Language) organizes and structures the data wrapped in the tags, making it easily understandable and accessible. XML is a hardware- and software-independent tool used to carry information and developed to describe data.
The data wrapped in the tags of an XML document can be manipulated and processed by various software programs, including web browsers, databases, and content management systems. By using tags to describe data, XML enables the creation of customized markup languages that can be tailored to specific needs. This makes it a versatile tool for data management, data exchange, and data storage. In summary, XML is a powerful tool that facilitates the exchange and processing of data in a structured, standardized, and flexible format.
To learn more about XML; https://brainly.com/question/22792206
#SPJ11
To create a database you must name tables, fields and other objects. Before beginning the design process there are good practices and rules that you must follow. List two below. Hint: think of the system restrictions and file management good practices.
When creating a database, naming tables, fields, and other objects is essential. Prior to beginning the design process, there are several good practices and rules that must be followed.
Two of them are given below:System restrictions:When creating a database, one of the most essential considerations to keep in mind is system restrictions. A system constraint is a restriction or limitation imposed by the system on the database design, limiting its overall capability.
These restrictions are placed on the database system to ensure that the design is accurate, effective, and will perform as intended. Some of the most common system constraints include the database size, the number of tables, and the number of records that the database can contain. When designing a database, it is critical to consider system restrictions to avoid data loss or system crashes.
File Management Best Practices:Another good practice when creating a database is to adhere to file management best practices. Effective file management is critical to the overall success of the database design. One of the most important aspects of file management is ensuring that the database is adequately structured and organized. This entails organizing the data into tables, columns, and rows.
It is critical to keep in mind that tables must be organized according to their function and that all fields must be accurately labeled to avoid confusion. It is also critical to establish a naming convention for all database objects to guarantee consistency and clarity throughout the database design.
For more information on database visit:
brainly.com/question/30163202
#SPJ11
necesito ejemplos de actitud filosófica por favor
Answer:
La filosofía es una disciplina intelectual que estudia críticamente las cuestiones más básicas de la humanidad y la naturaleza. Preguntas fundamentales de la filosofía son, entre otras, las siguientes:
-¿Existe alguna realidad fuera de mis pensamientos?
-¿Qué es el conocimiento?
-¿Qué es la verdad?
-¿Qué hace que una acción sea valiosa?
-¿Los humanos y los animales tienen valor y son iguales o diferentes?
-¿Qué es el tiempo?
Así, el planteamiento y reflexión de este tipo de preguntas son claros ejemplos de actitud filosfófica.
a person who uses computers to gain unauthorized access to data.
Answer:
Hacker
Explanation:
They break password codes to get access to unauthorized data.
Answer:
a hacker
Explanation:
Which group in the Timeline Tools contextual tab would help you alter the color of a timeline?
O Arrange
O Styles
O Size
O Show
The group in the Timeline Tools contextual tab that would help you alter the color of a timeline is the "Styles" group.
What is the Styles group?The Styles group contains various formatting options that allow you to customize the appearance of your timeline, including the font, color, and border styles.
To change the color of your timeline, you can use the "Color" option in the Styles group, which lets you choose from a range of predefined colors or create your own custom color using the color picker tool.
Read more about database here:
https://brainly.com/question/518894
#SPJ1
Answer:
B. Styles
Explanation:
Antes de conectar un receptor en un circuito eléctrico, ¿qué precauciones debemos tomar para evitar riesgos y hacer que el dispositivo funcione correctamente?
Answer:
Antes de conectar un receptor en un circuito eléctrico, es necesario corroborar que el dispositivo que se va a conectar soporte la misma corriente de voltaje que la del circuito eléctrico. Así, si el circuito tiene un voltaje de 110 voltios, el dispositivo debe tolerar dicha medida; si por ejemplo el circuito tiene un voltaje de 220 voltios y se conecta un dispositivo que tolera 110 voltios, se producirá un cortocircuito que dañará definitivamente el dispositivo, ademas de poder causar accidentes domésticos como el corte del suministro eléctrico o incluso incendios.