Answer: See explanation
Explanation:
Custom written software refers to the software that's developed for some particular organization or users. It's crates in order to meet the unique requirements of a business.
Since Henry is thinking of using custom written, open source software, then a custom written software will be used. Examples of custom written software will be automated invoicing, bug tracking software, E-commerce software solutions etc.
Which of the following is the BEST example of the principle of least privilege? Correct Answer: Wanda has been given access to the files that she needs for her job. Correct Answer: Mary has been given access to all of the file servers. Correct Answer: Jill has been given access to all of the files on one server. Correct Answer: Lenny has been given access to files that he does not need for his job.
Answer: Wanda has been given access to the files that she needs for her job.
Explanation:
The principle of least privilege is when a user is only given the minimum level of permissions that he or she needs to perform a particular job function. This helps in reducing the risk of attackers having access to data.
The best example of the principle of least privilege is Wanda has been given access to the files that she needs for her job. Given access to all of the file servers or access to all of the files on one server is incorrect.
Answer:
Wanda
Explanation:
Reason being is that least privilege gets only the things you need for the job, nothing more or less.
sign that your desktop may need cleaning
Answer:
My desktop may need be cleaning but for real!!
Write a loop that continually asks the user what food the user has in their refrigerator until the user enters apples, in which case the loop ends. It should acknowledge the user in the following format. For the first food, the user might say "hamburger," so your response would be, "You have a hamburger with a total of 1 food(s) if they enter hamburger, and so on until they enter “apples” at which point the loop ends. ---- make sure you save your file as "may28.py" *
(Disclaimer: I am not a professional, so it might not be the most concise answer possible, but I did run the Python script and it works)
Answer:
user_input = input("What food do you have in your refrigerator? ").lower()
count = 0
while True:
if user_input != 'apples':
count += 1
print(f'You have a {user_input} with a total of {count} food(s)\n')
user_input = input("What food do you have in your refrigerator? ")
else:
break
Tin học đã làm thay đổi công tác văn phòng ngày nay như thế nào?
Two use of dovetail saw
Answer:
They are particularly use when it is use for cutting small or very precise cut. They are particularly use in joint making mostly dovetail joints
hope it helps
who invented the system of logarithm in 1614 AD
Answer:
JOHN NAPIER
Explanation:
The method of logarithms was publicly propounded by John Napier in 1614, in a book entitled Mirifici Logarithmorum Canonis Descriptio (Description of the Wonderful Rule of Logarithms). The book contained fifty-seven pages of explanatory matter and ninety pages of tables related to natural logarithms.
Answer:
Joost Bürgi
Explanation:
He invented it but John Napier worked on it earlier than Bürgi.
Complete the sentence
A _______ spans a geographic area like a city,is larger than a LAN and smaller than WAN
Answer:
metropolitan area network (MAN)
Explanation:
A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings.
On the other hand, a metropolitan area network (MAN) spans a geographic area like a city, is larger than a local area network (LAN) and smaller than wide area network (WAN).
Basically, a metropolitan area network (MAN) is formed by an aggregation of multiple local area network (LAN) that are interconnected using backbone provided by an internet service provider (ISP). A metropolitan area network (MAN) spans for about 5 kilometers to 50 kilometers in size.
Use the drop-down menus to complete the sentences describing the important ideas in Hess's theory. Hess expanded on Wegener's theory of continental drift . Hess proposed the idea that are places where crust is created.
Answer:
Following are the solution to the given question:
Explanation:
The hypothesis of continental drift from Wegener; Stein suggested that crust was formed within mid-ocean crises.
The first one is mainland drift, and the second is mid-ocean ridges. You have taken the test Use the dropdown menu to type out the phrase that describes Hess's theory as true major ideas.
Wegener's hypothesis of plate tectonics was expanded by Hess. Hess suggested that crust is produced in the mid-ocean ridges.
Answer:
Continental drift
mid-ocean ridges
Explanation:
differentiate agricultural waste from hazardous waste.
Which scenario would most benefit from a self-join query?
a. a query connecting customers and products
b. a query connecting supervisors and customers
c. a query connecting employees and their orders
d. a query connecting employees and their supervisors
Answer:
answer is D
Explanation:
Just did it on edge
If you see rough patches, loose,gravel,or potholes on the road you should
Answer:
move out of the way
Explanation:
Match the network component to its function.
1. bridge amplifies network signals
2. gateway connects sections of a large network
3. NIC large computer that contains network resources
4. NOS translates data sent between networks
5. repeater connects nodes to the network
6. router directs network traffic
7. server connects one network to another
8. switch manages network devices
Answer:
where are the functions??
The network component is matched to its function as follows:
Repeater: amplifies network signals.Switch: connects sections of a large network.What is a network component?A network component can be defined as a set of hardware and software resources that makes up a computer network.
In Computer technology, the network component is matched to its function as follows:
Repeater: amplifies network signals.Bridge: it connects sections of a large network.Server: a large computer that contains network resources.Gateway: it translates data sent between networks.Network interface card (NIC): it connects nodes to the network.Switch: it directs network traffic.Router: it connects one network to another.Network operating system (NOS): it manages network devices.Read more on network component here: https://brainly.com/question/10017822
#SPJ2
Select the correct answer.
Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?
A. A to F
B. A to H
C. A to M
D. A to J
Answer is Hexadecimal : A. A to F
_______ are pre-defined formats used to quickly format cells.
Cell formats
Cell styles
Style formats
Cell definitions
Answer:
Cell format
Explanation:
Cell formats refers to the various styling options which can be applied to cells in other to change the appearance and the way data is being presented. A number of cell formats are predefined in excel spreadsheet which can be applied directly to data in other to change it's appearance without applying manual changes. With predined cell formats gives several alignment option, Font size, color and setting, the fill color and border options. This can be directly applied to cells or tables to gives a good appearance of the data.
How do you reset a g.mail password?
Answer:
put: forgot password to reset it
Answer:
Change your pass word
Open your Go ogle Account. You might need to sign in.
Under "Security," select Signing in to G oo gle.
Choose Password. You might need to sign in again.
Enter your new password, then select Change Password.
pls any one what is pheumatic and hydrautic
Answer:
pheumatic is a branch of engineering that make use of gas
hydraulic is a technology and aplied science using engineering
Write a structured algorithm that prompts the
user to input two numbers. The algorithm should
multiply both numbers and then prompt the
user to enter the answer. The algorithm should
compare the answer entered with that calculated
and output "correct answer" or "incorrect answer"
accordingly. At the start, input how many sums
will be done.
Answer:
Step 1 : Start
Step2 : Input first number, num1
Step3 : Input second number, num2
Step4 : product - - > num1 * num2 (product of num1 and num2)
Step5 : Input product, myanswer
Step6 : comparison - - - > correct or incorrect based on myanswer and product
Step6: print(comparison)
Step7: End
Explanation:
Algorithm is a sequence of instructions a computer is expected to follow to solve a particular problem.
Required :
Two inputs ; num1 and num2
Expected output
Algorithm :
Step 1 : Start
Step2 : Input first number, num1
Step3 : Input second number, num2
Step4 : product - - > num1 * num2 (product of num1 and num2)
Step5 : Input product, myanswer
Step6 : comparison - - - > correct or incorrect based on myanswer and product
Step6: print(comparison)
Step7: End
The two numbers to multiply are entered ; the product is calculated by the program ; the the user inputs his or her own expecteted product ;
Both are compared and the output of the comparison is displayed (either correct oe incorrect)
Plz help the first and correct answer will be marked as brainliest answer
Answer:
1. desktop publishing
2. spreadsheet
3. research
4. entertainment
5. spreadsheet
6. database
7. word processing
8. desktop publishing
9. word processing
>What is the output of the following code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )
Answer:
Given code output is "786".
Explanation:
Code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter
print (list1[1] )#use a print method that prints list index value
In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.
Vivian and other members of her group are attending an event where they have to give short, uninterrupted speeches, one after the other. The moderator has a passive role during the course of the discussion, he or she has to simply introduce the presenters and manage the time frame of the event. At the end of the discussion, the moderator engages with the presenters and audience to ask questions and point to areas of agreement or disagreement.
Vivian is part of a _____.
Answer:
Panel discussion at a symposium
Explanation:
A symposium is a discussion held in public and arranged so that groups of experts in a particular field of study can come together and present information, papers, discoveries, and new researches and also to provide recommendations as to what is and not to be done
A moderator for the symposium and the panel members usually seat in front of an audience to whom a prepared brief report is presented by the panel group members after which the key point may be summarized by the moderator and the audience can take part in asking questions which are answered by the panel members
Therefore;
Vivian is part of a panel discussion at a symposium
What is market information?
please answer in your own words since my teacher will probably notice if I plagerize
Answer:
Market information is is the understanding of the trends going on in a market such as demographic popular product age interests things like that
Explanation:
what is the best programming language
Answer:
Ther are 8 best programming language :
• Javascript
• Swift
• Scala
• Go
• Python
• Elm
• Ruby
• C#
It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.
Answer:
A. after you've created the presentation.
Explanation:
A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.
Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.
what do you mean by professional education? explain with examples.
Answer:
prfesssional education is any programs that improve the knowledge,skills and attitudes.
Example include; educational course and training to become a teacher,nursing course,aeronautics engineering,etc.
IT technicians are setting up a new file server for a school. Describe the benefits and
drawbacks of using a command line interface (CLI) rather than a graphical user interface
(GUI) to set up a new file server.
Answer:
The benefits of using the command line interface for setting up a file server are;
1) The command line interface (CLI) is faster than other interfaces and can easily handle tasks which are repeating such as creating folders for users on the server
2) The CLI requires less time for processing with the CPU, and it takes up less memory such that the file Server is not slowed down during the file setup process
3) The system resources required are few
The drawbacks are;
1) The CLI is confusing to those who are not exposed to programming as the commands the user needs to learn to before they can setup setup the new file server
2) The users needs to be very accurate in terms of spelling errors as that will lead to failure of the program, there are no spell check, and a mistype can lead to the entire coding process being restarted from the beginning
Explanation:
Use the ________ predefined formats to quickly format cells.
Style Formats
Cell Styles
Cell Definitions
Cell Formats
Answer:
I think choose (2)
Cell styles
¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?
Answer:
Asimétrica
Explanation:
Los algoritmos de encriptación sirven para que solo el destinariario y receptor de los datos logren acceder a la información, es decir que inmediatamente que es enviada la información, solo puede ser legible para quien tenga un código de acceso, al mismo quien envía necesita una clave diferente para enviar lo datos. es un algoritmo asimétrico porqué el emisor y el receptor usan claves diferentes de encriptación.
What is the Full form of DC?
Answer:
Deputy Commissioner.
Answer:
the full form of DC is deputy commissioner
write a program to enter length of a square and print area of square.
(class 8)
Explanation:
Using python,
Length=int(input('Enter the length :'))
Breadth=int(input('Enter the breadth :'))
Area=length*breadth
print('The area is:' , Area)
Answer:
program by INPUT statement
Explanation:
CLS
REM to enter length of a square and print area of square.
INPUT "Enter length of a square"; l
LET Area of a square = l^2
PRINT " AOF "; Area of a square.
END
what are the advantages of saving files in a cloud?
Please help!!