10 sentences about computer parts.

Answers

Answer 1
One computer part is the CPU, it’s a piece of hardware the last allows your computer to access and interact all the applications and programs. The first ever CPU chip was invented around 4 decades ago. The keyboard is another computer part and it allows the user to type letters and numbers. There are about 104 keys on a keyboard and there are different parts in it. Some of the parts include, control keys, function keys, navigation keys, numeric keypad, and so on. A mouse is another device used with the keyboard to position the cursor. It’s a hand held device that detects two-dimensional motion relative to a surface. This motion is typically translated Into the motion of a pointer on a display, which allows a smooth control of the graphical user. Memory is a device to store all of your information and saved data. The motherboard is the backbone that tied together the computers components at one spot.

Related Questions

If images around the edges of a monitor do not look right, the computer might have a(n)

access problem.
hardware problem.
Internet problem.
software problem.

I will give brainiest to best answer

Answers

Answer:

it would be a software problem.

Explanation:

this is because when your computer crashes, the software all "explodes" and resets.

Hardware Problem

If a manufacturer damaged something, it can cause issues that the software can not interpret. For example the screen is damaged. The pixels could be damaged on the screen and most likely not the fault of a software.

how to write email abut new home your friend ​

Answers

Answer:

Start off with a greeting like Dear Sarah. Then you write a friendly body that tells about your home and describe it as much as you can and tell about what your bedroom theme is like and so on. Finally, top it off like a closing like Sincerely, Tessa.

Answer:

you start off by saying

Dear (name), talk about how your house is comforting and things like that... I hope thats what you were asking for.

Modify the M-file in EXAMPLE 8 adding translations that bring the square to its original position using 30 iterations and a single additional for loop. Include the M-file (for a total of three loops) You do not need to include the figure. EXAMPLE 8 Consider the matrix S representing the original square in homogeneous coordinates. In the following M-file we translate the square horizontally using c = 0.4 and c = 0 for 30 times. We then translate the square vertically using c = 0 and 2 = 0.4 and 30 iterations. clf S= [0,1,1,0,0,0,0,1,1,0:1,1,1,1,1]: % square in homogeneous coordinates M1 = (1,0,0.4:0,1,0:0,0.1): % first translation matrix M2 = (1,0,0,0,1,0.4:0,0.1]: % the second translation matrix P = plot(S(1,:),(2,:)); % plot the original square axis square, axis ([-1.14,-1,14]), grid on for i = 1:30 S = M1*S: % compute the translated square set(p, 'xdata',s(1.:), 'ydata'.s(2.:)): % plot the translated square pauze (0.1) end for i = 1:30 S=M2*S: % compute the translated square set(p. 'xdata', (1, :), 'ydata'.s(2.:)): % plot the translated square pause (0.1) end

Answers

The provided M-file translates a square horizontally and vertically using matrices, for a total of 30 iterations and an additional for loop.

Here is the modified M-file that brings the square to its original position using 30 iterations and a single additional for loop:

S = [0, 1, 1, 0, 0, 0, 0, 1, 1, 0; 0, 0, 1, 1, 0, 1, 0, 0, 1, 1; 1, 1, 1, 1, 1, 1, 1, 1, 1, 1];

% square in homogeneous coordinates

M1 = [1, 0, 0.4; 0, 1, 0; 0, 0, 1]; % first translating matrix

M2 = [1, 0, 0; 0, 1, 0.4; 0, 0, 1]; % the second translating matrix

M3 = [1, 0, -0.4; 0, 1, -0.4; 0, 0, 1]; % the third translating matrix

P = plot(S(1,:), S(2,:)); % plot the original square

axis square, axis([-1.14, 1.14, -1.14, 1.14]), grid on

for i = 1:30

   S = M1 * S; % calculate the translated square.

   set(P, 'xdata', S(1,:), 'ydata', S(2,:)); % plot the translated square

   pause(0.1)

end

for i = 1:30

   S = M2 * S; % calculate the translated square.

   set(P, 'xdata', S(1,:), 'ydata', S(2,:)); % plot the translated square

   pause(0.1)

end

for i = 1:30

   S = M3 * S; % compute the translated square

   set(P, 'xdata', S(1,:), 'ydata', S(2,:)); % plot the translated square

   pause(0.1)

end

In this modified version, a third translation matrix M3 is added to bring the square back to its original position. The first for loop translates the square horizontally to the right, the second for loop translates the square vertically up, and the third for loop translates the square diagonally down and left to its original position. Each loop iterates 30 times and updates the plot with a pause of 0.1 seconds between each iteration.

Learn more about loop here:

https://brainly.com/question/14577420

#SPJ4

Is it important to study information systems

Answers

Answer:

There is massive importance if you want to study information study.

It can help you understand the data, organize, and process the data, using which we can generate and share information.

Explanation:

It largely depends on your interest and requirement, but a better knowledge or clue about information systems may help analyze the data especially if you want to become a data scientist, machine learning, Artificial intelligence or deep learning, etc.

It can help you understand the data, organize, and process the data, using which we can generate and share information.

A great understanding of information systems may exponentially increase the productivity, growth, performance, and profit of the company.

Most Professions get exposed to information Systems no matter what their career objective is, as it may help in having better decision making based on the information they get through data.

So, yes!

There is a massive importance if you want to study information study.

in the situation above, what ict trend andy used to connect with his friends and relatives​

Answers

The ICT trend that Andy can use to connect with his friends and relatives​ such that they can maintain face-to-face communication is video Conferencing.

What are ICT trends?

ICT trends refer to those innovations that allow us to communicate and interact with people on a wide scale. There are different situations that would require a person to use ICT trends for interactions.

If Andy has family and friends abroad and wants to keep in touch with them, video conferencing would give him the desired effect.

Learn more about ICT trends here:

https://brainly.com/question/13724249

#SPJ1

Write a Java program that implements a multithreaded program has three threads. First thread generates a random integer every 1 second and if the value is even, second thread computes the square of the number and prints. If the value is odd the third thread will print the value of cube of the number​

Answers

Hope it helps. Thanks
Write a Java program that implements a multithreaded program has three threads. First thread generates

Before the new website launch, development team does not want users to access the site while it is still under construction. How can this requirement be met?

Answers

This requirement can be met by drafting a short text that says that the website is under construction. You could also specify the exact date when the site will be restored.

How to meet the requirement

If you are still working on a website and do not want users to access the site, you should leave a message on the site that says that the website is still under construction.

The link to the website should directly lead to this message. In this space, you should also specify the date and time when the site will be restored.

Learn more about websites here:

https://brainly.com/question/31732575

#SPJ1

Write the definition of the function inputArray that prompts the user to input 20 numbers and stores the numbers into alpha. Write the definition of the function double Array that initializes the elements of beta to two times the corresponding elements in alpha. Make sure that you prevent the function from modifying the elements of alpha. Write the definition of the function copy AlphaBeta that stores alpha into the first five rows of matrix and beta into the last five rows of matrix. Make sure that you prevent the function from modifying the elements of alpha and beta. Write the definition of the function printArray that prints any one-dimensional array of type int. Print 15 elements per line.

Answers

Answer:

In Java:

public static  int[] inputArray(){

   Scanner input = new Scanner(System.in);

   int[] alpha = new int[20];

   for(int i = 0;i<20;i++){

       alpha[i] = input.nextInt();

   }

   return alpha;}

public static  int[] doubleArray(int [] alpha){

   int[] beta = new int[20];

   for(int i = 0;i<20;i++){

       beta[i] = 2 * alpha[i];

   }

   return beta;

}

public static int[] copyAlphaBeta(int [] alpha, int [] beta){

   int [] AlphaBeta = new  int[10];

   for(int i = 0;i<5;i++){

       AlphaBeta[i] = alpha[i];

   }

   int count = 5;

   for(int i = 15;i<20;i++){

       AlphaBeta[count] = beta[i];

       count++;

   }

   return AlphaBeta;

}

public static void printArray(int [] alpha){

   for(int i = 0;i<20;i++){

       System.out.print(alpha[i]+" ");

       if((i+1)%15 == 0){

           System.out.println(" ");

       }

   }

}

Explanation:

The inputArray is defined here

public static  int[] inputArray(){

   Scanner input = new Scanner(System.in);

This declares alpha array of 20 elements

   int[] alpha = new int[20];

The following iteration gets input from the user into the array

   for(int i = 0;i<20;i++){

       alpha[i] = input.nextInt();

   }

This returns the alpha array

   return alpha;}

The doubleArray is defined here. It takes the alpha array as its input parameter

public static  int[] doubleArray(int [] alpha){

This declares beta of 20 integers

   int[] beta = new int[20];

This populates beta by 2 * alpha[i]

   for(int i = 0;i<20;i++){

       beta[i] = 2 * alpha[i];

   }

This returns the alpha array

   return beta;}

The copyAlphaBeta array is defines here

public static int[] copyAlphaBeta(int [] alpha, int [] beta){

This declares AlphaBeta as 10 elements

   int [] AlphaBeta = new  int[10];

This populates the first 5 elements of AlphaBeta with the first 5 of alpha

   for(int i = 0;i<5;i++){

       AlphaBeta[i] = alpha[i];

   }

   int count = 5;

This populates the last 5 elements of AlphaBeta with the last 5 of beta

   for(int i = 15;i<20;i++){

       AlphaBeta[count] = beta[i];

       count++;

   }

This returns the AlphaBeta array

   return AlphaBeta;

}

The printArray is defined here. It takes the alpha array as its input parameter

public static void printArray(int [] alpha){

This iterates through alpha array

   for(int i = 0;i<20;i++){

This prints each element of the array

       System.out.print(alpha[i]+" ");

A new line is started after the 15th element

       if((i+1)%15 == 0){

           System.out.println(" ");

       }

   }

}

See attachment for complete program which includes the main

Who plays Breath of the Wild?

Answers

Answer:

me

Explanation:

yea not me

Explanation:

Suppose you are given a relation R with four attributes ABCD. For each of the following sets of FDs, assuming those are the only dependencies that hold for R, do the following: (a) Identify the candidate key(s) for R. (b) Identify the best normal form that R satisfies (1NF, 2NF, 3NF, or BCNF). (c) If R is not in BCNF, decompose it into a set of BCNF relations that preserve the dependencies.
1. C → D, C → A, B → C
2. B → C, D → A
3. ABC → D, D → A
4. A → B, BC → D, A → C
5. AB → C, AB → D, C → A, D → B

Answers

Solution :

1.

a). Candidate keys : \($B$\)

b). R is in \($2F$\) but not \($3NF$\)

c). C → \($D$\) and C → \($A$\), both causes violations of \($BCNF$\). The way to obtain the join preserving decomposition is to decompose \($R$\) into \($AC, BC$\) and CD.

2.

a). Candidate keys : \($BD$\)

b). \($R$\) is in \($1NF$\) but not \($2NF$\).

c). Both B → \($C$\) and D → \($A$\) cause \($BCNF$\) violations. The decomposition : \($AD $\), \($BC, BD$\) is \($BCNF$\) and lossless and the join preserving.

3.

a). Candidate keys : \($ABC, BCD$\)

b). R is in \($3NF$\) but not \($BCNF$\)

c).\($ABCD$\) is not in \($BCNF$\) since D → \($A$\) and \($D$\) is not a key. But if we split up the \($R$\) as \($AD,BCD$\) therefore we cannot preserve dependency \($ABC$\) → D. So there is no \($BCNF$\) decomposition.

4.

a). Candidate keys : \($A$\)

b). R is in \($2NF$\) but not \($3NF$\)

c). BC → \($D$\) violates \($BCNF$\) since \($BC$\) does not contain the key. And we split up R as in \($BCD, ABC$\).

5.

a). Candidate keys : \($AB, BC, CD, AD$\)

b). \($R$\) is in \($3NF$\) but not \($BCNF$\).

c). C → \($A$\) and D → \($B$\) both causes a violations. The decomposition into \($AC,BCD$\) but this will not preserve \($AB$\) → C and \($AB$\) → D, and \($BCD$\) is still not \($BCNF$\) because \($D$\) → \($B$\). So we need to decompose further into \($AC,BD,CD$\) However when we try to revive the lost functional dependencies by adding \($ABC$\) and \($ABD$\), we that these relations are not in \($BCNF$\) form. Therefore, there is no \($BCNF$\) decomposition.

You work at a print shop that produces marketing materials, and your manager asks you to install a new printer. The printer comes with two options for drivers. One uses PCL, and the other uses Postscript. Which driver is the best option and why

Answers

Since you work at a print shop that produces marketing materials, and your manager asks you to install a new printer. The drivers that is best is PCL, because it can be used in the office to print physical document while the Postcript can only be used for online document or pdf and since it is office job, PCL is the best.

What is PCL  printer?

PCL use depends on the device. This indicates that certain printed data, typically graphical data like fill areas, underlines, or fonts, is created by the drivers for this language by using the printer hardware. As a result, the print job can be processed by the computer fast and effectively. The production and processing of page data must then be finished by the printer.

Note that If you typically print from "Office" programs in general, use the PCL driver. If you wish to print PDFs more quickly or use professional DTP and graphics tools for the majority of your printing, pick the PostScript driver.

Learn more about printer driver from

https://brainly.com/question/14230829
#SPJ1

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = 'q' and numPresses = 2, print:

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline.

Answers

You can find in the photo. Good luck!

Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline.

Using TWO practical life experiences, discuss the critical section problem in
the context of an operating system

Answers

For instance, given a system of n processes (P₀, P₁, ....… Pₙ₋₁} with each process having critical section segment of code:

The critical section problem would cause the processes to change shared resources, writing file, updating table, etc.When one process enters the critical section, no other process would be in its critical section.

What is an operating system?

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

What is the critical section problem?

A critical section problem can be defined as a code segment in which all of computer processes access and make use of shared resources such as digital files and common variables, as well as performing write operations on these shared resources.

This ultimately implies that, a critical section problem can be used to design and develop a secured protocol followed by a group of computer processes, so that no other process executes in its critical section when another process has entered its critical section.

For instance, given a system of n processes (P₀, P₁, ....… Pₙ₋₁} with each process having critical section segment of code. The critical section problem would cause the processes to change shared resources, writing file, updating table, etc., so that when one process enters the critical section, no other process would be in its critical section.

Read more on critical section problem here: https://brainly.com/question/12944213

#SPJ1

Example of critical section problem in the context of an operating system is when process A change the data in a memory location  and process C want to read the data from the same memory.

What is  critical section problem in OS?

The critical section problem can be regarded as the problem  that involves the notification that one process is executing its critical section at a given time.

It should be noted that ,The critical section  can be seen in code segment  when there is access to shared variables .

Learn more about operating system at:

https://brainly.com/question/1763761

#SPJ1

Guys I should write the program in C++
Can u help me?


Write a program which reads numbers from keyboard in a loop and checks if the given number is even.
The program ends when a negative number is input.​

Answers

#include <iostream>

int main(int argc, char const* argv[]) {

   while(1) {

       std::cout << ">> "; int x; std::cin>>x;

       if(x<0) break;

       else if(x%2==0) {std::cout << "\nThis is even number.\n";}

       else std::cout << "\nThis is odd number.\n";

   }

   return 0;

}

Guys I should write the program in C++Can u help me?Write a program which reads numbers from keyboard

discuss MIS as a technology based solution must address all the requirements across any
structure of the organization. This means particularly there are information to be
shared along the organization

Answers

MIS stands for Management Information System, which is a technology-based solution that assists organizations in making strategic decisions. It aids in the efficient organization of information, making it easier to locate, track, and manage. MIS is an essential tool that assists in the streamlining of an organization's operations, resulting in increased productivity and reduced costs.

It is critical for an MIS system to address the needs of any organization's structure. This implies that the information gathered through the MIS should be easily accessible to all levels of the organization. It must be capable of handling a wide range of activities and functions, including financial and accounting data, human resources, production, and inventory management.MIS systems must be scalable to meet the needs of a company as it expands.

The information stored in an MIS should be able to be shared across the organization, from the highest to the lowest level. This feature allows for smooth communication and collaboration among departments and employees, which leads to better decision-making and increased productivity.

Furthermore, MIS systems must provide a comprehensive overview of a company's operations. This implies that it must be capable of tracking and recording all relevant information. It should provide a real-time picture of the company's performance by gathering and analyzing data from a variety of sources. As a result, businesses can take quick action to resolve problems and capitalize on opportunities.

For more such questions on Management Information System, click on:

https://brainly.com/question/14688347

#SPJ8

Yazmin is reading a book that has 74 pages. She has read 38 pages. How many more pages does she need to read to finish the book​

Answers

Answer:

36 book

im sure it is correct

Answer:

36 boy

Explanation:

74-38

A web administrator notices a few security vulnerabilities that need to be addressed on the company Intranet site. The portal must force a secure browsing connection, mitigate script injection, and prevent caching on shared client devices. Determine the secure options to set on the web server's response headers.

Answers

Answer: Set a Cache-Control header to 0 to prevent caching on client browsers. Set a Strict-Transport-Security header to 31536000 (1 year) to force the client to remember to only connect to the server with HTTP(S) secure. Lastly, set a Content Security Policy(CSP) HTTP header to tell the client what sources it can load scripts or images from and how to handle the execution of JS that is on the page which can allow to mitigate script injection.

Explanation:

Cache-Control is a server response header that controls how long a browser should have cache for before it becomes stale. Setting it 0 tells the browser that it should never cache.

Strict-Transport-Security is a server response header that tells the client that after the first initial visit; that the browser should remember to only connect to it via HTTPS for the time that was set by header.

Content Security Policy (CSP) is a policy and also a header that can be in the response of a server that explains to the browser the limitations of content that can be loaded. Examples include: images, videos, JS sources, etc. The policy can also tell the browser that only an ad analytics software should be the only script that can run thus mitigating any other scripts that may be injected onto the site.  

Create a python program that will input their name and their age. It will show an output "Hi, {name} ! How are you? I know you are {age} old."

I WILL MARK YOU AS BRAINLIEST​

Answers

Answer:

age = 10

name = Cynthia

make an f string so the variables appear in the string. There are other ways to do this but I prefer f strings instead of using string concatenation. It causes problems adding 2 strings together most of the time.

print(f'Hi, {name} ! How are you? I know you are {age} old.')

What was the main limitation of computer networking that the invention of the Robert website of the 1990s

Answers

Answer:

The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another.

8. Give regular expressions with alphabet {a, b} for
a) All strings containing the substring aaa
b) All strings not containing the substring aaa
c) All strings with exactly 3 a’s.
d) All strings with the number of a’s (3 or greater) divisible by 3

Answers

Answer:

i think its C

Explanation:

How is opera diffrerent from blues,gospel,and country music?

How is opera diffrerent from blues,gospel,and country music?

Answers

Answer: Opera has its roots in Europe; the other styles are American

Explanation:

what port number would you open on the webserver

Answers

A port number which an end user or network administrator would open on a web server is either 80 or 8080.

What are the types of server?

In Computer technology, there are different types of server and these include the following:

Email serverFile serverDatabase serverProxy serverCentralized ServerDistributed application serverBlockchain serverDistributed communication serverWeb server

What is a web server?

In Computer networking, a web server can be defined as a type of computer (server) that is designed and developed to run websites and distribute webpages as they are being requested over the Internet by end users (clients).

By default, the port number "80" are typically opened by an end user or network administrator on a web server.

Read more on a web server here: brainly.com/question/27960093

#SPJ1

3D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space. What do these vectors form?
a. A bitmap graphic
b. A zipped file
c. A wireframe
d. All of the above

Answers

The vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space form option C: a wireframe.

What are the 3D graphics?

A wireframe may be a visual representation of a 3D question composed of lines and bends that interface a arrangement of focuses in a 3D space. It does not incorporate color or surface data  and is frequently utilized as a essential system for making more complex 3D models.

Subsequently, the right reply is choice (c) - a wireframe. option (a) - a bitmap realistic and alternative (b) - a zipped record are not tools as they are not related to the concept of 3D wireframes.

Learn more about 3D graphics from

https://brainly.com/question/27512139

#SPJ1

which statement is true of voice over internet protocol (voip)? question 6 options: A. users often experience busy lines. B. callers can be screened even with blocked caller ids. C. voicemails are not received on the computer. D. users cannot forward calls.

Answers

The correct statement about Voice Over Internet Protocol (VoIP) is option B: callers can be screened even with blocked caller IDs.

VoIP is a technology that allows users to make voice calls using a broadband Internet connection instead of a traditional phone line. One of the advantages of VoIP is that it allows for more advanced call screening options, including the ability to screen callers even if they have blocked their caller ID. This feature can help users avoid unwanted calls from telemarketers or other unwanted callers.

Option A is incorrect because users typically do not experience busy lines with VoIP, as the technology allows for multiple calls to be made simultaneously. Option C is incorrect because VoIP does allow for voicemails to be received on the computer. Option D is also incorrect, as VoIP allows for call forwarding just like traditional phone lines.

Learn more about Voice Over Internet Protocol (VoIP) at

https://brainly.com/question/13438672

#SPJ11

Which IP QoS mechanism involves prioritizing traffic? Group of answer choices IntServ RSVP COPS DiffServ None of the above

Answers

Answer:

DiffServ

Explanation:

The IP QoS which is fully known as QUALITY OF SERVICE mechanism that involves prioritizing traffic is DIFFERENTIATED SERVICES (DiffServ).

DIFFERENTIATED SERVICES help to differentiate ,arrange ,manage, control and focus on network traffic that are of great significance or important first before network that are less important or by their order of importance in order to provide quality of service and to avoid network traffic congestion which may want to reduce the quality of service when their is to much load on the network .

A cyberbully is someone who invades another person’s privacy by posting mean-spirited messages. repeatedly sending text messages. visiting questionable websites. stealing original work.

Answers

Answer:

Its A.

Explanation:

Took the exam review

Answer:

A

Explanation:

on edge

What is the data type of the following variable?
name = "John Doe"

Answers

In computer programming, a variable is a storage location that holds a value or an identifier. A data type determines the type of data that can be stored in a variable. The data type of the following variable, name = "John Doe" is a string data type.

In programming, a string is a sequence of characters that is enclosed in quotes. The string data type can store any textual data such as names, words, or sentences.The string data type is used in programming languages such as Java, Python, C++, and many others. In Python, the string data type is denoted by enclosing the value in either single or double quotes.

For instance, "Hello World" and 'Hello World' are both strings.In conclusion, the data type of the variable name is string. When declaring variables in programming, it is important to assign them the correct data type, as it determines the operations that can be performed on them.

For more such questions on variable, click on:

https://brainly.com/question/28248724

#SPJ8

In the computing environment the numerical value represented by the pre-fixes kilo-, mega-, giga-, and so on can vary depending on whether they are describing bytes of main memory or bits of data transmission speed. Research the actual value (the number of bytes) in a Megabyte (MB) and then compare that value to the number of bits in a Megabit (Mb). Are they the same or different

Answers

Answer:

1024 bytes in a megabyte and there are 8000000 bits in a megabyte. They are different.

Explanation:

There are 8000000 bits and 1024 bytes in one megabyte. They are unique.

What is Megabyte?

The megabyte is a multiple of the digital informational unit byte. The suggested unit sign for it is MB. The International System of Units unit prefix mega is a multiplier of 1000,000. As a result, one megabyte is equal to one million bytes of data.

About a million bytes make up a megabyte (or about 1000 kilobytes). Typically, a few megabytes might be required for a 10-megapixel digital camera photograph or a brief MP3 music clip.

1000000 bytes make up one megabyte (decimal). In base 10, 1 MB equals 106 B. (SI). 1048576 bytes make up a megabyte (binary). A megabyte can imply either 1,000,000 bytes or 1,048,576 bytes, according to the Microsoft Press Computer Dictionary. Apparently, Eric S.

To read more about Megabyte, refer to - https://brainly.com/question/2575232

#SPJ2

what is the first computer company​

Answers

Electronic Controls Company it was founded on 1949 by J.Presper and John Mauchly

Answer: Electronic Controls Company

Explanation: The first computer company was Electronic Controls Company and was founded in 1949 by J. Presper Eckert and John Mauchly, the same individuals who helped create the ENIAC computer.

Hope this helps^^

jane, an employee in the human resources department, has created several important pdf documents on her computer that all office managers in her building must read. she would like to make locating these files simple and maintain them as little as possible. it is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible.
Which of the following would MOST likely fulfill Jane's needs?

Answers

Answer:

Network share

Explanation:

Other Questions
studocu compare and contrast monosaccharides and polysaccharides. what is the difference between a carbohydrate and a lipid? how are unsaturated fats different from saturated fats? i need help!!!!!! Do only number 30. contrast the thomsom model and the rutherford model of the atom a los puertorriqueos les encanta visitar los ros del yunque. A runner dashes 263m in a direction due North from the starting line (Xi = 0m). She then turns around and runs due South back toward the starting line 62m. If both legs of this run take a total of 203 seconds, to the nearest tenth of a m/s, what is her average velocity? What items must be included in a entity's annual financial report? For each of the following items state which financial statement(s) it would appear in. (a) Property, plant and equipment (b) Retained Arrange the salts by their molar solubility in water. Consult the table of solubility product constants for the Ksp value for each salt. Most solubleBaSO4 MgF2 Mg3(PO4)2 Al(OH)2 Least soluble You have arranged the salts by the magnitude of their Ksp. Each salt in this question produces a different number of ions in aqueous solution, so you cannot compare the solubility product constants to determine which salt is the most soluble. Calculate the molar solubility, x, for each salt and arrange them by x. Graph -3x - y = -1 for the domain D: {2, 1, 0, 1, 2}.Answer choices below. find the names of these places a b c d? Tell which property is represented.3(4 + 7) = (3 x 4) + (3 x 7) handling of whiskey rebellion, demonstrates strength of new government Customer Discovery Phase 3 is about testing the solutiona. Trueb. False2. After you are done with solution testing, you should identify advisory board membersa. Trueb. False3. The purpose of a problem presentation is toa. Elicit information from customersb. Elicit information from investorsc. Give information to customersd. Give information to investors4. Customer price sensitivity is more important than customer enthusiasma. Trueb. False5. A product/solution presentation includes all of the following EXCEPTa. A review of the problemb. A description of the solutionc. An overview of the customer workflowd. Understand the value equatione. A review of the Business Model Canvas plz I want quick writing about and no mistake plz I want is about fro school magazine about keeping the street clean Tech Engineering in TN is making a product for the overseas market. The following cost data for the product has been compiled. Item Cost Selling price $167 Materials and purchased parts $25/unit Direct Labor 2 hrs at $20 per hour Fixed Cost $1,400,000 If the overhead expenses are charged at 80 % of labor cost, determine the manufacturing cost per unit. 345 x 564 divided by 3x - 2y At a music venue, Anastasia has set up a merchandising booth that sells items related to the concert that is occurring outside. What is Anastasia most marketing towards You have prepared an aqueous solution of a monoprotic acid (formula mass = 153.483g/mol) by dissolving 26.816g of the acid in sufficient water to make 500.0mL of solution. The pH of the resulting solution is 4.274. What is Ka for this acid? 1. Convert 105 to radians: (a) -7/12(b) 7/12 (b) -105/180 (d) 105/180 (e) None of the above 2. If f(x)= ((2^x)/(ln 2)) then find f'(-1). (a) 0 (b) 1 (c) In 2 (d) 1/(2 In2)(e)1/2 Ill mark brainliest 1. Describe the Seneca Falls Convention. When and where was it held, and why was it necessary? (3 points)2. How did the abolition movement influence the organizers of the Seneca Falls Convention? (3 points)3. Describe who Elizabeth Cady Stanton and Lucretia Mott were, including their importance to the Seneca Falls Convention. (3 points)4. What was the Declaration of Sentiments? Who wrote it, and why? (3 points)5. What is suffrage? Why did some women at the convention argue against women's suffrage? (3 points)6. Why did the women at the Seneca Falls Convention create the Declaration of Sentiments? How was this document similar to the Declaration of Independence? (3 points)7. According to the article "Seneca Falls Convention," how did news about the Seneca Falls Convention spread throughout the nation? What was the reaction? (3 points)8. Describe who Frederick Douglass was, including his influence on the Seneca Falls Convention and the Declaration of Sentiments. (3 points)9. What fact from the article "Seneca Falls Convention" did you find new or surprising? What does this fact help you understand about the importance of the Seneca Falls Convention? (3 points)10. What happened in the movement for women's rights after the Seneca Falls Convention? How long did it take for women to be granted suffrage? (3 points) i ............. she will to the party, i really want to see her. a) expect b) hope c) want d) believe