_____________________ refers to the purchase of application services over the internet.

Answers

Answer 1

The term you are looking for is "Software as a Service" (SaaS). It refers to the purchase of application services over the internet. SaaS allows users to access and use software applications hosted on remote servers, eliminating the need for installation and maintenance on their own devices.

With SaaS, users can typically access the software through a web browser, paying a subscription fee for the services provided. This model offers flexibility, scalability, and cost-effectiveness, as the software provider handles updates, security, and infrastructure management. In summary, SaaS is a cloud-based solution that enables users to access and utilize application services remotely.


Software as a Service (SaaS) refers to the purchase of application services over the internet. It is a cloud-based software distribution model that allows users to access and use software applications hosted on remote servers. SaaS eliminates the need for users to install and maintain the software on their own devices, as they can access it through a web browser. This model offers several advantages, including flexibility, scalability, and cost-effectiveness.

To know more about Software visit:

https://brainly.com/question/32393976

#SPJ11


Related Questions

A network packet contains two kinds of information. what are they?

geolocation data and user data

control information and user password

control information and user data

geolocation data and user password

Answers

Answer:

C) control information and user data

Hope this helped you, and have a good day!

how many columns were on a punch card in 1929, and how many punch locations were there?

Answers

80 columns were on a punch card in 1929.

from 1890 until the 1930s, there were vintage card punch versions. These are devices that make predetermined holes in stiff paper cards at specific locations along with specified rows and columns to capture data that may later be read back or interpreted by separate devices called card readers. For storing 80 digits, the card has 80 columns. Less was indicated by pressing the X key above the numerals. Even today, 80 character wide data files are still common in trade. Punching the top key and a digit 1-9 in the same columns produced the letters A through I, the X key and 1–9 produced the letters J–R, and the 0 and 1–9 produced the letters S–Z. Pre-1928 models punched 45 columns, not 80.

Learn more about punch cards here:

https://brainly.com/question/29771328

#SPJ4

what tiny customizable tile appears in the upper right of the start screen?

Answers

The tiny customizable tile that appears in the upper right of the start screen is called the "App Switcher" or "Task Switcher" button.

The tiny customizable tile which appears in the upper right of the Start screen in Windows is called the "App Switcher" or "Task Switcher" button. It provides a convenient way for users to switch between open apps or programs on their device.

Clicking on the App Switcher button displays a list or grid view of currently running apps or programs, allowing users to easily navigate and switch to a different application without returning to the desktop or Start screen. This feature enhances multitasking and makes it more efficient to switch between different tasks or applications.

To learn more about Start Screen visit : https://brainly.com/question/1601405

#SPJ11

consider a system where a memory access requires 100ns. consider a memory reference made by the cpu, e.g., load variable x. assume x is present in memory.

Answers

Memory access requires 100ns. CPU makes a memory reference, assuming variable x is in memory.

In a computer system, the CPU accesses data from memory when executing instructions.

When a memory reference is made, e.g., loading a variable x, and assuming that x is present in memory, the CPU takes approximately 100ns to retrieve the data.

This access time is determined by factors such as the speed of the memory module, the memory controller, and the system bus.

The latency of memory access is a crucial factor that affects the overall performance of a computer system.

To improve performance, techniques such as caching and prefetching are used to reduce the number of memory accesses and minimize the time spent waiting for data to be retrieved from memory.

For more such questions on Memory:

https://brainly.com/question/13748829

#SPJ11

Which two of the following devices operate only at the Physical layer of the OSI model?
Hub
Switch
Router
Bridge
Repeater

Answers

The two devices that operate only at the Physical layer of the OSI model are the A) Hub and E) the Repeater.

The OSI model is a conceptual framework for understanding how computer systems communicate with each other. It is divided into seven layers, with each layer having specific functions and protocols. The Physical layer is the first layer in the OSI model, and it deals with the transmission of raw data over a physical medium.

A Hub is a device that operates at the Physical layer, and its primary function is to receive data from one device and transmit it to all other devices connected to it. It does not perform any filtering or decision-making based on the destination address of the data, and it simply forwards all data to all connected devices.

Similarly, a Repeater is also a device that operates at the Physical layer, and its primary function is to regenerate and amplify signals received from one device and transmit them to another device. It does not perform any filtering or decision-making based on the content of the signal, and it simply amplifies and forwards the signal.

Hence A and E are correct options.

For more questions like OSI model click the link below:

https://brainly.com/question/30544746

#SPJ11

How does malware spread

Answers

Answer: Malware can use known software vulnerabilities to infect your PC. A vulnerability is like a hole in your software that can give malware access to your PC. When you go to a website, it can try to use vulnerabilities in your web browser to infect your PC with malware. Other than this malware can spread by four ways Clicking on links to malicious websites in emails, messaging apps or social network posts. Visiting compromised websites, aka drive-by downloads, viruses can be hidden in HTML, thus downloading when the webpage loads in your browser. Connecting your device to infected external hard drives or network drives

Answer: Malware is usually distributed through malicious websites, emails, and software. Malware can also be hidden in other files, such as image or document files, or even in seemingly innocuous files, such as.exe files

QUESTION 3 (10%) Design an algorithm that generates a maze that contains no path from start to finish but has the property that the removal of a prespecified wall creates a unique path.I would like the maze to be in Java. Computer ScienceEngineering & TechnologyJava ProgrammingCS 3345

Answers

To design an algorithm in Java that generates a maze with the specified properties, we can use a variation of the depth-first search algorithm.

The algorithm involves generating a random maze layout, ensuring there is no path from the start to finish initially. By tracking the visited cells and available walls, we can determine which wall to remove to create a unique path from start to finish.

1. Define a maze grid using a 2D array of cells, where each cell represents a location in the maze.

2. Initialize all cells as walls.

3. Choose a random starting cell and mark it as visited.

4. Implement a recursive function, such as depth-first search, to randomly traverse the maze, creating paths by removing walls.

5. In the recursive function, randomly select an unvisited neighboring cell and remove the wall between the current cell and the chosen neighbor.

6. Repeat step 5 until all cells have been visited or no further paths can be created without connecting the start and finish.

7. When the recursive function completes, you will have a maze with no path from start to finish.

8. Determine a specific wall to remove that connects the start and finish cells, creating a unique path.

9. Modify the maze grid by removing the chosen wall.

10. The modified maze will now have a unique path from start to finish, as the removal of the prespecified wall guarantees this property.

By following this algorithm, you can generate a maze in Java that meets the given criteria. Remember to implement appropriate data structures and methods to represent the maze grid, track visited cells, and remove walls as needed.

Learn more about algorithm here:

brainly.com/question/28724722

#SPJ11

What are the flowchart symbols?​

Answers

Answer:Flowchart use to represent different types of action and steps in the process.These are known as flowchart symbol.

Explanation:The flowchart symbols are lines and arrows show the step and relations, these are known as flowchart symbol.

Diamond shape: This types of  flow chart symbols represent a decision.

Rectangle shape:This types of flow chart symbols represent a process.

Start/End : it represent that start or end point.

Arrows: it represent that representative shapes.

Input/output: it represent that input or output.

Which type of end-user license allows a program to be installed on 1 CPU that is not accessed by other users on network?
a. general public
b. network/multiuser
c. individual/multiuser
d. single-user

Answers

A application may be installed on a single CPU that is not used by any other users on the network under a single-user end-user license.

What is a single user license?

the permission granting one person access to a software package. It may allow installation on unlimited number of machines as long as the licensee is the only user, or it may offer the user the ability to install the software on only one system. EULA is referenced.

What are named licence and concurrent license, respectively?

Any individual who has access to the application at any time is a named user. If your company has 100 employees, all of whom require access to the programme at some point, you will need to 100 specific users. Users who are CONNECTED at the same moment are the only users who are counted as CONCURRENT.

To know more about network visit:-

https://brainly.com/question/7499316

#SPJ4

• describe your and others' experiences in cyberspace from an IT law perspective. • explain the issues raised by ICT and digital convergence. • outline different points of views on whether, how, and by whom the internet should be regulated. • explain Lessig's four modalities of regulation including law, code, market and social norms and the way in which they interact with each other. • understand questions of legitimacy of regulation and regulators. • critically evaluate the effectiveness of different regulatory approaches. • justify your preferred approach to regulation, with reference to real-world examples.

Answers

Evaluating the effectiveness of various regulatory approaches is crucial, considering the dynamic nature of technology and its impact on society.

What are the key aspects to consider regarding experiences, issues, and regulation in cyberspace from an IT law perspective?

From an IT law perspective, experiences in cyberspace vary among individuals and entities.

Some have encountered issues such as data breaches, hacking, online harassment, and intellectual property infringements.

ICT and digital convergence present challenges as they raise concerns regarding privacy, security, jurisdiction, and the regulation of emerging technologies.

Different stakeholders hold diverse views on internet regulation, with debates revolving around issues like net neutrality, online content moderation, and user privacy.

Lawrence Lessig's four modalities of regulation, including law, code, market, and social norms, interact with each other to shape behavior and govern cyberspace.

Questions of legitimacy arise concerning the authority and accountability of regulators in the digital realm.

A preferred regulatory approach should be justified, taking into account real-world examples and considering factors such as rights protection, innovation, global cooperation, and balancing competing interests.

Learn more about dynamic nature

brainly.com/question/30286744

#SPJ11

which computer belongs to the first generation?​

Answers

ENIAC (Electronic Numerical Integrator and Calculator .)

question 14 what scenario describes an evil twin attack? a. an attacker is actively attempting to brute force the pin of a wps enabled access point. b. a hacker is actively sending wireless probes to discover available wireless networks. c. a malicious access point is configured with the ssid of a non-malicious public access point. d. a hacker is utilizing a protocol analyzer on a public wi-fi network to discover packet contents.

Answers

The scenario that describes an evil twin attack is C: a malicious access point is configured with the SSID of a non-malicious public access point.

What is an evil twin attack ?

A hostile actor develops a phony wireless access point that is made to seem like a real one in an evil twin attack, a sort of wireless network assault. In order to fool users into connecting to the phony access point, the attacker would frequently setup it with the same SSID (network name) as a nearby genuine access point.

Once a user connects to the phony access point, the attacker has access to their traffic, can steal their login information, and even has the ability to install malware on the victim's device.

Find out more on evil twin attack at https://brainly.com/question/30019421

#SPJ1

Computer Vision and Industrial Robots
Consider an industrial robot performing several tasks in an assembly line. Such machines perform a single task with great speed and efficiency. Conduct research on the Internet and list what you feel would be its main components if computer vision was implemented. Ask yourself what are the advantages of adding a computer vision system to this robot. Which robot do you expect better performance from, a robot with computer vision or robot without computer vision.

Answers

Answer:

View Computer Vision Unit Activity.docx from COMPUTER SCIENCE 101 at Edoptions High School. Consider an industrial robot performing several tasks in an assembly line.Machine Vision in industrial applications. Robots working in industrial applications need visual feedback. This is used to navigate, identify parts, collaborate with humans and fuse visua

Explanation:

Many industries are feeling the effects of skilled labor shortages. At the same time, companies are reluctant to invest heavily in training and developing unskilled employees, for fear of losing them afterward through defection to competitors. With no end in sight to the workforce shortfall, the appeal of robots as an efficient supplement, and even replacement, for human labor is continuing to grow.

The cost of robotics is generally falling, and alternative business models like robotics-as-a-service (RaaS) make industrial robots accessible even to companies that don’t have substantial capital budgets to exploit. The affordability of the units themselves, along with the fact that programming is becoming more straightforward and hence less costly, is also boosting the appeal of industrial robotics adoption.

Answer:if u still need help i can help you

Explanation:

A single-purpose system, such a point-of-sale machine (cash register), is an example of what type of computer?A.Thick clientB.Thin clientC.WorkstationD.Server

Answers

A single-purpose system, such as a point-of-sale machine (cash register), is an example of a thin client computer.

A thin client is a type of computer that relies heavily on a server for processing tasks and typically has minimal hardware and software resources on its own. In the case of a point-of-sale machine, the majority of the processing and data storage is done on the server side, and the machine itself is simply used to interact with the server and display the necessary information to the user. On the other hand, a thick client is a type of computer that has more processing power and resources on its own and can perform more complex tasks without relying heavily on a server. Workstations and personal computers are examples of thick clients, while servers are designed to provide services to other computers and devices on a network.

Learn more about computer here:

https://brainly.com/question/20837448

#SPJ11

ITEMS
Evan spent 25% of his money on rent and g on food, together his
expenses totaled to $75.00. Calculate the total amount of money Evan had​

Answers

Answer:

Total money he had = $136 (Approx.)

Explanation:

Given:

Spend on rent = 25%

Spend on food = 30%

Total of expenses = $75

Find:

Total money he had

Computation:

Total money he had = [Total of expenses][100/ (Spend on rent + Spend on food)]

Total money he had = [75][100/ (25 + 30)]

Total money he had = [75][100/ (55)]

Total money he had = 136.36

Total money he had = $136 (Approx.)

a specific type of data stored for a record
options:
A. Table
B. Field
c. Cell

Answers

Answer:

Table

Explanation:

A set of data is stored in a table.

python

how do I fix this error I am getting

code:

from tkinter import *
expression = ""

def press(num):
global expression
expression = expression + str(num)
equation.set(expression)

def equalpress():
try:
global expression
total = str(eval(expression))
equation.set(total)
expression = ""

except:
equation.set(" error ")
expression = ""

def clear():
global expression
expression = ""
equation.set("")


equation.set("")

if __name__ == "__main__":
gui = Tk()



gui.geometry("270x150")

equation = StringVar()

expression_field = Entry(gui, textvariable=equation)

expression_field.grid(columnspan=4, ipadx=70)


buttonl = Button(gui, text=' 1', fg='black', bg='white',command=lambda: press(1), height=l, width=7)
buttonl.grid(row=2, column=0)

button2 = Button(gui, text=' 2', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button2.grid(row=2, column=1)

button3 = Button(gui, text=' 3', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button3.grid(row=2, column=2)

button4 = Button(gui, text=' 4', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button4.grid(row=3, column=0)
button5 = Button(gui, text=' 5', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button5.grid(row=3, column=1)
button6 = Button(gui, text=' 6', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button6.grid(row=3, column=2)
button7 = Button(gui, text=' 7', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button7.grid(row=4, column=0)
button8 = Button(gui, text=' 8', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button8.grid(row=4, column=1)
button9 = Button(gui, text=' 9', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button9.grid(row=4, column=2)
button0 = Button(gui, text=' 0', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button0.grid(row=5, column=0)


Add = Button(gui, text=' +', fg='black', bg='white',command=lambda: press("+"), height=l, width=7)
Add.grid(row=2, column=3)

Sub = Button(gui, text=' -', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
Sub.grid(row=3, column=3)

Div = Button(gui, text=' /', fg='black', bg='white',command=lambda: press("/"), height=l, width=7)
Div.grid(row=5, column=3)

Mul = Button(gui, text=' *', fg='black', bg='white',command=lambda: press("*"), height=l, width=7)
Mul.grid(row=4, column=3)

Equal = Button(gui, text=' =', fg='black', bg='white',command=equalpress, height=l, width=7)
Equal.grid(row=5, column=2)

Clear = Button(gui, text=' Clear', fg='black', bg='white',command=clear, height=l, width=7)
Clear.grid(row=5, column=1)

Decimal = Button(gui, text=' .', fg='black', bg='white',command=lambda: press("."), height=l, width=7)
buttonl.grid(row=6, column=0)

gui.mainloop()

Answers

Answer:

from tkinter import *

expression = ""

def press(num):

global expression

expression = expression + str(num)

equation.set(expression)

def equalpress():

try:

 global expression

 total = str(eval(expression))

 equation.set(total)

 expression = ""

except:

 equation.set(" error ")

 expression = ""

def clear():

global expression

expression = ""

equation.set("")

if __name__ == "__main__":

gui = Tk()

 

equation = StringVar(gui, "")

equation.set("")

gui.geometry("270x150")

expression_field = Entry(gui, textvariable=equation)

expression_field.grid(columnspan=4, ipadx=70)

buttonl = Button(gui, text=' 1', fg='black', bg='white',command=lambda: press(1), height=1, width=7)

buttonl.grid(row=2, column=0)

button2 = Button(gui, text=' 2', fg='black', bg='white',command=lambda: press(2), height=1, width=7)

button2.grid(row=2, column=1)

button3 = Button(gui, text=' 3', fg='black', bg='white',command=lambda: press(3), height=1, width=7)

button3.grid(row=2, column=2)

button4 = Button(gui, text=' 4', fg='black', bg='white',command=lambda: press(4), height=1, width=7)

button4.grid(row=3, column=0)

button5 = Button(gui, text=' 5', fg='black', bg='white',command=lambda: press(5), height=1, width=7)

button5.grid(row=3, column=1)

button6 = Button(gui, text=' 6', fg='black', bg='white',command=lambda: press(6), height=1, width=7)

button6.grid(row=3, column=2)

button7 = Button(gui, text=' 7', fg='black', bg='white',command=lambda: press(7), height=1, width=7)

button7.grid(row=4, column=0)

button8 = Button(gui, text=' 8', fg='black', bg='white',command=lambda: press(8), height=1, width=7)

button8.grid(row=4, column=1)

button9 = Button(gui, text=' 9', fg='black', bg='white',command=lambda: press(9), height=1, width=7)

button9.grid(row=4, column=2)

button0 = Button(gui, text=' 0', fg='black', bg='white',command=lambda: press(2), height=1, width=7)

button0.grid(row=5, column=0)

Add = Button(gui, text=' +', fg='black', bg='white',command=lambda: press("+"), height=1, width=7)

Add.grid(row=2, column=3)

Sub = Button(gui, text=' -', fg='black', bg='white',command=lambda: press("-"), height=1, width=7)

Sub.grid(row=3, column=3)

Div = Button(gui, text=' /', fg='black', bg='white',command=lambda: press("/"), height=1, width=7)

Div.grid(row=5, column=3)

Mul = Button(gui, text=' *', fg='black', bg='white',command=lambda: press("*"), height=1, width=7)

Mul.grid(row=4, column=3)

Equal = Button(gui, text=' =', fg='black', bg='white',command=equalpress, height=1, width=7)

Equal.grid(row=5, column=2)

Clear = Button(gui, text=' Clear', fg='black', bg='white',command=clear, height=1, width=7)

Clear.grid(row=5, column=1)

Decimal = Button(gui, text=' .', fg='black', bg='white',command=lambda: press("."), height=1, width=7)

Decimal.grid(row=6, column=0)

gui.mainloop()

Explanation:

I fixed several other typos. Your calculator works like a charm!

pythonhow do I fix this error I am gettingcode:from tkinter import *expression = "" def press(num): global

Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36, 8):
(a) compute the euclidean distance between the two objects.
(b) compute the manhattan distance between the two objects.
(c) compute the minkowski distance between the two objects, using q = 3.
(d) compute the supremum distance between the two objects.

Answers

Answer:

Given,

P = (22, 1, 42, 10)

Q = (20, 0, 36, 8)

a. Formula for Euclidean Distance :

distance = ((p1-q1)^2 + (p2-q2)^2 + ... + (pn-qn)^2)^(1/2)

Now,

distance = ( (22-20)^2 + (1-0)^2 + (42 - 36)^2 + (10-8)^2) ) ^(1/2)

=( (2)^2 + (1)^2 + (6)^2 + (2)^2 ) ) ^(1/2)

=(4+1+36+4)^(1/2)

=45^(1/2)

Distance = 6.7082

b.Manhattan distance :

d = |x1 - x2| + |y1 - y2|

d = |22- 20| + |1 - 0|

d = |2| + |1|

Explanation:

help
If we are looking at the predictor "car type," which can take on the values "sedan" "coupe" "truck" "suv" "van" how many binary decision variables would we need to code this data into a usable format?

Answers

If we are looking at the predictor "car type," which can take on the values "sedan" "coupe" "truck" "suv" "van", we would need 4 binary decision variables to code this data into a usable format.

A binary decision variable is a variable with only two possible values: 1 or 0. The variable is referred to as a binary variable, a binary indicator, or a 0-1 variable .The binary variable is used to answer yes/no questions. the binary variable " the binary variable is set to 0.To code the car type data into a usable format, we can use the binary decision variables.

We can use four binary variables to code the data into a usable format. We can use one variable for each category of car type. The values of the binary variables for the different categories are as follows:Sedan - 1000Coupe - 0100Truck - 0010SUV - 0001Using this format, if a car is a sedan, its binary decision variable would be set to 1000. If a car is a coupe, its binary decision variable would be set to 0100, and so on.

To know more about sedan visit:

https://brainly.com/question/24286177

SPJ11

i cracked a school computer screen on purpose and one on accident what will happen now?

Answers

Answer:

You will probably have to pay a fee of replacement, or pay for the whole computer.

Explanation:

Hello Brainly Students!
Have any suggestions to make Brainly better?!
Write them down below!

Thank you,
BrainlyUpdates

Answers

Answer:

i need help on my wuestion and nobody responds

Explanation:

Answer:

?

Explanation:

Viết phương trình diện tích phần gạch sọc biết độ dài hai cạch hình chữ nhật là a và b được nhập từ bàn phím

Answers

Answer:

A x B = khu vực

Explanation:

idea citizen activation

Answers

Answer:Idea citizen activation badge is a part of the idea silver award and is in the citizen category,helping you learn digital awareness,safety and ethics.

Answer: The Citizen Activation badge is part of the iDEA Silver Award and is in the Citizen category, helping you learn digital awareness, safety and ethics.

Want to know more about iDEA?

iDEA helps people develop digital, enterprise & employability skills for free. Log in or sign up to start a badge and begin to earn points on iDEA.

Define a function CheckSelectiveSum() that takes one integer vector parameter and one integer parameter. The function computes the sum of the vector's elements that are less than the integer parameter. Then, the function returns true if the sum is negative, and returns false otherwise Ex If the input is 49-4-5-2-4, the vector has 4 elements (9.-4.-5.-2), and the integer parameter is -4. Then, the output is: True, the sum of the elements that are less than -4 is negative. Note: The sum is zero if no element is less than the integer parameter. #include include using namespace std; 1. Your code goes here */ int main() vector int> input Vector: Ant size: int input: Antti Sint X bool result: I // Read the vector's size, and then the vector's elements cin >> site: for - 0:1 size) cin >> input: Input Vector.push back (input)

Answers

the sum of a number of vectors that for the sum of two vectors is geometrically represented by the diagonal of a parallelogram whose sides represent the two vectors being added.

#include <iostream>

#include <bits/stdc++.h>

using namespace std;

bool CheckSelectiveSum(vector<int> inVector, int num){

int sum = 0 ;

       //create itterable object for the vector

       vector<int> ::iterator it; //itterate through each

       while (!inVector.empty()){

           if(inVector.back() < num){

               sum+=inVector.back();

           }

           inVector.pop_back();

       if (sum>0)

          return true;

       else

          return false;

}

int main(){

 vector<int> inVector;

 int size;

 int input;

 int i;

 int x;

 bool result;

 cin >> size;

 for(i=0;i<size;++i){

    cin >> input;

    inVector.push_back(input);

 }

 cin >>x;

 result = CheckSelectiveSum(inVector,x);

 count<<result;

}

learn more about vector sum here:

https://brainly.com/question/10435343

#SPJ1

Which of the following is true of an effective anti-harassment and
complaint policy?
It should be vague about which types of behavior are considered harassment.
It should make clear that all complaints will be made public.
It should be written in clear, simple language.
It should discourage reporting of harassment.

Answers

It needs to be written in basic, straightforward language. All employees should be able to quickly understand an effective policy's definition of harassment and its associated penalties.

Which prevents harassment most successfully?

reassuring staff members that raising issues or asking questions won't result in punishment; Making sure managers are aware of their obligation to stop, address, and prevent harassment; immediately and effectively responding to queries or concerns about harassment; conducting investigations into allegations of harassment

What is the policy against harassment?

The anti-discrimination and anti-harassment policy safeguards officers and staff against discrimination and harassment based on, among other things, colour, ethnicity, sex, age, sexual orientation, and gender identity. Also, it shields employees, especially officers, against harassment, including sexual harassment.

To know more about harassment visit:-

https://brainly.com/question/14053347

#SPJ1

what is the minimum number of paths that would need to be broken to prevent computing device a from connecting with computing device e?

Answers

The minimum number of paths that would need to be broken to prevent computing device a from connecting with computing device E is 3 .

What is computing device?

Computing device refers to, as appropriate, a student-owned computing device used as part of the Bring-Your-Own-Device (BYOD) Program or an Ontario Tech owned computing device that was loaned to the student. This Software Use Agreement ("Agreement"), as it may be updated from time to time by the University, must be accepted without modification in order to use the Software, which is a privilege, not a right.

You ("User") and the University are the parties to this Agreement. You confirm that, as a User, you have read, comprehended, and agree to be bound by the terms and conditions contained in this Agreement by clicking "I agree" below.

Learn more about Computing device

https://brainly.com/question/4774474

#SPJ4

Are you familiar with measuring using a ruler? When have you ever used a ruler to measure, and who taught you how to use the ruler? How confident are you in your ability to measure things using a ruler? Please help me answer this question

Answers

Answer:

I have used a ruler many times to meausre various things such as paper, my height, etc. I was taught how to use a ruler in elementary school. I am pretty confident in using a ruler because I have used one for a majority of my life.

Explanation:

how do you get your winkey wet??

Answers

Answer:

what

Explanation:

what

sorry but what

Answer:

what is a winkey.

Explanation:

Cannot initialize sftp protocol. Is the host running an sftp server?.

Answers

Answer:

I believe it will resolve your issue

Explanation:

Most of the time it happened due to the password expired . So you need to make do right click on that WinSCP user's and you'll find the option Open in PUTTY, PFA.

Write a program that creates a two-dimensional list named lengths and stores the following data:

20 15 16
15 16 15
16 15 16
The program should also print the list.

Answers

Answer:

Explanation:

Following is the python code of your question:

lengths = [

   [20, 15, 16],

   [15, 16, 15],

   [16, 15, 16]

]

print(lengths)

Following is the C code of your question:

#include <stdio.h>

int main() {

   int lengths[3][3] = {

       {20, 15, 16},

       {15, 16, 15},

       {16, 15, 16}

   };

   // Printing  the array of  named lengths

   for (int i = 0; i < 3; i++) {

       for (int j = 0; j < 3; j++) {

           printf("%d ", lengths[i][j]);

       }

       printf("\n");

   }

   return 0;

}

Other Questions
_____________________________ means that you communicate any potential risks and benefits of your research to potential study participants in language they can understand. Which statements reflect Sumerian religious beliefs? Find and prove algebraically the solutions (coordinate points) to the system of equations? F(x)=x^2-4x+2 and g(x)=-2x+1 Given that coule.us) - EILE DE M2)]. lajure the linearity rule and & (c) = c. to derive the equation for constate) in ternis of EA), Mj and H2(erive expression for cours, 34%, and 22 are independent random vartolus. f(x)= [ (x for 2 exc4 = 56) o elsewhere for a continuon ona random variable &. (a) Compute. P/2 ex what can trigger the process of eutrophication? enviromental sciencequizlet a marketing agency is trying to put together an ad for a new pain medication. how might they best grab the attention of their audience? Question 1 of 10A. is a measure of change in the prices of goods from one period toanotherA. sanctionB. quota OC. price indexD. subsidySUBMIT The measures of interior angle of a convex pentagon are in ratio 1:2:3:4:5. Find the measures of each angle How many outcomes does a 6 sided cube have? In the air with the antiskid armed, current cannot flow to the antiskid control box becauseA. landing gear squat switch is open.B. landing gear down and lock switch is open.C. landing gear antiskid valves are open. name three types of dots large mammals for domestication by 1000 bce in the nile river civilization it is the industrial revolution. choose if you are part of the working class or the middle class. would you support communism? explain. Which table represents y as a function of x?X12001233X-1-1o21023XV110230123xV-1-10-1 Your boss has just proposed a novel idea for a technological overhaul for your department. Implementing this idea will radically change the way your department works and make it much easier to deliver better results with less effort. A simple analysis shows that implementing the idea right now is beyond the resources or capability of your department. What will you tell your boss?. use the sum theorem to find the measure of angle a in degrees What are the factors that influence whether people vote or not? Explain. What is the difference between the population and sample regression functions? Write out both functions, and explain how they differ. (b) What is the role of error term u i in regression analysis? What is the difference between the error term u i and the residual, u ^ i ? (c) Why do we need regression analysis? Why not simply use the mean value of the regressand as its best value? (d) What does it mean for an estimator to be unbiased? (e) What is the difference between 1 and ^ 1 ? (f) What do we mean by a linear regression model? (g) Determine whether the following models are linear in parameters, linear in variables or both. Which of these models are linear regression models? (i) Y i = 1 + 2 ( x i 1 )+u i (ii) Y i = 1 + 2 ln(X i )+u i (iii) ln(Y i )= 1 + 2 X i +u i (iv) ln(Y i )=ln( 1 )+ 2 ln(X i )+u i (v) ln(Y i )= 1 1 ( i 1 )+u i D'class - Grammar Revision Modals - Conditionals Wishes Unreal Past1.Im sorry he doesnt live in my area.(he)I wish in my area (30 POINTS) HORTICULTURE HELP!!!!!!Which of the following is the term used to describe the chill-point at which a plant may survive, but will grow little if at all?zero degreesbase temperaturefrost pointTmin