What kind of company would hire an Information Support and Service employee?


software development

computer repair

website development

network administration

Answers

Answer 1

Answer:

B). Computer Repair.

Explanation:

Information support and service primarily involve occupations related to the implementation of information technology, including the deployment of computer software and systems, offering technical assistance, and managing information systems and databases. Therefore, information support and service employees are able to evaluate various computer systems and set up or repair the systems or devices related to it. Hence they provide assistance to customers in resolving computer-related problems. Thus, a computer repair company would hire information support and service employees.

Answer 2

Answer:

b

Explanation:


Related Questions

Pls help me to answer this question ASAP

Pls help me to answer this question ASAP

Answers

It’s about yourself. Answer the questions on how you’ve been experiencing them in your life

If you need to download something for a class, first

Answers

Answer:

left click, then click save image

Explanation:

Answer:

first try to do it on kami, then on Google docs, then on doc-hub

lan is working on a project report that will go through multiple rounds of
revisions. He decides to establish a file labeling system to help keep track of
the different versions. He labels the original document
ProjectReport_v1.docx. How should he label the next version of the
document?
A. ProjectReport_revised.docx
B. ProjectReport_v1_v2.docx
C. Report_v2.docx
D. ProjectReport_v2.docx

Answers

Answer:It’s D

Explanation:

APEVX

The label of the next version of the document can probably be ProjectReport_v2.docx. The correct option is D.

What is a document?

A document's purpose is to enable the transmission of information from its author to its readers.

It is the author's responsibility to design the document so that the information contained within it can be interpreted correctly and efficiently. To accomplish this, the author can employ a variety of stylistic tools.

Documentation can be of two main types namely, products and processes. Product documentation describes the product under development and provides instructions on how to use it.

A document file name is the name given to a document's electronic file copy.

The file name of the document does not have to be the same as the name of the document itself. In fact, you can use the shortest possible version of the name.

As the document here is second version of the previous one, so its name should be ProjectReport_v2.docx.

Thus, the correct option is D.

For more details regarding document, visit:

https://brainly.com/question/27396650

#SPJ2

C++ 11 introduced an alternative way to define variables, using the template key word and an initialization value. True or false

Answers

False. C++11 did introduce a new way to initialize variables using braces ({}) called "uniform initialization" or "list initialization", but it did not involve the use of templates.

How are variables defined?

Instead, the syntax for using uniform initialization to initialize a variable with a value in C++11 is as follows:

int x{42}; // variable x is initialized with the value 42

This syntax is also valid for initializing variables of other types, such as arrays or objects. Additionally, C++11 introduced a feature called "initializer lists" that allows objects to be constructed with a list of values, which can also be used with the uniform initialization syntax.

The use of templates, on the other hand, is a separate language feature in C++ that allows for generic programming by defining functions and classes that can operate on different types.

Templates are typically defined using the "template" keyword followed by one or more type parameter declarations. They are not related to the initialization of variables in C++.


Read more about variables here:

https://brainly.com/question/25223322

#SPJ1

T/F,Database shadowing duplicates data in real-time data storage, but does not back up the databases at the remote site.

Answers

False. Database shadowing does duplicate data in real-time data storage, and it does back up the databases at the remote site. Database shadowing is a process that involves creating an exact copy of a database at a remote site.

What is Database ?

A database is a collection of organized data that is stored in an electronic format. It is used to store, organize, and retrieve information quickly and easily. It is also used to store data in a structured format so that it can be accessed, managed, and updated in an efficient manner.

A database can be used for a variety of applications, including inventory control, customer information, financial data, and more. It is a powerful tool for managing data and is essential for businesses, organizations, and individuals who need to store and manage large amounts of information.

To learn more about Database

https://brainly.com/question/24027204

#SPJ1

For which of these can a Task Manager be used?

prevent an application from becoming hanged

detect a hanged application

restart a hanged application

detect and end a hanged application

Answers

Answerthe answer is b :

Explanation:

Trust my

Answer:

Detect and end a hanged application

which of the following is a general term for the component that holds system information related to computer startup?

Answers

Answer: BootLoader

Explanation: A bootloader is a general term for the component that holds system information related to computer startup.

The bootloader is responsible for loading the operating system into memory and initiating the boot process when the computer is turned on. It is usually stored in a dedicated area of the computer's non-volatile memory, such as ROM or NVRAM, and is accessed by the computer's central processing unit (CPU) as the first step in the boot process.

The bootloader contains information about the location and configuration of the operating system, as well as any additional boot options or settings that may be required. It is an essential component of the computer's system software, and is responsible for ensuring that the operating system is loaded and initialized correctly.

How can I round to 3 decimal places in python?

Attached is my code. Say I enter 25 for the feet per second prompt.

This is the output.

0.45719999999999994 kilometers per min

I want that number rounded to 3 decimal places.

def ftsecTokmin(x):
return x*0.018288

n = float(input("Enter the speed in feet per second: "))
print(ftsecTokmin(n), "kilometer per min")

Answers

To round to 3 decimal places in python, you need to write the code as follows:

n = float(input("Enter the value of n in ft/s: "))

def fsec_to_kmminn(n):

   return (0.018288 * n)

print("speed_in_kmmin = ", round(fsec_to_kmminn(n),3))

Output: 0.457

Explain the python programming language.

High-level, all-purpose programming languages like Python are available. With the usage of extensive indentation, its design philosophy places an emphasis on code readability. Garbage collection and dynamic typing are features of Python.

Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

It supports a variety of programming paradigms, including structured, functional, and object-oriented programming. Building websites and applications, automating processes and performing data analysis all frequently use Python.

Solution Explanation:
You can use the global round function to round up numbers to a decimal place. In a simple example, it can be used as

num = 20.4454

rounded3 = round(num, 3)

# to 3 decimal places

print(rounded3)

# 20.445

Here in the program mentioned in the question, to get three decimal places we have to add the function round in this way, print("speed_in_kmmin = ", round(fsec_to_kmminn(n),3)) to get the desired result.

To learn more about Python, use the link given
https://brainly.com/question/26497128
#SPJ1

where did the command line first get its beginning?​

Answers

Answer:

About twenty years ago Jobs and Wozniak, the founders of Apple, came up with the very strange idea of selling information processing machines for use in the home. The business took off, and its founders made a lot of money and received the credit they deserved for being daring visionaries. But around the same time, Bill Gates and Paul Allen came up with an idea even stranger and more fantastical: selling computer operating systems. This was much weirder than the idea of Jobs and Wozniak. A computer at least had some sort of physical reality to it. It came in a box, you could open it up and plug it in and watch lights blink. An operating system had no tangible incarnation at all. It arrived on a disk, of course, but the disk was, in effect, nothing more than the box that the OS came in. The product itself was a very long string of ones and zeroes that, when properly installed and coddled, gave you the ability to manipulate other very long strings of ones and zeroes. Even those few who actually understood what a computer operating system was were apt to think of it as a fantastically arcane engineering prodigy, like a breeder reactor or a U-2 spy plane, and not something that could ever be (in the parlance of high-tech) "productized."

The program which handles the interface is called a command-line interpreter or command-line processor. Operating systems implement a command-line interface in a shell for interactive access to operating system functions or services. Such access was primarily provided to users by computer terminals starting in the mid-1960s, and continued to be used throughout the 1970s and 1980s on VAX/VMS, Unix systems and personal computer systems including DOS, CP/M and Apple DOS.

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?

Answers

Answer:

third ighjojdudjz

ghddduewjj

wkckdjjj

Explanation:

cchmddkhwmx

ndhdnahdd

jruditndjed

Balance is the design principle that is represented when using the Crop tool?

Balance is the design principle that is represented when using the Crop tool?

Answers

Answer:

The answer is "False".

Explanation:

The rule of thirds implies to the subject, which is not centered mostly on the picture because of new photography formats their shots. Its main object is a little off with one side by using a third-party principle, which draws your attention for the audience into another design, instead of only looking at the center. In another word, we can say that this rule is used as the definition to design the Crop tool to represent as an overlay.

Need an answer in Python

Write a program for. checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Answers

Using the knowledge in computational language in python it is possible to write a code that checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Writting the code:

def conjunction(p, q):

    return p and q

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = conjunction(p, q)

        print(p, q, a)

def exclusive_disjunction(p, q):

    return (p and not q) or (not p and q)

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = exclusive_disjunction(p, q)

        print(p, q, a)

See more about python at brainly.com/question/18502436

#SPJ1

Need an answer in PythonWrite a program for. checking the truth of the statement (X Y Z) = X Y Z for

LAB: Praising dates
Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not following that format is incorrect and should be ignored. Use the substring() method to parse the string and extract the date. The input ends with -1 on a line alone. Output each correct date as: 3/1/1990.
Ex: If the input is:
March 1, 1990
April 2 1995
7/15/20
December 13, 2003
-1
then the output is:
3/1/1990
12/13/2003
LAB ACTIVITYLAB 11.6.1: Parsing dates
DateParser.java
1 import java.util.Scanner;
2
3 public class DateParser {
4 public static int get MonthAs Int(String monthString) {
5 int monthInt;
6
7 // Java switch/case statement
8 switch (monthString) {
9 case "January" :
10 monthInt = 1;
11 break:
12 case "February":
13 monthInt = 2;
14 break;
15 case "March":
17 monthInt = 3; break:
18 case "April":
19 monthInt = 4;
20 break;
21 case "May":
22 monthInt = 5;
23 break;
24 case "June":
25 monthInt = 6;
26 break;
27 case "July":
28 monthInt = 7;
29 break;
30 case "August":
31 monthInt - 8:
32 break
33 case "September":
34 monthInt = 9;
35 break;
36 case "October":
37 monthInt = 10;
38 break;
39 case "November":
40 monthInt = 11;
41 break;
42 case "December":
43 monthInt = 12;
44 break;
45 default:
46 monthInt = 0;
47 }
48
49 return monthInt;
50 }
51
52 public static void main(String[] args) {
53 Scanner scnr = new Scanner(System.in);
54
55 // TODO: Read dates from input, parse the dates to find the one
56 // in the correct format, and output in m/d/yyyy format
57
58 }
59 }
60

Answers

Answer:

Explanation:

The following is the entire modified code, it takes in the date as an input and continues changing the dates to the desired format. If the input format is wrong it says "Wrong Format" and requests another input. If -1 is passed as an input the program terminates.

        import java.util.Scanner;

        class DateParser {

public static int getMonthAsInt(String monthString) {

        int monthInt;

        switch (monthString) {

            case "January" :

                monthInt = 1;

                break;

            case "February":

                monthInt = 2;

                break;

            case "March":

                monthInt = 3;

                break;

            case "April":

                monthInt = 4;

                break;

            case "May":

                monthInt = 5;

                break;

            case "June":

                monthInt = 6;

                break;

            case "July":

                monthInt = 7;

                break;

            case "August":

                monthInt = 8;

                break;

            case "September":

                monthInt = 9;

                break;

            case "October":

                monthInt = 10;

                break;

            case "November":

                monthInt = 11;

                break;

            case "December":

                monthInt = 12;

                break;

            default:

                monthInt = 0;

                }

        return monthInt;

       }

        public static void main(String[] args) {

        Scanner scnr = new Scanner(System.in);

               // TODO: Read dates from input, parse the dates to find the one

        // in the correct format, and output in m/d/yyyy format  

 

                String date = "";

                while (!date.equals("-1")) {

                    String month = "";

                    String day = "";

                    String year = "";

                    System.out.println("Enter date:");

                    date = scnr.nextLine();

                    try {

                        year = date.substring((date.length()-4), date.length());

                        if (Character.isDigit(date.charAt(date.length()-8))) {

                            day = date.substring((date.length()-8), date.length()-6);

                            month = date.substring(0, date.length()-9);

                        } else {

                            day = date.substring((date.length()-7), date.length()-6);

                            month = date.substring(0, date.length()-8);

                        }

                        if ((year.length() == 4) && (day.length() > 0) && (day.length() <= 2) && (month.length() >= 3)) {

                            System.out.println(getMonthAsInt(month) + "/" + day + "/" + year);

                        } else {

                            System.out.println("Wrong Format");

                        }

                    } catch (Exception e) {

                        System.out.println("Wrong Format");

                    }

                }    

        }

}

LAB: Praising datesComplete main() to read dates from input, one date per line. Each date's format must

Declare an arrray of integers and use the pointer variable and pointer arithmetic to delete a particular element of an array

Answers

An array is a type of data structure that contains a collection of items (values or variables), each of which may be located using an array index or key. Array types may overlap (or be distinguished from) other data types that express collections of values, such as lists and strings, depending on the language.

What is array?

A collection of elements, each of which is identified by at least one array index or key, make up an array, a type of data structure. An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple.

#include<stdio.h>

#include<stdlib.h>

void delete(int n,int *a,int pos);

int main(){

  int *a,n,i,pos;

  printf("enter the size of array:");

  scanf("%d",&n);

  a=(int*)malloc(sizeof(int)*n);

  printf("enter the elements:

");

  for(i=0;i<n;i++){

     scanf("%d",(a+i));

  }

  printf("enter the position of element to be deleted:");

  scanf("%d",&pos);

  delete(n,a,pos);

  return 0;

}

void delete(int n,int *a,int pos){

  int i,j;

  if(pos<=n){

     for(i=pos-1;i<n;i++){

        j=i+1;

        *(a+i)=*(a+j);

     }

     printf("after deletion the array elements is:

");

     for(i=0;i<n-1;i++){

        printf("%d

",(*(a+i)));

     }

  }

  else{

     printf("Invalid Input");

  }

}

Output

enter the size of array:5

enter the elements:

12

34

56

67

78

enter the position of element to be deleted:4

After deletion the array elements are:

12

34

56

78

A data structure called an array consists of a set of elements (values or variables), each of which is identifiable by an array index or key. Depending on the language, additional data types that describe aggregates of values, like lists and strings, may overlap (or be identified with) array types.

To learn more about array refer to:

https://brainly.com/question/26104158

#SPJ1

Which one of these is NOT a physical security feature you should check when inspecting your hotel room? (Antiterrorism Scenario Training, Page 4)
a.Proximity of room to emergency exits
b.Whether or not the door is solid
c.Functioning locks on doors and windows
d.Lockbox or safe

Answers

The physical security feature you should check when inspecting a hotel room is except d. lockbox or safe.

What is a physical security feature?

Physical security features are part of security features to prevent something that could threaten someone's life. So that someone's life can be saved.

In each option, all of them are security features, but only the lockbox or safe is not a security feature to protect someone's life. So, option a, option b, and option c are physical security features that can protect someone's life, and option d is not a physical security feature we should check when inspecting a hotel room.

Learn more about security features here:

brainly.com/question/7449721

#SPJ4

Write a method that takes a single integer parameter that represents the hour of the day (in 24 hour time) and prints the time of day as a string. The hours and corresponding times of the day are as follows:

0 = “midnight”
12 = “noon”
18 = “dusk”
0-12 (exclusive) = “morning”
12-18 (exclusive) = “afternoon”
18-24 (exclusive) = “evening”

You may assume that the actual parameter value passed to the method is always between 0 and 24, including 0 but excluding 24.
This method must be called timeOfDay()and it must have an integer parameter.

Calling timeOfDay(8) should print “morning” to the screen, and calling timeOfDay(12) should print “noon” to the screen.

You can call your method in the program's main method so you can test whether it works, but you must remove or comment out the main method before checking your code for a score.

Answers

Answer:

def timeOfDay(hour):

  if hour == 0:

      print("midnight")

  elif hour == 12:

      print("noon")

  elif hour == 18:

      print("dusk")

  elif hour > 0 and hour < 12:

      print("morning")

  elif hour > 12 and hour < 18:

      print("afternoon")

  elif hour > 18 and hour < 24:

      print("evening")

You can test the function as follows:

timeOfDay(8) # prints "morning"

timeOfDay(12) # prints "noon"

timeOfDay(18) # prints "dusk"

timeOfDay(5) # prints "morning"

timeOfDay(15) # prints "afternoon"

timeOfDay(22) # prints "evening"

Note that the elif conditions can be shortened by using the logical operator and to check the range of the hours.

Explanation:

#Function definition

def timeOfDay(time):

   #Mod 24.

   simplified_time = time % 24

   #Check first if it's 0,12 or 18.

   return "Midnight" if (simplified_time==0) else "Noon" if (simplified_time%24==12) else "Dusk" if (simplified_time==18) else "Morning" if (simplified_time>0 and simplified_time<12) else "Afternoon" if (simplified_time>12 and simplified_time<18) else "Evening" if (simplified_time>18 and simplified_time<24) else "Wrong input."

#Main Function.

if __name__ == "__main__":

   #Test code.

   print(timeOfDay(7)) #Morning

   print(timeOfDay(98)) #Morning

Write a method that takes a single integer parameter that represents the hour of the day (in 24 hour

Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location

Answers

Answer:

The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.

While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.

Explanation:

which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?a. multi-homedb. kernel proxyc. bastion sacrificial hostd. circuit proxy

Answers

Host used as a bastion or sacrifice Unfirewalled hosts, sometimes known as bastions or sacrifice hosts, are unprotected. Any object protected from assault is referred to as a bastion host. A device deliberately left open to assault, like a honeypot, could serve as a sacrifice host.

Which of the following best defines a network device that is vulnerable to assaults and has been hardened against those attacks?

Unfirewalled hosts are referred to as bastions or sacrifice hosts. Any object protected from assault is referred to as a bastion host.

Which of the three access control kinds are they?

Role-based access control (RBAC), mandatory access control, and discretionary access control are the three basic categories of access control systems (MAC).

To know more about network device visit :-

https://brainly.com/question/28618641

#SPJ4

Dan is working on a printing project. Which important points must he consider while printing? document size texture printing stock color mode He must print in CMYK because that color mode retains all the colors. arrowRight He must keep the font size at 12 points to maintain proper readability. arrowRight He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. arrowRight He must avoid printing on colored stock to avoid distortion of the ink color.

Answers

Answer:

Down below

Explanation:

Color Mode  - He must print in CMYK because  that color mode retains all the colors.

Document Size  - He must keep the font size at  12 points to maintain proper readability.

Texture  - He must use paper that’s glossy  on one side and uncoated on

the other to produce fine-quality prints.

Printing Stock  - He must avoid printing on colored  stock to avoid distortion of the ink color.

 

Colour Mode—He must print in CMYK because  that colour mode retains all the colours. Document Size—He must keep the font size at  12 points to maintain proper readability. Texture—He must use paper that’s glossy  on one side and uncoated on the other to produce fine-quality prints. Printing Stock—He must avoid printing on coloured stock to avoid distortion of the ink colour.

What is Texture?

Felt-textured papers are frequently described as soft and having a woven or textile-like appearance.

In menus, stationery, and when searching for an artistic flourish to go with a design or image, the paper's surface can be employed to great effect when printing images.

Thus, the statement are matched above.

For more details about textured, click here:

https://brainly.com/question/14989874

#SPJ5

If anyone doesn't mind, please help me. Thank you!

If anyone doesn't mind, please help me. Thank you!

Answers

Master will print infinitely since we are never changing the value of x.

what are the two types of boots that happens when you start your computer?

Answers

Answer:

Restarting a computer or its operating system software. It is of two types (1) Cold booting: when the computer is started after having been switched off. (2) Warm booting: when the operating system alone is restarted (without being switched off) after a system crash or 'freeze.

Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor

Answers

Answer: printer

Explanation:

How does defragmentation improve performance?

Answers

Answer:

Regularly running the Disk Defragmenter utility improves system performance. 

Is there a feature that you think should be placed in another location to make it easier for a user to find?

Answers

In general, the placement of features in an interface depends on the specific context and user needs.

What is the best way to find out the features that should be implemented?

Conducting user research and usability testing can help identify which features are most important to users and where they expect to find them.

In some cases, it may be necessary to adjust the placement of features based on feedback from users or analytics data.

Generally, designers should prioritize creating an interface that is intuitive and easy to use, which often involves careful consideration of the placement and organization of features.

Read more about user research here:

https://brainly.com/question/28590165

#SPJ1

Complete the sentence.
A(n) ___ interface is one that supports as many people as possible by considering disabilities, screen sizes, languages, and many other factors.

1. web-safe
2. accessible
3. inclusive ​

Answers

The answer is number 2 accessible

How have advancements in technology and social media impacted communication and relationships in our society?

Answers

Answer:The advancement of technology has changed how people communicate, giving us brand-new options such as text messaging, email,  and chat rooms,

Explanation:

Answer: the answer will be they allow faster and more efficient communication and can help build relationships.

Explanation:

britain had the highest per capita income in 1820 and 1870, but it was not the most advanced country in primary schooling.

Answers

Britain had the highest per capita income in 1820 and 1870, but it was not the most advanced country in primary schooling. (True)

What is per capita income?

The amount of money earned by each individual within a country or geographical area is expressed as per capita income. In order to calculate the average income per person in a region and to assess the population's standard of living and quality of life, per capita income is used. The per capita income of a country is calculated by dividing the national income by the population of the country.

Every person, including newborns, is included in the population when calculating per capita income. This contrasts with other popular measures of a region's prosperity, such as household income, which counts all individuals living in a single home as a household, and family income, which counts individuals who are related through birth, marriage, or adoption as a family.

Learn more about per capita income

https://brainly.com/question/2041857

#SPJ4

As you know computer system stores all types of data as stream of binary digits (0 and 1). This also
includes the numbers having fractional values, where placement of radix point is also incorporated along
with the binary representation of the value. There are different approaches available in the literature to
store the numbers having fractional part. One such method, called Floating-point notation is discussed in
your week 03 lessons. The floating point representation need to incorporate three things:
 Sign
 Mantissa
 Exponent
In the video lessons, 8-bit storage is used to demonstrate the working of floating point notation with the
help of examples where 8-bit storage is divided as:
 1 bit for Sign.
 3 bits for Exponent.
 4 bits for Mantissa (the mantissa field needs to be in normalized form as discussed in the video
lesson).
For the discussed 8-bit floating point storage:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.
B. Determine the smallest (lowest) negative value which can be incorporated/represented using the
8-bit floating point notation.
C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-
bit floating point notation.
Note: You need to follow the conventions (method) given in the video lessons for the solution of this
question. Any other solution, not following the given convention, will be considered incorrect.

Answers

One of the four different number systems is the binary number system, which is used to define numbers.

Thus, A binary number system only uses the digits 0 (zero) and 1 (one) to represent a number. The prefix "bi" denotes "two" in the term "binary". As a result, this brings the discussion back to the use of simply the digits 0 and 1 to represent numbers.

Binary numbers are represented using the base-2 numeral system. An example of a binary number is (1101)2 where 2 is the radix. A "bit" is referred to as each digit in the binary numeral system.

In many computers, this numbering scheme is employed. A computer decodes every input that is provided to it.

Thus, One of the four different number systems is the binary number system, which is used to define numbers.

Learn more about Binary system, refer to the link:

https://brainly.com/question/28222242

#SPJ1

Match the cell reference to its definition,
absolute reference
The cell has combination of two other types
of cell references.
relative reference
The cell remains constant when copied or
moved.
mixed reference
The cell changes based on the position of
rows and columns

Match the cell reference to its definition,absolute referenceThe cell has combination of two other typesof

Answers

Answer:

Absolute reference- the cell remains constant when copied or moved

Relative reference- the cell changes based on the position of rows and columns

Mixed references- the cell has combination of two other types of cell references

Explanation:

In which of the following cloud models is the customer responsible for managing the fewest of the computing resources?
Question 2 options:
O On-Premise Software
O Platform-as-a-Service
O Infrastructure-as-a-Service
O Software-as-a-Service

Answers

D: Software-as-a-Service is a cloud model whereby the customer is responsible for managing the fewest of the computing resources.

SaaS or Software-as-a-Service is an on-demand cloud service that provides access to ready-to-use, cloud-based application software. In SaaS storage, networking, middleware,  servers, and application software all are hosted and managed by the SaaS vendor.  In the SaaS cloud model, the users have the minimum level of control over the resources provided by the cloud vendor; they are only responsible to use the data they create.

You can learn more about SaaS at

https://brainly.com/question/14596532

#SPJ4

Other Questions
2. Determine the circumference of a circle with a radius of 4 in. C= Does smiling make you happy or does being happy make you smile which hypothesis is involved in this line of reasoning? What part of the plot does this excerpt reveal the founders of a new colony? Which situation best illustrates how production decisions are made in acommand economy?O A. A village elder teaches young farmers which crops to grow indifferent seasons.O B. A government panel orders factories to make more fuel-efficientcars.C. A grocery store stops buying meat from farms that abuse animals.D. A company designs a new laptop computer with featuresconsumers want. An airplane can reach a speed of 650 miles per hour. What is the unit rate per minute? On what interval is f(x)=x^2 10x+21 decreasing? Enter INF for infinity or -INF for negative infinity. ANSWER IN INTERVAL NOTATION. It is decreasing on the interval Find all relative maxima and minima of the following function. f(x)=4x^3 3x^2 18x+17 f(x) has a relative maximum at the point and a relative minimum at the point ( In other words, f(x) has a relative maximum of when x= and f(x) has a relative minimum of when x= A block of mass m=2.50kg is pushed a distance d=2.20m along a frictionless, horizontal table by a constant applied force of magnitude F=16.0N directed at an angle =25.0 below the horizontal as shown in above figure. Determine the work done on the block by (a) the applied force, (b) the normal force exerted by the table, (c) the gravitational force, and (d) the net force on the block. A right rectangular prism has edges of 8 feet, 4 feet, and 1/ foot.How many cubes with side lengths of 1/2 foot would be needed to fill the prism? 100 points!! The map below shows the temperatures in parts of NorthAmerica on an average spring day.65Which statement best summarizes the temperature pattern shown in theweather map?A. Temperatures increase from the southeast to the northwestB. Temperatures decrease from the southwest to the northeast.C. Temperatures increase from the southwest to the northeast.D. Temperatures decrease from the northeast to the northwest. If the green spinner is spun and then the purple spinner is spun, creating a 2-digit number, what is the probability that the resulting that the number will be greater than 14?HELL PLZ what do david greybeard visit to goodall camp suggest about the chimpanzees changing response to her presence? pls helpppppppppppppppppppppppppppppppppppppppppppppppppppppppp determine the constant force prequired to cause the 0.5-kg slider to have a speed at position 2. the slider starts from rest at position 1 and the unstretched length of the spring of modulus is 200 mm. neglect friction. 1. Describe the main pathways of the water cycle, includinghow water enters and leaves the atmosphere. 4 * 10*6 than 1 * 10*4 ____are object-oriented programming languages. a.Javab.C++c.Cd.C#e.Pascal f.Python Question 1To draw a circle with radius 50, use a.turtle.circle(50) b.turtle.circle(100) c.turtle.drawcircle(50) d.turtle.drawCircle(50) U. S. Airline carriers estimate that next year, their industry will see a shortage of 12,000 people in what position?. In an oscillating LC circuit, when 82.4% of the total energy is stored in the inductor's magnetic field, (a) what multiple of the maximum charge is on the capacitor and (b) what multiple of the maximum current is in the inductor how might have du boiss background and experiences influenced his perspective on washingtons philosophy? brainly Read the article again. Answer the questions. 1. What are three causes of workplaceinjuries?2. What types of injuries are caused by heavylifting?3. What are two ways to prevent falls?4. How much sleep does the article recommend to avoidfatigue?B Find the following sentences in the article Then