connie works for a medium-sized manufacturing firm. she keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer. connie is employed as a .

Answers

Answer 1

The operating systems up-to-date, ensures memory and disk storage availability, and oversees the physical environment of the computer aligns with the responsibilities of a system administrator.

A system administrator is responsible for managing the technical aspects of a computer system or network. They ensure that the operating systems are regularly updated to protect against security vulnerabilities and to improve system performance.

In addition, they monitor the memory and disk storage to ensure that there is enough capacity to support the smooth operation of the computer systems.

Furthermore, a system administrator is also responsible for overseeing the physical environment of the computers, which includes factors such as temperature, humidity, and physical security. This ensures that the hardware is properly maintained and protected.

In summary, Connie's role as someone who keeps the operating systems up-to-date, ensures memory and disk storage availability, and oversees the physical environment of the computer aligns with the responsibilities of a system administrator.

To know more about disk visit

https://brainly.com/question/27897748

#SPJ11


Related Questions

a __________ is a separate file from the user ids where hashed passwords are kept.

Answers

A password hash file is a separate file from the user IDs where hashed passwords are kept. This file stores the hashed versions of user passwords, providing an additional layer of security by ensuring that even if the file is accessed, the actual passwords remain encrypted and difficult to decipher.

A "password hash file" or a "password hash database" is a separate file or database where hashed passwords are stored. In this file, instead of storing passwords directly, the passwords are transformed into irreversible hash values using cryptographic algorithms such as bcrypt, PBKDF2, or SHA-256. Storing hashed passwords instead of plaintext passwords enhances security by making it extremely difficult for attackers to retrieve the original passwords from the hashes.

To learn more about passwords  visit: https://brainly.com/question/29836274

#SPJ11

The ________ is the biggest power consumer on a mobile computing device.

Answers

The part of a computing device that is the biggest power consumer is;

Central Processing Unit

Central Processing Unit

The part of a computing device that cosnumes the most power is called the Central Processing Unit (CPU). This is due to the following reasons;

The CPU consists of motherboard and battery that draws power from the socket.

The Mother board is equipped with logic gates that are used to implement logic in the computer.

The Logic gates are voltage signals that signify the binary information that are fed into the system.

Read more about Central Processing Unit (CPU) at; https://brainly.com/question/4558917

If an artist’s work is shared for free under certain situations but not others; this is usually because it is under _____, with the artist’s knowledge.

A.
copyright law

B.
ownership

C.
sales taxation

D.
fair use rules

Answers

Answer:

Fair  Use Rules

Explanation:

THE GOVERNMENTSJBVHUIEGUI:SDVGD

what is the first thing you should check if you discover that domain names are not resolving into ip addresses on a pc or workstation?

Answers

The first thing you should check if you discover that domain names are not resolving into IP addresses on a PC or workstation is the DNS server settings. DNS (Domain Name System) servers are responsible for resolving domain names into IP addresses, so if there is an issue with these settings, it can result in domain names not resolving into IP addresses.

To check the DNS server settings on a Windows PC, follow these steps:

Click the Windows Start button and select "Control Panel".Click "Network and Internet" and then "Network and Sharing Center".Click "Change adapter settings" on the left side of the window.Right-click on the network adapter you are using and select "Properties".Scroll down to "Internet Protocol Version 4 (TCP/IPv4)" and select it.Click the "Properties" button.Make sure that "Obtain DNS server address automatically" is selected. If it is not, select it and click "OK".

If this does not resolve the issue, you may need to contact your network administrator or internet service provider for further assistance.

Learn more about DNS server: https://brainly.com/question/18274277

#SPJ11

how to make an au and what are the rules

Answers

Answer:

alternate universe?

Explanation:

Write a program to solve the problem using multiple processes where the first process spawns a fixed number of processes, say X, and the children spawn their own X multiple processes each, and so on and so forth. The maximum number of processes spawned should be NP. Your tree structure may be pre-defined and hence avoid using loops or recursion or counters to create a new tree. You also have the option to ask the user to provide X. At the end, you must produce at least 2 varying tree structures using X and compare with each other to address all questions.

Answers

The program described can be implemented using multiple processes and a pre-defined tree structure. By comparing different tree structures with varying values of X, we can address all questions related to performance and efficiency.

The problem described involves creating a program that uses multiple processes to spawn a tree structure with a maximum number of processes defined by NP. The first process spawns a fixed number of processes, X, and each of these children spawns their own X processes, and so on.

To implement this program, we can use the fork() system call to create new processes. The first process will call fork() X times to create X children processes. Each of these children processes will then call fork() X times again to create X more processes. This process will continue until we reach the maximum number of processes defined by NP.

To avoid using loops or recursion or counters to create a new tree, we can define the tree structure beforehand. We can represent the tree as a data structure, such as an array or a linked list, and use that structure to create the processes.

We can give the user the option to provide the value of X by accepting input from the command line or through a user interface.

To compare different tree structures, we can create two or more tree structures with different values of X and compare their performance. We can measure the time taken to create the tree structure, the total number of processes spawned, and the memory usage. We can also compare the efficiency of different tree structures in performing a particular task, such as searching for a specific value or sorting the nodes.

Learn more about command line

brainly.com/question/30236737

#SPJ11

you have a remote user who can connect to the internet but not to the office via their vpn client. after determining the problem, which should be your next step?

Answers

Checking the firewall to see which IP addresses are dropped and which are accepted.

Mystring is declared as a string and is the only variable declared. which is a valid assignment?

Answers

Since myString is declared as a string and is the only variable declared. the  valid assignment is myString = "H";

What is myString?

The term  MyString(int currentSize) is known to be a kind of a constructor that is known to be used for an empty string of the currentSize elements.

What is an Object?

The "objects" is know to be a tool that is used to make a C++ program and they are known to be called classes.

Note that  a class is said to be organized such as or the same as a data structure in C and A class is one that is made up any number of variables just similar to  a data structure, but it also has  all of the functions that work on that data.

Therefore, Since myString is declared as a string and is the only variable declared. the  valid assignment is myString = "H";

Learn more about myString from

https://brainly.com/question/27812580

#SPJ1

myString is declared as a string and is the only variable declared. Which is a valid assignment?

myString = 'Hello';

myString = Hey;

myString = "H";

myString = [Hoy];

All of the following are ways to limit what is tracked about you online, except:

A. Turn off cookies.
B. Turn off your screen when you're done using the internet.
C. Limit what you share.
D. Adjust privacy settings.

Answers

Answer:b

Explanation: turning off your screen does nothing on the cyber side and people and companies can still access your internet history even while your screen is off

5.1.5 access for employee class

Answers

This code declares a class called "Employee" and defines two string variables called "first name" and "last name," as well as a double variable called "monthly salary."

What does a class's instance variable mean?

A variable that is declared in a class but not within constructors, methods, or blocks is referred to as an instance variable. The instance variable can thus be given access modifiers. After the double variable called "monthly salary" in this code, the next step is to design a parameterized constructor that puts the value into the variable and checks the value of "monthly salary" using an if block. Additionally, it holds and returns its value via the getter and setter methods.

The code to the given question is stated below:

public class Employee //defining a class Employee

{

String first_name,last_name;

Double monthly_salary;

Employee(String first_name,String last_name,Double monthly_salary)

{

  this first_name=f_name// initialize value in first_name

  this last_name = l_name; // initialize value in the last_name

   this monthly_salary = m_salary; // initialize value in the monthly_salary

if (monthly_salary < 0.0)//use if to check monthly_salary is positive

          monthly_salary = 0.0;//set value 0

}

void setfirst_name (String f_name)//defining set method to store first_name

{

first_name = f_name; //holding the value of first_name

}  

public String getfirst_name ()//defining get method to return first_name

{

return first_name;//return first_name

}  

public void setlast_name (String l_name)//defining set method to store last_name

{

last_name = l_name; // holding the value of the last_name

}

public String getlast_name ()//defining get method to return last_name

{

return last_name;//return last_name

}  

public void setmonthly_salary(double m_salary)//defining set method to store monthly_salary

{

monthly_salary = m_salary; // holding the value of the monthly_salary

}

public double getmonthly_salary ()//defining get method to return monthly_salary

{

return monthly_salary;//return monthly_salary  

}

}

To learn more about instance variable, visit:

https://brainly.com/question/15182397

#SPJ1

The complete question is:

In this exercise, you are going to create the instance variables for an Employee class. The class needs to store the employee's name, their 4 digit id number, and hourly salary. You will need to give the instance variable an appropriate name, type, and privacy settings.

After defining the instance variables, create the structure for the constructor, similar to the previous exercise. Make sure you set the privacy settings on the constructor correctly.

Status: Not Submitted 5.1.5: Access for Employee Class Save Submit + Continue RUN CODE TEST CASES ASSIGNMENT DOCS GRADE | MORE public class Employee

Assignment 4: Divisible by Three
ProjectSTEM
hello! I have no clue at all how to do this and need help.

Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.
Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.

Answers

For iterating through a series, use a for loop. This functions more like an iterator method seen in other object-oriented programming languages and is less like the for keyword found in other programming languages.

How to write program in loop ?

A high-level, all-purpose programming language is Python. Code readability is prioritised in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports a variety of programming paradigms, such as functional, object-oriented, and structured programming.

A while loop in Python is used to repeatedly run a block of statements up until a specified condition is met. And the line in the programme that follows the loop is run when the condition changes to false.

We can write the code in a simple way like this below :

n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

 num = int(input("Enter number: "))

 if num % 3== 0:

     divisible += 1

     print(str(num)+" is divisible  by 3")

 else:

     notdivisible += 1

     print(str(num)+" is not divisible by 3")

print("You entered "+str(divisible )+" even number(s).")

print("You entered "+str(notdivisible )+" odd number(s).")

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ1

Answer:n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

    divisible += 1

    print(str(num)+" is divisible  by 3.")

else:

    notdivisible += 1

    print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")

Explanation:

For that one that's I'm on python <3

your friend is a software developer. they have windows 10 pro installed on their soho computer. they are creating an application that needs to run smoothly on both windows and linux machines, so it will need to be tested in both of those environments. what would be the best solution for your friend?

Answers

Windows Sandbox offers a simple desktop setting for isolating apps safely. The software that is installed inside the Windows Sandbox environment remains "sandboxed" and operates independently from the host computer.

What is meant by  Windows Sandbox ?

Windows Sandbox provides a lightweight desktop environment to safely run applications in isolation. Software installed inside the Windows Sandbox environment remains "sandboxed" and runs separately from the host machine. A sandbox is temporary. When it's closed, all the software and files and the state are deleted.

In the world of cybersecurity, a sandbox environment is an isolated virtual machine in which potentially unsafe software code can execute without affecting network resources or local applications. Cybersecurity researchers use sandboxes to run suspicious code from unknown attachments and URLs and observe its behavior.

Sandboxing works by keeping potentially malicious program or unsafe code isolated from the rest of the organization's environment. This way, it can be analyzed safely, without compromising your operating system or host devices. If a threat is detected, it can be removed proactively.

To learn more about Windows Sandbox refers to:

https://brainly.com/question/29888094

#SPJ4

The process by which the raw data are transformed into new variables that have a mean of 0 and variance of 1 is called?

Answers

The process by which the raw data are transformed into new variables that have a mean of 0 and variance of 1 is called standardization.

Standardization is a statistical method for transforming a variable in a dataset into a standard scale.

It transforms the values of a variable such that the new transformed values have a mean of zero and a standard deviation of 1. Standardization can be applied to a single variable or an entire dataset and is useful when comparing variables that have different units or scales.

Learn more about database at:

https://brainly.com/question/31798452

#SPJ11

1. You are designing a program that will keep track of the boxes in a doctor’s office. Each box will have three attributes: date, contents, and location. Write a class that will consist of box objects.

Answers

Answer:

Public class Box

{

private String myDate;

private String myContents;

private String myLocation;

public class Box(String date, String contents, String location)

{

myDate = date;

myContents = contents;

myLocation = location;

}

}

Hope this is what you're looking for! If not, let me know and I can try to help more. :)

Each box will have three attributes: date, contents, and location. It is class box.

What is class box?

There is a method in the box class of this program. Box is a brand-new data type for the class.

Box is used to declare objects of this type as having double height; Class declaration just generates a template; it does not generate any actual objects. None of the objects of type are affected by this code. Box void volume

Therefore, Each box will have three attributes: date, contents, and location. It is class box.

To learn more about class box, refer to the link:

https://brainly.com/question/14427083

#SPJ2

An object is identified by its
characteristics
state
class
attribute​

Answers

Answer:

Characteristics is the correct answer to the given question .

Explanation:

The main objective of object is for accessing the member of class .When we have to access the member of class we can create the object of that class The object  is is identified by there characteristics.The characteristics describe the behavior and state of a class.

With the help of class and object we can implement the real world concept .The object is the run time entity of a class where as the class is physical entity .Without the object we can not implemented the object oriented programming.All the other option are not correct for the object because they are not described the identification of object .

Say you are a stock investor. You are considering to invest in PFIZER. To that end, you download the stocks' historical price data given in "Computer_Exercise 2.xlsx". More precisely, you analyze the daily market-closing stock prices (or bid-ask averages in case of no trade on that day) from July 3,2000 to December 31, 2020. Please answer the following questions. 1. To start, you want to get an idea of the daily return that you could have obtained by buying on one trading day and selling on the next (assuming that there are no dividends). Compute the daily net return. Express the net return in terms of the percentage change in prices. 2. Now you want to know on how many of the total trading days in your sample you would have made a net return greater than or equal to 0.55%. What is the number of days on which your net return would have been above or equal 0.55% ? 3. You decided that you want to invest in PFIZER. Say that the outcome of your "experiment" (i.e. your investment) that you are interested in is whether you will win a net return larger than or equal to 0.55% on the first day or not. That is, you define a Bernoulli random variable, x, that can take on values 1 (net return >=0.55% on first day), and 0 (net return <0.55% on first day). Since you don't know how to otherwise approach the question (you are a first-time investor), you decide that the likelihood of successes in the past should be an indication of the future probability of success. Hence, what is the probability of success (i.e. net return >=0.55% ) based on the 2000-2020 sample? 4. What is the expected value/population mean of your Bernoulli variable X ? 5. What are the (population) variance and standard deviation of X ? Having computed the latter, comment on how good your "guess" for X (i.e. the expected value in 4.) really is. 6. Is the distribution of X symmetric about its mean? Why or why not? 7. Instead, now assume that your investment horizon is 14 trading days, where on each day you either can gain a net return larger than or equal to 0.55%(X 1

=1) or a net return <0.55%(X=0). Assume that the random variables X 6

i=1,2,…,14, are independent. The probability of success is still the same as in question 3 . above, and it is the same for all i. What is the probability that you will make a net return >=0.55% on 9 (out of the in total 14) following trading days? 8. Under the same assumptions as in question 7. above, what is the probability that you will make a net return above or equal 0.55% on more than 10 (out of the in total 14 ) following trading days?

Answers

1. The daily net return for investing in Pfizer is computed by calculating the percentage change in prices from one trading day to the next, assuming no dividends. This provides an idea of the daily return that could have been obtained by buying and selling the stock consecutively.

2. The number of trading days in the sample period where the net return would have been greater than or equal to 0.55% is determined to assess the frequency of favorable returns.

3. Based on the historical data, the probability of success, defined as obtaining a net return larger than or equal to 0.55% on the first day of investment, is determined by considering the likelihood of past successes as an indication of future success.

4. The expected value or population mean of the Bernoulli random variable X, representing the net return being larger than or equal to 0.55% on the first day, is calculated to determine the average outcome of the investment.

5. The population variance and standard deviation of X are computed to measure the variability and dispersion of the outcomes. This analysis provides insight into the reliability of the expected value.

6. The symmetry of the distribution of X about its mean is evaluated to understand whether the net return on the first day is equally likely to be above or below 0.55%. This impacts the overall risk assessment of the investment.

7. Assuming a 14-day investment horizon with independent random variables, the probability of achieving a net return greater than or equal to 0.55% on nine out of the 14 following trading days is calculated to assess the likelihood of sustained favorable returns.

8. Similarly, the probability of obtaining a net return above or equal to 0.55% on more than 10 out of the 14 following trading days is determined to gauge the probability of consistently positive returns within the specified investment period.

1. To calculate the daily net return, we need to compute the percentage change in prices using the historical stock prices data. This provides insights into the potential returns obtained by buying on one day and selling on the next, assuming no dividends.

2. By analyzing the net return values, we can determine the number of trading days where the net return exceeds or equals 0.55%. This helps understand the frequency of favorable returns during the sample period.

3. The probability of success is derived from the historical data, considering the past successes as an indication of the likelihood of future success. By calculating the proportion of days with a net return larger than or equal to 0.55% on the first day, we can estimate the probability.

4. The expected value or population mean of the Bernoulli variable X is calculated by summing the products of the possible outcomes (1 or 0) and their respective probabilities. This provides the average net return expected from the investment.

5. The population variance and standard deviation of X are computed to assess the spread or variability of the net return outcomes. By measuring the dispersion around the expected value, we can evaluate the consistency of the investment performance.

6. The symmetry of the distribution of X is assessed by examining whether the probabilities of net return being above or below 0.55% on the first day are equal. This provides insights into the potential biases or tendencies of the investment outcomes.

7. By assuming independent random variables X for each trading day, we can calculate the probability of obtaining a net return greater than or equal to 0.55% on nine out of the 14 following trading days. This evaluates the likelihood of sustained favorable returns within the specified investment period.

8. Similarly, we determine the probability of achieving a net return above or equal to 0.55% on more than 10 out of the 14 following trading days. This helps gauge the probability of consistently positive returns over the specified investment horizon.

Learn more about net return

brainly.com/question/32621258

#SPJ11

do you think I-beams are a good thing to use for head frame supports? why?​

Answers

The shape of I beams makes them excellent for unidirectional bending parallel to the web. The horizontal flanges resist the bending movement, while the web resists the shear stress. They are also cost effective, since the “I” shape is an economic design that doesn't use excess steel

I need help!!! i will make you a brainliest!!

I need help!!! i will make you a brainliest!!

Answers

Answer:

What you have is correct

Explanation:

6.36. Four kilograms of steam in a piston/cylinder device at 400kPa and 175 ∘
C undergoes a mechanically reversible, isothermal compression to a final pressure such that the steam is just saturated. Determine Q and W for the process.

Answers

To determine Q (heat transfer) and W (work) for the given process, we can use the first law of thermodynamics:

Q = ΔU + W

where ΔU is the change in internal energy of the system.

For an isothermal process, the change in internal energy (ΔU) is zero since the temperature remains constant. Therefore, the equation simplifies to:

Q = W

Now let's calculate the work done:

Work done (W) = P_initial * V_initial * ln(V_final / V_initial)

Given:

P_initial = 400 kPa

V_initial = (mass of steam) / (density of steam at initial conditions)

V_final = (mass of steam) / (density of saturated steam at final pressure)

To calculate the specific volume (V), we can use the steam tables or properties of water and steam at different conditions.

Once we have the specific volumes at initial and final conditions, we can calculate W using the equation mentioned above.

To calculate Q, we can use Q = W since it is an isothermal process.

To know more about temperature visit-

https://brainly.com/question/14532989

#SPJ11

help me asap ill give brainliest

help me asap ill give brainliest

Answers

Answer:

Give me brainliest thanks

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

What are three tasks that space technology can assist humans with when studying Earth remotely?

Answers

Answer:

Finding life on new planets? Finding new galaxies!! Studying other planets like mars!!!

Explanation:

Please brainliest this!!!

Test if a password entered is correct. The secret phrase is “Amedeo Avogadro” (without the quotes).

Sample Run 1
Enter the password: Amedeo Avogadro
Sample Output 1
Correct!
Sample Run 2
Enter the password: Georg Cantor
Sample Output 2
Not Correct

i need the code to find the right answer please

Answers

Answer:

Here's a Python code snippet that will prompt the user to enter a password and then check if it matches the secret phrase "Amedeo Avogadro":

# Prompt user to enter password

password = input("Enter the password: ")

# Check if password is correct

if password == "Amedeo Avogadro":

   print("Correct!")

else:

   print("Not Correct")

Explanation:

You can run this code in a Python environment or save it as a .py file and run it in the command line.

define computer software

Answers

Answer:

It is any program on a computer that you cannot touch or clean by yourself. EX: Windows.

Have A Nice Day!

What are some good netflix shows

Answers

Answer: Here’s a few to try

- Riverdale

- Outer Banks

-Stranger Things

-The Ranch

-The Bodyguard

Answer:

Ok ok here we go-

Haikyuu (its sooooo good u might not have it tho)

Mako-mermaids (lol)

Schitts Creek

And Stranger things

Explanation:

A data analyst uses _____ to decide which data is relevant to their analysis and which data types and variables are appropriate

Answers

Answer:

I believe that the answer is a database organization.

Select the correct images. From her stack of photographs, Alice has to pick images that a photographer shot using the sports mode. Which images would she pick? please help me​

Select the correct images. From her stack of photographs, Alice has to pick images that a photographer

Answers

The images clicked by photographer in sports mode are running horse, the running train, and the running child.

What are sports mode images?

The sports mode images means the pictures clicked by the photographer are those were the objects are in moving position. The sports mode in the photography helps to make the main object as clear and the background as blur.

The image of running horse, the running train, and the running boy are denoted as the images clicked by the photographer in the sports mode. The sports mode by the photographer helped the objects to come in focus, rather being moved along with their motion. The clarity of the objects irrespective of their movement is possible only due to the sports mode enabled by the photographer.

Therefore, the image of horse, child, and train are selected.

Learn more about sports mode images, here:

https://brainly.com/question/14166347

#SPJ2

Answer:

train, horse, child

Explanation:

is a security professional. a user reports that, after opening an email attachment, every document he saves is in a template format and other microsoft word documents will not open. after investigating the issue, alison determines that the user's microsoft office normal.dot template has been damaged, as well as many word files. what type of virus is the most likely cause?

Answers

Since Allison determined that the user's Microsoft Office normal.dot template has been damaged, as well as many Word files, the type of virus which is most likely the cause is a macro virus.

What is a virus?

In Computer technology, a virus can be defined as a type of malicious software program that is designed and developed to move through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.

What are macros?

In Computer technology, macros are composed of commands and instructions which may be grouped together as a single command to automatically execute a task in Microsoft  Word.

Read more on a virus here: brainly.com/question/26128220

#SPJ1

Complete Question:

Allison is a security professional. A user reports that, after opening an email attachment, every document he saves is in a template format and other Microsoft Word documents will not open. After investigating the issue, Allison determines that the user's Microsoft Office normal.dot template has been damaged, as well as many Word files. What type of virus is most likely the cause?

.6.6.1: Function stubs: Statistics.
Define stubs for the functions get_user_num() and compute_avg(). Each stub should print "FIXME: Finish function_name()" followed by a newline, and should return -1. Each stub must also contain the function's parameters.
Sample output with two calls to get_user_num() and one call to compute_avg():
FIXME: Finish get_user_num()
FIXME: Finish get_user_num()
FIXME: Finish compute_avg()
Avg: -1

Answers

In computer programming, stubs are prewritten codes used to stand-in for missing or incomplete code. They allow for minimal testing and debugging of applications.

As such, they are used in unit testing and integration testing. Function stubs are codes that mimic an actual function but only return a particular result.

Here are the stubs for the functions get_user_num() and compute_avg() that will print "FIXME: Finish function_name()" followed by a newline and should return -1:

Function stubs: Statisticsget_user_num()

stub:-1.

compute_avg()stub:-1.

Sample output with two calls to get_user_num() and one call to compute_avg():

FIXME: Finish get_user_num()FIXME: Finish get_user_num()

FIXME: Finish compute_avg()Avg: -1

Learn more about stubs at: https://brainly.com/question/32493444

#SPJ11

Which of the following is a system management tool?

Answers

What’s are the options??

Answer:

its a firewall

Explanation:

Other Questions
Ella dio la pelota a Kelly. Ella se dio la pelota. Ella le dio la pelota. Ella les dio la pelota. Ella la dio la pelota. many air fresheners are in solid form at normal atmospheric pressure and room temperature. however, they undergoes sublimation (changes from solid to gas phase) when heated to release fragrant scents, such as when they are plugged into an electrical outlet. according to the second law of thermodynamics, what must be true about entropy changes in this example? Which statement describes a histogram? A.It shows a line of best fit B.It shows how an independent variable affects a dependent variable. c.It shows a frequency distribution D.It shows data as a proportion of a whole Jennifer is a single mom of two who is working and taking college classes at night. The demands of work and her work projects are stressing Jennifer out, which results in a. job satisfaction. b. workplace role ambiguity. c. work-family conflict. d. downsizing. The statement of financial position for Farley Corporation at the end of the current year indicates the following:Bonds payable, 7%........................................ ........................................ $4,000,0006% Share capital preference, $100 par........................................ ........................ 1,000,000Share capital ordinary, $10 par........................................ ........................ 2,000,000Income before income taxes was $1,120,000 and income taxes expense for the current year amounted to $336,000. Cash dividends paid on ordinary shares were $300,000, and the ordinary shares were selling for $45 per share at the end of the year. There were no ownership changes during the year.InstructionsDetermine each of the following:(a) times interest earned.(b) earnings per share.(c) price-earnings ratio. direct materials used $ 191,200 direct labor incurred (7,700 hours) 245,800 actual manufacturing overhead incurred 276,600 estimated manufacturing overhead 384,000 estimated direct labor hours 8,000 the company uses direct labor hours as the allocation base. how much overhead was applied during the year? multiple choice $384,000 $276,600 $369,600 $245,800 a search engine will only index a web page if the html and css are pass w3c validation testing. which cardiovascular changes would the nurse include in a prenatal class explaining physiological changes in thhe second timester of pregnancy What contribution did Mansa Musa make to the religion of the Mali Empire?A. He used customs and beliefs from the many local religions in the empire to create a new religion.B. He established laws to create religious tolerance throughout the empire, which led to the introduction of Islam.C. He converted to Islam and made it the official religion of the empire.D. He used the empires vast trade routes and its conquests to increase the spread of local religions. Real-world efficiencies are generally very high, in the 90 percent range.Please select the best answer from the choices providedtrue or false Larger size, longer life, and specialization are three advantages tobeing a the major vector of rocky mountain spotted fever in the western u.s. is PLEASE ANSWER FAST!!!!! Consider this hypothesis statement. "If the number of hours a student studies increases, then the students test grade will increase." What is the independent variable in the above statement? Some organisms have favorable traits that are well-suited to the environment at hand. organisms with this advantage are more likely to thrive, reproduce, and pass their traits to future generations than organisms without favorable traits. there will be a noticeable and dramatic increase in the number of individuals with the favorable traits o over many generations o in a few million years o in a short period of time o in a few years Exercise 3 Draw three lines under each lowercase letter that should be capitalized. For each italicized word write in the blank com. (common noun) or prop. (proper noun).The navajo are the largest Native American group in the united states. executive function can be strengthened by performing the same challenging puzzle over and over until it is mastered. true false Quintupling the tension in a guitar string will change its natural frequency by what factor? Multiply and divide in order from left to right. (5)(6)+3 +(20) divided by 4 +1230 +3 +(20) divided by 4 +1230 +3 +(20) divided by 4+1230 +3 +(5) +12 a. Use limits to say what is meant by the function, f, is continuous at a point, a. Fx x Plss helpp with this!! i will mark brainliest!!!