A terminology which describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization is an extranet.
What is an extranet?An extranet can be defined as an external company or organizational network which is designed and developed to be used by individuals who work for a different organization. This ultimately implies that, an extranet is typically used for providing the employees of different organizations with easy access to data or information.
In Computer networking, the end users of an extranet have the ability to access a company's or organization's entire internet resource.
Read more on extranet here: https://brainly.com/question/15420829
#SPJ1
Complete Question:
What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?
extranet
cloud
BYOD
quality of service
PLZZZ HELPPPP
Which list can be sorted with a bubble sort?
(4, 5, 6, 7)
('dog', 'cat', 'fish')
['dog', 'cat', 'fish', 'bird']
[2, 5, 'dog', 'cat']
Answer:
dog cat fish bird
Explanation:
Answer:
dog cat fish bird
Explanation:
i got it right
_______________________ includes programs such as the operating system, video games, and word processors.
Software includes programs such as the operating system, video games, and word processors. It refers to computer programs that perform specific tasks on a computer system. Software comes in different types, including system software, application software, and programming software.
System software is a type of software that is responsible for managing computer resources and providing a platform for application software to run. It includes the operating system, device drivers, utility programs, and programming language interpreters. Operating systems, such as Windows, macOS, and Linux, are examples of system software that enable computer hardware and software to work together. Application software, on the other hand, refers to programs that are designed for specific tasks such as word processing, graphics designing, and video editing.
Examples of application software include Microsoft Office Suite, Adobe Creative Suite, and CorelDRAW. Graphics software, video games, antivirus programs, and web browsers are all application software types. Programming software includes compilers, interpreters, and text editors that are used to develop computer programs.
To know more about Software visit:
https://brainly.com/question/32393976
#SPJ11
I need help, please and thank you.
Flashcards should be
a.
Used several times a day
c.
Moved into a “Know” stack when the information is learned.
b.
Repeated until the information is learned
d.
All of the above
Please select the best answer from the choices provided
A
B
C
D
Answer: D
Explanation: you should use them several times,move them into a know stack,and repeat the info.
Flashcards should be Used several times a day, Moved into a “Know” stack when the information is learned, and Repeated until the information is learned.
Thus, option D is correct.
What is a Flashcard?A flashcard, also known as a flash card, is a deck with information across both sides that are designed to aid in remembering. Across one side of each flashcard is a doubt and on the other is an ultimate solution.
Flash cards are just an iconic type of research method for a legitimate reason: they encourage studying thru the following cases, which is one of the better methods for our minds to discover.
Flashcards ought to be utilized several twice per day, relocated to a "Know" stack once the info has been learned, but rather replicated till it knowledge has been understood. Therefore, option D (All of the above) is correct.
Learn more about Flashcard, here:
https://brainly.com/question/29771614
#SPJ6
Edhesive 4.2 question 2 answers
Answer:
total=0
pet=input("what pet do you have? ")
while pet!= "rock":
total=total+1
print("you have a "+pet+" with a total of "+ str(total)+ " pet(s)")
pet=input("What pet do you have? ")
Explanation: Just copy and paste above again just copy and paste this will get you a 100 percent i made another account just to give yall edhesive answers if yall need help with any edhesive just comment below
what is game development
video game development is the process of developing a video game
Explanation:
the effort undertaken by the developer ranging from single person to an entire team
Answer:
Game Development is about creating games. It describes about the design, and how it was developed and released. It may involve concept generation, design, build, test and release. While you create a game, it is important to think about the game mechanics, rewards, player engagement and level design.
before the advent of computer software to facilitate qualitative analysis, the main procedure for managing qualitative data relied on the creation of:
Prior to the development of computer technologies that facilitated qualitative analysis, feedback production was the primary method for managing qualitative data.
What is qualitative analysis?Action research, case study research, ethnography, and grounded theory are examples of qualitative approaches. Observation as well as participant observation (fieldwork), interviews, questionnaires, texts and documents, as well as the researcher's feelings and reactions, are all examples of sources for qualitative data.A method of inquiry known as qualitative research examines the information that is communicated in natural situations through language and behavior. It is used to record expressive information about views, values, sentiments, and motivations that underpin behaviors that is not expressed in quantitative data.The notion that almost all qualitative research has to be: trustworthy, analyzable, transparent, and valuable is fundamental to the quality framework. The quality framework's capacity to direct researchers in structuring their qualitative research investigations depends on these four elements, or criteria.To learn more about qualitative analysis refer to :
https://brainly.com/question/1779681
#SPJ4
please help me with Educational Technology pt.3
Answer:
D
Explanation:
you need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. which port would you block to achieve this?
Port 80 would allow me to accomplish this if you needed to ban all unsecured web traffic using its default port from a certain network segment of the company network.
Hypertext Transfer Technology, a widely used internet communication protocol, is assigned port number 80. (HTTP). Uncoded web pages are transmitted and received on this network port by default.
What is the difference between port 80 and port 443?
While Port 443 supports HTTPS protocol, meaning all data traveling or between server and browser remains encoded, Port 80 supports HTTP protocol, meaning data traveling between the browser and server stays in text format.
To know more about browser click here
brainly.com/question/28504444
#SPJ4
Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. The OS she's working on is most likely _____.
Linux
Windows Vista
Mac OS X
MS-DOS
Answer: MS-DOS
Explanation:
a technician is configuring rights and permissions in windows 7. which tool will the technician use?
The Windows Memory Diagnostic Tool is used to check the defect in the Memory RAM which is by default installed in the latest version.
What is Windows 7 and its uses?Mdsched is used to check the defected RAM which we need to repair otherwise our windows will be crashed, freeze and will start facing the BSOD (Blue Screen Of Death). For using this tool, we need to search mdsched and select Restart now and check for problems and after restarting the system the tool will automatically start detecting the memory and fix the problem. Based on the information provided within the question it can be said that the technician would most likely want to use mmc.exe . This is a Microsoft Management Console application which allows the user to display various different management plug-ins and tools that are found within the control panel of the operating system. This can be customized and sent to others as the technician wants to accomplish in this scenario. Windows 7 is an operating system that Microsoft has produced for use on personal computers. It is the follow-up to the Windows Vista Operating System, which was released in 2006. An operating system allows your computer to manage software and perform essential tasks.To learn more about windows 7 refer to:
https://brainly.com/question/14103767
#SPJ4
Good things to keep track of about people in your Career Network include: a. contact information, including how to spell their name. b. how you came to know them (introduced by a friend, at a career fair, search on LinkedIn, etc.). c. notes about your last interaction and plans for your next interaction. d. only a and b above e. all of the above
Answer:
mi pareceres que es la B
Explanation:
Write a program in Python which prints your name, surname and class.
Answer:
print(name + "\n" + surname + "\n" + class)
Explanation:
not enough information is given but this will print those three variables with a newline between each.
exercise 2. (spell checker ) implement a program called spell that accepts f ilename (string) as command-line argument, which is the name of a file containing common misspellings (a line-oriented file with each comma-separated line containing a misspelled word and the correct spelling); reads text from standard input; and writes to standard output the misspelled words in the text, the line numbers where they occurred, and their corrections.
Using the knowledge in computational language in JAVA it is possible to write a code that containing common misspellings a line-oriented file with each comma-separated line.
Writting the code:import java.util.*;
import java.io.*;
public class Spell {
public static void main(String []args) throws IOException {
try {
File file = new file.createNewFile();
FileWriter writer = new FileWriter(file);
writer.flush();
writer.close();
FileReader fileread = new FileReader(file);
int output = fileread.read();
String str = "";
while (output != -1) {
str += (char) output;
output = fileread.read();
}
int counter = 1;
Map<String, String> st = new HashMap<String, String>();
String arr[] = str.("[\n,]");
for (int i = 0; i < arr.length - 1; i = i + 2) {
st.put(arr[i], arr[i + 1]);
}
String s = "";
for(int i=0;i< args.length;i++)
{
s=s+args[i];
}
System.out.println("The command line argument is :"+s);
String arr1[]=s.split(",");
for( int j=0;j<arr1.length;j++)
{
for(Map.Entry<String,String> ch:st.entrySet())
{
if(ch.getValue().equals(arr1[j]))
{
System.out.println(arr1[j]+" : "+ Math.abs(ch.getKey().hashCode())+" --> "+ch.getKey());
break;
}
}
}
}
catch (Exception e)
{
System.out.println(e);
}
} catch (Exception e) {
System.out.println(e);
}
}}
See more about JAVA at brainly.com/question/12975450
#SPJ1
in this problem, we will compare the performance of a vector processor with a hybrid system that contains a scalar processor and a gpu-based coprocessor. in the hybrid system, the host processor has superior scalar performance to the gpu, so in this case all scalar code is executed on the host processor while all vector code is executed on the gpu. we will refer to the first system as the vector computer and the second system as the hybrid computer. assume that your target application contains a vector kernel with an arithmetic intensity of 0.5 flops per dram byte accessed; however, the application also has a scalar component that must be performed before and after the kernel in order to prepare the input vectors and output vectors, respectively. for a sample dataset, the scalar portion of the code requires 400 ms of execution time on both the vector processor and the host processor in the hybrid system. the kernel reads input vectors consisting of 200 mb of data and has output data consisting of 100 mb of data. the vector processor has a peak memory bandwidth of 30 gb/s and the gpu has a peak memory bandwidth of 150 gb/s. the hybrid system has an additional overhead that requires all input vectors to be transferred between the host memory and gpu local memory before and after the kernel is invoked. the hybrid system has a direct memory access (dma) bandwidth of 10 gb/s and an average latency of 10 ms. assume that both the vector processor and gpu are performance bound by memory bandwidth. compute the execution time required by both computers for this application.
The vector processor is faster in this case because it is not bound by the memory bandwidth between the host and GPU, which is a bottleneck in the hybrid system.
What is the execution time required for the vector kernel on the vector processor and the hybrid computer, and which one is faster in this case?To compute the execution time required by both computers, we need to calculate the time required for each component of the application, including the scalar portion and the vector kernel. We'll start with the vector kernel:
The kernel reads 200 MB of input data and produces 100 MB of output data, with an arithmetic intensity of 0.5 flops per byte. This means that the kernel performs 100 million floating-point operations.
On the vector processor, the peak memory bandwidth is 30 GB/s, so the time required to read 200 MB of input data is:
200 MB / 30 GB/s = 0.00667 s
Similarly, the time required to write 100 MB of output data is:
100 MB / 30 GB/s = 0.00333 s
The time required to perform the 100 million floating-point operations is:
100 million flops / (0.5 flops per byte * 200 MB) = 1 s
Therefore, the total time required to execute the vector kernel on the vector processor is:
0.00667 s + 1 s + 0.00333 s = 1.01 s
On the hybrid computer, the input data must be transferred from host memory to GPU local memory before the kernel is executed, and the output data must be transferred back to host memory after the kernel is executed. The DMA bandwidth between the host and GPU is 10 GB/s, and the latency is 10 ms, so the time required to transfer 200 MB of input data is:
200 MB / 10 GB/s + 10 ms = 0.02 s
Similarly, the time required to transfer 100 MB of output data is:
100 MB / 10 GB/s + 10 ms = 0.01 s
Since the scalar portion of the code takes 400 ms on both computers, the total time required to execute the scalar portion and the vector kernel on the hybrid computer is:
0.4 s + 0.02 s + 1 s + 0.01 s + 0.4 s = 1.82 s
Therefore, the execution time required by the vector processor is 1.01 s, and the execution time required by the hybrid computer is 1.82 s. The vector processor is faster in this case because it is not bound by the memory bandwidth between the host and GPU, which is a bottleneck in the hybrid system.
Learn more about vector processor
brainly.com/question/31503102
#SPJ11
Project manager Kevin has to create a project team organizational chart. Which activity should he perform before creating this chart?
Answer: C
Explanation: Allocating roles to project team members.
PLEASE ANSWRR ALL ASAP
ILL GIVE BRAINLY PLEASE HELP
Answer:
2D from hexadecimal to denary is 13 + 2*16 = 45
68 from hexadecimal to denary, using the same logic as above, is 104.
AB from hexadecimal to denary, using the same logic as above, is 171.
Lastly, F9 from hexadecimal to denary is 249.
31 from denary to hexadecimal is 1F (notice that it is one less than 32, which is 2*16).
73 from denary to hexadecimal is 49.
184 from denary to hexadecimal is B8
Lastly, 255 is FF (notice that it is one less than 256, which is 16*16)
Microcomputer other device on the network that requests and utilizes network resources Hub Switch Client Server
Answer:
Client.
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Infrastructure as a Service (IaaS).
3. Software as a Service (SaaS).
A client can be defined as a microcomputer or other device on the network that requests and utilizes network resources.
These network resources that are being requested by the client (client computer) are typically made available by a dedicated computer on the network known as a server.
THIS IS ACTUALLY FOR HISTORY!!!!!
PLEASE HURRY!!! I WILL MARK BRAINLIEST!!!
When the 1905 Sequoyah Convention ratified their state constitution and submitted it to Congress, Congress chose to ignore it. Do you feel this was the right decision? If you had been a member of Congress in 1905, would you have voted to ratify the Sequoyah Constitution, voted against it, or tried to have it tabled? Defend your choice.
Answer:
it was certainly a debatable decision, mainly because it was based primarily on political - and not on legal or social - views. since the congress at that time was led by members of the republican party, and the territory that the tribes wanted to turn into an exclusively indian state was predominantly democratic, the proposal (as expressed in the constitution) did not succeed, but the constitution itself proved to be of crucial importance in the creation of the state of oklahoma, and, most importantly, it guaranteed the involvement of representatives of the indian tribes in the government of the future joint state.
as a member of congress, i would have voted to ratify the constitution, or at least to have it tabled. ignoring it was an interested and partial decision.
2- Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware. a
Answer:
A computer virus is a program that, when executed, replicates itself by modifying other computer programs and inserting its own code. A payload is the part of transmitted data that is the actual intended message. In this example, the intended message is a malicious executable. Computers and phones often get infected with viruses through a tactic called phishing Phishing emulates actual services through social engineering and tricks a user into installing a payload. A common type of malware and probably most known today is ransomware, which locks down devices files until a payment ransom is met. This payment is often in BitCoin.
Explanation:
A computer virus refers to a malicious code that's designed to damage or steal data on the computer system.
Malware is a collective name for malicious software variants and these include ransomware, spyware, and viruses. Malware consists of the code that is developed by cyberattackers. An example of malware is Trojan.
A common way through which computers and mobile devices become infected with viruses is when there is a link or file that requires a person to click open the file or click the link.
Once the person opens the file or clicks the link, vital data can be stolen.
Read related link on:
https://brainly.com/question/24760870
The letters below are jumbled. Figure out what the word is and write it on the blank line provide
1.ADTA
2.RNIRPTET
3.BYOMSL
4.MDAIGAR
5.NIGS
Data, Printer, Symbol, Diagram, Sign
Plz I need the answer ASAP. I’ll mark brainliest
Answer:
A string containing all lowercase letters and numerals and ending with a- Or D
Chatbots are primarily responsible for _______.
thinking outside the box with customers
using instant messaging to collect email addresses and provide information about the company’s products
conducting all customer service interactions for the company
identifying customer requests so that a live agent can respond at a later time
Chat bots are primarily responsible for conducting all customer service interactions for the company. They use artificial intelligence to understand and respond to customer queries, providing efficient and effective customer support.
Chat bots are programmed to engage in conversations with customers through various communication channels, such as websites or messaging apps. When a customer interacts with a chat bot, it uses artificial intelligence and natural language processing to understand the customer's query or request.
Chat bots can handle a large volume of customer interactions simultaneously, making them efficient and scalable for companies with a high volume of customer inquiries.If the chat bot cannot resolve a customer's issue, it can escalate the conversation to a live agent for further assistance.In summary, chat bots are primarily responsible for conducting customer service interactions for a company.
To know more about interactions visit:
https://brainly.com/question/31385713
#SPJ11
do you think it is important for the teacher and your peers to know things about you? why or why not
Answer:
yes only certain thing lile how old are u where your from and ECT. just don't go in to detail so yes I agree they should
Answer:
Yes for sure.
Explanation:
When you walk into a classroom or join a class online people should know who you are. You will be with them all year most likely and they might seem like strangers now but soon they wont and it is very important for them to know about you. That does not mean that you have to tell them everything but just the most interesting or special things you are willing to share with them.
Explain any TWO (2) data information that shall be covered under "Safety Data Sheet" and elaborate why do you think the information is needed
Safety data sheets include details about chemical items that assist users in evaluating the risks. They outline the risks the chemical poses and include details on handling, storage, and emergency procedures in the event of an accident.
The properties of each chemical, its physical, health and environmental properties, protective measures, and precautions for handling, storage and transportation of the chemical are contained in a safety data sheet (formerly called safety data sheet).
Provides recommendations for each individual chemical on topics such as:
PPE, or personal protective equipmentfirst aid techniquescleanup procedures for spillsTo learn more on Safety Data Sheets, here:
https://brainly.com/question/28244620
#SPJ4
If you want to display a portion of all three worksheets in a workbook, what should you do? (a) Open
If you want to display a portion of all three worksheets in a workbook, what should you do?
(a) Open two new workbook windows, arrange windows, and then click a different worksheet tab in each window.
(b) Use the Freeze Panes option and cascade the title bars of all open workbooks.
(c) Double-click the split boxes to display four window panes, click within each pane, and then click the worksheet tab to display its content.
(d) Use the Split, Freeze Panes, and Arrange All commands at the same time.
To display a portion of all three worksheets in a workbook, you can use the Split, Freeze Panes, and Arrange All commands at the same time.
So, the correct answer is D.
This will allow you to divide your worksheet into multiple panes, freeze the rows or columns you want to keep visible while scrolling, and arrange all the panes in a way that suits your needs.
Alternatively, you can open two new workbook windows, arrange them, and then click a different worksheet tab in each window. Another option is to use the Freeze Panes option and cascade the title bars of all open workbooks.
Double-clicking the split boxes can also be used to display four window panes, and then you can click within each pane to display the worksheet content.
Hence the answer of the question is D.
Learn more about worksheet at https://brainly.com/question/30331806
#SPJ11
Write a program to:
• It will collect and output some basic data about the user such as name, and gender which will be
displayed with an accompanying welcome message [3]
• Use appropriate data structures to store the item code, description and price information for
the mobile devices, SIM cards and accessories [2]
• Allow the customer to choose a specific phone or tablet [3]
• Allow phone customers to choose whether the phone will be SIM Free or Pay As You Go [2]
• Calculate the total price of this transaction [4]
• Output a list of the items purchased and the total price. [3]
• Any other choice outside of these three categories would give out appropriate message to the
user and requesting the user to make a new choice. [2]
According to the question, a program using appropriate data structures are given below:
#include <iostream>
#include <string>
#include <vector>
#include <map>
using namespace std;
int main() {
string name;
string gender;
cout << "Please enter your name: ";
cin >> name;
cout << "Please enter your gender (male/female): ";
cin >> gender;
cout << "Welcome " << name << ", you are a " << gender << ".\n\n";
map<string, vector<string>> items;
items["mobile"] = {"iphone11", "1000", "samsungs20", "800"};
items["sim"] = {"sim1", "30", "sim2", "40"};
items["accessories"] = {"charger", "20", "headphone", "30"};
string choice;
cout << "Please choose a device (mobile/sim/accessories): ";
cin >> choice;
string phone;
if (choice == "mobile") {
cout << "Which phone do you want to buy (iphone11/samsungs20) ? ";
cin >> phone;
cout << "Do you want to buy a SIM Free or Pay As You Go ? ";
cin >> choice;
}
int totalPrice = 0;
for (auto item : items[choice]) {
totalPrice += stoi(item);
}
cout << "You have chosen " << phone << " (SIM Free/Pay As You Go) and your total price is: " << totalPrice << endl;
if (choice != "mobile" && choice != "sim" && choice != "accessories") {
cout << "Please choose a valid item from the list (mobile/sim/accessories)." << endl;
}
return 0;
}
What is data structures?Data structures are the way in which data is organized and stored in a computer system. Data structures provide a means to manage large amounts of data efficiently, such as large databases and internet indexing services. Data structures are used in almost every program or software system. They are essential in providing an efficient way to store and retrieve data. Data structures are divided into two categories: linear and non-linear. Linear structures include arrays, linked lists, stacks, and queues.
To learn more about data structures
https://brainly.com/question/24268720
#SPJ9
Tonya is photographing an old photo with her digital camera. What can she use to avoid reflections
Answer:
Indirect lighting conditions
Explanation:
By doing this, there will be no glare
Create a timeline of the evolution of computers and their impact on society
While the conceptual idea after a computer was developed in the 19th century, the first electronic computer was created in the 1940s.
How does the evolution of computers impacts the society?
Computers have transformed the way people relate to one another and their living environment, as well as how humans manage their work, their communities, and their time. Society, in turn, has affected the development of computers via the needs people have for processing data.
What are the evolution of computers?
The first modern computer was built in the 1930s and was called the Z1, which was followed by large machinery that took up whole rooms. In the '60s, computers evolved from professional use to private use, as the first personal computer was presented to the public.
To learn more about computers, refer
https://brainly.com/question/24540334
#SPJ9
First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newline followed by the string" reports.".
Ex: If the input is 3 70 65 75, the output is:
70 reports.
65 reports.
75 reports.
Answer:
The program in Python is as follows:
valCount = int(input())
reports = []
for i in range(valCount):
num = int(input())
reports.append(num)
for i in reports:
print(i,"reports.")
Explanation:
This gets input for valCount
valCount = int(input())
This creates an empty list
reports = []
This gets valCount integer from the user
for i in range(valCount):
num = int(input())
Each input is appended to the report list
reports.append(num)
This iterates through the report list
for i in reports:
This prints each element of the report list followed by "reports."
print(i,"reports.")
Jamie has an online project-related policy meeting to attend today, however returning from lunch he seems to have a problem with laptop’s bitlocker and he’s currently waiting for the Technology Support Team to fix the issue. Jamie doesn't want to miss this meeting and he decides to use personal mobile device to attend the session. Is this aligned with the policy?
Without knowing the specific policy in place, it's difficult to determine whether Jamie using his personal mobile device to attend the policy meeting is aligned with the policy. However, there are a few things to consider:
Does the policy allow for the use of personal devices for work-related activities?Are there any security concerns with using a personal device, such as potential data breaches or unauthorized access?Does the meeting platform used for the policy meeting support mobile devices?Is Jamie able to access the meeting materials and participate fully in the meeting using his personal device?If the policy allows for the use of personal devices and there are no security concerns, and Jamie is able to fully participate in the meeting using his personal device, then it may be aligned with the policy. However, it's important for Jamie to confirm with his supervisor or IT department to ensure that he is in compliance with the policy.
To learn more about mobile device click on the link below:
brainly.com/question/4673326
#SPJ4