To find the least common multiple (LCM) of two positive integers, we need to first find their greatest common divisor (GCD) using the Euclidean algorithm. Once we have the GCD, we can use the formula LCM(a,b) = (a*b)/GCD(a,b) to find their LCM.
To implement this in a program, we can read in each line of input, split it into two integers using the comma separator, and then use the formula above to find their LCM. We can use the math module in Python to get the GCD using the gcd() function.
Here is an example Python code:
import math
while True:
try:
line = input()
a, b = map(int, line.split(','))
gcd = math.gcd(a, b)
lcm = (a*b)//gcd
print(lcm)
except:
break
This program reads in each line of input, splits it into two integers a and b, finds their GCD using the math.gcd() function, and then uses the formula above to calculate their LCM. The program prints out the LCM for each pair of input integers. You can answer this question more accurately if you are familiar with the rules for multiplying and dividing both positive and negative numbers. But the solution is D. Divide two negative numbers, and the result is a positive number. Obviously, a positive number will result from two positives.
Learn more about positive integers here
https://brainly.com/question/11486291
#SPJ11
the procedure for handling and documenting incidents does not concern the cloud security. true false
False. The procedure for handling and documenting incidents does concern cloud security.
How to explain this conceptIn the context of cloud computing, incidents can occur that impact the security of cloud resources, such as data breaches, unauthorized access, or service disruptions.
Proper incident handling and documentation are crucial to effectively respond to and mitigate these incidents. This includes processes for incident detection, response, investigation, containment, and recovery. Incident documentation ensures a thorough understanding of the incident, aids in post-incident analysis, and helps in implementing preventive measures.
Cloud security incident management is an essential part of maintaining the security and integrity of cloud-based systems and data.
Read more about cloud computing here:
https://brainly.com/question/19057393
#SPJ1
Reggie is having trouble signing into his email account at work. He picks up the phone to call someone in IT, and then checks the phone list to see who to call. Which IT area should Reggie call
The IT area that Reggie should call is called; Information Security
What are the functions of an Information Technology Department?The IT department that Reggie should call is called Information Security department.
This is because Information security protects sensitive information from unauthorized activities such as inspection, modification, recording, and any disruption or destruction.
The aim of this department is to make sure that the safety and privacy of critical data such as customer account details, financial data or intellectual property are safe.
Read more about information technology at; https://brainly.com/question/25920220
What do microphone means
Answer:
A tiny phone
Explanation:
It means a tiny phone
virtual conections with science and technology. Explain , what are being revealed and what are being concealed
Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.
What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.
To learn more about technology
https://brainly.com/question/25110079
#SPJ13
Can you see who tries to access a password-protected file, but does not put in the password?
Yes/no
Explanation:
Depending on the person.
Yes, if your cousins,parents,etc have opened it.
No, if people like hackers have done it.
A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N, what effort is required to lift the weight? Provide your answer in newtons.
If the load weighs 350 N, the effort that is required to lift the weight is 70 N
To answer the question, we need to know what mechanical advantage is.
What is mechanical advantage?The mechanical advantage of the hydraulic lift M.A = L/E where
L = load and E = effort.Effort required to lift the weightMaking E subject of the formula, we have
E = L/M.A
Given that
M.A = 5 and L = 350 N,substituting the values of the variables into the equation, we have
E = L/M.A
E = 350 N/5
E = 70 N
So, the effort that is required to lift the weight is 70 N
Learn more about mechanical advantage here:
https://brainly.com/question/26440561
#SPJ1
what animal is perry the platypus
Answer: Agent P or simply Perry
Explanation:
Answer:
A Platypus. Its in the name XDDD
Explanation:
Gives two arrays of n > 1 values are[] (sorted ascending) and arry[] (sorted ascending), write an interpolation function that satisfies the following: interpolation (array]) returns arry[i], for a 0
You need to write a C program that finds the position of an element in a numeric array using an interpolation search algorithm if the element exists in the array.
Interpolation search is a binary search-like algorithm for searching for a specific target value in a sorted array. This is similar to how people search for specific names in phone books. This is the target value against which phone book entries are ordered.
We know that binary search always picks the middle of the remaining search space and discards half or the other depending on the result of comparing the mean to the target. The remaining search space is reduced to the part before and after the intermediate position.
By comparison, at each search step, interpolation search computes the remaining search space in which the target may be, based on the low and high values of the search space and the value of the target.
Know more about array here:
https://brainly.com/question/19570024
#SPJ4
Display devices can be ____ displays, in which each pixel can only be one of two colors, such as black or white.
Display devices can be monochrome displays, in which each pixel can only be one of two colors, such as black or white.
In the field of computer science, a monochrome device can be described as a kind of device which shows one or two colors only in different shades.
In the olden times, monochrome monitors were used as color displays had not been launched. It was after the 1980s that color displays started to appear in the market. Before that monitors with monochrome displays were used.
A monochrome device depends on two main colors which are black and white. Other than computer monitors, monochrome displays were also observed in cash counters and in lab display equipment. The use of monochrome displays has now been limited.
To learn more about monochrome, click here:
https://brainly.com/question/17157651
#SPJ4
You are working as a software developer for a large insurance company. Your company is planning to migrate the existing systems from Visual Basic to Java and this will require new calculations. You will be creating a program that calculates the insurance payment category based on the BMI score.
Your Java program should perform the following things:
Take the input from the user about the patient name, weight, birthdate, and height.
Calculate Body Mass Index.
Display person name and BMI Category.
If the BMI Score is less than 18.5, then underweight.
If the BMI Score is between 18.5-24.9, then Normal.
If the BMI score is between 25 to 29.9, then Overweight.
If the BMI score is greater than 29.9, then Obesity.
Calculate Insurance Payment Category based on BMI Category.
If underweight, then insurance payment category is low.
If Normal weight, then insurance payment category is low.
If Overweight, then insurance payment category is high.
If Obesity, then insurance payment category is highest.
A program that calculates the insurance payment category based on the BMI score is given below:
The Programimport java.io.FileWriter;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.ArrayList;
import java.util.Scanner;
public class Patient {
private String patientName;
private String dob;
private double weight;
private double height;
// constructor takes all the details - name, dob, height and weight
public Patient(String patientName, String dob, double weight, double height) {
this.patientName = patientName;
this.dob = dob;
if (weight < 0 || height < 0)
throw new IllegalArgumentException("Invalid Weight/Height entered");
this.weight = weight;
this.height = height;
}
public String getPatientName() {
return patientName;
}
public String getDob() {
return dob;
}
public double getWeight() {
return weight;
}
public double getHeight() {
return height;
}
// calculate the BMI and returns the value
public double calculateBMI() {
return weight / (height * height);
}
public static void main(String[] args) {
ArrayList<Patient> patients = new ArrayList<Patient>();
Scanner scanner = new Scanner(System.in);
// loop until user presses Q
while (true) {
System.out.print("Enter patient name: ");
String patientName = scanner.nextLine();
System.out.print("Enter birthdate(mm/dd/yyyy): ");
String dob = scanner.nextLine();
System.out.print("Enter weight (kg): ");
double wt = scanner.nextDouble();
System.out.print("Enter height (meters): ");
double height = scanner.nextDouble();
try {
Patient aPatient = new Patient(patientName, dob, wt, height);
patients.add(aPatient);
} catch (IllegalArgumentException exception) {
System.out.println(exception.getMessage());
}
scanner.nextLine();
System.out.print("Do you want to quit(press q/Q):");
String quit = scanner.nextLine();
if (quit.equalsIgnoreCase("q")) break;
}
try {
saveToFile(patients);
System.out.println("Data saved in file successfully.");
} catch (IOException e) {
System.out.println("Unable to write datat to file.");
}
}
// takes in the list of patient objects and write them to file
private static void saveToFile(ArrayList<Patient> patients) throws IOException {
PrintWriter writer = new PrintWriter(new FileWriter("F:\\patients.txt"));
for (Patient patient : patients) {
double bmi = patient.calculateBMI();
StringBuilder builder = new StringBuilder();
builder.append(patient.getPatientName()).append(",");
builder.append(patient.getDob()).append(",");
builder.append(patient.getHeight()).append(" meters,");
builder.append(patient.getWeight()).append(" kg(s), ");
if (bmi <= 18.5) builder.append("Insurance Category: Low");
else if (bmi <= 24.9) builder.append("Insurance Category: Low");
else if (bmi <= 29.9) builder.append("Insurance Category: High");
else builder.append("Insurance Category: Highest");
builder.append("\r\n");
writer.write(builder.toString());
writer.flush();
}
writer.close();
}
}
Read more about java programming here:
https://brainly.com/question/18554491
#SPJ1
illuminate live is a lecture program used in schools and is considered a(n) _________ tool.
Illuminate Live is a lecture program used in schools and is considered a powerful educational tool that helps teachers create interactive and engaging learning experiences for their students. This platform allows teachers to deliver real-time lectures, share multimedia content, conduct quizzes and polls, and even host virtual classrooms. With Illuminate Live, teachers can customize their lectures to fit the specific needs of their students, making it an excellent resource for differentiated instruction. Additionally, Illuminate Live offers data analysis and reporting tools that allow teachers to monitor student progress and identify areas that may require further attention. Overall, Illuminate Live is a valuable tool for teachers looking to enhance their teaching methods and create a more dynamic learning environment.
Another important feature of Illuminate Live is its virtual classroom capabilities. Teachers can use this platform to create a virtual classroom where students can interact with one another and collaborate on assignments. This feature is particularly useful for group projects and assignments that require teamwork.
Finally, Illuminate Live offers data analysis and reporting tools that enable teachers to monitor student progress and identify areas that may require further attention. With these tools, teachers can track student performance, attendance, and behavior, making it easier to provide individualized instruction and support.
In conclusion, Illuminate Live is a valuable tool for teachers looking to enhance their teaching methods and create a more dynamic learning environment. Its advanced features and capabilities make it a powerful educational tool that can help teachers deliver engaging and interactive lessons, and provide personalized instruction to their students.
To learn more about lecture program, visit the link below
https://brainly.com/question/17073797
#SPJ11
Antivirus programs protect your computer system from viruses or malicious programs. This is an example of which type of software
Answer:
Utilities
Explanation:
James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure
Unexpected cloud downtime is the most likely to face as a result.
Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.
According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.
An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.
Thus, Unexpected cloud downtime is the most likely to face as a result.
Learn more about Downtime, refer to the link:
https://brainly.com/question/28334501
#SPJ4
Plot the graph of absorbance versus dilutions of *Saccharomyces
cerevisiae on Microsoft Excel
a) Only plot trend line for linear range of data; show the R^2
value for each dataset
b) You may chose to
Dilutions Blank 1:16 1:8 1:4 1:2 550 0.000 0.098 0.206 0.418 0.810 1.418 Wavelength (nm) 620 0.000 0.075 10.169 0.368 0.714 1.162 690 0.000 0.053 0.134 10.308 0.604 1.044 1:1 Plot the graph of absorba
I can guide you on how to create the graph you described. Here are the steps: By following these steps, you should be able to create a graph of absorbance versus dilutions in Microsoft Excel, including the trendline and R-squared value for each dataset.
1. Open Microsoft Excel and enter the dilutions in one column and the corresponding absorbance values in another column.
2. Select the data range and click on the "Insert" tab in the Excel menu.
3. Choose the chart type that represents the relationship between dilutions and absorbance. In this case, a scatter plot with markers connected by a smooth line (XY scatter with smooth lines) would be suitable.
4. Right-click on any data point on the graph and select "Add Trendline" from the context menu.
5. In the "Format Trendline" options, select the "Linear" trendline type.
6. Enable the option to display the equation and R-squared value on the chart.
7. Adjust the axis labels, title, and other formatting options to enhance the clarity of the graph.
To know more about Microsoft Excel visit-
https://brainly.com/question/32584761
#SPJ11
what does strrchr() do? group of answer choices returns the position of the last occurrence of the character. returns the position to the first occurrence of the character. returns a pointer to the first occurrence of the character. returns a pointer to the last occurrence of the character.
The answer deemed as accurate is as follows: " It returns the position of the last occurrence of the character."
How does the strrchr() function work?The strrchr() function, which is a feature of the C programming language, facilitates the return of a pointer referencing the final instance of a designated character that is present in a given string.
The algorithm in question is designed to conduct a search of a given string by starting at the end and proceeding in a backward direction until the final instance of a specified character is located.
The aforementioned function subsequently provides a pointer to the memory location in question.
The aforementioned functionality sets itself apart from other comparable functions, such as strchr(), as it yields a pointer that indicates the initial instance of the specified character.
Similarly, strpbrk() deviates from this functionality as it furnishes a pointer that denotes any of the predetermined characters that are discovered.
The strrchr() function is a valuable tool in identifying the final instance of a specified character within a given string, thereby promoting expedient manipulation and analysis of said string.
Learn more about strrchr() function here:
https://brainly.com/question/15683939
#SPJ4
A computer scientist creates a necklace to celebrate the birth of her daughter. The necklace encodes her daughter's birthday in binary using silver 111 and 000 beads. The part of the necklace that encodes the day of the month is 110101101011010. A string of beads with either 1 or 0 on them, in the order 11010. What is the decimal equivalent of that binary number?.
The decimal equivalent of that binary number of 11010 that encodes the day of the month is found to be 26.
How to calculate the decimal equivalent of binary numbers?The decimal equivalent to binary numbers may be calculated by multiplying the individual digits by lowers of 2 raised to the position of the digit in the number.
To convert the binary numbers 11010 positional notation is used where the powers of two are written down to correspond to the number of binary digits given, i.e:
1 1 0 1 0
1 1 0 1 0
1 1 0 1 0 16 8 4 2 1
The decimal equivalent = 16 + 8 + 2 = 26.
Therefore, the decimal equivalent of the binary number 11010 that encodes the day of the month is found to be 26.
To learn more about the Decimal equivalent, refer to the link:
https://brainly.com/question/26279367
#SPJ1
design a combina2onal circuit for the following truth table. input are a,b, c and outputs are f1 and f2 a b c f1 f2 0 0 0 1 1 0 0 1 0 1 0 1 0 1 1 0 1 1 0 0 1 0 0 1 0 1 0 1 1 1 1 1 0 1 1 1 1 1 0 1
The circuit that uses the input values a, b, and c to produce the output values f1 and f2 can be designed using a Karnaugh map or a Boolean algebraic expression. The truth table for the input values a, b, and c and output values f1 and f2 are as follows: A B C F1 F2 0 0 0 1 1 0 0 1 0 1 0 1 0 1 1 0 1 1 0 0 1 0 0 1 0 1 0 1 1 1 1 1 0 1 1 1 1 1 0 1From the truth table, the Boolean algebraic expressions for f1 and f2 are as follows:f1= ~a.b.c + a.~b.~c + ~a.~b.c + ~a.b.~cf2= a.~b.~c + a.~b.c + ~a.b.~c + ~a.b.c. Therefore, the combinational circuit for the given truth table is designed as follows:
To design a combinational circuit for the given truth table with inputs a, b, and c and outputs f1, and f2, we can follow these steps:
1. Write down the truth table:
a b c | f1 f2
---------
0 0 0 | 1 1
0 0 1 | 0 1
0 1 0 | 1 1
0 1 1 | 0 0
1 0 0 | 1 1
1 0 1 | 0 1
1 1 0 | 1 0
1 1 1 | 0 1
2. Derive Boolean expressions for f1 and f2 using Sum-of-Products (SOP) or Product-of-Sums (POS) form:
f1 = a'b'c' + a'b(c)' + a(b')c' + a'(b)c
f2 = a'b'c' + a'b'c + a'b(c') + a(b')c'
3. Implement the circuit using AND, OR, and NOT gates:
For f1, use AND gates for each product term, then connect their outputs to an OR gate. Include inverters for a, b, or c as needed in each term.
For f2, similarly, use AND gates for each product term, then connect their outputs to an OR gate. Include inverters for a, b, or c as needed in each term.
Learn more about truth table, here:
https://brainly.com/question/30403214
#SPJ11
what is a valid response when identity theft occurs
Answer:
Unsecure Passwords
It is possible for a computing device to be exposed to malicious software (malware) or reveal sensitive information:
Some of the most common sources of malware are email attachments, malicious websites, torrents, and shared networks.
What happens if your computer is infected by malware?In short, malware can wreak havoc on a computer and its network. Hackers use it to steal passwords, delete files and render computers inoperable. A malware infection can cause many problems that affect daily operation and the long-term security of your company.
What is malicious software known as?Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.
To learn more about malicious software, refer
https://brainly.com/question/1308950
#SPJ4
1. __ and ___ were used in first generation computers
Answer:
Explanation:
vacuum tubes and punched cards were used in first generation computers.
Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.
Here is a suggested infographic on internet safety practices using Microsoft Word:
[A Word document shows the following infographic:]
Staying Safe Online
Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.
Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.
Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.
Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.
Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.
Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.
Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.
Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.
Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!
Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.
A brief overview of some important internet safety practices that you can include in your infographic using the Word Processing Software is given.
How to explain the informationUse strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.
Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.
Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.
Learn more about Word Processing on
https://brainly.com/question/985406
#SPJ1
Which securities protects networks from intruders? *
Application security
Network security
Information security
Operational security
Answer:
I think it is network security
Explanation:
Heard in an ad before :T
Answer:
Use Kika Clipboard to make paste easypneumonoultramicroscopicsilicovolcanoconiosis
Please provide an idea for both a personal project and a group
project. The scope needs to be reasonable in size, as the time to
complete the project and the resources will be limited. (you can
provid
A personal project idea is to create a personal finance tracker to track income and expenses. A group project idea is to create a community garden in a public space, requiring planning, planting schedules, and recruiting volunteers to provide fresh produce for the community.
Personal Project Idea:
Create a personal finance tracker: This project involves creating a spreadsheet or using a personal finance app to track income and expenses. The tracker should include categories for expenses such as rent, food, utilities, entertainment, and savings, as well as a budget for each category. The tracker can be customized to meet individual needs and can be used to identify areas where spending can be reduced and savings can be increased.
Group Project Idea:
Community garden project: This project involves creating a community garden in a public space such as a park or schoolyard. The project would require planning and organizing planting schedules, obtaining necessary supplies such as soil, seeds, and gardening tools, and recruiting volunteers to help with planting, maintenance, and harvesting. The garden can be used to provide fresh produce for the community and can also serve as an educational resource for local schools.
To know more about personal projects, visit:
brainly.com/question/32301757
#SPJ11
PLEASE HELPPP!!! QBASIC WORK!
Write a program that asks a user to input length and breadth of a room in feet. This program displays message ‘Big room’ if the area of the room is more than or equal to 250 sq. ft otherwise it displays ‘Small room’.
Answer:
INPUT "Input Length: ";LENGTH
INPUT "Input Width: ";WIDTH
AREA = WIDTH*LENGTH
IF AREA >= 250 THEN PRINT "Big room"
IF AREA < 250 THEN PRINT "Small room"
Explanation:
Which should you consider when selecting a highlighting color?
size
equality
alignment
contrast
Answer:
contrast
Explanation:
Answer:
I'm pretty sure it's contrast
Explanation:
It would be contrast because when you're looking for a highlighting color, you'd want to use colors that stand out from the rest. This helps you find what you want to see again very easily.
I'm sorry if this is wrong, but if it's right pls vote me brainliest
Can Anybody Answer This For Me ?
Answer:
I'm pretty sure its 3 only (c) III only gimme brainliest
ASKING AGAIN CAUSE I GOT A WEIRD LINK
¸ . ★ ° :. . • ° . * :. ☆¸ . ★ ° :. . • ° . * :. ☆ ¸ . ★ ° :. . • ° . * :. ☆ ¸ . ★ ° :. . • ° . * :. ☆
the purpose of the ___________ element is to group together a set of one or more [h1] element so that theyre treated as a single heading
a. header
b. hgroup
c. h1group
d. group
If the same condition is described as both acute and chronic, and separate subentries exist in the Alphabetic Index at the same indentation level, report both codes and sequence the acute code first.TrueFalse
Report both codes and sequence the acute code first if the same condition is described as both acute and chronic and separate subentries exist in the Alphabetic Index at the same indentation level.
What is Alphabetic Index?To code topography (anatomical sites) and morphology, use the alphabetical index (histological terms). The index also lists a few conditions and tumor-like lesions. The first code character in Chapter II of the ICD-10, the letter C, designates topography codes. The morphology codes are identified by the prefix M. Both the noun and the adjective are listed along with the terms. For instance, basophil adeno-carcinoma is listed both under B and A for "basophil adeno-carcinoma." The next two terms containing the word "abdominal" are separated from the "Abdomen" group by a horizontal space. The two morphologic terms that start with "abdominal" are the only ones, so they do not require a heading; however, the four terms that follow in terms of topography do have the bold heading "Abdominal."
To learn more about morphology refer to:
https://brainly.com/question/8282896
#SPJ4
wardialing is a technique that is used: a. to find other hackers on the internet. b. by telemarketers to automatically call phone numbers. c. to locate modem tones. d. to create a brute force attack.
(C) to locate modem tones. The right response is c. Finding the modem tones that computers and other devices use to connect over a phone line is a technique known as wardialing.
In order to find a suitable target, the technique includes dialling a variety of phone numbers and listening for the sound of a modem tone. Security experts and hackers have in the past utilised wardialing to find weak computer systems connected to phone lines. However, it is illegal and unethical to utilise it for evil intent. It's not frequently used to find other hackers online, by telemarketers to contact phone numbers automatically, or to launch a brute force attack.
learn more about wardialing here:
https://brainly.com/question/31928152
#SPJ4
you are creating a device configuration profile in microsoft intune. you need to implement an admx-backed policy. which profile type should you use?
Data retrieved from web queries do not include pictures and contents of scripts.
Data retrieval is the process to obtain data from a database management system. And, web application or system is a software program that is stored on a remote server and provided over the Internet through a browser interface. In order to retrieve data from web-based systems, web queries are used to fetch data from web databases. When data is retrieved from web-based database systems through web queries, the resulting data do not include pictures and contents of scripts.
You can learn more about data retrieval at
https://brainly.com/question/14939418
#SPJ4