Window server how it works
in which country was Abacus build
if ur smart don't searh
Answer:
Abacus many be built first in China
Explanation:
I know Abacus ^o^
Answer:
Hewo There!!!!
__________________
China- i thinkkk maybe?
__________________
“Hold fast to dreams,
For if dreams die
Life is a broken-winged bird,
That cannot fly.”
― Langston Hughes
__________________
Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn
VPN or Proxy is safer?
What type of system software manages memory?
Answer:
"Operating System"
Explanation:
The type of system software that manages memory is an operating system. To manage memory, the operating system employs a number of software strategies.
What is system software?The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer.
You can converse with the computer using this method even if you don't understand its language. Memory connections are the structures that come before and after all memory areas, whether they are allocated or available.
Working memory, short-term memory, and long-term memory are the three primary categories of memory. While long-term memory stores your enduring memories, working memory and short-term memory enable you to retain and use transient information.
Therefore, an operating system is a sort of system software that controls memory.
To learn more about system software, refer to the link:
https://brainly.com/question/12908197
#SPJ2
A Product Manager has been given responsibility for overseeing the development of a new software application that will be deployed to a group of Accenture clients.
What would be the most time-saving and cost-effective way for the Product Manager to address the new application’s security considerations?
Utilize a DevSecOps approach to incorporate security into the development process from the beginning.
Schedule development of security features after the application’s initial release.
Design the application’s security features after the application’s initial build is complete.
Contract with an external vendor to develop a security solution separately from the main application.
I don't know this yet.
There are different software that has been developed today. The most time-saving and cost-effective way is to Design the application’s security features after the application’s initial build is complete.
Accenture is known for their work in improving business needs. They are constantly shifting to a new method of delivering information technology.
They are known to embed security into the product development life cycle helps secure the business and also keeping speed and assisting to remove friction.
Learn more about Accenture from
https://brainly.com/question/25737623
hi hi hihihihihivvv hihihihihihi v vhi
Answer: hihihihihihiihihi hihihihiihihih
Explanation: hi.
The program allows the user to type in any linux command and then executes that command, such as "pwd" or "echo". The problem is that it should allow multiple commands to be typed in and executed at the same time, but it only allows one at a time currently. Please help fix it so it allows multiple commands to be typed and executed.
Code:
#include
#include
#include
#include
#include
#include
void parse(char *line, char **argv)
{
while (*line != '\0') { /* if not the end of line ....... */
while (*line == ' ' || *line == '\t' || *line == '\n')
*line++ = '\0'; /* replace white spaces with 0 */
*argv++ = line; /* save the argument position */
while (*line != '\0' && *line != ' ' &&
*line != '\t' && *line != '\n')
line++; /* skip the argument until ... */
}
*argv = '\0'; /* mark the end of argument list */
}
void execute(char **argv)
{
pid_t pid;
int status;
if ((pid = fork()) < 0) { /* fork a child process */
printf("*** ERROR: forking child process failed\n");
exit(1);
}
else if (pid == 0) { /* for the child process: */
if (execvp(*argv, argv) < 0) { /* execute the command */
printf("*** ERROR: exec failed\n");
exit(1);
}
}
else { /* for the parent: */
while (wait(&status) != pid) /* wait for completion */
;
}
}
void main(void)
{
char line[1024]; /* the input line */
char *argv[64]; /* the command line argument */
while (1) { /* repeat until done .... */
printf("Enter Shell Command -> "); /* display a prompt */
fgets(line, 1024, stdin); /* read in the command line */
printf("\n");
parse(line, argv); /* parse the line */
if (strcmp(argv[0], "exit") == 0) /* is it an "exit"? */
exit(0); /* exit if it is */
execute(argv); /* otherwise, execute the command */
}
}
This function receives a commend line argument list with the */ /* the first argument being cd and the next argument being the */ /* directory to change.
Which of the following will you do in step X in the following series of clicks to change the bounds of
a chart axis: Chart > Chart Tools > Format tab > Current Selection> Format Selection > Format Axis
> Axis Options > Vertical Axis crosses > At Category number > X?
O Expand Labels, then under Interval between labels, select Specify interval unit and type the
number you want in the text box.
O Expand Tick Marks, and then in the Interval between tick marks box, and type the number that
you want
N
Type the number that you want in the text box.
O Expand Tick Marks, and then select the options that you want in the Major type and Minor type
boxes.
In order to change the bounds of a chart axis after performing the aforementioned series of clicks, at step X: C. Type the number that you want in the text box.
A step chart can be defined as a line chart that uses both the vertical and horizontal lines to connect two (2) data points. Thus, it enables an end user to see the exact point on the X-axis when there is a change in the Y-axis.
In Microsoft Excel, the series of clicks that are used to change the bounds of a chart axis are:
Click on chart.Select chart tools and then format tab.Select the current selection and then format selection.Click on format axis and then axis options.Click on vertical axis crosses.At category number, you should type the number that you want in the text box.In conclusion, typing the number that you want in the text box is the action that should be performed at step X.
Read more on step chart here: https://brainly.com/question/9737411
Where is the option to set Conditional Formatting rules found?
O Insert tab in the Formatting group
O Page Layout tab in the Styles group
O Home tab in the Styles group
Formulas tab in the Formatting group
Answer:
C. Home tab in the Styles group
Explanation:
answer on edge 2021
Brainliest if correct. 5. if you wanted b show how many employees at your office ride a bicycle to work in
comparison to the number of employees who drive a car, take public transportation,
or walk wihat visual would be best? (1 point)
Answer:
I believe a bar graph would be best for me. What are your answer options though?
Explanation:
please write an Introduction on intrusion detection system and prevention system
PLEASE
Answer:
An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.
Please debbug this code for me
public class SavingAccount { // interest rate for all accounts private static double annualInterestRate = 0; private final double savingsBalance; // balance for currrent account // constructor, creates a new account with the specified balance public void SavingAccount( double savingsBalance ) { savingsBalance = savingsBalance; } // end constructor // get monthly interest public void calculateMonthlyInterest() { savingsBalance += savingsBalance * ( annualInterestRate / 12.0 ); } // end method calculateMonthlyInterest // modify interest rate public static void modifyInterestRate( double newRate ) { annualInterestRate = ( newRate >= 0 && newRate <= 1.0 ) ? newRate : 0.04; } // end method modifyInterestRate // get string representation of SavingAccount public String toString() { return String.format( "$%.2f", savingsBalance ); } // end method toSavingAccountString } // end class SavingAccount
Answer:
/
Explanation:
Suppose a password must have at least 8, but no more than 12 characters, where each character can be either:
Answer:
A combination of uppercase letters, lower case letters, numbers, and special characters.
Explanation:
A password is a word that permit you to register, log or sign in a site.
As a Waterfall project manager, your goal is to minimize any changes that could lead to scope creep. You want to protect your team from building something the client or stakeholders don’t want. What formal and rigorous process could you set up to safeguard against this?
The necessary things that should be done to avoid a project scope creep include documenting the project requirements and setting up change control processes.
The scope of a project simply means the work that is required in order to complete a project. On the other hand, project scope creep means the occurrence that happens when changes are made to the scope without a change request.
To avoid project scope creep, it's important to document the project requirements, set up changes in control processes, and have a clear project schedule.
Learn more about projects on:
https://brainly.com/question/4853153
RAM or RIM is correct?
An input statement is used to interact with the user of a program.
True False
Answer:
True.
Explanation:
An input statement asks a user a question, where the user has to input a value for the program to move forward. This means that yes, the program does interact with the user.
_____ are extremely _____ data structure’s, used all the time, and there are so many _____ that can handle them to do useful things.
A _____ can be thought of as an array of arrays
•versatile
•functions
•arrays
•matrix
Answer:
arrays are extremely versatile data structure’s, used all the time, and there are so many functions that can handle them to do useful things.
A matrix can be thought of as an array of arrays
Answer:
Arrays are extremely versatile data structure's, used all the time, and there are so many functions that can handle them to do useful things.
A matrix can be thought of as an array of arrays.
Happy Holidays
Explanation:
Define Word Processing
Answer:
Word Processing refers to the act of using a computer to create, edit, save and print documents. ... Text can be inserted, edited, moved, copied or deleted within your document and the appearance of the text can be modified in numerous ways.
In transcription Files are transcribed in:
a) Australian English
b) American English unless a client states otherwise.
c) Canadian English
d) British English
Answer:
B
Explanation:
American English unless a client states otherwise
Answer:
b american english
Explanation:
Why linked list is better than an array?
The ratio of sparrows to bluejays at the bird sanctuary was 5 to 3 If there were 15 bluejays in the sanctuary, how many sparrows were there?
what is operating system?
The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
Brainliest if correct. 3. You are researching ways to boost employee morale for a proposal. How can you
avoid copyright issues when you find materials from outside sources? (1 point)
I wake up the computer and remind it what to do
Answer:
what's the question or answer you want or is it a joke?
Explanation:
In Python which is the correct method to load a module math?
Answer: The math module is a standard module in Python and is always available. To use mathematical functions under this module, you have to import the module using import math .
Explanation:
how to download film
Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following algorithm. There is no need to create a class similar to how Java works.
3.1. User enters the first number.
3.2. User enters the second number.
3.3. If the first number is less than, greater than, or equal the second number, a message is displayed.
Please Help me. Thank You!
Marry Christmas!
x = int(input("Enter first number\n"))
y = int(input("Enter second number\n"))
if x > y:
print(x, "is greater than", y)
elif x < y:
print(x, "is less than", y)
else:
print(x, "is equal to", y)
i'm not the greatest coder, but it works :)
Please hurry, it's a test! 30 POINTS. :)
What computing and payment model does cloud computing follow?
Cloud computing allows users to_____ computing resources and follows the ______
payment model.
1. Buy, Own, Rent, Sell
2. pay-as-you-go, pay-anytime-anywhere, pay-once-use-multiple-times
(a) Explain what the following Java components are used for.JListJFrameFLowLayoutJpanelJFrameEventListener(b) Write simple Java codes to illustrate how each one of the above components are implemented.
Answer:
Welcome to Gboard clipboard, any text you copy will be saved here.
Read two numbers from user input. Then, print the sum of those numbers.
Hint -- Copy/paste the following code, then just type code where the question marks are to finish the code.
num1 = int(input())
num2 = ?
print(num1 + ?)
Answer:
First ? - int(input())
Second ? - num2
Explanation:
This works because we are just mimicing the first input in your first variable.
The second one is adding them together.
Don't remember to give me brainliest :)