Answer:
USB flash drives is the most common type of storage device for transferring files from one computer to another
You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home, you cannot connect to devices on your home network or to the internet.
Required:
What could have been the reason for that?
Answer:
The network address can be the reason. You need to modify it so you can have access.
what is the version number for mysql returned from port 3306
Answer:
For MySQL, the default port is 3306, which means if you have installed MySQL externally, it will listen to the 3306 port. But when it gets installed with the WAMP package, it is now 3308 in a new version of WAMP because, from the latest version of the WAMP server (3.2.
coding word scramble
ICOAIPAPLTSN- a software program for end users
AADT- processed information
RAAEHWRD- physical parts of computer system
MRNPAGOGIMR- instruction given to the computer
plz answer as soon as possible
The decoded words for the coding word are:
ICOAIPAPLTSN - ApplicationAADT - DataRAAEHWRD - HardwareMRNPAGOGIMR - ProgrammingWhat is coding words?In the above decoded words, "ICOAIPAPLTSN" unscrambles to "Application." An application, often referred to as software or a program, is a set of instructions designed to perform specific tasks or functions for end users. Applications can be anything from productivity tools, games, communication software, and more.
Also, "AADT" unscrambles to "Data." Data refers to any piece of information or raw facts that are collected, stored, and processed by a computer system. Data can be in various forms, such as text, numbers, images, videos, and more.
Read more about coding here:
https://brainly.com/question/26134656
#SPJ3
What is the unique name given to a class called?
Answer:
A class is an extensible program-code template for creating objects.
Source: https://en.wikipedia.org/wiki/Class_(computer_programming)
, Hope this helps:)
Have a great day!!
what information most likely presents a security risk on your personal
An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.
A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.
Some of the social characteristics and details of an individual that are shared on social media websites include the following:
Date of birth.Occupation.Religion.Gender (sex).Location.Friends.However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.
In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.
Read more: https://brainly.com/question/21765376
This type of cable is used to connect the keyboard and mouse to the computer:
PS/2 cable
Ethernet cable
HDMI cable
DVI cable
Answer:
I'm going to have to go with PS/2 cable
Explanation:
did some research
it's the ps/2 cable
ethernet cables are for wifi
hdmi connects computer to the monitor
dvi connects to an older type of monitor
Preset headers and footers cannot have additional information add to the areas.
Group of answer choices
True
False
the answer to the question is true
helppppppppppp pleaseee
Answer:
3. Multimedia Projectors
Explanation:
Ive had this quiz before lol
Answer:
c
Explanation:
its c
where is the scroll bar located inside a web browser?
The Scroll Bar is the narrow space in your browser window just to the right of the content area.
Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.
computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
Please need help!!!!!
Which one of these statements regarding the phases of development is true?
A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.
Answer:
Try the answe D because before you start you will need a concept.
It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.
According to the given question, we are to discuss the phases of development that are involved.
As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.
Therefore, The concept phase starts after the pre-production phase of development in programing process.
Learn more about phases of development at;
https://brainly.com/question/16397886
remove the cover or chassis or case
Answer:
Case. Under that, there is the motherboard which has all the connections to all the hardware
Explanation:
Consider the following declarations:
class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration
Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?
Answer:
12, 5, 2, 3
bagType
Explanation:
I just did it
what is the first thing you should do when you open a savings account
Answer:
Compare your options. There are many financial institutions that offer savings accounts. .
Explanation: PLS MARK BRAINLIEST
are special characters usually found on the keyboard?
Answer:
No
Explanation:
When typing in predefined characters, Automatic substitution feature will change the characters into a symbol or special character. No.
You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described
Answer: D. Enable the remote Assistance exception only on the private profile
Explanation:
_____ selling is used when a product is sold from one business to another .
Answer: cross-selling
Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.
A mouse that emits and sense light to detect its movement is called an _______________ mouse.
Access your Practice Lab titles Access your exercise content Reports and files Access your settings Access help and support CompTIA Linux Customize or Write Simple Scripts Review Review Well done, you have completed the Customize or Write Simple Scripts Practice Lab. Lab Assessment Test your knowledge on the topics covered in this lab by completing the review questions below. 1 Question What is the extension of a shell script
Answer:
The extension for a shell script in windows ends with a .ps1 and for the extension for linux it is .sh, not quite sure for OSX.
Which of the following best describes the original meaning of the term hacker?
Skilled computer user
Dangerous cybercriminal
Beginning computer programmer
Computer virus developer
Answer:
Dangerous cybercrimina
Explanation:
Answer:
Skilled computer user and computer virus developer
Explanation:
The ethernet cable is also known as? *
Cat 5 cable
Wan cable
RD-45 cable
Sat 5 cable
Answer:
Cat 5 cable
Explanation:
The ethernet cable is also known as Cat 5 cable.
Order the steps to creating a new rule to handle meeting request responses in Outlook
Answer:
posting this. your photo order is correct.
Explanation:
Name any four constituent of the 8085 microprocessor.
Answer:
The timing & control unit, the decoder, serial input/output control and the arithmetic and logic unit.
Some common constituents of the 8085 microprocessor may include an accumulator, arithmetic and logic unit, temporary register, flag register, and address data bus.
What is the configuration state of the 8085 microprocessor?The configurations state of the 8085 microprocessor mainly include some other constituents like data bus-8-bit, address bus-16 bit, program counter-16-bit, stack pointer-16 bit, registers 8-bit, +5V voltage supply, and operates at 3.2 MHz single segment CLK.
According to the context of this question, an accumulator is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It also mutually supports the arithmetic and logic unit along with some common types of registers.
Therefore, some common constituents of the 8085 microprocessor are well described above.
To learn more about the microprocessor, refer to the link:
https://brainly.com/question/29243062
#SPJ5
Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way? Check all of the boxes that apply.
checking social media networks during working hours
surfing the Internet during working hours for what to do on the weekend
downloading a favorite band’s latest album from a file-sharing service
Answer:
All of the above.
Explanation:
You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading anything from anywhere is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.
write code that removes the first and last elements from a list stored in a variable named my_list. assume that the list has been initialized and contains at least two elements.
Answer:
[24, 35, 9, 56 Approach #3: Swap the first and last element is using tuple variable.
How would you rate your prior knowledge or comfort level with the topic of technology applications?
A.
I am a technology application expert.
B.
I know a lot, but not everything about technology applications.
C.
I know a few things about technology applications.
D.
I am not familiar at all with technology applications.
Answer:
A
Explanation:
I know cyber security and Javascript and also a framework called svelte to create websites.
The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen
Answer:
cursor or pointer
Explanation:
beacause the main js crom the algorithm
what is the term used to describe with you connect your phone to another device to share internet access?
Answer:
This is hyped as the Internet of Things (IoT). Sometimes also called IoE, the Internet of Everything.
Explanation:
Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they view the bright images on the page. Which design principle is Cathy using?
Answer:
dominance
Explanation:
i just took it and got it right