Does the directory virus depend upon operating system?​

Answers

Answer 1

A virus is a type of malware that can infect a computer or other device and replicate itself, often causing damage or disruption to the device's normal operation. Some viruses are designed to specifically target certain operating systems, while others are more general and can infect a variety of different types of devices and systems.

It is possible for a virus to specifically target a certain operating system, in which case it would depend on that operating system in order to function. However, many viruses are designed to be more general and can infect multiple types of operating systems.

The best way to protect against viruses is to use antivirus software, keep the operating system and other software up to date with the latest security patches, and practice safe browsing and email habits.


Related Questions

the ____ operator is inclusive, meaning that a value equal to either end would be selected.

Answers

Because the BETWEEN operator is inclusive, a value that falls between the two ends would be chosen.

Values are selected using the BETWEEN operator from a predefined range. The values might be text, integers, or dates.

The BETWEEN operator includes both the begin and finish variables.

The BETWEEN operator is a logical operator that enables you to provide a range to test: SELECT column name(s) FROM table name WHERE column name BETWEEN value1 AND value2.

When compared to a condition that employs the comparison operators >=, =, and the logical operator AND, the condition that uses the BETWEEN operator is considerably easier to comprehend.

If the value in the column or expression is more than the value of the end expression and less than the value of the start expression, the NOT BETWEEN function returns TRUE.

Learn more about BETWEEN here:

https://brainly.com/question/29815451

#SPJ4

what is something about you that is not included anywhere else in your application?

Answers

The ideal response to the interview question, "Tell me something about yourself that isn't on your application," is succinct and encouraging. Stay away from nasty or disconnected personal stories.

How do you respond to "Tell me something about yourself that isn't in your sample resume"?

You may say something like you love and are skilled at helping others to improve their ideas. Perhaps more so than presenting your own solutions to problems, you thrive in brainstorming sessions. As an alternative, you may describe any particular abilities that are needed for this position but aren't listed on your CV.

What should I enter as supplementary information on a form?

Civic involvement, honours and recognitions, volunteer work, or cultural aptitudes like language or travel may be included as additional information. It may also cover additional passions or pursuits that you feel will advance your career or demonstrate your leadership or character.

Learn more about Job applications here:

brainly.com/question/17869674

#SPJ4

Marilyn is reading a book about the action of fitting and placing prints into a physical space which can sometimes require the skill and knowledge of a carpenter or electrician to handle the heavy-lifting. What might be an appropriate title for this book?


Art Through the Ages


The Art Installation Process


Carpentry and Electric Work


Decorating Your Physical Space

Answers

The thing that might be an appropriate title for this book is option B: The Art Installation Process.

What is the book title  about?

The action of fitting and placing prints into a physical space is a key part of the art installation process, and a book that covers this topic would likely be of interest to artists, curators, and other professionals involved in installing and exhibiting art.

Therefore, the fact that the book mentions the skill and knowledge of a carpenter or electrician suggests that it covers the practical aspects of installing art, which would make it relevant to those who need to understand how to handle the heavy-lifting and other physical tasks involved in setting up an exhibition.

Learn more about book title from

https://brainly.com/question/25654749

#SPJ1

based on the author's take on e-waste management, a manager would do well to learn that:

Answers

According to the author's perspective on e-waste maintenance, a manager would be wise to discover that managing e-waste at residence can be 10 times less expensive.

What is management's primary definition?

The governance and integration of tasks towards achieve a objective is governance. Setting the organizational direction and organizing staff efforts to achieve these goals through the application of resources available are examples of such administration activities.

Why is management essential?

Any organization needs managers to accomplish its objectives. They serve as the foundation of any business and are responsible for making sure everything works properly. Whether an organization succeeds or fails depends on how successfully its managers carry out their duties.

To know more about Management visit:

https://brainly.com/question/14703945

#SPJ4

Consider the following scenario: a network admin wants to use a remote authentication dial-in user service (radius) protocol to allow 5 user accounts to connect company laptops to an access point in the office. These are generic users and will not be updated often. Which of these internal sources would be appropriate to store these accounts in?.

Answers

The correct answers are as follows:

A. LDAP.

B. SQL database.

C. Flat file.

D. Active Directory.

What is Remote Authentication Dial-In User Service (RADIUS)?

A networking (client/server) protocol called Remote Authentication Dial-In User Service (RADIUS) was created to give its end users centralized authentication, authorization, and accounting (AAA) of remote network services via dial-up networking and a virtual private network (VPN).

RADIUS is hence often a client/server protocol that is set up to operate at the application layer of either the user datagram protocol (UDP) or the transmission control protocol (TCP).

In this example, a network administrator wants to provide remote access for five (5) user accounts to connect corporate laptops to an office access point using the RADIUS protocol.

Therefore, a SQL database would be the internal source that would be most suitable to store these five (5) user accounts in.

A domain-specific language created and developed for the management of varied data stored in a relational (structured) database is known as SQL, which stands for the structured query language.

A SQL database, then, is an internal source that consists of tables used to store a certain volume of structured data, such as the five (5) user accounts.

Therefore, the correct answers are as follows:

A. LDAP.

B. SQL database.

C. Flat file.

D. Active Directory.

Know more about Remote Authentication Dial-In User Service (RADIUS) here:

https://brainly.com/question/15397099

#SPJ4

Question 4
The following code is intended to test if x is at least 5. Fill in the correct symbol:

if x ____ 5:

Answers

The correct symbol to use in the comparison in this case would be ">=", which stands for "greater than or equal to".

So the statement should be :

if x >= 5:

What is the code about?

The above code tests if the value stored in the variable x is greater than or equal to 5. If the test evaluates to true (meaning x is greater than or equal to 5), the code inside the if block will be executed. If the test evaluates to false (meaning x is less than 5), the code inside the if block will not be executed.

Therefore, It's important to note that other symbols or operations such as ">" (greater than) or "==" (equal to) could be used to test for different values of x . For example, to test if x is exactly equal to 5 you would use "==" instead of ">="

Learn more about coding from

https://brainly.com/question/23275071

#SPJ1

(a) Create an evenly spaced vector of values from 1 to 20 in increments of 1. (b) Create a vector of values from zero to 2p in increments of p/10. (c) Create a vector containing 15 values, evenly spaced between 4 and 20. (Hint: Use the linspace command. If you can't remember the syntax, type help linspace.) (d) Create a table of conversions from feet to meters. Start the feet column at 0, increment it by 1, and end it at 10 feet. (Look up the conversion factor in a textbook or online.) (e) Create a table of conversions from radians to degrees. Start the radians column at 0 and increment by 0.1 pradian, up to p radians. (Look up the conversion factor in a textbook or online.) (f) Create a matrix aequal to [-1/3, 0, 1/3, 2/3], and use each of the built-in format options to display the results: format short (which is the default) format long format bank format shorte format long e format short eng format long eng format short g format long g format + format rat W

Answers

Use one of the built-in format choices to show the outcomes: brief format (which is the default) format long, format bank, format shorte, format long e, format short g, format long g, and format + rat W

a.)With step 1, the range 1:10 will produce a vector of numbers from 1 to 20.

command:

v1 = 1:20

b.) The range 0:pi/10:2*pi will produce a vector of numbers with a step of pi/10 from 0 to 2*pi.

command

v2 = 0:pi/10:2*pi

c.) The linspace(4,20,15) command will output a list of 15 values evenly spaced between 4 and 20.

command

the v3 = linspace (4,20,15)

d.) Make a column of numbers in the range of 0 to 10, representing the values of the feet. To translate these values to metres, multiply this vector by 0.3048.

command

feets = [0:10]';

feet *0.3048' times metres;

the table, t1 (feets,metres)

e) Make a column of numbers from 0 to pi with a step size of 0.1*pi. The corresponding degree values can be obtained by multiplying it by 180/pi.

command:

"radians" = [0:0.1*pi:pi];

degrees are determined by converting radians to radians*180 pi;

Table: t2 (radians,degrees)

Define the provided vector as m. To show the vector, use the disp() command after setting each format individually.

command:

m = [-1/3 0 1/3 2/3];

brief format

disp(m)

long format

disp(m)

bank format

disp(m)

short e format

disp(m)

style long e

disp(m)

format brief eng

disp(m)

long eng format

disp(m)

short format g

disp(m)

lengthy g format

disp(m)

style +

disp(m)

rat format

disp(m)

Learn more about long here:

https://brainly.com/question/11059729

#SPJ4

The limit for characters in modern file systems is too small to accommodate keywords in titles. please select the best answer from the choices provided true false

Answers

The answer is incorrect since current file systems do not put limitations on file path lengths, but the maximum length of any file or directory name is 255 characters or fewer. While file systems may not limit the lengths, an operating system (OS) that uses a file system normally does. There is a 4096 character in Linux.

What is file system?

A file system, often known as a filesystem, is the method by which files are identified and logically stored and retrieved in a computer. Without a file system, stored data would not be separated into discrete files, making it impossible to identify and retrieve.

Here,

The answer is incorrect since current file systems do not impose length limitations on file paths, however the maximum length of any file or directory name is 255 characters or fewer. While file systems may not be limited in length, an operating system (OS) that uses a file system generally is. A 4096 character is available in Linux.

To know more about file system,

https://brainly.com/question/2532502

#SPJ4

The current file systems do not put limitations on file path lengths, but the maximum length of any file or directory name is 255 characters or fewer.

While file systems may not limit the lengths, an operating system (OS) that uses a file system normally does. There is a 4096 character in Linux.

What is file system?

A file system, often known as a filesystem, is the method by which files are identified and logically stored and retrieved in a computer. Without a file system, stored data would not be separated into discrete files, making it impossible to identify and retrieve.

The answer is incorrect since current file systems do not impose length limitations on file paths, however the maximum length of any file or directory name is 255 characters or fewer. While file systems may not be limited in length, an operating system (OS) that uses a file system generally is. A 4096 character is available in Linux.

To know more about file system kindly visit
brainly.com/question/2532502

#SPJ4

Which substance is the reducing agent in the reaction below?
Pb+PbO2 +2H2 SO4 (R) 2PbSO4+ 2h2O
A) Pb
B) H2SO4
C) PbO2
D) PbSO4
E) H2O

Answers

In the process below, PbO2 is the oxidizing agent while Pb is the reducing agent.

P4: Is it a reductant?

A material that undergoes oxidation to a higher valency state and loses electrons to other substances during a redox reaction is referred to as a reducing agent. A reducing agent is one of the reactants in an oxidation-reduction reaction, which lowers the other reactant by releasing electrons onto it.

Does H2 act as a reducer?

A donor of electrons is hydrogen. Numerous substances, including H2, Li, CO, Fe, and Zn, are reducing agents. The fact that hydrogen reacts with metallic oxides of iron, copper, zinc, lead, etc. to remove the oxygen makes it one of them that is regarded as an excellent reducing agent.

To know more about reducing agent visit:-

https://brainly.com/question/2890416

#SPJ4

you have exceeded the limit for viewing this page and your limit will be reset as of tomorrow.

Answers

When you see the above message, you are barred from viewing the appointments page until 12 am EST the next day. It's best to log out and not log back in until 12 a.m. EST the next day.

Logging out means exiting a computer system or a website. Logging out communicates to the computer or website that the current user wishes to terminate the login session. Log out is also spelled log off, sign off, and sign out.

The time between logging in and logging out is the duration of the login session, which is the time during which a user can perform his or her actions. Logging out can be done in two ways: using the log-out option provided by an application or the system, shutting down the computer, or closing an application without explicitly logging out. Some websites will automatically log out a user if the login session has been inactive for an extended period of time.

Learn more about log out here:

https://brainly.com/question/29994711

#SPJ4

Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.)a. Ethernetb. HTTPc. IPd. UDPe. SMTPf. TCP

Answers

IP is a network layer protocol, TCP and UDP are transport layer protocols, while SMTP and HTTP are application layer protocols, according to the remaining answers.

What is TCP/IP protocols?

TCP/IP, or the Internet protocol suite, is a framework for arranging the variety of communication protocols used in the Internet and related computer networks based on functional requirements. TCP/IP is an abbreviation for Transmission Control Protocol/Internet Protocol, and it refers to a set of communication protocols used to link network devices on the internet. TCP/IP is also used in a private computer network as a communications protocol (an intranet or extranet).

Here,

IP is a network layer protocol, TCP and UDP are transport layer protocols, while SMTP and HTTP are application layer protocols.

To know more about TCP/IP protocols,

https://brainly.com/question/30114641

#SPJ4

objects in an array are accessed with ________, just like any other data type in an array.
(a) subscripts
(b) parentheses
(c) #include statements
(d) output format manipulators
(e) None of these

Answers

The objects in an array are accessed with option (a) subscripts, just like any other data type in an array.

What is the subscripts about?

An array is a data structure that stores a collection of elements of the same type, such as integers, strings, or objects. Each element in an array is assigned an index, which is a numerical value that represents its position in the array. These indexes are used to access the elements stored in the array.

The term Subscripts are used to specify the index of the element in the array that you want to access.

For example, if you have an array called "myArray" and you want to access the third element, you would use the syntax "myArray[2]" because arrays are typically zero-indexed.

Learn more about  subscripts from

https://brainly.com/question/28138336

#SPJ1

Snake Eyes
My code:
var SENTINEL = 1;
function start(){
var diceOne;
var diceTwo;
while(true) {
println("" + diceOne + "," + diceTwo);
diceOne = Randomizer.nextInt(1,6);
diceTwo = Randomizer.nextInt(1,6);
if (diceOne && diceTwo == SENTINEL){
println("" + diceOne + "," + diceTwo);
break;
}
}
}
What am I doing wrong here?
1
SEE ANSWER
Answer

Answers

The getResults() method produces a string containing either "Throw again," "win," or "lose," and if it returns "throw again," the loop continues, else it breaks.

When I get the "Throw again" command, this code currently leads me into an infinite loop. The loop just calls getResults() once to get the results. However, I'm not sure how to have that loop run the method again and check for the string after each 'Throw again' command. Create a loop that executes a method and returns the results at least once.

public String playCraps() {

       String results;

       do {

           getResults();

           results = getResults();

           System.out.println(results + "\n*************");

       } while (results.contains("Throw again"));

       return "\n*********";

   }

Learn more about string here-

https://brainly.com/question/14528583

#SPJ4

If the return value is "throw again," the loop continues; otherwise, it ends. The getResults() method creates a string that either says "Throw again," "win," or "lose."

What does Javascript's continue in for loop mean?

The continue statement stops the statements in the current iteration of the current or labeled loop from being executed and starts the loop's execution with the subsequent iteration.

public String playCraps() {

      String results;

      do {

          getResults();

          results = getResults();

          System.out.println(results + "\n*************");

      } while (results.contains("Throw again"));

      return "\n*********";

  }

Learn more about continue in for loop

brainly.com/question/15690925

#SPJ4

Write a statement that prints "Hello, world" to the screen. Write a complete main method that prints "Hello, world" to the screen Suppose your name was Alan Turing Write a statement that would print your last name, followed by a comma followed by a space and your first name

Answers

A statement that prints "Hello, world" to the screen in Java is given below:

The Java Statement

public class Hello

{

public static void main( String [] args )

{

System.out.println( "Hello, world" );

System.exit( 0 );

}

}

Like declaration and string statements, Java statements are directives that tell the computer language what to do.

Basic statements define variables, launch Java methods, or begin blocks of other statements from being executed. Assignment statements give variable values.

The given statement writes and gives the output "Hello World" when run on an IDE.

Read more about java here:

https://brainly.com/question/18554491

#SPJ1

Basic statements set parameters, start Java methods, or stop blocks of other statements from running. Assignment clauses produce variable values.

Program:

The Java Statement

public class Hello

{

public static void main( String [] args )

{

System.out.println( "Hello, world" );

System.exit( 0 );

}

}

What is Java's primary method?

Because it serves as the starting point for executing a Java program, the Java main method is typically the first method you encounter while learning to program in Java. Any class that is a part of a program may contain the main method, which can contain code to run or call other methods.

In core Java, how do you write a method?

Java requires the method name to be followed by a pair of parentheses (), then a semicolon ( ; ). A class's filename must match it ( Main and Main.java).

To know more about java visit:-

brainly.com/question/18554491

#SPJ4

_____ networks use multiple wi-fi access points to create a wide area network.

Answers

Despite the fact that WiFi extenders and mesh networks both increase wireless coverage, mesh networks are far more intelligent, functionally superior, and capable of significantly more WiFi signal expansion.

Which is 2.4 or 5 in a mesh network?

Mesh Wi-Fi networks, as you may already be aware, combine the 2.4 GHz and 5 GHz bands into a single network. Speed and range are the two main distinctions between 2.4 GHz and 5 GHz frequencies.

Is the 4G network mesh?

Using the 5Ghz spectrum and cutting-edge TDMA techniques, Mesh 4G offers on-street devices high bandwidth connections. It was created in 2003 and has since been implemented in more than 42 towns and cities around the UK.

To know more about mesh networks visit:

brainly.com/question/17648902

#SPJ4

rkspaces in Fusion 360 allow you to navigate to task specific parts of the software allowing access to specific tools. Some of the workspaces in Fusion 360 are:

Answers

Some of the workspaces in Fusion 360 allow users to navigate tasks to specific parts of the software allowing access to specific tools is Patch, Model, Animation, and Assemble.

What are workspaces in Fusion 360?

The Fusion 360 is a software application to aid commercial computer design, computer engineering, computer manufacturing, and printed circuit board.

The Fusion 360 have a feature called workspaces as the virtual space to view, work, and store the data items and task that have common or share the same attributes.

Since the workspaces are based on the same attributes, it allows user to navigate to task specific parts this including workspaces for Patch, Model, Animation, and Assemble.

Your question is incomplete, but most probably your full question was

workspaces in Fusion 360 allow you to navigate to task specific parts of the software allowing access to specific tools. Some of the workspaces in Fusion 360 are:

Learn more about Fusion 360 here:

brainly.com/question/28343272

#SPJ4

The "s" in "https" stands for ________ socket layer.
A.) semantic
B.) secure
C.) server
D.) social

Answers

Answer:

The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website.

Explanation:

so the answer is B. secure

Answer/conclusion-

secure

Explanation-

The letter "s" in "https" stands for secure, and https stands for hyper text transfer protocol secure.

Choice B.) is the right one

look at the following statement. while (x++ < 10) which operator is used first?
A. ++
B. <
C. Neither the expression is invalid

Answers

In (x++<10) < i.e., option (B) operator is used first.

An operator is a special symbol used to tell the compiler to perform a mathematical or logical task. There are 5 basic types of operator. These +, -,*, /, ++, % are some t5ype of operators

The precedence of operators is a rule that decided which operator will be solved in an equation with more than one operator. Different operators have different precedence. The higher precedence operator is evaluated first.

The order of precedence goes from unary operators to multiplicative operators to additive operators to shift operators to relational operators to equality operators and so on.

To know more about operators visit:

https://brainly.com/question/20468080

by default, when microsoft access creates a relationship between two tables, it creates a(n):

Answers

Microsoft Access automatically establishes 1:1 associations between tables. In Microsoft Access, the Indexed property of the foreign key column needs to be set to Yes in order to build a 1:1 relationship (No Duplicates).

What key establishes a connection between two tables?

A foreign key aids in defining the connection between tables. In a relational database, this special key transmits one or more relationships between two or more tables.

What in MS Access is a relationship?

The information in one table in a relational database (Access) is connected to the information in other tables. Tables can typically relate to one other in one of three ways: one-to-one, one-to-many, or many-to-many. Information between tables is cross-referenced using the relationship.

To know more about Microsoft Access visit:-

https://brainly.com/question/26695071

#SPJ4

A(n) __________ database organizes data in two-dimensional tables.
a. relational
b. object-oriented
c. rectangular
d. multidimensional

Answers

Two-dimensional tables are used in relational databases to organize data.

Does Rdbms utilize 2D tables to store data?

Entity-relationship diagrams are used by the relational database model to explain the relationships between the data and to store data in (a) two-dimensional tables. Managers need technologies that enable them to use information as a crucial resource and gain a competitive advantage.

Which database model represents relations using two-dimensional tables?

Database relational model. The numerous software programs needed to maintain relational databases are referred to as relational database management systems (RDBMS). The information is arranged in two-dimensional tables with rows and columns in this kind of database model, and the relationship is preserved by storing a common field.

To know more about relational databases visit:-

https://brainly.com/question/13262352

#SPJ4

5.8.4: Word Counts RUN CODE GRADING SAVE SUBMIT +CONTINUE EXERCISE DOCS HELP MORE 3 public class WordCounts extends ConsoleProgram In this program you will ask the user for a String, and then output the count of every word in that String in alphabetical order. You'll need to use a HashMap to do this 5 public void run() 8 9 For example if the user entered *This method takes a HashMap of word counts and print Hello hello world 12 13 14 15 16 ▼ 17 18 19 * each word and it's associated count in alphabetical * aparam wordCount The HashMap mapping words to each w private void printSortedHashMap(HashMap

Answers

Program that will request a String from the user console.log(string.split(""). string.split(b).length - string.split(a).length sort((a,b))

How are words in a string array counted?

Pass the byte array to the constructor of the String class to create an instance of it. Read the words from the String into an array using the split() technique. Create an integer variable and set its initial value to 0. Then, for each entry of the string array in the for loop, increase the count.

How do you determine how many words are in a string?

Establish a string. We will loop through the string and count the number of spaces to determine how many words are present because a gap always follows each word. if a space is used to begin a string.

To know more about String visit:-

https://brainly.com/question/14528583

#SPJ4

having a(n) ____ allows a machine to approximate the way a person sees, hears, and feels objects.

Answers

A perceptive system enables a computer to simulate how a person might see, hear, and feel certain objectives.

What are the expert system's four components?

A knowledge base, a search or inference engine, a knowledge acquisition system, and a user interface or communication system are the four main parts of an expert system.

What does an AI expert system do?

An expert system is a piece of computer software that mimics the decisions and actions of a person or group of individuals who have expertise and experience in a particular field. Expert systems use artificial intelligence (AI) techniques to do this. Expert systems are frequently created to complement human specialists rather than to take their place.

To know more about artificial intelligence visit:-

https://brainly.com/question/23824028

#SPJ4

After adding a shape to a slide, you can change its default characteristics by adding ____. a. numbers b. bullets c. text d. styles.

Answers

You can add styles to a shape after you've added it to a slide to alter its default characteristics.

An individual page or image is referred to as a slide in a slide show or slide presentation. A single image, for instance, is regarded as a slide when viewing a slideshow of ten images.

A slide in a presentation or software program like PowerPoint is a page of text, graphics, or animations. Four slides are displayed, for instance, in the slide layout on the right.

Slides, which can also be an acronym for Slides, denotes several slides when used as a plural noun (more than one). The slide is the term used to describe 35mm slide film, which was created in the middle of the 1930s and was popular up until the early 2000s. Since then, 35mm film strips have taken the place of slides.

Learn more about slide here:

https://brainly.com/question/12014793

#SPJ4

The elapsed time for data to make a round trip from point A to point B and back is called ____.
A) speed
B) latency
C) mHz
D) access time

Answers

The correct answer is B) latency . The elapsed time for data to make a round trip from point A to point B and back .

Delay is another word for latency. In the world of telecommunications, low latency is linked to good user experience (UX), whereas high latency is linked to bad UX. The term "latency" in computer networking refers to the amount of time it takes for a data packet to move between two specified points. A packet of data's latency is the amount of time it really takes for it to travel between its point of origin and destination. Milliseconds are used as the unit of measurement for delay. Network and application performance can be negatively impacted by even a little amount of latency, such as 50 milliseconds, or less than one-tenth of a second.

To learn more about latency click the link below:

brainly.com/question/14264521

#SPJ4

Which of the following commands would correctly set the DNS socket pool to a value of 7,000?
dnscmd /Config /SocketPoolSize 7000

Answers

commands correctly set the DNS socket pool to a value of 7,000 would dnscmd /Config /SocketPoolSize 7000.

What kind of computer command would this be?

The ls command is the most fundamental and practical command. Our source code files and other important files are frequently organized in particular directories on the system. All folders in the current directory will be shown using the ls command.

A command in a programming language is a special word used to carry out a particular action. For instance, the command "print" can be used to show text on the screen. The command below must be entered and carried out to print "Hello World!" on the screen.

To know more about command visit:

https://brainly.com/question/29627815

#SPJ4

System software performs all the following functions except ______ . Select one:
a. starting up the computer. b. word processing. c. communicating with hardware.
d. running applications.

Answers

Answer:

b

Explanation:

doesn't perform word processing

the ________ directive causes the contents of another file to be inserted into a program. Select one:
a. Backslash
b. Pound sign
c. Semicolon
d. #include directive
e. None of these

Answers

Answer:

A.

backlash is the correct answer

a(n) ____ database is designed to support a company’s day-to-day operations.

Answers

A(n) enterprise database is designed to support a company’s day-to-day operations.

In computer and technology, An enterprise database generally can be described as a database that used by large organizations and enterprises  to manage their huge collection of data. An enterprise database is used by a company or organization to improve their efficiency. There are several types of database, such as Flat Model, Network Model. Relational Model, Hierarchical Model, Dimensional Model. There are several examples of database, there are MySQL, SQL Server,  Informix, Sybase, MongoDB, Oracle Database, PostgreSQL.

Here you can learn more about enterprise database https://brainly.com/question/4559986

#SPJ4

Growth in 2 Dimensions ALL Start with an infinite two dimensional grid filled with zeros, Indexed from (1,1) at the bottom left corner with coordinates increasing toward the top and right. Given a series of coordinates (r, c), where ris the ending row and cis the ending column, add 1 to each element in the range from (1.1) to (r, c) inclusive. Once all coordinates are processed, determine how many cells contain the maximal value in the grid. Example upRight=["14", 23", "4 17 The two space-separated integers within each string represent rand crespectively. The following diagrams show each iteration starting at zero. The maximal value in the grid Is 3, and there is 1 occurrence at cell (1, 1)

Answers

An endless two-dimensional grid of zeros, with coordinates indexed from (1,1) in the bottom-left corner and ascending up the top and right, is the starting point. Given a set of coordinates (r,c) in which r denotes the last row and c the last column

How is a two-dimensional heat equation solved?

Assume the plate has the following measurements: a b. The plate is heated in some way, and the top and bottom are then insulated. The temperature of the plate at position (x,y) and time t is given by u(x,y,t).

What in C is a two-dimensional array?

In the language C, a two-dimensional array can be compared to a matrix with rows and columns. A two-dimensional array can be declared using the following generic syntax: An array includes a two-dimensional array.

To know more about dimensional visit:-

https://brainly.com/question/24180383

#SPJ4

together, the fcs and the header make up the ____-byte "frame" for the data.

Answers

The header and FCS field set it apart from other Ethernet frame types, and together they make up the ___byte "frame" containing the data.

Ethernet: What is it?

Ethernet is the protocol of choice for connecting devices in a wired LAN or WAN (WAN). It enables the employment of a protocol, which is a collection of instructions or universally understood network language, to allow devices to communicate with one another.

Ethernet deals with how network gear formats and transmits data so that other hardware linked to the same LAN or campus network can recognise, receive, and process the data. The actual, covered wiring that makes up an Ethernet connection is used to carry data.

Know more about  containing Visit:

https://brainly.com/question/28558492

#SPJ4

Other Questions
What was the largest Delta town to be affected by the flood?How did people leave the Delta before the levee broke?Where did they go?.Who was the main group of people to remain in the DeltasExplain the phrase "sharecropping was a form of economi Is there a Stage 5 in cancer? the majority of men who perpetrate assault and violence against women are harshly punished in the legal system. How did politics change in the South between the 1880's and the 1910's? In ABC, mA = , mB = , mC = . AB = c, AC = b, BC = a. Solve the triangle if a=45.0, b=26 and = 64 degrees Find the solution of the differential equation that satisfies the given initial condition. (dP)/(dt) = sqrt(Pt) P(1) = 2 how does the dervish in the story of baba abdalla respond when baba abdalla asks him to put the ointment on his right eye As a factor of production, oil reserves are counted as:A.) renewable resource and a part of capitalB.) nonrenewable resource and part of capitalC.) renewable resource and part of landD.) nonrenewable resource and a part of land What are three things that a mayor do? determine the value of d that complete the square of x^2+dx+64 How is the Law of Independent Assortment explained through meiosis? Geometry math perpendicular bisectors please help How much is sales tax in New Hampshire? What are the two alleles of this trait? How much does it cost to take someone to small claims court in Iowa? A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?Group of answer choicesThe packet will be sent directly to the destination host.The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host.The packet will first be sent to the default gateway, and then from the default gateway, it will be sent directly to the destination host.The packet will be sent only to the default gateway. Complete the table below by writing the symbols ionic compound cation anion + NaCl Na ci X CrCl4 4+ Cr c1 NH,Br N, Br Cu(OH)2 2+ Cu OH Cos Research and describe 4 unprofessional behaviors in the workplace. A student answered 46 problems on a test correctly and received a grade 92%. How many problems were on the test, if all the problems were worth the same number of points?Please I need help and I will mark Brainlist The energy change when 2 kg of aluminium melts is 132,000J. What is the Latent heat of fusion?