Julie has 3 printers installed on her windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?.

Answers

Answer 1

To set one of her printers as a default printer, Julie should go to Settings>devices<Printers and Scanners.

In the field of computers, printers and scanners are hardware devices that are used for printing of a document or scanning it when they are attached to a computer.

A user can have the settings of multiple printers installed on the computer but for feasibility can set a default printer for easy use.

To make a particular printer as a default one, you need to go to settings, then choose devices and then choose printers and scanners. Here, you can easily make the choice of your default printer.

Although a part of your question is missing, you might be referring to this question:

Julie has 3 printers installed on her windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?

Settings > Devices > Printers & scanners

Control Panel > Devices > Printers & scanners

Control Panel > Printers and scanners

Settings > Printers & scanners

To learn more about printers, click here:

https://brainly.com/question/28110846

#SPJ4


Related Questions

Iuanyware is a ________ application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

Answers

Iuanyware is a service application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

What is meant by IUanyWare?

All IU staff, faculty, and students have access to IUanyWare. You may stream the IU-licensed apps and software you need from anywhere, on any device, without having to download, install, or utilize a VPN for each one.

While IUanyWare enables you to stream your program from a web browser or mobile app, IUware lets you install software straight to your hard drive.

Iuanyware is a service program made to function inside of a web browser like Firefox, Chrome, Opera, or Edge.

IUanyWare exists a service available to all staff, faculty, and students at IU. No matter where you exists or what device you're utilizing, you can stream the IU-licensed apps and software you required— without containing to install each one or utilize a VPN.

To learn more about IUanyWare refer to:

https://brainly.com/question/17493537

#SPJ4

what is the approximate exponent range for a single-precision 32-bit binary floating-point number in ieee format. students must show the derivation of this number.

Answers

The Approximate exponent range for a single-precision 32- bit binary floating point number is 3.

What do you mean by Single- precision?

The 32-bit single-precision floating-point format can represent a wide range of numerical values and utilises less computer memory. This format, also known as FP32, is best suited for calculations that won't be adversely affected by some approximation.

A signed 32-bit integer variable has a maximum value of [tex]2^{31}[/tex]-1 = 2,147,483,647.

In IEEE format, 754 32-bit base-2 floating-point variable has a maximum value of (2 − [tex]2^{-23}[/tex]) × [tex]2^{127}[/tex] ≈ 3.4028235 × [tex]10^{38}[/tex].

Therefore, the 8-bit representation uses 3 exponent bits, while the 32-bit representation uses 8 exponent bits.

To learn more about Single precision from the given link

https://brainly.com/question/29107209

#SPJ4

if you leave your study place in the library and leave your laptop open, or some indication that the space is being used, you are probably making use of:

Answers

If you leave your study place in the library and leave your laptop open, or some indication that the space is being used, you are probably making use of: a territorial marker.

What is library?

A library is a collection of resources, books, or media that are available for use rather than merely display. A library is a physical venue or a virtual area that provides physical (hard copies) or digital access (soft copies) to materials. A library's collection may comprise printed materials and other physical resources in a variety of media such as DVD, CD, and cassette, as well as access to information, music, or other content stored in bibliographic databases.

To learn more about library

https://brainly.com/question/27888406

#SPJ4

write a python program that counts the number of odd numbers, even numbers, squares of an integer and cubes of an integer from 2 to 130 (inclusive). for example, 9 is both odd and a square, 8 is even and a cube. use constants to set the beginning and ending of the range. for output, print a title with the total range. for odd and even, print the totals and the range of the numbers in scope. for squares and cubes, print the totals and a list of the numbers that meet the criteria nothing printed should be hard coded

Answers

Answer:

numbers = (2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19.20,21,22,23,24,25,26,2,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130)

count_odd = 0

count_even = 0

for x in numbers:

       if not x % 2:

         count_even+=1

       else:

         count_odd+=1

print("Number of even numbers :",count_even)

print("Number of odd numbers :",count_odd)

Explanation:

What is a python program?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues. Python provides three different paradigms for programming.

paradigms for object-oriented programming.paradigms for procedure-oriented programming.paradigms for functional programming.

You can use Python for web processing, machine learning, and even biology due to the more than 125,000 third-party modules that are now available. It is favored in data analysis because, with its data-focused modules like pandas, NumPy, and matplotlib, it is very skilled at processing, manipulating, and visualizing data.

To learn more about python, refer:

https://brainly.com/question/28691290

#SPJ4

count_odd = 0

count_even = 0

for x in numbers:

      if not x % 2:

        count_even+=1

      else:

        count_odd+=1

print("Number of even numbers :",count_even)

print("Number of odd numbers :",count_odd)

Python program :

      Python is a general-purpose, high-level programming language. Its design philosophy prioritises code readability by employing significant indentation. Python is garbage-collected and dynamically typed. It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming. Python is a programming language that supports multiple paradigms. Object-oriented and structured programming are fully supported, and many of its features support functional and aspect-oriented programming as well. Many other paradigms, such as design by contract and logic programming, are supported by extensions.

           Python manages memory using dynamic typing and a combination of reference counting and a cycle-detecting garbage collector. It employs dynamic name resolution, which binds method and variable names while the programme is running. Python is designed to be a simple language. Its formatting is clean and uses English keywords where other languages use punctuation. It does not use curly brackets to delimit blocks, and semicolons after statements are permitted but rarely used. There are fewer syntactic exceptions and special cases in it than in C or Pascal.

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ4

what is a simulation? a) simulation is the process of creating dashboards in excel. b) simulation is the process of complex formatting in excel. c) simulation is the imitation of the operation of a real-world process or system over time. d) simulation is the creation of macros over a period of time.

Answers

Simulation exists the imitation of the operation of a real-world process or system over time.

What is meant by Simulation?

A simulation exists an ongoing replica of how a system or process might work in the actual world. Models must be used in simulations; the model reflects the essential traits or behaviors of the chosen system or process, whilst the simulation depicts the model's development over time.

By enabling the testing of various scenarios or process improvements, a simulation is a model that replicates the operation of a current or proposed system. It provides evidence for decision-making. For a more immersive experience, this can be combined with virtual reality technology.

Therefore, the correct answer is option c) Simulation is the imitation of the operation of a real-world process or system over time.

To learn more about Simulation refer to:

https://brainly.com/question/28927678

#SPJ4

write a statement that calls a method named sendsignal. there are no arguments for this method.assume that sendsignal is defined in the same class that calls it.

Answers

A statement that calls a method named sends signal. There are no arguments for this method. Assuming the send signal is defined in the same class that calls it is sendsignal();.

What is coding?

We connect with computers through coding, often known as computer programming. Coding is similar to writing a set of instructions because it instructs a machine on what to do.

You can instruct computers what to do or how to behave much more quickly by learning to write code.

Therefore, assuming send signal is declared in the same class as the caller, the statement is sendsignal();.

To learn more about coding, refer to the link:

https://brainly.com/question/28903791

#SPJ1

what term is used to describe the likelihood (probability) that a project network's original critical path will change over the course of executing the project?

Answers

The term used to describe the likelihood(probability) that a project network's original critical path will change over the course of executing the project is Sensitivity.

How do you find the Critical path of a project?

1) List activities

2) Identify Dependencies

3) Create a network diagram

4) Estimate task duration

5) Calculate the critical path

6) Calculate the float

Through data-driven forecasting, project sensitivity is a comprehensive assessment of the likelihood that a project will be successful. Additionally, it distinguishes between high-risk and low-risk tasks, assesses risks' effects, and identifies dangers.

Hence, Project Sensitivity is the term used to describe the likelihood(Probability).

To learn more about the Critical path from the given link

https://brainly.com/question/15091786

#SPJ4

you have set up a smart house in packet tracer with many iot devices including a garage door and indoor lights. what happens if you position the cursor on the garage door and select alt click?

Answers

When one has set up a smart house in packet tracer with many IoT devices including a garage door and indoor lights. When one positions the cursor on the garage door and selects alt-click, " The garage door will open"

What is IoT?

The Internet of Things, or IoT, refers to the collective network of linked objects and the technology that enables the communication between devices and the cloud, as well as between devices.

The Internet of Things refers to physical items equipped with sensors, processing power, software, and other technologies that communicate and share data with other devices and systems over the Internet or other communication networks.

IoT is used in a variety of industries, including resource optimization using sensors in the industrial industry, real-timecorp and water resource monitoring in agriculture, and IoT equipment in healthcare. Setting security guidelines is critical for controlling the negative consequences of IoT applications.

Learn more about IoT:
https://brainly.com/question/19995128
#SPJ1

Full Question:

You have set up a smart house in packet tracer with many iot devices including a garage door and indoor lights. what happens if you position the cursor on the garage door and select alt-click?

A) The specifications of the garage door will display

B) The garage door will be removed

C) The garage door will open

D) The garage door will be associated with the home gateway

When we go behind the scenes at zak bagans’ the haunted museum in las vegas, we discover a cursed object given to zak by angry joe. What is it?.

Answers

The cursed item is a duplicate of the statue of liberty's head. It is claimed to be cursed since Furious Joe, who is notorious for being angry and cursing everything.

Who is Angry Joe?

Jose Antonio Vargas is an American media critic. He is best known for inventing the Angry Joe Show, a video game and movie review channel, and for playing the character Angry Joe. Vargas launched his channel Angry Joe Show on October 4, 2008, with the video In the show, Vargas' character "Angry Joe" rates a video game on a scale of 1 to 10. Sketches and footage from his Twitch streams are frequently included in these reviews. The community praised the channel, which has over one billion views and over 3,200,000 subscribers as of April 2021.

To learn more about Angry Joe
https://brainly.com/question/28247034

#SPJ4

are critical regions on code sections really necessary in an smp operating system to avoid race conditions or will mutexes on data structures do the job as well?

Answers

The answer to this question is Yes, it will. SMP or Symmetric Multiprocessing means computer processing done by multiple processors that distributed a common operating system (OS) and memory. In SMP, the processors share the same input/output bus or data path.

SMP (symmetric multiprocessing) can be described as computer processing done by multiple processors that distributed a common operating system (OS) and memory. In symmetric multiprocessing, the processors distributed the same input/output (I/O) bus or data path. A single copy of the OS is in charge of all the processors.

The characteristic SMP (symmetric multiprocessing) are all the processors are treated equally i.e. all are identical. Communication: Shared memory is the mode of communication among processors.

You can learn more about SMP (symmetric multiprocessing) at https://brainly.com/question/13384575

#SPJ4

1. Mrs. Reyes has Php100,000 cash invested in the business. She bought shop assets on account from Ace Furniture for Php 50,000.
Questions:
1. How much are the assets of the business?
2. What is the amount of liabilities?
3. How much is the owner’s equity?
4. What is the accounting equation applicable for this?

2. Kristan Repair Shop is owned by Cristina Tan. The business showed the following items:
Cash Php 30,000
Furniture and Equipment 10,000
Delivery Van 100,000
Accounts payable 40,000
Determine the following:
1. Total assets
2. Total liabilities
3. Owner’s equity
4. Give the accounting equation applicable for this.

3. Miss Adelaida Garcia invested asset amounting to Php160,000. She never bought anything on account.
Determine the following:
1. Assets
2. Liabilities
3. Owner’s equity
4. Accounting equation applicable for this

Answers

Answer:

35

Explanation:

In select circumstances, __ is permissible character on the mac operating system

Answers

In select circumstances, Options A, C, and D are permissible characters on the Mac operating system. Note that The colon ":" is the only character not permitted for Mac files.  

What is an operating system?

An operating system is a piece of system software that controls computer hardware and software resources while also providing common functions to computer programs.

An operating system (OS) is the software that handles all of the other application programs in a computer after being loaded into the machine by a boot program. The application programs interact with the operating system by requesting services via a predefined application program interface (API).

Learn more about Operating System:

brainly.com/question/1763761

#SPJ1

Full Question:

In select circumstances, _____ is a permissible character on the Mac operating system.

A. *

B. :

C. <

D. /

In cyberspace, bret attempts to steal consumers' credit card numbers stored in the networked computers of cinco corporation, a financial payments service provider. The quantity of data that can be stolen is limited by

Answers

The quantity of data that can be stolen is limited by the same physical limits that exist in the real world.

Quantitative data is defined as data that can be measured in numerical values. The two main kinds of quantitative data are discrete data and continuous data. Height in feet, age in years, and weight in pounds are examples of quantitative data. Qualitative data can be described as descriptive data that is not expressed numerically. Data quality means a measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability and whether it's up to date.

You can learn more about the quantitative data at https://brainly.com/question/96076

#SPJ4

There are different terms used to identify the types of animation used in motion picture projection. Which of the following is NOT a term used to identify a types of animation used in motion picture projection?


rotoscoping


cel animation


cut out animation


live action
HURRY IM TIMED

Answers

A terminology which is not used to identify a types of animation used in motion picture projection is: live action.

What is motion picture projection?

In Computer technology, motion picture projection is also referred to as motion graphics and it can be defined as a terminology which is used to describe images and texts that are often used for the design and development of logos and other moving elements (animation) in graphics, especially for both television (TV) and film.

In Computer technology, there are different types of motion picture projection and include the following:

RotoscopingCel animationCut out animation

In conclusion, rotoscoping simply refers to a technique that is typically used in animation or motion picture projection, in order to trace over live action frame by frame, especially in a motion picture footage.

Read more on motion graphics here: brainly.com/question/14883066

#SPJ1

use the drop-down menus to correctly complete these sentences about how variables can be defined. are single numbers or values, which may include integers, floating-point decimals, or strings of characters. a(n) is a group of scalar or individual values that are stored in one entity. a(n) is a data type that is assigned a true or false value by a programmer. a(n) is a data type that can be assigned multiple values.

Answers

Single numbers or values are known as scalars, and they can take the form of character strings, integers, or floating-point decimals.

Single numbers or values are known as scalars, and they can take the form of character strings, integers, or floating-point decimals.

An array is a collection of scalar or distinct values that are kept in a single object.

A data type that has been given a true or false value by a programmer is known as a user-defined type.

A data type with numerous values is called an abstract data type.

scalar, a physical quantity whose magnitude serves as its sole description. Volume, density, speed, energy, mass, and time are a few examples of scalars. Other quantities, like as force and velocity, are referred to as vectors since they have both magnitude and direction.

Real numbers that are typically positive but not always characterize scalars. When a particle moves in the opposite direction from the direction in which a force is acting, as happens when frictional force slows down a moving body, for instance, the work done on the particle by the force is a negative quantity. The standard algebraic principles can be used to modify scalars.

To know more about scalars click on the link:

https://brainly.com/question/21925479

#SPJ4

some people probably will take less time to recognize a man as a doctor than a woman as a doctor because a man more closely resembles their doctor algorithm. fixation. prototype. heuristic.

Answers

Locke, John (1632-1704)In a chapter he added to the fourth edition of his Essay Concerning Human Understanding, John Locke established the foundation for empiricist associationism and created the term "association of ideas"

Who is regarded as the first psychologist and is often referred to as the father of psychology?

In 1879, Wilhelm Wundt founded the Institute for Experimental Psychology at Leipzig University in Germany.Its opening is typically regarded as the start of modern psychology because this was the first laboratory specifically devoted to psychology.Wundt is in fact frequently referred to as the founder of psychology. The invisible gorilla study demonstrates that when we focus intensely on something, we frequently miss other, even very evident, things that are in our field of vision.All of us adore these peculiarities of human perception.Knowing that our senses can deceive us is amusing. John Locke (1632–1704) proposed a very significant theory in An Essay Concerning Human Understanding (1689) that the only knowledge that people may have is a posteriori, i.e., based upon experience, in response to the early–mid-17th century "continental rationalism." The pioneers of psychology as a science and academic field apart from philosophy are typically credited to two men who were active in the 19th century.Wilhelm Wundt and William James were their names. The "father of modern psychology," Sigmund Freud, an Austrian neurologist born in 1856, transformed the way we understand and treat mental health issues.Freud developed psychoanalysis in order to better comprehend patients' thinking by listening to them. Christopher Chabris and Daniel Simons describe how our brains deceive us into believing we see and know much more than we actually do in their new book, The Invisible Gorilla.The term "the unseen gorilla" originates from a study done ten years ago to examine selective attention. The gorilla appeared to be invisible.This experiment demonstrates two things: first, that we miss a lot of what is happening around us, and second, that we are unaware of how much we are missing.Unexpectedly, it has grown to be one of psychology's most well-known experiments.

       To learn more about  men psychology refer

        https://brainly.com/question/3951300

        #SPJ1

     

Core principles of user-centered software design were formulated by the as a way of promoting reliable expectations in the field.

Answers

Core principles of user-centered software design were formulated by the as a way of promoting reliable expectations in the field is a true statement.

What aspect of user-centered design is most crucial?

Finding out as much information as you can is crucial for a user-centered design to be successful. This aids in overcoming the inclination to naturally create for ourselves (or our stakeholders) as opposed to our intended audience.

Instead of more surface-level considerations, the emphasis should be on "deeper" insights. The underlying tenet of user-centered design is that you are more likely to produce goods that people will appreciate if you collect data from consumers and apply your findings into product design.

Therefore, Three principles are highlighted by user-centered design methodologies:

Early on, pay attention to users and their work.Inspect designs for usability.Develop iteratively.

Learn more about software design from

https://brainly.com/question/26135704
#SPJ1

Core principles of user-centered software design were formulated by the as a way of promoting reliable expectations in the field. True or false

a network administrator conducts a network assessment to determine where to implement a network intrusion detection system (nids). which sensor deployment option is most ideal if the admin is concerned about system overloads and resiliency in the event of power loss?

Answers

The sensor deployment option is most ideal if the admin is concerned about system overloads and resiliency in the event of power loss is option A.)Passive test access point (TAP).

What is Test Access Points (TAPs)?

Sensor deployment is done to accomplish goals like expanding coverage, boosting connection, enhancing robustness, or extending the lifespan of a certain WSN.

Consequently, a sensor deployment strategy must be properly planned in order to accomplish such desired functions without going over the budget allotted.

The idea of Test Access Points (TAPs) is straightforward. A TAP is a piece of hardware that maintains network integrity while enabling uninterrupted traffic flow from ports A to B and B to A. It does this by continually and continuously creating an exact copy of both sides of the traffic flow.

Therefore, A device with no physical barrier between its network ports is referred to as a passive network TAP. This implies that even if the device loses power, network port traffic can continue to flow, maintaining the link.

Learn more about access point  from

https://brainly.com/question/14781150
#SPJ1

See full question below

A network administrator conducts a network assessment to determine where to implement a network intrusion detection system (NIDS). Which sensor deployment option is most ideal if the admin is concerned about system overloads and resiliency in the event of power loss?

A.)Passive test access point (TAP)

B.) Active test access point (TAP)

C.) Aggregation test access point (TAP)

D.) Switched port analyzer (SPAN)/mirror port

logging on to one computer system and doing work on another. b. person-to-person messaging; document sharing - interactive conversations f. discussion groups on electronic bulletin boards c. transferring files from computer to computer - retrieving, formatting, and displaying information (including text, audio, graphics, and video) by using hypertext links. a. email b. chatting and instant messaging c. file transfer protocol (ftp) d. telnet e. world wide web f. newsgroups

Answers

First list provides a brief description of the principal internet services that are named in the second list. Mapping of each statement to the respective name is given as follows:

(a). E-mail is used for the purpose of communication and document sharing. So statement (ii) i.e. ‘person-to-person messaging; document sharing’ is the correct choice.

(b). Chatting and instant messaging services enable interactive conversations. So option (iii) ‘interactive conversations’ is the correct option.

(c). File Transfer Protocol (FTP) is a protocol used to transfer files between multiple computer systems. Option (v) ‘transferring files from computer to computer’ correctly reflects FTP.  

(d). Telnet is a network protocol that allows one to log on to one computer and use another computer. So, the statement in option (i) ‘logging on to one computer system and doing work on another’ correctly defines Telnet.

(e). World Wide Web is a big information system that allows sharing of information and all type of resources. Hence, statement given in (vi) i.e. ‘retrieving, formatting, and displaying information, including text, audio, graphics, and video, by using hypertext links’  is true.

(f). Newsgroups refer to the internet service that provides forums for the discussion of a specific topic. Thus,  (iv) ‘discussion groups on electronic bulletin boards’ is the correct choice.

Complete question is given here:

"

logging on to one computer system and doing work on another. person-to-person messaging; document sharing interactive conversations discussion groups on electronic bulletin boards transferring files from computer to computer  retrieving, formatting, and displaying information (including text, audio, graphics, and video) by using hypertext links.

(a).   Email   (b).   Chatting and instant messaging     (c).     File Transfer Protocol (FTP)   (d).   Telnet  (e).   World Wide Web     (f).  Newsgroups

"

You can learn more about Internet Services at

https://brainly.com/question/12566813

#SPJ4

Look at the following assignment statements:

food1 = "water"
food2 = "melon"

What is the correct way to concatenate the strings?

A. newFood = food1 == food2
B. newFood = food1 + food2
C. newFood = food1 * food2
D. newFood = food1 - food2

Answers

Answer:

B

Explanation:

Use the + and += operators for one-time concatenations

The real answer is:

Mark me brainliest. :D

3.1. in pam encoding, the general rule is that we need to sample at twice the bandwidth. in addition, if we use n bits for each sample, we can represent 2n loudness (amplitude) levels. what transmission speed would you need if you wanted to encode and transmit, in real time and without compression, two-channel music with a bandwidth of 22 khz and 1000 loudness levels? (10 points) note: the sampling size, in bits, must be an integer. to minimize quantizing errors, it is customary to select a sampling rate that is twice as much as the signal bandwidth. 3.2. how much disk space would you require to store 1 minutes of digital music as you calculated above? (10 points)

Answers

3.1) Transmission speed would you need if you wanted to encode and transmit, in real time and without compression is 640kbps.

3.2) 137.33MB  disk space would required to store 1 minutes of digital music.

What is transmission speed?

The rate at which data packets travel a computer network from one server to another is referred to as transmission speed.

3.1) According to the inquiry, the bandwidth is 20 kHz.

The bandwidth will be doubled using Nyquist sampling.

So, bandwidth = 2 × 20 kHz= 40 kHz.

Loudness level = 40, 000 that is log₂ (40,000)~ 16 bits for each samples transmitted.

Now compute the transmission speed using the below way

Transmission speed = 16 bits × 40 kHz

= 640 kbps

Therefore, transmission speed is 640 kbps.

3.2) 30 minutes must be saved from the given question.

Now convert the given minutes to seconds that is 30 minutes × 60 sec = 1800 sec.

The disc space required to store 30 minutes of digital music is listed below.

= transmission speed × 1800 sec.

=640kbps ×1800sec

=640×1000bps × 1800 sec (that is 1kbps=1000bps)

=1152000000bits

1152000000/8 bytes (For convert bits to bytes)

=144000000bytes

144000000/1024 KB (For convert bytes to kilobytes)

=140625KB

=140625/1024MB (For convert kilobytes to mega bytes)

=137.33MB

Therefore, disk space for storing 30 minutes of digital music is 137.33 MB.

To learn more about transmission speed

https://brainly.com/question/13013855

#SPJ4

what is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

Answers

Giving a user permissions, such as access levels and privileges like file access, access times, and designated storage space, involves authentication.

How does authentication work?

Authentication is the process of ensuring that someone or something is, in fact, who or what it claims to be.Authentication technology restricts access to systems by comparing a user's credentials to those kept on a data authentication server or in a database of authorized users.There are three types of authentication factors:A password or personal identification number (PIN) is something you know; a token, like a bank card, is something you have; and biometrics, like voice and fingerprint recognition, are something you are.Password authentication, which uses a username and password combination, is the most popular kind of authentication.One well-known example is gaining access to a user's account on a website or service provider .To protect systems and data, administrators use authentication and authorisation as two essential information security procedures.Through authentication and authorisation, the identity of a person or service is established, as well as their access rights.A certificate of authenticity is essential for products like jewelry, original works of art, and autographs.This piece of paper certifies that your product is original and not a replica or fakeYou must contact a certified authenticator in your industry in order to acquire your certificate.

         

        To learn more about authetication refer

        https://brainly.com/question/28240257

        #SPJ1

2. about how long would a 150-pound person have to jog in order to burn the calories provided by a typical bagel of today (no toppings)? 10 minutes 20 minutes 40 minutes 60 minutes

Answers

The time that a 150-pound person will have to jog in order to burn the calories provided by a typical bagel of today is C. 40 minutes

How to calculate the time?

A typical bagel contains 350 calories. A 150-pound weight person can burn around 500 calories during general jogging per hour or 60 minutes. So, to burn 350 calories, he needs to jog for,

60 minutes ---> 500 calories

x ---> 350 calories

x = 350 * 60 / 500

x = 42 minutes

where x = number of minutes.

So, the person needs to jog for nearly 40 minutes to burn the calories provided by a typical bagel.

Thus, the correct option is C.

Learn more about calories in;

https://brainly.com/question/1061571

#SPJ1

you are given an array segments consisting of n integers denoting the lengths of several segments. your task is to find among them four segments from which a rectangle can be constructed. what is the minimum absolute difference between the side lengths of the constructed rectangle?

Answers

Using the knowledge of computational language in python it is possible to describe an array segments consisting of n integers denoting the lengths of several segments.

Writting the code:

int solution(int[] segments) {

 

 int size = segments.length;

 

 if(size < 4) {

 

  /*

   * A rectangle needs at least 4 segments.

   */

  return -1;

 }

 

 /*

  * We count the number of segments of each length.

  */

 Map<Integer, Integer> counts = new HashMap<Integer, Integer>();

 for(int i = 0; i < size; i++) {

  counts.put(segments[i], counts.getOrDefault(segments[i], 0) + 1);

 }

 

 /*

  * If count of any length is >= 4, then the minimum difference is 0, as a rectangle

  * can be constructed using same-length segments.

  */

 for(int key : counts.keySet()) {

  if(counts.get(key) >= 4) {

   return 0;

  }

 }

 

 /*

  * Else, we do the following :

  *

  * 1. Remove all entries with counts less than 2.

  */

 Set<Integer> keysToRemove = new HashSet<Integer>();

 for(int key : counts.keySet()) {

  if(counts.get(key) < 2) {

   keysToRemove.add(key);

  }

 }

 

 for(int key : keysToRemove) {

  counts.remove(key);

 }

 

 /*

  * 2. Sort all the keys.

  */

 Object[] keys = counts.keySet().toArray();

 Arrays.sort(keys);

 

 /*

  * 3. Return the difference of last 2 elements (if size is >= 2).

  */

 if(keys.length < 2) {

  return -1;

 }

 

 return ((int)keys[keys.length - 1] - (int)keys[keys.length - 2]);

}

See more about python at brainly.com/question/19705654

#SPJ1

after having downloaded and installed pfblockerng for your pfsense firewall, you are configuring what sites to block. how do you block lists of websites you don't want the employees to access?

Answers

The steps that you may comply with to block lists of websites you do not need the employees to access are:

Create a written limited Internet use insurance for employees.Refuse to permit the Internet to get proper access to employees who do now no longer require it.Place passwords on laptop structures that get proper access to the Internet.Install software that controls Internet usage.

One way to block users from having the capability to overtake your net internet site online is to restrict their IP addresses. Based on your dialogue board or commenting host, like WordPress or Disqus, you may be able to locate the IP address of a purchaser from the admin dashboard or server logs.

You can learn more about The steps to block list of website at https://brainly.com/question/24129952

#SPJ4

Multiple computers configured to be able to communicate and share information with each other form a ____________.

Answers

Multiple computers configured to be able to communicate and share information with each other form a network.

In the field of computers, a computer network can be described as a network that contains multiple computers connected to each other so that data or information can be shared among these computers.

Local-area networks, also referred to as LAN and wide-area networks also referred to as WAN are two major forms of forming a computer network.

However, certain communication protocols are set for computer networking in order to keep check of the privacy of data that a user doesn't want to share.

In computer networking, nodes and links are used for making connections among the computers.

To learn more about network, click here:

https://brainly.com/question/1167985

#SPJ4

while you are performing troubleshooting, a program is not responding and will not close when the exit button is clicked. how can you end the frozen program without losing your other work?

Answers

Press Alt + F4 can be clicked when you want to end the frozen program without losing your other work.

The way to solve troubleshooting that you can follow is Select Start > Settings > Update & Security > Troubleshoot, or select the Find troubleshooters shortcut at the end of this topic. Select the kind of troubleshooting you want to do, then select Run the troubleshooter. Permit the troubleshooter to run and then answer any questions on the screen.

If you're having trouble with a specific piece of computer hardware, such as your monitor or keyboard, an easy first step that you can follow is to check all related cables to ensure they're exactly connected.

Learn more about troubleshooting at https://brainly.com/question/28157496

#SPJ4

a plc program requires a routine where a sint value is subtracted from a sint value. what is the smallest data type available that can accurately hold the full result for all possible input cases.

Answers

INT is the smallest data type available that can accurately hold the full result for all possible input cases.

An int way is a datum of important information type, an information kind that represents some styles of mathematical integers. Integral information types may be of numerous sizes and might or may not be legal to embody bad values. Integers are normally represented in a computer as a fixed of binary digits.

The int() is used to head again to the numeric integer identical to a given expression. An expression whose numeric integer is identical is returned. This example truncates the decimal and returns the integer as a part of the number.

Learn more about The int at brainly.com/question/16856574

#SPJ4

which form of attack submits excessive amounts of data to a target to cause arbitrary code execution? question 21 options: buffer overflow fragmentation insertion interruption

Answers

Answer:

i believe the answer is Buffer Overflow.
I could be wrong but that seems like the most reasonable answer.

Explanation:

Ethan is a systems developer. He is working on a system where he will implement independent solutions for different processes. What is the possible drawback of using such a system?
A.
process dependence
B.
data duplication
C.
huge initial investment
D.
increased inventory cost

Answers

The possible drawback of using such a system of implementing independent solutions for different processes is: B. data duplication.

What is data?

Data is any representation of factual instructions (information) in a formalized and structured manner, especially as a series of binary digits (bits) or strings that are used on computer systems in a company.

The types of data.

In Computer technology, there are two main types of data and these include the following:

Analog data.Digital data.

Generally speaking, when independent solutions that are implemented for different processes on a system, it would typically lead to data duplication.

Read more on data here: brainly.com/question/13179611

#SPJ1

Other Questions
Please help with Biology question if the original dna sequence is 3' - gtt tac ctc tcc gac atc - 5' [template strand] 5' - caa atg gag agg ctg tag - 3' [coding/non-template strand] a point mutation occur and change the sequence to 3' - gtt tac atc tcc gac atc - 5' [template strand] 5' - caa atg tag agg ctg tag - 3' [coding/non-template strand] what type of mutation is this? Mackenzie drove 68 miles in 1\tfrac{3}{5}1 5 3 hours. On average, how fast did she drive, in miles per hour? Enter your answer as a whole number, proper fraction, or mixed number in simplest form. nd the Geometry meand of 4 and 15. a baseball player exerts a force of 100n on a ball for a distance of 0.5m as he throws it. if the ball has a mass of 0.15kg, what is its velocity as it leaves his hand? The monthly cost (in dollars) of water use is a linear function of the amount of water used (in hundreds of cubic feet, hcf). the cost for using 18 hcf of water is $39.67, and the cost for using 37 hcf is $69.12. what is the cost for using 21 hcf of water? solve on a map. 1 inch equals 14.7 miles. if two cities are 3.5 inches apart on the map, how far are they actually apart? (round to a decimal) Draw In figure what the compass needles would show if that current is as shown in the figure. Make the arrow the north direction. (Please refer to picture) a half cylinder with a diameter of 2 mm is 9n top of a rectangular prism. A second half cylinder with a diameter of 4 mm is on the side of the prism. All shapes are 5 mm long. What is the volume of the combined figures? I'm quitr busy these days. I_ (do) a Course in college find the height of the trapezoidA=51CM2b=10cmb=7cmH? Assuming a direct proportion between the distance and time, how far would they travel in 5 hours? the relativity of deviance in space implies that: group of answer choices all societies would develop rules that prohibited certain forms of behavior. a behavior may be considered acceptable if it carries legal sanction. in all societies, at all times, some forms of behavior would be considered deviant. a behavior in a given society may be considered deviant only if it violates church rules. Montraie drove 220 miles in 5 hours. If he continued at the same rate, how long would it take to travel 88 miles? 2x+y = -7-4x -5y =23 By creating a General Court made up of delegates from each town in the colony, this document reflects the principle of:federalismindividual rightschecks and balancesrepublicanism Solve the equation using the justification given for each step. solve the problem. the total cost of producing x units of a certain commodity is given by does marginal cost increase or decrease with increasing production? not enough information to answer marginal cost is constant. marginal cost is increasing. marginal cost is decreasing. HELP ME OUT PLEASE!!!!!! Determine the relative frequency for the third class as a simplified fraction