PLEASE HELP
Filing systems consist of folders. The folders inside those main folders are called _____.
A) file extensions
B) storage drives
C) subfolders
D) drive letters

Answers

Answer 1

Filing systems consist of folders. The folders inside those main folders are called: C) subfolders.

What is a folder?

In Computer technology, a folder can be defined as a document that is typically used for storing and organizing a file on a computer system.

What is a folder hierarchy?

In Computer technology, a folder hierarchy can be defined as a strategic process that is typically used in grouping and organizing the ranking of a folder either from top to bottom or bottom to top, usually based on its elements.

In this context, we can reasonably infer and logically deduce that  any folder that is located within or inside a main folder is generally referred to as subfolders.

Read more on folder here: brainly.com/question/14832326

#SPJ1


Related Questions

Which of the following server roles does Apache perform

Answers

The server role that Apache perform is a web server. The correct option is a.

What is Apache perform?

The TCP/IP protocol is used by Apache to facilitate network communication between clients and servers. Although a wide range of protocols can be used with Apache, HTTP/S is the most popular.

Restarts Apache's HTTPd daemon with grace. The daemon is started if it is not already running. Unlike a typical restart, this does not terminate any open connections. The fact that old log files won't be promptly closed is a side effect.

Therefore, the correct option is a. web server.

To learn more about Apache reform, refer to the link:

https://brainly.com/question/29847911

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. web server

b. mail server

c. name server

d. certificate authority

Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers? (choose all that apply)
a. Total number of computers that could be connected
b. The processing speed of the computers connected
c. Cable length
d. No Internet access

Answers

The limitation of early networks that used a daisy-chain method of connecting computers is Total number of computers that could be connected and Cable length. the correct option is A and C.

The connections between network nodes, which are often computers, are governed by a type of network structure called a daisy chain. Different network topologies support various objectives, such as fault tolerance, persistence, and user-friendliness. The drawback of early networks that connected computers via a daisy-chain technique is Maximum number of linked computers and cable length

The first parallel interface was developed by Centronics and utilized in the Centronics 101 model printer in 1970. Despite the requirement for many wire kinds, this became the standard. Businesses like Dataproducts created connections with up to 50 pins.

Learn more about daisy-chain at https://brainly.com/question/29406442

#SPJ4

A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?
a Health Insurance Portability and Accountability Act (HIPAA)
b. Payment Card Industry Data Security Standard (PCI DSS)
c.Federal Information Security Management Act (FISMA)
d Federal Financial Institutions Examination Council (FFIEC)

Answers

B. 'Payment Card Industry Data Security Standard (PCI DSS)' would govern the privacy of information handled by the new point-of-sale terminals.

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards made to help any business that accepts, processes, stores, or transmits credit card information maintain a secure environment. In simple words, it is the system that optimizes the security of payments made through credit cards.

In the situation where a hospital is planning to deploy a new point-of-sale system in the canteen in order to handle credit card transactions.  In order to meet this purpose,  Payment Card Industry Data Security Standard (PCI DSS) would be an appropriate system.

You can learn more about PCI DSS at

https://brainly.com/question/29044331

#SPJ4

Keith is creating a database for his shop. Arrange the steps to create his database in the correct order.
Save the database.
Determine all field names.
Analyze the tables you require.
Define data types for fields.

Answers

Answer:

Analyze the tables you require.

Determine all field names.

Define data types for fields.

Save the database.

The marketing department at a local organization has detected malicious activity on several computers. In response, IT personnel have disconnected the marketing switch from the network. Identify which incident response lifecycle step IT has enacted.

Answers

IT personnel have enacted the containment step of the incident response lifecycle by disconnecting the marketing switch from the network.

Containment of Malicious Activity on Marketing Network

IT personnel have enacted the containment step of the incident response lifecycle by disconnecting the marketing switch from the network. This action helps to prevent the spread of malicious activity to other computers or systems on the network. It also helps to minimize the impact of the incident and contain any data loss or damage. This step is essential in responding to a security incident, as it helps to reduce the damage caused by the attack.

Learn more about marketing: https://brainly.com/question/14457086

#SPJ4

Which two services does BigQuery provide?

Storage and compute


Application services and analytics


Application services and storage


Storage and analytics

Answers

Storage and compute

Design of a Boron-Containing PTHF-Based Solid Polymer Electrolyte for Sodium-Ion Conduction with High Na + Mobility and Salt Dissociation. a. true
b. false

Answers

a. The design of a boron-containing PTHF-based solid electrolyte with high Na+ mobility and salt dissociation is true.

The design of a boron-containing PTHF-based solid polymer electrolyte for sodium-ion conduction with high Na+ mobility and salt dissociation is based on the assumption that boron substitution will improve ionic conductivity.

The Na+ mobility is improved by the incorporation of boron, which creates stronger electrostatic interactions between the Na+ and PTHF ions. The salt dissociation is also improved by the incorporation of boron, which creates stronger electrostatic interactions between the Na+ and PTHF ions.

For more questions like Electrolyte click the link below:

https://brainly.com/question/1336689

#SPJ4

What are the disadvantages of the Tree topology?

The network is heavily cabled

Easy to install and wire

Terminators are not required to create the network

Terminators are required to create the network​

Answers

Answer:

Disadvantages of Tree Topology :

1. This network is very difficult to configure as compared to the other network topologies.

2. The length of a segment is limited & the limit of the segment depends on the type of cabling used.

3. Due to the presence of a large number of nodes, the network performance of tree topology becomes a bit slow.

4. If the computer on the first level is erroneous, the next-level computer will also go under problems.

5. Requires a large number of cables compared to star and ring topology.

6. As the data needs to travel from the central cable this creates dense network traffic.

7. The Backbone appears as the failure point of the entire segment of the network.

8. Treatment of the topology is pretty complex.

9. The establishment cost increases as well.

10. If the bulk of nodes is added to this network, then the maintenance will become complicated.

Explanation:

Please mark me brainlest.

Which 2 of these statements are true about excluded bank transactions in the Banking center?

Answers

The two statements that are true about excluded bank transactions in the Banking center are

If the downloaded transaction was already recorded and reconciled in QuickBooks OnlineIf the bank downloads the same transaction more than once

What is a bank transaction?

The movement of money into and out of your bank account is documented by bank transactions. Your bank account will experience transactions when you have to make payments for business-related expenses, such as office space rent.

A bank will give you a bank receipt when you go there to deposit or withdraw money.

Therefore, the correct options are a and b.

To learn more about bank transactions, refer to the link:

https://brainly.com/question/13164233

#SPJ1

The question is incomplete. Your most probably complete question is given below:

If the downloaded transaction was already recorded and reconciled in QuickBooks Online

If the bank downloads the same transaction more than once

If the posting date and actual payment date don't match in the bank feed

If the bank description doesn't match the payee's name

Power Practical Portable LED Rope Light Lantern, Multiple Size Selection, Waterproof Luminoodle Rope Light for Outdoor Camping, Hiking, Emergencies Use.
a. true
b. false

Answers

Bending the rope light back and forth repeatedly can damage the internal wiring and components, therefore try to bend it just in one direction.

Winding your rope lights around tiny diameter poles and trees might cause the wiring to break and short out parts. The most common variety of rope light is 120V, which is suitable for most indoor and outdoor lighting installations where an electrical outlet is available. A 12V (DC) rope light is commonly used for parade floats, bikes, boats, and low voltage landscape lighting and is powered by a converter or battery. Bending the rope light back and forth repeatedly can damage the internal wiring and components, therefore try to bend it just in one direction.

Learn more about wires here-

https://brainly.com/question/17316634

#SPJ4

A technician has determined that she needs to replace a motherboard in a laptop. Which of the following procedures should you follow? (Choose two.)
A. Never use a power screwdriver with a laptop.
B. Document and label screw locations.
C. Refer to the manufacturer’s instructions.
D. Remove the keyboard before removing the motherboard.

Answers

Answer:c

Explanation: they made so they know how to fix it

The technician should follow procedures B. Document and label screw locations and D. Remove the keyboard before removing the motherboard.

When replacing a motherboard in a laptop, it is important to keep track of where each screw is located and to remove the keyboard before removing the motherboard.

Additionally, it is important to refer to the manufacturer's instructions for specific instructions and guidelines for replacing the motherboard. Never use a power screwdriver with a laptop, as this can cause damage to the device.

Learn more about Motherboard :

https://brainly.com/question/29834097

#SPJ4

Assume the name of your data frame is flavors_df. What code chunk lets you review the column names in the data frame?
a rename(flavors_df)
b col(flavors_df)
c arrange(flavors_df)
d colnames(flavors_df)

Answers

Suppose the name of your data frame is 'flavors_df.'  The code chunk that lets you review the column names in the data frame is D: 'colnames(flavors_df)'.

A data frame refers to a data structure that organizes data into a two-dimensional table of rows and columns, like a spreadsheet. Data frames are considered one of the most common data structures being used in modern data analytics. For this reason, they provide a flexible and intuitive way of storing and working with data.

In the context of the given phenomena where the name of a data frame is supposed to be 'flavors_df'. You want to check the column names in the data frame, so the appropriate code that allows you to do so is 'colnames(flavors_df)'.

You can learn more about data frame at

https://brainly.com/question/28016629

#SPJ4

Where in PowerPoint should a user navigate to complete the tasks listed below?
Save a presentation:
Add a table to a slide:
Repeat or undo an action:
Expand the options for a command group:

Answers

Answer:Add a table to a slide. ribbon. Repeat or undo an action. Quick Access Toolbar. Expand the options for a command group: ribbon. Which feature helps a user

Answer:

Where in PowerPoint should a user navigate to complete the tasks listed below?

Save a presentation:

✔ Quick Access toolbar

Add a table to a slide:

✔ ribbon

Repeat or undo an action:

✔ Quick Access toolbar

Expand the options for a command group:

✔ ribbon

Explanation:

Yeah

which of the following is a not for profit organization that originated in the uk and offers training and certification in cyber security?
a. ISACA leads the way in pursuing digital trust
b. creating a digital ecosystem where value is created
c. trust is the norm."
d. don't trust

Answers

ISACA is a not-for-profit organization located in the UK that offers training and certification in cyber security. Thus, A: 'ISACA leads the way in pursuing digital trust' is the correct option.

Founded in 1969 in the UK, ISACA is an independent, not-for-profit organization serving professionals in information security, risk management, and governance. These professionals rely on ISACA as a trusted source of information and technology knowledge, standards, certification, and community.  ISACA helps IT professionals to lead the way in pursuit of digital trust.

You can leanr more about ISACA at

https://brainly.com/question/29974524

#SPJ4


#include
#include
#include
#include

int value = 5;
int main(void)
{
pid_t pid = fork();
if (pid == 0)
{
value += 5;
printf("value = %d in FIRST CHILD process %d ppid = %d \n", value, getpid(), getppid());
exit(0);
}
else
{
wait(NULL);
printf("\n value = %d in parent FIRST process %d ppid = %d \n", value, getpid(), getppid());
pid = fork();
if (pid == 0)
{

value += 10;
printf("\n value = %d in SECOND CHILD process %d ppid = %d \n", value, getpid(), getppid());
exit(0);
}
}
value++;
printf("\n value = %d in parent SECOND process %d ppid = %d \n", value, getpid(), getppid());
return 0;
}

Answers

This is a C program that creates two child processes using the fork() function. The pid_t type is a signed integer type used to represent a process ID.

What does the program do?

The fork() function creates a child process that is a duplicate of the calling process. The function returns 0 in the child process and the child's process ID in the parent process. If the function fails to create a child process, it returns -1.

The if statement checks the value of pid to determine whether the process is the child or the parent. If pid is 0, it means that the process is the child. If pid is not 0, it means that the process is the parent.

The wait(NULL) function is called in the parent process to wait for the child process to complete before continuing execution.

The exit(0) function is called in the child process to terminate the child process and return a status of 0 to the parent.

Read more about C programming here:

https://brainly.com/question/15683939

#SPJ1

_____ work(s) with the hardware and control(s) the basic functioning of the computer.

Answers

Operating system work(s) with the hardware and control(s) the basic functioning of the computer.

What is the Operating system?

An operating system (OS) is a software program that manages and controls the resources of a computer. It acts as an intermediary between the computer's hardware and its software applications.

Note that the OS is responsible for managing and allocating the computer's memory, processing power, and storage. It also controls and manages input and output operations, such as keyboard input, mouse movement, and file access.

Learn more about Operating system from

https://brainly.com/question/22811693
#SPJ1

According to the text, which of the following technological advancements have aided the Internet's role in media convergence?
A. The development of digital technologies that allow information to be transferred as a series of binary codes
B. The development of smaller, personal computers, made possible through the development of microchips and microprocessors
C. The development of fiber-optic cable, which allowed a massive amount of information to be transmitted extremely quickly
D. All options are correct*

Answers

All options are correct. All the statements show technological advancements have aided the Internet's role in media convergence.

The Internet has played a significant role in the convergence of media, which refers to the combining of different forms of media such as television, radio, and print into a single platform or device. This convergence has been made possible by several technological advancements, including:

A. The development of digital technologies: Digital technologies allow information to be transferred as a series of binary codes, which can be easily transmitted and stored on a variety of devices. This has made it possible for people to access a wide range of media content, such as text, audio, video, and images, through the Internet.

B. The development of smaller, personal computers: The development of microchips and microprocessors has enabled the production of smaller, more powerful computers that can be easily carried and used by individuals. This has made it possible for people to access the Internet and media content from anywhere, at any time.

C. The development of fiber-optic cable: Fiber-optic cables are made of thin strands of glass or plastic and are used to transmit data over long distances. They have a much higher capacity for data transmission than traditional copper cables, making it possible to transmit a massive amount of information extremely quickly. This has allowed the Internet to support the streaming of high-quality video and other media content.

All of these technological advancements have contributed to the Internet's role in media convergence and have made it possible for people to access a wide range of media content from a single device.

Learn more about development: https://brainly.com/question/28011228

#SPJ4

Question: Define the following term:
(i) Dirty Read
(ii) Dimension table
(iii) Schema
(iv) ETL tool
(v) Concurrency

(Advanced Database Systems Course)

Answers

Answer:

dirty read means collection of uncommited data

dimension table refers to the collection or groups of information related to any event

Viewing the events of last January 6 needs to be placed in the context of a broader global crisis of “liberal democracy”. According to the 2021 World Freedom Report published by the think tank Freedom House, democracy has been in decline for 15 consecutive years, with some of the biggest setbacks occurring in the United States and India.

Answers

Yes it is true that According to the 2021 World Freedom Report published by the think tank Freedom House, democracy has been in decline for 15 consecutive years, with some of the biggest setbacks occurring in the United States and India.

What is democracy  in the above case?

The events of January 6, 2021 were certainly a part of a larger trend of democratic erosion that has been taking place globally in recent years.

This trend is concerning, as liberal democracy and the rule of law are important foundations of a healthy, prosperous society. It is important for people to be able to hold their governments accountable through free and fair elections, and for the rights and freedoms of all individuals to be protected.

In general, democratic erosion refers to the gradual weakening of the institutions and norms that support democratic governance. This can take a number of forms, including:

Restrictions on the freedom of the press and freedom of expressionLimits on the independence of the judiciaryAttacks on the legitimacy of electionsDiscrimination and persecution of minority groupsCorruption and abuse of power by those in positions of authority

Learn more about democracy  from

https://brainly.com/question/3710021

#SPJ1

URGENT, Need help with python! Can someone create a program for what it's asking for??? I added an attachment for it.

Answers

Answer:

# Get the make and model of the phone

make_and_model = input("Enter in the cell phone make and model: ")

# Get the price of the phone

price = float(input("Enter in the price of the phone in dollars: $"))

# Get the price of the warranty

warranty = float(input("Enter in the price of the warranty in dollars: $"))

# Calculate the sales tax

tax = (price + warranty) * 0.06

# Calculate the shipping cost

shipping = price * 0.017

# Calculate the total amount due

total = price + warranty + tax + shipping

# Display the receipt

print("Receipt:")

print("The cellphone purchased is:", make_and_model)

print("The purchase price is: $%.2f" % price)

print("The warranty cost is: $%.2f" % warranty)

print("The tax is: $%.2f" % tax)

print("The shipping cost is: $%.2f" % shipping)

print("The amount due is: $%.2f" % total)

Explanation:

The first line of the code gets the make and model of the phone from the user and stores it in the variable make_and_model.

The next two lines get the price of the phone and the price of the warranty from the user, respectively. Both of these values are entered as strings, so they are converted to floating point numbers and stored in the variables price and warranty, respectively.

The following two lines calculate the sales tax and the shipping cost. The sales tax is calculated as 6% of the sum of the price and the warranty, and the shipping cost is calculated as 1.7% of the price. Both of these values are stored in the variables tax and shipping, respectively.

Next, we calculate the total amount due by adding up the price of the phone, the price of the warranty, the sales tax, and the shipping cost and storing the result in the variable total.

Finally, we use the print function to display the receipt, which includes the make and model, the purchase price, the warranty cost, the tax, the shipping cost, and the total amount due. All of these values are formatted as currency using the %.2f format specifier.

Which of the following methods can a developer use to determine if it is close to hitting the DML rows governor limit? Choose 2 answers.
A. Limits.getLimitDMLRows()
B. Limits.getDMLRows()
C. Database.countQuery()
D. System.assert()

Answers

The methods can a developer use to determine if it is close to hitting the DML rows governor limit is  Limits.getLimitDMLRows().

What is DML?A data manipulation language (DML) is a family of computer languages including commands permitting users to manipulate data in a database. This manipulation involves inserting data into database tables, retrieving existing data, deleting data from existing tables and modifying existing data. DML is mostly incorporated in SQL databases.A data manipulation language is a computer programming language used for adding, deleting, and modifying data in a database. A DML is often a sublanguage of a broader database language such as SQL, with the DML comprising some of the operators in the language.

To learn more about SQL database refer to:

https://brainly.com/question/25694408

#SPJ4

Write a program with at least TEN (10) functions inclusive of main function. The program
is able to generate two random numbers by using rand() function. The program is also
able to add the two numbers and also compare the result with the input from user. User is
given the option to continue or to stop the program. At the end, program is able to display
the number and percentage of correct and wrong answer. The program is also able to
determine the grade based on the percentage. If 80 – 100 (EXCELLENT), 60 – 79.99
(GOOD), 40 – 59.99 (INTERMEDIATE) and 0 – 39.99 (NEED IMPROVEMENT). You
are able to choose between do .. while or while loop.
Please fill in your answer for the addition of two numbers below:
1 + 7 = 8 (number (8) is key in by user)
1 + 7 = 8 (correct)
Do you want to continue next question (Y/N): Y
4 + 1 = 5 (number 5 is key in by user)
4 + 1 = 5 (correct)
Do you want to continue next question (Y/N): Y
9 + 4 = 12 (number 12 is key in by user)
9 + 4 = 12 (wrong)
Do you want to continue next question (Y/N): Y
8 + 8 = 16 (number 16 is key in by user)
8 + 8 = 16 (correct)
Do you want to continue next question (Y/N): N
You able to answer 3 correct question and 1 wrong question out of 4
question.
Percentage of marks is: 75.00 % - GOOD
Do you want to continue next SET OF QUESTION (Y/N): Y
Please fill in your answer for the addition of two numbers below:
1 + 7 = 8 (number (8) is key in by user)
1 + 7 = 8 (correct)
Do you want to continue next question (Y/N): N
You able to answer 1 correct question and 0 wrong question out of 1
question.
Percentage of marks is: 100.00 % (EXCELLENT)
Do you want to continue next SET OF QUESTION (Y/N): N
Terima kasih atas KEGIGIHAN ANDA !!!

Answers

The program is written below:

import java.util.Scanner;

import java.util.Random;

public class MathQuiz {

   private static int correct = 0;

   private static int wrong = 0;

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       Random rand = new Random();

       boolean cont = true;

       while (cont) {

           int num1 = rand.nextInt(10);

           int num2 = rand.nextInt(10);

           int sum = num1 + num2;

           System.out.println("Please fill in your answer for the addition of two numbers below:");

           System.out.print(num1 + " + " + num2 + " = ");

           int userAnswer = input.nextInt();

           checkAnswer(sum, userAnswer);

           cont = continueQuiz();

       }

       displayResult();

   }

   public static void checkAnswer(int sum, int userAnswer) {

       if (sum == userAnswer) {

           System.out.println(sum + " = " + userAnswer + " (correct)");

           correct++;

       } else {

           System.out.println(sum + " = " + userAnswer + " (wrong)");

           wrong++;

       }

   }

   public static boolean continueQuiz() {

       Scanner input = new Scanner(System.in);

       System.out.print("Do you want to continue next question (Y/N): ");

       char c = input.next().charAt(0);

       return (c == 'Y' || c == 'y');

   }

   public static void displayResult() {

       double percentage = (double) correct / (correct + wrong) * 100;

       System.out.println("You were able to answer " + correct + " correct question and " + wrong + " wrong question out of " + (correct + wrong) + " question.");

      System.out.printf("Percentage of marks is: %.2f %% - ", percentage);

       if (percentage >= 80) {

           System.out.println("EXCELLENT");

       } else if (percentage >= 60) {

           System.out.println("GOOD");

       } else if (percentage >= 40) {

           System.out.println("INTERMEDIATE");

       } else {

           System.out.println("NEED IMPROVEMENT");

       }

   }

}

What is the program about?

In the program above:

main function is the main function of the program, where we initialised some variable,scanner and Random function.checkAnswer(int sum, int userAnswer) is a function which checks the user's answer is correct or not and increments the correct/wrong counter accordingly.continueQuiz() is a function which prompts the user if they want to continue the quiz or not and returns the user's input as a boolean value.

Note that the displayResult() is a function which displays the final result of the quiz, including the number of correct answers, the percentage of marks, and the grade based on the percentage.

Learn more about program  from

https://brainly.com/question/26134656

#SPJ1

Which type of media preparation is sufficent for media that will be reused in a different security context within your organization? A-Sanitization
B-Destruction
C-Deleting
D-Formatting

Answers

A: The sanitization type of media preparation is sufficient for media that will be reused in a different security context within an organization.

A general method of removing data from storage media such that there is sufficient assurance that the data cannot be easily retrieved and reconstructed is called media sanitization. There are four categories of media sanitization, which are disposing, clearing,  purging, and destroying.

Therefore, sanitization is the type of media that will be reused in a different security context. Sanitization is the mechanism of cleaning a device by having removed all data remnants.

You can learn more about removing data files at

https://brainly.com/question/30036085

#SPJ4

What is the best definition of a programming language? A. The language that developers use to communicate with one another about software design B. The internal language a computer uses to communicate with other computers and devices C. A language that instructs a computer how to carry out functions D. A complex thought process that breaks down difficult problems to find their solutions

Answers

The best definition of a programming language include the following: C. A language that instructs a computer how to carry out functions.

What is programming?

In Computer technology, programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) in order to instruct a software on how to perform a specific task on a computer system.

Additionally, some examples of programming language include the following:

FORTRANBASICC++JavaPython

In conclusion, we can reasonably infer and logically deduce that a programming language is designed and developed to instruct a computer system on how to carry out its functions.

Read more on programming languages here: brainly.com/question/26497128

#SPJ1

which action is an example of an input?

Answers

Answer:

pressing buttons and flicking switches

Intuitively, input actions correspond to those things the environment does to the system (like pressing buttons and flicking switches); output actions correspond to those things the system does to the environment (like an ATM handing out cash or a vending machine dispensing candy).

a cybersecurity student has been using dig and whois to query hosting records and check external dns services when a fellow student recommends a tool that packages similar functions and tests into a single query. conclude what tool the student recommended.

Answers

A cybersecurity student has been using dig and whois to query hosting records and check external DNS services when a fellow student recommends a tool that packages similar functions and tests into a single query. The tool the student is recommended is 'dnsenum'.

Dnsenum is a multithreaded Perl script to enumerate DNS information of a domain and to identify non-contiguous IP blocks. The primary purpose of 'dnsenum' is to gather as much information as possible about a domain.

In the given example where a cybersecurity student has been using dig and whois to query hosting records and check to see external DNS services when his classmate recommends a tool that combines similar functionality and tests into a single query.  The tool recommended to students is 'dnsenum'.

You can learn more about cybersecurity at

https://brainly.com/question/28004913

#SPJ4


You tell Kim about a cloud based Intranet service. This service will allow all the stores to share data, resources, and software.

Answers

Based on the given scenario, a cloud-based intranet service can be a great way for stores to share data, resources, and software

What is a Cloud-Based Intranet Service?

This refers to the type of service is typically hosted on a remote server and accessed through the internet, which means that all the stores can access the same information and resources from any location

Some benefits of using a cloud-based intranet service include:

Accessibility: With a cloud-based intranet, all the stores can access the same information and resources from any location, as long as they have an internet connection.

Collaboration: A cloud-based intranet service can make it easier for stores to collaborate and share ideas with each other.

Read more about intranet services here:

https://brainly.com/question/14994759

#SPJ1

consider the following procedure. procedure dosomething(num1, num2) { display(num1) return(num1) display(num2) } consider the following statement. display(dosomething(10, 20)) what is displayed as a result of executing the statement above?

Answers

Since the procedure dosomething(num1, num2) { display(num1) return(num1) display(num2) } ,The displayed result of executing the statement is:

10

20

What is the procedure about?

The procedure dosomething is called with the arguments 10 and 20. When the procedure is called, the first line of the procedure displays the value of num1, which is 10.

The second line of the procedure returns the value of num1, which is also 10. The third line of the procedure, which is after the return statement, is not executed.

Then, the function display is called with the return value of dosomething as its argument, which is 10. The function displays the value of its argument, which is 10.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

Write code in java that takes input from the user for the radius (double) of a circle, and create a circle with that radius. The program should then print a sentence with the circumference and area of the circle. You should use the appropriate Circle methods to obtain the circumference and area of the circle rather than calculating these values yourself.

Sample run:

Enter the radius of the circle:
> 3
A circle with a radius 3.0 has a circumference of 18.84955592153876 and an area of 28.274333882308138

Answers

Answer:

Explanation:

import java.util.Scanner;

public class Circumference {

   public static void main(String[] args){

       Scanner input = new Scanner(System.in);

       System.out.print(“Enter the radius of the circle: ");

       double userInput = input.nextDouble();

       //create a new instance of the Circumference Class

       Circumference c = new Circumference();

       System.out.println(“A circle with a radius of “ + userInput + “ has a circumference of ”  + c.getCircumference(userInput) + "and an area of " + c.getArea(userInput);

 }

  public double getCircumference(double radius){

      return 2.0 * Math.PI * radius; //formula for calculating circumference

 }

 public double getArea(double radius){

     return radius * radius * Math.PI; //formula for finding area

 }

}

/* Formatting may be a lil weird in the main method(), if your getting errors just comment the print statement and re-type it yourself :)*/

Select the image that shows the proper hand position for keyboarding.

Answers

the first one (where the right hand is on A, S, D, F and the left one on J, K, L and ; )

can i have brainliest pls?

Other Questions
what is 1/7 plus 3/21 equal Deficits may be desirable in the short run if they:A. help to stabilize the economy when the economy falls below potential output.B. increase savings necessary for future investment and growth.C. increase savings necessary for future consumption and demand.D. help to stabilize the economy when the economy is above potential output. A company has created an ice cream that has zero calories, but it is made with chemicals that recently were proven to cause cancer in rats. they decide to design an ad campaign that focuses solely on the zero-calorie aspect of the product and market it as a "super healthy, zero-calorie, sweet treat for the whole family!" what advertising method does this most likely demonstrate? Read the sentence.This cool weather is a nice (reprieve), but the heat will be back soon.Use the excerpt from a dictionary page to answer the question.repeal1. v. to withdraw formally or officially2. n. the act of withdrawingrepel1. v. to force back2. v. to resist effectivelyrepetition1. n. doing the same action again2. n. saying the same thing againreprieve1. v. to delay the punishment of2. n. a temporary reliefAccording to the dictionary page, what does the word (reprieve) mean in this sentence?A. n. the act of withdrawingB. v. to force backC. v. to delay the punishment ofD. n. a temporary relief Why is the Speaker of the House so powerful? HELP!!!!My Science teacher does not know how to do this!!!1. A car is driving around a curve at a constant speed of 30 mph. The car has a mass of 2000 kg and a radius of 0.5 m. Calculate the angular momentum of the car. understanding is to ________ as ability is to ________. Ever since 1845, general elections for the president and the members of the house of representatives have been held on:. Dad is getting food ready for my birthday party! Including me, there will be 38 people at the party. Dad is baking cookies for us! He can bake 24 cookies per batch. How many batches should I tell Dad to make so we can each have 4 cookies? What is it called when you learn from an experience something? Who is the main character in Animal Farm? 1-kg of carbon dioxide is compressed from 1 MPa and 200C to 3 MPa in a piston-cylinder device arranged to execute a polytropic process for which PV1.2 = constant. Determine the final temperature treating the carbon dioxide as (a) an ideal gas and (b) a van der Waals gas Draw the molecule2,5-dimethyl-4-(2-methylpropyl)octane What are the two conditions that democracy must fulfill in order to achieve the goal of accommodating social diversity? A(n) ____ represents a real person, place, event, or transaction.a. object b. instance c. commandd. method URGENT!! ILL GIVEBRAINLIEST!!!! AND 100POINTS!!! Bones undergo a continual process of remodeling until the end of adolescence. after adolescence, there is no bone remodeling.Select one: O a. True O b. False How do you read co ordinates? in pea plants purple flowers are dominant to white flowers. In a cross with a true breeding plant with purple flowers and a plant with purple flowers, what percentage of plants will have purple flowers?A. 25%B.50%C. 75%D.100% How many 6 are there between 1 to 1536?