Quiz 2: a _____ is any computer that provides services and connections to other computers on a network.

Answers

Answer 1
The answer could be "server"

Related Questions

A hemi combustion chamber shape can be found on _______ design engines.

A. both cam-in-block and overhead camshaft
B. only cam-in-block
C. neither cam-in-block nor overhead camshaft
D. only overhead camshaft

Answers

The combustion chamber heats high pressure air that is fed by the compression system into the compression system at constant pressure. A hemispherical combustion chamber is a type of combustion chamber with hemispherical design. A hemi combustion chamber shape can be found on only overhead camshaft (OHC) design engines. 

Answer:

A. both cam-in-block and overhead camshaft

Explanation:

Hemi. Found on both cam-in-block and overhead camshaft design engines.

Section 3.1   PENN

Search engines that search other search engines are called

Answers

Answer: Metasearch engines

Answer:

Explanation:Um Search engines I'm playing metasearchengines

A student sits down at a computer and presses the power button. the computer does not turn on. what is a logical explanation as to why the computer does not work? how would the student test that idea?

Answers

Since the computer is not working, it is best for the student to test methods that will ensure that there may be complications as to why it is not turning on and why it still off. The most basic step in determining the reason is whether the computer's plug is plugged in the outlet and the student should ensure whether it is plug or unplug.

You observe a small plaque on an electrical appliance that reads, in part, "115 volts AC 60 Hz." This means that the appliance A. contains a heating element. B. may be operated with batteries. C. produces special safety hazards. D. must be operated on alternating current.

Answers

You observe a small plaque on an electrical appliance that reads, in part, "115 volts AC 60 Hz." AC stands for alternating current. This means that the appliance must be operated on alternating current. Electrical appliance based upon their power consumption can be supplied on direct current (DC) or alternating current (AC).  In this case, the appliance must be supplied on AC current.

The general term for an object that receives notifications of user actions is

Answers

The general term for an object that receives notifications of user actions is an ActionListener, when a user performs an action on a control somewhere in the UI an ActionEvent object is created to represent the event, depending on whether the there are ActionListeners attached or not a notification will be sent to the attached ActionListener that in turn must provide an actionPerformed method that is required by the ActionListener interface.
The general term for an object that receives notifications of user actions is ActionListener. The ActionListener is an event handler interface, that receives action events. It is used in order to define the actions that should be taken when an user performs certain operation.For example when the 
user clicks a button the ActionListener receives messages from the ActionPerformed.

Although this technology-based practice can be helpful in some contexts, experts conclude that if students use it before using a search engine, it can significantly degrade the effectiveness of the search.

Answers

Machine translation is the technology-based practice can be helpful in some contexts. It is a software used to translate text or speech from one language to another. Although, experts conclude that if students use it before using a search engine, it can significantly degrade the effectiveness of the search. Some of the disadvantages of the machine translation are that it has low and inconsistent accuracy, it is unable to translate according the context and is non-formal.

Pan-os 7.0 introduced a new security profile type. what is the name of this new security profile type?

Answers

The name of the new security profile type is WILDFIRE ANALYSIS. Wildfire analysis is a cloud based threat analysis service that prevent threats, it can detects even the most evasive threat. Wildfire analysis report allows one to identify the source of a malware and determine the type of malware it is in order to take appropriate actions.

How do you know when a spreadsheet object is active in a Word document?      A. The Ribbon is minimized. B. The Excel Formula bar is displayed. C. The Word icon in the taskbar is selected. D. The Office Clipboard task pane is open.  

Answers

You will know when a spreadsheet object is active in a Word document the Word icon in the taskbar is selected. The ribbon of Word will provide you with the Microsoft Excel features to be used for editing. These include charts, conditional formatting, and formulas.

Answer:

B The Excel Formula bar is displayed

Explanation:

To know if the spreadsheet is active in a word document, the excel formular bar is displayed. when you are done click outside of the spreadsheet and word is resumed or click inside the spreadsheet to resume editing the spreadsheet. This feature allows one to be able to create a spreadsheet in a word document, useful in creating business reprts.

QUICK TRUE/FALSE QUESTION
A Uniform Resource Locator (URL) is how the internet knows where to take users when an address is typed into a browser.

True or False

Answers

true because if u break the law, the police can track u down like that.

Answer:

True

Explanation:

The URL is a unique resource used to locate the resource on the internet. This is commonly known as the web address. The web address consists of many parts: the protocol identifier and the IP address of the computer.

URL protocols consist of the Hypertext Transfer Protocol (HTTP) or the HTTP for secure browsing and email communication. The URL specifies the following about a website:

path to a specific page

network port used to make the connection

specific reference point, e.g. HTTML

and

query of search information, e.g a website extension.

The URL is important to identify and distinguish between true and malicious sites.

When a vedor host software on a website and you don't need to install the software on your device?

Answers

Create and manage the information on TV screens in your business.Bizplay is hosted web-based digital signage software that makes content management a breeze. ... At Bizplay we host the whole solution on our servers. So you don't need to install any "Bizplay-specific" software. ... Are you an AV hardwarevendor?

Which dos attack tool, that is based on the dos operating system, sends out fragmented ip packets and can be used to target windows systems and network devices, such as cisco routers?

Answers

Denial-of-service (DoS) attacks usually flood servers, systems or networks with high traffic in order to engulf the victim resources and make it impossible for legitimate users to use them. This results to crashing the server. In this case, a tool used to attack windows servers and network devices in fragmented ip packets form is called “Jolt2”.

Answer: Jolt2

LOOK TO THE LEFT AND RIGHT BEFORE ENTERING ANY INTERSECTION ON A GREEN LIGHT BECAUSE:

A. Other vehicles might enter the intersection against a red lightB. Once you are in the intersection, you must only look straight aheadC. Cross traffic may have a green arrowD. Pedestrians on the cross street have the right-of-way

Answers

The answer is A. D could be true, but if you have green, they would have a red hand, and not right-of-way

Why isn't 802.1X a good choice for home based wireless networks

Answers

It can possibly cause an issue with the authenticator's end. Its capacity has a limited memory capacity and has the minimal processing power. Most of the process will be at the supplicant and authentication servers. However, the 802.1X has a better security compared to the WEP.

The ____ keyword specifies that a function or method does not return a value.

Answers

The void keyword. Otherwise you use a type name, such as int or char or string.

The set of communications rules for exchanging information electronically on the internet is called the ________.

Answers

The set of communications rules for exchanging information electronically on the internet is called the URL. URL stands for Uniform Resource Locator. It consists of Protocol identifier that indicates the name of the protocol that is used (for example: http) and  Resource name is the complete address to the resource. brainly.com.

"the ____ bar contains five buttons used to accomplish various tasks on the computer related to organizing and managing the contents of the open window."

Answers

The COMMAND bar contains five buttons used to accomplish various tasks on the computer related to organizing and managing the contents of the open window.

A user who presses the wrong sequence of keys in a software program is a victim of ____.

Answers

The correct answer is a user mistake.

What type of engine is common on boats designed for shallow water?

Answers

Jet drives is engine that is common on boats designed for shallow water. 
Boats can have inboard or outboard jet drives.The jet drive draws the water from under the boat through an intake and into a pump-jet inside the boat. The difference between the jet boat and the powerboats or motorboats is that powerboats and motorboats have use an external propeller, while the jet boat draws the water from under the boat  

TURN YOUR FRONT WHEELS TOWARD THE CURB WHEN YOU ARE PARKED:
A. Facing uphill
B. On a level road
C. Facing downhill

Answers

C. Facing downhill
That way, if your brakes broke, you would not roll into traffic.

Turn your front wheels toward the facing downhill when you are parked.

When you are parked facing downhill, it is recommended to turn your front wheels toward the curb.

This is done to prevent the vehicle from rolling into traffic in case the parking brake fails or is not fully engaged.

Turning the wheels toward the curb creates an extra barrier that can help keep the vehicle in place.

To learn more in Parking click:

https://brainly.com/question/31565137

#SPJ2

In an ipv4 address, what are the maximum number of bits that can be used to identify the network address

Answers

Up to 24 bits can be used to identify unique networks.

Is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely?

Answers

The answer to this question is a Public Key Infrastructure. Public Key Infrastructure or PKI is a tool that enables the users to open or unsecure a network. A PKI consists of a software and hardware standards in order to manage and create digital certificates. A certificate authority, registration authority, certificate database, and a certificate store are the key elements of a PKI.

Name two properties that a button object can possess?

Answers

A button object in a computer should have at least these two properties:
1. It should acknowledge a mouse click or key press.
2. It should trigger a functional code within the software to perform a specific task.

To perform its intended function properly, it is necessary for the button to have a title that clearly describes the function that it performs.

For example, the button could define a new color that is to be assigned to a graphics object or to a font.
Once the button is pressed, the button should trigger execution of code that actually implements the change in color.

What is it called when you want to automatically create columns that are the same length in a newsletter?

Answers

Its called column creation

The process of automatically creating columns that are the same length in a newsletter is often referred to as text balancing or column balancing. In desktop publishing software, this feature helps ensure that each column ends at the same point on the page, providing a clean, professional appearance to the layout.

When designing a newsletter, achieving a visually appealing layout is crucial. Users of desktop publishing software can utilize the text balancing feature to ensure that all text columns on a page are equally filled. This creates a tidy and organized look, eliminating distracting white spaces at the ends of columns, which can otherwise occur if content length varies greatly among them. Text balancing is particularly valuable in multi-column layouts, such as newsletters, newspapers, and magazines, where consistency in appearance is essential for readability and aesthetic quality.

what feature of excel allows you to automatically calculate common formulas which select data

Answers

See attached word doc Autosum

A query is a request for the database management software to search for data that matches specific criteria.
a. True
b. False

Answers

True. Hope this helps you my dude

Which one of the following may be used as an input as well as an output device? A. Fax machine B. Scanner C. Printer D. Voice recognition

Answers

The printer may be used as an input as well as an output device. As an input you can print documents on it and send them on e-mail address for example. As an output if the printer is connected in LAN you can send the document to the printer. The other devices are only output devices, 

A network administrator is overseeing the implementation of first hop redundancy protocols. which two protocols will not be able to function with multivendor devices?

Answers

A network administrator is overseeing the implementation of first hop redundancy protocols. which two protocols will not be able to function with multi vendor devices?
Answer: HSRP & GLBP

When you connect to your isp's pop, the isp and the equipment at the pop go through a process called _________, establishing the speed of the internet connection, and then proceed to _________?

Answers

ISP stands for Internet Service Provider and it's the company that provides the connections to access the Internet.When you connect to your ISP's pop, the ISP and the equipment at the pop go through a process called handshaking, establishing the speed of the internet connection, and then proceed to authentication. Handshaking is the exchange of signals between devices in order to regulate the data transfer. Authentication is the verifying of the identity of a user or process.

In an ip address such as 72.44.192.233, the last number in the address (on the far right) identifies:

Answers

Answer: The hosts IP address

If, when asked for a date of birth, the user enters a future date, this error should be caught by a ________ check.

Answers

I believe believe it is a reasonableness check if that doesn't work maybe a date check.
Other Questions
Explain in detail what it means to synchronize computers and mobile devices. Include at least two strategies for keeping your files in sync in your answer. Find the number of moles of water that can be formed if you have 182 mol of hydrogen gas and 86 mol of oxygen gas. A __________ is a nuclear family that emerged in response to the requirements of an urban, industrial society and the shift away from an agrarian economy. who was the first president? The christian church was the one unifying authority during this period. to what extent did the church preserve western culture and in what ways did they invent something entirely new "The emergency banking legislation passed by the Congress today is a most constructive step toward the solution of the financial and banking difficulties which have confronted the country. The extraordinary rapidity with which this legislation was enacted by the Congress heartens and encourages the country."Secretary of the Treasury William Woodin, March 9, 1933What was the aim of the legislation referred to in this excerpt? (5 points)Reopen banks and convince people to redeposit their cashCreate a federal insurance program for funds held in banksSeparate the banking from the investment industriesPermanently close all of the poorly performing banks Which best explains if quadrilateral WXYZ can be a parallelogram?WXYZ can be a parallelogram with one pair of sides measuring 15 mm and the other pair measuring 9 mm.WXYZ can be a parallelogram with one pair of sides measuring 15 mm and the other pair measuring 7 mm.WXYZ cannot be a parallelogram because there are three different values for x when each expression is set equal to 15.WXYZ cannot be a parallelogram because the value of x that makes one pair of sides congruent does not make the other pair of sides congruent. How long does it take for your liver to get rid of the alcohol in one standard drink.a. 10 minutes? Kyla makes a triangular school pennant. The area of the triangle is 180 square inches. The base of the pennant is z inches long. The height is 6 inches longer than twice the base length. What is the height of the pennant? Recall the formula A = 1/2bh. A.) 12 inches B.) 15 inches C.) 30 inches D.) 36 inches Rank the size of a change in temperature of one degree Fahrenheit, one degree Celsius, and one kelvin. In other words, if a thermometer were to show that the temperature outside increased by these amounts, which change would feel the largest? If any of the options are the same magnitude, stack them above one another. Rank the sizes of one degree in each scale from largest to smallest. To rank items as equivalent, overlap them. A coordinated collection of fonts,colors,and other viscal effects is called What atomic or hybrid orbitals make up the sigma bond between c1 and c2 in tetrafluoroethylene, c2f4? Marion is observing the velocity of a cyclist at different times. After two hours, the velocity of the cyclist is 18 km/h. After four hours, the velocity of the cyclist is 4 km/h. Part A: Write an equation in two variables in the standard form that can be used to describe the velocity of the cyclist at different times. Show your work and define the variables used. (5 points) Part B: How can you graph the equations obtained in Part A for the first 8 hours? (5 points) Manuel has recently learned that his favorite grandfather is sick and is going to die within the next six months. although he is only 7 years of age, manuel has started displaying some curious symptoms. he has frequent headaches and stomach pains with no physical explanation, he has become unusually moody and irritable, and he has lost interest in his favorite toys, video games, and television programs. given what you know about the expression of mental illness in the young, which type of disorder do you think is most likely the cause of manuel's symptoms? Early conflict theory studies revealed inequality in the u.s. democratic system. do you think that there are inequalities present in the u.s. today Choose the polynomial written in standard formA.x2y2 + 4x4y + 10x6B.x4y2 + 4x3y5 + 10xC.x7y2 + 4x3y + 10x3D.x6y2 + 4x3y8 + 10x2 Given the following geometric sequence, find the common ratio. {0.1,-0.9,8.1,...} Linda owns a bakery and wants to hire bill, a web-page developer, to create a new site for her company. linda does not need bill on staff permanently. bill would be considered a(n) ________ Which of the following activities are examples of data organization and analysis? Check all that apply. A.Rejecting spoiled ballots B.Running a polling station on voting day C.Transferring votes from ballots to tally sheets D.Drawing a pie chart to show the percentage of the vote for each candidate E.Counting votes for each candidate in the election What do you think Millicent will say to the sorority sisters? Steam Workshop Downloader