Answer:
Option B
Explanation:
A(n) ____ allows others besides the manufacturer to develop software to run on the system or device.
Answer:
Application Programming Interface.
Explanation:
Application Programming Interface(API) is a collection of function, routines, procedures and the protocol which are used create a software application.The main role of API is that it defined or specified how the components of software will interact.
The objective of the Application Programming Interface that it the manufacturer or develop software that is running on system or device. The advantage of using the Application Programming Interface is that we can develop a better program in a very manner by using the API.
java syntax allows programmers to use any expression of thei nt data type as an array subscript1. True2. Flase
Answer:
The answer is "Option 1".
Explanation:
In java programming language, Subscript is a numerical value between [ and ] which indicates the index of the object of which you like. The special [ and ] signs indicate the notation of the mathematic abonnement. So, x[1 ] and x[n-1 ] are used by Java rather than x0, x1, and x-1. That's why the answer to this question is "True".
A _____ element is an element that contains one or more other elements, which are called child elements.
a. family
b. sibling
c. parent
d. descendant
Answer:
parent
Explanation:
A parent element is usually the outer element that contains one or more other elements, which are called child elements.
Consider the following HTML code:
<div id="parent">
<p id="childNumberOne"></p>
<p id="childNumberTwo"></p>
<p id="childNumberThree"></p>
</div>
The Three P are children of the parent div, and siblings of each other.
28. Which major NIMS Component describes recommended organizational structures for incident management at the operational and incident support levels?
Answer:
Command and Coordination .
Explanation:
Command and Coordination is the component of NIMS that explains leadership roles, processes and prescribed authoritative and organizational structures for incident management at operational and incident support levels. It also describes how these structures interconnect to handle incidents proficiently. In a nut shell command and coordination provides with systems, rules, standards and principles for standard framework for incident management. It comprises of 4 areas. First includes tactical activities to put in resources on scene. Second includes incident support which is managed at Emergency operations centers via operational coordination, resource procurement and data collection and sharing. Third is the policy advice and senior level decision making. Fourth is the outreach and interaction media for keeping them updated about the incident.
Donna has been developing software for her company. She makes a copy of the directory where her code is stored each time she makes a significant change. However, the project she started years ago is now much larger and there are two other developers who also work on the program with her. She would like a way to better manage the code so that she can revert to previous states if necessary and track changes made by each person. Which technology would you suggest?
1. Continuous integration application
2. Code repository
3. Workflow automation
4. Chargebacks for each developer
Answer: (2) Code repository
Explanation:
The code repository is basically used for organizing the code branch by keeping the code consistent even the different types of teams are working in the similar specific place.
The code repository is basically providing the web hosting facilities to the web pages, code for the software and the various types of accessible documentation. The developers published code and can easily synchronized the local code copy to the repository.Therefore, Option (2) is correct.
Each Google My Business location has a unique ID that applies changes to the right listing.
What’s the name of this unique ID?
a. Store Number
b. Store Category
c. Store Code
d. Store Identifier
Answer:
The correct answer to the following question will be option c. Store Code.
Explanation:
A store code will be the unique ID which can uniquely identify any location of that store.
Any random number or name can be the store code. A store code in each Google My Business (GMB) will only be viewable to the person who is managing that locations arround the store.Any costumer doesn't have possibility to see it.Hence, Option C is the right answer.
A device in a subnet needs to send a packet to a device in a different subnet. To which device will it address the outgoing packet?
Answer:
The Router
Explanation:
A router is a layer 3 device in the OSI network model. As the name implies, it routes packets logically from source to destination. An interface in a router represents a segment or a configured stand-alone network, with a specific subnet mask.
Routers have routing tables that learns a network route statically or dynamically with protocols. When a packet is to be sent to a device in another network, the router receives the packet and forwards the traffic to the destination (through another interface, if connected directly) or to the next hop router interface alone the path to the destination.
When a networking device in a subnet needs to send a packet to another device in a different subnet, it will: address the outgoing packet to it's configured default gateway.
A router can be defined as a networking device that is designed typically for forwarding outgoing data packets between two or more networks based on a well-defined routing protocol.
Generally, routers are typically configured using a standard routing protocol with an IP address as the default gateway.
A subnet is an abbreviation for subnetwork and it can be defined as a logical subdivision (partitioning) of a larger IP network into two or more smaller IP networks.
In Computer Networking, when a networking device belonging to a particular subnet needs to send a packet to another networking device configured in a different subnet, it will address the outgoing packet to it's configured default gateway, which is mainly referred to as a router.
In conclusion, a router is the default gateway to which a networking device addresses or forwards an outgoing packet.
Read more: https://brainly.com/question/24117833
2019 Altima’s Intelligent AWD system is designed to work in conjunction with _________.
Answer:
Vehicle Dynamic Control is the correct answer.
Explanation:
Vehicle Dynamic Control is that type of sensor in the vehicle which displays the motions of the vehicles to the driver. In other words, when the driver increase or decrease the speed of the vehicle then, it display on the speedometer and if the driver open and close the window of the vehicle by using the button. When the driver start or turn off the vehicle then the VDC system is also back on.
Which layer of the tcp/ip model manages the transmission of binary digits across an ethernet cable?A . data link
B . Physical
C . transport
D . network
Answer:
The answer is "Option B"
Explanation:
TCP/IP layer also known as Network Access Layer. The physical is used to data transfer between two devices on the same network that will be carried out primarily through this layer. and other options are incorrect that can be described as follows:
In option A, data is information that uses by physical layer protocol that's why it is not correct. In option C, the transport layer aims to enable a conversation between devices in the source and the destination hosts. That's why it is not correct. In option D, In TCP/IP, the Network layer is known as the internet layer that's why it is not correct.Which wildcard character replaces a single character in the command-line interface?
Answer:
? (the question mark)
Explanation:
The asterisk (*) matches one or more occurrences of any character, but the question mark matches exactly one.
Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's information and make it universally accessible and useful. pair Internet surfers with advertisers and earn revenue along the way. foster technological innovation to promote a knowledge-driven culture. make the world more open and connected.
Answer:
Yes this is true.
Explanation:
Alex, a web designer, is assigned the task of creating a mobile-device-friendly website for a leading fashion outlet called AllStyles. A desktop version of AllStyles's website already exists. Alex can refer to this desktop version of the website to create the mobile website design.
For the AllStyles's main web page, Alex creates a navigation bar that includes topical areas named Clothing, Accessories, and About Us. Alex wants to create nested lists within each of these topical areas that would contain links to specific pages on the AllStyles website. In order to do so, Alex must _____ while writing the HTML code.
A. Set the width of the layout viewport to the width of the nested lists
B. Put each of the nested lists within a class
C. Insert the structure of the nested list within a specific style sheet structure
D. Use theonlykeyword to hide the list items
In order to do so, Alex must set the width of the layout viewport to the width of the nested lists while writing the HTML code.
A. Set the width of the layout viewport to the width of the nested lists
Explanation:
In mobile technology, a web browser displaying web pages has a mobile mode or desktop mode. While the end-user selects mobile mode it web pages displayed in compression mode and limit information depends on the web pages designer.
While select the desktop mode by the end-user web pages is displayed as the normal desktop version.
While the designer has to set the styles to all the web pages and it should be mapped properly so the web page display in both mode in the mobile technology.
Final answer:
Alex must use class or ID tags for the elements in the HTML code and style them with CSS, utilizing descendant selectors for nested lists to create a functional and styled navigation bar.
Explanation:
Alex, in creating nested lists for the navigation bar on the AllStyles mobile website, must ensure that the HTML and CSS code is written in a way that supports the hierarchical organization of menu items. One effective way to accomplish this is to assign class or ID tags to elements such as lists, which can then be styled using CSS. For instance, if Alex wants nested lists within the Clothing, Accessories, and About Us sections of the navigation bar, these lists can be organized by using <ul> tags for the main items and <li> tags for the nested items. Additionally, by making use of CSS descendant selectors, specific styles can be applied to lists within certain classes, aiding in the creation of a visually appealing and functional dropdown menu.
_____________ is an application development methodology with which developers create solutions by integrating one or more web services
Answer:
SOA (Service-oriented architecture)
Explanation:
SOA (Service-oriented architecture) is used to designing networks so that it works optimally in web services environment.
It allows achieving faster and quality environments with less cost. However they can be more complex than the other architectures.
SOA provides advantages in integrating processes and its usage is platform-independent.
Dexter needs to monitor the movement of a rover vehicle on Mars for one year. Which technologies should Dexter use for tracking purposes? Check all that apply.
Answer:
satellites that collect information about rover vehicle distance
space stations that store real-time data about rover vehicle speed
computer simulations that model how long it takes the rover to get to mars
Explanation:
All of the above answers are correct. Satellites are used, and so are space stations. The computer simulations are also being used in bulk. However, the telescope is not that powerful to be used. And that explains the above choices, as they are the technologies that are being used.
Answer:
hi your question lacks the options here is the complete question
Dexter needs to monitor the movement of a rover vehicle on mars for one year. which technologies should Dexter use for tracking purposes? check all that apply.
telescopes that show where the rover vehicle is located
satellites that collect information about rover vehicle distance
space stations that store real-time data about rover vehicle speed
computer simulations that model how long it takes the rover to get to mars
Doppler radar that records information about weather the rover is exposed to
The answer is
Telescopes that show where the rover vehicle is locatedDoppler radar that records information about weather the rover is exposed tospace station that store real-time data about rover vehicle speedExplanation:
Rover vehicles have been successfully sent to Mars from four different laboratories which are named Sojourner,spirit, opportunity and curiosity the weather condition in Mars varies from the poles of Mars to the center of the Mars closest to the Equator. the poles are cooler while the center which is closest to the equator is very hot. Rover vehicles are robotic vehicles sent to mars by scientists to understudy the different parts which the Mars is made up of.
The recent Rover vehicle which is of a car size with four wheels is named Curiosity.
Natalie is responsible for the security of web servers and is configuring the WAF to allow only encrypted traffic to and from the web server, including from administrators using the command-line interface.
What should she do?
Answer:
Configured HTTPs forwarding to and from server and SSH
Explanation:
The HTTPs (secure hyper text transfer procotol) is an encrypted form of communicating packets between clients and servers. It has a port number of 443 with a high encryption policy. They are used to secure sites that request user details to prevent claiming of these information by attackers.
The SSH which is an abbreviation of secure shell is used to remotely connect to intermediate devices like routers and switches in a network. unlike its counterpart telnet, it is configured with an automatic encrypted channel with a private key. It also request for password and username.
You are replacing several laptop components to upgrade a customer's laptop computer. Which device ALWAYS involves the detaching and re-attaching of antenna connectors?
A. the screenB. Mini-PCIeC. the touchpadD. the wireless card
Answer:
A. The screen
Explanation:
The laptop is a miniaturized computer system that supports individuals in their daily activities. They are portable and cheaper than the normal computer systems.
Every component of the laptop is smaller in size and sometimes specifications than the desktop.
The screen is mounted on a foldable arm with the antenna of the wireless card fixed at the top of the fold.
So the antenna must be uninstalled for the screen to be uninstalled as well.
You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4. What utility will you use at the command line to determine where the communication is stopping?
Answer:
Tracert 1.2.3.4 is the correct answer.
Explanation:
Tracert is the command that is used to trace the track of the packet of the Internet Protocol. That's why when the user troubleshoots their workstation and then the problem will occur at the time of conversation to the host's IP. So, that's why he using the following command of the to track route of the IP packets.
Gary is concerned about unauthorized people entering the company’s building. Of the following, which would be most effective in preventing this?A) Alarm systemsB) FencingC) CamerasD) Security guards
Answer:
D. Security guards
Explanation:
Physical security means to deny entry into any premises to unauthorized personnel in order to avoid any suspicious and hazardous situation. It is utmost important now a day due to critical law and order situation.
Options:
A. Alarm systems: Are not so reliable and smart because they can be tampered easily
B. Fencing: Might be a good option in a remote or rural location but in an urban area it would be very unpleasing sight and also it requires more space which is usually very limited
C. Cameras: It is a good option since it provides evidence in the form of video recording but the above objective will still not be achieved if there is no human intervention available at the premises to stop the intruder. Another problem is of CCTV is blind spots.
D. Security Guards: This option seems to be most reliable to get the job done. Security guard provides multi-sensory response and real time actions with prompt response. There are no blind spots in this case. Can be given tailored instructions unlike alarm systems.
Which of the following is an advantage of installing a client/server network in a business?a. centralization of network adaptersb. sharing of peripheralsc. decentralization of files and datad. decentralization of peripherals
Answer:
Option(b) is the correct answer for the given question.
Explanation:
In the client-server network the client gives the request for accessing the particular resources to the server ,The server respond accordingly to the request of the client.
The advantages of a client/server network in business are given below:
Provides the facility of centralization means that all the files, documents are stored in a single central location which provides flexibility. The second and the most important advantages are we can easily share the peripherals i.e input and output device.Option(a),Option(c) and Option(d) are not the advantage of client/server network in a business.
So, Option(b) is the correct answer.
The advantage of installing a client/server network in a business includes sharing peripherals, which leads to cost savings and improved efficiency.
Explanation:One advantage of installing a client/server network in a business is the sharing of peripherals. This setup allows multiple clients (workstations) to access shared network resources, such as printers and scanners, which can lead to cost savings and efficiency improvements. Additionally, a client/server network often brings about the centralization of network management, simplifying tasks like data backup, virus scanning, and software updates.
Data ____ travel over the Internet from router to router until reaching their destinations.
Answer:
Packets.
Explanation:
A data packet is a unit of data carried by a packet-switched network. Data Packets are transmitted along a given network path. Data travels across internet in packets. A packet can carry 1,500 bytes maximum. A packet contains a header and a footer which tells computers what type of data is in the packet, whats the source and destination of the data.
Transmission control protocol and internet protocol is a collection of communication protocols that for sending and receiving date using internet. TCP breaks the data into packets and maintains the network connection and IP deals with the sending and receiving packets from one computer to other using a process called IP Routing which determines the path for the packets to follow from one computer to the other. Once the packets reach their destination, TCP reforms them into their original state.
A favorable variance indicates that ________. A. actual operating income is less than the budgeted amount B. budgeted contribution margin is more than the actual amount C. actual revenues exceed budgeted revenues D. budgeted costs are less than actual costs.
Answer:
The answer is "Option C".
Explanation:
An undesirable change occurs when an actual net profit is below or below the level of performance predicted. It exists when total net profit is above what we expected or when income is below our average. In the given question the other options are not correct that can be described as follows:
In option A, Actual income shall not be less than the target In option B, The estimated margin must not be greater than the current amount. In option D, The expense estimate is lower than the actual cost.which two functions of a firewalls in an enterprise network are true (choose two)
Answer:
A. They can use information about previous packets to make decisions about future packets.
E. They are more susceptible to DoS attacks than stateless firewalls
Explanation:
Assuming the following options:
A. They can use information about previous packets to make decisions about future packets.
B. They are most effective when placed in front of the router connected to the Internet
C. They can track the number of active TCP connections
D. They can fitter HTTP and HTTPS traffic in the inbound direction only
E. They are more susceptible to DoS attacks than stateless firewalls
A firewall by definition is a "software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks connected to the Internet".
The basic purpose of a firewall is to control the traffic that is allowed to traverse from the internet.
Option A is correct since they use previous info in prder to make decisions about a site.
Option B is not true since the firewall is a software that not depends of the router connection to the internet, since the web is open for any IP.
Option C is not correct isnce the purpose for the firewalls is not analyze the acitve connections.
Option D is not correct since they can work in both directions and no present limitations in order to filter web pages to classify the info.
Option E is correct since one characteristic of the stateless firewalls compared to the stateful firewalls. Since "Stateless firewalls watch network traffic and restrict or block packets based on source and destination addresses or other static values" and present more security comaprd to the stateless stateful.
Final answer:
The correct options are A. They can use information about previous packets to make decisions about future packets and C. They can track the number of active TCP connections. Firewalls in an enterprise network can use information about previous packets and track the number of active TCP connections to enhance network security.
Explanation:
Two functions of firewalls in an enterprise network:
They can use information about previous packets to make decisions about future packets: Firewalls can track the state of connections and use this information to determine whether incoming packets are part of an established connection or if they are trying to initiate a new, potentially unauthorized connection.
They can track the number of active TCP connections: Firewalls can monitor the number of active Transmission Control Protocol (TCP) connections to ensure network resources are not overwhelmed by excessive connections or potential cyber threats.
Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?•Share permission (Share tab)-Sales group: Full Control•NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Writea. Members of the Sales group will be able to take ownership of files and edit content, but not delete files.b. Members of the Sales group will be able to edit content and delete files.c. Members of the Sales group will be able to take ownership of files, edit content, and change NTFS permissions.d. Members of the Sales group will be able to edit content, delete files, and change NTFS permissions.
Answer:
Members of the Sales group will be able to edit content and delete files.
Explanation:
NTFS (New Technology File System) is the standard file system for Microsoft Windows NT and later operating systems; NTFS permissions are used to manage access to data stored in NTFS file systems.
Share permissions manage access to folders shared over a network; they don’t apply to users who log on locally.
The share permission is applicable in this question.
On the security tab, where the sales group have read & execute, modify and write permission will allow the sales group users to
1. Modify: allows you to read, write, modify, and execute files in the folder, and change attributes of the folder or files within
2. Read and Execute: will allow you to display the folder's contents and display the data, attributes, owner, and permissions for files within the folder, and run files within the folder
How much does the Teal Group estimate the aerial drone industry will be worth per year over the next decade?
a. $100 billion
b. $111.3 billion
c. $11.3 billion
d. $100 million
Answer:
$100 billion
Explanation:
Arial Drone industry is going to increase a lot more, and to a record level,which can be as high as $100 billion. And it is believed that a lot of better drones might be made in coming few years. And the prediction is that the usage of the drone is going to increase to a record level.
Which component of service-oriented DSS can be defined as data that describes the meaning and structure of business data, as well as how it is created, accessed, and used?
Answer:
The correct answer to the following question will be Metadata Management.
Explanation:
The management of data about the other data is known as Metadata Management. When the data is generated, updated, deleted, created, metadata is generated.
Benefits of Metadata management:
To locate data for a person, the metadata management make it easier.Project delivery become faster.Maintain information of organization.Hence, the Metadata Management will be the best suitable component which defined as the structure and meaning of business data.
Where is most of the information processed in a computer
Answer:
CPU is the correct suitable one-word answer for the above question.
Explanation:
CPU stands central processing units which are the only responsible device for the processing of the instruction given by the user for the demand of some output. CPU is divided into two parts- Arithmetic logic unit and control unit. On which Arithmetic logic unit is responsible for the processing of Arithmetic and logical operation and the control unit is have to control all the operation.
In a computer system there are five main components --
MonitorCPUkeyboardmouseMemoryOn which except CPU and Memory, all are the part of the input and output device. Memory and CPU are wrapped in one box known as the Processor device in which memory has to store the data and CPU has to process the data.
A. When executing System.out.println(a1), the toString() method in the Object class is invoked.
B. When executing System.out.println(a2), the toString() method in the Object class is invoked
C. When executing System.out.println(a1), the toString() method in the A class is invoked.
D. The program cannot be compiled, because System.out.println(a1) is wrong and it should be replaced by System.out.println(a1.toString())
E. Both B and C.
This question is incomplete, it lacks a piece of code to analyze.
I think you wanted an answer to the following question:
Analyze the following code:
public class Test {
public static void main(String[] args) {
Object a1 = new A();
Object a2 = new Object();
System.out.println(a1);
System.out.println(a2);
}
}
class A {
int x;
@Override
public String toString() {
return "A's x is " + x;
}
}
A. When executing System.out.println(a1), the toString() method in the Object class is invoked.
B. When executing System.out.println(a2), the toString() method in the Object class is invoked
C. When executing System.out.println(a1), the toString() method in the A class is invoked.
D. The program cannot be compiled, because System.out.println(a1) is wrong and it should be replaced by System.out.println(a1.toString())
E. Both B and C.
Answer:
E. Both B and C.
Explanation:
toString() method is used to get the representation of this object as a string. When trying to display a string representation of an object usually the full name of the class will be displayed.
In the example above, line
System.out.println(a2);
would display something like
java.lang.Object@5ccd43c2
Obtained value can hardly serve as a good string description of an object. Therefore, toString() method is often overridden using @Override annotation (more info about @Override at https://beginnersbook.com/2014/07/override-annotation-in-java/)
Line
System.out.println(a1);
would display "A's x is 0" because it uses toString() method overridden in class A.
Which of the following is a legitimate responsibility of an organization regarding user private data?
A. Limit administrative access to personal information.
B. Keep personal information indefinitely.
C. Collect all user personal information.
D. Use proprietary methods for data collection to maintain security.
Answer:
D. Use proprietary methods for data collection to maintain security.
Explanation:
The legitimate responsibility of an organisation regarding user private data is to proprietary-tested method in data collection.
The _______________ is a priority-ordered list of the other carrier networks and frequencies it should search for when it cannot locate its home carrier's network.
Answer:
The correct answer to the following question will be Preferred Roaming List (PRL).
Explanation:
A type of database be placed in any wireless device (used in CDMA mobile phones), that contain some information during the selection process of the system, termed as Preferred Roaming List (PRL).
It is used when your phone is connected to the network tower, provided and built by your carrier networks.
Hence, PRL is the correct answer.
Which of the following statements correctly instantiate the Rectangle object myRectangle? (i) myRectangle Rectangle = new Rectangle(10, 12); (ii) class Rectangle myRectangle = new Rectangle(10, 12); (iii) Rectangle myRectangle = new Rectangle(10, 12);
Answer:
The answer is "option iii" .
Explanation:
In the given question it is defined that a class "Rectangle" is defined in the class a parameter constructor is created that accepts two parameters. In this question, we create an instance of the class. In object creation first, we define class name then object name and use new keyword in the Instance of class and pass parameters.
In option i), An object name is used first and then class name. It is not correct. In option ii), In instance creation of the class, we do not use class keyword that's why it is wrong.