Answer:
Lack of global control.
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
There are different types of operating systems (OS) used for specific purposes and these are;
1. Batch Operating System.
2. Multitasking/Time Sharing OS.
3. Multiprocessing OS.
4. Single User OS.
5. Mobile OS.
6. Real Time OS .
7. Distributed OS.
8. Network OS.
A network operating system (NOS) can be defined as specialized computer operating system that are designed primarily for use on network devices such as routers, switches, workstations, which are mainly connected to a local area network.
Generally, the biggest limitation of a network operating system (NOS) is lack of global in terms of memory, process, device, and file management.
PLEASE HELP ME ASAP ITS IMPORTANT
Describing the One-to-Many Relationship
What is another name for the one-to-many relationship?
child-to-parent
O parent-to-child
O student-to-teacher
O teacher-to-student
Ve
Answer: B) Parent-to-child
Answer:
What is another name for the one-to-many relationship?
child-to-parent
Correct Answer: parent-to-child( B)
student-to-teacher
teacher-to-student
Explanation:
1.
A unique characteristic of the sports industry is that it seeks to attract markets that will
perform which action?
A. Demand mostly tangible products
B. Have consumers with artistic talent
c. include spectators and participants
D. Are concerned with environmental issues
Answer:
D. Are concerned with environmental issues is the answer
Answer quick plzzz I only have 2 hours
Answer:
option 2
Explanation:
Answer:
B. Kathy performs tasks common to the Engineering and Technology pathway and Sean and Joan perform tasks common to the Science and Math pathway.
Write a program that lets the user enter the total rainfall for each of 12 months into a vector of doubles. The program will also have a vector of 12 strings to hold the names of the months. The program should calculate and display the total rainfall for the year, the average monthly rainfall, and the months with the highest and lowest amounts.
Answer:
Explanation:
#include<iostream>
#include<iomanip>
#include<vector>
using namespace std;
double getAverage(const vector<double> amounts)
{
double sum = 0.0;
for (int i = 0; i < amounts.size(); i++)
sum += amounts[i];
return(sum / (double)amounts.size());
}
int getMinimum(const vector<double> amounts)
{
double min = amounts[0];
int minIndex = 0;
for (int i = 0; i < amounts.size(); i++)
{
if (amounts[i] < min)
{
min = amounts[i];
minIndex = i;
}
}
return minIndex;
}
int getMaximum(const vector<double> amounts)
{
double max = amounts[0];
int maxIndex = 0;
for (int i = 0; i < amounts.size(); i++)
{
if (amounts[i] > max)
{
max = amounts[i];
maxIndex = i;
}
}
return maxIndex;
}
int main()
{
vector<string> months;
vector<double> rainfalls;
months.push_back("January");
months.push_back("February");
months.push_back("March");
months.push_back("April");
months.push_back("May");
months.push_back("June");
months.push_back("July");
months.push_back("August");
months.push_back("September");
months.push_back("October");
months.push_back("November");
months.push_back("December");
cout << "Input 12 rainfall amounts for each month:\n";
for (int i = 0; i < 12; i++)
{
double amt;
cin >> amt;
rainfalls.push_back(amt);
}
cout << "\nMONTHLY RAINFALL AMOUNTS\n";
cout << setprecision(2) << fixed << showpoint;
for (int i = 0; i < 12; i++)
cout << left << setw(11) << months[i] << right << setw(5) << rainfalls[i] << endl;
cout << "\nAVERAGE RAINFALL FOR THE YEAR\n" << "Average: " << getAverage(rainfalls) << endl;
int minIndex = getMinimum(rainfalls);
int maxIndex = getMaximum(rainfalls);
cout << "\nMONTH AND AMOUNT FOR MINIMUM RAINFALL FOR THE YEAR\n";
cout << months[minIndex] << " " << rainfalls[minIndex] << endl;
cout << "\nMONTH AND AMOUNT FOR MAXIMUM RAINFALL FOR THE YEAR\n";
cout << months[maxIndex] << " " << rainfalls[maxIndex] << endl;
return 0;
}
why the internet is not considered a mass medium in Africa
Answer:
the reason why internet not considered as a mass medium is probably because most of the African are not educated and civilized, thereby making them not common to the usage of the internet.
Which security measure provides protection from IP spoofing?
A ______ provides protection from IP spoofing.
PLEASE HELP I need to finish 2 assignments to pass this school year pleasee im giving my only 30 points please
Answer:
An SSL also provides protection from IP spoofing.
Please help me ASAP!
Answer:
security hacker
Explanation:
security hackers are people who hack software to check for vulnerabilities. most of the time security hackers are white hat hackers who work to perform penetration tests to see if a software is secure.
tell me if this is wrong :)
4. Ito ay ang lugar kung saan nagtatagpo ang bawat column at
row.
A. cell
B. data
C. file tab
D. sheet tab
PATULONG PO PLS
Answer: A. Cell
Explanation:
A cell is the point on the worksheet that results from the intersection of a column and a row.
This is why cells can be identified by the column and row that they are the result of. For instance, a cell can be called "A12" which is also known as its "address". This means that it is a result of the intersection of "Column A" and "Row 12".
what is the Is option that prints to the author of a file?
Answer:
We need to use Option - 'author' along with option- 'l'What are the difference between data and information?
Answer
The terms data and information can mean different things in different contexts, but the main differences between them are: Data is a collection of facts. Information is how you understand those facts in context. Data is unorganized, while information is structured or organized.
Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the user to enter a string which is subsequently displayed in uppercase. It is important to first ensure that string to be converted is in the a-z range. The program does not recognize any space, symbols or any kind of punctuation marks. Any time the user enters any of this character the program is going to repeatedly ask for the valid string.
An example execution of your program could be:
Please enter your string: 1winter
Invalid Entry!
Please enter your string: summer
Your capitalized string:SUMMER
Answer:
try this
Explanation:
MSG1 DB 10,13,'enter any string:-$'
MSG2 DB 10,13,'converted string is:-$'
P1 LABEL BYTE
M1 DB 0FFH
L1 DB?
P11 DB 0FFH DUP<'$'>
DATA ENDS
DISPLAY MARCO MSG
MOV AH,9
LEA DX,MSG
INT 21H
ENDM
CODE SEGMENT
ASSUME CS: CODE,DS:DATA
START:
MOV AX,DATA
MOV DS,AX
DISPLAY MSG1
LEA DX,P1
MOV AH,0AH
INT 21H
DISPLAY MSG2
LEA SI,P1
MOV CL,L1
MOV CH,0
CHECK:
CMP[SI],61H
JB DONE
CMP[SI],5BH
UPR: SUB[SI],20H
DONE: INC SI
LOOP CHECK
DISPLAY P11
MOV AH,4CH
INT 21H
CODE ENDS
END START
What kinds of components are tangible assets?
Answer:
Tangible assets are physical like cash, inventory, vehicles, equipment, buildings and investments.
Explanation:
Write a new method in the Rectangle class to test if a Point falls within the rectangle. For this exercise, assume that a rectangle at (0,0) with width 10 and height 5 has open upper bounds on the width and height, i.e. it stretches in the x direction from [0 to 10), where 0 is included but 10 is excluded, and from [0 to 5) in the y direction. So it does not contain the point (10, 2). These tests should pass:
Answer:
Explanation:
The Rectangle and Point class is not provided in this question but was found online. Using that code as guidance I created the following method named contains. This method takes in a Point object and checks to see if the x-axis point is inside the parameters of the Rectangle class and then checks the same for the y-axis. If it is inside the Rectangle then the method returns true otherwise it returns false.
def contains(self, point):
return self.width > point.x >= self.corner.x and self.height > point.y >= self.corner.y
You have a larger file but do not need it right away. In this scenario, you have to change the way a file is used to make it what?
O open
o closed
compressed
O usable
Answer:
Compressed
Explanation:
I hope this helps!
Answer:
usable
Explanation:
open doesnt make any sense, neither does closed and compressed is wrong i chose it and got it wrong. Its usable
You have configured a LAN with 25 workstations, three network printers, and two servers. The workstations and printers will have dynamically assigned IP addresses, and the printers always need to have the same IP address assigned. The servers will have static IP addresses. What should you install on one of the servers, and what are some of the configuration options
Answer:
install and configure on the server DHCP (Dynamic Host Configuration Protocol)
Explanation:
In this scenario, you should install and configure on the server DHCP (Dynamic Host Configuration Protocol), this protocol automatically assigns each individual PC a unique IP address and DNS server information. This protocol has various configuration options such as being able to set a range for the IP addresses so that they can be used by different devices in the system. It also allows you to directly set the subnet and passage gateway so that all of the workstations can quickly communicate with one another and quickly be targeted by the administration.
Determining Uses for Outer Joins
Which situation would most benefit from an outer join?
a query that shows only customers who placed orders
a query that shows all duplicate customers from both tables
O a query that shows only the orders that have customers attached
a query that shows all customers, whether or not they placed an order
ve
Answer:
a query that shows all customers, whether or not they placed an order
Explanation:
EDG 21
List to String (0.5 points) Since we are often dealing with a list of strings, it would be useful to have a function to tum a list of strings back into one single concatenated string, This function will return a string that is each element of input_list concatenated together with each separated by the string Separator For example, the following function call: list_to_string('This', 'is's 'fun' should return; "This is fun To do this, write a function called list_to_string This function should have the following inputs, outputs, and internal procedures: Input(s) input_list - list of strings . separator - string Output(s); . output - string Procedure(s): - assign a variable called output to be the first (index 0) element from input_list - loop through the rest of input_list, looping from the 2nd element index 1) through to the end of the list - Within the loop, use string concatenator to combine output with the current element, separated by separator • Assign the output of this to be the new value of output • return output, which should now be a list of the elements of input_list joined together into a single string
Answer:
The function is as follows:
def list_to_string(input_list,separator):
output = ""
for inp in input_list:
output+=inp+separator
output = output[:-1]
return output
Explanation:
Given
See attachment for instruction
Required
A function to convert list to string
This defines the string
def list_to_string(input_list,separator):
This initializes the output to an empty string
output = ""
This iterates through the input list
for inp in input_list:
This concatenates every string in the list including the separator
output+=inp+separator
This removes the last character of the string
output = output[:-1]
This returns the output string
return output
Plz hurry it’s timed
Write a program that reads in a text file, infile.txt, and prints out all the lines in the file to the screen until it encounters a line with fewer than 4 characters. Once it finds a short line (one with fewer than 4 characters), the program stops. Your program must use readline() to read one line at a time. For your testing you should create a file named infile.txt. Only upload your Python program, I will create my own infile.txt using break
Answer:
Explanation:
f=open("infile.txt","r")
flag=True
while(flag):
s=f.readline().strip()
if(len(s)>=4):
print(s)
else:
flag=False
what is a web client
Answer:
A Web client typically refers to the Web browser in the user's machine or mobile device. It may also refer to extensions and helper applications that enhance the browser to support special services from the site.
hope this helps
have a good day :)
Explanation:
write a object oriented c++ program
Answer:
I don't know how to code C++
Explanation:
Who first demonstrated the computer mouse?
O Microsoft
O Alan Turing
O Douglas Engelbart
O Apple, Inc.
FAST PLEASEEE THANK YOUUU
Answer:
C. Douglas Engelbart
Explanation:
Answer: C
Explanation:
1. Tracy is studying to become an esthetician. Give three reasons why she needs to have a thorough
understanding of facial machines.
Select the correct answer from each drop-down menu.
As a technical writer, you should state your purpose in the 1. ________ of your summary. In addition, you must _
2.______ the words used in the original document while writing a summary.
1. Last sentence
1. First sentence
2. Paraphrase
2. Copy
2. Quote
Answer:
1. First sentence
2. Paraphrase
Explanation:
Just took it
The given SQL creates a Movie table and inserts some movies. The SELECT statement selects all movies released before January 1, 2000 Modify the SELECT statement to select the title and release date of PG-13 movies that are released after February 1, 2008. Run your solution and verify the result table shows just the titles and release dates for The Dark Knight and Crazy Rich Asians. 3 6 1 CREATE TABLE Movie ( 2 ID INT AUTO_INCREMENT, Title VARCHAR(100), 4 Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')), 5 ReleaseDate DATE, PRIMARY KEY (ID) 7); 8 9 INSERT INTO Movie (Title, Rating, ReleaseDate) VALUES 19 ('Casablanca', 'PG', '1943-01-23'), 11 ("Bridget Jones's Diary', 'PG-13', '2001-04-13'), 12 ('The Dark Knight', 'PG-13', '2008-07-18'), 13 ("Hidden Figures', 'PG', '2017-01-06'), 14 ('Toy Story', 'G', '1995-11-22'), 15 ("Rocky', 'PG', '1976-11-21'), 16 ('Crazy Rich Asians', 'PG-13', '2018-08-15'); 17 18 -- Modify the SELECT statement: 19 SELECT * 20 FROM Movie 21 WHERE ReleaseDate < '2000-01-01'; 22
Answer:
The modified SQL code is as follows:
SELECT Title, ReleaseDate FROM movie WHERE Rating = "PG-13" and ReleaseDate > '2008-02-01'
Explanation:
The syntax of an SQL select statement is:
SELECT c1, c2, c...n FROM table WHERE condition-1, AND/OR condition-n
In this query, we are to select only the title and the release date.
So, we have:
SELECT Title, ReleaseDate
The table name is Movie.
So, we have:
SELECT Title, ReleaseDate FROM movie
And the condition for selection is that:
Ratings must be PG-13
And the date must be later than February 1, 2008
This implies that:
Rating = "PG-13"
ReleaseDate > '2008-02-01'
So, the complete query is:
SELECT Title, ReleaseDate FROM movie WHERE Rating = "PG-13" and ReleaseDate > '2008-02-01'
1) Create a class called Villain. Specifically, a Villain has the following fields: .name (String)
a number of evil plans (int) In addition, a Villain has the following methods: • a constructor that accepts an argument for each of the fields . a copy constructor
an equals method, which checks/returns whether all the fields are the same
a toString method
2) Create a class called Crazy Villain, which inherits from Villain. Specifically, a Crazy Villain has the following additional fields:
a crazy laughter (String)
a crazy idea (String In addition, write code for the following Crazy Villain methods:
a constructor that accepts an argument for each of the fields
a toString method that overrides the Villain toString method, in order to include the additional fields You do not need to instantiate/demo Villain or Crazy Villain objects.
Answer:
Explanation:
The following code is written in Java and creates both of the classes as requested with their variables and methods as needed. The crazyVillain class extends the Villain class and implements and overrides the needed variables and methods. Due to technical reasons, I have added the code as a txt file below.
A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web services for client workstations on the 10.10.10.0/24 network. The same client workstations are configured to contact a server at 192.168.1.15/24 for domain name resolution.
Required:
What rules should the technician add to the firewall to allow this connectivity for the client workstations
Answer:
Explanation:
Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following
Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443
Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53
This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.
PLEASE HELP ME ASAP!!!!
n
What options are available in the Lookup Wizard? Check all that apply.
label the field
sort the records
filter the records
o adjust the column width
O adjust the header height
reduce the number of columns
Je
set where to get lookup field values
Answer:
Label the field
sort records
adjust the column width
set where to get lookup fields
Explanation: