Answer:
Option D, testing the response time of a large file upload
Explanation:
Non functional testing is basically the testing of non performance related attributes. Time taken in uploading a file is of a non performance attribute and hence, testing this attribute is termed as non functional testing. Remaining options are essential performance attributes which needs to be tested regularly.
Hence, option D is correct
Which of the following Windows PowerShell commands performs a DNS name query for www.contoso.com?
a. ping www.contoso.com
b. dnsquery www.contoso.com
c. resolve-DNSName -Name www.contoso.com
d. resolve-DNSquery
The DNS name query for www.contoso.com is carried out by the Windows PowerShell command resolve-DNSName -Name www.contoso.com.
When syncing a Windows 10 machine with a wifi access point?The most recent security protocol with the highest standards is WPA3 (Wi-Fi Protected Access version 3). Simultaneous Authentication of Equals is a handshake used by WPA3 to protect against dictionary attacks and shield its network from potential assaults that WPA2 could allow.
To verify network connectivity between two hosts, which of the following commands is used?Traceroute - To find the route between two connections, use the traceroute command. Frequently, a link to another device must pass via several routers. The traceroute command will return all of the router names or IP addresses between two devices.
To know more about DNS name query visit :-
https://brainly.com/question/28235999
#SPJ4
The statement “If a customer buys a dozen eggs, he or she is 80% likely to also purchase milk.” is a conclusion that may be determined from what type of data mining?
Regression Analysis
Clustering Analysis
Association Rule Mining
Anomaly or Outlier Detection
Answer:
Association Rule Mining
Explanation:
The statement being made is a conclusion that may be determined with Association Rule Mining. This is because this type of data mining focuses on discovering various frequently occurring patterns, correlations, or associations in large sets of data. In this statement, various surveys or experients would have most likely concluded that many individuals that ended up buying a dozen eggs also purchased milk, which would have indicated a pattern in the data set.
The type of data mining from which the given statement concluded is; C: Associate Rule Mining
What is Data Mining?The given statement made is a conclusion that can be determined with Association Rule Mining. This is because this type of data mining is one that places emphasis on discovering various frequently occurring patterns, correlations, or associations that exists in large sets of data.
Finally, various surveys or experiments would most likely have definitely concluded that many individuals that ended up buying a dozen eggs that is 80% also likely to purchase milk, which would indicate a pattern in the data set.
Read more about Data Mining at; https://brainly.com/question/14846093
Sarah has an audio file to insert into a presentation, but she does not want the entire file to play. What should she do to have only a portion of the file play when the audio control is selected?
1. Create bookmarks.
2. Edit the file prior to inserting it into the presentation.
3. Use the Trim Audio dialog box.
4. Configure Audio styles.
Answer:
3. Use the Trim Audio dialog box. :3
Answer:
3: Use the Trim Audio dialog box.
Explanation:
I am not entirely sure, though I am quite certain.
One line of code is missing (marked in
red). Write a single line that MUST use the
class function "plus" to increase the value
of num1.number.
When done correctly, this code already will
print the new value of num1.number.
Answer: num1.plus(1);
Explanation:
What is the easiest way of ensuring that others can access a presentation that a user has created and make changes to it, while also ensuring that those changes are tracked and coauthoring can occur?
Save to removable media.
Email the file.
Store on OneDrive and share.
Make a second copy of the file.
Answer: Its C
Explanation: I just found the answer
R Management 4. Assume that your system has one queue for jobs waiting for printing, and another queue for those waiting for access to a disk. Which queue would you expect to have the faster response? Explain your reasoning.
This suggests that the other queue, where jobs are awaiting access to a disk, will move more quickly.
Why is a system referred to as a computer?Its interconnected components (input, output, storage, and CPU) work together to accomplish the tasks specified in the program being run, a computer is referred to as a system.
This is so that other jobs can't interfere with the job that is done as even the printing queue operates on the first Attend, First Wait algorithm, which requires the queue waiting and printing services to go through numerous other procedures before the service provided to print. Additionally, since the job with printing must save the data on the disk, there is a chance that doing so will quickly and randomly alter the disk's content. This may lead to the potential that perhaps the disk is just not updated with the most recent information; as a result, the printing process may produce outdated information that is unusable. However. As it does not operate according to the initial Ask, first Serve algorithm, the queue waiting for disk access would've been able to handle more jobs quickly.
To know more about System visit :
https://brainly.com/question/30146762
#SPJ4
You are seeing streaks of toner across your papers when you are printing things using your office's laser printer. What is the MOST likely cause of this problem
It's usually a sign of a filthy transfer roller if you notice toner streaks on your printouts. As a result, routinely cleaning the transfer roller will keep your printed documents spotless.
What brings about toner streaks?Toner can pour out of a broken cartridge, or it can cause streaky prints. It is necessary to change your toner cartridge if any of its photoconductor's (the part with the green or blue roller) parts are visibly harmed.
Why are there streaks on my laser printer's prints?The most common causes of streaking are a used-up toner cartridge or a worn-out drum unit. Drum units are consumables that only require replacement after using three or four toner cartridges. Toner and drum units are not always used separately by printers.
To know more about laser printer visit:-
https://brainly.com/question/14783882
#SPJ4
The trackpad/touchpad on my laptop is acting unusual. When I click on something or move to an area, it jumps or moves to another area. What would be a good troubleshooting step to try and resolve this issue
1. Check Drivers: this probably won't solve your issue as driver problems are pretty rare, but it's a pretty good first step. To find drivers, search your model number on your manufacturers website.
2. Dry out the touchpad: I've had similar experiences when a touchpad is wet. Dry out the touchpad using a microfiber cloth or a paper towel.
What function should be used to draw a box?
Answer:
noun In cotton manufacturing, a set of three or more pairs of rollers attached to combing- and certain other machines for attenuating, or drawing out, the sliver.
Explanation:
Source code is one particular representation of a software system. It highlights some details and hides others. This is a good example of:
A nice example of abstraction is when a source code shows some details while hiding others.
What exactly is computer source code?A programmer's text editor or visual programming tool-created programming statements that are later saved in a file are known as source code. The output, a compiled file, that results from the compilation of the source code using a C compiler is referred to as object code in most contexts.
How is the source code concealed?Really, there is no method to conceal the source code for languages used on the web. Everyone has access to it if the browser can see it. Obfuscating it is one way to try to make it more difficult. Given enough time, one can still make sense of it.
To know more about abstraction visit :-
https://brainly.com/question/19419456
#SPJ4
While configuring a Windows 10 workstation for a new high priority project, you decide to mirror the operating system disk drive for redundancy. Which type of RAID (Redundant Array of Independent Disks) will you be configuring in Windows disk management
RAID1 type of RAID will be configuring in Windows disk management.
What do RAID 1 0 and 0 +1 mean?Despite the similarities between RAID 1+0 and RAID 0+1, the numbers' reversed order implies that the two RAID levels are layered in the opposite direction. In RAID 1+0, two drives are mirrored together before being combined into a striped set. Two stripe sets are created and then mirror using RAID 0+1.
RAID 1 has how many drives?With two drives, RAID 1 is most frequently used. Drive failure fault tolerance is provided by the replicated data on the disks. While write performance is reduced to that of a single drive, read performance is boosted. Without data loss, a single drive failure is possible.
To know more about RAID visit
brainly.com/question/14669307
#SPJ4
an array is a(n) ____ of values in computer memory.
In a computer's memory, an array is a list of values. Each element (value or variable) in an array is identified by at least one array index or key. An array is a type of data structure.
when using subscript 6 when you have a 5 element array?It is argued that your subscript is out of limits if you have a five element array and use subscript 6. The loop control variable has two possible values: increase and decrease. By exiting a loop as soon as a match is discovered in the array, you can increase a program's efficiency.
In a data structure, what exactly is an array?A continuous stream of memory locations is used to hold elements of the same data type in arrays.
To know more about array visit :-
https://brainly.com/question/13261246
#SPJ4
Python ch5
Write the code to call the function named send_signal. There are no parameters for this function.send_signal()
Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to standard output a single line consisting of 5 periods (".").
def printDottedLine():
print(".....")
Write the code to call a function whose name is send_number. There is one argument for this function, which is an int. Send 5 as an argument to the function.send_number(5)
Write the code to call a function named send_variable and that expects a single int parameter.
The code to call the function name send_signal() is given below.
In Python, how can you call any function without any arguments?In these circumstances, we can call the function using default arguments without providing the values again for parameter values.Python allows us to accomplish this by using the = sign and the default value.
send_signal().
def printDottedLine():
print(".....")
def printDottedLine():
print(".....")
send_number(5)
send_variable(x);
To know more about Python visit:
https://brainly.com/question/13437928
#SPJ4
Which best describes the jobs each applicant could obtain with their education background?
Answer:
Eli can work as an e Electromechanical Technician. Blake can work as a Museum Conservator. Fiona can work as a Robotics Engineer, and Zoey can work as a Mathematician
Explanation:
The degrees earned by the applicants for the STEM Career Cluster are;
Eli; High school diploma, associate degree
Blake; High school diploma, bachelor's degree, masters degree
Fiona; High school diploma, bachelor's degree
Zoey; High school diploma, bachelor's degree, doctoral degree
a) The educational requirement for an Electromechanical Technician is a post secondary certificate in mechanical or electronic technology or an associate degree
The suitable candidate to work as an Electromechanical Technician is Eli to prevent underemployment of the other candidates
b) The educational requirement for a Museum Conservator is usually a master's degree
The suitable candidate is Blake
c) The minimum educational requirement for a Robotics Engineer is a bachelors degree
Therefore, Fiona can obtain a job as a Robotics Engineer
d) The educational requirement for a Mathematician is usually a masters or doctorate degree
Based on the educational requirement, only Zoe can obtain a job as a Mathematician.
After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops. The company’s IT department has seen a large number of the following incidents:
• Duplicate IP addresses
• Rogue network devices
• Infected systems probing the company’s network
Which of the following should be implemented to remediate the above issues? (Choose two.)
A. Port security
B. Route protection
C. NAC
D. HIPS
E. NIDS
A. Port security and C. NAC (Network Access Control) should be implemented to remediate the above issues.
What is Port security?Port security is a feature that allows an administrator to specify which devices are allowed to connect to a switch port. It can also be used to limit the number of MAC addresses that are allowed to connect to a port. This can help prevent rogue devices from connecting to the network, which can help prevent unauthorized access and protect against attacks.
What is Network Access Control (NAC)?Network Access Control (NAC) is a security solution that helps to enforce security policy compliance on all devices attempting to access a network. It is used to authenticate and authorize devices before they are allowed to connect to the network. It can also be used to block or quarantine infected or noncompliant devices to prevent them from spreading malware or compromising the security of the network. Additionally, NAC can be used to ensure that devices connecting to the network have the latest security updates and patches installed.
To know more about BYOD policy visit :
brainly.com/question/28096962
#SPJ4
Outline four types of cyber law.
Answer:
Fraud, Copyright, Defamation, Harassment and Stalking, Freedom of Speech, Trade Secrets, and Contracts and Employment Law.
Explanation:
These are the major areas of cyber law.
The rules and meaning of The Royal Game of Ur have been preserved on stone tablets.
true
false
Answer:
True
Explanation:
Answer:
True
Explanation:
Which of the following kinds of file utilities shrink the size of a file(s)?
A. conversion. B. file compression. C. matrix. D. unit
The Correct answer is Option (B), A file compression utility is a utility that shrinks the size of a files.
What is Compression utility?A software package that compressed and decodes different file types is known as a compression software or compression utility. Tools of compressing and uncompressing files are generally included with operating systems. For instance, the most recent versions of Microsoft Windows come with a tool for producing and extracting compressed files.
What makes a compression tool helpful?Black and white pictures can be compressed up to 10 times, and color image files can be compressed up to 100 times). They will upload faster as a result, making them considerably simpler to email and transfer.
To know more about Compression utility visit :
https://brainly.com/question/30022738
#SPJ4
Joe works for an insurance company and has been tasked with creating a web-based application that the field adjusters can use to upload pictures of vehicles they are inspecting. Which of the following components would Joe need to create and configure on their cloud service provider's portal for the pictures to be saved to
We tried several cloud backup services, and while they are all difficult to use for various reasons, we nevertheless advise utilising one.
What is cloud backup services?Local backups serve as the foundation of a sound backup strategy, but an online backup service should be the capstone. In our opinion, Back blaze is the best cloud backup service for the majority of users and the most user-friendly after years of testing.Back blaze is the least expensive backup solution we examined, offering unrestricted online storage for one machine for about $70 annually. On Mac and Windows, it is simple to use. The uploads begin right away with the most frequently used folders that need backing up when the software is installed and the settings are left to their defaults. Despite the fact that Back blaze only retains file versions for 30 days, which is shorter than we'd prefer, it does provide paid upgrades to extend the time that backups are kept accessible. Backblaze supports external drives that are linked to your computer and offers a robust selection of online support resources. However, the use of private encryption keys compromises some security for usability, and the restoration procedure is far too slow.To Learn more About cloud backup services Refer To:
https://brainly.com/question/13152446
#SPJ4
An application named APP1 runs on a domain-joined Windows server named SERVER1. When APP1 runs, it reads and writes to a specific registry key. You need to harden APP1's access to the registry. What should you do
Make a service account for APP1 and use regedit.exe to provide the service account the required registry rights.
In regedit, how can I add permissions?Click Start > Run > type regedit.exe > press Enter to launch the Registry Editor. Right-click the key that requires permission in the left pane, then select Permissions. Choose the user or group to which the permission should be applied. For the access levels of the group or username, select the Allow checkbox.
Registry permissions: What are they?Each permission option allows you to manage Registry rights for a certain person or group. Three groups of these permissions are provided by the Registry. The procedure of defining user access to the Registry keys is made simpler by these groupings.
To know more about APP1 visit:-
https://brainly.com/question/30137229
#SPJ4
Which local folder temporarily stores all sent mails until they are successfully sent to a recipient
Answer:
The outbox stores all outgoing emails until the Email programs sends them to a recipient.A computer or phone's outbox is a folder where emails that are awaiting sending are kept
Explanation:
Why do you think lists are essential concepts in programs?
Answer:
A list, sometimes called an array, is a tool for storing data, just like a variable. However, unlike a variable, which can only store one piece of data, a list can store many. Like a variable, a list is a named storage area within the computer's memory.
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
Answer: DNS
Explanation:
I need help with creating a code for defining if a number i an Armtrong or not
on code h
A number is said to be Armstrong if the sum of its digits raised to the power of three equals the number itself. For instance, the number 371 is an Armstrong number as 3**3 + 7**3 + 1**3 = 371
I don't know how to receive my Armstrong number.
Armstrong numbers are numbers that are identical to themselves when the various digits of the number are added together to form a cube. Because 153 = 13+53+33, it is an Armstrong number. Expected Results: The Armstrong number is 153.
The inventor of the Armstrong number?
American electrical engineer and inventor Edwin Howard Armstrong (December 18, 1890 – February 1, 1954) created the superheterodyne receiver system and FM (frequency modulation) radio.
To know more about armtrong number visit:
https://brainly.com/question/29556551
#SPJ4
Match the situation to the type of operating system installation best suited for it. 1 . Clean installation A new employee will be using a computer that has been in storage for some time. 2 . Upgrade installation The sales department is having all of its computers replaced. 3 . Multiboot installation A graphic artist has purchased high-end software to create animations.
If your computer experiences signs of hard drive failure, it’s best to replace it before it completely wears out. This gives you a chance to save the data stored on it, including your operating system.
To learn more about software create animation refers to;
https://brainly.com/question/28218936
#SPJ4
To generate a surrogate key, Microsoft Access uses a(n) ____ data type.
a. identity
b. autoNumber
c. surrogate
d. sequence
You must analyze data on a digital camera's internal memory. You plan to connect your forensic computer to the camera using a USB cable. What should you do to ensure that you do not modify data on the camera
A read-only device known as a forensic disk controller or a hardware write-blocker enables users to access the data on a questionable device without running the risk of changing or destroying the data.
What initial care should be taken with a mobile device to protect data?The easiest approach to handle a mobile device and protect data is to keep it powered on while enclosing it in a Faraday cage.
What program is used to image a disk for forensic purposes?The Autopsy and the Sleuth Kit are probably the two most well-known forensics toolkits. The Sleuth Kit is a command-line tool that does forensic examination of hard drive and smartphone forensic photos.
To know more about forensic disk visit:-
https://brainly.com/question/9692470
#SPJ4
A painting company has determined that for every 112 square feet of wall space, one gallon of paint and eight hours of labor will be required. The company charges $35.00 per hour for labor.
Write a function named compute_cost(), that takes area of wall space and the price of a paint gallon. Function then computes the following:
The number of gallons of paint required
The hours of labor required
The cost of the paint
The labor charges
The total cost of the paint job
Finally it returns the total cost to the calling program
Write the main() function that prompts the user to enter area of wall space to be painted and the price of a paint gallon. The main function then calls compute_cost() function to compute the cost and prints the total cos.
Make sure it is in python program
The sum of paint cost() and labor charge ()
print(f"The number of hours of lab time are needed: labour()hours" print(f"The number of gallons of paint are needed: gallons(wall)")
Print "The Price of Paint: $paint cost()," "The Price of Labor: $labour charge()," and "The Total Price of the Job: $round(total(), 2)"
In Python, what is a programme?A collection of Python statements that have been carefully chosen to accomplish a certain task is the simplest definition of a programme.
The square footage of a wall in feet and the cost of a gallon of paint are inputted by the user into the python software. To determine the entire cost of the project based on the quantity of paint and the labour costs, five functions are used: gallons(), labour(), paint cost(), labour charge(), and total().
To know more about Python visit:-
brainly.com/question/18502436
#SPJ4
Which groups on her desktop system could you make her user account a member of to enable this configuration
Remote Desktop Users groups on her desktop system could you make her user account a member of to enable this configuration.
What exactly is the Remote Desktop Users Group?The administrators' group's members are the only ones who can access remote desktops on Liquid Web's Windows servers by default. The Remote Desktop Users group, on the other hand, allows its members to safely connect to the server via RDP (Remote Desktop Protocol).
Is RDP preferable to VPN?The primary distinction between VPNs and RDP is that an RDP gives your device more capabilities, whilst a VPN doesn't. Even though you're still using the same old device, it now has a new IP address and is far more safe when accessing the Internet.
To know more about Remote Dekstop User visit
brainly.com/question/26605428
#SPJ4
Why is computer science so important?
The reason that computer science are:
Economic Impact: Technological AdvancementSocietal ImpactSkill DevelopmentWhat is computer science?Computer science is important for several reasons:
Economic Impact: Computer science is a rapidly growing field with a high demand for skilled professionals. It plays a crucial role in driving innovation and economic growth in various industries such as finance, healthcare, education, and entertainment.Technological Advancement: Computer science is the foundation of modern technology. It is the backbone of the internet and it's a key driver of technological advancements such as artificial intelligence, machine learning, and big data.Societal Impact: Computer science plays a critical role in solving complex societal problems such as healthcare, education, and environmental issues. It can help to improve the quality of life and make the world a better place.Lastly, in Skill Development: Learning computer science helps to develop a range of skills such as problem-solving, critical thinking, and creativity that are valuable in any field.
Learn more about computer science from
https://brainly.com/question/20837448
#SPJ1