Answer: A flowchart is a type of diagram that represents an algorithm, workflow or process. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. ... Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.
Explanation: brainliest plz!
the superclass javax.servlet.http.httpservlet was not found on the java build path
Answer:
follow this link https://stackoverflow.com/questions/22756153/the-superclass-javax-servlet-http-httpservlet-was-not-found-on-the-java-build
Explanation:
nice
_____ selling is used when a product is sold from one business to another .
Answer: cross-selling
Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.
is a technique for breaking a problem down into smaller, less complex parts.
A- Pattern recognition
B- Decomposition
Answer:
B) decomposition
Explanation:
I got it right on the test
I will make you brainless Just answer this question!!
A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on.
Answer:
1. 3
2. 8
3. 2
4. 6
5. 4
6. 5
7. 9
8. 1
9. 7
Explanation:
Im not sure about this but I hope it helps
The number 8 is actually first
what does your dns server might be unavailable mean?
Answer:
flush your dns
Explanation:
Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.
2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer appear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:
Answer:
1 false
2 false
3 false
4 true
5 false
Explanation:
Answer:
False, True, True, True, False
Explanation:
1. False, it is a calculation device not electronic device.
2. True
3. True, Header appear at the top and Footer appear at the bottom.
4. True
5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?
a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.
Answer:
d. The user is out of the effective range of the wireless access point on her floor.
Explanation:
Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they view the bright images on the page. Which design principle is Cathy using?
Answer:
dominance
Explanation:
i just took it and got it right
did someone hang themselves on set of wizard of oz
No - its a rumour that has been going around since the films 50th anniversary in 1989.
who is considered as the father of computer?
Charles Babbage is considered as the father of computer......
Answer:
Charles Babbage is considered the "Father of Computing"
An advantage of a private home network is that is typically more secure than public Wi-Fi.
Answer:
yes it's true
Explanation:
please mark brainiest
Answer:
I agree on that.
Explanation:
Of course you can use a vpn to encrypt your data being sent to router but it is easier to just connect to a private network.
Hope this help please give the brainliest award would be much appreciated.
Automated Deployment is one of the prerequisite for DevOps Implementation.1. True2. False
Automated Deployment is one of the prerequisite for DevOps Implementation is a true statement.
Automated deploymentAutomated deployment provides the ability to move your software between testing and production environments by using automated processes.
In other words, it allows organizations to release new features faster and more frequently.
Automated deployment allows faster approach to development, production and deployment.
learn more on automated deployment: https://brainly.com/question/17052494
#SPJ2
which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?
The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."
A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.
A device driver is a form of software file that ensures hardware device functions as designed.
Several types of device drivers include:
BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.Hence, in this case, it is concluded that the correct answer is Device Driver.
Learn more here: https://brainly.com/question/19473613
Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way? Check all of the boxes that apply.
checking social media networks during working hours
surfing the Internet during working hours for what to do on the weekend
downloading a favorite band’s latest album from a file-sharing service
Answer:
All of the above.
Explanation:
You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading anything from anywhere is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.
1. Define the term Intranet.
2. List three advantages of the intranet.
3. List three disadvantages of the intranet.
4. Briefly define the term extranet. 2marks
5. List three advantages of the extranet.
6. List two disadvantages of the extranet.
Answer:
1.a local or restricted communications network, especially a private network created using World Wide Web software.
2.Enhanced employee engagement.
Increased productivity.
Better connection and collaboration of distributed employees.
Streamlined communication of change management.
Establishing and reinforcing a strong company culture.
Efficient time management.
3.Costly and timely implementation. Intranet can be very costly and time-consuming to implement.
Complexity and heavy admin burden.
Poor user experience.
Low user adoption.
Time-consuming information search.
Internal use only.
Lack of employee advocacy.
Hard to measure success and effectiveness.
4.An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
5.Information sharing is simple. Without a client extranet, you're likely sharing files with outside parties via email.
Documents are safe and secure.
Project management is easy.
Setup and training require little to no IT involvement.
Professional branding makes a great impression.
6.Cost. It is no doubt that extranet involves direct expenses such as hardwares, softwares and training of employees.
Maintenance. Both extranet implementation and maintenance is made expensive within an organization.
Dependency.
System Protection.
Communication Delay.
User Friendliness.
Explanation:
how to get into someones phone without knowing the password iphone
Answer:
you should not do that unless you have a good reason to.
Difference between batabse and database management system
Answer:A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ... The data can then be easily accessed, managed, modified, updated, controlled, and organized.
Explanation:A database could be grades that students get at school and to manage it we can use a spreadsheet program like excel
pasagot po pls
tle-6
Which options are available in the Conditional Formatting dialog box?
Answer:
all but b are correct.
Explanation:
the fast speed of _______ available today enable computers to work very fast
Answer:
main hardware components such as:
1. CPU
2. RAM
3. Motherboard (bus speed)
4. Hard drive
5. Video Card
6. Cache
7. Latest operating system (Windows XP, Windows 10, etc.)
which are types of gradients to choose from when working in photoshop
Answer:
can anyone help me in computer
There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).
How might colour blindness be utilised in Photoshop?Click See Proof Setup Color Blindness Protanopia-type/Color Blindness Deuteranopia-type to use it. Now, you can toggle it on and off simply using the Ctrl+Y key on a PC or the +Y key on a Mac.
To help with design, there are certain tools that imitate colour blindness. Change the document's colour mode to RGB (this mode provides the most accurate proofs for colour blindness) Select either Protanopia-type or Deuteranopia-type under View > Proof Setting > Color Blindness.
Therefore, There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).
To know more about Photoshop visit:-
brainly.com/question/30808560
#SPJ2
in this code how many times will it repeat? for(i = 0; i < 8; i++) {forward();}
Answer:
It will repeat 8 times. because in the statement above the variable i has to be more then 8, so until the variable i has the value of it it will repeat. So it will repeat 8 times .
Which hacking technique uses network monitoring devices?
Sniffing
Shoulder surfing
Physical security threat
Wire tapping
Answer:
The answer is sniffing, because sniffing is a process that captures all the data packets, when the network is mentioned.
A document used to convince a panel of potential funders to help a product, programor service become reality.
Answer:
Concept paper
Explanation:
in classification problems, the primary source for accuracy estimation of the model is ________.
Answer:
In classification problems, the primary source for accuracy estimation is the confusion matrix (or classification matrix or contingency table)
How can we repair a head jack of a laptop charger.????
Answer:
Step one turn off the laptop. And take out the battery step two remove the Phillips screw. And then take out the back. Cover. Step three remove four phillips screws. And then take out the hard.
Explanation:
What is a network?
A. The main idea or information contained in a media piece
B. Many people or things that are individually connected to one
another
C. A means of mass communication in print and other forms
D. A group of individuals who share the same ideas and values
Answer:
it is A and have a wonderful day
only cool people answer this question.
are you cool?
Answer:
Yes
Explanation:
I like frogs
Answer:
always been coolswag
Please please help ASAP please
Answer:
he say yes would i do so way 2 be hey i oh peepo
Explanation: