Data from RAM may be placed where to free up space? Log file Swap file Word file Print spool file

Answers

Answer 1

Answer:

Swap file

Explanation:


Related Questions

A Program is an Algorithm – a set of directions for the computer to follow.

True
False

Answers

Answer:

True

Explanation:

What is the problem, if any, with the following code?The desired output is [3,19].

>>> aList = [19,3]
>>> aList[O] = aList[1]
>>> aList[1] = aList[O]
>>>aList

•There is no problem.

•You need a temporary variable to hold the value 3.

•You need parentheses around 0 and 1, as in
aList(0) and aList(1).

•You need to import list to use a list.

Answers

Answer:

             You need a temporary variable to hold the value 3.

Explanation: Other user is correct

The problem with the code is that you need a temporary variable to hold the value 3. which is the correct answer would be an option (B).

What is the temporary variable?

A temporary variable in computer programming is a variable with a brief lifespan, typically used to retain data that will be deleted quickly or before it can be placed in more permanent program memory.

The problem with the code is that you need a temporary variable to hold the value 3.

In the first line of the code, the list is initialized with the values 19 and 3. In the second line, the value at index 0 is assigned to the value at index 1, which is 3. This means that the list now contains values 3 and 3.

In the third line, the value at index 1 is assigned to the value at index 0, which is also 3.

This means that the list now contains values 3 and 3, so the output is [3,3] instead of the desired output [3,19].

To fix this problem, you can use a temporary variable to hold the value 3 before assigning it to the other index. The code would look like this:

aList = [19,3]

temp = aList[0]

aList[0] = aList[1]

aList[1] = temp

aList

To learn more about temporary variables click here:

https://brainly.com/question/20309413

#SPJ2

Complete the sentence.
refers to the process of sending the completed software to whomever is in charge of mass-producing the media on which will be distributed, such as CDs Or DVD

Answers

Answer:

The answer is Release-to-Manufacturing

Explanation:

Answer:

the answer is release to manufacturing

Explanation:

I took the test too

The ideal body position for your legs after you've adjusted your seat is with your knee ___.

Answers

Answer:

is slightly crooked when pressing the pedals. This answer has been confirmed as correct and helpful

Explanation:

Hope it helps

The ideal body position while driving for the legs have adjusted from the seat with the knee slightly crooked when pressing the pedals. Thus, option B is correct.

What is the importance of correct body posture?

The body posture is important for the proper blood flow, maintaining and supporting the health of the muscles, tendons, and ligaments.

The complete question is given in the image attached.

The correct body posture to opt while driving helps in the formation of correct control over the vehicle. The correct posture is maintained with the bottom touching the back of the seat and legs adjusted with the seat and the knee slightly crooked when pressing the pedals. Thus, option B is correct.

Learn more about body posture, here:

https://brainly.com/question/12975862

#SPJ2

You are the administrator for a small network with several servers. There is only one printer, which is centrally located. Although indications are that this printer is over-utilized, there is neither space nor budget to add additional printers at this time.

There are often cases where a document is needed urgently, but when it is printed, it goes into the queue and is printed in the order received, not the order of the document's priority. You would like to allow Gladys, the administrative assistant, to have the ability to maintain the print queue. Specifically, you want her to be able to alter the order of printing for the documents waiting to be printed.

You need to permit Gladys to make this change without adding her to the local Administrators group or making significant changes to the way your office operates.

What should you do?

Answers

Answer:

The answer is "Allocate permission for managing documents to the Gladys printer."

Explanation:

In the given scenario, we allow permission for managing the documents to the Gladys printer. It should enable Gladys could continue these trends by bringing something into the community of local administrators and introducing major changes to wherewith your office operates. In especially, they need her to modify its printing process regarding documentation requiring printing.

:) y’all are so nice for helping me ty , but any idea what this is?

Answers

Answer:

Best way is 3

Worst way is the rest

Explanation:

Answer:

the answer is  3

11.5 Code Practice Edhesive??

In this code practice, we will continue to employ W3Schools tools to practice writing HTML. You should have already read through the tutorials for the four HTML topics below, found in Lesson 11.5. Now, complete the exercises linked below for each topic. Once you complete these exercises, move onto the next set of instructions below.

HTML Styles (Links to an external site.)
HTML Formatting (Links to an external site.)
HTML CSS (Links to an external site.)
HTML Links (Links to an external site.)
Create a web page that has two paragraphs. One of the paragraphs should be aligned to the center and have red text. The other paragraph should be aligned to the right and be in italics. Refer to the sample below for clarification.

11.5 Code Practice example

Your program should begin and end with the following tags:



# Insert your code here!


In the programming environment, you will notice that once you type one tag (for example, the html opening tag), the environment automatically populates the closing tag for you. Be careful not to double up on closing tags, otherwise your HTML will not run.

As you write your web page, you can click the "Run Code" button to view it in real time.

Answers

Answer:

<html>

<body>

<p style="text-align:center;color:red;">This is a paragraph.</p>

<p><i> "This text is italic</i></p>

</body>

</html>

Explanation:

I got a 75%. Hope this helps.

HTML codes are placed in segments called tags.

Tags are divided into two

The opening tagThe closing tag

Take for instance, the opening and closing tags of the paragraph tag are <p> and </p>, respectively.

Having explained what tags are, the required HTML code is as follows:

<html>

<body>

<p align="center"><font color="black"> This is a paragraph 1</font></p>

<p align="right"><i> This is a paragraph 2 </i></p>

</body>

</html>

The paragraphs are aligned using center and right alignments, while the text in the first paragraph is colored using the color tag

Read more about HTML at:

https://brainly.com/question/25055825

Adding a form into an App maybe a good idea, however, you must consider how you design it. Why do you think there is a good and bad form design below?

Answers

Answer:

To inform you (the reader) of what to do and what not to do.

Explanation:

By starting it off by saying "..you must consider how you design it" and then following it up with an image of a good and bad form for an App, it gives a visual idea of the Do's and Don'ts, which can help you out much more than explaining it in text.

Hope this helped!

Source(s): None, except my mind. Hope this helped!

Does any one know how to code? If you do can you help me with my project?

Answers

Answer:

kinda look it up!!!

Explanation:

go to code.org free coding

i can help you man

-scav aka toby

30 points

A company values its data and therefore takes steps to ensure it is protected. Which of the following factors may be included in an AUP specifically to protect data?

(Choose all that apply.)

Use of nonsanctioned software on company computers.

Access to sensitive data should be limited to only employees that need the data to do their jobs.

Responsibility for keeping virus checker software is made explicit.

Staff should not read the news on CNN during company time.

They discover that employees, on company time and using company resources, disclose proprietary company information at social networking sites.

They discover that employees, on company time and using company resources, discredit their fellow employees at social networking sites.

Answers

Answer:

The options that apply are:

B, C, D,

Explanation:

AUP refers to the Acceptable Use Policy.

The AUP is usually created to protect company IT resources which include but are not limited to Data (as in information), Data (as in bandwidth) and general IT security.

When people are issued, an AUP, it is so that they understand that they aren't the only ones who need and who use the company's IT resources especially data, hence, they have to use the same responsibly.

So, it may be qualified as a "fair use policy".

It is usually created and administered by the owner, key administrator of an online network, website, or service.

It serves the purpose of providing guidance as to how the resource must be used.

Cheers

______ behavior expected from every professional​

Answers

Answer:

Respectful

Explanation:

Network forensics might deal with what? Retrieving photos from a PC Analyzing text messages Investigating a data breach Defragmenting a hard drive

Answers

Answer:

Investigating a data breach

Explanation:

A data breach usually involves data exfiltration over a computer network. the other options involve data being stored on a device locally which isn't volatile data like text messages, photos or rearranging data in defragmentation all of which does not require a network.

Facial recognition software can do all of the following, except: Match photos based on facial features Generate a picture based on an eyewitness description Be used on a smartphone Search photo databases

Answers

Answer:

Generate a picture based on an eyewitness description

Explanation:

Facial recognition can only recognise faces it cannot generate new faces.

B. Direction: Choose the letter of the correct answer.
11. Filler comes from silex, raw linseed oil, and turpentine.
A. Shellac
b paste filler C. Varnish
d. paint
12. A kind of varnish that is not waterproof.
A Paint
b. Shellac c. Enamel
d. Lacquer
13. What kind of varnish that dries up easily and is not waterproof? It comes from lac gum
diluted in alcohol
A Varnish
b. stains c. Enamel d. Shellac
14. A kind of stain that is easiest to apply on wood.
a. Spirit stain b. fillers c Oil stain
d. paint
15. It prevents moisture on the wood that causes decay.
a. Enamel
b. paint
c. Varnish
d. lacquer​

Answers

That the whole paper bro

I'm feeling really generous.

Answers

Answer:

tysm

Explanation:

hiiii

convert one billion byte into one gigabyte​

Answers

Answer:

One gigabyte (GB) is about 1 billion bytes, or 1 thousand megabytes. A computer might have 4 GB of RAM. A flash memory card used in a camera might store 16 GB.

PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS

A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:

Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50

Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.

Answers

It's pretty hard but I think it is 1,350

why do we need to include this information about online platform?











꧁NOTE::::LINKS ARE NOT ALLOWED FOR THIS QUESTION꧂

Answers

Answer:

online platform is defined as a digital service that facilitates interactions between two or more distinct but interdependent sets of users (whether firms or individuals) who interact through the service via the Internet Like i said above, platforms enable interactions and transactions between interdependent groups. ... While traditional businesses create value by creating products or services, platforms create value by enabling these transactions.

Explanation:

~Bre

someone help me!! i just gotta match these

Answers

Answer:

emails - allow attachments of files, such as images.

reports - convey more factual data that helps facilitate decision making.

memorandum - are written in a block style, with the body text aligned along the left margin.

business letter - are one page long.

I hope it's correct.

what's the best console do you guys think

Answers

Answer:

PS5

Explanation:

becuase its not hard to use

Explain one rule the company must follow when using cookies on its website.

Answers

Explanation:

Work out what cookies your site sets, and what they are used for, with a cookie audit.

Tell your visitors how you use cookies.

Obtain their consent, such as by using Optanon, and give them some control.

Liza is setting up a new Wi-Fi router to use Wi-Fi 5. What is the standard the router I using?
The router is using____, one of the new features added to this standard is___.
Blank 1: 802.11n, 802.11g, 802.11ac
Blank 2: MU-MIMO, MIMO, Mixed-MIMO

Answers

Answer: i have no idea

Explanation:

Im not smart

Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's computer by a Web server destructive software robots working together on a collection of zombie computers via the Internet spider software used by a search algorithm to crawl various Web sites to return a query a common platform used by search engines to index the contents of a Web site a fraudulent e-mail attack that targets a specific person or organization by personalizing the message

Answers

Answer:

destructive software robots working together on a collection of zombie computers via the Internet

Explanation:

Botnets are devices controlled via the internet to achieve a goal that requires multiple computers working towards a shared task. e.g. Denial of service attacks and mass email messaging.

Renita manages a cell-phone store. She often needs to send contracts to business customers who are far away. Renita is most likely to use _____ for this job.


broadcasting

a teleprompter

a fax machine

the VoIP

Answers

Answer:

a fax machine.

I hope it helps.

Finish the program by choosing the correct terms.

# Count the number of wins, losses. Find the sum of the opponent's points.
wins=0
losses = 0
sum = 0
_____ item in scores:

sum = sum + item[1]
if item[0] > item[1]
wins = wins +1
_____:

losses = losses +1

•Else
•For
•While

Answers

What are the exact numbers

Answer:

For

Else

Explanation: Got it right

Which of the following allows computers to communicate with each other? RAM NIC Hard drive Floppy disk

Answers

Answer:

NIC (Network Interface Card)

Explanation:

A network interface card is used to connect a computer to a computer network allowing for data to be transmitted between computers.

In a closed isolated system such as the universe, the amount of _____________ does not change.
Group of answer choices

Energy

Radiation

Chemicals

Sun light

Answers

Answer:

Energy

Explanation:

You used this code to give the user hints.

else:
if guess print("Guess higher.")

else:
print("Guess lower.")

Complete the code below, which is an alternative way to give the user the same hints.

if guess = correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False

_________
print("Guess higher.")

_________
print("Guess lower.")

•Else
•Elif guess > correct
•Elif guess < correct

Answers

Answer:

Elif guess < correct

Else

Explanation:

So, you need to insert right condition that compatible with given code, so firstly you need to print that guess was higher  and then if it is not correct and it is not higher  print that it was actually lower.

Explica el funcionamiento del puente de diodos. Indica los diodos que se encuentran en polarizacion directa en inversa en cada semiciclo de la onda alterna de entrada

Answers

Answer:

puente de diodos se utiliza cuando queremos transformar una señal de fase alterna en una continua, para tener la ruta actual que siempre va en la misma dirección.

En polarización directa, el flujo depende principalmente en los portadores mayoritarios. Debido a la región de empobrecimiento reducida, y a la atracción del potencial contrario al material, se incrementa la corriente que fluye a través del diodo.

Explanation:

espero y esto te pueda ayudar

how computer viruses spread from one computer to another​

Answers

Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
Other Questions
What are the 2 largest desert of East Asia? I WILL GIVE YOU THE BRAIBLIEST!!!!!!!!!!!!!!!!!!! John (travel) to Russia next week correct the tense Help please! Timed test, will give brainliest to correct answer :) Which of the following statements was not an event that signified the importance and secrecy of the Navajo Code?a. Japanese officers were able to crack the code easily after capturing Joe Kieyoomiab. The Navajo Code was used only in top secret military intelligence missions.C. Code talkers reported only to the highest ranking officers.d. Code talkers' efforts allowed for the planning and execution of the attack on the Solomon Islands. What is the length of cd? (I NEED HELP ASAP) 9 x [5 - (9 divided by 3)] What is the concentration, in M, if 227 grams of Na2SO4 are dissolved in 1.10liters?A 206 MB 5.11 MC 2.83 MD 1.45 M find the quantity whose 17 % is rupees 8500 PLZ HELP ME HELP WITH THIS Nancy winter local zoo that featured 11 monkey exhibits if these monkey exhibit make up 55% of the zoo exhibits then how many exhibits does the zoo have until the round your answer to the nearest whole number if necessary Which of the following was NOT a result of the February/March Revolution?Nicholas II stepped down as leader of RussiaSoviets, or local councils, were formedLenin returns to Russia from exileRussia became an absolute monarchy under Lenin Find the smallest solution to the equation 2/3 x^2 =24 What are Render Modes? How different render modes can be used in different contexts? what should you cite in your research project?A. Any facts that are common knowledge B. Any opinion shared by more than 2 sourcesC. All definitions of technical or unusual wordsD. Any facts you learned from one of your sources lf 60% of a number is 90, what is it number? a)30 b)54 c)150 d)180 PLEASE show work also for this one if you wants points. help agian this is really hard 40.25g+0.5h4, minus, 0, point, 25, g, plus, 0, point, 5, h when g=10g=10g, equals, 10 and h=5h=5h, equals, 5. Marcel rides his bicycle to school and back on Tuesdays. He lives 2.62 kilometers away from school. What is the total amount of distance that Marcel rides his bike on a given Tuesday? PLEASE HELP IM BEING TIMEDWhat is the y-value of point A?___ 1325\1500X 100\1guys help