Complete Question:
Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode.
Group of answer choices;
A. Reboot into Safe Mode
B. Run compatibility mode for 640 x 480 resolution.
C. Reduce her screen resolution to 640 x480
D. Reboot into Low Resolution Mode
Answer:
B. Run compatibility mode for 640 x 480 resolution.
Explanation:
In this scenario, Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. In order to make the games work properly in Windows, Missy should run compatibility mode for 640 x 480 resolution.
The video graphics array (VGA) is the standard graphics or display interface used for computer monitors. It was developed in 1987 by IBM and it had a standard display resolution of 640 x 480 pixels.
Hence, if the output of a software program (games) looks fuzzy or is not being displayed properly, you should run compatibility mode for 640 x 480 resolution. This is to enable low resolution video mode on the computer.
The VGA mode is very basic because only minimal video drivers are being loaded on the windows.
Other than hard discs and flash discs, identify other three different storage media
Answer:
A storage media is any media that can store data.
1. USB flash memory
2. Memory stick
3. Floppy disk
Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.
Answer:
B) Create all new regional folders and move the reports to the respective region folder with viewer access.
Explanation:
Below are the options
A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.
B) Create all new regional folders and move the reports to the respective region folder with viewer access.
C) Create all new regional folders and move the reports to the respective region folder with subscribe access.
D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region
In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime
Hence, the correct option is B.
Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.
From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.
Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.
Learn more about folders on:
https://brainly.com/question/20262915
Write a pseudocode algorithm which inputs numeric scores and outputs how many of them are over 100. The end of the data is signalled by a user input of -1.
Answer:
calculateCountGreaterThan100()
{
declare variable count with zero
while True
{
input numeric values from user
if user inputted value > 100
increment the count
if user inputted value == -1
break the loop
}
print the value of count
}
Explanation:
First of all, let us have a look at the meaning of a pseudocode:
A pseudocode is nothing but a informative way of expressing our code in simple plain English.
It is not written in programming language so it does not have any syntax rules.
Here, we are asked to write pseudocode algorithm for inputting numeric scores and output the number how many of them are greater than 100. The end of numbers is signalled by a user input of -1.
The answer is:
calculateCountGreaterThan100()
{
declare variable count with zero
while True
{
input numeric values from user
if user inputted value > 100
increment the count
if user inputted value == -1
break the loop
}
print the value of count
}
Here, we have declared a variable with initial count as 0.
Then, in a loop we are taking input from user in which user is giving integer input.
If the value is greater then zero, the count is incremented.
If the value is -1, we come out of the loop and then print the count value.
Pseudocode algorithm are algorithms that are implemented using pseudocodes, and it does not obey the syntax of a programming language.
The Pseudocode algorithmThe pseudocode algorithm is as follows:
count = 0
input num
while num != -1:
if num > 100:
count++
print(count)
The flowThe flow of the above pseudocode algorithm is as follows
First, variable count is initialized to 0Next, we take input for numNext, a loop is repeated until the input is -1During each loop, the inputs over 100 are countedLastly, the count of inputs greater than 100 is printedRead more about pseudocode algorithm at:
https://brainly.com/question/11623795
Your program will read in an existing text file. You want the program to terminate if the file does not exist. Which of the following indicates the correct code for the main method header? public static void main(String[] args) throws FileNotFoundException public static void main(String[] args) throws UnknownFileException public static void main(String[] args) public static void main(String[] args) throws FileMissingException
Answer:
FileNotFoundException
Explanation:
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud
Answer:
D) A private cloud
Explanation:
Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.
Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.
Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.
A binary search function is searching for a value that is stored in the middle element of an array. How many times will the function read an element in the array before finding the value?
Answer: 1 time.
Explanation:
A binary function is also known as a half-interval search is a search algorithm to find the position of a given element x within a well-sorted array []. Binary search compares the target value to the middle element of the array.It ignores half of the elements just after one comparison. it compares x with the middle element.So, the function read an element one time in the array before finding the value.
Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data
Answer:
A
Explanation:
Ethernet connections allow the most mobility for users
Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access
Answer: D. The actual speed of a network can differ from the maximum advertised speeds
Explanation:
just got it correct on the test
Write a method, getFirstLine, that is passed a String argument and that returns the first line. (Recall that lines are terminated with the "\n" character.) Assume that the argument contains at least one complete, newline-terminated line.
My Solution:
public String getFirstLine(String a)
{
String[] myLines = a.split("\n");
return(myLines[0]);
}
Answer: The answer to this question can be given as:
Method definition :
String getSecondLine (String aString) //define function getSecondLine()
{
return aString.substring(aString.indexOf("\n") + 1, aString.indexOf("\n") + 1 + aString.substring(aString.indexOf("\n") + 1, aString.length()).indexOf("\n"));
//return value.
Explanation:
A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home
Answer:
The answer to this question can be defined as follows:
Explanation:
The static NAT stands for (static Network Address Translation), which enables the user to modify a single interpretation for a local second-order to the external environment addresses, and all IP and port numbers were also transcribed inside to random traffic as well as from outside with the internal traffic.
It is used to map network traffic by an internal IP address from a static external IP address. It provides a fixed conversion for actual addresses onto maps. It offers Internet access to the network equipment via a private LAN with such a private IP address which is not recorded.Please find the attachment of the ip address.