Linux is the operating systems would allow a user to add functionality and sell or give away their versions.
What is Linux Operating system?Linux is known to be a kind of an an Operating system which is known to be an open-source. It is one that is compared to Unix-like form of operating system but it is one that is often based on the the use of Linux kernel.
Note that this is said to be an operating system kernel that was said to be released in 1991, by Linus Torvalds. Linux is said to be one that is often packaged as a service of a Linux distribution.
Linux is used in a lot of ways such as the Server OS that is made for web servers, database servers, as well as file servers.
They are known to be set up to aid high-volume as well as multithreading applications and also used for a lot of server types.
Therefore, Linux is the operating systems would allow a user to add functionality and sell or give away their versions.
Hence, option A is correct.
Learn more about Linux from
https://brainly.com/question/12853667
#SPJ1
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
-Linux
-macOS
-Windows
-UNIX
Which of the following is a responsibility of the hardware? (1 point) A.memory allocation B. managing hardware C.runtime prioritization D. processing
The option that is a responsibility of the hardware is option d: processing.
What is a hardware in a computer?Hardware is known to be a term that is seen as the computer's tangible parts or its delivery systems.
It is one that helps in processing as well as saves or store and run the written instructions that is known to be given by the software.
Therefore, based on the above, The option that is a responsibility of the hardware is option d: processing.
Learn more about hardware from
https://brainly.com/question/24370161
#SPJ1
which of the following should go in the place of /* missing line */ to get this input from the user and store it in the variable favoritemeal?
The option that should go in the place of /* missing line */ to get this input from the user and store it in the variable favoritemeal is streetName = scan.nextLine();
What is coding?Coding is known to be a term that is often called computer programming.
It is said to be one that tells the way that a computer user do communicate with computers.
Note that Code is one that tends to inform a computer the right actions to take, as well as writing code that is like making a set of instructions. By learning to be able to write code, you can be able to inform the computers what to do, the way to do it and how to behave in a much faster means.
Therefore, The option that should go in the place of /* missing line */ to get this input from the user and store it in the variable favoritemeal is streetName = scan.nextLine();
Learn more about data input from
https://brainly.com/question/28526849
#SPJ1
The following code is to be used to get the name of a street from the user.
Scanner scan = new Scanner(System.in);
String streetName;
System.out.println("Enter Street name");
/ missing line /
Which of the following should go in the place of / missing line / to get this input from the user and store it in the variable streetName?
An internal report that helps management compare actual performance and budgeted performance based on actual activity level is called a(n):_______.
Flexible budget performance report is an internal report that helps management compare actual performance and budgeted performance based on actual activity level.
This report differs from a typical budget versus actual report in that actual sales data is input into the budget model, which subsequently adjusts the budgeted spending amounts using algorithms. With this strategy, budgeted costs are substantially more in line with the performance that a business really experiences.
The resulting performance report should closely match actual spending if the flexible budget model is created to reasonably adapt to actual sales inputs. This makes it simpler to find report anomalies, which ought to be uncommon.
Learn more about flexible budget performance report https://brainly.com/question/27087411
#SPJ4
If you ping a device and no echo reply comes back before the default time, ping will respond with a __________ message.
If you ping a device and no echo reply comes back before the default time, ping will respond with a request timed out message.
What does the request timed out mean?The term 408 Request Timeout is known to be a kind of an HTTP response status code that helps to tell if a give server do not get a full request message inside the server's that is known to be allotted timeout period.
Note that the server need to decided to end the connection instead of wait. Therefore, If you ping a device and no echo reply comes back before the default time, ping will respond with a request timed out message.
Learn more about request timed out from
https://brainly.com/question/4671999
#SP1
which of the following is not a part of MS window at about Taskbar status by ribbon
Answer:
the right answer is taskbar
Given what you have just learned, move the events to put them in chronological order.
The tablets were discovered.
Intro
Gilgamesh became a legend.
Gilgamesh ruled Uruk in2700 BCE.
Done
The movement of the events to put them in chronological order are:
IntroGilgamesh ruled Uruk in 2700 BCE.The tablets were discovered.Gilgamesh became a legend.When did Gilgamesh ruled Uruk?Gilgamesh was a hero king of the Sumerian city kind of state of Uruk from ( c. 2900 – 2350 BC).
One of the oldest pieces of literature that has ever been discovered is an epic poem called "The Epic of Gilgamesh" that dates back to ancient Mesopotamia. It began as a collection of Sumerian myths and poetry written in cuneiform about the early third or late second millennium BCE, which were later combined into a lengthier Akkadian poem (the most complete version existing today, preserved on 12 clay tablets, dates from the 12th to 10th Century BCE).
Note that It tells the tale of Gilgamesh, the mythical hero-king of Uruk, and his half-wild companion Enkidu as they embark on a number of perilous missions and adventures. After Enkidu's passing, Gilgamesh subsequently sets out to find the key to immortality. It likewise tells the comparable tale of a great flood.
Learn more about Gilgamesh from
https://brainly.com/question/3700155
#SPJ1
Answer:
gilgamesh ruled uruk in 2700 BCE
gilgamesh became a legend
the tablets were discovered
Explanation:
just answered it on edge
Which type of systems are characterized by functions that have the ability to resume normal operational conditions after an external disruption?
The type of systems that are characterized by functions that have the ability to resume normal operational conditions after an external disruption is option A. High-resiliency.
What is resiliency of a system?This is known to be the ability of a system to be able to prepare for as well as adapt to altering conditions and be able to withstand as well as recover rapidly from any form of disruptions.
Therefore, The type of systems that are characterized by functions that have the ability to resume normal operational conditions after an external disruption is option A. High-resiliency.
Learn more about resiliency from
https://brainly.com/question/1084396
#SPJ1
Which type of systems are characterized by functions that have the ability to resume normal operational conditions after an external disruption?
A. High-resiliency
B. Hardened
C. Remote
D. Local
Microsoft sql server is a ________ for large mainframes and midrange computers.
The server is a rational DBMS for large mainframes and midrange computers.
What is SQL?Structured Query Language is the official name of SQL.
SQL is the most used language for communicating with relational databases. SQL can be used to create, find, edit, and delete database records. SQL can also be used for a wide range of auxiliary activities, including database maintenance and optimization.
Some important uses of SQL are :
It facilitates user access to data stored in the RDBMS system.It aids in data description.Not only that, but it enables you to specify and manipulate a database's specific data.You may build and modify databases and tables using SQL.Hence, SQL server is a rational Data base management system for large mainframes and midrange computers.
To get more information about SQL :
https://brainly.com/question/20264930
#SPJ1
When used as parameters, these types of variables allow a function to access the parameter's original argument: group of answer choices
a. reference
b. floating-point
c. counter undeclared
d. none of these
When used as parameters, reference types of variables allow a function to access the parameter's original argument.
A parameter in the definition of a function is a variable. Since it is a placeholder, it has no real meaning. A value given while calling a function is known as an argument. Arguments, in a sense, take the place that the parameters once occupied.
Actual arguments are those that are given to a function call. The calling function defines these arguments. These are the variables or expressions that a subprogram call's argument list refers to.
To describe the entire population under study, a parameter is utilised. For instance, we are interested in learning the typical length of a butterfly. This information about the total butterfly population makes it a parameter.
Learn more about parameter:
https://brainly.com/question/15316903
#SPJ4
A(n) ___________ should always accompany an unlisted procedure code, to describe the procedure and why it was medically necessary.
A special report should always accompany an unlisted procedure code, to describe the procedure and why it was medically necessary.
What must accompany claims when using an unlisted procedure code?Claims that are known to make use of unlisted codes need to be followed by specific information in regards to the service as well as the procedure and aiding documentation.
Note that documentation is one that differs by payer and as such, due to the above, A special report should always accompany an unlisted procedure code, to describe the procedure and why it was medically necessary.
Learn more about procedure code from
https://brainly.com/question/1056731
#SPJ1
information security should be treated as a separate discipline and not integrated into all areas of information technology.
Information security should be treated as a separate discipline and not integrated into all areas of information technology: True
What is information security?Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.
The types of security control.In Cybersecurity, there are three (3) different types of security control and these include the following:
Management security.Physical security.Operational security.Typically, information security is a field of computer science that should be treated as a separate discipline rather than being integrated into all areas of information technology
Read more on information security here: brainly.com/question/14286078
#SPJ1
Complete Question:
Information security should be treated as a separate discipline and not integrated into all areas of information technology. True or False?
Write an import statement that imports just the functions sqrt and log from the math module.
The import statement imports just the functions sqrt and log from the math module is given below:
The Import StatementIn [1]: import math
In [2]: x = 2
In [3]: math.sqrt(x)
Out[3]: 1.4142135623730951
This will import the math module into its own namespace.
Alternatively, what this means is that the function names have to be prefixed with math.
This is important to perform because it avoids conflicts and would not overwrite a function that was already imported into the current namespace.
Read more about import statements here:
https://brainly.com/question/18330061
#SPJ1
A computer manufacturer conducted a survey. it showed that a younger customer will not necessarily purchase a lower or higher priced computer. what is likely true?
It is likely true true is there is no correlation between age and purchase price.
In human subject research, a survey is a set of questions intended to collect particular data from a target group. Surveys can be carried out via the phone, by mail, online, at street corners, and even in shopping centers.
In fields like demography and social research, surveys are used to gather information or learn more. Survey research is frequently used to evaluate ideas, beliefs, and emotions.
Surveys might have narrow, focused objectives or they can have broader, more global ones. In addition to being utilized to satisfy the more practical requirements of the media, such as evaluating political candidates, and marketing.
Learn more about survey https://brainly.com/question/17373064?
#SPJ4
The people of appleton, wi represent the _____, whereas we analyze the education level of a subset or _____ to make inferences about the population.
The people of Appleton, wi represent the population, whereas we analyze the education level of a subset or sample to make inferences about the population.
What is a Population?This refers to the group of persons that makes up a place in a given geographical area.
Hence, we can see that The people of Appleton, wi represent the population, whereas we analyze the education level of a subset or sample to make inferences about the population.
This is because a sample is a subset of a given population.
Read more about population here:
https://brainly.com/question/25896797
#SPJ1
If you have created users with administrator privileges on your windows 7 or linux systems, why bother creating other user accounts?
The reason one bother creating other user accounts so that others such as friends can be able to make some changes that you want them to do and it is also to make sure that an administrator does not inadvertently make alterations without knowing that is any form of administrative change.
What Does Administrative Privileges Mean?The term Administrative privileges are known to be the ability to have or create some major changes to any given system, such as an operating system.
Note that based on the above, The reason one bother creating other user accounts so that others such as friends can be able to make some changes that you want them to do and it is also to make sure that an administrator does not inadvertently make alterations without knowing that is any form of administrative change.
Learn more about administrator privileges from
https://brainly.com/question/26389124
#SPJ1
Play to end-
Back to beginning
Answer the following questions about representing repetition algorithmically with programming
1) In order for a repetition to be reproduced unambiguously, what three attributes are needed to convey
the proper instructions?
2) How are these three attributes conveyed in the music notation above?
3) Find and record a set of instructions containing a repetition clause (eg, instructions on a shampoo
bottle, a recipe, etc.). How are these attributes conveyed there? If any are missing, how would the reader
infer them?
maria is writing a policy that defines her organization's data classification standard. the policy designates the it assets that are critical to the organization's mission and defines the organization's systems, uses, and data priorities. it also identifies assets within the seven domains of a typical it infrastructure. which policy is maria writing?
Based on the above description, the policy that maria is known to have been writing is said to be Asset classification policy.
What is the meaning of Asset classification policy?The term known as Asset classification policy is known to be a kind of a policy that is said to be used to state out all of a firm or an organization's data classification standard.
Note that it is one that often informs us what the information Technology assets are as they are known to be critical to the organization's mission.
The use of policy is one that helps in guiding the day to day running of any business.
Therefore, It helps us to be able to state the organization's systems, uses, as well as data priorities and as such, based on the above description, the policy that maria is known to have been writing is said to be Asset classification policy.
Learn more about Asset classification policy from
https://brainly.com/question/5581152
#SPJ1
the communicates with team members and clients and tracks schedule of whole project, whereas the leads the team of web designers and manages web development.
The project manager the communicates with team members and clients and tracks schedule of whole project, whereas the leads the team of web designers and manages web development.
What exactly does a project manager do?In the real sense, the role of the project managers (PMs) is that they are people who have been employed to handle the duties of been responsible for the work of planning, putting together, as well as directing the completion of any projects for an organization and they still need to make sure that these projects are on time, on budget, and others.
Therefore, The project manager the communicates with team members and clients and tracks schedule of whole project, whereas the leads the team of web designers and manages web development.
Learn more about project manager from
https://brainly.com/question/6500846
#SPJ1
during termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?
During termination of twisted pair cabling, the factor that should be done to ensure minimal cross talk is introduced is that No more than 1 inch of the cable should be exposed.
What is the most common termination method for twisted pair wire?Crimping is known to be the most commonly used form or method of wire termination, and it is known to be one that is seen as the most efficient for high-weight wire termination.
Therefore, During termination of twisted pair cabling, the factor that should be done to ensure minimal cross talk is introduced is that No more than 1 inch of the cable should be exposed.
Learn more about twisted pair cabling from
https://brainly.com/question/25337328
#SPJ1
During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?
No more than 1 inch of the cable should be exposed.
No less than 1 inch of the cable should be exposed.
Each pair should be stripped of insulation so that it doesn't get caught in the jack.
Each pair should be twisted around another pair to reduce cross talk.
insert a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of the worksheet.
Step by step to insert a footer on the left side is given below:
Select Insert > Header or Footer.Select one of the built-in designs.Type the text you want in the header or footer.Select Close Header and Footer when you're done.What is a Footer?This refers to the section in word processing that is found under the main text.
Therefore, the step by step routine is:
Select Insert > Header or Footer.Select one of the built-in designs.Type the text you want in the header or footer.Select Close Header and Footer when you're done.Hence, we can note that your question is incomplete, so I gave you a general overview to have a better understanding of the concept.
Read more about footers here:
https://brainly.com/question/27901050
#SPJ1
Which quality dimension of information is concerned that all the necessary data needed to make a decision is present?
a. timeliness
b. consistency
c. completeness
d. accessibility
e. validity
a. Completeness is quality dimension of information is concerned that all the necessary data needed to make a decision. This question is part of data quality.
Data quality is characterized by five characteristics: correctness, completeness, reliability, relevance, and timeliness. First, accuracy. As its name suggests, this data quality trait denotes the accuracy of the information. Second, completeness describes the extent of the information.
third, reliability in the context of data quality traits refers to the absence of contradiction between one piece of information and another piece of information from a different source or system. The fourth criterion of data quality is relevance. Relevance is important since there must be a valid rationale for gathering the data in the first place.
Fifth, timeliness refers to how current the information is, as the term suggests.
Learn more about data https://brainly.com/question/10017341
#SPJ4
A software company issues shares of stock to the public for the first time in order to raise funds for a planned product expansion. what financial market is the company participating in?
Based on the above, the financial market that the company is participating in is known to be called the Primary capital market.
What is Primary capital market?The Primary Capital Markets is known to be one here a company is known to publicly sells new stocks as well as bonds for the very first time.
Note that this kind of market is one that can be called the new issues market due to the fact that new issue takes the way of an first public offering (IPO).
Therefore, Based on the above, the financial market that the company is participating in is known to be called the Primary capital market.
Learn more about Primary capital market from
https://brainly.com/question/17168396
#SPJ1
A software company issues shares of stock to the public for the first time in order to raise funds for a planned product expansion What financial market is the company participating in? O Secondary capital market O Secondary money market Primary capital market O Primary money market
A fundamental part of market research is studying what your competitors have done so that you don't copy anything from those projects and create something wholly original.
A.
True
B.
False
Answer:
I'll go with option A. True. Hope this helps please mark me BRAINLIEST
All major operating systems for desktop computers, as well as handheld devices, include software that will open and display the ____ file format.
All major operating systems for desktop computers, as well as handheld devices, include software that will open and display the PDF file format. Adobe created the Portable Document Format (PDF) in 1992 to deliver documents, including text formatting and graphics, in a way that is independent of application software, hardware, and operating systems. PDF is now standardized as ISO 32000.
PDF files can contain more than just plain text and images. They can also include logical organizing elements, interactive features like annotations and form fields, layers, rich media (including video content), three-dimensional objects made using U3D or PRC, and a variety of other data formats. The PDF specification also adds support for digital signatures, file attachments, and metadata to help workflows that require these features.
Learn more about PDF https://brainly.com/question/28001981?
#SPJ4
what is an attack on a nosql database compromised by data manipulation when the input is not sanitized by the application?
An attack on a nosql database compromised by data manipulation when the input is not sanitized by the application is called XML injection.
What is XML injection?XML injection is known to be a kind of action that occurs if a computer user is known to have supplied input that has not escaped or be sanitized prior to been added to a web application's XML documents or as at the time that they are processed and executed.
Therefore, An attack on a nosql database compromised by data manipulation when the input is not sanitized by the application is called XML injection.
Learn more about XML injection from
https://brainly.com/question/14469511
#SPJ1
Industrial technology created new distilling methods for ______, which was used to make candles and lamp oil, among other things.
Industrial technology created new distilling methods for petroleum, which was used to make candles and lamp oil, among other things.
What does petroleum means?Petroleum, is known to be a term that is often known as crude oil, it is seen as a kind of naturally occurring liquid that is said to be seen under the earth's surface that can be worked on that is refined into fuel.
Note that fossil fuel, petroleum is form by the decomposition of organic matter as well as the use of Industrial technology.
Hence, Industrial technology created new distilling methods for petroleum, which was used to make candles and lamp oil, among other things.
Learn more about petroleum from
https://brainly.com/question/26412451
#SPJ1
Question 5 child restraint anchorage systems should have __________ lower anchorages.
Question 5 child restraint anchorage systems should have two lower anchorages. This question is part of car safety trivia.
Automotive safety is the study and application of design, construction, equipment, and regulation to reduce the likelihood and effects of motor vehicle-related traffic collisions. Roadway design is a part of road traffic safety more generally.
Cornell Aeronautical Laboratory in Buffalo, New York, conducted one of the earliest official academic studies on enhancing motor vehicle safety. Their comprehensive report's principal conclusion emphasizes the critical significance of seat belts and padded dashboards.
But the main cause of traffic-related fatalities and injuries is the car's excessive mass and speed in comparison to the main victim, the pedestrian.
Learn more about testing car safety https://brainly.com/question/28272358
#SPJ4
Define the term algorithm and give one example of what would happen if an algorithm is not in the correct order. PLEASE ANSWER 25 POINTS
Answer: A process or set of rules to be followed in calculations or other problem-solving operations. Example: PEMDAS
Explanation:
ok
Answer:
A process or set of rules to be followed in calculations or other problem-solving operations. Example: PEMDAS
the developers should not be interrupted during the sprint and the sprint goal should remain intact. these are conditions that foster creativity, quality and productivity. (which one the following answers is false?
The Sprint Backlog is fully formulated in the Sprint Planning meeting and does not change during the Sprint. It is actually depends on the situation.
Scrum, or SCRUM, is a project management methodology that was originally focused on software development, though it has now been applied to other areas such as research, sales, marketing, and cutting-edge technology.
It is intended for teams of ten or fewer people who divide their work into tasks that can be finished in time-boxed sprints, also known as iterations, that last no more than one month and more frequently two weeks.
Daily scrums, or time-boxed meetings of no more than 15 minutes, are how the scrum team evaluates progress (a form of stand-up meeting). The team holds two more meetings at the conclusion of the sprint: the sprint review, when they present their work to stakeholders and ask for comments, and the sprint retrospective, where they can reflect and get better.
Learn more about scrum https://brainly.com/question/28436331?
#SPJ4
Which type of program can hide itself from normal inspection and detection? trojan horse stealth trojan spyware rootkit
A type of software program which can hide itself from normal inspection and detection is: D. rootkit.
What is a malware?A malware can be defined as any type of software program or file that is designed and developed to be intentionally harmful to the host computer, server, or network, especially for the purpose of wreaking havoc, damage and destruction after gaining an unauthorized access.
In Computer technology, a rootkit is a type of trojan which refers to a set of tools or software program that is designed and developed to gain access and control of an end user's computer system without revealing its presence i.e it hides its presence.
Read more on rootkit here: https://brainly.com/question/15061193
#SPJ1