Answer:
Explanation:
From the available options presented, when developing for a global audience the following are true...
Content delivery networks prevent traffic surges and can offset slow local internet service.
A content delivery network can provide quick access to your content, no matter where your users live.
You should consider limiting the number of large images or audio files that you include, depending on the target market.
For global applications content delivery networks are a must since they allow the end-user to access the web page and its high quality content as if the web server were close by. By reducing the distance between the server and the end-user through these networks, you are effectively reducing latency, load times, performance, traffic surge effects, etc. Also when developing for a worldwide audience you should limit the number of larger images and audio files to only show the necessary ones for each target region, in order to make performance much more stable.
What is the output of this program?
grades = [89, 70, 98, 100, 83]
print(grades[-4])
Group of answer choices
89
100
70
98
Answer:
70 is the answer negative one begins from 83 and count down to 89, Therefore, 70 is is -4 and is chosen as the best answer
What is a bounding box
Answer:
bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.
Plz help:(!!!!
Type the correct answer in the box. Spell all words correctly.
Claire wants to use a filter to ensure quality in the software development process and product. What can Claire use for this purpose?
Claire should use_________
as a filter to ensure quality in the software development process and product.
Answer:
Defect filters
Explanation:
Answer:
"a quality gate" is the correct answer :D
Explanation:
Readable code includes the use of
color and symbols to make the code look good.
consistent and meaningful variable names, helpful comments, and formatting.
variable names that do not vary from program to program.
comments that include the programmers' reactions to a particular piece of code used.
Answer:
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbbbbbbbbbbbbbbbbbbbbbbbbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
Explanation:
The Readable code includes the use of color and symbols to make the code look good is; A consistent and meaningful variable names, helpful comments, and formatting.
Since Readable code is crucial for software development. It makes it easier for programmers to understand, modify, and maintain the code. It is well-organized, with consistent and meaningful variable names, helpful comments, and proper formatting.
Using consistent and meaningful variable names allows programmers to easily understand what the variable represents.
Helpful comments also play a crucial role in making the code readable. Comments should be used to explain, the code is doing, why it is doing it, and any other important details that would help programmers understand the code.
Formatting is also essential in making the code readable.
In summary, readable code includes consistent and meaningful variable names, helpful comments, and proper formatting.
Learn more about the code here;
https://brainly.com/question/14278291
#SPJ4
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a. She has a home network with smart home devices. b. She dialed into her home modem through the app and sent a command through the router. c. She has installed switches that interact with the installed app on her phone. d. She uses a hub at her home that she connects to through the app.
A. She has a home network with smart home devices
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. Friend is able to do this by doing home network with smart home devices. The correct option is a.
What are smart devices?The devices which are operated using the analog signals which carry information.
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone.
Friend is able to do this by doing home network with smart home devices.
Thus, the correct option is a.
Learn more about smart devices.
https://brainly.com/question/17509298
#SPJ2
What defines employability
Who has gotten a random file link from someone? What file does it contain?
Answer:
those are bots , just report those
Explanation:
just need to know if these are correct
Answer:
Yes, they are correct.
Answer:yea g
Explanation:
one day when rahul went to his computer lab and saw that all the computers were connected to a single printer and whoever is giving a command to print, the print out comes from that printer. can you name the concept of communication? class 8 computer one word answer..
Explanation:
you can connect multiple PCs to the wireless printer and print your documents from each one of them as long as the printer can be connected to the same network . You need the disc that came with the wireless printer to install the correct drivers on your computers and laptops.
hope it helps ( brainleist please )
.....is used to save project in Visual basic .net from file menu
Explanation:
I don't really understand what you're trying to get at, maybe try to abbreviate a little more?
A small computer on a smart card has 4 page frames. At the first clock tick, the R bits are 1000 (page 0 is 1 and the rest are 0). At subsequent ticks, the values are 0110, 0101, 1010, 1101, 0101, 0011, and 1100. If the aging algorithm is used with a 16-bit counter, give the values of the four counters after the last tick. If page fault occurs, which page should be swapped out
Answer and Explanation:
Aging algorithm Aging algorithms are the NFU algorithm with modification to know the time of span and increment the page referenced. The ageing method sort customer invoices by date in four columns. By using the ageing algorithm, counters are shifted by 1 bit, and the R bit is added to the leftmost bit. The values of counters are
Page 0: 01101110
Page 1: 01001001
Page 2: 00110111
Page 3: 10001011
The system clock is 2ns and interval is 2ms for that one bit per interval is the ability to analyze the references in a tick. Counters have a finite number and have two pages, where counter value 0 have two pages. The page fault appears, and pick just one of them randomly.
What would you classify anti-malware software as?
SaaS
enterprising
cloud
security
Answer:
enterpriseing is the answer
Which of the following belongs in a website citation? (select all that apply)
the place where the author works
the Internet address or web page address
the person or organization responsible for the website
page numbers
the date when you got the information
Answer:
the Internet address or web page address
the person or organization responsible for the website
the date when you got the information
Explanation:
Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.
kinetoscope
selenium
cotton
celluloid
Answer:
Celluloid
Explanation:
It is Sis
who ever can get me the lyrics to raining tacos will get 46 points + the crown! i want the song!
Explanation:
Lyrics
It's raining tacos
From out of the sky
Tacos
No need to ask why
Just open your mouth and close your eyes
It's raining tacos
It's raining tacos
Out in the street
Tacos
All you can eat
Lettuce and shells
Cheese and meat
It's raining tacos
Yum, yum, yum, yum, yumidy yum
It's like a dream
Yum, yum, yum, yum, yumidy yum
Bring your sour cream
Shell
Meat
Lettuce
Cheese
Shell
Meat
Lettuce
Cheese
Shell
Meat
Cheese, cheese, cheese, cheese, cheese
It's raining tacos
Raining tacos
Raining tacos
It's raining tacos
It's raining tacos
Raining tacos
Raining tacos
Shells, meat, lettuce, cheese
It's raining tacos
It's raining tacos
Answer:
Explanation:
is that even a real song??
btw i answered so the other guy can get brainlest annnnnnd bc i want the point LOL
PLEASE HELP! Please dont answer if your going to guess
You have three modes for opening a file. You wish to create a new file and write data to
the file. What letter belongs in this line of code?
myFile = open("another.txt", "_____")
r
w
a
d
Answer:
r
Explanation:
I literally learned this today when trying to make a python server with an html file:)
Answer:
w
Explanation:
Telecommunications, outsourcing, flextime, teamwork, and diversity are workplace trends adopted to
O True
O False
Answer:
False
Explanation:
Outsourcing and telecommuting are the trends related to presence of growing technology within the economy allowing various services to be outsourced to people who are more of an expert when it comes to handling those procedures.
write HTML code to create a web page which will contain a title my favourite book as a centralised heading feluda somogro and body will contain the name of the author satyajit ray
Answer:
Satyajit Ray (1921–1992), a Bengali film director from India, is well known for his contributions to Bengali literature. He created two of the most famous characters in Feluda the sleuth, and Professor Shonku the scientist. He wrote several short novels and stories in addition to those based on these two characters. His fiction was targeted mainly at younger readers (mostly teenagers) , though it became popular among children and adults alike.

Ray during recording of his film Pather Panchali
Most of his novels and stories in Bengali have been published by Ananda Publishers, Kolkata; and most of his screenplays have been published in Bengali in the literary journal Ekshan, edited by his close friend Nirmalya Acharya. During the mid-1990s, Ray's film essays and an anthology of short stories were also published in the West. Many of the stories have been translated into English and published.
You are planning a storage solution for a new Windows server. The server will be used for file and print services and as a database server. The new server has five hard disks, all with equal capacity. Your storage solution should meet the following requirements: System files should be on a volume separate from data files. All volumes should be protected so that the server can continue to run in the event of a failure of one of the disks. The data volume should be optimized for improved disk access times. You will use Windows Disk Management to create and manage the volumes. What should you do
Answer:
Explanation:
The best solution for this scenario would be to first create a mirrored volume for the system volume using two of the available disks and then a single RAID 5 volume with the remaining 3 disks for the data volume. This setup will allow all of the data to be backed up so that if one of the disks fails the server will continue running accordingly. The RAID 5 volume offers error checking and redundancy for the data, therefore, allowing the data to be accessed quickly and efficiently with far greater security and far less chance of data becoming corrupt.
4. Which of the following is a face-to-face meeting between the hiring party and the applicant?
A. Interview
B. Application
C. Résumé
D. Reference
Answer:
A. interview
Explanation:
1. why is manufacturing considered the biggest contributor to progress
Answer:
A vibrant manufacturing base leads to more research and development, innovation, productivity, exports, and middle-class jobs. Manufacturing helps raise living standards more than any other sector. Manufacturing generates more economic activity than other sectors.
Functions of file in computer
[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]
File in computers are used to store data, information and commands.
Thanks hope it helps.Pls mark as brainliest.Which of the following is something that would NOT appear in the Reviewing pane?
a. The date on which a specific insertion was made.
b. The length of the document being reviewed.
c. The name of the person making an insertion.
d. The total number of revisions made to the document.
Answer:
A
Explanation:
The cell is intersection of column and row. true or false
Answer:
True
Explanation:
where a row and column meet. Columns are identified by letters (A, B, C), while rows are identified by numbers (1, 2, 3). Each cell has its own name—or cell address—based on its column and row
~Hope this helps
Answer:
True
Explanation:
PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager
Please select the best answer from the choices provided
A
B
C
D
Answer:
This is called an Arbiter!
Explanation:
A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.
True or False
Operating systems control the loading of software applications onto a computer
All OSs offer user preferences allowing you to customize your computer
I used this from a other.
False
Software is the collection of large program or instruction of codes, which is used to perform some task. It is of two types of system software and application software.
The system software is used as a container for the application software and it is used to handle all other software it is used to operate the system.
Application software is used to perform any operation. This type of software can be used by the user if it is installed on the local machine on any system software
The operating system is also the part of the system software because it is used to operate the system and it is also the soul of the computer system which is also the function of the system software but the above question states that the operating system is not the part of the system software which is not correct. Hence false is the correct answer to the above question.
Define self-esteem: A how I feel about myself B how I visualize myself C how I esteem myself
Answer:
A how I feel about myself
Explanation:
Self-esteem is your overall opinion of yourself — how you feel about your abilities and limitations. When you have healthy self-esteem, you feel good about yourself and see yourself as deserving the respect of others. When you have low self-esteem, you put little value on your opinions and ideas.
which of the following is another term for a subfolder
Answer:
below
Explanation:
subdirectory
Explanation:
Subdirectory is the another name of sub folderwhich is the small folder of files created withing a main folder.
write examples of hacking in internet?
Answer:
Although hacking is very bad, it can be found everywhere and anywhere.
Examples: Phishing, password checking, and keyloggers
Explanation:
Explanation:
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.
To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.
Anyone else like hunter x hunter?
lets talk abt it uwu
good day :)
Answer:
mid
Explanation: