FILL IN THE BLANK. to satisfy legal retention and other compliance regulations, companies should use ___ in im. a presence server a relay server either a presence server or a relay server neither a presence server nor a relay server

Answers

Answer 1

To  satisfy legal retention and other compliance regulations, companies should use a relay serve in a presence server a relay server either a presence server or a relay server neither a presence server nor a relay server.

What are Legal Compliance Reporting?Conforming to a rule, such as a specification, policy, standard, or regulation, is generally referred to as compliance. Regulatory compliance is the term used to define the objective that businesses strive to realise in their efforts to make sure they are knowledgeable about and follow all applicable laws, policies, and regulations. The proliferation of laws, rules, and regulations, among other things, made it necessary to develop a system to assure compliance with numerous laws; as a result, every institution adopted the Legal Compliance Reporting System. There are two hold goals for this system; VIEW MORE First and foremost, to safeguard the interests of the company's directors, officials, and customers; secondly, to deter unwarranted legal action by law enforcement and other authorities. Organizations have access to detailed compliance reports that show how well

To learn more about Legal Compliance Reporting refer to:

https://brainly.com/question/26463698

#SPJ4


Related Questions

Write a modular program that accepts up to 20 integer test scores in the range of 0 to 100 from the user and stores them in an array. Then main should report how many perfect scores were entered (i.e., scores of 100), using a value-returning countPerfect function to help it. Hint: Have the program count the scores as they are entered. Your program may need this information later.

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static int countPerfect(int [] scores, int n){

    int count = 0;

    for(int i = 0;i<n;i++){

     if(scores[i] == 100) {count++;}  }

 return count; }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int n;

 System.out.print("Number of scores: ");

 n = input.nextInt();

 if(n<1 || n>20){n=20;}

 int [] scores = new int[n];

 for(int i = 0;i<n;i++){

     scores[i] = input.nextInt();  }

 System.out.print("Perfect Scores: "+countPerfect(scores,n));  

}

}

Explanation:

The countPerfect function begins here

public static int countPerfect(int [] scores, int n){

This initializes the count to 0

    int count = 0;

This iterates through the array elements

    for(int i = 0;i<n;i++){

If current score is 100, count is incremented by 1

     if(scores[i] == 100) {count++;}  }

This returns the value of count

 return count; }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This declares the number of scores, n

 int n;

Prompt to enter the number of scores

 System.out.print("Number of scores: ");

This gets input for n

 n = input.nextInt();

If input is less than 1 or greater than 20, n is set to 20

 if(n<1 || n>20){n=20;}

This declares the scores as an array

 int [] scores = new int[n];

This iterates through the array and get inputs for each score

 for(int i = 0;i<n;i++){

     scores[i] = input.nextInt();  }

This calls the function and print the number of perfect scores

 System.out.print("Perfect Scores: "+countPerfect(scores,n));  

}

Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. What inputs and outputs are needed to support the storage environment

Answers

Answer:

Pros of cloud storage

Files can be accessed remotely without having to be connected to a company's intranetSecurity and file backups are managed by the cloud storage company, frees up employees time applying updates and other maintenance tasks.Usually billed monthly which allows for a lower initial startup cost

Cons of cloud storage

File security relies upon trust in the cloud storage providerLong term cost could be higher than storing files yourselfRequires an internet connection to access files

describe email etiquette and netiquette when communicating electronically.

Answers

Answer:

Email etiquette refers to the principles of behavior that one should use when writing or answering email messages. It is also known as the code of conduct for email communication. Email etiquette depends upon to whom we are writing- Friends & Relatives, Partners, Customers, Superior or Subordinates

Difference Between Etiquette and Netiquette is that Etiquette is the simple requirements needs for social behavior while Netiquette, is the code of acceptable behaviors users should follow while on the Internet.

(Hours, minutes, and seconds) Write a method that returns a string in the form of hour:minute:second for a given total seconds using the following header:
public static String format(long seconds)
Here is a sample run:

Enter total seconds: 342324
The hours, minutes, and seconds for total seconds 342324 is 23:05:24

Note that a zero is padded to hour, minute, and second if any of these values is a single digit.

Answers

Answer:

Answered below.

Explanation:

class Convert {

public static String format(long seconds) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter total seconds: ");

int secs = sc.nextInt();

int hours = secs / 3600;

int minutes = (secs % 3600) / 60;

int seconds = (secs % 3600) % 60;

String timeFormat = hours + ":" + minutes + ":" + seconds;

return timeFormat;

}

}

RAM IS often referred
to as
1 SECONDARY STORAGE
2 . READ ONLY MEMORY
3. RATIO ACTIVE MEMORY
4. PRIMARY STORAGE

Answers

Answer:

ratio active memory

Explanation:

ratio active memory because the rule of computer

Which range of values would result in 10 elements stored in an array?

1-11

0-9

0-10

2-12

Answers

Answer:

0-9

Explanation:

count 0 as 1

len(0,1,2,3,4,5,6,7,8,9)=10

Assume a manufacturing company which manufactures and sells several electronic
products. This company has a list of suppliers who supply various components for
different products. Several components assembled together form a product. A product
will be manufactured in many work centers. Each product contains several components.
A product has at least one component and may comprise of several components. A
component must belong to a product and the same component can be used in multiple
products. Also mention the quantity of the component which a product requires.
Company has a list of suppliers who supply various components. A supplier may not
be supplying any component and may supply several components. A component must
be supplied by at least one supplier or several suppliers may provide the same
component. A supplier supplies the quantity and unit price of the products. A supplier
also supplies the quantity and unit price of the components. Each product will be
manufactured in single or multiple work centers. A work center may not produce a
product and may produce several products. Each work center will have one or more
employees and an employee would be working in single work center only. A customer
may not place any order and may place multiple orders. But an order will belong to a
specific customer only. Each order may contain single product or multiple products and
the same product may be demanded in many orders.
Construct an ER diagram for the manufacturing company.

Answers

Answer:

reboot it

Explanation:

What is the benefit of making an archive folder visible in the Outlook folder list?

This makes the folder available on the Office 365 website.
The folder can be password protected to increase security.
Archived items in the folder are accessible within the Outlook client.
Archived items in the folder can be shared with other Outlook users.

Answers

Answer:

a

Explanation:

Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situations that you could use it in?

Answers

Answer:

html is a thing that u can to create an website business that u can make money on it

Write the mostValuableNeighbor method, which compares the item in row r and column c to the items to its left and to its right. The method determines which of the three items has the greatest value and returns its name. If more than one of the values have a value that is greatest, then any of their names can be returned. If the item has no item to its left, it is compared only to the item to its right. If the item has no item to its right, it is compared only to the item to its left.

Answers

Answer:

Explanation:

The following method is written in Java, using the Item class and ItemGrid class found online we can use this method to grab the 2-dimensional array and compare the three neighbors in the same row. It saves the position of the neighbor with the greatest value in the variable greatest and then uses that position to call the getName() method from the object in that position to get the name of that Neighbor and returns the name.

public String mostValuableNeighbor(ItemGrid grid, int r, int c) {

       int greatest = grid[r][c];

      if (grid[r][c+1].getValue() > greatest.getValue()) {

          greatest = grid[r][c+1];

      }

       if (grid[r][c-1].getValue() > greatest.getValue()) {

           greatest = grid[r][c-1];

       }

       

      return greatest.getName();

   }

In this exercise we have to use the knowledge of computational language in JAVA to write the code.

We have the code in the attached image.

The code in Java can be found as:

public String mostValuableNeighbor(ItemGrid grid, int r, int c) {

      int greatest = grid[r][c];

     if (grid[r][c+1].getValue() > greatest.getValue()) {

         greatest = grid[r][c+1];

     }

      if (grid[r][c-1].getValue() > greatest.getValue()) {

          greatest = grid[r][c-1];

      }

     return greatest.getName();

  }

See more about JAVA at brainly.com/question/26104476

A medium-sized highway construction company CST has chosen to constrain its investment in computing resources to laptop and desktop computers and the necessary networking hardware and software to access the Internet efficiently. All of CST's data is to be stored off-site through an Internet-enabled storage provider that is used by many different companies and organizations. The service model employed for the data storage capability of only CST is:

Answers

Answer:

The service model employed for the data storage capability of only CST is:

SaaS (Software as a Service).

Explanation:

The three cloud computing categories are Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).  The three cloud computing services provide different virtual computing resources.  In the case of CST, it utilizes only the data storage software of a provider, who provides the data storage infrastructure, including cloud-based servers, while CST uses its own "laptop and desktop computers and other networking hardware and software to access the Internet efficiently."

Information Technology​

Answers

Answer:

information technologies

Explanation:

Information technology is the study, design, development, implementation, support or management of computer-based information systems—particularly software applications and computer hardware. IT workers help ensure that computers work well for people.

Nearly every company, from a software design firm, to the biggest manufacturer, to the smallest “mom & pop” store, needs information technology workers to keep their businesses running smoothly, according to industry experts.

Most information technology jobs fall into four broad categories: computer scientists, computer engineers, systems analysts and computer programmers. HR managers responsible for recruiting IT employees increasingly must become familiar with the function and titles of the myriad job titles in demand today.

Some of them are listed below:

Database administration associate

Information systems operator/analyst

Interactive digital media specialist

Network specialist

Programmer/analyst

Software engineer

Technical support representative

Answer:

Information technology is the use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise

Parts arrive at a two-machine system according to an exponential interarrival distribution with mean 20 minutes. Upon arrival, the parts are sent to Machine 1 and processed. The processing-time distribution is TRIA (4.5, 9.3, 11) minutes. The parts are then processed at Machine 2 with a processing-time distribution as TRIA (16.4, 19.1, 20.8) minutes. The parts from Machine 2 are directed back to Machine 1 to be processed a second time (same processing-time distribution but an independent draw from it). The completed parts then exit the system. Run the simulation for a single replication of 20,000 minutes to observe the average number in the machine queues and the average part cycle time with Arena Model

Answers

Answer:

I really don’t know computer science but I give u good luck in finding an answer to this question.

Explanation:

Consider the following recursive method.

public static String doSomething(String str)
{
if (str.length() < 1)
{
return "";
}
else
{
return str.substring(0, 1) + doSomething(str.substring(1));
}
}
Which of the following best describes the result of the call doSomething(myString) ?

A
The method call returns a String containing the contents of myString unchanged.

B
The method call returns a String containing the contents of myString with the order of the characters reversed from their order in myString.

C
The method call returns a String containing all but the first character of myString.

D
The method call returns a String containing only the first and second characters of myString.

E
The method call returns a String containing only the first and last characters of myString.

Answers

Answer:

A

The method call returns a String containing the contents of myString unchanged.

Explanation:

When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustment can be done by normalizing to values between 0 and 1, or throwing away outliers.
For this program, adjust the values by dividing all values by the largest value. The input begins with an integer indicating the number of floating-point values that follow.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
5 30.0 50.0 10.0 100.0 65.0
the output is:
0.30 0.50 0.10 1.00 0.65
The 5 indicates that there are five floating-point values in the list, namely 30.0, 50.0, 10.0, 100.0, and 65.0. 100.0 is the largest value in the list, so each value is divided by 100.0.
For coding simplicity, follow every output value by a space, including the last one
1 #include
2 #include
3 #include
4 using namespace std;
5
6 int main() {
7
8 /* Type your code here. */
9
10 return 0;
11 }
12

Answers

Answer:

5.23 LAB: Adjust values in a list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.

Explanation:

he is trying to find information on the internet first he navigated to a search engine entered the keywords database administrator and clicked on search the results did not show what it was looking for​

Answers

Answer:

b

Explanation:

b

What are the purposes of a good web page design? The purpose of a good web page design is to make it and .

Answers

Answer:

responsiveness and intuitive

Explanation:

The two main purposes of a good web page design is responsiveness and intuitive. A webpage needs to be designed in such a way that the individual using it can easily find what they are looking for and understand what each function in the webpage does without having to ask for help or go through an extensive tutorial. They need to be able to use the website for the first time and immediately be able to use it as if they have used it countless times before. The webpage also needs to be designed with responsiveness in mind. So much so that the webpage runs fluently, loads images fast, and scales to the size of the monitor correctly. As a rule the webpage should not take longer than 2 seconds to load.

Discuss with illustrations the
types and benefits of enterprise storage systems.

Answers

Answer:

An Enterprise Storage System is a centralized repository for business information. It provides a common resource for data sharing, management and protection via connections to other computer systems.

Enterprise storage systems are designed to process heavy workloads of business-critical information.

Benefits

High availability

Reliable backup and disaster recovery

Convenient data sharing

Centralized administration

Remote support.

PLEASE HELP I REALLY NEED IT ASAP
Select the correct answer. Layla and her team have installed a fire alarm system in an office. The alarm system connects to a wireless network, so it can be monitored using smartphones and computers connected to the same network. Which wireless technology does the fire alarm system use?
OA satellite
OB. Bluetooth
O C. infrared
OD. WI-FI​

Answers

Answer:

wifi

Explanation:

if it's running on the same network that's wifi

Answer:

The correct answer is D. Wi-Fi.

Explanation:

I got it right on the Edmentum test.

1 There are several applications to assist you to surf through the internet, mention
three (3 marks)​

Answers

Email
Web browsing
Peer-to-peer services

Consider the following program:

def test_1():
test_3()
print("A")

def test_2():
print("B")
test_1()

def test_3():
print("C")
What is output by the following line of code?

test_1()

C

A
B
C

A
C

C
A

Answers

Answer:

this would be answer D

Explanation:

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

def test_1():

test_3()

print("A")

def test_3():

print("C")

Back to test_1()

print("A")

What is program?

A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.

On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.

Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.

Learn more about program on:

https://brainly.com/question/30613605

#SPJ3

Use the drop-down menus to describe how to add a data bar to a report.
1. Open the table in view.
2. Click the column of the desired numerical field.
3. Click the conditional tab Format, then .
4. In the Rules Manager dialog box, click .
5. Select to “compare to other records,” and determine whether you want the value and bar to show at the same time.
6. Adjust the desired length of the bar and the color. Click OK.
7. Once satisfied with your rule, click and then OK.

Answers

Answer:

1. layout

3. conditional formatting

4. new rule

7. apply

Explanation:

just did it on edge

9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF function and structured references to count the number of students who have been elected to offices in student organizations.

Answers

Let understand that a spreadsheet perform function such as getting the sum, subtraction, averages, counting of numbers on the sheet rows and columns.

Also, the image to the question have been attached as picture.

Here, Lael wants to count the number of students who have been elected to offices in student organizations.

Lael will used the COUNTIF Function in the Spreadsheet to achieve the count because function helps to count cells that contain numbers.

In conclusion, the formulae that Lael should use on the Spreadsheet to count the number of students who are elected is "Q8 = COUNTIF(M2:M31, "Elected")"

Learn more about Excel function here

brainly.com/question/24826456/

Derive the three-dimensional transformation matrix for scaling an object by a scaling factor s in a direction defined by the direction cosines alpha , beta , gamma

Answers

Answer:

i dont know

Explanation:

i dont knoe im doing this for the points hehe

The Fibonacci numbers are 0, 1, 1, 2, 3, 5, 8, 13, ......., where each number is the sum of the two preceding numbers. Write a program that declares an array of length 15 and fills the array with the first 15 Fibonacci numbers. Print the array to check if the array elements are correct. Use the sizeofoperator instead of 15 whenever you need to use the array length.

Answers

0,1,1,2,3,5,8,13,21,34,55,89,144,233,377,610,987,1597

The code below assigns the 5th letter of each word in food to the new list fifth. However, the code currently produces errors. Insert a try/except clause that will allow the code to run and produce of list of the 5th letter in each word. If the word is not long enough, it should not print anything out. Note: The pass statement is a null operation; nothing will happen when it executes.
food = ["chocolate", "chicken", "corn
fifth = []
for x in food:
fifth.append(x[4])

Answers

Answer:

Answered below

Explanation:

foods = ["chocolate", "chicken", "corn"]

fifth_char = []

for food in foods:

"""Add a try statement to add fifth character to fifth_char list. If word is not long enough, the except part executes the the pass and nothing is printed.""'

try:

fifth_char.append(food[4])

except:

pass

#print out elements in new list

for c in fifth_char:

print(c)

Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between lines of text adds space between paragraphs adds space at the top and bottom of a page adds bullet points or numerical lists

Answers

Answer:

adds space between lines of text

adds space between paragraphs

Explanation:

Acróstico sobre mouse

Answers

this is a PICTURE

i HOPE IT'S HELP

Explain the paging concept and main disadvantages of pipelined
approaches? Compare the superscalar and super pipelined approaches
with block diagram?

Answers

Answer:

PAGINACIÓN En la gestión de memoria con intercambio, cuando ... Debido a que es posible separar los módulos, se hace más fácil la modificación de los mismos. ... Ventajas y Desventajas de la segmentación paginada

Explanation:

What is the creative strategy for music application.​

Answers

Answer:

The City of Vancouver has allocated $300,000 to support the growth and development of the Vancouver Music Strategy, developed to address current gaps in the music ecosystem that support: Creating a sustainable, resilient, and vibrant music industry.

Explanation:

Other Questions
What is the solution of 2x 5x 3 0? Water exists on Earth in all three states. Which of the following is a form of water in the liquid state? A. dew B. frost C. water vapor D. hailReset Submit question 2 which of these are common responsibilities of systems administrators? check all that apply. 1 point help users to pick the right desktop chair CHALLENGE ACTIVITY 407946.2092060.qx3zqy7 3.2.3: Detect specific values. Jump to level 1 If integer dominantCompanyCount is 2, output "Duopoly". Otherwise, output "Not a duopoly". End with a newline. Ex: If the input is 2, then the output is: Duopoly 3 4 int main() { 5 int dominant CompanyCount; cin >> dominant CompanyCount; 6789 9 if 10 { 11 12 13} 14 15 else. 16 17 18 19 20 Check Next level 2 3 D-DD" Amazon Simple Storage Service (Amazon S3) provide a good solution for which of the following use cases?a. A data warehouse for business intelligenceb. An internet accessible storage location for video files that an external website accessesc. Hourly storage of frequently accessed temporary filesd. A cluster for traditional Apache Spark and Apache Hadoop installations to process big data Burglar John infiltrated a house. Unfortunately, he has a relatively small backpack which helps him to carry at most 40 lbs. Possessing a discriminating eye, he can immediately determine how much the items worth. There are 5 different items available. His aim is to maximize the dollar value of the stuff carried away, the overall weight being less than the weight he can carry by using his backpack. Weight and value of each item is given in the following table.Item Weight(lbs.) Value($) Available1 30 15 12 18 12 13 50 45 14 24 20 1What will be the first item the burglar should choose?A) Item 1B) Item 2C) Item 3D) Item 4 The first the principal quantum number consider what property of an electrons?a) direction of spinb) orientation in spacec) distance from the nucleus Solve.Six times a number is equal to the number increased by 10. Find the number. lisa has been feeling very sad since her husband died 12 days ago. she has eaten very little, and has difficulty sleeping. she is weepy most of the time. lenore is preoccupied with thoughts of her dead husband and does not want to do much other than thinking about him. she has declined all invitations by friends and spends most of her time alone. An inexperienced accountant for Prestwick Company prepared the following income statement for the month of August, current year.PRESTWICK COMPANYAUGUST 31, CURRENT YEARRevenues: Services provided to customers $ 13,000 Investment by stockholders 5,000 Loan from bank 15,000 $ 33,000Expenses: Payments to long-term creditors $ 11,700 Expenses required to provide services to customers 9,500 Purchase of land 16,000 37,200Net income $ 4,200Prepare a revised income statement in accordance with generally accepted accounting principles. how did the mongols create a time of peace, or pax mongolica, despite their violence? which structure regulates the movement of substances in and out of the plant cell? select the phrase from the headline that best represents yellow journalism. these saw the tragedy; cabinet in session; maine destroyed by an outside attack; 253 known to be lost why was 2006 immigrant rights protests was important? Why is it important for students to learn about this? What lasting impact did it have Please show work. In 2018, the circulation of a local newspaper was 2,125. In 2019, its circulation was 2,250. In 2020, the circulation was 2,350a. Find the percent of increase in the newspapers circulation from 2018 to 2019 and from 2019 to 2020.b. Which period had a higher percent of increase, 2018 to 2019, or 2019 to 2020? total productive maintenance combines preventive maintenance with the concepts of total quality. group of answer choices true false What is Healthy People 2010? which of these planes is horizontal and divides the body into a top half and bottom half? Can QuickBooks track profitability? hat happened to the treaties signed by the California government and the California tribes?The 49ers pressured the government not to follow through with the terms of the treaties, and they were never passed on to Congress.They were lost in a fire in the Senate archives.The terms were met, and 8.5 million acres were given to the Native Americans.The Natives did not agree to the terms of the treaties, and they did not hold up their end of the deal.