The option that is a universal standard for encoding keyboard characters that contains over 2 billion distinct codes is ASCII.
What is the universal standard code about?The ASCII is known to be the American Standard Code for Information Interchange.
It is said to be a very common character encoding method for text data in computers and on the internet and The option that is a universal standard for encoding keyboard characters that contains over 2 billion distinct codes is ASCII.
Learn more about ASCII from
ASCII
#SPJ1
what is a sub folder in ICT
Answer:
A sub folder is a folder within a folder.
Explanation:
A subfolder on a computer is a folder inside of another folder. For example, someone may create a main folder for their music and then create subfolders to separate the genres of music.
Additionally, "sub" prefix means "under" or within.
Hope this helps.
Answer:
It's folder that is created from the main folder.
What does data warehousing allow organizations to achieve?
What does data warehousing allows organizations to collect only the current day's data from their various databases.
What is the role of Data warehousing?The role of data helps to boast the the speed and efficiency of accessing a lot of data sets in an organization.
What does data warehousing allows organizations to collect only the current day's data from their various databases.
Learn more about Data warehousing from
https://brainly.com/question/25885448
#SPJ1
Which file format produces a lock-down version of an access database? accdb accdb-be accde accdb-e
The file format that produces a lock-down version of an access database is called; ACCDE
How to Identify Access Database?ACCDB files are the default Microsoft Access database format in Access 2007 and later versions while the ACCDE format is a read-only, compressed version.
Now, the file format that produces a lock down version of an access database is called ACCDE file which is a Microsoft Access Execute Only Database file used to protect an ACCDB file.
Read more about Access Database at; https://brainly.com/question/9745438
#SPJ1
Disadvantages of the divisional organization structure are _____. each division is able to operate independently from the parent company each division is able to operate independently from the parent company cheap to operate cheap to operate cannot share resources with other divisions cannot share resources with other divisions more expensive to operate more expensive to operate
Answer:
Disadvantages:
1. A division may feel separated from the parent company because it has too much independence
2. This feeling of separation may lead to the division only worrying about meeting it's goals and objectives and not the companies as a whole
3. This system may be more expensive to operate and cannot share resources with other divisions
Explanation:
Explain methods of managing digital databases including permission marketing and the application of suppressions/opt-outs
The steps to manage a database management system are
State or define your needs.Form a Shortlist. Look into your options. Implement your Software. Keep Your Database.What is opt-out?The Opt-out method is known to be often used in permission marketing as it is in the case where a user is said to leaves a mailing list or a website.
Therefore, The steps to manage a database management system are
State or define your needs.Form a Shortlist. Look into your options. Implement your Software. Keep Your Database.Learn more about database management from
https://brainly.com/question/24027204
#SPJ1
What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a disk
Answer:
current disk queue length
Explanation:
How many pages is 1500 words double spaced 12 font?.
Answer:
1-2 pages
Explanation:
A program that performs handy tasks, such as computer management functions or diagnostics is often called a/an ____________.
Answer:
DOS
Explanation:
Disk operating
With the advent of _____ that stored the games and could be interchanged in the console, users were no longer limited to a set number of games, leading many video game console makers to switch their emphasis to producing games
Answer:
game cartridges
Explanation:
Draw and implement of an organization which have 125 employees. use the following features 1.email services 2.lan communication 3.vlan 4.security 5.storage 6.server
An organisation usually hires employees which helps in the successful achievement of the goals of the organisation.
Implementation of an organisationThe implementation of an organisation can be carried out using the following features:
Email services: Email address can be assigned to different employees of the organisation.LAN communication: Local Area Network is used by organisation to connect their computer devices to a server using a common communication line.VLAN: This is known as Virtual Local Area Network which is created between two LAN's.Security: This is set up by a company to guide their data from theft.Storage: This is used by the organisation to store their data.Server: This is a device that provides internet services to another computer in an organisation.Learn more about LAN here:
https://brainly.com/question/26956118
#SPJ4
"The actual use and implementation of computer started after third generations". Justify this statement in your own words.
Answer: The computers of third generation used IC which replaced transistors. Now' the computers were more faster ,smaller and reliable so people started to use them often for many purposes ..So the actual use and implementation of computer started after third generations
privacy principles need to be balanced against the ___ benefit that comes from the automated collection of private information. select 2 options.
corporate
political
ethical
societal
financial
The privacy principles need to be balanced against the corporate
the political benefit that comes from the automated collection of private information.
What is the privateness coverage of the employer?A privateness coverage is a file that explains how an employer handles any consumer, consumer or worker records accumulated in its operations. Most websites make their privacy guidelines to be had to web website online visitors.
The greater glad clients are, the longer they live with a business enterprise and offer sufficient enterprise to make certain increase and profitability. While setting collectively techniques for higher consumer service, a business enterprise ought to make certain that the stability among consumer expectancies and enterprise desires is maintained sustainably.Read more about the information:
https://brainly.com/question/25689052
#SPJ1
3 Select all the correct answers. Ana is creating a list of SMART goals. Which aspects should she pay attention to? The goal's success rate is at least 50%. The goal should be relevant to her career plan. The goal's success rate is more than 50%. The goal should be attainable within a given time frame. The goal to be attained should not be time bound. Jhy Reset Next
Ana is creating a list of SMART goals the aspects should she pay attention to are The goal should be relevant to her career plan.,The goal's success rate is more than 50% and. The goal should be attainable within a given time frame.
What are the examples?The intention of turning into an excessive college math trainer is well-defined. Measurable: Success may be measured via way of means of the range of applications, interviews and activity offers. Achievable: The intention-setter may have the precise diploma for the activity.
The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound. Defining those parameters as they pertain to your intention allows for making sure that your goals are manageable within a sure time frame.
Read more about the SMART goals.:
https://brainly.com/question/8986181
#SPJ1
help me help you............
Answer:
change how big or small the shape or sprite is
What effect does the sudo iptables --policy INPUT DROP command have on the access to computing resources
The effect of the sudo iptables --policy INPUT DROP command is that it gives room for system administrators to handle incoming and outgoing traffic.
What does Sudo iptables -- policy input drop command do?The iptables -P INPUT DROP is known to be an -P switch that places the default policy on any given chain.
When the default policy on the INPUT chain changes to DROP., it implies that an incoming packet did not match one set of the rules and as such, it will have to be dropped.
Learn more about computing resources from
https://brainly.com/question/14596532
#SPJ2
Why do people take off the keys on the school computers
Answer:
is this supposed to be a joke-
Explanation:
cuz i dont get it
Your guardian receives a call similar to the one described in the amazon video. what is one thing they can do to check that it is a legitimate message?
One thing they can do to check that it is a legitimate message is to see if there is any link for you to click, or numbers to call, this will tell you that it is a scam.
How do you tell if someone is scamming you online?There are a lot of ways to know online scam. Some include
Unexpected contact. Asking for your personal info.links been posted along with random messages.Therefore, One thing they can do to check that it is a legitimate message is to see if there is any link for you to click, or numbers to call, this will tell you that it is a scam.
Learn more about Scam from
https://brainly.com/question/1063454
#SPJ1
PYTHON!
Build a simple restaurant program by serving this menu to the customer:
1. Muffin of the Day
2. Bagel and Cream Cheese
3. Granola, Fruit, and Yogurt
4. Steel Cut Oat with Fruits
5. exit.
===========================================================
requirements:
1. Create 4 classes for each course.
2. Each course will be having ingredients as their Attribute of class. example: Muffin - egg,oil,sugar.
3. First function of the course's menu is printing the steps of making the course by putting it into
functions. (you will just need "print statement" at least).
4. Second function of the course's menu is printing "Dish is served".
5. (you can add more functions for more points of the program).
6. Show the menu to the customer as long as they don't choose menu number 5.
7. When the customer choose a course, build the object and call all the functions that you built.
The efficiency, effectiveness, clarity, completeness and neatness of the program will be assessed.
Answer:
hi Po konbanwa sayo I'm pilipino I'm live in philippines
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, including:
Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, including Interdisciplinary research diploma applications integrate or greater conventional educational guides of have a look at right into a greater personalized major.
What is Interactions among AI Artificial intelligence?Interactions among AI Artificial intelligence and schooling is but some other instance of interdisciplinarity in AI (Oudeyer et al., 2016), that may immediately gain now no longer best the 2 fields, schooling and AI, however society and productiveness as a whole.
Interdisciplinary research diploma applications integrate or greater conventional educational guides of having a look at right into a greater personalized major. Unlike a liberal arts diploma wherein you'll have a look at an extensive type of subjects, an interdisciplinary diploma lets in college students to discover a greater centered subject matter that crosses into more than one field.Read more about the interdisciplinary :
https://brainly.com/question/25955559\
#SPJ1
Choose the correct order for the process of a user attempting to access network resources: 1. network protocol 2. application 3. network client 4. nic driver
Answer:
2, 3, 1, 4
Explanation:
Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original material
Non-linear editing can cause modification in the original video whereas editing and re-edit and re-edit again can cause the video to be less true than the original material.
What is non-linear editing?In non-linear editing, the editor can do any operation with the video like adding or removing any frame without starting from the beginning.
It's been characterized as a ‘cut and paste’ technique that can really innovate how video makers approach videography.
Therefore Non-linear editing can cause modification in the original video whereas editing and re-editing and re-editing again can cause the video to be less true than the original material.
To know more about non-linear editing follow
https://brainly.com/question/15614247
#SPJ4
“How does revenue affect profit. How do expenses affect profit
Answer:
Profit depends on a simple formula: revenue minus expenses. The amount that your business ultimately earns is equal to the amount you have made in exchange for products or services minus the amount you have spent to keep your business running.
As a general rule, an increase in any type of business expense lowers profit. Operating expenses are only one type of expense that reduces net sales to reach net profit.
Explanation:
Use the svd() function in matlab to compute a, the rank-1 approximation of a. clearly state what a, is, rounded to 4 decimal places. also, compute the root-mean square error (rmse) between a and a.
a=[1 2 2]
[ 3 4 5]
[ 6 7 8]
Using the knowledge in computational language in C code it is possible to write a code that organizes and calculates the value of the matrix of A*A and that is in up to 4 decimal places.
Writing the code in C is possible:
A=[1 2 2;3 4 5;6 7 8];
[u ,s ,v] = svd(A);
k = 1;
A1 = u(:,1:k)*s(1:k,1:k)*v(:,1:k)'; %'
RMSE = rms(sqrt(mean((A - A1).^2)))
See more about C code at brainly.com/question/17544466
#SPJ1
What does a primary key allow a user to do in a database?
PLEASE HELP
A primary key is the field (or fields) that is often employed to specifically identify each record in a table.
What is the role of this key?The Primary key is known to be the key that helps a user to be able to form a specific identifier for each row in one's table.
Note that it helps a person to link your table to other tables and as such, a primary key is the field (or fields) that is often employed to specifically identify each record in a table.
Learn more about primary key from
https://brainly.com/question/12001524
#SPJ1
Answer: its A
Explanation:
What are the method to decrease friction?
Answer: For objects that move in fluids such as boats, planes, cars, etc the shape of their body is simplified in order to reduce the friction between the body of the objects and the fluid.
By polishing the surface, polishing makes the surface smooth and friction can be reduced.
Using lubricants such as oil or grease can reduce the friction between the surfaces.
When objects are rolled over the surface, the friction between the rolled object and the surface can be reduced by using ball bearings.
Explanation:
Select the correct answer.
Denise is creating a web page about rainforest animals. Her friend has many photos of animals from a trip to Brazil. Denise wants to use some
of those photos for her web page. Which input device is best for transferring photos to her multimedia project?
O A digitizing tablet
OB.
keyboard
OC. graphic pad
OD. digital camera
Explain different characteristics of computer?
[tex]\huge\purple{Hi!}[/tex]
The characteristics of computer are speed, accuracy, reliability, Automaticon, Memory
Speed=A computer works with much higher speed and accuracy compared to humans while performing mathematical calculations. Computers can process millions (1,000,000) of instructions per second. The time taken by computers for their operations is microseconds and nanoseconds.
Accuracy=Computers perform calculations with 100% accuracy. Errors may occur due to data inconsistency or inaccuracy.
Reliability=A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set of input any number of times, we will get the same result.
Automation=Computer performs all the tasks automatically i.e. it performs tasks without manual intervention.
Memory=A computer has built-in memory called primary memory where it stores data. Secondary storage are removable devices such as CDs, pen drives, etc., which are also used to store data.
What does business informWhat does business information management do?
A.
identify information requirements for coworkers
B.
identify information requirements for different management levels
C.
create project plans for the project management team
D.
produce sales turnover summary for the sales professionals
E.
create financial documents for the finance departmentation management do?
Answer:
B) identify information requirements for different management levels
Explanation:
Business information management is based off of identifying the needs of a company. (This is also a plato answer)
The entities on which data are collected are _____.
Answer:
The entities on which data are collected is known as variables.
Explanation: