Jeffery wants to locate reliable academic information on the effects of global warming and ways to conserve energy. What is the most efficient and effective search strategy to identify subject terms for a database search?a. He can look for common related subject terms in a dictionary, thesaurus or encyclopedia.b. He can look for relevant articles in the results list from a database search and scan the subject terms.c. He can use Google Scholar to retrieve relevant articles and find common related subject terms.

Answers

Answer 1

Answer:

c. He can use Google Scholar to retrieve relevant articles and find common related subject terms.

Explanation:

Of the options provided, the third is the most effective and efficient search strategy. Google Scholar is a deep level tool that can be used to search for relevant academic information from published academic tests. It has very useful search options and it will be very effective and efficient in this instance.


Related Questions

Q1: Which of the following is an input peripheral device?

• Speakers
• Printer
• Mouse
• Display monitor

Answers

Answer:

Mouse

Explanation:

Input devices allow users to input something in the computer. For example keyboard allows users to type on the computer, or mouse allows users to click.

On the other hand output devices allow computers to output data. For example speakers allow us to hear the outputs of a computer.

Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, modification, and fabrication. How do the first three concepts relate to the last four? That is, is any of the four equivalent to one or more of the three? Is one of the three encompassed by one or more of the four?

Answers

Answer:

Confidentiality and availability- interruption, integrity - modification and fabrication.

Explanation:

Data on a network is provided with the three As in security, accountability, authentication and authorisation to promote the confidentiality and integrity of data on the network.

When a data is interrupted by a DOS attack, it is exposed to the attackers and the data transfer is interrupted. With this, the attacker can modify the existing data or fabricate a new data to sent to the network, crippling the integrity of the network data.

Final answer:

The principles of confidentiality, integrity, and availability in information security directly counter concerns over interruption, modification, and fabrication by ensuring data is properly secured against unauthorized access, changes, and creation of false data.

Explanation:

The concepts of confidentiality, integrity, and availability of data, often encapsulated by the acronym CIA, are fundamental principles in information security. These principles directly relate to concerns over interruption, modification, and fabrication in several ways. Confidentiality aligns with preventing unauthorized disclosure, ensuring that data is not seen or disclosed to unauthorized parties, akin to preventing interruption in access. Integrity involves safeguarding the accuracy and completeness of data, thereby preventing unauthorized modification. Availability ensures that data is accessible and usable upon demand by an authorized user, countering both interruption and modification that could render data inaccessible or corrupt.

Interruption can be seen as a threat to availability, as it involves disrupting access to or use of information or an information system. Modification and Fabrication, on the other hand, primarily undermine integrity; modification involves altering existing information, while fabrication entails generating false data. Both can lead to unauthorized changes and misrepresentation of data, impacting its reliability and trustworthiness.

Therefore, ensuring high levels of confidentiality, integrity, and availability (CIA) addresses these concerns directly. By protecting against unauthorized access (interruption), ensuring data accuracy and consistency (modification), and preventing the creation of false data (fabrication), one can uphold the principles of CIA in information security.

What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work?

Answers

Answer:

Transmission Control Protocol is a Transport Layer protocol.  This protocol is connection oriented which means that a connection is set up before the data packets are transmitted between the source and destination host which is a very reliable way of data transmission.The connection is established between the source and the destination, after this the data is transmitted between them and lastly the connection is ended or terminated after the data transmission.The packet or a messages that is delivered by TCP is called segment.Basically TCP divides the data into small parts or chunks which are called segments. The segment has a header and data section. The segment header is further divided into the following parts.Source port (sending port), destination port (receiving port), sequence number which is allocated to the first byte in the segment so that if the segments at the destination are sent out of order then it will help to rearrange these segments, Acknowledgement Number is number that the acknowledgement number sender expects to receive, header length, control flags which are used to control connection set up, connection termination and flow control, window size that a sender is ready to receive, Checksum field enables error control, Urgent pointer which is used to refer to data that is urgently needed to reach the receiving phase as soon as possible.  User Datagram Protocol (UDP) is a Transport Layer protocol and a part of Internet Protocol suite. This protocol is connection-less which means there  is no need to establish a connection between source host and destination host prior to the transmission of data which is an unreliable data transmission way. The message in UDP is called datagram . Unlike TCP segments there is no need to consider the order in which datagrams are sent or received. Datagram has a header part which contains routing information a data section which shows the data to be transmitted. Header has source port, destination port, checksum and length fields.TCP and UDP protocols work in Transport Layer. This layer is responsible for end to end delivery of data between source and destination hosts. It ensures reliable data transmission and manages flow control and also ensures that packets reach in the right order in which they were sent.

Thus, the message given by TCP segments.

TCP segments:

The message delivered by UDP is a datagram. The layer where protocol works is the transport layer. Transport layer header addresses in order to receive an application by a number called port number.

If the message is very large that cannot be transported over the network, then transmission control protocol (TCP) is used for dividing it into smaller messages called segments. The message in user datagram protocol (UDP) is known as a datagram.

Learn more about the topic TCP segments:

https://brainly.com/question/14975207

More than 90 percent of personal computers run a version of the Microsoft Windows operating system. In what ways is this situation beneficial to computer users? In what ways does this situation harm computer users?

Answers

Answer:

it's beneficial to users since it access the data entered very easily and also cheap to access

it's harmful because many users tries to edit and format some data may take time and therefore not much reliable

Explanation:

therefore personal computers should be able to access data at high rate

it is  beneficial to users since it access the data entered very easily and also cheap to access.

it's harmful because many users tries to edit and format some data may take time and therefore not much reliable

What is operating system?

An operating system (OS) is type of system software that manages and controls the computer hardware along with software resources, and provides most of the common services for many computer programs.

More than 90 percent of personal computers run a version of the Microsoft Windows operating system.

Situation is beneficial to users since it access the data entered very easily and also cheap to access.

Personal computers should be able to access data at high rate.

Situation is harmful because many users tries to edit and format some data may take time and therefore not much reliable.

Learn more about operating system.

https://brainly.com/question/6689423

#SPJ2

write a function deal3 of type 'a list -> a' list whose output list is the same as the input list, but with the third element deleted.

Answers

Answer:

I am writing a python program for this.  

  def deal3(input_list, index):  

   list = []    

   for x in range(len(input_list)):            

       if x != index:  

           list.append(input_list[x])  

   print('list ->',list)      

input_list = [10, 20, 30, 40, 50]  

index = 2

deal3(input_list, index)

Explanation:

The first line of code defines a function deal3 which has two parameters. input_list which is an input list and index is the position of elements in the input list.next statement list=[] declares a new list that will be the output list.next statement for x in range(len(input_list)):   is a loop which the loop variable x will traverse through the input list until the end of the input list is reached.the next statement if x != index:  checks if x variable is equal to the position of the element in the list.Next statement list.append(input_list[x]) appends the elements of input list to list( new list that will be the output list). Now the output list will contain all the elements of the input list except for the element in the specified position (index variable).this statement print('list ->',list) prints the list (new output list).this statement input_list = [10, 20, 30, 40, 50]  insert elements 10 20 30 40 50 in the input list. index=2 specifies the second position (3rd element) in the list that is to be removed. deal3(input_list, index) So the function is called which will remove 3rd element of the input list and prints output array with same elements as that in input array except for the element at the specified position.

You’ll need to implement a method called String getWinner(String user, String computer) that determines whether the user or computer won the game, and return the correct winner!

Answers

Answer:

The solution code is written in Java.

String getWinner(String user, String computer) {        if(status == x) {            return user;        }        else {            return computer;        }    } String winner = getWinner("User_X", "Comp_X");

Explanation:

A method getWinner() that take two parameters, user and computer, is written (Line 1 - 8). This method presumes that there is a global variable, status. This status variable holds the value that will decide if method should return either user or computer name as winner (Line 3, 5).

Line 10 shows a statement that implement the getWinner() method.

What do you call the process of translating statements written by a developer? What is the result of this process?

Answers

Answer:

The translator is the software that is called to translate the statement written by the developer and the result of the process is machine code which can be understood by the computer system.

Explanation:

A translator is a software or processor which is responsible to convert the code into machine-executable language or machine code or binary language. This language is made up of 0 and 1.There are so many translators which are specific for any particular language. For example assembler and compiler.The above question wants to ask about the process which is used for translating a statement written by a developer which is a translator and the result of this process is machine code which is understood by the computer system.

Choose one of the hacks discussed by Mr. Holman in the video, and using your favorite search engine conduct some additional research on the hack. What is the vulnerability being exploited?

Answers

Answer:

When hacks are discussed with Mr. Holman on video than their vulnerability being exploited

Explanation:

When hacks have given suggestions to  Mr. Holman in his video on favorite search engine there is hundred percent vulnerability is there. Better to avoid the suggestion and make sure not to use the link or any software is been installed. Once end-user click on software or link his or her computer or laptop or PC is hacked and his or her data is exposed to hackers. Once the data is hackers there is steal on data such as video or pictures are exposed and hackers can misuse.

Final answer:

Hackers exploit vulnerabilities using tactics like phishing, malware, and social engineering to steal sensitive data. The stolen data is used for financial gain or identity theft. Reducing hacking requires updates, security measures, and user education.

Explanation:

When evaluating the techniques that hackers use to compromise systems, one common method is by exploiting various vulnerabilities. Hackers might target vulnerabilities within software, such as outdated systems, unpatched flaws, or configuration errors.

They deploy tactics such as phishing, malware, and social engineering to trick users into giving up sensitive information or to gain unauthorized access to systems.

Among the reasons hackers engage in these activities are to steal personal data, financial information, or intellectual property. The stolen data can be used for financial gain, identity theft, or even to gain a competitive advantage.

Hackers are often quite successful due to the sophistication of their tactics and the general lack of awareness and preparedness among users. To reduce or stop hacking, it is essential to consistently update systems, implement security measures like firewalls and antiviruses, and educate users on best practices for cyber hygiene.

Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and their average as integers (rounded), then as floating-point numbers.

Answers

To output the product and average of four floating-point numbers as integers and as floating-point values, use a string formatting expression with specifiers '%d' for integers and '%f' for floating-point values.

To calculate the product and average of four floating-point numbers and output them as integers (rounded) and as floating-point numbers, you can use the following string formatting expression:

product = float1 * float2 * float3 * float4
average = (float1 + float2 + float3 + float4) / 4
print('Product as integer: %d' % product)
print('Average as integer: %d' % average)
print('Product as floating-point: %f' % product)
print('Average as floating-point: %f' % average)

Replace float1, float2, float3, and float4 with your actual floating-point numbers. The '%d' specifier will round the output to the nearest integer, and '%f' will display the number as a floating-point value.

Describe the differences between program development and program execution, including the installed software required for developing and executing Java programs.

Answers

Answer:

Program development is basically a step wise process to solve a particular problem. It basically refers to the coding of a program. This initial steps involves defining the problem statement, specifying the requirements and specifying what the output of the program should be. Program development also includes visually presenting what of the program for example in the form of flowchart. It also involves coding, the set of instructions, procedures, functions, sub routines that a computer should carry out to get the desired output. Also the bugs and errors are removed by debugging the program. Program execution refers to execute or run the set of instructions of a program. The program or machine code is loaded to the memory prior to execution and then executed. For example in JAVA the source code if first converted to bytecode and then in machine code in order to be executed.

Developing and Executing JAVA programs involves typing program using some editor (editing), compiling the program (converting to bytecode), loading program to memory prior to execution, verifying bytecode and executing the program.

In JAVA,  Java Development Kit (JDK) is used for JAVA program development and JAVA applications development. It involves an Integrated Development Environment (IDE) which serves as a platform for writing the JAVA code.

Java Runtime Environment JRE is used to JAVA program execution and provides a platform or environment to run the JAVA applications. JRE consists of class libraries, user interface toolkit, class loader and JAVA Virtual Machine JVM .

The class loader loads the required class libraries. JVM works as an interpreter for running the JAVA program line-by-line. This interpreter executes the Byte Code .

You are tasked with creating a mileage calculator to calculate the amount of money that should be paid to employees. The mileage is computed as follows An amount of .25 for each mile up to 100 miles An amount of .15 for every mile above 100. So 115 miles would be (.25 * 100) + (.15 * 15) This can all be coded using a mathematical solution but I want you to use an if / else statement. Here is how you are to implement it: If the total miles input is less than or equal to 100 then simply calculate the miles * .25 and output the amount otherwise compute the total amount for all miles mathematically. Input: Total number of miles Process: dollar amount owed for miles driven Output: Amount of money due * Please note that you should simply do calculations within the if and else statements. This mean no cin or cout within if or else. Do it afterward.

Answers

Answer:

Desired C++ Program with proper comment is given below

Explanation:

#include<iostream>

using namespace std;

//main function

int main()

{

  int totalMiles = 0;

  int remainingMiles = 0;

  double amt = 0;

 

  //taking input from user regarind total miles

  cout<<"Enter the total miles: "<<endl;

  cin>>totalMiles;

  //if-else condition to do the calculation

  if(totalMiles<=100)

  {

      amt = totalMiles*.25;

  }

  else

  {

      remainingMiles = totalMiles - 100;

      amt = 100*.25 + remainingMiles*.15;      

  }

 

  cout<<"The total amount is: "<<amt<<endl;

}

Universal Containers is setting up an external Business Intelligence (BI) system and wants to extract 1,000,000 Contact records. What should be recommended to avoid timeouts during the export process?A. using the soap API to export dataB. utilise the bulk API to export the dataC. use GZIP compression to export the data

Answers

Answer:

C. use GZIP compression to export the data

Explanation:

GZIP compression is used to improve transfer speed trough network.

GZIP compression enables smaller file sizes, which leads extracting faster.

GZIP compression is also used for server-side webpages, so that the webpage is uploaded faster.

Once data is compressed with GZIP, it is decompressed by the same application after transmission.

When you write a program that will run in a GUI environment as opposed to a command-line environment, ____________.

Answers

Answer:

The syntax are different.

Explanation:

Graphic user interface is a computer system interface that uses graphics of images to represent and activate or run applications and other activities in the device. The command line interface is text format interface that accepts typed commands to execute a task.

Programming both interface requires high level of program skills, with knowledge in algorithms and programming language like C, C++ etc. The syntax in GUI is more complex and different from the command line interface.

Write a program having a concrete subclass that inherits three abstract methods from a superclass. Provide the following three implementations in the subclass corresponding to the abstract methods in the superclass:

1. Check for uppercase characters in a string, and return true or false' depending on if any are found.
2. Convert all of the lower case characters to uppercase in the input string, and return the result.
3. Convert the input string to integer and add 10, output the result to the console.
Create an appropriate class having a main method to test the above setup.

Answers

Answer:

C++

Explanation:

using namespace std;

class AbstractClass {

public:  

   virtual bool checkUpperCase(string inputString);

   virtual string lowerToUppercase(string inputString);

   virtual void stringToInt(string inputString);

};

class ConcreteClass: public AbstractClass {

public:

   bool checkUpperCase(string inputString) {

       bool isUpper = false;

       for (int i=0; i < strlen(inputString);  i++) {

           if (isupper(inputString[i])) {

               isUpper = true;

               break;

           }

       return isUpper;

      }

   string lowerToUppercase(string inputString) {

       for (int i=0; i < strlen(inputString);  i++) {

           putchar(toupper(inputString[i]));

       }

       return inputString;

   }

   void stringToInt(string inputString) {

       int convertedInteger = stoi(inputString);

       convertedInteger+=10;

       cout<<convertedInteger<<endl;

   }

};

int main() {

   ConcreteClass cc;

   return 0;

}

________-generation languages use symbols and commands to help programmers tell the computer what to do.

Answers

Answer:

Third Generation Computers

Explanation:

Third-generation languages use symbols and commands to help programmers tell the computer what to do.

Third-generation language. Also known as a "3GL," it refers to a high-level programming language such as FORTRAN, COBOL, BASIC, Pascal, and C. It is a step above assembly language and a step below a fourth-generation language (4GL).

Create a division formula.

a. Click the Bookings sheet tab and select cell F5. Average revenue per passenger can be determined by dividing the fee by the number of passengers.
b. Build the division formula.
c. Copy the formula in cell F5 to cells F6:F19.

Answers

In this exercise we have to use the knowledge of excel to explain some functions that can be used, as:

In excel cell a division formula can be written as: =(A4+B4+C4+D4+E4)/5

How to divide in excel?

Tip: To divide numerical values, use the "/" operator, as there is no DIVIDE function in Excel. For example, to divide 5 by 2, type =5/2 in a cell, which returns 2.5.

Not necessarily, we need the division to always be in numbers, they can be from cells. Just click on the cells and then do your division.

See more about excel at brainly.com/question/12788694

Write a program that calculates the occupancy rate for each floor of a hotel. The program should start by asking for the number of floors the hotel has. A loop should then iterate once for each floor. During each iteration, the loop should ask the user for the number of rooms on the floor, and how many of them are occupied. After all the iterations, the program should display the number of rooms the hotel has, the number that are occupied, the number that are vacant, and the occupancy rate for the hotel. Input Validation: Do not accept a value less than 1 for the number of floors. Do not accept a number less than 10 for the number of rooms on a floor.

Answers

Answer:

# User is prompted to enter the number of floor in hotel

# The received value is assigned to no_of_floor

no_of_floor = int(input("Enter the number of floor in the hotel."))

# This loop is to enforce that user input is not less than 1

while (no_of_floor < 1):

   no_of_floor = int(input("Enter the number of floor in the hotel."))

# counter variable is initialized to loop through the no_of_floor

counter = 1

# total number of rooms occupied in the hotel is initialized to 0

total_occupied = 0

# total number of rooms vacant in the hotel is initialized to 0

total_vacant = 0

# total number of rooms in the hotel is initialized to 0

total_room = 0

# loop through each floor

while counter <= no_of_floor:

   # number of room in a floor is received from user

   number_of_room = int(input("Enter the number of room in floor: "))

   # this loop ensure that the number must not be less than 10

   while (number_of_room < 10):

       number_of_room = int(input("Enter the number of room in floor "))

   # number of occupied room is a floor is accepted from user

   number_of_occupied = int(input("Enter the number of occupied room."))

   # this loop ensure that the no_of_occupied is less than no_of_room

   while (number_of_occupied > number_of_room):    

       number_of_occupied = int(input("Enter the number of occupied room."))

   

   # number of vacant room in a floor is calculated

   floor_vacant = number_of_room - number_of_occupied

   # total number of occupied room is calculated

   total_occupied += number_of_occupied

   # total room in the hotel is calculated

   total_room += number_of_room

   # total number of vacant room is calculated

   total_vacant += floor_vacant

   # the counter is increment to move to the next floor

   counter += 1

# occupancy_rate is calculated as a percentage

occupancy_rate = (total_occupied / total_room) * 100

# Number of total room is displayed

print("The total number of room in the hotel is: ", total_room)    

# Number of total vacant room is displayed

print("The number of vacant room in the hotel is: ", total_vacant)

# Number of total occupied room is displayed

print("The total number of occupied room in the hotel is: ", total_occupied)

# The occupancy rate for the hotel is displayed to 2 decimal

#  place percent

print("The occupancy rate for the hotel is: {:.2f}%".format(occupancy_rate))

Explanation:

The program is well commented. It put all the constraint into consideration like:

not allowing a user to enter less than 1 for number of floorsnot allowing a user to enter less than 10 for number of rooms in a floornot allowing a user to enter number of occupied room greater than number of room in a floor.

Given the number n as input, print the first n odd numbers starting from 1. For example if the input is 4 The ourput will be: 1 3 5 7

Answers

Answer:

The cpp program for the scenario is given below.

#include <iostream>

using namespace std;

int main() {

// number of odd numbers to be printed

int n;

// variable to keep count of odd numbers

int odd=1;

// variable to print odd numbers

int j=1;

// user is prompted to enter number of odd numbers to be displayed

cout<<"Enter the number of odd numbers to be printed ";

cin>>n;

do

{

// odd number is displayed

cout<<j<<" ";

// variable incremented after odd number is displayed

odd++;

// variable incremented to consecutive odd number

j = j+2;

// loop continues until required number of odd numbers are reached

}while(odd<=n);

}

OUTPUT

Enter the number of odd numbers to be printed 10

1 3 5 7 9 11 13 15 17 19  

Explanation:

The program works as described below.

1. The variable, odd, is declared and initialized to 1 to keep count of number of odd numbers to be displayed and other variable, j, declared and initialized to 1 to display odd numbers in addition to variable n.

2. User is prompted to enter value of n.

3. Inside do-while loop, initially, first odd number is displayed through variable j.

4. Next, variable odd is incremented by 1 to indicate number of odd numbers displayed.

5. Next, variable j is incremented by 2 to initialize itself to the next consecutive odd number.

6. In the while() clause, variable odd is compared against variable n.

7. The do-while loop executes till the value of variable odd becomes equal to the value of variable n.

8. The main() method has return type int and thus, ends with return statement.

9. The iostream is required to enable the use of basic keywords like cin and cout and other keywords.

10. This program can calculate and print any count of odd numbers as per the user.

What value is used to tell the OS which application running on the computer is to receive a request from a client computer?

Answers

Answer:

Port Number

Explanation:

Port numbers provide applications in a computer to share network.

Computer operating systems can handle network traffic, incoming and outgoing requests using port numbers.

This is managed by assigning each application to a different port number. Port numbers together with IP addresses identify network traffic.

You are working as a Software Programmer for one of the big retail company. You need to implement the program that can store at least 15 customer information using the Array concept. You need to implement the individual array to store each of below field. CustomerName CustomerAddress1 City State Zip Once the data is stored in the array, then you need to loop thru the entire zip loop and print all the zip code on the command line.

Answers

Answer:

The C++ code is given below with appropriate comments. Random names of customer information are chosen as samples

Explanation:

#include <iostream>

using namespace std;

int main()

{

// Initialize String Arrays for customerName,customerAddress1,city,state,zip for 15 customers

string customerName[15] = {"Liam","Noah","William","James","Logan","Benj","Mason","Elijah","John","Patty","Cheryl","Nick","Brian","Steve","mark"};

string customerAddress1[15] = {"Liam - Address1","Noah - Address2","William - Address3","James - Address4","Logan - Address5","Benjamin - Address6","Mason - Address7","Elijah - Address8","John - Address9","Patty - Address10","Cheryl - Address11","Nick - Address12","Brian - Address13","Steve - Address14","mark - Address15"};

string city[15] = {"Sitka","Juneau","Wrangell","Anchorage","Jacksonville","Anaconda","Oklahoma City","Fort Worth","Dallas","Sitka","Juneau","Wrangell","Anchorage","Jacksonville","Anaconda"};

string state[15] = {"Alaska","Alaska","Alaska","Alaska","Florida","Montana","Montana","Oklahoma","Texas","Arizona","Tennessee","California","Virginia","Indiana","Virginia"};

int zip[15] = {30041,36602,75062,78952,12071,55874,11236,44512,55262,99874,11020,55820,11304,11587,11047};

// Print Zips for the customers

cout <<"Customer Names"<<"\t"<< "Zip Code"<< "\n";

for (int i = 0; i < 15; i++)

cout <<customerName[i]<<"\t\t\t"<< zip[i] << "\n";

}

In simplest terms, cyber stalking involves the use of the Internet, e-mail, or other electronic communications devices to stalk another person that generally involves A. harassing or threatening behavior that an individual engages in repeatedly. B. sending or forwarding sexually explicit photos, videos, or messages. C. essential cooperative reflection with evolved formation hyperbolically. D. none of the above

Answers

Answer:

A. ha--ssing or thr----ning behavior that an individual engages in repeatedly.

Explanation:

S - talking by an online definition is the unwanted ob-sessive attention a person gives to a specific person. So therefore, Cybers - talking can then be defined as harming behavior or unwanted or unsolicited ad-vances directed at another using the Internet and other forms of online communications such as through social media outlets like In-stagram, Face-book, Tumblr, Twitter etc and even emails and cellphones.

Cybers - talking may also include secret monitoring, identity th-eft, regular harm, tarnish of image or property, favours, or gathering personal and private information that may be used to disturb the victim. Note that this behaviour is repeatedly and compul-sive.

A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely

Answers

Answer:

option C: accurate

Explanation:

this is because daily updated website contains the up to date information.

The proper syntax for the cp command is _____ Select one: a. cp destination b. None of These c. cp filename.txt destination d. filename.txt destination

Answers

Answer:

The correct answer to the following question will be Option C (cp filename.txt destination).

Explanation:

The command cp is a control-line tool for folder and directory copying. This allows transferring one or more documents or folders with tools for backup-taking and attributes protection.

The general syntax of using the cp command is:

cp SOURCE file DESTINATION file

For example:

cp firstname.txt destination

here, firstname.txt is source file name and destination is the destination file name.

Option A, option D doesn't follow the general syntax of cp command that's why these options are incorrect, therefore, option C is the right answer.

What happens when you position the mouse cursor over an edge or corner of a bounding box that has sizing handles?

Answers

Answer:

The cursor changes to a two edged arrow pointer and the bounding box is highlighted.

Explanation:

Bounding boxes in windows operating system is a boundary line of the windows box that run that runs applications and other utilities in the system. A sizing handle is a tool used in place of a the minimize and maximize button on top of the windows box. It is found on the bottom right edge of the windows box.

When a cursor points to the sizing handle, the cursor changes to a double edge arrow pointer and the bounding box is highlighted, and can be resized on the screen.

Answer:

The correct answer is: the cursor changes to a two edged arrow pointer.

Explanation:

Sizing handles allow users to resize objects -typically windows- at will by placing the cursor over one of the corners of the object. A double edge arrow will replace the cursor. The user will have to left-click the mouse and drag the sizing handle to modify the size of the object. After letting the left click go and moving the mouse around, the cursor appears again with its regular features.

A ____________object appears on a form as a button with a caption written across its face.

Answers

Answer:

Button is correct answer.

Explanation:

Button is the type of object that arrives on a form through the HTML Scripting Language. The programmer can use the button on the form for the submission of the page with the help of a button tag or input tag. They can also change the caption that is written on the button. So, that's why the following answer is correct.

Some wires, especially signal wires and communication wires, are shielded, which helps to prevent electromagnetic interference, also referred to as "____."

Answers

Answer:

Cable shielding is done on some wires like signal wires and communication wires to prevent electromagnetic interference (EMI), also known as noise.

Explanation:

In regions where strong electromagnetic interference is present, like inside some vehicles the wires are subjected to unwanted electromagnetic induction. This interference is known as Electrical noise or EMI noise. Shielding of wires is done to prevent this noise in some vehicles. The shielded wire then needs to be grounded properly.  Three types of shields are popular: Mylar tape, drain line and twisted pair.

In a CPMT, a(n)------leads the project to make sure a sound project planning process is used, a complete and useful project plan is developed and project resources are prudently managed.?

a) Project manager
b) Champion
c) Incident manager
d) Crisis manager

Answers

Answer:

a.  Project manager

Explanation:

Project manager -

A project manager refers to the person , who is incharge of a particular project , is referred to as a project manager.

The person is responsible to plan , allot the task to all the team members , start and finish the task on time , all the steps required for the project .

A project manager is the person who need to be informed about any task related to the project.

Hence, from the question,

The correct option is - a.  Project manager .

Password is an example of an authentication mechanisms that is based on " what an entity has".

True or false?

Answers

Answer:

False

Explanation:

A password in a one factor or multi-factor authentication is a mechanism not of what an entity has but what they know.

One factor authentication makes use of passwords only, to secure a user account. A multi-factor authentication uses two or more mechanisms for securing user accounts. It ask the question of what the users know (for password), what they have (security token, smart cards), and who they are(biometrics).

Answer:

False

Explanation:

The authentication mechanism especially the multi-factor authentication uses three types of authentication form factors.

i. What the entity knows: This includes what the entity knows and can always remember. Such as passwords and PINs

ii. What the entity has: This includes physical items that belong to the entity such as smart cards and token generators.

iii. What the entity really is: This includes natural or body features of the entity such as its thumbprint and its palm which can be used for verification.

According to these three factors, it is evident that password is based on "what an entity knows" and not "what an entity has".

Cisco has created a proprietary layer 2 protocol used to manage VLAN configuration between switches called:________a. VLAN Configuration Protocolb. VLAN Tracking Protocolc. VLAN Creation Protocold. Auto VLAN Configuration Protocole. None of the above

Answers

Answer:

The correct answer is letter "E": None of the above.

Explanation:

The VLAN Trunking Protocol (VTP) provides an easy way of keeping an accurate VLAN configuration through a commuted network. The VTP allows solutions of commuted network easily scalable to other dimensions, reducing the need of manually setting up the red. The VTP composed of a layer 2 protocol used to manage VLAN setups between switches.

For Subtotals to be useful and accurate, it is important that the data be ________ correctly.
Answer

-aligned

-formatted

-labeled

-sorted

Answers

Answer:

The correct answer is letter "D": sorted.

Explanation:

In Microsoft Office Excel, subtotals are used to add numerical values from a list of data. Before applying a subtotal, the information must be sorted according to what is intended to be entered. This is the first step and one of the most important so the outcome of the subtotal will reflect correct and accurate information.

Other Questions
Fill in the blanks.(1) ______________________ consists of electric and magnetic disturbances, or waves, that travel through space. Human eyes see one form of this energy, called (2) ______________________. All forms of electromagnetic radiation, including X-rays and radio waves, make up the (3) ______________________. Each type of radiation can be classified in two ways. (4) ______________________ measures the distance between the peaks on a wave and (5) ______________________ is the number of waves that occurs each second. Scientists study radiation with (6) ______________________ , which collect and focus light. The (7) ______________________ the opening that gathers light in a telescope, the more light that can be collected. A(n) (8) ______________________ uses lenses to bring light to a focus, and a(n) (9) ______________________ uses mirrors to do the same thing. The process of linking several telescopes together so that they can act as one is called (10) ______________________. Raindrops acquire an electric charge as they fall. Suppose a 2.4-mm-diameter drop has a charge of +18 pC, fairly typical values.What is the potential at the surface of the raindrop? What are all the coordinates that are solutions to the equation -2x + 4y = -10 A Sociology student investigated the association between a countrys Literacy Rate and Life Expec- tancy, and then drew the conclusions listed below. Explain why each statement is incorrect. (Assume that all the calculations were done properly.)a) The determines 64% of the Life Expectancy for a country.b) The slope of the line shows that an increase of 5% in will produce a 2-year improvement in Select below the Active Directory server role that provides the functions of Active Directory without the requirements of forests, domains, and domain controllers. Brooklyn has a combination of dimes and nickels in her wallet she has three times as many nickels as she does dimes and the total value of the coins is 4.00 how many does she have of each coin Which situation is most similar to the "positive feedback loop" (line 20)described in Passage 1?a. A professional tennis player wins a tournament,which then qualifies him for additional tournaments.b.An online advertising firm sends advertisements toan online customer, and the customer's choicesinform which advertisements are sent to her in thefuture.c. A thermostat turns on the heat when thetemperature drops to a certain temperature, andthen turns off the heat when the temperature risesto a certain temperature.d. A truck driver swerves to avoid a pothole. Seeingthis, the driver of the car behind the truck avoids thesame pothole. Misleading advertising messages regarding fast food are often given by __________. A. politicians B. doctors C. athletes D. dentists\ Why is it important to refute potential counterclaims when writing anargumentative essay?OA. To acknowledge and answer criticism of a thesisB. To effectively paraphrase other historians' workOC. To present a thesis as a different type of claimOD. To avoid plagiarizing the sources supporting a claim In what way are planned economies and command economies similar?OA. They both are characteristic of the United States.OB. They both rely on private ownership.C. They both involve strong governmental control.OD. They both require open exchange.SUBMIT What is the best way to track spending? Use in your own words. In the majority of Fortune 500 companies, the head of the human resource department, usually a vice president, answers to the chief executive officer (CEO) of the company. In many companies, the head of the human resource department sits on the board of directors, the planning committee, or both. These trends are indicative of how human resource managers are:_____________ Elements are arranged in groups by similar atomic structure on the periodic table. This allows for an element's properties to be predicted based on general periodic trends. One of these trends, atomic radius, increases down a group and to the left along a period and can be defined as __________. Sloane, Inc., issues 25,000 shares of its own common stock in exchange for all of the outstand- ing shares of Benjamin Company. Benjamin will remain a separately incorporated operation. How does Sloane record the issuance of these sha Susie is a junior at UNI and for 3 years the universtiy has used Blackboard as its learning management system. Now the university is considering changing to some other LMS and Susie is in a "tizzy". She feels that she has just mastered Bb and now she is going to have to learn something new. This is an example of:_________.a SIT (Stress induced by technology)b. innovation overloadc. acceleration effectd. TSS (Technology Stress Syndrome) O habites-tu au Canada en hiver? (2 points) O habitais-tu au Canada en hiver? O as-tu habit au Canada en hiver? O vas-tu habiter au Canada en hiver? O es-tu habit au Canada en hiver? The acquisition of which of the following territories during the mid-eighteenth century helped to establish Prussia as a great power? Which of the following is not a step in the strategic planning process? Group of answer choices Defining the company mission. Planning marketing and other functional strategies. Setting company objectives and goals. The process by which management evaluates the products and businesses making the company. Designing the business portfolio. ABC Hardware store is open for business 350 days a year. Annual demand for a power cutter at this store is 700 units. Replenishment cost is $15 per order, and annual inventory holding cost is 10% of the inventory value. ABC pays $20 for each power cutter. What is the economic order quantity for this cutter, and what is the reorder point if the lead time is 5 days and ABC policy is to keep a safety stock of 10 units? The framers of the Constitution began with the famous words, "We the People." Consider whether those words were Federalist or Anti-federalist and what was meant by "the people." Which can you infer about those opening words? Those words likely came from the Anti-federalists. The Anti-federalists wanted a strong federal government. The "people" in the quote were the delegates or those who had control over the federal government. Those words likely came from the Federalists. The Federalists wanted a weaker federal government and more power at the state level. The "people" in the quote are the delegates and leaders of the individual states. Both sides agreed on those words. The framers wrote the Constitution with both the present and future in mind. At the time, the "people" were the wealthy, white men but some knew the implications might be greater. Those words came from the Preamble to the Declaration of Independence. Both documents began with the same words. Federalists and Anti-federalists likely agreed on those words because they reminded them of their common bond to form an independent nation. Steam Workshop Downloader