Answer: Connect one server through a different ISP to the Internet
Explanation:
With RAID 1 configuration, data can be simultaneously copied from one particular disk to another, thereby creating a replica.
Since the person wants to provide redundancy so that a failure in a single component does not cause the website to become unavailable, one server should be connected through a different ISP to the Internet.
Need the answer ASAP!! No links I’ll report
Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?
A.software engineering process
B.software quality metrics
C.SQA audits
D.reviews
Answer:
C
Explanation:
If you ship bakudeku. I swear.
*RANTS*
cries in bakudeku shipper
When creating a storyboard, in which section do you mention how you move from one shot to the next?
A.
synopsis
B.
sketch
C.
transitions
D.
shot description
E.
shot sequence number
Answer: C
Explanation:
Answer:
E. shot sequence number
Explanation:
…..is the smallest size in audio files
Answer:
Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.
Explanation:
Answer:
Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.
Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.
Release
Planning
Design
Coding
You might create algorithms and flowcharts during the Design phase of software development.
What is the algorithms about?In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.
Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.
Learn more about algorithms from
https://brainly.com/question/20543449
#SPJ1
What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0]; for (int i = 1; i < numbers.length; i++) { if (numbers[i] < value) value = numbers[i]; } The value variable will contain the highest value in the numbers array. The value variable will contain the sum of all the values in the numbers array. The value variable will contain the average of all the values in the numbers array. The value variable will contain the lowest value in the numbers array.
Answer:
The value variable will contain the lowest value in the numbers array.
Explanation:
Given
The given code segment
Required
The result of the code when executed
The illustration of the code is to determine the smallest of the array.
This is shown below
First, the value variable is initialized to the first index element
int value = numbers[0];
This iterates through the elements of the array starting from the second
for (int i = 1; i < numbers.length; i++) {
This checks if current element is less than value.
if (numbers[i] < value)
If yes, value is set to numbers[i]; which is smaller than value
value = numbers[i];
Hence, the end result will save the smallest in value
Define the term, external hard drive. Explain why you would use an external hard drive instead of a second internal hard drive.
Answer:
An external hard drive is a storage device located outside of a computer that is connected through a USB cable or wireless connection. An external hard drive is usually used to store media that a user needs to be portable, for backups, and when the internal drive of the computer is already at its full memory capacity.
Explanation:
External hard drives are usually portable thats why it is commonly used!
This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info
Answer:
contact their support
Explanation:
Which audio media can be directly sent to the subscribers through an RSS feed?
A.
online streaming
B.
podcast
C.
cloud file
D.
live playback
E.
broadcast
Answer:
The correct answer should be B. podcast
Explanation:
there is a website called RSS feed that is podcasts
Which of the following statements is true regarding the technical issues for developing applications for global audiences? Select 3 options.
Content delivery networks prevent traffic surges and can offset slow local internet service.
You should base your choice of which operating system to develop on usage rates in that specific market
Most users now have stable, fast connections worldwide.
A content delivery network can provide quick access to your content, no matter where your users live.
You should consider limiting the number of large images or audio files that you include, depending on the target market.
Answer:
Explanation:
From the available options presented, when developing for a global audience the following are true...
Content delivery networks prevent traffic surges and can offset slow local internet service.
A content delivery network can provide quick access to your content, no matter where your users live.
You should consider limiting the number of large images or audio files that you include, depending on the target market.
For global applications content delivery networks are a must since they allow the end-user to access the web page and its high quality content as if the web server were close by. By reducing the distance between the server and the end-user through these networks, you are effectively reducing latency, load times, performance, traffic surge effects, etc. Also when developing for a worldwide audience you should limit the number of larger images and audio files to only show the necessary ones for each target region, in order to make performance much more stable.
An array is mirrored if one half of the array is a reflection of the other. For example, these are mirrored arrays:
int[] a = {5, 4, 3, 4, 5};
int[] b = {9, 2, 2, 9};
The intent of the following methods is to determine whether an array is mirrored or not.
public boolean isMirrored(int[] array) {
// Add code here
}
private boolean isMirrored(int[] array, int leftIndex, int rightIndex) {
if (leftIndex > rightIndex) return true;
if (array[leftIndex] != array[rightIndex]) return false;
return isMirrored(array, leftIndex + 1, rightIndex - 1);
}
Which of the following statements, when inserted at the comment, “Add code here”, would complete the first isMirrored() method, call the second isMirrored() method, and produce the correct results?
A. return isMirrored(array)
B. return isMirrored(array, 0, 0)
C. return isMirrored(array, 0, array.length - 1);
D. return isMirrored(array, array[leftIndex], array[rightIndex]);
Which of the following is a method of the File class that can return an array of Files in a directory?
A. listFiles()
B. files()
C. getFiles()
D. directory()
Consider the following code.
public static int fileMethod(File dir) {
File[] files = dir.listFiles();
if (files == null) return 0;
int count = 0;
for (File f : files) {
if (f.isFile()) count++;
else count += fileMethod(f);
}
return count;
}
If dir represents a starting directory, which of the following statements best describes the operation of fileMethod()?
A. It counts and returns the number of files and directories inside dir and all subdirectories of dir.
B. It counts and returns the number of files, not counting directories, inside dir and all subdirectories of dir.
C. It counts and returns the number of files and directories only inside dir and inside only the first subdirectory found inside dir.
D. It counts and returns the number of files, not counting directories, but only those found inside dir and not its subdirectories.
Which of the following methods will correctly calculate the factorial of a positive number using iteration?
A.
public static long factorial(int n) {
if (n == 0) return 1;
else return n * factorial(n);
}
B.
public static long factorial(int n) {
if (n == 0) return 1;
else return n * factorial(n - 1);
}
C.
public static long factorial(int n) {
int product = n;
while (n > 0) {
n--;
product *= n;
}
return product;
}
D.
public static long factorial(int n) {
int product = n;
while (n > 1) {
n--;
product *= n;
}
return product;
}
Consider the following code.
public static String display(String s, int c) {
if (c == 0) return s;
else {
if (c > 3) return "-" + display(s, c - 1) + "-";
else return "=" + display(s, c - 1) + "=";
}
}
Which of the following methods most accurately reproduces the behavior of the display() method without using recursion?
A.
public static String d1(String s, int c) {
String retVal = "";
for (int i = 0; i < c; i++) {
if (i > 3) retVal += "-" + s + "-";
else retVal += "=" + s + "=";
}
return retVal;
}
B.
public static String d2(String s, int c) {
String retVal = "";
for (int i = 0; i < c - 3; i++) {
retVal += "-";
}
for (int i = 0; i < Math.min(3,c); i++) {
retVal += "=";
}
retVal += s;
for (int i = 0; i < Math.min(3,c); i++) {
retVal += "=";
}
for (int i = 0; i < c - 3; i++) {
retVal += "-";
}
return retVal;
}
C.
public static String d3(String s, int c) {
String retVal = "";
for (int j = 0; j < c - 3; j++) {
retVal += "-";
}
for (int j = 0; j < 3; j++) {
retVal += "=" + s + "=";
}
for (int j = 0; j < c - 3; j++) {
retVal += "-";
}
return retVal;
}
D.
public static String d4(String s, int c) {
String retVal = "";
for (int i = 0; i < c; i++) {
for (int j = 0; j < c - 3; j++) {
retVal += "-";
}
retVal += "===" + s + "===";
for (int j = 0; j < c - 3; j++) {
retVal += "-";
}
}
return retVal;
}
Answer:
Sierra Madre Oceandental rangeHURRY
Dr. Khan works for the marketing department of a company that manufactures mechanical toy dogs. Dr. Khan has been asked to assess the effectiveness of a new advertising campaign that is designed to be most persuasive to people with a certain personality profile. She brought four groups of participants to the lab to watch the video advertisements and to measure the likelihood that they would purchase the toy, both before and after watching the ad. The results of Dr. Khan’s study are presented below.
Part A
Explain how each of the following concepts applies to Dr. Khan’s research.
Survey
Dependent variable
Big Five theory of personality
Part B
Explain the limitations of Dr. Khan’s study based on the research method used.
Explain what Dr. Khan’s research hypothesis most likely was.
Part C
Use the graph to answer the following questions.
How did the trait of agreeableness affect how people responded to the new ad campaign?
How did the trait of conscientiousness affect how people responded to the new ad campaign?What's the output of a system modeled by the function ƒ(x) = x5 – x4 + 9 at x = 2?
Please Help
A)
24
A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the administrator making the spreadsheet, adds an image of his company’s logo, he realizes it would fit and look best if turned to read sideways.
How can Kyle change the image to make it fit in such a way?
He can select the image and hold down on the green handle above it while sliding the mouse.
He can select the image and hold down Control while sliding the scroll bar to the right.
He can press the PivotTable button and select “Rotate 90 degrees” and then click OK.
He can click on the Pictures Tool tab and select press Artistic Effects to access the rotate option
Answer:
On a spreadsheet application including MS Excel;
He can select the image and hold down the rotation handle above it while sliding the mouse
Explanation:
Manual rotation of a picture or a text box can be performed by selecting the image or text box in MS Word or a spreadsheet application such as MS Excel. With the mouse select the rotation handle of the picture and drag in the direction desired, left or right.
So as to limit the rotation to 15 degrees hold down the shift button while dragging the rotation handle by clicking on it with a mouse and dragging in the desired direction
Many applications ask, "Why did you leave your previous position?" Choose the best answer out of the examples below.
We can't see the examples therefore we can't help you try asking the question again with a picture of the examples
Create a mobile app plan using PowerPoint slides to show mock-ups of screens, identifying input, process, and output for each
screen,
Answer:
PowerPoint slides to show mock ups
10 points each!!!
Which option can be inferred from the following scenario?
You come home from work on a summer afternoon and notice your home is warmer than usual. You check the thermostat. The room temperature is set at 78°F, so the house should seem cooler. You lower the temperature on the thermostat several degrees in order for the air conditioner to work.
The temperature on the thermostat should be set lower than 78°F.
The air conditioner is not functioning properly.
The air conditioner was turned off.
The thermostat is faulty and may need calibration.
Answer:
Option D
Explanation:
78 degree Fahrenheit is a below normal temperature during summer. Now if the room temperature is set a 78 degree Fahrenheit, then one must not feel that the room is warmer than usual.
Hence, there can be some issue with the thermostat. Hence, thermostat needs calibration as it is not working properly.
Option D.
Answer:
d
Explanation:
You come home from work on a summer afternoon and notice your home is warmer than usual. You check the thermostat. The room temperature is set at 78°F, so the house should seem cooler. You lower the temperature on the thermostat several degrees in order for the air conditioner to work so you should calibrate it
Which file organisation has the quickest access to data files? *
1 point
a)Direct
b)Serial
c)Sequential
d)Transaction
Janet is working on a highly confidential company budget spreadsheet, and she needs to prevent anyone, including administrators in the IT department, from being able to open the file and view its contents.
What should she do?
A) Use the Home tab, select Protect Sheet, and enter a password to prevent access to the sheet.
B) Click the Info tab in the Backstage view, select Protect Workbook, select Encrypt with Password, and enter a password.
C) Click the Review tab, select Protect Workbook, and enter a password for protecting the sheet.
D) Click the View tab and customize the view to protect the sheet from unauthorized users.
I’ll mark brainliest if correct
Select the correct answer.
Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?
A. SQL-Integrity Check
B.Unified Modeling Language
C.Selenium
D.Perforce
Answer:
I believe the answer is B
Explanation:
I NEED THIS NOW!! :((
Which feature of a database allows a user to locate a specific record using keywords?
Chart
Filter
Search
Sort
which feature of a database allows a user to locate a specific record using keywords?
search
what are the outputs of these please help
Answer:
monkey know monkey not tell
Explanation:
Answer:
it will ask for a number.
if that number < or = to 0
then
it will add three to that number.
if that is not true
and that number > 0 and that number < 5
than
it will add one to that number.
if none of those are true
than
it will subtract 5 to that number.
Explanation:
Which of the following is something that would NOT appear in the Reviewing pane?
a. The date on which a specific insertion was made.
b. The length of the document being reviewed.
c. The name of the person making an insertion.
d. The total number of revisions made to the document.
Answer:
A
Explanation:
the advantages and disadvantages of internet
Ryan is applying a sort to the data in a table that you have inserted in Word. Which option is important for most tables that have column headings?
• Sort in descending order.
• Sort in ascending order.
• Select the option "My List has Header Row."
• Choose the correct sort field.
Ryan is applying a sort to the data in a table that you have inserted in Word.By Choose the correct sort field option is important for most tables that have column headings.
What is statistics?A statistics desk is a number cell wherein you may alternate values in a number of the cells and give you one-of-a-kind solutions to a problem. An appropriate instance of a statistics desk employs the PMT feature with one-of-a-kind mortgage quantities and hobby fees to calculate the low-priced quantity on a domestic loan you can set up in descending, or you may set up in ascending.
And D, has not have anything to do with this requirement. You do not have this feature to be had with you. Select the option, "My listing has header row" isn't always to be had to us. And clearly, you want to pick out the excellent type of discipline first. And then you may set up or type accordingly.
Read more about the column headings:
https://brainly.com/question/1788884
#SPJ2
(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?
Answer:
a trade mark is something where someone owns the rights to something in a specific country
What type of address uses a number that uniquely identifies each computer?
O Computer address
O Home address
O E-mail address
O IP address
Answer:
The awnser is D or IP Address
Explanation:
BRAINLIEST PLEASEAnswer:
IP Address. This is the most unique as you can track computers down with this code too. I hope you found this helpful, you are very welcome!
Complete the sentence.
A beta version of software is released during the _______ phase of software development.
Teseting
Release
Coding
Design
Hi Bro... , You Have A Wonderful Questions.
IF WE DIRECTLY JUMP RIGHT ON THE ANSWER , THEN THE SENTENCE WILL BE :A Beta Version Of Software Is Released During The "Testing" Phase Of Software Development.Explaination :A Version Of A Piece Of Software That Is Made Available For Testing, Typically By A Limited Number Of Users Outside The Company That Is Developing It, Before Its General Release Is Called Beta Version.
As Mentioned Here , We Can See That Beta Version Is Made For Testing Purpose, To Test Whether It Working Properly Or Not.Hope This Answer Satisfied You ^_^And Thanks For The Points ;-)A beta version of software is released during the Testing phase of software development.
What does having a beta version mean?A pre-release of software that is given out to a large group of users to try under real conditions. Beta versions have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product; however, design changes often occur as a result.
What is alpha and beta version?A beta test is carried out following acceptance testing at the supplier's site (alpha test) and immediately before the general release of the software as a product. In general an alpha version or release of a software package intends to do something particular, mostly does so, yet isn't guaranteed to do so fully.
To learn more about A beta version, refer
https://brainly.com/question/23441836
#SPJ2
What is a bounding box
Answer:
bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.
.....is used to save project in Visual basic .net from file menu
Explanation:
I don't really understand what you're trying to get at, maybe try to abbreviate a little more?
Opportunity and Spirit, NASA's Mars Exploration Rovers, were the first scientific instruments able to collect samples directly from the surface of Mars. One of the mission's goals was to determine the likelihood that life ever existed on Mars. How were Spirit and Opportunity best able to supply evidence that in the distant past Mars may have had an environment favorable to life?
Answer:
The rovers sent images of cross beds, centimeter-scale areas in rock layers, that could indicate whether water once flowed on Mars.
Explanation:
Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux - Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets - The original utility from which OpenVas was developed - A port state which does not allow entry or access to a service - An open-source fork of Nessus - A port state that may indicate a firewall is being used to allow specified traffic into or out of the network - A port state that allows access to applications and can be vulnerable - Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly - Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Answer:
1. Nmap.
2. Fping.
3. Hping.
4. Nessus.
5. Closed port.
6. OpenVAS.
7. Filtered port.
8. Open port.
9. Port scanning.
10. Ping sweep.
Explanation:
An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
In Computer networking, IP address are classified into two (2) main categories and these are;
1. Local (internal) IP address.
2. Global (external) IP address.
Also, the internet protocol (IP) address comprises of two (2) versions and these are;
I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.
II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.
ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.
In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.
1. Nmap: a popular port scanners that has the ability to use a graphical user interface (GUI) front end.
2. Fping: allows you to ping multiple internet protocol (IP) addresses simultaneously and is usually included in Kali Linux.
3. Hping: tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets.
4. Nessus: the original utility from which OpenVas was developed.
5. Closed port: a port state which does not allow entry or access to a service.
6. OpenVAS: an open-source fork of Nessus.
7. Filtered port: a port state that may indicate a firewall is being used to allow specified traffic into or out of the network.
8. Open port: a port state that allows access to applications and can be vulnerable.
9. Port scanning: allows you the ability to scan thousands or even tens of thousands of internet protocol (IP) addresses quickly.
10. Ping sweep: performed by port scanners to scan large networks to identify which internet protocol (IP) addresses belong to active hosts.