Which of the following application delivery methods requires Internet access?

Answers

Answer 1

Answer:Cloud hosted

Explanation:


Related Questions

Plz hurry it’s timed

Answers

Micah and adayln hope this helps u

Write a program that reads in a text file, infile.txt, and prints out all the lines in the file to the screen until it encounters a line with fewer than 4 characters. Once it finds a short line (one with fewer than 4 characters), the program stops. Your program must use readline() to read one line at a time. For your testing you should create a file named infile.txt. Only upload your Python program, I will create my own infile.txt using break

Answers

Answer:

Explanation:

f=open("infile.txt","r")

flag=True

while(flag):

s=f.readline().strip()

if(len(s)>=4):

print(s)

else:

flag=False

Who first demonstrated the computer mouse?
O Microsoft
O Alan Turing
O Douglas Engelbart
O Apple, Inc.
FAST PLEASEEE THANK YOUUU

Answers

Answer:

C. Douglas Engelbart

Explanation:

Answer: C

Explanation:

write a object oriented c++ program

Answers

Answer:

I don't know how to code C++

Explanation:

How should work be allocated to the team in a Scrum project?

Answers

Answer:

In a Scrum project, the work or the tasks are not allotted specifically. The Scrum Master is not allowed to assign tasks to the team members under any circumstance. Once the client provides the details regarding their requirements in detail, the tasks are distributed based on the expertise and skills of the employee.

Explanation:

what is a web client​

Answers

Answer:

A Web client typically refers to the Web browser in the user's machine or mobile device. It may also refer to extensions and helper applications that enhance the browser to support special services from the site.

hope this helps

have a good day :)

Explanation:

A Web client typically refers to the Web browser in the user's machine or mobile device. It may also refer to extensions and helper applications that enhance the browser to support special services from the site.

Here's an example:

Your web browser is an example of a web client. The remote machine containing the document you requested is called a web server. The client and server communicate using a special language (a "protocol") called HTTP.

Good luck!

List to String (0.5 points) Since we are often dealing with a list of strings, it would be useful to have a function to tum a list of strings back into one single concatenated string, This function will return a string that is each element of input_list concatenated together with each separated by the string Separator For example, the following function call: list_to_string('This', 'is's 'fun' should return; "This is fun To do this, write a function called list_to_string This function should have the following inputs, outputs, and internal procedures: Input(s) input_list - list of strings . separator - string Output(s); . output - string Procedure(s): - assign a variable called output to be the first (index 0) element from input_list - loop through the rest of input_list, looping from the 2nd element index 1) through to the end of the list - Within the loop, use string concatenator to combine output with the current element, separated by separator • Assign the output of this to be the new value of output • return output, which should now be a list of the elements of input_list joined together into a single string

Answers

Answer:

The function is as follows:

def list_to_string(input_list,separator):

   output = ""

   for inp in input_list:

       output+=inp+separator

       

   output = output[:-1]

   return output

Explanation:

Given

See attachment for instruction

Required

A function to convert list to string

This defines the string

def list_to_string(input_list,separator):

This initializes the output to an empty string

   output = ""

This iterates through the input list

   for inp in input_list:

This concatenates every string in the list including the separator

       output+=inp+separator

This removes the last character of the string

   output = output[:-1]

This returns the output string

   return output

1.
A unique characteristic of the sports industry is that it seeks to attract markets that will
perform which action?
A. Demand mostly tangible products
B. Have consumers with artistic talent
c. include spectators and participants
D. Are concerned with environmental issues

Answers

Answer:

D. Are concerned with environmental issues is the answer

Write a program that lets the user enter the total rainfall for each of 12 months into a vector of doubles. The program will also have a vector of 12 strings to hold the names of the months. The program should calculate and display the total rainfall for the year, the average monthly rainfall, and the months with the highest and lowest amounts.

Answers

Answer:

Explanation:

#include<iostream>

#include<iomanip>

#include<vector>

using namespace std;

double getAverage(const vector<double> amounts)

{

   double sum = 0.0;

   for (int i = 0; i < amounts.size(); i++)

       sum += amounts[i];

   return(sum / (double)amounts.size());

}

int getMinimum(const vector<double> amounts)

{

   double min = amounts[0];

   int minIndex = 0;

   for (int i = 0; i < amounts.size(); i++)

   {

       if (amounts[i] < min)

       {

           min = amounts[i];

           minIndex = i;

       }

   }

   return minIndex;

}

int getMaximum(const vector<double> amounts)

{

   double max = amounts[0];

   int maxIndex = 0;

   for (int i = 0; i < amounts.size(); i++)

   {

       if (amounts[i] > max)

       {

           max = amounts[i];

           maxIndex = i;

       }

   }

   return maxIndex;

}

int main()

{

   vector<string> months;

   vector<double> rainfalls;

   months.push_back("January");

   months.push_back("February");

   months.push_back("March");

   months.push_back("April");

   months.push_back("May");

   months.push_back("June");

   months.push_back("July");

   months.push_back("August");

   months.push_back("September");

   months.push_back("October");

   months.push_back("November");

   months.push_back("December");

   cout << "Input 12 rainfall amounts for each month:\n";

   for (int i = 0; i < 12; i++)

   {

       double amt;

       cin >> amt;

       rainfalls.push_back(amt);

   }

   cout << "\nMONTHLY RAINFALL AMOUNTS\n";

   cout << setprecision(2) << fixed << showpoint;

   for (int i = 0; i < 12; i++)

       cout << left << setw(11) << months[i] << right << setw(5) << rainfalls[i] << endl;

   cout << "\nAVERAGE RAINFALL FOR THE YEAR\n" << "Average: " << getAverage(rainfalls) << endl;

   int minIndex = getMinimum(rainfalls);

   int maxIndex = getMaximum(rainfalls);

   cout << "\nMONTH AND AMOUNT FOR MINIMUM RAINFALL FOR THE YEAR\n";

   cout << months[minIndex] << " " << rainfalls[minIndex] << endl;

   cout << "\nMONTH AND AMOUNT FOR MAXIMUM RAINFALL FOR THE YEAR\n";

   cout << months[maxIndex] << " " << rainfalls[maxIndex] << endl;

   return 0;

}

Select the correct answer from each drop-down menu.

As a technical writer, you should state your purpose in the 1. ________ of your summary. In addition, you must _
2.______ the words used in the original document while writing a summary.

1. Last sentence
1. First sentence

2. Paraphrase
2. Copy
2. Quote

Answers

Answer:

1. First sentence

2. Paraphrase

Explanation:

Just took it

What are the difference between data and information?​

Answers

Answer

The terms data and information can mean different things in different contexts, but the main differences between them are: Data is a collection of facts. Information is how you understand those facts in context. Data is unorganized, while information is structured or organized.

What kinds of components are tangible assets?

Answers

Answer:

Tangible assets are physical like cash, inventory, vehicles, equipment, buildings and investments.

Explanation:

You have a larger file but do not need it right away. In this scenario, you have to change the way a file is used to make it what?
O open
o closed
compressed
O usable

Answers

Answer:

Compressed

Explanation:

I hope this helps!

Answer:

usable

Explanation:

open doesnt make any sense, neither does closed and compressed is wrong i chose it and got it wrong. Its usable

4. Ito ay ang lugar kung saan nagtatagpo ang bawat column at
row.
A. cell
B. data
C. file tab
D. sheet tab

PATULONG ​PO PLS

Answers

Answer: A. Cell

Explanation:

A cell is the point on the worksheet that results from the intersection of a column and a row.

This is why cells can be identified by the column and row that they are the result of. For instance, a cell can be called "A12" which is also known as its "address". This means that it is a result of the intersection of "Column A" and "Row 12".

n
What options are available in the Lookup Wizard? Check all that apply.
label the field
sort the records
filter the records
o adjust the column width
O adjust the header height
reduce the number of columns
Je
set where to get lookup field values

Answers

Answer:

Label the field

sort records

adjust the column width

set where to get lookup fields

Explanation:

How do u and justify a document

Answers

The answer is, firstly In the or a certain paragraph group, click the Dialog Box Launcher, and select the Alignment drop-down menu to set your justified text, and lastly you can just click on these certain keys on your keyboard, also known as shortcuts, and that shortcut is Ctrl + J to justify your great text. Hope this helps!

Write a new method in the Rectangle class to test if a Point falls within the rectangle. For this exercise, assume that a rectangle at (0,0) with width 10 and height 5 has open upper bounds on the width and height, i.e. it stretches in the x direction from [0 to 10), where 0 is included but 10 is excluded, and from [0 to 5) in the y direction. So it does not contain the point (10, 2). These tests should pass:

Answers

Answer:

Explanation:

The Rectangle and Point class is not provided in this question but was found online. Using that code as guidance I created the following method named contains. This method takes in a Point object and checks to see if the x-axis point is inside the parameters of the Rectangle class and then checks the same for the y-axis. If it is inside the Rectangle then the method returns true otherwise it returns false.

def contains(self, point):

       return self.width > point.x >= self.corner.x and self.height > point.y >= self.corner.y

PLEASE HELP ME ASAP ITS IMPORTANT

Answers

I’m 80% sure it’s the last one, I’ve studied this last year I cant quite grasp the memorie
The answer is E. Data encryption ensures the validity of the website and inserts blocks that prevent hackers and viruses from messing with the website.

Which security measure provides protection from IP spoofing?

A ______ provides protection from IP spoofing.

PLEASE HELP I need to finish 2 assignments to pass this school year pleasee im giving my only 30 points please

Answers

Answer:

An SSL also provides protection from IP spoofing.

Answer quick plzzz I only have 2 hours

Answers

Answer:

option 2

Explanation:

Answer:

B. Kathy performs tasks common to the Engineering and Technology pathway and Sean and Joan perform tasks common to the Science and Math pathway.

Describing the One-to-Many Relationship
What is another name for the one-to-many relationship?
child-to-parent
O parent-to-child
O student-to-teacher
O teacher-to-student
Ve

Answers

Answer: B) Parent-to-child

Answer:

What is another name for the one-to-many relationship?

child-to-parent

Correct Answer: parent-to-child( B)

student-to-teacher

teacher-to-student

Explanation:

why the internet is not considered a mass medium in Africa​

Answers

I think the term “media” as used and understood by most people has more to do with content than with the means of disseminating said content.

“Mass media,” therefore, would be that content created by a few and copied to the many — a large circulation newspaper, for example, or a network television or radio program.

The internet’s content is anything but “mass” in that regard — there is mass media content on it, to be sure, but there is also a panoply of content created by many for dissemination to many — or the few who are attracted by the content created by a certain few, or a certain individual. The reasons why there is not an internet infrastructure like in other regions is because in Africa people have low levels of computer literacy, there is poor infrastructures in power supply and urbanism in general, and Internet services are offered only at a high cost. Hope this helps!

Answer:

the reason why internet not considered as a mass medium is probably because most of the African are not educated and civilized, thereby making them not common to the usage of the internet.

You have configured a LAN with 25 workstations, three network printers, and two servers. The workstations and printers will have dynamically assigned IP addresses, and the printers always need to have the same IP address assigned. The servers will have static IP addresses. What should you install on one of the servers, and what are some of the configuration options

Answers

Answer:

install and configure on the server DHCP (Dynamic Host Configuration Protocol)

Explanation:

In this scenario, you should install and configure on the server DHCP (Dynamic Host Configuration Protocol), this protocol automatically assigns each individual PC a unique IP address and DNS server information. This protocol has various configuration options such as being able to set a range for the IP addresses so that they can be used by different devices in the system. It also allows you to directly set the subnet and passage gateway so that all of the workstations can quickly communicate with one another and quickly be targeted by the administration.


1. Tracy is studying to become an esthetician. Give three reasons why she needs to have a thorough
understanding of facial machines.

Answers

Estheticians should study and have a thorough understanding of facial machines so that they can operate the machines safely, provide the best results for their clients, and enhance their service menu.

A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web services for client workstations on the 10.10.10.0/24 network. The same client workstations are configured to contact a server at 192.168.1.15/24 for domain name resolution.

Required:
What rules should the technician add to the firewall to allow this connectivity for the client workstations

Answers

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

1) Create a class called Villain. Specifically, a Villain has the following fields: .name (String)
a number of evil plans (int) In addition, a Villain has the following methods: • a constructor that accepts an argument for each of the fields . a copy constructor
an equals method, which checks/returns whether all the fields are the same
a toString method
2) Create a class called Crazy Villain, which inherits from Villain. Specifically, a Crazy Villain has the following additional fields:
a crazy laughter (String)
a crazy idea (String In addition, write code for the following Crazy Villain methods:
a constructor that accepts an argument for each of the fields
a toString method that overrides the Villain toString method, in order to include the additional fields You do not need to instantiate/demo Villain or Crazy Villain objects.

Answers

Answer:

Explanation:

The following code is written in Java and creates both of the classes as requested with their variables and methods as needed. The crazyVillain class extends the Villain class and implements and overrides the needed variables and methods. Due to technical reasons, I have added the code as a txt file below.

The given SQL creates a Movie table and inserts some movies. The SELECT statement selects all movies released before January 1, 2000 Modify the SELECT statement to select the title and release date of PG-13 movies that are released after February 1, 2008. Run your solution and verify the result table shows just the titles and release dates for The Dark Knight and Crazy Rich Asians. 3 6 1 CREATE TABLE Movie ( 2 ID INT AUTO_INCREMENT, Title VARCHAR(100), 4 Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')), 5 ReleaseDate DATE, PRIMARY KEY (ID) 7); 8 9 INSERT INTO Movie (Title, Rating, ReleaseDate) VALUES 19 ('Casablanca', 'PG', '1943-01-23'), 11 ("Bridget Jones's Diary', 'PG-13', '2001-04-13'), 12 ('The Dark Knight', 'PG-13', '2008-07-18'), 13 ("Hidden Figures', 'PG', '2017-01-06'), 14 ('Toy Story', 'G', '1995-11-22'), 15 ("Rocky', 'PG', '1976-11-21'), 16 ('Crazy Rich Asians', 'PG-13', '2018-08-15'); 17 18 -- Modify the SELECT statement: 19 SELECT * 20 FROM Movie 21 WHERE ReleaseDate < '2000-01-01'; 22

Answers

Answer:

The modified SQL code is as follows:

SELECT Title, ReleaseDate FROM movie WHERE Rating = "PG-13" and ReleaseDate >  '2008-02-01'

Explanation:

The syntax of an SQL select statement is:

SELECT c1, c2, c...n FROM table WHERE condition-1, AND/OR condition-n

In this query, we are to select only the title and the release date.

So, we have:

SELECT Title, ReleaseDate

The table name is Movie.

So, we have:

SELECT Title, ReleaseDate FROM movie

And the condition for selection is that:

Ratings must be PG-13

And the date must be later than February 1, 2008

This implies that:

Rating = "PG-13"

ReleaseDate >  '2008-02-01'

So, the complete query is:

SELECT Title, ReleaseDate FROM movie WHERE Rating = "PG-13" and ReleaseDate >  '2008-02-01'

Write an algorithm and flowchart to display H.C.F and L.C.M of given to numbers.​

Answers

Answer:

Write an algorithm to input a natural number, n, and calculate the odd numbers equal or less than n. ... Design an algorithm and flowchart to input fifty numbers and calculate their sum. Algorithm: Step1: Start Step2: Initialize the count variable to zero Step3: Initialize the sum variable to zero Step4: Read a number say x Step 5: Add 1 to the number in the count variable Step6: Add the ..

Explanation:

Please help me ASAP!

Answers

Answer:

security hacker

Explanation:

security hackers are people who hack software to check for vulnerabilities. most of the time security hackers are white hat hackers who work to perform penetration tests to see if a software is secure.

tell me if this is wrong :)

The person previous to my response is correct. The answer is security hacker. In the description it specifically states that her job involves hacking into the companies system.

PLEASE HELP ME ASAP!!!!

Answers

The answer is A. Spyware describes software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user. For example by violating their privacy or endangering their device's security.
Other Questions
Please help! I will give brainliest! Reread paragraph 3 what purpose does this sentence serve in the paragraph you have it $15 for the movie the cost of a movie ticket is $3 write an inequality to show how much money you can spend on treats. The earliest atmospheric conditions on Earth wereinhospitablepredictableadvantageousmild Malaya is standing directly between a 90-foot tall courthouse and a 54-foot tall bank. If the angle of elevation from the point where Malaya is standing to the top of the courthouse is 72, while the angle of elevation to the top of the bank is 35. What is the distance between the courthouse and the bank? Select all that apply.In what four ways did the United States change after the end of the Spanish-American War?The added possessions meant new responsibilities for the United States.The United States navy increased in size.The United States involvement in international affairs decreased.The United States involvement in international affairs increased.Agriculture increased in the United States following the war.Naval resources were depleted after the war.Industry declined after the war.The United States became one of the least productive countries on earth. Andre received and spent money in the following ways last month. For each example, write a positive or negative number to represent the change in money from his perspective.His uncle gave him $25 as a present.He earned $18 dollars tutoring.He spent $10 on a book. Rosa es sustantivo masculino o femenino PLEASE HELP 50 POINTS BRAINLIST When Austen's parents are away celebrating their anniversary, he gets to sleepover for a week at hisgrandparents' house. Afterwards, Austen decides to make his grandparents a photo album of their timetogether. There are 7 pages in the album. Austen puts the same number of photos on each page, for atotal of 42 photos.Which equation can you use to find the number of photos p on each page?P = 427p = 42P + 7 = 42D-7=427Solve this equation for p to find the number of photos on each page.photosSubmit PLEASE HELP!! ASAP, SOS!'Civil Rights Webquest' Rosa Parks1. Besides being a seamstress, what other role did Rosa Parks have?2. How long did the Montgomery Bud Boycott last? .Seventy thousand people were killed instantly, and many more would die 60,000 by November and another 70,000 by 1950. Most of them would be victims of a new method of killing radiation... Adding adjectives to When I have enough money there are three things I like to my face I need to buy a car I want to buy a television if I have enough money left over I'm going to buy a lamp Suppose the working-age population of a fictional economy falls into the following categories: 75 have full-time employment; 25 have part-time employment; 20 do not have employment, but are actively looking for employment; and 10 people are stay at home parents.(1) What is the size of Labor force?(2) What is the Unemployment rate? The spinner has 8 congruent sections. What is the probability ofspinning a number divisible by 3 two times in a row? walking long distance improves blood circulation Im confused can somebody answer this? A natural experiment is a chance occurrence that mimics a randomized controlled trial. In order to analyze causal effects from natural experiments, economists make use of a statistical method known as instrumental variables, in which one variable from a natural experiment is used as an instrument for a particular independent variable of interest. Assume the independent variable of interest is x1 and the dependent variable in a regression is y. Which of the following represent necessary characteristics of a suitable instrument?a. The instrument has at least 200 observations b. The instrument is correlated with c. The instrument has a conditional mean of zero d. The instrument does not directly influence y, except through PLEASE HELP!!!!1!1!1! suppose one particular pyramid in egypt has a square base of side length 280 meters and a perpendicular height of 144 meters what is the surgace area of the pyramid? Imagine you own a child-care center, and a couple would like to enroll their 2-year-old child. They are very nervous, and want you to explain to them the many elements of your child-care facility that are safe, secure, and appropriate for their child. Write a letter outlining the safety and developmental appropriateness of your child-care center.