Windows workstations all have elements of server software built-in. What are these elements, and why is the Windows Professional OS not considered a server?

Answers

Answer 1

Answer:

The answer is below

Explanation:

Elements of Server software that is built-in, in Windows workstations are:

1. Hard drives,

2. RAM (Random Access Memory)

3. Processors

4. Network adapters.

Windows Professional OS is not considered a server due to the following:

1. Windows Professional OS has a limit on the number of client connections it allowed.

2. Unlike Server, Professional OS uses less memory

2. In comparison to Server, Professional OS uses the CPU less efficiently

4. Professional OS is not built to process background tasks, unlike Server that is configured to perform background tasks.


Related Questions

Programming challenge description: In this challenge, you're given a string containing jumbled letters from several concatenated words. Each word is a numeral from zero to nine. Each numeral may be used multiple times in the jumbled string. Write a program that returns integers corresponding to the numerals used to form the jumbled string. Integers must be sorted in ascending order. For example, reuonnoinfe are shuffled letters of the strings one four nine. Your program's output should be 149.

Answers

Following are the program to the given question:

import java.util.*;//import package

public class Main//defining main method

{

public static void main (String[] axv)//defining main method

{

String nums[] = {"zero", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine"};//defining an arrayof string

int i,j;

Scanner obxc = new Scanner(System.in);//creating Scanner class object to input value

System.out.print("Enter a string formed jumbled letters of numerals: ");//print message

String w = obxc.next();//defining a String variable that input String value

for(i=0; i<nums.length; i++)//defining a loop to count input String length

{

String sa = nums[i];//defining a string variable to hold array value

boolean f = true;//defining a boolean variable

for(j=0; j<sa.length(); j++)//defining a for loop that convets value into integer

{

char cx = sa.charAt(j);//defining char variable that hold value

if(w.indexOf(cx)==-1)//defining if block to check indexOf value

{

f = false;//use boolean variable that hold boolean value

break;//using break keyword

}

}

if(f) //use if to check boolean value

System.out.print (i);//use print method that print i value

}

System.out.println();//use print method for beak line

}

}

Output:

Enter a string formed jumbled letters of numerals: onefournine

149

Explanation of code:

Import package.Defining the main class and also define the main method in it.Inside the main method defining a string of array "nums" that holds sting value and two integer variables "i,j" is defined.In the next step, a scanner class object is declared that inputs the value.After input, a value a for loop is defined that uses a string variable that holds an array value and uses another loop that converts string value into a numeric value.

Learn more:

brainly.com/question/15126397

a computer works on input processing output device
true
false​

Answers

a computer works on input processing output device true

Answer:

a computer works on input processing output device. True

Explanation:

God bless you.

Explain what 10CLS program does and the write the output​

Answers

(CLS)


This text is being printed via the PRINT command."
On the next line, I'll use CLS, which will clear everything I just printed, so you won't even see the preceding text."
Also, you can't give CLS a line to PRINT; it won't actually do anything"
(CLS)
Finally, on line 80, I

what are the 21St century competencies or skills required in the information society?

Answers

Answer:

Communication

Collaboration

ICT literacy

Explanation:

These are some of the skills that are needed in the 21st century to compete and thrive in the information society.

To remain progressive, one needs to have good communication skills. These communication skills can include Active Listening and Passive Listening.

Collaboration is important because you'll have to work with other people as no man is an island, we need someone else so the skill of collaboration is necessary to compete and stay relevant in the information society in the 21st century.

IT literacy is also very important because one needs to have basic computer knowledge such as programming, computer essentials and applications, etc.

What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?

Answers

Answer:

Fiber Optic, it allows for speeds up to 1200 mbps

Explanation:

А.
is the highest education degree available at a community college.

Answers

Answer:

The answer is "associate".

Explanation:

The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.

They are correct? thank you!

Answers

Answer:

Yes they are correct. welcome....

what is the difference between packed and unpacked bcd numbers ​

Answers

Explanation:

Packed BCD ( Binary coded decimal) is type in which each decimal digit is represented by 4 bits ( 1 nibble) . For Example : 14 will be shown as 0001 0100 in packed BCD form. Unpacked BCD is type in which each decimal digit is represented by 8 bits ( 1 byte).

Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How many foreign keys are defined in the AP database?

Answers

Answer:

SELECT COUNT (DISTICT constraint_name)

FROM apd_schema.constraint_column_usage

RUN

Explanation:

General syntax to return a catalog view of information about foreign keys.

SELECT DISTINCT PARENT_TABLE =

           RIGHT(Replace(DC.constraint_name, 'fkeys_', ''),

           Len(Replace(DC.constraint_name, 'fkeys_', '')) - Charindex('_', Replace(DC.constraint_name, 'fkeys_', ''))),

           CHILD_TABLE = DC.table_name,

           CCU.column_name,

           DC.constraint_name,

           DC.constraint_type

FROM apd_schema.table_constraints DC

INNER JOIN apd_schema.constraint_column_usage CCU

           ON DC.constraint_name = CCU.constraint_name

WHERE  DC.constraint_type LIKE '%foreign'

           OR DC.constraint_type LIKE '%foreign%'

           OR DC.constraint_type LIKE 'foreign%'

RUN

To ensure AD RMS network transmission is protected from being read and interpreted by protocol analyzers, which of the following must be allowed to enroll for a computer certificate?
a) File Server
b) Domain Controller
c) SQL Server
d) Internet Information Services (IIS)

Answers

Answer:

b) Domain Controller

Explanation:

Active Directory Rights Management Services (AD RMS) is a server software that is developed by Microsoft to manage information rights on the Windows server.

The AD RMS servers produce a rights account certificate to link various users with particular PC systems. They also issue end-user licenses.

To ensure that AD RMS network transmission is protected, the domain controller needs to be allowed to enroll for a computer certificate.

A domain controller is a server that authenticates requests from users on a  particular computer network. It keeps user data organized and secure.

What triggers a LinkedIn account ban?

Answers

Answer:

Before we dig into using advanced LinkedIn automation tools, it’s important to understand what activities can trigger LinkedIn to ban your account?

Using multiple LinkedIn tools at the same timeUsing Low-quality LinkedIn ToolsSending Connect Requests BlindlySending Templates Messages

help me
Q3/ Put True or false in front of the following


statements:
1- You can use the Goal seek feature available by clicking on the data what-if analysis-> Goal Seek.
2- The equations in matrix form [X]-[A] [b]. 3- The A B matrix will be 2 3 ,where A is 2*3 and B is 3*3..
4- The command of inverse is +minverse(arry1...arry2).
5- The (By Changing Cells) box should contain the location of the decision variables for the problem.​

Answers

Answer:

TrueFalseFalseTrueFalse

Explanation:

mark me as brainlyest

Which of the following statements is true of an encrypted file? * The file can be read only by a user with the decryption key The file can be read by the creator and system administrator The file can not be opened again The file can be opened but not read again

Answers

Answer:

The file can be read only by a user with the decryption key

Explanation:

The way encryption works is it scrambles the data in a file following the rules of the encryption algorithm using a certain key to tell it how to scramble everything.

Without the key, the computer doesn't know how to decrypt it.

This is true no matter who has access to the file, be it a system administrator, a hacker, or even a legitimate user who has somehow lost access to the key

Strictly speaking, encryption can be broken, but, especially with modern encryption, that's a matter of centuries, and isn't really feasible

The statement that is true of an encrypted file is that The file can be read only by a user with the decryption key.

What is decryption key?

A decryption key is known to be a key that is given to Customers by a specific Distributor.

This key allows Customers to open and access the Software that they bought. The decryption key is a  mechanism that  permit  that a file can be read only by a user.

Learn more about decryption key from

https://brainly.com/question/9979590

2. A computer that is easy to operate is called
I
10 POINTSSSS PLEASEEE HELPPP

DIT QUESTION

Answers

Answer:

Explanation:

A computer that is easy to operate is called User Friendly

I really need To know how To get The special ending for final fight 2 for super nintendo it’s a video game

Answers

Answer:

Check Yt

Explanation:

More often than not there are many video tutorials about every game imaginable.

Operations that a given computing agent can perform are called

Answers

Answer:

Primitive operation

Explanation:

Operations that a given computing agent can perform are called primitive operations.

These operations are basic arithmetic work done by an algorithm such as assigning a variable, calling a method, returning an array, etc. They are sometimes written in pseudo-code.

For this lab, imagine you are an IT Specialist at a medium-sized company. The Human Resources Department at your company wants you to find out how many people are in each department. You need to write a Python script that reads a CSV file containing a list of the employees in the organization, counts how many people are in each department, and then generates a report using this information. The output of this script will be a plain text file.

Answers

Answer:

import csv

import sys

file_csv = argv

with open( "file_csv", "rb" ) as file:

      rowlist= csv.DictReader( file )

      dict_count={ }

      for row in rowlist:

           dict_count[ row[ 'department' ] ] = dict_count.get( row[ 'department' ], 0 ) + 1

      print( " The count of employees per department are", dict_count )

Explanation:

The python script in the solution above is able to accept user input csv files via command prompt and get an output of the number of employees for each department.

Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character – to change every third character in the array to its replacement character

(C++ coding)

Answers

Method explanation:

Defining a method "changeCharacter" that takes three parameters that are "character array", and two integer variable "s, k" in its parameters.Inside the method, a for loop is declared that takes array value and defines a conditional statement that checks the 3rd character value in the array, is used to the array that holds its key-value.Please find the full program in the attachment.

Method description:

void changeCharacter(char* ar, int s, int k)//defining a method changeCharacter that takes three parameters

{

  for(int j = 1; ar[j]!='\0'; j++)//defining a for loop for 3rd character value in array  

  {

      if(j%3== 0)//use if block that check 3rd character value in array  

      {

          ar[j-1] = k; //Changing the 3rd character in array

      }

  }

}

Learn more:

Program: brainly.com/question/12975989

#Write a function called population_density. The function #should take one parameter, which will be a list of #dictionaries. Each dictionary in the list will have three #key-value pairs: # # - name: the name of the country # - population: the population of that country # - area: the area of that country (in km^2) # #Your function should return the population density of all #the countries put together. You can calculate this by #summing all the populations, summing all the areas, and #dividing the total population by the total area. # #Note that the input to this function will look quite long; #don't let that scare you. That's just because dictionaries #take a lot of text to define. #Add your function here!

Answers

Answer:

def population_density(dictionary_list):

     """ this function calculates the population density of a list of countries"""

    total_population= 0

    total_area= 0

    for country in dictionary_list:

           total_population += country['population']

           total_area += country['area']

    population_density = total_population / total_area

    return population_density

Explanation:

In python, functions are defined by the "def" keyword and a dictionary is used to hold immutable data key and its value. The for loop is used to loop through the list of dictionaries and the values of the country data and extracted with bracket notation.

Write a method that accepts a String object as an argument and returns a copy of the string with the first character of each sentence capitalized. For instance, if the argument is "hello. my name is Joe. what is your name?" the method should return the string "Hello. My name is Joe. What is your name?" Demonstrate the method in a program that asks the user to input a string and then passes it to the method. The modified string should be displayed on the screen.

Answers

Answer:

The programming language is not stated; However, the program written in C++ is as follows: (See Attachment)

#include<iostream>

using namespace std;

string capt(string result)

{

result[0] = toupper(result[0]);

for(int i =0;i<result.length();i++){

 if(result[i]=='.' || result[i]=='?' ||result[i]=='!')  {

 if(result[i+1]==' ') {

  result[i+2] = toupper(result[i+2]);

 }

 if(result[i+2]==' ')  {

  result[i+3] = toupper(result[i+3]);

 }

 } }

return result;

}

int main(){

string sentence;

getline(cin,sentence);

cout<<capt(sentence);

return 0;

}

Explanation:

The method to capitalize first letters of string starts here

string capt(string result){

This line capitalizes the first letter of the sentence

result[0] = toupper(result[0]);

This iteration iterates through each letter of the input sentence

for(int i =0;i<result.length();i++){

This checks if the current character is a period (.), a question mark (?) or an exclamation mark (!)

if(result[i]=='.' || result[i]=='?' ||result[i]=='!')  {

 if(result[i+1]==' '){  ->This condition checks if the sentence is single spaced

  result[i+2] = toupper(result[i+2]);

-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized

 }

 if(result[i+2]==' '){ ->This condition checks if the sentence is double spaced

  result[i+3] = toupper(result[i+3]);

-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized

 }

}

}  The iteration ends here

return result;  ->The new string is returned here.

}

The main method starts here

int main(){

This declares a string variable named sentence

string sentence;

This gets the user input

getline(cin,sentence);

This passes the input string to the method defined above

cout<<capt(sentence);

return 0;

}

Ann, a user, reports that she is no longer able to access any network resources. Upon further investigation, a technician notices that her PC is receiving an IP address that is not part of the DHCP scope. Which of the following explains the type of address being assigned?

A. Unicast address
​B. IPV6
​C. DHCP6
D. APIPA

Answers

Answer: APIPA

Explanation:

Automatic Private IP Addressing (APIPA) is a Windows based operating systems feature that allows a computer to assign itself automatically to an IP address even though there is DHCP server to perform the function.

From the information that has been provided in the question, we can see that the type of address that is used is APIPA.

The breastbone or ________________ extends down the chest.

Answers

Answer:

The sternum or breastbone is a long flat bone located in the central part of the chest.

The sternum or breastbone is a long flat bone located in the central part of the chest.

In the middle of the chest, there is a long, flat bone known as the sternum or breastbone. It forms the front of the rib cage and is joined to the ribs by cartilage, assisting in the protection of the heart, lungs, and major blood arteries from harm. It is one of the longest and largest flat bones in the body, somewhat resembling a necktie. The manubrium, body, and xiphoid process are its three regions.

Therefore, the sternum or breastbone is a long flat bone located in the central part of the chest.

Learn more about the breastbone here:

https://brainly.com/question/32917871.

#SPJ2

Karl from Accounting is in a panic. He is convinced that he has identified malware on the servers—a type of man-in-the-middle attack in which a Trojan horse manipulates calls between the browser and yet still displays back the user's intended transaction. What type of attack could he have stumbled on?

Answers

Answer:

The correct answer will be "Man-in-the-browser".

Explanation:

Man-in-the-browser seems to be a category of person-in-the-middle attack where a certain Trojan horse tries to misrepresent calls between some of the web pages and therefore it is prevention systems while still demonstrating the intentional transfer of funds back to the customer.High-tech as well as high-amount technology for starting a man throughout the internet explorer assaults.

g Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argument is "gravity" the method should display -"ytivarg". Demonstrate the method in a program that asks the user to input a string and then passes it to the method.

Answers

Answer:

The program written in C++ is as follows; (See Explanation Section for explanation)

#include <iostream>

using namespace std;

void revstring(string word)

{

   string  stringreverse = "";

   for(int i = word.length() - 1; i>=0; i--)

 {

     stringreverse+=word[i];

 }

 cout<<stringreverse;

}

int main()

{

 string user_input;

 cout << "Enter a string:  ";

 getline (std::cin, user_input);

 getstring(user_input);

 return 0;

}

Explanation:

The method starts here

void getstring(string word)

{

This line initializes a string variable to an empty string

   string  stringreverse = "";

This iteration iterates through the character of the user input from the last to the first

   for(int i = word.length() - 1; i>=0; i--)   {

     stringreverse+=word[i];

 }

This line prints the reversed string

 cout<<stringreverse;

}

The main method starts here

int main()

{

This line declares a string variable for user input

 string user_input;

This line prompts the user for input

 cout << "Enter a string:  ";

This line gets user input

 getline (std::cin, user_input);

This line passes the input string to the method

 revstring(user_input);

 return 0;

}

Discuss the scaled index addressing mode and comments on the following instructions?

a) MOV BX, [CX+5*AX]
b) MOV [DX5*DI+30H], CX

Answers

Memory will also be accessible in Scaled index addressing mode using a 32-bit base & indexing register.The instruction's first parameter will be the base register, and the instruction's second parameter will be the index register. The index register is multiplied by a scaling factor before the program is fetched.

For option a:

The baseline register is [tex]\bold{BX}[/tex], while the index register is [tex]\bold{CX+5*AX}[/tex].

The multiplier for Accumulator [tex]\bold{AX }[/tex] will be 5.[tex]\bold{CX }[/tex] will be multiplied with this value.[tex]\bold{CX+5*AX}[/tex] will contain a memory address.The value at position [tex]\bold{CX+5*AX}[/tex] is accessed by [tex]\bold{[{CX+5*AX} ]}[/tex].The value retrieved from the address [tex][\bold{CX+5*AX}][/tex] is moved into Base register BX by the MOV instruction.

For option b:

Its index register is [tex]\bold{CX }[/tex], whereas the base register is [tex]\bold{DX5*DI+30H}[/tex].

[tex]\bold{CX}[/tex] has a number, that is copied to a computed place below.After multiplying [tex]\bold{DI}[/tex] by [tex]\bold{5, DX}[/tex] will be multiplied by this [tex]\bold{5*DI}[/tex].To the aforementioned multiplied value,[tex]\bold{ 30H}[/tex] will be added.[tex]\bold{[DX5*DI+30H]}[/tex] is a value located at location [tex]\bold{DX5*DI+30H}[/tex]. [tex]\bold{DX5*DI+30H }[/tex] is a memory address number.As a result, the value of [tex]\bold{CX}[/tex] will be copied to the [tex]\bold{ [DX5*DI+30H] }[/tex]location.

Learn more:

brainly.com/question/14319860

System stored procedures a. perform standard tasks on the current database b. are stored in the Master database c. can change with each version of SQL Server d. all of the above

Answers

Answer:

D. all of the above

Explanation:

A Stored Procedure (sp) is an already compiled group of SQL requests that contains either one or more statements which are stored in the master database.

A Stored Procedure can be created by using the CREATE PROC statement.

They perform standard tasks, stored in the master database and can change with each new version of SQL, so option D is correct.

By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.

Answers

Answer:

Polymorphism

Explanation:

If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

The information regarding the polymorphism is as follows:

The person has various attributes at the same timeFor example,  a man could be a father, a husband, an entrepreneur at the same time.In this, the similar person has different types of behavior in different situations.

Therefore we can conclude that If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

Learn more about the behavior here: brainly.com/question/9152289

You want to remind users of the acceptable usage policy that applies to all computer systems in your organization, so you decide to display a message after the user logs in. The full path and filename to the file you would edit is

Answers

It should always be changed to show one message informing customers of the approved user policy which applies to every one computer network within our organization.The "motd" was its filename of a modified version of such a file that displays any messages after logging in.The document should be modified when the message is to be displayed before a user logs in.Please find the attached file for the complete solution.

Learn more:

user logs: brainly.com/question/7580165

how do you copy a file​

Answers

Answer:

right click and press control c

In what way does a hash provide a better message integrity check than a checksum (such as the Internet checksum)?

Answers

Answer:

Hash function have less collision than a internet checksum because of computational infeasibility.

Explanation:

A collision means there is more then one way to produce the same sum. It is nearly difficult to developed two messages with same hash however, in checksum, it is more easier to develop or modify two messages to have same sum, thereby enabling attackers to have access to the message or the information arising to less message integrity.

Other Questions
Compute the current ratio, acid-test ratio, and gross margin ratio as of January 31, 2013. (Round your answers to 2 decimal places.)?Current ratioAcid-test ratioGross margin ratioNELSON COMPANYUnadjusted Trial BalanceJanuary 31, 2013Debit CreditCash $ 24,600 Merchandise inventory 12,500 Store supplies 5,900 Prepaid insurance 2,300 Store equipment 42,900 Accumulated depreciationStore equipment $ 19,950Accounts payable 13,000J. Nelson, Capital 39,000J. Nelson, Withdrawals 2,100 Sales 115,200Sales discounts 2,000 Sales returns and allowances 2,250 Cost of goods sold 38,000 Depreciation expenseStore equipment 0 Salaries expense 31,300 Insurance expense 0 Rent expense 14,000 Store supplies expense 0 Advertising expense 9,300 Totals $ 187,150 $ 187,150Rent expense and salaries expense are equally divided between selling activities and the general and administrative activities. Nelson Company uses a perpetual inventory system.a. Store supplies still available at fiscal year-end amount to $2,800.b. Expired insurance, an administrative expense, for the fiscal year is $1,500.c. Depreciation expense on store equipment, a selling expense, is $1,675 for the fiscal year.d. To estimate shrinkage, a physical count of ending merchandise inventory is taken. It shows $10,300 of inventory is still available at fiscal year-end. Which expression is equivalent to 2(5)^4 Andrew Jackson believed that removing American Indians from their homes would A. help white settlers only. B.benefit both white settlers and the tribes. C.create problems for white settlers. D.harm both white settlers and the tribes. IV Complete the sentences using Will or Going to.1. Look at those black clouds. It (rain).2. I felt terrible. I think I sick. (be)3. Tom here at about 8 oclock. (probably/ get)4. I think Sarah the present we bought for her. (like)5. We my grandparents this evening. (visit)6. Gary phoned you while you were out. OK , I . him back. (call)7. This cheese looks horrible. I it. ( not eat)8. Tom the exam. He hasnt studied hard enough. (not/pass)9. Are you going out this morning? No, I my room. (tidy)10. television this evening? (you/watch) 2. What do you mean by legal but Unethical and Illegal but Ethical? (Give some examples) HELP ME!A standard I.Q. test produces normally distributed results with a mean of 104 and a standard deviation of 16 for 52,000 students in grade 12 in the state. Approximately how many of these students would have I.Q.s above 140? The dark bands seen under the microscope in a skeletal muscle fiber are concentrations of actin protein called l-bands . It is true or false. Give 2-3 reasons why the NAACP challenged Plessy v. Fergusson. Assuming a bottom-up process of budget development, which of the following should be initially responsible for developing sales estimates?a. The budget committee.b. The accounting department.c. The sales department.d. Top management.e. The marketing department. 2. A cylinder has a height of 4.5 cm and a diameter of 1.5 cm. What is the surface area of the cylinder in square centimeters? Use 3.14 for pi.21.231.87.924.7 In empty set, n (A) = what is y when X is 5? The Graph below shows the answer. Y=2 when X=10 Cul es la funcin y la importancia en los amigos en la vida Using Article 26 from the Universal Declaration of Human Rights, summarize then analyze the article in light of what youknow of the education in other countries that do not uphold this right. Include the different sections and discuss theeffects on a country if every country involved implemented this right. What is the value of $a$ if the lines $2y - 2a = 6x$ and $y + 1 = (a + 6)x$ are parallel? how to write an essay Sandy had test scores of 20, 25, 17, 22, and 21. What is the average (mean) score. On the next 3 test Sandy's score were 24, 24, and 23. What is her mean now? Assume that you have recently purchased 250 shares in an investment company. Upon examining the balance sheet, you note that the firm is reporting $320 million in assets, $60 million in liabilities, and 25 million shares outstanding. What is the net asset value (NAV) of these shares The vector allows for protein expression in E. coli. Briefly explain the role of the following elements in the context of gene expression and protein production: 1- LacP: 2- LacO: 3- LacZa: 4-Briefly explain and indicate what is required for high expression in E. coli in this context.. The vector also contains other important elements. Explain their role: 5- AmpR: 6- ori: Find the area of the figure at the right in square feet. (image attached)