You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on hand. Another file, called music, lists the music books and scores you own. When you enter the command paste strings music, what happens

Answers

Answer 1

Answer is given below

Explanation:

when performing in computer and we have two files on the computer first one is string and another one is the music list                 so when we enter the command paste strings music than there will they display side by side on the screen.and on the left side of lists the string in screen and the right side is columns list the music book              

Related Questions

What combination of keys will autofill highlighted cells to the right?

Answers

Answer:

it is Ctrl+R            

What can you use on the Internet to look for information?

Answers

Answer:

I use Wikipedia to know anything

________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes

Answers

Answer:

Web 2.0

Explanation:

The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?

Options are :
A. Enable the host-based firewall on the Internet server
B. Enable HIPS to protect the server until the patch is released
C. Utilize WAF to restrict malicious activity to the Internet server
D. Downgrade the server and defer the new feature testing

Answers

Answer:

i think its C. Utilize WAF to restrict malicious activity to the Internet server

Which is an example of machine-to-machine communication?
(Correct answer only)

A. talking to a friend
B. a computer connecting to a server
C. a computer doing statistical analysis
D. playing a video game
E. talking on the phone to a family member

Answers

Answer:

B Or C sorry Im not Sure

Explanation:

Machine-to-machine communication, or M2M, is exactly as it sounds: two machines “communicating,” or exchanging data, without human interfacing or interaction.

Answer:

B. a computer connecting to a server

Explanation:

explain the types of computer on the basis of model

Answers

XT(extra technology) computer: it cannot support GUI Based operating system. its processing speed is 477MHz

AT(advanced technology):it supports GUI Operating system. Its processing speed is 2GHz

PS/2:is a laptop computer which is rechargeable

and battery powered. it's operated with OS/2 operating system.

PLEASE MARK AS BRAINLIEST

Answer:

XT Computers (Extended Technology)  

AT Computers (Advanced Technology)

PS/2 Computers (Personal System 2)

Explanation:

XT Computers :  

            The computers having 8086 or 8088 microprocessor and processing speed of 4.77 Mhz are known as XT Computers. These computers are outdated now because they cannot run on latest software versions.

AT Computers :  

                  The computers having 80286 or later versions of microprocessors are known as AT Computers. Their storage capacity as well as speed is much higher than XT computers. Besides that they have math  co-processor to support main processors to perform complex mathematical calculations.

PS/2 Computers:

                  IBM developed another model of computer in 1990 that have much advanced architecture design that AT computers. They are known as PS/2 computers. They are much faster than AT computers. Most of the laptop computers based on PS/2 model use OS/2 or UNIX operating system and 1.44 MB floppy diskette.

You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm sure you thought it was funny back when you came up with that password (chEEzburg3rz). Write a program that tells you whether your guess is correct. If it is correct, it should grant access like this: Enter password: chEEzburg3rz Access granted....
If your guess is incorrect it should deny access like this:
Enter password: lolcatZ
Access denied

Answers

Answer:

The program written in Python is as follows (See Explanation Section for detailed explanation)

password = "chEEzburg3rz"

userpassword = input("Enter Password: ")

if userpassword == password:

     print("Access granted....")

else:

     print("Access Denied")

Explanation:

The programming language was not stated; However, I answered your question using Python

The line initializes the password to chEEzburg3rz"

password = "chEEzburg3rz"

This line prompts user for input

userpassword = input("Enter Password: ")

This if condition checks if user input corresponds with the initialized password

if userpassword == password:

     print("Access granted....")  If yes, this line is executed

else:

     print("Access Denied")  If otherwise, this line is executed

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O

Answers

Answer:

The answer is "Option d".

Explanation:

In the question, the numbering of the choices is missing so, in the attached the file defines it numbering after that we provide its solution:  

In the question the "option d" is correct, because when we call the function "stop", it ends the store space assigned to the local variables and "called" function parameters, since the variables are no longer used, so the memory is released and once the process is called, the memory is reassigned and then once again assigned when the function ends.

ternary operators of computer

please explain. ​

Answers

Answer:

It's a compact way of doing an if-else statement.

General Format is

<condition> ? <if condition is true> : <else>;

Example:

I could rewrite:

  if(a==1) temp = 1;

  else     temp = 999;

as

  temp = (a==1) ? 1 : 999;

c. Compare Mainframe and Minicomputers with their key features



plzzz help ​

Answers

Answer:

Mainframe computer:

The size of the disk is large.

They have large memory storage.

The speed of processing is fast in comparison to minicomputer.

They are more expensive.

Minicomputer:

The size of disk is small.

They have less memory storage in comparison to mainframes.

Their processing speed is less in comparison to mainframes.

It is not as expensive as mainframes.

Explanation:

I hope this will help you

What are the three major tasks does a computer perform?​

Answers

Ans:

Input, processing, and output.

The three major tasks a computer performs are Input, processing, and output.

What are the tasks of a computer?

These tasks exist all connected to the four basic computer functions: input, output, processing, and storage.

Taking data and instructions from a user, processing the data as per instructions, and showing or storing the processed data, exist the four main functions of a computer.

To learn more about computer

https://brainly.com/question/24540334

#SPJ2

You want to complete conversion tracking setup on your business website with Google Ads. You've already implemented a global sitewide tag. Your next step is to create event tags, which must be placed in the correct section of your web pages to properly function. Where's the event tag implemented on a web page?

Answers

Answer:

The answer is "Between the website tags immediately after the global site tag".

Explanation:

The event tag is used to log clicks as well as perceptions for adverts, not creative things, or to define the inventive data, It may insert more parameters.  

These Tags are code binder clips, that are added to the site and then sent to respondents to obtain and send data. In this users could use tags to monitor scrolls, track suitable formulation, gather feedback, start generating heat maps, display advertising, to your website for all kinds of applications. The API also sends event details to Google Ads, show & Video 360, Campaign Manager, Search Anzeigen 360, and google docs that use the international site tag in the JS tag.

You have an application that for legal reasons must be hosted in the United States when U.S. citizens access it. The application must be hosted in the European Union when citizens of the EU access it. For all other citizens of the world, the application must be hosted in Sydney. Which routing policy should you choose in order to achieve this

Answers

Question options:

A. Latency-based routing

B. Simple routing

C. Geolocation routing

D. Failover routing

Answer:

C. Geolocation routing

Explanation:

Geolocation routing is used in allocating resources for different traffic sources originating from different geographical locations. Consequently you are allocating a different resource to handle a different DNS query based on the location/origination of the DNS query. In the above example, you will need to for example to route all queries from any other place in the world that is not US or Europe to a load balancer for Sydney. Your application in their different locations using geolocation routing would have to be adapted and localized to the region so as to serve the audience there

What are two ways to start a manual spellcheck in MS Word or MS Office?

Answers

Answer:

Explanation:

There are two ways to start a manual spellcheck in MS Word or MS Office are:-

1) This is the easiest method .Press the button F7 and more importantly u can get  this in my MS Project Shortcut list.

2)Try to go to the ribbon on the top part of Microsoft Project and click on the Project tab . Then go move to the right and you will find the ABC button for the spell checker.

These functionalities are used in all current versions of Microsoft Project such as 2010, 2013, 2016, and 2019.

Learning how to use software takes time. So, after customers have learned to use a particular software package, it is easier to sell them software upgrades than to convince them to switch to new software. What implications does this conclusion have for expected rates of return on R

Answers

Answer:

This implies that software firms

can develop upgrades with a lower cost and less risk than they can develop a new product.

Which of the following has the honor of the first robot-human handshake in space?
a. Robonaut 2
b. Baxter
c. Shakey
d. Robosapien

Answers

Answer:

option a

Robonaut 2

Explanation:

it is also known as R2

hope it helped you:)

What is the difference between Packaged and tailored Software?​

Answers

Answer:

Packaged software are easy or simple to use because these software have an easy interface. Whereas custom software is hard to use because these software are custom-built or customized.

Explanation:

Hope your confusion is now over mate

PLEASE HELP!!!! I'll mark Brainliest for whoever is first!!!!

What does this snippet of code do? birds = ["robin", "finch", "grackle", "crow", "wren"] for i in birds: print(i)

It counts the number of birds in the list.
It prints the index and then each bird name.
It prints each bird name on a separate line.
It prints each index number on a separate line.

Answers

Answer:

It counts the number of birds in the list.

Explanation:

The snippet of code works in counting the number of birds in the list.

What is a code Snippet?

A code snippet is a word that is used in computer programming to inform a little chunk of reclaimable source code, machine code, or text. Some text skilled worker, code skilled worker, and IDEs have a property called Code Snippets. The code in this snippet counts the number of birds in the list.

Therefore, option A is correct.

Learn more about the code Snippet, refer to:

https://brainly.com/question/15003149

#SPJ2

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this

Answers

Answer:rogue access point

Explanation:

The development of computer languages is classified into two categories .

true or false​

Answers

Answer:

False

Explanation:

Mark me as a brainliest

When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O

Answers

Answer:

last option: When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated.

Explanation:

A function, when it is called, uses the stack to allocate local variables. When it exits, those variables are no longer needed (since they are local), so the stack pointer is reset to the position it had before calling the function.

An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential

Answers

Answer:

d . commercial potential

Explanation:

The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.

This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.

what is communication?
What is telecommunications?
what do you mean by model of transmission?

Answers

Communication network requires certain components such as sender, receive,data protocol and medium

telecommunications the message such as text , audio , video through electronic media in the from of electronic signals

The direction of communication from sender to receiver and vice versa

[tex] \huge \bold \blue{AnSweR}[/tex]

Communication is the act of giving, receiving, and sharing information -- in other words, talking or writing, and listening or reading. Good communicators listen carefully, speak or write clearly, and respect different opinions.

The transmission of information, as words, sounds, or images, usually over great distances, in the form of electromagnetic signals, as by telegraph, telephone, radio, or television.

The transmission model of communication describes communication as a one-way, linear process in which a sender encodes a message and transmits it through a channel to a receiver who decodes it.

What are the factors affecting the life of ballast? Explain.​

Answers

Answer:

When it's too hot or too cold.

Explanation:

When a bulb of the wrong size or voltage is used in the fixture, the ballast often overheats, causing the light to shut off. The bulbs and the fixture must also match in frequency, or the ballast becomes overworked and overheated.

Who are the founders of Microsoft?

Answers

Answer:

BILL GATES & PAUL ALLEN

Explanation:

HOPE IT HELPS!!!!!!!!!!!!!!!!!!!!!

What are the Typical application
of mini computer​

Answers

Answer:

calls, messages, photos, emails

Explanation:

as in mobile phones

Answer:Minicomputers are used for scientific and engineering computations, business-transaction processing, file handling, and database management, and are often now referred to as small or midsize servers.

Explanation:

How can artificial intelligence be used in learning science?

Answers

Artificial intelligence can be used to help science students research and verify their research. It is also a very interesting topic to study in general.

Hope that helped!!! k

(C++) Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.4^2 = 16Given: #nclude using namespace std;int RaiseToPower(int baseVal, int exponentVal){int resultVal = 0;if (exponentVal == 0) {resultVal = 1;}else {resultVal = baseVal * //your solution goes here;}return resultVal;}int main() {int userBase = 0;int userExponent = 0;userBase = 4;userExponent = 2;cout << userBase << "^" << userExponent << " = "<< RaiseToPower(userBase, userExponent) << endl;return 0;}

Answers

Answer:

Following are the code to this question:

RaiseToPower(baseVal, exponentVal-1);//calling method RaiseToPower and in second parameter we subtract value  

resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);//defining resultVal variable that calculate baseVal and method value

Explanation:

In the above-given code inside the "RaiseToPower" method is defined that accepts two parameters, which are "baseVal and exponentVal" and inside the method, an integer variable "resultVal"  is defined, that holds a value that is 0.

In the next step, if the conditional statement is used, in if the block it checks the "exponentVal" variable value that is equal to 0, if it is true it assigns value 1 in "resultVal" otherwise it will go to else block in this block, the "resultVal" variable holds "baseVal" variable value and call the "RaiseToPower" method, and multiply the baseVal and method and store its value in resultVal and return the value. Inside the main method, two integer variable userBase, userExponent is defined that holds a value and calls the above method and prints its return value.

please find the attachment of the code file and its output.

what is the location in the base interface of the link to
create a table using wizard?
pls Answer me.
I'll make as BRIANLIST. ​

Answers

Answer:

Hey mate, here is your answer. Hope it helps you.

Explanation:

Before you can create objects such as tables and forms, you must first create the database file in which they will be stored.

1. On the File tab select New.

2. Click on Blank database.

3. In the File Name box, type a name for your database.

4. Click on the browse button to the right of the File name box to browse for a location for your

database.

5. Click on Create.

A new database will be created with a new default Table.

6. Click on Design View to start working with this Table.

You can use forms to control access to data, such as which fields of data are. Then open the table or query upon which you want to base the form. 2. To create a form on which all fields from the underlying table or query are placed. Then to be more selective about which fields appear on your form, you can use the Form Wizard.

Other Questions
how will you measure the length of a curved line by using a thread? A patient prescribed a metered dose inhaler will find it A. works for lower (not upper) respiratory diseases only. B. should be filled with medication in aerosol form only. C. is filled with medication used to administer a fixed amount of medication per inhalation through the mouth. D. should be filled with medication in powder form only. When making bread why is the dough left in a warm place for a while before putting it in the oven The higher the bowling score the better. The lower the golf score the better. Assume both are normally distributed. a. Suppose we have a sample of the Santa Ana Strikers' bowling scores. Q1 = 125 and Q3 = 156. Would it be usual or unusual to have a score of 200?b. Suppose the mean bowling score is 155 with a standard deviation of 16 points. What is the probability that in a sample of 40 bowling scores, the mean will be smaller than 150?c. Suppose the mean golf score is 77 with a standard deviation of 3 strokes We will give a trophy for the best 5% of scores. What score must you get to receive a trophy? d. Suppose the mean golf score is 77 with a standard deviation of 3 strokes. Would a golf score of 70 be ordinary, a mild outlier, or an extreme outlier? A health food manufacturer makes two types of protein shakes, Whey and Vegan. Each mixture contains vitamins, protein, and carbohydrates, in the following proportions: Carbohydrates (g) Protein (g) Vitamin (g) Whey 100 400 300 Vegan 200 300 100 Minimum dietary requirements are that a protein shake contain at least 0.9kg of vitamins, 2.2kg of protein, and 0.8kg of carbohydrate. Whey costs N$20 per kilogram to produce, and Vegan costs $12.50 per kilogram to produce. Find the number of kilograms of each protein shake that should be produced to minimize cost Simplify the following expression. 3x(4x 3) A. 12x2 + 13x B. 12x2 + 5x C. 12x2 5x D. 12x2 9x The graph of y=x is translated 5 units to the left and 7 units up. What is the equation of the graph that results from this translation? HELP! Which type of model best represents simple molecules?A. wireB. ribbonC. structural formulaD. Lewis dot NEED ASAP What is the quotient and remainder of 8,595 24? Answer ASAP please!Which of the following statements is not true?A. Pythagoras' can be used to find an unknown angle of a right-angle triangleB. Pythagoras' theorem can be used to find an unknown side length of a right-angle triangleC. Pythagoras' theorem can only be used on right-angle trianglesD. Trigonometry can be used to find an unknown angle of a right-angle triangleE. Trigonometry can be used to find an unknow side length of a right-angle triangle A cell membrane is very specific about what It allows across. How does this help thecell?XO A. It helps the cell absorb as many different molecules as possible.O B. The cell works better when it contains fewer proteins.C. Transport proteins allow only enzymes to pass through the membrane.D. It is better for the cell if most molecules are prevented from entering.IncorrectIt isnt A illustrate the distributive property to solve 144/8 what is reductionasim Calculate the acceleration of a bus that speed up from 20ms-1 to 40ms-1 in 8 seconds? 2x - 3y = -55x - 22 = -4ySolve In Multiplication Method A thermos bottle works well because: a. its glass walls are thin b. silvering reduces convection c. vacuum reduces heat radiation d. silver coating is a poor heat conductor e. none of the above Find the measure of FG. what more accurate model of the atom emerged from Albert Einstein's contributions and quantum mechanics 3. Which of the following accurately describes circuits?O A. In a parallel circuit, the same amount of current flows through each part of the circuitO B. In a series circuit, the amount of current passing through each part of the circuit may varyO C. In a series circuit, the current can flow through only one path from start to finishO D. In a parallel circuit, there's only one path for the current to travel. What cause did women work for in the mid-1800s?