1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
2 years ago
11

They removed my other post but I didn't learn my lesson :)

Computers and Technology
1 answer:
Natali [406]2 years ago
8 0

Answer:

thank you so much I'm so bored in class

Explanation:

You might be interested in
How do mentors provide professional development opportunities?
Sholpan [36]

The answer is the second one.

Hope this helps! :)

3 0
3 years ago
Read 2 more answers
Create a script that prompts for the user to input a directory and then prints out the number of sub-directories in the given di
laila [671]

Answer:

Below is the required code:

Explanation:

Python Code

import os

import bin

dir = input("Please specify the location to the directory")

list = os.walk(dir)

a = length(list[1])

b = length(list[2])

print "Files: %n , Sub-dirs : %n" % (b,a)

decision = _(" Do you want to continue? (y/n) "))

if(decision):

cls

else :

exit()

5 0
3 years ago
Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
Pie

Answer:

Option D.

Use CMAK to create an executable to install.

Explanation:

The CMAK is the Connection Manager Administration Kit it is a feature in Microsoft Windows that allows users to customize the remote connection experience for users on their network.

The CMAK can be simply used by the technical expert to remotely operate the client computer, and customize the VPN himself without the non-technical user having to do anything. This can be done for computers only on a network however.

3 0
3 years ago
List three tacos there are several from the opening page of the help and support center.
s344n2d4d5 [400]
Mexican tacos sascSDV
8 0
4 years ago
The identification of the technology management framework contain?
AlexFokin [52]

Answer:

Explanation:

The effective management of technology as a source of competitive advantage is of vital importance for many organizations. It is necessary to understand, communicate and integrate technology strategy with marketing, financial, operations and human resource strategies. This is of particular importance when one considers the increasing cost, pace and complexity of technology developments, combined with shortening product life cycles. A five process model provides a framework within which technology management activities can be understood: identification, selection, acquisition, exploitation and protection. Based on this model, a technology management assessment procedure has been developed, using an ``action research’’ approach. This paper presents an industrial case study describing the first full application of the procedure within a high-volume manufacturing business. The impact of applying the procedure is assessed in terms of benefits to the participating business, together with improvements to the assessment procedure itself, in the context of the action research framework. Keyword: Technology, Strategy, Management, Assessment

8 0
3 years ago
Other questions:
  • Will mark brainliest if correct. First come, first serve.
    15·1 answer
  • What type of devices are a keyboard and a mouse?
    7·1 answer
  • How do you enlarge your screen if there is no control panel? Need desperate help!
    15·1 answer
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • What advantage does having ultraviolet vision give bees?
    10·2 answers
  • What letter names the drive where windows most commonly stores data and files
    13·1 answer
  • Tel me free english learning website?
    5·1 answer
  • Six external parts of a computer system
    13·1 answer
  • Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol
    7·1 answer
  • 1. Tracy is studying to become an esthetician. Give three reasons why she needs to have a thorough
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!