1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lesechka [4]
3 years ago
12

Network administrators ____ to set up the browsers on the network to use a proxy server.

Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
4 0
May use a configuration file
You might be interested in
CRM systems provide an organization with an important element: all employees of the company who directly or indirectly serve a c
Vilka [71]

Answer: On the same page

Explanation:

 The CRM is basically stand for the customer relationship management that are design to support all the relationship with the customers. It basically analysis the data about the customers to improve the relationship and growth in the organization.

All the employees in the organization are directly and indirectly server the customers are basically o the Same page by the individual computers.

The CRM approach are basically compile the given data from the different communication source such as company website, email and telephone.

 

8 0
3 years ago
What is the maximum input current fr transformer T10266
RoseWind [281]

THIS IS WHAT I KNOW

40 volts max input/output differential, 2.2 amps max output current. Yes you can use it to make a variable power supply with the LM317 but it is a waste of a good transformer because you can not use its full power output capabilities. You will also not be able to go to very low voltages because of the input/output voltage differential.

                                                HOPE IT HELPS

5 0
3 years ago
Many people object to increased cybersecurity because _____.
yawa3891 [41]
Depending on what kind of security measures are implemented, D would definitely be a contender. However, B is also something to take into consideration. I would answer D.<span />
5 0
3 years ago
Read 2 more answers
5. Write a program to remove any duplicate letters from a word and display the new word maintaining the original order. For exam
dexar [7]

Answer:

word = input('Enter a single word: ', 's');

n = length(word);

nodupWord = [];

for i = 1:n

  dup = false;

  c = word(i);

  for j = 1:i-1

      if word(j) == c

          dup = true;

          break;

      end

  end

  if ~dup

      nodupWord = [nodupWord, c]; %add the non-duplicate char to end

  end

end

disp(['Adjusted word: ', nodupWord])

Explanation:

The code is in Python.

3 0
3 years ago
Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user h
adell [148]

Answer:

The user does not need to purchase and install additional hardware to provide increased capacity.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it. Some examples of SaaS are Go-ogle apps, Bigcommerce, Salesforce, Slack, Dropbox, DocuSign, Microsoft Office 365, etc.

An advantage of the software as a service (SaaS) approach in public cloud computing is that the user do not have to purchase and install additional hardware to provide increased capacity because the software provider makes all of the necessary features for smooth operations and proper functioning available to the user.

7 0
2 years ago
Other questions:
  • Why has unicode become the standard way of converting binary to text
    7·1 answer
  • It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
    14·1 answer
  • What Software is used to play,create, and modify audio and video files
    7·2 answers
  • What economic measure is at the highest level since the Great Depression?
    12·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    7·1 answer
  • Unix is called a(n) ___________ operating system because it can run on a desktop pc or a server. operating systems installed on
    7·1 answer
  • What are some things you can do to clean up your digital footprint.
    9·1 answer
  • Assume that class BankAccount exists, and that it has a constructor that sets the private field balance, and that setBalance and
    13·1 answer
  • JAVA CODE.
    6·1 answer
  • Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b a
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!