1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_lady [41]
3 years ago
6

What is the requirement for self-contained recovery devices

Computers and Technology
1 answer:
dexar [7]3 years ago
4 0
Babahskdjdndnd jbsbsjsjsnsns ndsnssnsnsnxjxjx skzjnansmansna Jaunansmans
You might be interested in
Which event occurred in the 1990s?
Amanda [17]

Answer:

C) Sun Microsystems released Java.

Explanation:

Sun Microsystems released in May 1995.  Of course, Sun Microsystems was then bought by Oracle.  Today, it's said that Java is the most commonly used programming language and that over over 3 billion devices use it.

It was created by James Goesling, a Canadian from Calgary, Alberta.

Let's check the other dates to be sure:

A) Niklaus Wirth developed Pascal. : 1970

B) The Department of Defense released Ada.  1980

D) Bjarne Stroustrup developed C++.: 1985

5 0
4 years ago
Write a piece of codes that asks the user to enter a month (an integer), a day (another integer), and a two-digit year. The prog
Sliva [168]

Answer:

Follows are the code to this question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

int day,month,year;//defining integer variable

cout<<"please enter last two digit of the year: "; //print message

cin>>year;//input year value

cout<<"enter day: "; //print message

cin>>day;//input day value

cout<<"enter month: ";//print message

cin>>month;//print month message

if(month*day==year)//check magic date condition  

{

cout<<"its magic programology year";//print message

}

else

{

cout<<"its not magic year";//print message

}

return 0;

}

Output:

please enter last two digit of the year: 98

enter day: 14

enter month: 7

its magic programology year

Explanation:

In the given code, three integer variable "day, month, and year" is declared, that uses the input method "cin" to input the value from the user-end.

In the next step, an if block statement is used that check month and day value multiple is equal to year value, if the condition is true it will print "magic programology year" otherwise it will print "not the magic year".

6 0
3 years ago
Which of the following areas of study have been instrumental in shaping the development of HCT?
Ivan

Answer:

Cognitive Science and Graphic Design.

and hence D and E options are correct.

Explanation:

By HCT we mean Home and Community-based Treatment. This is, in fact, a home-based behavioral health-related service for the young people and all families which seek a better treatment plan, that is more advanced apart from an emergency therapy. And as far as the HCT's are concerned, they have well trained in quite a good number of treatment procedures like Cognitive Science related procedures. trauma centric cognitive treatment. However, a little bit of Arts and creativity is also required, and hence, you should know about the graphic design also.

8 0
4 years ago
You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpens
Oksana_A [137]

Answer:

You should disable WPS in the access point's configuration.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

In wireless access points, the encryption technologies used for preventing unauthorized access includes WEP, WPA, and WPA2.

In this scenario, you notice that an access point supports Wi-Fi Protected Setup (WPS) using a PIN and you are concerned about the security implications of this functionality. Therefore, to reduce this risk you should disable Wi-Fi Protected Setup (WPS) in the access point's configuration.

This ultimately implies that, the wireless access point will operate in an open state and as such would not require any form of password or PIN for use.

3 0
3 years ago
Who invented the system of logarithm in 1614 AD​
IgorC [24]

Answer:

<em><u>JOHN </u></em><em><u>NAPIER</u></em>

Explanation:

The method of logarithms was publicly propounded by John Napier in 1614, in a book entitled Mirifici Logarithmorum Canonis Descriptio (Description of the Wonderful Rule of Logarithms). The book contained fifty-seven pages of explanatory matter and ninety pages of tables related to natural logarithms.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Identify four basic data manipulations performed on a relational database using sql
    7·1 answer
  • Which are reasons to create a study schedule? Check all that apply.
    14·2 answers
  • Which philosopher believed that if we carefully examine the contents of our experience, we find that there are only two distinct
    10·1 answer
  • Factor f(x)=x^3-6x^2+9x
    12·1 answer
  • What is the result of expression 15 &gt; 10 &gt; 5 in C? What is the result of the same expression in Java?
    14·1 answer
  • What is the purpose of the "time-to-live" (TTL) field of the IPv4 packet? a. ensures that the packet remains in the network long
    6·1 answer
  • Write one similarity and one difference between '_' (underscore) ' % ' wildcard symbol .
    11·1 answer
  • When your grounded and the only thing you can get on is a computer........................oh welllllllllllllllllllllllllllllllll
    7·1 answer
  • <img src="https://tex.z-dn.net/?f=%20%5Csf%20%7B%20%5Cfcolorbox%7Bgold%7D%7Bg%7D%7B%20Define%20malware%7D%7D%20" id="TexFormula1
    9·1 answer
  • What are the similarities characteristics between computer and human beings?​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!