1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
4 years ago
10

A(n) ________ software installation enables you to decide which features you want to install on the hard drive. Select one: A. f

ull B. upgrade C. partial D. custom
Computers and Technology
1 answer:
Softa [21]4 years ago
7 0

Answer:

D.Custom

Explanation:

When you select  Custom installation, all Compulsory subcomponents and products are installed, but the Optional and Recommended  sub-components and components can be installed selectively on a product-by-product basis for the licenses selected at install time.  It also provides the feature to store it in your desirable disk in the hard drive.

You might be interested in
The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where ____ percent travels th
lianna [129]
I believe the correct answer is 75%. <span>The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where 75% percent travels through wi-fi or 3 gb travels through wi-fi. Hope this answers the question. Have a nice day.</span>
4 0
3 years ago
Read 2 more answers
Write a little man program that accepts three values as input and produces the largest of the three as output.
ki77a [65]
Required: program to return the largest of three numbers.

pseudocode

input parameters, int A,B,C;
int T; // temporary storage
if (A>B) T=A;
else T=B;
if (T>C) print(T);
else print(C);


5 0
3 years ago
The application reliability team at your company this added a debug feature to their backend service to send all server events t
Paraphin [41]

Answer:

The correct answer to the following question will be Option A.

Explanation:

The given question is incomplete and the complete question will be:

The event records are at least 50 KB and at most 15 MB and are expected to peak at 3,000 events per second. You want to minimize data loss. Which process should you implement?

Append metadata to file the body.

Compress individual files.

Name files with a random prefix pattern.

Save files to one bucket

(B)

Batch every 10,000 events with a single manifest file for metadata.

Compress event files and manifest files into a single archive file.

Name files using serverName-EventSequence.

Create a new bucket if a bucket is older than 1 day and save the single archive file to the new bucket. Otherwise, save the single archive file to the existing bucket.

(C)

Compress individual files.

Name files with serverName-EventSequence.

Save files to one bucket

Set custom metadata headers for each object after saving.

(D)

Append metadata to file the body.

Compress individual files.

Name files with serverName-Timestamp.

Create a new bucket if the bucket is older than 1 hour and save individual files to the new bucket. Otherwise, save files to the existing bucket.

  • Therefore, in option A, a name file can be used with a prefix pattern randomly. So, it will be the right answer
  • The other three options such as C, B and D are incorrect because they are using name files with "serverName-EventSequence" or "serverName-Timestamp" which causes the distribution in the backend irregularly.

7 0
4 years ago
Refer to the method f:
Goshia [24]
<h2>This function will land up in infinite function call</h2>

Explanation:

first time when the function gets invoked,

f(6,8), so k=6 & n=8, inside the function it checks k==n, ie. 6==8, returns false, then one more if is available, so 6>8 is check for , once again it is false and else loop is executed, the function is called recursively using f(k-n,n), that is f(6-8,8), it means f(-2,8) is passed.

Second time,

if(-2==8) is false, so if(-2>8) is again false and function f(-10, 8) is called

if(-10==8) is false, so if(-10>8) is again false and function f(-18,8) is called

if(-18==8) is false, so if(-18>8) is again false and function f(-26,8) is called

So this goes recursively and ends in an infinite function call.

5 0
4 years ago
VA student found a book on the library bookshelf last week, and recorded the source information.
Vilka [71]

Answer:

3,1,2,1

Explanation:

just finished doing the assignment girly

6 0
3 years ago
Other questions:
  • You can increase your efficiency by using your e-mail program's spell checker because it eliminates the need for you to proofrea
    11·1 answer
  • 100 students were asked to fill out a form with three survey questions, as follows: H: Honor Roll C: Club membership (Robotics C
    7·1 answer
  • A firewall is either software or dedicated hardware that exists between the __________ being protected.
    13·1 answer
  • If someone receives a shock, or a piece of equipment is throwing sparks or arcing you should try to pull them away from the sour
    7·1 answer
  • By default, windows active directory creates __________ user accounts when a new domain is created
    8·1 answer
  • Uploading Your Work
    14·1 answer
  • Can anyone help explain this?
    13·2 answers
  • 8.10 Code Practice Question 1
    12·1 answer
  • In computer science what are the methods used to protect the information stored by a piece of software called?
    10·1 answer
  • You're asked to recommend potential data structures to use as the backing for implementing Kruskal's algorithm. Which of the fol
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!