1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
7

A ____ is a collection of computers and users that are identified by a common security database. workgroup controller segment do

main
Computers and Technology
1 answer:
Ksenya-84 [330]3 years ago
6 0
A domain is a collection of computer....
You might be interested in
List and briefly describe the 3 types of software
erastovalidia [21]
1. A [disk cleanup] utility searches for and removes unnecessary files.
2. [Back-up] - allows users to copy selected files or an entire hard disk to another storage medium.
3. [Firefox] is a web browser- a platform, which is used to browse the information via the internet.
4 0
3 years ago
The IV tubing and hub connection site should be left free of tape and uncovered from the dressing so that it can be visually ins
ra1l [238]

Answer:

True

Explanation:

Based on the information provided within the question it can be said that this statement is completely True. The IV tubing and hub need to be easily accessible and able to be visually inspected at all times since all liquids, including medicine enter the patients body through the IV line. Therefore any blockage or error can be life threatening and the problem in the tubing or hub need to be detected immediately and solved, which is why all IV equipment is transparent.

3 0
3 years ago
Jeff wants to print quickly so he presses the Ctrl and the P. Jeff used a _____. macro invoice template shortcut
Allushta [10]
He used a keyboard shortcut.
3 0
4 years ago
Why should cloud computing not be a set of silos? Provide real or made up examples of why incompatible solutions will fail in IT
musickatia [10]

Answer:

We need to understand what is a silo, and that is, however, clear from the meaning. It's like some military department has kept a missile in an underground chamber ready to be fired. However, it's more important to understand what it means for a business person. This happens when a department or any management section refuses to share the information they have, the tools, goals, as well as might be in various cases processes with various other departments. This is the silo mentality, and it is believed to have an impact on the operations, and it certainly destroys the morale of the employees and might contribute to the destruction of the concerned company or its culture or might be its product. Now, suppose in an IT company, a certain department registers some sort of threat like in current condition corona. Suppose they do not share this information with their branch in a certain nearby city. Those employees would not benefit from the current information which they can have from that branch, and might not prepare themselves against Corona. An organization level cooperation is required, and that will ensure that the unaffected departments can break the chain, and protect themselves, as well as then send information to all other departments. And currently, this is required to fight against corona at the global level. The whole world should unite, and not let the chain grow. And similarly, various other threats related to IT can be stopped from causing destruction, if departments shed the silo mentality. And incompatibility is never accepted in an IT environment. And the whole world is an IT world now, where we need to share information in between us, so that we keep each safe, growing, and improving. Like in the case of Corona, the whole world must unite and decide to move forward harmoniously, and by God's grace that is what we are doing. And that is an indication, that we will be able to fight successfully against this deadly virus. However, many of us have died. And we should take a lesson from this. The doctors and nurses have done their best to save them, and they have been able to save many out of them. We must say thanks to all of the world’s health organizations/departments for this. And now they have let us know the possible preventive measure, if not the cure. And, while we pay our condolences to all those heavenly souls who are not with us now, and will always be remembered, we must pledge, we will not let more to die, and we will together fight for them. And we are not required to do anything more than staying at home and spending our time with our family. Please be at home, and break the Corona chain by doing that. Also, try staying at least 1 meter apart from each other, and even inside your family. Please follow this, and keep yourself safe by following this, and keep learning. Also, keep yourself sanitized all the time. And doing that, we will win this battle.

Explanation:

Please check the answer section.

3 0
3 years ago
Write a function called cipher(phrase,shift)that accepts two parameters: a string phrase and an integer shift.The integer shift
Aleks [24]

Answer:

Following is given the code according to requirement.

The code is attached as an image so that the indentation is understood by the user. Comments are given inside the code where necessary.

The output of code is also attached as well  in end.

I hope it will help you!

Explanation:

7 0
3 years ago
Other questions:
  • Trish uas bought a new computer, which she plans to start working on aftwr a week. Since Trish has not used computers in the pas
    13·1 answer
  • To save time and avoid formatting errors, you can use the__ to apply custom formatting to other places in your presentation and
    13·1 answer
  • 2h2 + o2 → 2h2o<br> pls i need help
    10·1 answer
  • Deciding whether to explode a process further or determine that it is a functional primitive is a matter of experience, judgment
    8·1 answer
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • THE PROTOCOL ORIGNALLY RAN ON TOP OF NETBT,BUT today runs by itself and uses port 445?
    11·1 answer
  • import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in)
    9·1 answer
  • Suppose we have two threads inserting keys using insert() at the same time. 1. (5 points) Describe the exact sequence of events
    11·1 answer
  • C. There are two types of computer on the basis of size. true or false​
    5·1 answer
  • Which device allows users to directly hear data from a computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!