Answer:
Procurement
Explanation:
Characteristics hardware lifecycle:
- Procurement- Acquiring new IT hardware assets involves evaluating vendors, purchase orders, receiving, and device labeling.
- Deployment - Hardware configuration and installment, placing hardware and software assets into production environments.
- Maintenance & Support - Management of assets include scheduling scans and getting audit history.
- Upgrade - Before you retire your IT hardware assets, you’ll reach a processing plateau that can be restored with hardware upgrades.
Answer:
print("hello world")
Explanation:
a hello world program is simply a program that prints out hello world.
for this you would need to remember to have the same number of brackets on each side and to write print. Also remember when printing to include speech marks.
Answer:
A downloaded executable file may contain harmful software know as malware.
Further details:
Malwares:
Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.
Uses:
Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.
Answer details:
Subject: Computer and technology
Level: College
Keywords:
• Harmful software
• Malware
• Malware software
• Uses of malware
• Purpose of malware
Learn more to evaluate:
brainly.com/question/4997492
brainly.com/question/4010464
brainly.com/question/1754173
Answer:
-
= 1
= 1
Explanation:
Argon atom has atomic number 18. Then, it has 18 protons and 18 electrons.
To determine the quantum numbers you must do the electron configuration.
Aufbau's principle is a mnemonic rule to remember the rank of the orbitals in increasing order of energy.
The rank of energy is:
1s < 2s < 2p < 3s < 3p < 4s < 3d < 4p < 5s < 4d < 5p < 6s < 4f < 5d < 6p < 7s < 5f < 6d < 7d
You must fill the orbitals in order until you have 18 electrons:
- 1s² 2s² 2p⁶ 3s² 3p⁶ : 2 + 2 + 6 + 2 + 6 = 18 electrons.
The last electron is in the 3p orbital.
The quantum numbers associated with the 3p orbitals are:
= 1 (orbitals s correspond to
= 0, orbitals p correspond to
= 1, orbitals d, correspond to
= 2 , and orbitals f correspond to
= 3)
can be -1, 0, or 1 (from -
to +
)
- the fourth quantum number, the spin can be +1/2 or -1/2
Thus, the six possibilities for the last six electrons are:
- (3, 1, -1 +1/2)
- (3, 1, -1, -1/2)
- (3, 1, 0, +1/2)
- (3, 1, 0, -1/2)
- (3, 1, 1, +1/2)
- (3, 1, 1, -1/2)
Hence, the correct choice is:
-
= 1
= 1