1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
11

An archive of files that usually contain scripts that install the software contents to the correct location on the system is ref

erred to as a:1) package manager
2) DBMS
3) tarball
4) router
Computers and Technology
1 answer:
Anika [276]3 years ago
8 0

Answer:

Option 3 is the correct answer for the above question.

Explanation:

  • A tarball is a software which is used to encrypt the other software or hide the other software and make it small. It again makes the original software program from the encrypted ones.
  • It is used to make the file sort and can use for the transfer which takes some amount of memory.
  • The above question asked about that technology which is used to make encrypted software from the original software and use it with the help of some script. Then the answer is tarball which is referred to from option 3. Hence Option 3 is the correct answer for the above question while the other is not because--
  • Option 1 states about the package manager which is used to manage the library only.
  • Option 2 states about the DBMS which is used to manage the database.
  • Option 4 states about the router which is used for the internet.

You might be interested in
Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase
satela [25.4K]

Answer:

Read the file and save it to a variable as a string, split the string variable and cast it to a set object using the set function to get the unique words in the file. Then use the max function with the key attribute to use regular expression module "re" to compare the first letter of each item to return in a list comprehension or append to a list.

Explanation:

The open function is used to import a file in python, the split string method splits the string to a list of items and the set function removes any duplicates of a word or item.

Using the for loop statement, iterate over the items and compare and return the items in alphabetical order with the 're' search method getting the item with uppercase letters with higher precedence than lowercase.

5 0
3 years ago
You have defined a scope on your DHCP server with the start address 172.16.1.1, end address 172.16.1.200, and prefix length 16.
Andre45 [30]

Answer:

B

Explanation:

prefix 16 got 255.555.0.0 subnet mask & 65,536 total host. so in your case it ill take 172.16.0.0 - 172.16.255.255 / subnet and your scope ill take the 172.16.1.1 - 172.16.1.200 . for the next subnet is 172.17.0.0 - 172.17.255.255 and same thing as your scope you ill take 172.17.1.1 - 173.17.1.200 . keep learning bro :)

7 0
3 years ago
For a parking payment app, what option would MOST likely connect a user to a third party/external gateway?
Alik [6]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Almost all app that is doing online business integrated third party payment gateway and login/services. But some apps, don't integrate the third party login/signin services such as go ogle or face book login/sign in services.

But in the context of this question, for a parking payment app, upon reservation of parking space, the pay option connects a user to a third party/external gateway. This gateway will accept payment from the user and upon confirmation of payment, the parking space will get reserved.

so the correct option to this question is:

  • Pay

While the other options are incorrect because:

The sign-in option does not connect the user to a third pay/gateway in case if the app has self-registration and sign-in functionality. Rate and Time remaining are features of the app that does not force the user to connect third-party gateway.

3 0
3 years ago
What are three ways data can be gathered?Possible answers include:
MrRa [10]

Answer:

D. All of the above

Explanation:

Here are the top six data collection methods:

  • Interviews.
  • Questionnaires and surveys.
  • Observations.
  • Documents and records.
  • Focus groups.
  • Oral histories.

The system of data collection is based on the type of study being conducted. Depending on the researcher’s research plan and design, there are several ways data can be collected.

The most commonly used methods are: published literature sources, surveys (email and mail), interviews (telephone, face-to-face or focus group), observations, documents and records, and experiments.

1. Literature sources

This involves the collection of data from already published text available in the public domain. Literature sources can include: textbooks, government or private companies’ reports, newspapers, magazines, online published papers and articles.

This method of data collection is referred to as secondary data collection. In comparison to primary data collection, tt is inexpensive and not time consuming.

2. Surveys

Survey is another method of gathering information for research purposes. Information are gathered through questionnaire, mostly based on individual or group experiences regarding a particular phenomenon.

There are several ways by which this information can be collected. Most notable ways are: web-based questionnaire and paper-based questionnaire (printed form). The results of this method of data collection are generally easy to analyse.

3. Interviews

Interview is a qualitative method of data collection whose results are based on intensive engagement with respondents about a particular study. Usually, interviews are used in order to collect in-depth responses from the professionals being interviewed.

Interview can be structured (formal), semi-structured or unstructured (informal). In essence, an interview method of data collection can be conducted through face-to-face meeting with the interviewee(s) or through telephone.

4. Observations

Observation method of information gathering is used by monitoring participants in a specific situation or environment at a given time and day. Basically, researchers observe the behaviour of the surrounding environments or people that are being studied. This type of study can be contriolled, natural or participant.

Controlled observation is when the researcher uses a standardised precedure of observing participants or the environment. Natural observation is when participants are being observed in their natural conditions. Participant observation is where the researcher becomes part of the group being studied.

5. Documents and records

This is the process of examining existing documents and records of an organisation for tracking changes over a period of time. Records can be tracked by examining call logs, email logs, databases, minutes of meetings, staff reports, information logs, etc.

For instance, an organisation may want to understand why there are lots of negative reviews and complains from customer about its products or services. In this case, the organisation will look into records of their products or services and recorded interaction of employees with customers.

6. Experiments

Experiemental research is a research method where the causal relationship between two variables are being examined. One of the variables can be manipulated, and the other is measured. These two variables are classified as dependent and independent variables.

In experimental research, data are mostly collected based on the cause and effect of the two variables being studied. This type of research are common among medical researchers, and it uses quantitative research approach.

7 0
3 years ago
Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20
Klio2033 [76]

Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20?

a. It is required you have an endorsed/signed I-20 when Customs and Border Patrol or police ask for it

b. We only keep an unsigned digital copy and cannot sign an I-20 after the fact

c. It is against U.S. regulations to send digital (signed or not) DS-2019s and must treat I-20s the same

d. You will need all signed original I-20s to make copies to apply for OPT, STEM and H-1B in the future, so get them now!

e. It is the student’s choice to request each term, however, we cannot go back retroactively to provide past copies

f. We can only provide a signed copy of current I-20 and if changes occur from previous semesters that information will not show

g. The original endorsed I-20 signed by a DSO will be destroyed after 30 days of issuance if not picked up, and it cannot be replicated

h. The cost to have I-20 shipped may go up at any time

i. All the above

Answer:

i. All the above

Explanation:

DSO means designated school officials and they have to do with Student and Exchange Visitor Program (SEVP)-certified schools where students have to get a Form I-20, “Certificate of Eligibility for Nonimmigrant Student Status which provides information about the student's F or M status.

What a student must request for from his DSO signed I-20 ship are all the above options.

8 0
3 years ago
Other questions:
  • Write the printitem() method for the base class. sample output for below program: last name: smith first and last name: bill jon
    6·2 answers
  • Select one technology limitation in regards to quality improvement (QI) programs Technology is not fast enough Not all electroni
    12·1 answer
  • Which term represents a computational instruction stored in computer memory?
    13·2 answers
  • Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, an
    9·1 answer
  • Computer input is the process of translating physical signals (light, sound, movement) into which of the following?
    8·2 answers
  • Why have the 'taskmasters' been answering questions so long but they're still only at the ambitious rank?
    14·1 answer
  • What is a googleplex?
    7·1 answer
  • You can include up to _____ logical conditions in the and function. (487181)
    12·1 answer
  • Cora is writing a program to make a motorcycle racing game. If Cora wants to speed of the motorcycle to appear on the screen whe
    12·1 answer
  • What is the main difference between weathering, erosion and leaching​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!