1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
4 years ago
12

Which actions should be taken so that transitions proceed automatically? Check all that apply.

Computers and Technology
2 answers:
azamat4 years ago
7 0

Answer:

C

Explanation:

DiKsa [7]4 years ago
6 0

Answer:

a,d

Explanation:

because when you the after box you will probably see it,and you got put effects to the transition

You might be interested in
Write a function, AvgList, that takes a single argument, a list, and returns the average (mean) of the numbers in the list. You
8_murik_8 [283]

Answer:

Answered below

Explanation:

//Programmed in Java

public double avgList(int [] nums){

int I;

double sumOfNumbers = 0;

double averageOfNumbers = 0;

//Loop over to sum all elements in the list.

for(I = 0; I < nums.length; I++){

sumOfNumbers += nums[I];

}

//Calculate the average

averageOfNumbers = sumOfNumbers/ nums.length;

return averageOfNumbers;

}

3 0
3 years ago
Who would use a magnetic hard drive? Give a scenario and include examples as well as detail.
dybincka [34]
A magnetic hard drive well all hardrives have a magnet n them id say if it was to withstand heat so it whould stay on the magnet therefore not compromising the data <span />
3 0
4 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
What are the programming concepts (within or outside the scope of IT210) that you would like to strengthen and delve into furthe
marin [14]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

I would like to reinforce in advanced or complex concepts such as documents as well as channels, internet programming, multi-threading, after that last lesson.

  • I am interested in learning web development to develop applications or software. I would also like to explore those concepts by using open source tools.
  • Course concepts will have to develop models for handling.
  • No there is no subject matter or definition you provide further clarity for.
  • I'm interested in studying java as well as web development in comparison to C++ so I can use it in my contract work.
4 0
3 years ago
What type of Windows server has Active Directory installed and is responsible for allowing client computers access to domain res
Basile [38]

Answer:

Domain controller                    

Explanation:

  • A domain controllers is a server which acknowledges authentication requests and validates users access on the computer network in order to use the resources.
  • This is done by the domain controller by verifying the username and password.
  • It also allows user to access the other domain and also access the resources of other domain.
  • For example there is a network of multiple computers and each computer requires authentication i.e user is asked to provide the username and password.
  • Authenticating every computer and managing is not easy so a computer is appointed this task of authentication other computers.
  • This computer  is called domain controller which can easily maintain these authentication details of the users.
  • The authentication information (login details) of users, computers and shared resources is saved in Active Directory database.
  • If a user requests access to the resource via login then the login details (username and password) of the user should match with that stored in the Active Directory in order to grant access to the user.
  • Domain controller enables resources sharing and is good for large networks and provides with improved security.
4 0
3 years ago
Other questions:
  • What are some local storage devices?​
    6·1 answer
  • You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
    9·1 answer
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • Sending a employee an email with important criticism represents a problem which communication process
    9·1 answer
  • Which table option enables you to combine the contents of several cells into one cell?
    9·2 answers
  • You can view information for the individual people who will perform the tasks on theproject in the
    7·1 answer
  • Dave wants to host a website and he needs an operating system that is free of cost. Which operating system should he use?
    11·1 answer
  • Complete the missing code in the templatepublic class Exercise09_04Extra { public static void main(String[] args) { SimpleTime t
    13·1 answer
  • No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program
    9·1 answer
  • A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!