1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
3 years ago
12

Which of these functions may be used with positional arguments? Select four options.

Computers and Technology
1 answer:
Snezhnost [94]3 years ago
8 0

Answer:

AVERAGE

COUNT

SUM

MAX

Explanation:

e2020

You might be interested in
For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
Paul [167]

Answer:

  • Interactive media
  • Information services and support
  • Programming and software development
  • Network systems administration

Explanation:

The company has finished designing a software program, but users aren’t sure how to use it. <u>interactive media</u>

Several people in the human resources department need new software installed. <u>information services and support</u>

An employee has an idea for a software program that can save the company time, but doesn’t know how to write it. <u> programming and software development</u>

A new branch of the company is opening soon, and the computers there need to be connected to the Internet. <u>network systems administration</u>

<u>OAmalOHopeO</u>

3 0
3 years ago
You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence
Lorico [155]

To deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

<h3>What is orphaned accounts?</h3>

The orphaned accounts are the accounts which do not have any valid business owner but provide the access to the services and corporate systems. One best way to deal with such account is to disable the user account.

Steps to deal with orphaned accounts-

  • Using the automated provisioning and deprovisioning can save the
  • Control the accounts with micro-certification.
  • Regular check of account to prevent the hidden access risk.

You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence of multiple orphaned accounts.

In such case, one should disable these accounts.

Thus, to deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

Learn more about the orphaned accounts here:

brainly.com/question/11211623

#SPJ1

8 0
2 years ago
A baseball diamond has an area of 3,600 square feet. What is the distance between each base? How far will a runner run around th
Ksju [112]
Also ~ how far does a runner run around the bases on a home run? It's explained in my answer. lw = sa (length times width = surface area) So multiplying length by width (since they're the same in this case you're squaring the length or squaring the width - no difference) You'll get 3600 feet.
6 0
4 years ago
Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know h
const2013 [10]

Answer: C. Query builder

Explanation:

Based on the information given in the question, since Gina does not know how to write SQL commands and no forms have been created, the best option to generate the report is a query builder.

With the Query Builder, Gina can be able to search and also select and filter the database objects, while also creating relationships between the objects, and save queries despite not having any SQL knowledge.

4 0
3 years ago
The transport layer must break messages from the application layer into several _____ that can be sent to the network layer
Pie

The transport layer must break messages received from the application layer into several <u>packets</u> that can be sent to the network layer.

<h3>The layers of the OSI model.</h3>

In Computer networking, there are seven main layers in the open systems interconnection (OSI) model and these include the following in a sequential order;

  • Physical Layer
  • Data link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

As a standard, it is a must that the transport layer break messages that are received from the application layer into several <u>packets</u> that can be sent to the network layer.

Read more on transport layer here: brainly.com/question/26177113

#SPJ12

8 0
2 years ago
Other questions:
  • Which best describes what Pavel should do differently for the kids book?
    13·2 answers
  • It is always better to run over and give more information when you are giving a presentation versus quitting on time. true false
    15·2 answers
  • Which hexadecimal-type address refers to a physical networking device such as a network interface card?
    10·1 answer
  • By
    7·1 answer
  • Software is the word for:
    15·1 answer
  • Please help me on this please i am giving all of my points so please help me
    6·1 answer
  • PLEASE SOMEONE PLEASE HELP ME OUT!!!!
    10·2 answers
  • Ok it is important aspects which is perfect
    10·1 answer
  • Which of the following are safety guidelines when socializing online?
    14·1 answer
  • Why is the statement if x=y not working in python
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!