1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
3 years ago
15

Please help!

Computers and Technology
1 answer:
LekaFEV [45]3 years ago
6 0
The answer to the addition problem is 859.98
You might be interested in
To change a selected shape’s height or width to a specific value, type the value in the Height or Width text boxes on the
Scrat [10]
Are you trying to change the shape of an item within your program by entering the values into text boxes that become variables?

What language are you using?
5 0
3 years ago
The cyclical, multistep process by which designers and engineers design, build, and taste a new product is called:
zzz [600]
The answer is Design Process.  <span>The cyclical, multistep process by which designers and engineers design, build, and taste a new product is called Design Process.   </span><span>There are multiple steps, including exploring, designing, planning, making, testing, and revising.</span>
7 0
3 years ago
A(n) ____ , a type of idps that is similar to the nidps, reviews the log files generated by servers, network devices, and even o
kobusy [5.1K]
An LFM IDPS

Using an LFM which stands for log file monitor, the system is able to review log files generated by servers, network devices, and even other idpss. Its main purpose is to look for signatures and patterns which might indicate that an intrusion is in the pipeline or has already happened.
This intrusion detection is enhanced due to the fact that LFM is in a position to look at several log files from different systems.




8 0
3 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
Advatages and disadvantages of power-concentrated train​
allochka39001 [22]

Answer:

1. Safety:

2. Cheap:

3. Increases Employment:

4. Bulk Quantity:

The Disadvantages of Rail Transport are as Follows:

1. Loss of Goods:

2. Unsafe for Fragile Items:

3. Late Bookings:

4. Unsuitable for Short Distances:

5. Unsuitable for Rural Areas:

Explanation:1. Safety:

Transportation by the means of railway ensures safety for the desired goods because unlike the road transports a train only stops at a desired station instead of the will of the driver. In case of road transports for example, the drivers can at any point of time decide to rest or stop for tea, refreshments, lunch or dinner.

2. Cheap:

Railway transport any day is cheaper as compared to air transport. As a matter of fact, railway transport is even cheaper than road transport because of the reason that goods in bulk quantities are carried from a desired destination to the other. In cases of road transport for instance, less goods as compared to road transport can be carried.

3. Increases Employment:

Railway transport helps people to carry cheap products from a place to another and sell them at high prices. As a result of this, a number of people who are unemployed find a source of their daily bread.

4. Bulk Quantity:

ADVERTISEMENTS:

Because railway transportation is cheaper as compared to air and road transport, goods can be carried in bulk quantities as a result of which a lot of time is saved.

It is true that as compared to air transport and road transport, rail transport is easier and cheaper but still it has a few disadvantages.

The Disadvantages of Rail Transport are as Follows:

1. Loss of Goods:

Because goods in bulk quantities are carried chances of goods getting lost are high in case of railway transport as compared to air and road transport.

2. Unsafe for Fragile Items:

Railway transportation is particularly unsafe for carrying fragile items like glass because these items can easily break at times when a train halts unexpectedly of when the train is speeding up at times.

3. Late Bookings:

ADVERTISEMENTS:

Because railway is the cheapest medium of transport, it is hard to find suitable bookings for the transportation of your goods. Railway transport is not suitable in cases of emergency.

4. Unsuitable for Short Distances:

Railway transport is unsuitable for carrying goods at shorter distances; road transport is most suitable in this case.

5. Unsuitable for Rural Areas:

Proper railway system is not build up in the Indian villages as a result of which railway transport is unsuitable in the villages of India. Whatever be the disadvantages of railway transport it was, it is and it will always be the safest and the best means for the transportation of goods.

5 0
3 years ago
Other questions:
  • Which area of the network would a college it staff most likely have to redesign as a direct result of many students bringing the
    10·1 answer
  • What is hyper transport
    10·1 answer
  • Suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported
    15·1 answer
  • The study of a current business and information system application and the definition of user requirements and priorities for a
    5·1 answer
  • Identify the benefit of modeling to communicate a solution.
    10·1 answer
  • 1.which screen appears after the password is typed (welcome, lock)​
    11·2 answers
  • What do you consider to be audit evaluation areas?
    14·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • Online activities among businesses
    9·1 answer
  • What is computer viras? Loist 2 preventive measures against it​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!