1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
2 years ago
15

Cloud suites are stored on your hard drive and are available anywhere you can access the Internet

Computers and Technology
1 answer:
puteri [66]2 years ago
5 0
Is that a question or an answer... im confused?!?!

You might be interested in
Which is the least technically experienced technical support group?
Nezavi [6.7K]

Answer:

Tier 1 support

Explanation:

Of the given options, tier 1 support technical group is the least experienced group. This group of technicians is also referred to as level 1 technical group.

The tier 1 or level support are made up of junior technician, and they have few technical understandings.

Their roles include email response and basic troubleshooting, attending to phone calls, among others.

When a problem cannot be solved by tier 1 support  technicians, they pass the problem to tier 2 support technicians,  

5 0
2 years ago
Any movie/show suggestions??
trasher [3.6K]
The office is a good one. If you haven’t ever watched it
6 0
2 years ago
Read 2 more answers
The system should enable the staff of each academic department to examine the courses offered by their department, add and remov
Ganezh [65]

Answer:

See attached picture.

Explanation:

See attached picture.

3 0
3 years ago
Supposethatyoubet$5oneachofasequenceof50independentfairgames. Usethecentrallimittheorem to approximate the probability that you
lions [1.4K]

Answer:

0.119

Explanation:

50 independent fair games

Mean will be 50/2 = 25

Standard deviation of the loosing probability is :

\sqrt{50*0.5*0.5} * 10 = 33.536

we have to loose 33 times out of 50 games.

To find the approximate probability we use z- value table.

z value =  \frac{33-25}{3.35}

z - value = 2.2659

Looking at the z-value table we get 0.119.

8 0
3 years ago
Create a program that contains 4 methods / functions... main(), getTestScores(), calcAverage(), and displayAverage(). The main()
jeyben [28]

Answer:

import java.util.Scanner;

public class  num6{

   static int getTestScores(){

       System.out.println("Enter the Score");

       Scanner in = new Scanner(System.in);

       int score = in.nextInt();

       return score;

   }

   static double calcAverage(int score1, int score2, int score3){

       return (score1+score2+score3)/3;

   }

   static void displayAverage(double ave){

       System.out.println("The Average is "+ave);

   }

   public static void main(String[] args) {

       int num1 = getTestScores();

       int num2 = getTestScores();

       int num3 = getTestScores();

       //Calling Calculate Average

       double average = calcAverage(num1,num2,num3);

       //Calling displayAverage

       displayAverage(average);

   }

}

Explanation:

  • Using Java programming Language
  • Create the four methods
  • getTestScores() Uses the Scanner Class to receive an in variable and return it
  • calcAverage() accepts three ints as parameter calculates their average and return it
  • displayAverage() Accepts a double and prints it out with a concatenated string as message
  • In the Main Method, getTestScores is called three times to obtain three numbers from the user
  • calAverage is called and handed the three numbers
  • printAverage is called to output the calculated average
8 0
2 years ago
Other questions:
  • What happens to formulas with relative cell references when they are copied using the fill handle?
    12·1 answer
  • What type of malware is heavily dependent on a user in order to spread?
    11·1 answer
  • Match these items. 1 . Naturalization Act stated that a foreigner had to live in the United States fourteen years to become a ci
    5·1 answer
  • During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo
    9·1 answer
  • Every brand of computer has its own binary language, called
    14·1 answer
  • To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted dec
    9·1 answer
  • (03.05 LC
    14·1 answer
  • Name any two procedure oriented programming language​
    15·1 answer
  • What does the Finder do?
    5·1 answer
  • Write a function solution that given an array a of n integers (between -100 and 100), returns the sign (-1,0,1) of product of al
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!