1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
5

1. What makes discrimination different from harassment? (Don't give me definitions.)

Computers and Technology
1 answer:
-BARSIC- [3]3 years ago
7 0
Discrimination includes acting against a race whereas harassment isn’t not allowing a race to do something but instead insulting them. For example not giving someone of a certain race a job is discrimination but if someone followed a person of another race down the street calling them rude names, that’s harassment
You might be interested in
3.5 lesson practice quiz Edhesive
erik [133]

Answer:

                                                                                     

Explanation:

6 0
3 years ago
Read 2 more answers
You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
cluponka [151]
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and the AP go through a 4-step process of authentication.
8 0
4 years ago
Research 3 distributions that utilize the big data file systems approaches, and summarize the characteristics and provided funct
OlgaM077 [116]

Answer:

Explanation:

1: The three most popular data systems that make use of Big Data file systems approach are:

The HDFS (Hadoop Distributed File System), Apache Spark, and Quantcast File System(QFS).

HDFS is the most popular among these and it makes use of the MapReduce algorithm to perform the data management tasks. It can highly tolerate faults and can run on low-cost hardware. It was written in Java and it is an open-source software.

Apache Spark makes use of Resilient Distributed Data (RDD) protocol. It is much faster and lighter than the HDFS and it can be programmed using a variety of languages such as Java, Scala, Python, etc. Its main advantage over HDFS is that it is highly scalable.

While QFS was developed as an alternative to the HDFS and it is also highly fault-tolerant and with space efficient. It makes use of the Reed-Solomon Error Correction technique to perform the task of data management.

2: The NewSQL databases were developed as a solution to the scalability challenges of the monolithic SQL databases. They were designed to allow multiple nodes in the context of an SQL database without affecting the replication architecture. It worked really well during the starting years of the cloud technology. Some of the databases that make use of New SQL technology are Vitess, Citus, etc.

Vitess was developed as an automatic sharding solution to the MySQL. Every MySQL instance acts as a shard of the overall database and each of these instances uses standard MySQL master-slave replication to ensure higher availability.

While, Citus is a PostgreSQL equivalent of the Vitess. It ensures transparent sharding due to which it accounts for horizontal write scalability to PostgreSQL deployments.

NoSQL database technology was developed to provide a mechanism for the storage and retrieval of data that is modeled in a way other than the tabular relations used in the traditional databases (RDBMS). The most popular database that makes use of the NoSQL technology is MongoDB. It functions as a cross-platform document-oriented database. It is known for its ability to provide high availability of replica sets. A replica set is nothing but a bundle of two or more copies of the data

3 0
3 years ago
The most popular transmission media option for wired home ethernet networks is ________ cable. fiber-optic power-line unshielded
tino4ka555 [31]
<span>This is called an unshielded twisted pair cable, which is also known as a UTP cable. This type of cable has four pairs of wires that are twisted around each other. Because the wires are like this, the electrical interference is reduced.</span>
3 0
4 years ago
What is element 115 and what is it from?<br> Also what did it do?
tekilochka [14]
Its temporary name, which is being used as a placeholder, is ununpentium. Element 115<span> is one of a number of super heavy </span>elements—elements<span> with an atomic number greater than 104—that are so short-lived, they can't be detected in nature. ... Creation of </span>element 115<span> during a particle collision of americium and calcium atoms</span>.
7 0
3 years ago
Other questions:
  • . Hackers generally disguise their IP address. True False
    9·1 answer
  • What is the statement describing? Agile team continuously adapt to new circumstances and enhance the methods of value delivery
    6·1 answer
  • This method of advertising is expensive but can be the most effective method.
    15·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks yo
    7·1 answer
  • The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
    5·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • A good way to assess your CPU usage is to:_______.
    13·1 answer
  • Not every organization integrates with the Internet, but all use some or most of the technology that gave rise to it.
    15·1 answer
  • Why is it essential for every person living in the 21st century to have a computer​
    9·1 answer
  • Which image file format consumes the most file<br> space?<br> 0<br> GIF<br> JPEG<br> PNG
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!