1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
6

In a _______ format, the date line and the signature block are centered.

Computers and Technology
1 answer:
kakasveta [241]3 years ago
6 0
The answer to this is C. Modified block
You might be interested in
Informatyka klasa 7 daje naj
Kay [80]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

3 0
3 years ago
2. Why do you think the order of operations still applies in Java? Give an example to show what could happen if you didn't use o
nasty-shy [4]

The order of operations still applies in Java because it is made up of a number of rules that helps to  decide the operators that are evaluated.

<h3>Does order of operations apply in Java?</h3>

Yes, Java is known to be one that tends to adhere as well as follows the standard arithmetic order that is made for their operations.

In Java, the order of an operator are seen to always examine themselves from left-to-right and the argument lists are always examined from left-to-right.

An example is seen in the expression of : A() + B() * C(D(), E()), where the given subexpressions are said to be examined in the order of: A(), B(), D(), E(), and C()

Therefore, The order of operations still applies in Java because it is made up of a number of rules that helps to  decide the operators that are evaluated.

Learn more about Java from

brainly.com/question/25458754

#SPJ1

3 0
2 years ago
A Gym Masters system programmer has just installed the first Windows Server 2016 sys- tem and now needs to do an initial configu
ZanzabumX [31]

Answer:

Windows Server 2016 comes in standard and data center editions and offers several types of installation for both: Desktop Experience (full GUI mode), Core (no GUI mode).

We'll be using the Core version which makes use of the command prompt as the main tool.

To begin the server configuration, After opening the command prompt, she needs to enter the “Sconfig” command

The configuration tasks are as follows;

1. Change the Name of the Computer

  • Type 2, and press Enter
  • Enter the new Computer Name and press Enter
  • You'll see  prompt as dialog box with the message "the computer needs to be restarted in order to complete the operation successfully” Click OK.
  • then another pops up as "You must restart your computer to apply these changes, Restart now?", Click YES.

2. Enable Remote Desktop

  • you can start again after the Restart, by  entering the “Sconfig” command
  • From the main menu, type "7" as the option number, press enter and options will be displayed
  • enable Remote Desktop for Clients running Remote Desktop with Network Level Authentication
  • enable Remote Desktop for clients running any version of Remote Desktop

3. Perform Network Settings

Here, the IP address can be configured to be assigned automatically by a DHCP server or you can assign a static IP address manually.

  • type "8" from the main menu and press Enter.
  • a list of available network adapters that are attached to the server is shown, then Type 1, or the index number of the adapter that you want to configure, and then press Enter.
  • the current configuration for the network adapter that you selected is displayed.
  • Now type 1 and press Enter to configure the IP address for the selected network adapter
  • Select option 1 and type S, then press Enter to manually assign a static IP to the network adapter.
  • Type in the static IP address, and then press Enter
  • Type in the Subnet mask, and then press Enter
  • Type in the default gateway, and then press Enter
  • Select option 2; by typing 2 and press Enter
  • Type in the preferred DNS server, and then press Enter.
  • You will be prompted with “Preferred DNS server set.” Click OK.
  • Type in the alternate DNS server, and then press Enter.
  • You will be prompted with “Alternate DNS Server set.” Click OK.

4. Connect ISCSI Shared Storage

  • open the command prompt
  • open Microsoft ISCSI initiator by entering “iscsicpl” into the command line
  • type in the IP address or DNS name
  • connect your storage via the iscsi target storage server IP address by Clicking Connect.

5. Format SCSI Storage Disk

  • open the command prompt
  • type “diskpart” and press Enter
  • type “list disk” to see all the disks available on the server
  • select disk 1
  • “online disk” and “attributes disk clear” commands can be used to bring the disk online and to check if the partition is writable.
  • Next, type “list partition” to see available disk partitions under a server
  • Choose the partition you need with the “select partition 1” or which ever number is designated to the partition.
  • type in “format fs=NTFS” to format the partition
  • type in the “assign letter=F” command to assign a letter to the partition

Done.

6 0
4 years ago
A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n
skad [1K]

Answer: Change management

Explanation:

The change management document contains the entire details regarding the changes that could be brought about in the network. It starts with identifying the change, Then it goes for approval of the change and finally if it is approved then the change is implemented in the final step.

Some of the documents in change management are:

1. change management planning

2. the scope of the change

3. create the project plan for the identified scope.

4. The associated risk management plan.

S consulting the change management the NOC technician could know where the problem is as it contains detail of the data entry and the related risk  and mitigation's in the change management document.

4 0
3 years ago
Read 2 more answers
The IT director instructed the systems administrator to build a server to support the accounting department's file growth. The I
Mamont248 [21]

Answer:

Option (C) FAT32 File System Type

Explanation:

  • FAT32 File System Type cannot be encrypted by the accounting users.
  • FAT stands for File Allocation Table. It is a file system architecture.
  • The File Allocation Table is an index table which contains the details about each cluster ( disk storage space ).
  • By traversing the File Allocation Table, the operating system gets the details the file ( where it is located ) and the size of the file.
  • The FAT32 file system contains more number of possible clusters.
  • In this system, 32 bits are used to store the total number of possible clusters.
  • In FAT32 file system, the transparent encryption is not supported.
  • So, option (C) is correct.
  • All other options are wrong options.
3 0
4 years ago
Other questions:
  • Clicking on this will minimize all open windows.
    5·2 answers
  • Step 1: Configure the initial settings on R1. Note: If you have difficulty remembering the commands, refer to the content for th
    10·1 answer
  • Welcome back to school people!
    15·2 answers
  • 9. True False
    8·1 answer
  • What would be an ideal scenario for using edge computing solutions? a regional sales report uploaded to a central server once a
    14·1 answer
  • Why can i go to discord if my school blocks it-
    9·1 answer
  • Asking for certain data twice is
    6·2 answers
  • Could anyone beat my typing?<br><br> https://keyma.sh/custom/33K7C
    5·1 answer
  • This seems like a good time to ask the basic question, “How’s it going in class?” Feel free to offer constructive feedback about
    6·2 answers
  • In python please.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!