1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gogolik [260]
3 years ago
12

Applications require you to provide the following basic elements : name, contact information, and availability. True or False

Computers and Technology
1 answer:
iren2701 [21]3 years ago
6 0

True

Companies will not hire unless they know your name, availability, email, phone number, and any other legal personal information that they need to know

You might be interested in
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
mylen [45]

Answer:

The program to this question can be described as follows:

Program:

num= int(input('Enter a number: ')) #input value by user

st = '' #defining string variable

while num > 0: #define loop to calculte values binary number

   val= num % 2 # holding remainder (0 or 1) in val variable

   st =st+str(val) # store value in str variable

   num = num//2 #calculte quotient value

print("binary number is: ",st)

Output:

Enter a number: 5

binary number is:  101

Explanation:

Program description as follows:

Firstly the "num" variable is declared, for user input, then an "st" variable is declared, to calculates user input value binary number.

In the next step, a while loop is declared, inside the loop, another variable "Val" is declared, that holds value remainders, which is added on the "st" variable.

Outside the loop, the print method is used, that prints st variable holds value.

3 0
4 years ago
Intro to Computers quiz answers me need for test please help me hurry
RSB [31]

Answer:

Ethernet connection

Explanation:

4 0
3 years ago
You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240...Could not open
Serjik [45]

Answer:

firewall

Explanation:

The firewall could be used to protect the network from unauthorised access.Usually an ip could be whitelisted so it could transfer packets between allowing it connect through.

3 0
3 years ago
A hard drive with a spin speed of 7200 RPM, commences spinning at time = 0, at time = 1.326 ms what is the angle that the disk h
Flura [38]

Answer: I. 57º 17'   II. 1 rad.

Explanation:

A spin speed, implies the relationship between the angle rotated and the time  that has been spinning, which is equal, by definition, to the angular velocity.

ω = Δ∅ / Δt

In order to get the angle rotated in degrees, we need to convert first from RPM (revolutions per minute) to º/sec, as follows:

7200 rev/min *( 1 min/60 sec)* (360º/ 1 rev) = 7200* 6= 43200 º/s

Now, we know that the time passed since it started to spin, was 1.326 msec, i.e., 0.001326 sec.

Remembering that  ω = Δ∅ / Δt, solving for Δ∅, we get:

Δ∅ = 43200 º /s * 0.001326 sec = 57º 17'

II. In order to get the answer in rads, we can convert the rpm to rads/sec, as follows:

7200 rev/min *( 1 min/60 sec)* (2 π/ 1 rev) = 240 π rad/sec.

Applying the same equation as above, we get:

Δ∅ = 240 π rad/s * 0.001326 sec = 1 rad.

7 0
4 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
Other questions:
  • What is the most common programming language that's not python?
    15·2 answers
  • Put the following five steps in the order in which you would perform them to use the Paste Special function: ____. 1. Select and
    5·1 answer
  • OSHA requires training for employees on the hazards to which they will be exposed.
    12·2 answers
  • How do you get points without answering questions i need the points for my math D:
    5·2 answers
  • What language to learn to contribute to open source?
    11·1 answer
  • Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,
    14·1 answer
  • For each of the following polynomials, apply either the Muller's method or the Bairstow's method to find all real or complex roo
    15·1 answer
  • An abstract method ____.
    6·1 answer
  • Which camera required the photographer to project the image on paper
    9·2 answers
  • Complete the procedure for creating a contact group by selecting the correct term from each drop-down menu. 1. Click . 2. Enter
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!