1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
11

To combine concepts or ideas into a whole is called

Computers and Technology
2 answers:
netineya [11]3 years ago
7 0
It’s A lllllllllllllllllllll
Vinil7 [7]3 years ago
3 0
A. synthesizing im pretty sure :)
You might be interested in
Which of the following networks had these two goals: a) allowing scientists to work together on scientific projects; and, b) fun
mrs_skeptik [129]

Answer:

ARPANET

Explanation:

It was the ARPANET sponsored by the US Department of Defense to enable scientists collaborate on research.

5 0
3 years ago
Read 2 more answers
The actual database of Active Directory shared resources is stored on one or more computers designated as:
RideAnS [48]

Answer:

2. domain controllers.

Explanation:

  • A domain is defined as a collection of users, computers, database servers, etc that are grouped together for some common purpose.
  • The database of these shared groups and resources is stored on one or more computers known as domain controllers.
  • It is a server that manages these groups that work together on the same network.
  • It is also responsible for administrating security and managing permissions in order to control access to the resources which are shared between multiple computers and users in one or more domains.
  • These permissions involve user authentication and authorization. Domain controllers is used to acknowledge authentication requests of users by verifying their username and password.
  • Domain controllers simplify security management in larger networks.
  • However domain controller serves need more hardware and resources for the purpose of securing shared information.
5 0
3 years ago
In Java; Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or
Free_Kalibri [48]

Answer:

import java.util.Scanner;

public class NestedLoops

{

public static void main(String[] args) {

 Scanner scnr = new Scanner(System.in);

       int numRows;

       int numColumns;

       int currentRow;

       int currentColumn;

       char currentColumnLetter;

       

       System.out.print("Enter number of rows: ");

       numRows = scnr.nextInt();

       System.out.print("Enter number of columns: ");

       numColumns = scnr.nextInt();

       

       for(int i = 1; i <= numRows; i++){

           currentColumn = 1;

           currentColumnLetter = 'A';

           for(int j = 1; j <= numColumns; j++){

               System.out.print("" + i + currentColumnLetter + " ");

               currentColumn++;

               currentColumnLetter++;

           }

       }

}

}

Explanation:

Ask user to enter the number of <em>rows</em> and <em>columns</em>.

Create a nested for loop, outer loop goes until <em>numRows</em> and inner loop goes until <em>numRows</em>.

Inside the first loop, set <em>currentColumn</em> to 1 and <em>currentColumnLetter</em> to 'A'. This way for after each row column value starts from 1 and letter value starts from A.

Insite the second loop, print the row value - <em>i</em>, and <em>currentColumnLetter</em>. Also,increment <em>currentColumn</em> and <em>currentColumnLetter</em> values by 1.

4 0
3 years ago
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
Natasha_Volkova [10]

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

3 0
3 years ago
Which is a example of fixed expense <br><br> -food<br> -clothing<br> -entertainment<br> -rent
Artemon [7]
Salutations!

<span>Which is an example of fixed expense?

Rent is an example of fixed expense, It doesn't matter whether you sell a widget or produce thousand of them, you must still pay the rent in any </span><span>circumstances.
</span>
Hope I helped.
6 0
4 years ago
Read 2 more answers
Other questions:
  • The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
    6·1 answer
  • A network manager prevents users accessing certain websites. She does this by setting up:
    7·1 answer
  • Which device or software application detects errors in system configurations?
    8·1 answer
  • The autofilter sort method works on a(n)____ field(s).
    15·1 answer
  • Difference between a print device and a printer
    13·1 answer
  • Unlocking your smart phone remote security protections that protect your mobile device from meniscus applications
    5·1 answer
  • Which pair of features is relevant when buying a pc?
    9·2 answers
  • Question 1 (10 points)
    8·1 answer
  • Is a free verse a poetry that has no images
    5·2 answers
  • Select the correct answer.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!