1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
6

I need help ASAP please and thank you!

Computers and Technology
1 answer:
S_A_V [24]3 years ago
6 0

Answer:

Explanation: For the best approach, It would say Option 3, you're supporting the waiter and making the rude customer feel as if they got what they wanted of complaining to the manager.

The worst approach I think would be Option 4, but this feels opinion based. Choose what you feel would be the best approach for this one.

You might be interested in
Describe at least two ways social media has impacted cybersecurity.
dybincka [34]

Answer:

Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.

Explanation:

7 0
3 years ago
. Suppose an instruction takes 1/2 microsecond to execute (on the average), and a page fault takes 250 microseconds of processor
saul85 [17]

Answer:

a. 100.

b. 31500.

Explanation:

So, we are given the following data which is going to help in solving this particular question.

The time required to execute (on the average) = 1/2 microsecond , a page fault takes of processor time to handle = 250 microseconds and the disk time to read in the page = 10 milliseconds.

Thus, the time taken by the processor to handle the page fault = 250 microseconds / 1000 = 0.25 milliseconds.

The execution time = [ 1/2 microseconds ]/ 1000 = 0.0005 milliseconds.

The number of Pages sent in a second by the disc = 1000/10 milliseconds = 100.

Assuming U = 1.

Hence, the disc transfer time = [2/3 × 1 } + [ 1/3 × 0.25 milliseconds + 15 ] × 2.

=0.667 + 15.083.

= 15.75 millisecond.

Average number of instruction = 15.75/0.0005 = 31500.

8 0
3 years ago
I am stuck on these 2 questions. Can someone help me please?
Debora [2.8K]

Answer:

My answer could not be submitted because of some signs and symbols in my solution.

So, I've added the answer and a comprehensive explanation as an attachment.

Note that the question is answered using Python programming language.

Explanation:

Lines that start with # are used to explain the program

<em>See attachment</em>

Download txt
5 0
3 years ago
What does network administration normally include?
vovikov84 [41]

Answer:

B and D.

Explanation:

An individual working as a network administrator is responsible for a variety of different tasks which can include the design of the network itself, security for the network, and identifying and fixing issues. This is done in order to keep the computer network up-to-date and functioning as intended within the company or organization.

3 0
3 years ago
Write the function listBuilder(l1, length) that takes a list of strings called l1 and an int called length and returns another l
Grace [21]

Answer:

The solution code is written in Python 3:

  1. def listBuilder(l1, length):
  2.    result = []
  3.    for x in l1:
  4.        if(len(x) >= length):
  5.            result.append(x)
  6.    return result

Explanation:

Firstly, we create a variable result to hold the list will be returned at the end of the function. (Line 1)

Next, we create a for-loop to traverse the string in the l1 list (Line 4) and check for each string if their length is equal or bigger than the input length (Line 5). If so, we use append method to add the string to the result list.

At the end, return the result list as output (Line 8).

7 0
4 years ago
Other questions:
  • What area contains the command used to customize the print options in microsoft excel?
    9·1 answer
  • In preparing categorical variables for analysis, it is usually best to​ Select one:
    6·1 answer
  • ________ reality is the addition of digital information directly into our reality, either to add more detail or to remove unwant
    7·1 answer
  • EASY QUESTIONS! 10 POINTS AND BRAINLIEST FOR BEST ANSWER! PLEASE HELP ANSWER THIS only if you know BOTH ANSWERS!
    6·2 answers
  • Database software lets the user sort information alphabetically, chronologically, or numerically. Which is NOT a commonly used d
    7·1 answer
  • Which function of NOS involves swapping programs and files
    6·1 answer
  • Read a sentence from the console.
    6·1 answer
  • A message can be...........<br>differently by different people.​
    8·1 answer
  • Ishmael would like to capture a selected potion of his screen and then capture action he performs on that selected portion. What
    5·1 answer
  • when doing a complex presentation which of the fallowing will be the best tool to begin designing your presentation
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!