1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
9

Do warnings ever expire?

Computers and Technology
2 answers:
DIA [1.3K]3 years ago
7 0
What’s a warning? how do i get one haha
shutvik [7]3 years ago
6 0
Warning are on your account until you get enough to have your account terminated.
You might be interested in
What term is used in an os gui to describe a specialized file that contains information about the locations of other files?
Ugo [173]
The term "Folder" is used in an OS GUI to describe a specialized file that contains information about the locations of other files. OS stands for Operating System and GUI stands for Graphic User Interface, the interface that allows users to interact with computers. Folder is <span>an icon on a computer screen. By clicking it the user access a directory containing related files or document.</span>
5 0
3 years ago
Classify each of the cost items (a-h) into one of the business functions of the value chain Cost Item Value Chain Business Funct
rewona [7]

Answer:

Explanation:

a)In this process, the power, electricity, water, etc consumed by the Production department are assembled.

b)In this department, the products are processed and shipped to the retail customers. The costs required for shipping the Latitude line of products comes under the Distribution department.

c)The activities like planning, designing, white box and black box testing are done in the Design process of a product.

d. Salary of computer scientist working on the next generation of servers related to Development.

e. Cost of Dell employees' visit to a major customer to demonstrate Dell?s ability to interconnect with other computers related to Customer Service or Marketing.

f)The cost required for testing the products comes under the Research and development.

g)Marketing department includes the costs of market research, selling the products and other business costs.

h)Purchasing the cartridges from the external suppliers comes under the production department.

7 0
2 years ago
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
GuDViN [60]

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

  • Accounts payable could be disturbed by changing cash in payment false.
  • Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
  • Transaction fraud like hacking, masquerading are very common in a networked system.
3 0
3 years ago
You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
creativ13 [48]

Select All that apply

Answer:

These are the things that are would be appropriate in a post.

B. Checking your post for typos or grammatical errors.

C. Giving credit to the original author.

D. Including your own thoughts about the article.

Explanation:

The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.

7 0
2 years ago
Python pseudocode: Can anyone please help me please? I’m so desperate for the answer.
Katena32 [7]

Answer:

You need “input(prompt)” and “sum(iterable)”

Explanation:

import numpy

class Students:

   def __init__(self, students_size, marks_size):

       self.students_size = students_size

       self.marks_size = marks_size

   def input_name(self):

       return input("Name of the student:")

   def input_marks(self):

       for __ in range(self.marks_size):

           yield int(input("Mark:"))

   def input_students_data(self):

       for __ in range(self.students_size):

           name = self.input_name()

           yield name, list(self.input_marks())

if __name__ == "__main__":

   students = Students(students_size=3, marks_size=5)

   name = numpy.empty([students.students_size], dtype="<U100")  

   # more space might be needed for long names      

   marks = numpy.empty([students.students_size, students.marks_size])

   for i, (student_name, student_marks) in enumerate(                        

           students.input_students_data()):

       name[i] = student_name

       marks[i] = student_marks

       total = sum(student_marks)

       print("total: {:g}, average: {:g}".format(total, float(total)/students.marks_size))

8 0
3 years ago
Other questions:
  • You have just been named Director of Data Administration of General Hardware Co. General Hardware maintains a large central IS o
    15·1 answer
  • Define a Python function called leng_of_str to calculate the length of a string (Hint: Do not use the len function to find the l
    14·1 answer
  • Label 14 parts of the inside of a computer
    6·1 answer
  • Janice usually works on a particular workbook that contains all business related data. She decides to keep a backup of all the d
    7·2 answers
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • Defeating authentication follows the method–opportunity–motive paradigm.
    5·1 answer
  • A desktop computer (named workstation22) can’t connect to the network. A network card was purchased without documentation or dri
    15·1 answer
  • Which support function under Tech Mahindra is governing data privacy and protection related requirements
    15·1 answer
  • For the function below, which variables have the same scope?
    5·2 answers
  • 1. Using a microphone to create an audio file to accompany a message is an example of how data is processed and sent to an outpu
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!