1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
6

1. Es un símbolo que indica que se ha de realizar cierta operación específica entre uno o varios

Computers and Technology
1 answer:
irina1246 [14]3 years ago
6 0

Answer:

b) Operador

Explanation:

Un operador en un lenguaje de programación es un símbolo que le dice al compilador o intérprete que realice una operación matemática, relacional o lógica específica y produzca un resultado final.

En el lenguaje de programación computacional, un operador es un símbolo o construcción que se define dentro del lenguaje de programación que indica al intérprete o compilador lo lógico, relacional, matemático, a realizar sobre un valor o entre valores.

Ejemplos de operadores son;

Operador de adición; +

Operador lógico; Y

Operador de asignación; =

Operador de comparación; >

operador typeid; typeid

You might be interested in
FILL IN THE BLANK.
Veseljchak [2.6K]

Answer:

It is measured in megahertz (MHz) and gigahertz (GHz).

Hope this helps.

3 0
3 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
exis [7]
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
4 0
4 years ago
A(n) ____ allows others besides the manufacturer to develop software to run on the system or device.
RideAnS [48]

Answer:

Application Programming Interface.

Explanation:

Application Programming Interface(API) is a collection of function, routines, procedures and the protocol which are used create a software application.The main role of API is that it defined or specified how the components of software will interact.

The objective of the Application Programming Interface that it the manufacturer or develop software that is running on system or device. The advantage of using the Application Programming Interface is that we can develop a better program in a very manner by using the API.

5 0
4 years ago
The application reliability team at your company this added a debug feature to their backend service to send all server events t
Paraphin [41]

Answer:

The correct answer to the following question will be Option A.

Explanation:

The given question is incomplete and the complete question will be:

The event records are at least 50 KB and at most 15 MB and are expected to peak at 3,000 events per second. You want to minimize data loss. Which process should you implement?

Append metadata to file the body.

Compress individual files.

Name files with a random prefix pattern.

Save files to one bucket

(B)

Batch every 10,000 events with a single manifest file for metadata.

Compress event files and manifest files into a single archive file.

Name files using serverName-EventSequence.

Create a new bucket if a bucket is older than 1 day and save the single archive file to the new bucket. Otherwise, save the single archive file to the existing bucket.

(C)

Compress individual files.

Name files with serverName-EventSequence.

Save files to one bucket

Set custom metadata headers for each object after saving.

(D)

Append metadata to file the body.

Compress individual files.

Name files with serverName-Timestamp.

Create a new bucket if the bucket is older than 1 hour and save individual files to the new bucket. Otherwise, save files to the existing bucket.

  • Therefore, in option A, a name file can be used with a prefix pattern randomly. So, it will be the right answer
  • The other three options such as C, B and D are incorrect because they are using name files with "serverName-EventSequence" or "serverName-Timestamp" which causes the distribution in the backend irregularly.

7 0
3 years ago
Other questions:
  • How do you plan to keep your personal and professional connections and activity seperate on various social media platforms?
    15·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • How do you create a logo on Adobe illustrator
    8·1 answer
  • Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were se
    7·1 answer
  • A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
    9·2 answers
  • You have observed that it is possible that some of your organization's projects may end up having little or no value after they
    11·1 answer
  • Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to rese
    6·1 answer
  • An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
    15·1 answer
  • In order to access the internet, it is not necessary to have an Internet Service Provider (ISP).
    6·2 answers
  • What are the 3 main colors for a computer screen?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!