1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
11

Jean-Ann works in the finance business. She analyzes insurance applications in order to determine the level of risk involved in

insuring the applicant, then decides whether or not to insure them. Jean-Ann works as
Computers and Technology
1 answer:
Tamiku [17]3 years ago
5 0

Answer:

She works as a insurance or tech applicator

Explanation:

You might be interested in
Hey Yo, i need some help, Whats 2+2?
Goryan [66]

Answer:

4

Explanation:

4 0
3 years ago
Read 2 more answers
What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology
Ilya [14]

Answer:

hybrid cloud

Explanation:

hybrid cloud is a cloud environment that employs both public and private cloud services.

Hybrid cloud gives businesses more flexibility and greater efficiency in coverage due to its ability to move files between public and private cloud.

7 0
3 years ago
A disk has 4000 cylinders, each with 8 tracks of 512 blocks. A seek takes 1 msec per cylinder moved. If no attempt is made to pu
shutvik [7]

Answer:

The answer is below

Explanation:

a)

If the blocks of a file are not put together, that is for nonadjacent block of files to each other, the time (t) taken to read a 100 block file is:

t = (average seek + rotational latency + transfer time) * 100 block

Average seek = 5 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec

t = (5 + 10 + 0.02) * 100 = 1502 msec

b)

If the blocks of a file are put together, that is for adjacent block of files to each other, the time (t) taken to read a 100 block file is:

t = (seek time * mean interblock distance + rotational latency + transfer time) * 100 block

seek time = 100 microsec = 0.1 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec, mean interblock distance = 2 cylinders

t = (0.1*2 + 10 + 0.02) * 100 = 1022 msec

3 0
3 years ago
A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
inysia [295]

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

  1. rstrui (System Restore tool will run),
  2. runas (using different permission to run a tool or program),
  3. tasklist (currently running programs are shown
  4. gpupdate (Group policies are refreshed)
  5. gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

6 0
3 years ago
In response to a recent outbreak of computer viruses, Babbage Industries, a large technology company, installs computer virus pr
Vinil7 [7]

Answer:

The answer is antivirus solution implementation and planning.

Explanation:

Enterprises use antivirus implementation to protect from threats of different types such as Trojan horses, rootkits, ransomware, spyware, and botnets. Withing organizations, this implementation requires a proper planning and implementation plan that helps companies to protect the enterprise system. So, antivirus implementation and planning is the answer.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Approximately what percent of U.S. businesses have some form of remote work program? (from Chapter 1)
    14·1 answer
  • When creating an electronic slide presentation, Eliza should ensure that her presentation contains
    6·1 answer
  • Why should you follow up with your interview after a job interview
    15·2 answers
  • The background image does not affect any cell’s format or content. _______
    5·1 answer
  • 12. Which of the following is CourseBit®? (1 point)
    6·1 answer
  • b) Derive the logic expressions for the incrementor and 7-sgement decoder. Since software can perform gate-level optimization, y
    7·1 answer
  • Construct pseudocode for a program that prints ‘Hello World’ on the screen.
    7·2 answers
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • Write. true or false​
    5·2 answers
  • What does computer graphics mean?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!