1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
2 years ago
8

I need help please, thank you

Computers and Technology
1 answer:
swat322 years ago
8 0
Select all answers except computers, xbox, playstation 5, and mobile!

hope this helps!
You might be interested in
List and briefly explain five activities for which a purchasing department normally has responsibility
melamori03 [73]
<span>Five activities for which a purchasing department normally has responsibility include: issuing their own purchase orders, meeting with different sales representatives, maintaining their own purchase records in accordance with state and federal law, administering contracts with sellers, and coming to a resolution regarding any purchasing problems that might arise.</span>
5 0
3 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
For this programming assignment, you have to write a Java program that tests whether a given input string represents a Valid E-m
Step2247 [10]

Answer:

To check if the email address is correct it should have only one "@" symbol, we have to split the input string by this symbol. The code in java to achieve this is the following:

class Main {

 public static void main(String[] args) {

   String email = "[email protected]";

   String[] email_split = email.split("@");

   long count_a = email.chars().filter(ch -> ch == '@').count();

   if(count_a == 1){

     System.out.println("User name:   "+email_split[0]);

     System.out.println("Domain name: "+email_split[1]);

   }else{

     System.out.println("There is no valid email address.");

   }

 }

}

Explanation:

The explanation of the code is given below:

class Main {

 public static void main(String[] args) {

   String email = "[email protected]"; //input string to evaluate if is valid email

   long count_a = email.chars().filter(ch -> ch == '@').count(); //Count how many times the symbol @ appears

   if(count_a == 1){ //A valid email only contains one at

     String[] email_split = email.split("@"); //separate the values using the at in an array

     System.out.println("User name:   "+email_split[0]); //the first element is the username

     System.out.println("Domain name: "+email_split[1]); //the second element is the domain name

   }else{

     System.out.println("There is no valid email address."); //If there isn´t an at or are more than one then display a message saying the email is not valid

   }

 }

}

8 0
3 years ago
And the Founder/Developer of PHP is ____________.
Bingel [31]

Answer:

b. RasmusLerdorf

Explanation:

RasmusLerdorf is the founder/developer of PHP. He created it in 1994. He is a   Danish national who migrated to Canada in 1980.He implemented PHP to support his personal home page and the language continued to get extended  by adding more and more functionality. The original language parser was redeveloped for version 3 in 1997. The latest release of PHP is 7.x made available since December 2015.

7 0
3 years ago
Which methods can you use to migrate user settings from windows 8.1 to windows 10?
seropon [69]

Windows Easy Transfer is used  to migrate user settings from windows 8.1 to windows 10,.

<h3>What is Windows Easy Transfer?</h3>

Windows Easy Transfer exists as a specialized file transfer program developed by Microsoft that permits users of the Windows operating system to transfer personal files and locations from a computer running an earlier version of Windows to a computer running a newer version.

The Windows Easy Transfer utility can be utilized to back up data from a computer before completing an upgrade or clean install of the Windows 8 operating system and then restore the data to the computer after the Windows 8 operating system exists installed.

Hence, Use Windows Easy Transfer. Copy the user profile from the old computer to the new computer. Complete an upgrade over the top of the old operating system. utilize the User State Migration Toolkit.

To learn more about Windows Easy Transfer refer to:

https://brainly.in/question/2787534

#SPJ4

7 0
2 years ago
Other questions:
  • A ____ appearing in the main text of a document indicates a footnote or endnote.
    15·1 answer
  • When you use information hiding by selecting which properties and methods of a class to make public, you are assured that your d
    14·1 answer
  • Please describe the role of games in modern society!
    15·2 answers
  • Money money money money
    8·2 answers
  • Chegg Suppose the heap is a full tree, size 2^n-1. what is the minimum number of steps to change a min heap to a max heap. Show
    5·1 answer
  • A drive is small enough to be carried in one's pocket.
    6·1 answer
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
  • Which structures protect the cell? Select two options.
    8·1 answer
  • What dictionary operation can you use to remove all the keys within the dictionary-named contacts?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!