1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
11

Why does this say I'm in middle school?

Computers and Technology
1 answer:
Andru [333]3 years ago
7 0

You can change your grade by going to your profile in the top right corner.

You might be interested in
Choose three typical responses for the Host utility, and explain what they indicate.
Karo-lina-s [1.5K]

Answer:

Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking capability, including most embedded network administration software.

Explanation:

7 0
3 years ago
Technology can cause a drop in input costs.<br> a. True<br> b. False
Marizza181 [45]
<span>True that technology can cause a drop in input cost. In a production process, there are three kinds of cost that called input cost, which are the direct material cost, direct labor cost, and overhead cost. Technology usage can make the production process more efficient by reducing labors included in the process. This condition leads to a cost reduction.</span>
6 0
3 years ago
Read 2 more answers
What is the name of a button on a website?
zhuklara [117]
May I know which button?
5 0
3 years ago
Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's man
Mrrafil [7]

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

7 0
3 years ago
Your task is to create a bash shell script that is able to backup all the C++ program files in your current directory. The algor
Oliga [24]

Answer:

backup() {

 read dirname;

 if [[ whereis . /`$dirname` 2>  sterr.exe]]  

    then

        mkdir  $dirname

 for f in . / *.cpp

 do

    cp f "path_to_dirname"

    echo "file backup complete"

}

backup( )

Explanation:

The bash script above is used to backup C++ source files in a directory to a backup directory which is created if it does not exist, and copy's each .cpp file to backup, then sends a message to declare its completion.

7 0
3 years ago
Other questions:
  • A user can easily move to the end of a document by pressing the _____ key combination.
    10·2 answers
  • Types of operating systems
    5·2 answers
  • Where should you click to edit an existing formula?
    12·2 answers
  • You specify the shape of an oval in a Java applet by defining the oval's:__________.
    5·1 answer
  • What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
    9·2 answers
  • Why are online payment services necessary?
    10·2 answers
  • Write down the bit pattern in the fraction of value 1/3 assuming a floating point format that uses Binary Coded Decimal (base 10
    10·1 answer
  • Label provides the code that executes if no case label is matched ​
    6·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • Which of the following is not the disadvantage of closed
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!