1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
8

Free Write Friday 2/26/21

Computers and Technology
1 answer:
Bad White [126]3 years ago
4 0
Write about art bc thags always so cool
You might be interested in
The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadshe
kondor19780726 [428]

Answer:

WAHTSTFYHHTHIEBWIBWDKF

Explanation:thx

FOR A SEC

7 0
4 years ago
nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in th
Rina8888 [55]

Complete Question:

Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync?

Answer:

Network Time Protocol (NTP).

Explanation:

As the IT systems administrator, you can set the network time protocol (NTP) to make sure that your client machines and the server times are in synchronization.

A network time protocol (NTP) can be defined as an internet standard protocol which is used by an IT system administrator to synchronize a computer's clock to a particular time reference over packet switched or local area network (LAN) and variable-latency data networks. NTP was developed at the University of Delaware by Professor David L. Mills.

<em>Basically, the network time protocol uses the coordinated universal time (UTC) and a client-server model to measure the total round-trip delay for a computer process. </em>

8 0
3 years ago
State one device that may be found on a computer monitor that is used for video conferencing
torisob [31]

Answer: Camera and Microphone

Explanation:

This can be  embedded on to the monitor.m

Camera for Visual

Microphone for radio.

5 0
2 years ago
Write a class called MagicSquare, which contains a single method called check that accepts a two-dimensional array as an argumen
ira [324]

Answer:

public class MagicSquare {

   public static void main(String[] args) {

       int[][] square = {

               { 8, 11, 14, 1},

               {13, 2, 7,12},

               { 3, 16, 9, 6},

               {10, 5, 4, 15}

       };

       System.out.printf("The square %s a magic square. %n",

               (isMagicSquare(square) ? "is" : "is not"));

   }

   public static boolean isMagicSquare(int[][] square) {

       if(square.length != square[0].length) {

           return false;

       }

       int sum = 0;

       for(int i = 0; i < square[0].length; ++i) {

           sum += square[0][i];

       }

       int d1 = 0, d2 = 0;

       for(int i = 0; i < square.length; ++i) {

           int row_sum = 0;

           int col_sum = 0;

           for(int j = 0; j < square[0].length; ++j) {

               if(i == j) {

                   d1 += square[i][j];

               }

               if(j == square.length-i-1) {

                   d2 += square[i][j];

               }

               row_sum += square[i][j];

               col_sum += square[j][i];

           }

           if(row_sum != sum || col_sum != sum) {

               return false;

           }

       }

       return d1 == sum && d2 == sum;

   }

}

5 0
3 years ago
What is the definition of a performance, such as a poetry reading? O A. A work of art installed in public OB. A presentation of
Anvisha [2.4K]

Answer:

(B) A presentation of creative works.

Explanation:

Because performing is similar to presenting and poetry is similar to free writing, or creative words.

3 0
3 years ago
Other questions:
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • Is 49 greater than y? Which below is correct?
    12·1 answer
  • Which of the following options allow you to access a computer remotely? Check all that apply.
    10·1 answer
  • In Java; Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or
    15·1 answer
  • Which of the following skills do employers in any field expect their employees<br> to have?
    5·1 answer
  • How do you make computers or microwaves?
    13·1 answer
  • 4.2 lesson practice helps plzs
    9·1 answer
  • Which of the following commands should be used if a user does NOT want the header which has been created to appear on the first
    13·1 answer
  • You have searched a database to locate US cities with population counts above 1 million people. You need to present the results
    6·2 answers
  • A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!