1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
13

Your program will be used by many departments at the university. Your comments will be important to their IT people. What would

be a useful comment?
Computers and Technology
1 answer:
mixer [17]3 years ago
4 0

Answer:

c

Explanation:

on edg

You might be interested in
Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
enyata [817]

Answer:

The correct option to the following question is an option (D) Masking.

Explanation:

The following option is correct because Masking is the ability to apply mask on the value with the help of bitwise AND, OR and XOR,  

That's why, when Alison looks the Social Security Number then it looks different and this is the 9 digits of Social Security Number which is in three parts, the first part is for the area, the next part is for group number and last part is for the serial number.

5 0
4 years ago
Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by alte
prisoha [69]

Answer:

Option(b) i.e "utility virus" is the correct answer to the given question

Explanation:

The utility virus sometimes affected the operating system .It created the new files in the computer that makes the computer system slow .The utility virus making the spreading of malware in the computer system

The main objective of utility virus damaging the software program that impacts a pc or infects also it negatively by changing the way the machine operates without the user knowledge or the permission.

  • File conversion is used for converting the file extension it does not impact on computer damaging that's why this option is incorrect .
  • Hotspot is used to giving the access of internet it does not impact on computer damaging that's why this option is incorrect .
  • File compression utility  and  ZIP is used to reducing the file size it does not impact on computer damaging that's why this option is incorrect.

Therefore utility virus is the correct answer .

3 0
3 years ago
Read 2 more answers
Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
Strike441 [17]

Answer:

yes it can communicate with all interfaces on the router.

Explanation:

PC1 has the right default gateway and is using the link-local address on R1. All connected networks are on the routing table.

Netsh may be a Windows command wont to display and modify the network configuration of a currently running local or remote computer. These activities will tell you in how manny ways we can use the netsh command to configure IPv6 settings.

To use this command :

1. Open prompt .

2. Use ipconfig to display IP address information. Observe the  output whether IPv6 is enabled, you ought to see one or more IPv6 addresses. A typical Windows 7 computer features a Link-local IPv6 Address, an ISATAP tunnel adapter with media disconnected, and a Teredo tunnel adapter. Link-local addresses begin with fe80::/10. ISATAP addresses are specific link-local addresses.  

3. Type netsh interface ipv6 show interfaces and press Enter. note the output listing the interfaces on which IPv6 is enabled. Note that each one netsh parameters could also be abbreviated, as long because the abbreviation may be a unique parameter. netsh interface ipv6 show interfaces could also be entered as netsh  ipv6 sh i.

4. Type netsh interface ipv6 show addresses  Observe the results  of the interface IPv6 addresses.

5. Type netsh interface ipv6 show destinationcache and press Enter. Observe the output of recent IPv6 destinations.

6. Type netsh interface ipv6 show dnsservers and press Enter. Observe the results listing IPv6 DNS server settings.

7. Type netsh interface ipv6 show neighbors and press Enter. Observe the results listing IPv6 neighbors. this is often almost like the IPv4 ARP cache.

8. Type netsh interface ipv6 show route and press Enter. Observe the results listing IPv6 route information.

5 0
3 years ago
Write a pseudocode to add the first 100 even numbers.
Allushta [10]

Even numbers are numbers whigh are divisible by 2. Therefore, the first even number is 2. A pseudocode which adds the first 100 even numbers can be written thus :

counter = 0

sum = 0

interval = 2

while counter < 100 :

sum = sum + interval

interval += 2

counter +=1

print(sum)

  • A counter takes count of the number of values summed

  • Initializes a variable which holds the sum of even values

  • Since even numbers are divisible by 2; every factor ; increase every added value by 2

  • The program ends once counter is 100

Learn more : brainly.com/question/25327166

6 0
3 years ago
Write a class that specify the characteristics of a car, like type (sedan, jeep, mini, SUV, etc), gear (auto, manual), maximum s
iVinArrow [24]

Answer:

Answered below

Explanation:

This is written in Kotlin programming language.

//Creating the class Car. The primary //constructor declares car's properties which //are initialized when it's objects are created.

class Car(

val type: String,

val gear: String,

val maxSpeed: Double,

val avgFuelConsumption: Double)

//Creating several objects of car.

val sedan: Car = Car("sedan", "auto", 23.4, 500)

val jeep: Car = Car("jeep", "manual", 40, 350)

val mini: Car = Car("mini", auto, 26.7, 86, 234)

8 0
3 years ago
Other questions:
  • write an algorithm that gets the price for item A plus the quantity purchased. The algorithm prints the total cost, including a
    5·1 answer
  • Write an application in which you declare an array of eight first names. Write a try block in which you prompt the user for an i
    7·1 answer
  • An example of movement as a gameplay mechanic includes
    14·2 answers
  • Fred has to write a report on the general opinion of the influence of television on political decision-making. What internet res
    7·2 answers
  • I need help in creating a Java Program; To calculate the chapter from which you solve the programming exercise, below are the re
    7·1 answer
  • UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01100110, 0111010
    13·1 answer
  • Write a Java program that prints out a 4x4 square (like the one below)
    11·1 answer
  • Which of the following statements about software licensing are true? Select 3 options.
    5·1 answer
  • The conversion rate is the percentage of what? A. Customers who received cold calls B. Sales leads who reached the interest stag
    13·1 answer
  • (blank) is an expansion card that enables a computer to connect to a network:
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!