1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
2 years ago
11

Years ago when working a helpdesk, the most common question asked, almost daily, was about resetting passwords. What type of kno

wledge resource would this be
Computers and Technology
1 answer:
ser-zykov [4K]2 years ago
3 0

Answer:

What is the importance of NIOSH and OSHA in the service desk environment? They conduct research on work environments and provide recommendations relating to areas such as preventing work-related illnesses and injuries and creating safe and comfortable work spaces.

Explanation:

You might be interested in
Which of the following is the MOST important consideration when planning your budget?
nata0808 [166]
<span>Budget for fixed expenses before flexible expenses.</span>
5 0
3 years ago
Read 2 more answers
What is the difference between a Network Diagram and a Wiring Semantic?
stiks02 [169]

Answer:

Network diagram is the type of graphical networking chart that is basically used in the various type of computer telecommunication. The network diagram is useful for the networking designer and also for the network engineer for compiling the network documentation in detail.

Wiring semantic is the type of open source prototype platform which basically composed of the programming language and the IDE ( Integrated development environment). The wiring semantic consumer can affect the triggering the new data or information from the existing concepts.

7 0
3 years ago
Which of the following describes a Trojan horse?
HACTEHA [7]

Answer:

the answer is

c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

7 0
3 years ago
A structure that organizes data in a list that is commonly 1-dimensional or 2-
kobusy [5.1K]

Answer:

An array.

Explanation:

An array can be defined as a structure that organizes data in a list that is commonly 1-dimensional or 2-dimensional.

Simply stated, an array refers to a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.

Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements. Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

Hence, array elements are mainly stored in contiguous memory locations on computer.

6 0
3 years ago
Write a program that accepts a time as an hour and minute. Add 15 minutes to the time
Anastaziya [24]

Answer:

The code is given below

hours = int(input("Enter time in hour: "))

minutes = int(input("Enter time in minute: "))

total time = (hours * 60) + (minutes + 15 )

total hours = int(total minutes  / 60)

minutes  = total hours/ 60

print("Hours: " + str(hours))

print("Minutes: " + str(minutes))

5 0
3 years ago
Other questions:
  • Survey Q, Non-scoring: What role are you playing in your team?
    5·2 answers
  • An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the comp
    12·1 answer
  • You view a portion of a document on the screen through a ____.
    6·1 answer
  • (Analyze scores) Write a program that reads an unspecified number of scores and determines how many scores are above or equal to
    10·1 answer
  • To edit the color of the text in presentation software, choose the Font color command Text Color in the ________ ribbon toolbar.
    15·2 answers
  • Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only
    8·1 answer
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • My friend has 200 subs and i have only 36 can you help me its ACYT ZR
    9·2 answers
  • What is a distinguishing feature of 5G mm Wave?
    9·1 answer
  • What are the functions of information technology?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!