What is the best description of an unbound control?

it is connected to a table
it is linked to an external file
it is unlimited in character length
it is unlinked to a firm’s underlying data

Answers

Answer 1
It is unlinked to a firms underlying data

Related Questions

Which of the following terms refers to the area of the hard drive used for virtual memory?

A. virtual file

B. data file

C. swap file

D. volatile file

Answers

Answer: C. Swap File

Explanation: Swap files provide some space for programs for the computer and virtual memory.

The term that refers to the area of the hard drive used for virtual memory is a swap file. The correct option is c.

What is virtual memory?

Operating systems use virtual memory, a different set of memory addresses, along with the hardware reserve to increase the total number of addresses (actual memory plus virtual memory). The virtual addresses are changed into actual memory addresses when the application is really run.

A swap file is a hard drive space that serves as a computer's virtual memory expansion (RAM). A computer can use more memory than what is actually installed in it by employing a swap file.

In order to save space, data from RAM is "swapped" onto a file or area on the hard drive. Data is switched back and forth from the RAM to the swap file as you switch between the apps.

Therefore, the correct option is c. swap file.

To learn more about virtual memory, refer to the link:

https://brainly.com/question/13441089

#SPJ2

Before a computer can use a router, what configuration information must it be provided?

Answers

Before a computer can use a router, the default gateway must be configured.

What are routers?

Routers are device that connects two or more packet-switched networks or subnetworks.

A router receives and sends data on computer networks.

The router route the IP addresses of this computer over the internet for effective communication.

The default gateway allows for devices in one network to communicate with devices in another network.

Therefore, the default gateway must be configured before a computer can use a router.

learn more on routers here: https://brainly.com/question/25823209

#SPJ12

Which of the following creates a security concern by using AutoRun to automatically launch malware?

Answers

Answer:

USB device

Explanation:

AutoRun automatically launches malicious software as soon as you insert a USB device

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Answers

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

What is Ransom malware?

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

https://brainly.com/question/27312662

#SPJ12

Asynchronous software enables team members to work together at _____

Answers

Asynchronous software enables team members to work together at different times.

What is asynchronous software?

An asynchronous operation is known to be the process that operates on its own of other processes.

Therefore, Asynchronous software enables team members to work together at different times.

See full question below

Asynchronous software enables team members to work together at _____.

a. a location in which a server computer is present

b. the same time

c. different times

d. an agreed-upon location

Learn more about Asynchronous software from

https://brainly.com/question/13172436

#SPJ12

Access passwords (or pins) and device encryption for devices are:

Answers

Access passwords (pins) and encryption for devices are recommended for all devices, especially for portable ones because they can easily be lost or stolen.

What is a password?

A password can be defined as a string of characters, phrase or word that is designed and developed to distinguish an unauthorized user from an authorized user.

Additionally, an encryption is used to conceal and secure a digital data, so as to make it hidden to unauthorized user.

In conclusion, access passwords (pins) and encryption for devices are recommended for all devices, especially for portable ones because they can easily be lost or stolen.

Read more on password here: https://brainly.com/question/19116554

#SPJ12

what causes the hidden node problem in a wireless local area network (wlan)?

Answers

The causes is if a client (or node) can receive signals from an access point (AP), but there is hindrance that prevents the client from getting signals from the other clients that are linked to the network.

What is hidden node problem in wireless network?

The hidden node problem is known to often takes place if  two transmitting terminals side by side transmit data to a receiving terminal between them, and there is hinderance between the two sets of transmitted radio waves.

Note that The causes is if a client (or node) can receive signals from an access point (AP), but there is hindrance that prevents the client from getting signals from the other clients that are linked to the network.

Learn more about local area network from

https://brainly.com/question/8118353

#SPJ11

in a relational database application, a(n) ________ key is used to link one table with another.

Answers

In a relational database application, a foreign key is used to link one table with another.

What is a foreign key?

In database management system (DBMS), a foreign key can be defined as a column whose value provides a link between the data that are stored in a table or relational database.

This ultimately implies that, a foreign key is used to link one table with another in a relational database application.

Read more on keys here: https://brainly.com/question/8131854

#SPJ12

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.

Answers

Answer:

The service password-encryption command

Explanation:

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file

let the value of the variable x be 2, the value of the variable y be 2, and the value of the variable r be 1. which of the following code segments can be used to draw the figure?

Answers

To draw the figure, follow the steps:

drawCircle(x, y, r)drawCircle(x, y + 3, r)drawCircle(x + 3, y, r)drawCircle(x + 3, y + 3, r)

What is the code segment?

A text segment is known to be a code segment that is said to be part of the sections of a program in an object file or in memory, that has executable instructions.

Note that a code segment can be seen as text which is said to be a part of an object file of the program's virtual address system that has a kind of executable instructions.

Therefore, To draw the figure, follow the steps:

drawCircle(x, y, r)drawCircle(x, y + 3, r)drawCircle(x + 3, y, r)drawCircle(x + 3, y + 3, r)

Learn more about code segments from

https://brainly.com/question/25781514

#SPJ11

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

Answers

A feature which is a good conferencing tool to use with other people who are located elsewhere or even in a different location is known as video communications.

What is communication?

Communication refers to a process which involves the transfer of information from one person (sender) to another (receiver), especially through the use of semiotics, symbols, signs and network channel.

In this context, video communications is a feature which is a good conferencing tool to use with other people who are located elsewhere or even in a different location because it provides an image of the person in real-time.

Read more on communication here: brainly.com/question/26152499

#SPJ12

Which command in power bi desktop query editor is used to create a new query that uses the output of another query as its input source?

Answers

The Reference command in power bi desktop query editor is used to create a new query.

What is the Reference command about?

Note that if a person create a reference to another query, there is given just one applied steps where new query is said to be referencing to another query and starts it's own like parent query.

Therefore, The Reference command in power bi desktop query editor is used to create a new query.

See options below

A. Duplicate

B. Pipe

C. Reference

D. Map

Learn more about query from

https://brainly.com/question/25694408

#SPJ12

In the certificate authority trust model known as a hierarchy, where does trust start?

Answers

In the certificate authority trust model known as a hierarchy, the trust start from Root CA.

What does a certificate authority do?

A certificate authority (CA) is known to be a kind of a trusted body that is known to often issues Secure Sockets Layer (SSL) certificates.

Note that In the certificate authority trust model known as a hierarchy, the trust start from Root CA as that is its beginning point.

Learn more about  certificate authority from

https://brainly.com/question/17011621

#SPJ12

you have been using snmp on your network for monitoring and management. you are concerned about the security of this configuration. what should you do?

Answers

The thing that should be done is to implement version 3 of SNMP.

How to depict the information?

In this situation, the person has been using snmp on your network for monitoring and management. you are concerned about the security of this configuration.

Therefore, since the person is concerned about the security of this configuration, the thing that should be done is to implement version 3 of SNMP.

Learn more about configuration on:

brainly.com/question/26084288

#SPJ12

4. Ernesto works in a small office with five other people. What are two possible connection
issues Ernesto might encounter if the company uses a LAN?

Answers

LAN is the networking device and channel that interconnects the local area systems. If the company uses LAN, then issues with speed and connectivity will occur.

What is LAN?

The local area network connects the computers of small and local regions confined to small geographical areas and is seen in the schools, offices, and residences.

If LAN is used between more people then the internet speed and connectivity will be affected as there will be redundancy in the data packet transfer speed.

Therefore, the speed and connectivity will be affected.

Learn more about LAN here:

https://brainly.com/question/14308916

#SPJ1

Which network lets its users send and receive data as if their devices were connected to the private network even if they are not?

Answers

Answer:

Virtual Private Network, also known as VPN

Explanation:

A VPN connects a private network to a public network like the Internet. It lets users to send and receive data over public network systems as if their electronic systems were directly linked to the private network, benefits from the private network's capabilities, encryption, and administrative rules. A VPN is built by using dedicated connections, virtual tunneling technologies, or data encryption to construct a virtual point-to-point connectivity.

VPNs securely link a company's geographically disparate locations, forming one unified network. Individual Internet users also utilize VPN technology to safeguard their wireless activities, evade geo-restrictions and censorship, and link to proxy servers to secure their personal identity and location. VPN is a security mechanism that is best suited for individual user connections rather than secure connections of a variety of embedded devices.

An error in a program that involves a violation of language rules will be detected at

Answers

An error in a program that involves a violation of language (syntax) rules will be detected at compile time.

What is a compiler?

A compiler refers to a software program that is designed and developed to translate the entire source code of program at once, so as to produce object code.

Thus, a compiler translates a software program that is written in a high-level language into low-level language (machine language).

In conclusion, we can deduce that an error in a software program that is associated with a violation of language (syntax) rules will be detected at compile time.

Read more on programs here: brainly.com/question/26324021

#SPJ12

what is the minimum number of load balancers needed to configure active/active load balancing?

Answers

Answer:

2

Explanation:

The primary and secondary machines should both be actively handling connections to your virtual servers in order for active/active to entail having two load balancing appliances running concurrently. The second interpretation of active/active has to do with ones back end servers, which are all running and accepting connections behind the virtual service. This makes use of all of your available computing power for accepting connections.

The minimum number of load balancers needed to configure active/active load balancing is 2.

What are load balancers?

Load balancing is known to be a key networking solution that is often employed to share traffic across multiple servers in the case of server farm.

Note that The minimum number of load balancers needed to configure active/active load balancing is 2.

See full question below

What is the minimum number of load balancers needed to configure active/active load balancing?

- 2

- 4

- 1

- 3

Learn more about load balancers from

https://brainly.com/question/13088926

#SPJ11

identifying the source of owners of online resources ​

Answers

Answer:

To find the source of owners of online resources, you can click on the lock button on the search tab or relocate to the bottom of the resources page to find the sources of owners/authors of online resources. Hope it helps!

list of history of generation computer?​

Answers

First-generation — 1940–1956used vacuum tubesENIAC, UNIVAC I, IBM 650, IBM 701, etc.Second generation — 1956-1963used discrete transistorsIBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.Third generation — 1964-1971used integrated circuits (but not microprocessors)IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.Fourth-generation — 1971-presentuse microprocessorsPDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.Fifth-generation — (current research)artificial intelligence and quantum computing

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by:

Answers

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

What is optional parameter?

It should be noted that optional parameter simply means a method that doesn't force pass arguments at calling time.

In this case, when passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

Learn more about parameter on:

brainly.com/question/13151723

#SPJ12

Which feature on a cisco router permits the forwarding of traffic for which there is no specific route?

Answers

The feature on a cisco router permits the forwarding of traffic for which there is no specific route is a default static route.

What is a router?

A router simply means a network that used to provide access to the internet of a private computer network.

Here, the feature on a cisco router permits the forwarding of traffic for which there is no specific route is a default static route.

Learn more about router on:

brainly.com/question/24812743

#SPJ12

According to the rules of precedence which operator will be evaluated first?

Answers

Based on the rules of precedence the operator that will be evaluated first is AND.

What Does Precedence Mean?

Precedence, in C#, is known to be a kind of rule that tells the order in which a specific operations need to be carry out in an expression.

Note that Based on the rules of precedence the operator that will be evaluated first is AND.

Learn more about precedence from

https://brainly.com/question/1964725

#SPJ12

Vani is trying to connect a microphone to her laptop. What are the two way she can connect the microphone?

Answers

Through the audio jack or via Bluetooth

A variable, usually a bool or an int, that signals when a condition exists is known as a(n):

Answers

A variable, usually a bool or an integer, that signals when a condition exists is a flag.

What is a variable?

Generally, variables are containers for storing values.

A variable is a memory location where you store a value.

The value that you have stored may change in the future according to the specifications.

Therefore, a a variable usually a bool or an integer, that signals when a condition exists is a flag

learn more on variable here: https://brainly.com/question/14500181

#SPJ2

There are 4 servers in the checkout area. The interarrival time of customers is 2 minutes (convert to rate/hr). The processing time of a server is 5 minutes/customer (convert to rate/hr). What is the overall utilization of the total server capacity

Answers

Answer:

Explanation:

bwfwgxqsvga

After the execution of the following statement, the variable sold will reference the numeric literal value as (n) ________ data type. sold = 256.752

Answers

The variable sold will reference the numeric literal value as float data type.

What is float Data Type?

The float data type is known to be a kind of data whose Size Description is one that falls from 4 bytes and it is one that saves fractional numbers.

Note that it can save from 6 to 7 decimal digits and as such, The variable sold will reference the numeric literal value as float data type.

Learn more about data type from

https://brainly.com/question/179886

#SPJ1

The user can close all the programs if he closes the open virtual desktop true false

Answers

The user cannot close all the programs if he closes the open virtual desktop.

What are virtual desktops?

A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.  The desktop environment is separated from the physical device used to access it.

I call it a false desktop.

It is use to separate your work activities.

Therefore, the user cannot close all the programs if he closes the open virtual desktop.

learn more on virtual desktop here: https://brainly.com/question/14332029

#SPJ12

ext in a worksheet that identifies a title and subtitle, row and column headings, and other descriptive information is called

Answers

The text in a worksheet that identifies a title and subtitle, row and column headings is known as label.

What are the headings and titles in a spreadsheet?

Labels are known to be the to text that is said to be typed into any given cells of a spreadsheet.

Note that Labels do not have any numeric value and is one that is not used in a formula or function.

Therefore, The text in a worksheet that identifies a title and subtitle, row and column headings is known as label.

Learn more about label from

https://brainly.com/question/15663649

#SPJ11

what types of physical drives does windows disable defragmenting, but provides another method of optimization?

Answers

The type of physical drives does windows disable defragmenting, but provides another method of optimization is known as windows.

What is windows?

It should be noted that windows is a separate viewing area on a computer display screen in a system.

In this case, the type of physical drives does windows disable defragmenting, but provides another method of optimization is known as windows.

Learn more about window on:

brainly.com/question/25243683

#SPJ12

Other Questions
A scientist measures the standard enthalpy change for the following reaction to be -139.5 kj :h2(g) + c2h4(g)c2h6(g)based on this value and the standard enthalpies of formation for the other substances, the standard enthalpy of formation of c2h4(g) is _____ kj/mol. Which claim made in "Is a Penny Saved Worth Anything?" is supported by reasons or evidence?Charities benefit greatly from the existence of the penny.Pennies should still be made of copper today.Producing pennies harms the environment.Zinc production is an expensive process. an example of the type economy found in each subregion I dive to 17 metres for 23 minutes. after a 30 minute surface interval, i plan to dive to 16 metres. what is the maximum allowable time for the second dive Qu opcin contesta la pregunta correctamente?Redzcale con unas vacaciones de verano.Lo reduzca con unas vacaciones de verano.Redzcalo con unas vacaciones de verano.Redzcalo el estrs con unas vacaciones de verano. Use the drawing tool(s) to form the correct answer on the provided graph.Graph the solution to the following linear inequality in the coordinate plane.5x - y > -327Drawing ToolsSelectLineDashed LineShaded RegionClick on a tool to begin drawing.1086 Determine whether the statement is true or false, and why. If a theory becomes supported by evidence, it can become a law. A. False, it should read, A theory and a hypothesis are already equally supported by evidence, but they have different functions. B. False, it should read, If a theory becomes supported by evidence, it can become a hypothesis. C. False, it should read, A theory and a law are already both supported by evidence and are equal, but they have different functions. D. True What type of molecule is pentanal? o a. aldehyde o b. ester o c. ketone o d. alcohol One polygon has a side of length 2 feet. A similar polygon has a corresponding side of length 4 feet. Theratio of the perimeter of the smaller polygon to the larger is02101/2014 CAN YOU PLSSS HELP ME ITS MUSIC PLS I"M BEGGING YOU PLS How is a Personal Fact Sheet used?a A Personal Fact Sheet is a tool used to market yourself and build your networkb. A Personal Fact Sheet is used to assist in filling out a job application accuratelyc. A Personal Fact Sheet is no longer used now that people have access to the Internet.d. A Personal Fact Sheet is usually turned in if you don't want to fill out an application.Please select the best answer from the choices providedOAOB Increasing substrate concentration restores enzyme activity that has been blocked by:. The role and significance of capital accumulation for the development of enterprises in our country today? Select the correct answer.Choose the system of inequalities that best matches the graph below. The assets (in billions of dollars) for a financial firm can be approximated by the function A(x)=318e^0.27x, where x=7 corresponds to the year 2007. Find the assets in each following years. A)2012 B) 2014 C) 2017 Define secularism . What do you understand by sovereignty ? Persons taking a 30-hour review course to prepare for a standardized exam average a score of 620 on that exam. persons taking a 70-hour review course average a score of 780. based on these two data points, create a linear equation for the function that describes how score varies as a function of time. use this function to predict an average score for persons taking a 43-hour review course. round your answer to the tenths place. The sum of two numbers is 48. If one number is three more than twice the second number, which of the following is thesmaller number?O 24O 15O 30O 33 Help!!!!!!!!!!!!!!!!! Drag each label to the correct location on the image. Not all labels will be used.Identify which four pieces of information would be found in an Egyptian tomb.-------------------------------------------------------------------------------------------------------------------1. status of the person who has died 2. achievements of the personwho is buried 3. details about the lives ofartisans and craftspeople 4.ancient Egyptian beliefsabout the afterlife 5.crimes of the person who is buried 6. images of Egyptian godsInside the tomb: