What is the full form of MOS

Answers

Answer 1

Answer:

Military occupational speciality


Related Questions

Kristi, an event planner, wants to store caterers’ names and contact information in an organized manner. Kristi will MOST LIKELY use a

Answers

Answer:

Publisher Program

Explanation:

What is the diffrent between ibm pc and ibm compatibles in table:​

Answers

Answer:

An IBM PC is a computer designed and developed directly by IBM, where as IBM Compatibles are designed by IBM but manufactured by companies other then IBM.

Explanation:

Hope this helped :)

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

please hurry i need urgent

Answers

Answer:

Algorithm

1. Begin

2. num_bottles = 0

3. While num_bottles != 500

   3.1 Create bottle

   3.2 num_bottles = num_bottles + 1

4. Switch off machine

5. End

The flowchart has been added as an attachment

Explanation:

Begin algorithm

1. Begin

Initialize bottles to 0

2. num_bottles = 0

Repeat loop until 500 bottles is created

3. While num_bottles != 500

Create a new bottle

  3.1 Create bottle

Increment the number of bottles by 1

  3.2 num_bottles = num_bottles + 1

End Loop

Switch off the machine after loop ends

4. Switch off machine

End algorithm

5. End

Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?

Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.

Answers

Answer:

Type an = sign in the cell, followed by the name of the function and the relevant arguments.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;

1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.

2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.

3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).

4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").

5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.

In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.

For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).

What is office technology?​

Answers

Answer:

Explanation:

Office Technology is the study of a wide range of subjects related to careers in the modern office of today. This program provides the training necessary to perform successfully in the many and varied clerical, secretarial, and office administrative positions.

Which three pieces of information must you include in a project goals document? (Choose 3)
A) Target audience
B) Project deadline
C) Project purpose
D) Color palette
E) Hero image

Answers

Answer:

A) Target audience

B) Project deadline

C) Project purpose

Explanation:

The project goals document outlines the scope of the project, detailing what the project entails to everyone that is to work on the project such that the objectives to focused on, the tasks to be completed, the timeline and deadline of the project, the project participants, and audiences are known or understood, thereby placing everyone in the project team on track

The three pieces of information that must be included in a project are therefore; the target audience of the document, the deadline of the project, clearly stated, and the purpose of the project; what the project is going to accomplish

The three pieces of information you must include in a project goals document are:

A) Target audience B) Project deadline C) Project purpose  

According to the given question, we are asked to show the  three pieces of information you must include in a project goals document and why they are important when making a project goal.

As a result of this, we can see when making a project goals document, it is important to include the target audience, project deadline and the project purpose because it gives the project a clear objective and deadline which can be achieved.

Read more here:

https://brainly.com/question/17293938

c programming question


Given n, take the sum of the digits of n. If that value has more than one digit, continue reducing in this way until a single-digit number is produced. The input will be a non-negative integer.

Answers

Answer:

int digitSum(int n) {

int sum = 0;

while (n) {

 sum += n % 10;

 n /= 10;

}  

return sum < 10 ? sum : digitSum(sum);

}

int main()

{

int n = 12345;

printf("Digit sum of %d is %d\n", n, digitSum(n));

}

Explanation:

The recursion takes care of the repeated summing in case the sum has more than 1 digit.

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

What contains programming statement written in VB?​

Answers

Answer:

A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.

You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do

Answers

Answer:

Add the URL of the web site to the local intranet zone.

Explanation:

An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.

An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.

In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.

Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.

The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders? create/develop upload/display research/define plan/design

Answers

Answer:

research/define

It is C

discuss any five barries of integrating ict tools in education​

Answers

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

Which information is required when designing a field? check all that apply.

Answers

Answer:

Explanation:

dimensions or calculation

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591

How can computer be beneficial in agriculture and tourism​

Answers

The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.

(11011+1001) base 2
please slove this​

Answers

Answer:

Explanation:

We can convert both to base 10 first:

(1+2+8+16) + (1+8) = 36.

Converting back to base 2, we get

100100

Anyone know how to make website (PROFESSIONAL)

Answers

Answer:I know how to make a professional website

Explanation:

You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to: Create the following global security groups on the CorpDC server in their corresponding OUs: OU Creation Location New Group Name Accounting Accounting Research-Dev Research-Dev Sales Sales

Answers

Answer:

1. Select Tools then Active Directory Users from the Server Manager

2. Navigate to the relevant Organizational Unit, OU, in the Active Directory

3. Select New then Group in the OU in which a global securities group is to be created

4. The group name (Accounting, Research-Dev, or Sales) is entered into the Group name field

5. Select the scope of the group

6. The group type is then selected (Domain Local, Global, or Universal)

7. The user accounts are then added to the group as follows;

i) Selecting the Add to a group option after right clicking a user account

ii) Enter the name of the appropriate group in the field to Enter the object names to select

iii) A group scope and group type is then selected

iv) Click on Check names

v) Other users can be added to the group by repeating steps i), ii), iii), and iv)

8) To add additional users to the group, the step 6, 7, and 8 is to be repeated

Explanation:

The program prompts the user for five to ten numbers all on one line, separated by spaces, calculates the average of those numbers, and displays the numbers and their average to the user.

The program uses methods to:

1) get the numbers entered by the user all on one line separated by spaces;

2) calculate the average of the numbers entered by the user; and

3) print the results.

The first method should take no arguments and return a String of numbers separated by spaces.

The second method should take a String as its only argument and return a double (the average).

The third method should take a String and a double as arguments but have no return value.

IF user input is: 20 40 60 80 100

Answers

Answer:  

import java.util.Scanner;  

public class AverageDemo

{  

public static String getNumbers()

{

 

 String numbers;  

 Scanner scn = new Scanner(System.in);  

 System.out.println("Enter five to ten numbers all on one line, separated by spaces: ");

 numbers = scn.nextLine();

 return numbers;

}  

public static double calcAverage(String numbers)

{

 String[] values = numbers.split(" ");

 double total = 0;  

 for (int i = 0; i < values.length; i++)

 {

  total += Integer.parseInt(values[i]);

 }  

 if (values.length == 0)

  return 0.0;

 else

  return (total / values.length);

}  

// Method definition of printResults: print the results

public static void printResults(String numbers, double average)

{

 System.out.printf("\nThe average of the numbers %s is %.2f\n", numbers, average);

}  

// main method

public static void main(String[] args)

{

 // Call the methods

 String numbers = getNumbers();

 double average = calcAverage(numbers);

 printResults(numbers, average);

}

}

Output:

Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions

Answers

Answer:

The company's account policy

Explanation:

If there's no common naming system, It's best to go with the company's account policy.

Why should a user preview the document before printing?​

Answers

Answer:

Print preview is a useful function to users as it helps them to see how the final printed material will appear. It also gives the user the opportunity to check or adjust the layout or resolve any issues before printing the material to achieve the intended final form.

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

Which of the following are true statements about the Java wrapper classes (Select all that apply.): Select one or more: a. Objects of these type are immutable b. Objects of these types are mutable c. The wrapper classes do not have no-arg constructors d. The wrapper classes do have no-arg constructors

Answers

Answer:

a. Objects of these type are immutable.

Explanation:

Java wrapper classes are used to convert data into objects. The primitive data is not object and it does not belong to any class. Therefore Java wrapper classes help the user to convert primitive data into object. These objects are immutable and they have no arg constructor.

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Answers

Answer:

Implement BitLocker with a TPM

Explanation:

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.

Basically, there are two (2) main types of memory;

A. Read only memory (ROM).

B. Random access memory (RAM).

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.

Nama prinsip kerja mouse adalah

Answers

Answer:

Mampu bekerja di hampir semua permukaan, mouse memiliki light-emitting diode (LED) merah kecil yang memantulkan cahaya dari permukaan itu ke sensor semikonduktor oksida logam (CMOS) komplementer. Sensor CMOS mengirimkan setiap gambar ke prosesor sinyal digital (DSP) untuk dianalisis.

in english

Able to work on almost any surface, the mouse has a small, red light-emitting diode (LED) that bounces light off that surface onto a complementary metal-oxide semiconductor (CMOS) sensor. The CMOS sensor sends each image to a digital signal processor (DSP) for analysis.

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

Selena owns a bakery. She wants to compare the number of pies, cookies, cakes, and brownies that she sells in one month. Which charts are appropriate for this task? Check all that apply.

Answers

Column, line, bar, and possibly pie.

Answer:

Column, Bar, And Pie

Explanation:

got it right

To call a member function, you code a. the name of the object in parentheses, followed by the name of the function b. the name of the object, the dot operator, and the name of the function c. the name of the object, followed by the scope resolution operator and the name of the function d. the name of the object, followed by the name of the function in parentheses

Answers

Answer:

using a pointer to member function to call function

Short Questions: a) What is website? How can we browse internet using website?​

Answers

Answer:

A website is a set of related web page or pages located under a single domain name. These pages contain specific information which was all provided by one person or entity and traces back to a common Uniform Resource Locator or (URL).

Explanation:

There are millions of Websites around the world and contain information about everything.

Other Questions
What were the dimensions of the original photo? 4 inches by 4 inches 6 inches by 6 inches 10 inches by 10 inches 12 inches by 12 inches phi phi to v di hn phi tri ng khng ________ is a brief introduction of yhe book by the author Two common methods to generate an aldehyde is by oxidation of an alcohol and through ozonolysis.a. Trueb. False An electrician charges a fee of $40 plus $25 per hour. Let y be the cost in dollars of using the electrician for x hours. Choose the correct equation.y = 40x - 25y = 25x + 40y = 25x - 40y = 40x + 25 he got into.....car with me. (a an the no article) The earplug can reduce the sound level to about 18 decibels (dB). What percentage reduction is this intensity? Thomas Jefferson organized his argument in the body of the Declaration of Independence by listing the On StatSim, how does a firm get their market share to increase? a que se llamo reformas Borbonicas Which statement BEST describes life in the Soviet Union under totalitarian leader Joseph Stalin?a. Peasants owned land that they could farm B. Critics of the government were murdered or imprisoned C. Voters could choose between candidates from two political partiesD. The government set up a court system based on truth and justice The Director of Taco Bells in-house creative agency described the workplace as an "ego-free zone," suggesting openness to his team members ideas, also called Multiple Choice staff validity. task validity. boundary spanning. decision informity. hierarchical sensitivity. please solve this question Solve for the measure of angle QSR, given b=136. Why were the Spanish authorities against the mestizo baroque style at first PLLZZZ HELP!!Diagram the alternation of generations life cycle of a plant. Put the following terms in order and type arrows (>) between the terms to show which direction the life cycle is going: sporophyte, gametes, gametophyte, spores, meiosis, sporangium. Label which parts are haploid and which parts are diploid. You may also list the terms in numerical order. Surface area te volume ratio plays a vital role in . growth rate of organisms B. exchange of materials between organisms and their environment C. the life-span of organisms D. efficiency of various systems in organisms Juan had 5 candy bars for himself and 4 friends to share with after lunch. Then three other friends joined them. Juan divided the 5 candy bars equally with all of his friends. How much did each person get? Although we live in the present our experiences will eventually become history. What things which have occurred over the last twenty years do you think will be recorded in the history books? If JKL = TUV which of the following can you not conclude as being true