Which of the following is an example of a specialty search engine? a. NexTag b. Wolfram Alpha c. Bing d. Google

Answers

Answer 1

Answer:

b. Wolfram Alpha

Explanation:

A specialty search engine can be defined as a type of database query engine which searches for informations and indexes them based on a particular content, subject or focus such as location, topic, government, industry etc. A specialty search engine is different from the general-purpose search engines such as Bing, Google or Yahoo because it gives results that are tailored or more relevant to a particular user.

Wolfram Alpha is an example of a specialty search engine. A Wolfram Alpha is an answer search engine which gives answers to specific questions such as computational, arithmetic, geometric mathematics or calculus.

Also, note that a specialty search engine is commonly referred to as a topical or vertical search engine.

Answer 2

Wolfram Alpha is an example of a specialty search engine. Thus, option B is correct.

A specialty search engine can be defined as a type of database query engine which searches for informations and indexes them based on a particular content, subject or focus such as location, topic, government, industry etc. A specialty search engine is different from the general-purpose search engines such as Bing, Yahoo because it gives results that are tailored or more relevant to a particular user.

Wolfram Alpha is an example of a specialty search engine. A Wolfram Alpha is an answer search engine which gives answers to specific questions such as computational, arithmetic, geometric mathematics or calculus.

Also, note that a specialty search engine is commonly referred to as a topical or vertical search engine.

To know more about search engine visit:

https://brainly.com/question/32419720

#SPJ6


Related Questions

. (a) Prove or disprove carefully and in detail: (i) Θ is transitive and (ii) ω is transitive. (b) Assume n is a positive integer. Algorithm A(n: int) int z = 0; int temp = 0; for (int i = 0; i < n ; i++) { for (int j = 0 ; j < i ; j++) { int temp = i + j ; int z = z + temp; } } System.out.println(z) ; What is the input size for Algorithm A? Analyze carefully and explicitly the time complexity of A in terms of the input size. Show all steps. Is A a polynomial time algorithm? Justify your answer.

Answers

Answer:

The Following are the solution to this question:

Explanation:

In Option a:

In the point (i) [tex]\Omega[/tex] is transitive, which means it converts one action to others object because if [tex]\Omega(f(n))=g(n)[/tex] indicates [tex]c.g(n)<=f(n)[/tex]. It's true by definition, that becomes valid. But if [tex]\Omega(g(n))=h(n)[/tex], which implies [tex]c.h(n)<=g(n)[/tex]. it's a very essential component. If [tex]c.h(n) < = g(n) = f(n) \[/tex]. They  [tex]\Omega(f(n))[/tex]   will also be [tex]h(n)[/tex].  

In point (ii), The  value of [tex]\Theta[/tex] is convergent since the [tex]\Theta(g(n))=f(n)[/tex]. It means they should be dual a and b constant variable, therefore [tex]a.g(n)<=f(n)<=b.g(n)[/tex] could only be valid for the constant variable, that is  [tex]\frac{1}{a}\ \ and\ \ \frac{1}{b}[/tex].

In Option b:

In this algorithm, the input size value is equal to 1 object, and the value of  A is a polynomial-time complexity, which is similar to its outcome that is [tex]O(n^{2})[/tex]. It is the outside there will be a loop(i) for n iterations, that is also encoded inside it, the for loop(j), which would be a loop[tex](n^{2})[/tex]. All internal loops operate on a total number of [tex]N^{2}[/tex] generations and therefore the final time complexity is [tex]O(n^{2})[/tex].

Select the correct answer from each drop-down menu. What skills should Tara hone to get a job in testing? Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tester. Since Tara is trying to get a job as a tester, she should concentrate on improving her and skills in order to get the desired job.

Answers

What’re the choices?

Answer:

heres your answer

Explanation:

have a good day <3

does Buzz or APEX shows all your due assignments on the left of the main home screen?

Answers

Answer:

go to your dashboard and press the number under grade to date (your percentage in the class) and it should show all your assignments that you have done and that still need to be done

Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[1]. Then find the second smallest element of A, and exchange it with A[2]. Continue in this manner for the first n − 1 elements of A. Write pseudocode for this algorithm, which is known as selection sort. What loop invariant does this algorithm maintain? Why does it need to run for only the first n − 1 elements, rather than for all n elements? Give the best–case and worst–case running times of selection sort in Θ–notation.

Answers

Answer:

1. create the first array A

2. create the second array A1, the same length as array A.

3. create a loop to iterate over both arrays for a number of times specific to the length of the arrays, with a condition to get and pop only the minimum value of which arrays for every loop.

4. save both items to "a" for minimum value A and "b" for minimum value A1.

5. call a function to push the "a" variable value to A1 and "b" variable value to the array A.

Explanation:

This code would interchange the values of both arrays, the best-case scenario for the code is O( n ) where n is the number of items in both arrays and worst is the best-case multiplied by the number of time to compare all the items with the minimum value.

Write a recursive method that returns the number of 1’s in the binary representation of N. Use the fact that this is equal to the number of 1’s in the representation of N/2, plus 1, if N is odd

Answers

Answer:

Here is the recursive method NoOfOnes :

public static int NoOfOnes(int N)    { // method that takes number N as argument and returns the number of 1’s in the binary representation of N

       if(N==0)  { //base case 1

           return 0;        } //if the value of N is equal to 0 then method returns 0

       else if(N==1){ //base case 2

           return 1;        } // if the value of N is equal to 1 then method returns 1

       else if(N%2==1)  { //if N is odd (recursive case)

           return NoOfOnes(N/2)+1;   } //calls method recursively and divides N by 2 plus 1

       else{ //when N i even (recursive case)

           return NoOfOnes(N/2);   }   }   //calls method recursively and divides N by 2  to return number of 1's in binary representation of N

Explanation:

Here is the complete JAVA program:

import java.util.Scanner; //to take input from user

public class Main {

   public static int NoOfOnes(int N)    {//the method that takes number N as argument and returns the number of 1’s in the binary representation of N

       if(N==0)  { //base case 1

           return 0;        }

       else if(N==1){//base case 2

           return 1;        }

       else if(N%2==1)  {//recursive case when N is odd

           return NoOfOnes(N/2)+1;   }

       else{ //recursive case when N is even

           return NoOfOnes(N/2);   }   }    

public static void main(String[] args) { //start of main function

       Scanner scan = new Scanner(System.in); //creates object of Scanner

       System.out.print("Enter n: ");//prompts user to enter value of N

       int n = scan.nextInt(); //reads the value of n from use

 System.out.print("number of 1’s in the binary representation of " +n+" is: "+NoOfOnes(n)); } } //displays the number of 1’s in the binary representation of n

i will explain the working of the function with an example

Lets say N = 6

if(N==0) this statement evaluates to false as N is not 0

else if(N==1 this statement also evaluates to false as N is not 1

else if(N%2==1) this statement also evaluates to false because N is not odd. If we take modulo of 6 by 2 then the remainder is 0 because 6 is completely divisible by 2 so N = 6 is an even number. So the else part is executed:  

       else{

           return NoOfOnes(N/2);}

This statement calls NoOfOnes recursive by passing N/2 to the method. So this becomes:

return NoOfOnes(6/2)

6/2 = 3

NoOfOnes(3)

Now this method is called again with the value of N = 3. Since 3 is an odd number so the recursive case of odd N is executed:

else if(N%2==1)  {

           return NoOfOnes(N/2)+1;   }

NoOfOnes(3/2)+ 1

NoOfOnes(1) + 1

Now the method is called again with value of N=1. The base case 2 is executed because N==1 which returns 1

else if(N==1){

           return 1;   }

So this becomes

NoOfOnes(1) + 1

1 + 1

= 2

So the method return 2 as the number of 1’s in the binary representation of N = 6

Hence the output of the above program with N = 6 is

number of 1’s in the binary representation of 6 is: 2          

what is computing networking​

Answers

A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

How does Wireshark differ from NetWitness Investigator?

Answers

Answer is given below

Explanation:

Wireshark differ from NetWitness Investigator because Windshark shows a detailed view of individual packets. WireShark captures live traffic and displays the results at the packet level. Netwitness shows a high-level view and can be compared to the new packet capture NetWitiness Investigator provides a comprehensive overview of previously tracked traffic that can be used to view anomalies, compliance and attacks.

ABC incorporated wants to implement a TCP/IP network for its only site. It has 180 employees and two buildings and requires Internet access for an e-mail server, a single Web server, a single FTP server, and two routers, each with a single high speed Internet interface. If the company wants to hold ISP costs to an absulate minumum, what kind of IP addresses should they primarily use

Answers

Answer:

A private IP address should be implemented but a PAT and a static NAT should be configured for the computers and the intermediate devices respectively.

Explanation:

There are two types of IP addresses, they are public and private addresses. The public address is an IP4 address routable on the internet while the private address is not routable.

Internet service providers do charge for the use of public IP addresses they render, which can be very costly. To reduce the company's expenses on the internet, the company is networked with private addresses and are mapped for network address translation ( NAT) which assigns a public global address to devices accessing the internet.

The direction of data transport is its built from the top and goes down and across the wire and read going up on the recieving computer?
True
False

Answers

Do u mean one direction

You want to decide whether you should drive your car to work or take the train. You know the one-way distance from your home to your place of work, and the fuel efficiency of your car (in miles per gallon). You also know the one-way price of a train ticket. You assume the cost of gas at $4 per gallon, and car maintenance at 5 cents per mile. Write an algorithm to decide which commute is cheaper.

Answers

Explanation:

Remember, an algorithm in simple words means a set of instructions or steps to be followed in other to solve a problem.

Note, to decide which commute is cheaper, it means the output of the algorithm should be the cheaper way to commute.

Using pseudocode do the following;

determine the inputs and outputs of the problem arrange the identified problem into micro-tasksdescribe each micro-tasks in the pseudocode Test the pseudocode by solving the problem.

                       

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember
there is an app on your phone that will use your location and show you that information. What is the app using?
A. Chip-and-pin technology
B. Augmented reality
C. Kiosk
D. Digital literacy

Answers

Since you remember there is an app on your phone that will use your location and show you that information. The app that is been used is option D. Digital literacy

What does "digital literacy" mean?

The ability to communicate and obtain information in a culture where digital technologies like internet platforms, social media, and mobile devices are used more frequently is referred to as digital literacy.

Therefore, a person Understanding and using technology are both components of digital literacy. Your ability to find, consume, and produce information online can be improved with the aid of digital literacy skills. Understanding digital literacy allows you to utilize technology properly and helps you stay away from its risks.

Learn more about Digital literacy from

https://brainly.com/question/20718794

#SPJ1

Smart home appliances typically include which of the following?

Answers

Answer:

Smart home-enabled devices can include appliances like refrigerators, washing machines, dryers, and toaster ovens, as well as heating and air conditioning units and lighting devices.

Explanation:

Smart home appliances include;

Sensors that collect information.WIFI Combability.The ability to send notifications to a smartphone app.

What is a smart home appliance?

A smart home is known to be home equipment that helps homeowners to control appliances, thermostats, lights, etc.

They are known to be used remotely via a smartphone or tablet through the aid of internet connection. They homes are often set up via wireless or hardwired systems.

Learn more about home appliances from

https://brainly.com/question/18713901

what is an unknown network called

Answers

Answer

It means the network has no name and your device has picked it up as a wifi / network.

Explanation:

This likely means the owners of the network have not set a SSID. ( SSID is network name.)

A new object of type list is created for each recursive invocation of f.A. TrueB. False

Answers

Answer:

True but double check!

which of the following are bee per frame attribute​

Answers

Explanation:

where are the choices

Taking an online class doesn't require any special skills.
Please select the best answer from the choices provided
()T
()F
help pls

Answers

Answer:

F

Explanation:

It depends on whether the person has interest in it

The statement - "Taking an online class doesn't require any special skills" is false.

What is online class?

An online class is a course that is delivered through the Internet. They are often delivered via a learning management system, where students may monitor their course curriculum and academic progress, as well as communicate with their classmates and course teacher.

When taking an online class, one must be alert and prompt. Furthermore, certain material may be obscure owing to a communication barrier between the student and teacher.

The student must be able to grasp what the teacher is saying in a short period of time, and self-teaching abilities should be strengthened in distance online education. As a result, the supplied assertion is untrue.

Learn more about online class here:

https://brainly.com/question/13649312

#SPJ2

In the file MajorSalary, data have been collected from 111 College of Business graduates on their monthly starting salaries. The graduates include students majoring in management, finance, accounting, information systems, and marketing. Create a PivotTable in Excel to display the number of graduates in each major and the average monthly starting salary for students in each major.

Answers

Answer:

The pivot table is attached below

Explanation:

procedure used to create the Pivot Table

select insert from worksheet Ribbonselect pivot tableselect the range of Dataselect   "new worksheet "select Major as row heading and the summation symbol to count the majorinput variables given in their right cells

after this procedure the table is successfully created

Attached below is the Pivot Table in Excel displaying The number of graduates in each major and average monthly salaries

Mr. Edwards, a game designer, creates a game that draws attention to how real estate developers are causing the natural habitat of an
endangered species of bird to decline. Which option best describes this game?
ОА.
It is an entertainment-based game.
ОВ.
It is an advergame.
It is an educational game.
Ос.
OD.
It is an issues-based game.

Answers

Answer:

OB

Explanation:

Mr. Edwards the game designer is making it for education purposes so you can learn, it is for learning. So you know endangered species of birds.

Which of these is the largest?
terabyte
exabyte
gigabyte
kilobyte
PLEASE HELP

Answers

Answer: Exabyte

Explanation:

I took the Quiz

how to write a function that counts the letters in a string in C?

Answers

Answer:

Here is the C function that counts the letters in a string:

int LetterCount(char string[]){  //function to count letters in a string passed as parameter

 string[100];  // char type string with size 100

  int i, letters;  // letter variable stores the count for no. of letters in string

   i = letters = 0;  //initialize variables i and letters to 0

  while (string[i] != '\0')  { // loop iterates through the entire string until end of string is reached

    if( (string[i] >= 'a' && string[i] <= 'z') || (string[i] >= 'A' && string[i] <= 'Z') )  { // if condition checks the letters in the string

     letters++;    }  // increments 1 to the count of letters variable each time a letter is found in the string

    i++;  }  //increments value of i to move one character forward in string

   printf("Number of Letters in this String = %d", letters);   // displays the number of letters in the string

   return 0; }                              

Explanation:

Here the question means that the function should count the letters in a string. So the letters are the alphabets from a to z and A to Z.

Here is the complete program:

#include <stdio.h>   // to use input output functions

int LetterCount(char string[]){  // method that takes a character string as parameter and counts the letters in the string

string[100];  

int i, letters;

i = letters = 0;

while (string[i] != '\0')   {

 if( (string[i] >= 'a' && string[i] <= 'z') || (string[i] >= 'A' && string[i] <= 'Z'))

   {letters++;  }

   i++; }

   printf("Number of Alphabets in this String = %d", letters);  

   return 0;}  

int main(){  // start of main function

  char string[100];  //declares a char array of string

   printf("Please Enter a String : ");   //prompts user to enter a string

  fgets(string,100,stdin);  //get the input string from user

   LetterCount(string); } // calls method to count letters in input string

I will explain this function with an example

Lets suppose the user input "abc3" string

string[100] = "abc3"

Now the function has a while loop that while (string[i] != '\0')  that checks if string character at i-th position is not '\0' which represents the end of the character string. As value of i = 0 so this means i is positioned at the first character of array i.e. 'a'

At first iteration:

i = 0

letter = 0

if( (string[i] >= 'a' && string[i] <= 'z') || (string[i] >= 'A' && string[i] <= 'Z') )   if condition checks if the character at i-th position of string is a letter. As the character at 0-th position of string is 'a' which is a letter so this condition evaluates to true. So the statement letter++ inside if condition executes which increments the letter variable to 1. So the value of letter becomes 1. Next statement i++ increments the value of i to 1. So i becomes 1. Hence:

i = 1

letter = 1

At second iteration:

i = 1

letter = 1

if( (string[i] >= 'a' && string[i] <= 'z') || (string[i] >= 'A' && string[i] <= 'Z') )  

if condition checks if the character at i-th position of string is a letter. As the character at 1st position of string is 'b' which is a letter so this condition evaluates to true. So the statements letter++ inside if condition and i++ executes which increments these variables to 1. Hence:

i = 2

letter = 2

At third iteration:

i = 2

letter = 2

if( (string[i] >= 'a' && string[i] <= 'z') || (string[i] >= 'A' && string[i] <= 'Z') )  

if condition checks if the character at i-th position of string is a letter. As the character at 2nd position of string is 'c' which is a letter so this condition evaluates to true. So the statements letter++ inside if condition and i++ executes which increments these variables to 1. Hence:

i = 3

letter = 3

At fourth iteration:

i = 3

letter = 3

if( (string[i] >= 'a' && string[i] <= 'z') || (string[i] >= 'A' && string[i] <= 'Z') )  

if condition checks if the character at i-th position of string is a letter. As the character at 3rd position of string is '3' which is not a letter but a digit so this condition evaluates to false. So the statement letter++ inside if condition does not execute. Now i++ executes which increments this variable to 1. Hence:

i = 4

letter = 3

Now the loop breaks because while (string[i] != '\0') condition valuates to false as it reaches the end of the string.

So the statement: printf("\n Number of Letters in this String = %d", letters); executes which prints the value of letters on the output screen. Hence the output is:

Number of Letters in this String = 3

Which of the following statements is not true?A. A structured chart is a sequential representation of program designB. the Real-Time system is a particular case of a on-line-systemC. Batch totals are not incorporated while designing real-time applicationsD. 4GLs are used for application proto typingE. None of the above

Answers

Answer:

A structured chart is a sequential representation of program design

Explanation:

It is true that a real-time system which is a term to describe an operating system working in relation to real-time is actually a form of the online system. Hence, option B is not correct.

It is also true that Batch totals are not incorporated while designing real-time applications because Batch Data processing is carried out in a separate manner and at a time when the computer is free. Thus Option C is not Correct

It is also true that 4GL which stands for Forth generation programming language is used for application prototyping. Again Option D is not Correct.

However, a structured chart is not a sequential representation of program design, but rather a break down to the infinitesimal module in the program design. Hence, option A is the correct answer.

Match each of the following servers to its definition:
1. DNS
2. Web
3. E-mail
4. DHCP
5. Commerce
a. enables users to purchase items over the Internet
b. specifically deals with the SMTP communication method
c. translates a domain name into an IP address
d. delivers HTML documents on request
e. assigns users IP addresses for the duration of a session

Answers

Answer:

1. Commerce

2. E-mail

3. DNS

4. Web

5. DHCP

Explanation:

A server can be defined as a dedicated system either software or hardware that is used to provide specific services to other devices or programs, which are referred to as the clients. The following are the functions of various functions of server in cloud computing services;

a. Commerce: enables users to purchase items over the Internet.

b. E-mail: specifically deals with the SMTP communication method.

c. DNS: translates a domain name into an IP address.

d. Web: delivers HTML documents on request.

e. DHCP: assigns users IP addresses for the duration of a session.

Write an application that determines which, if any, of the following files are stored in the folder where you have saved the exercises created in this chapter: autoexec.bat, CompareFolders.java, FileStatistics.class, and Hello.doc. The program should display the number of files found. For example, if two of the files are found display the message 2 of the files exist.

Answers

Answer:

Here is the JAVA application that determines which if any of the following files are stored in folder where you have saved the exercises created.

import java.nio.file.*;   // used to manipulate files and directories

import java.nio.file.attribute.*;  //used to provide access to file and file attributes

import static java.nio.file.AccessMode.*;  // provides access modes to test the accessibility of a file

import java.io.IOException;  //for exception handling

class FindSelectedFiles {

public static void main(String[] args) { //start of main function

   Path f1 = Paths.get("/root/sandbox/autoexec.bat"); //creates Path object f1 using Paths.get() method and this instance contains the file name and directory list used to construct the specified path

   Path f2 = Paths.get("/root/sandbox/CompareFolders.java");  //creates Path object f2 using Paths.get() method and this instance contains the file name and directory list used to construct the specified path

   Path f3 = Paths.get("/root/sandbox/FileStatistics.class");   //creates Path object f3 using Paths.get() method and this instance contains the file name and directory list used to construct the specified path

   Path f4 = Paths.get("/root/sandbox/Hello.doc"); //creates Path object f4 using Paths.get() method and this instance contains the file name and directory list used to construct the specified path

   int count=0; //used to count the number of files found  

try{  // used to define a code chunk to be tested for errors

 f1 = Paths.get("/root/sandbox/autoexec.bat");  // Converts a path string when joined form a path string to a Path

 System.out.println(f1);  //prints the file

     /* getFileSystem method is used to return the file system that created this Path object f1 and checkAccess Verifies access and throws exception if something is wrong

 f1.getFileSystem().provider().checkAccess(f1);  

 System.out.println(f1 +" File Exists\n");  //if file exists then displays this message

 count++;  }  //adds 1 to the count of number of files found

 catch (IOException e) {  //a code chunk to be executed if error occurs in the try part

  System.out.println("File Doesn't Exist\n"); }  //if file not found displays this message

   

try{  //works same as above try block but for 2nd folder and object f2

 f2 = Paths.get("/root/sandbox/CompareFolders.java");

 System.out.println(f2);

 f2.getFileSystem().provider().checkAccess(f2);

 System.out.println(f2 +" File Exists\n");

 count++;  }

 catch (IOException e) {

  System.out.println("File Doesn't Exist\n"); }

   

try{  //works same as above try block but for 3rd folder and object f3

 f3 = Paths.get("/root/sandbox/FileStatistics.class");

 System.out.println(f3);

 f3.getFileSystem().provider().checkAccess(f3);

 System.out.println("File Exists\n");

 count++; }

 catch (IOException e) {

  System.out.println("File Doesn't Exist\n"); }

   

try{  //works same as above try block but for 4th folder and object f4

    f4 = Paths.get("/root/sandbox/Hello.doc");

    System.out.println(f4);

 f4.getFileSystem().provider().checkAccess(f4);

 System.out.println(f4 +" File Exists\n");

 count++; }

 catch (IOException e) {

  System.out.println("File Doesn't Exist\n"); }

   

   System.out.println(count+" of the files exist");  }  } //displays the number of files found

Explanation:

If you want to directly pass the file name as argument to Paths.get() method then you can use the following code:

   Path f1 = Paths.get("autoexec.bat");

   Path f2 = Paths.get("CompareFolders.java");

   Path f3 = Paths.get("FileStatistics.class");

   Path f4 = Paths.get("Hello.doc");

The program determines if any, of the files from autoexec.bat, CompareFolders.java, FileStatistics.class, and Hello.doc. are stored in the folder. If a file is found then the program displays the message File exists and add 1 to the count variable each time a file is found. If all the files are found then the program returns the count as 4 otherwise the program display the number of files found by displaying the computed final value of count in the output. Lets say all the files are found then the output of the above program is:

autoexec.bat                                                                                                                                                   autoexec.bat File Exists  

                                                                                                                                                      CompareFolders.java                                                                                                                                            CompareFolders.java File Exists                                                      

                                                                                                                                                         FileStatistics.class                                                                                                                                           File Exists                                                                                        

                                                                                                                                                     Hello.doc                                                                                                                                                      Hello.doc File Exists  

   

4 of the files exist    

An optimal solution to an Operations problem will yield:____________

Answers

Answer:

The best solution.

Explanation:

In the operations and management of systems such as manufacturing, transport, government, network, service systems, we encounter various type of challenges and problems. These challenges and problems must be fixed or resolved as soon as possible in order to restore normal operations, as well as ensuring that the solution mitigates the occurrence of such problems in the future.

Hence, an optimal solution to an Operations problem will yield the best solution because it gives the maximum functionality. For instance, an optimal solution is considered to be the best solution because it gives the least cost, effective and efficient or gives the most profit.

which data type could be used for the field, remark or comment? ​

Answers

Answer:

While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.

copied from google

hope that helps

What converts source code onto object code

Answers

Answer:

The Compiler

Explanation:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file

Select the correct answer.
Steve is a recruiter for a large graphic design company. He is looking for a candidate who can translate any vision into reality and make tough decisions. Which quality is he looking for in an employee?
A.
teamwork
B.
leadership
C.
honesty
D.
dedication
E.
self-motivation

Answers

Answer:

D

Explanation:

Hard work and dedication prove that you will be there and do what you need to.

Answer:

isnt it leadership

Explanation:

making tough descisions..

If you have a second Ethernet adapter, which network location is being used by the adapter?

Answers

Answer:

Public network

Explanation:

The network includes different networks and settings for sharing which are applied to the network which you are connected to.

A public network is being used by the adapter. The public network is a network that is unrestrictive. That is, any member of the public can easily have access to it and connect to the internet. Such a network exposed users to risks by exposing the connected devices.

When using SSH to remotely access a Cisco router, can you see the terminal password?

Answers

Answer:

No, you can't.

Explanation:

SSH is an acronym for Secure Socket Shell and is a networking protocol used for providing remote authentication through a public-key cryptography over an unsecured network such as the internet.

Hence, it is a network protocol that is commonly implemented by using a client-server model; where a computer acts as a SSH client while the other network device acts as the host or SSH server.

When using SSH to remotely access a Cisco router, you cannot see the terminal password because it is Linux based and encrypted through the use of symmetrical encryption, asymmetrical encryption or hashing

If someone you don”t know asks where you go to school, what should you do?

Answers

Answer:come up something that sounds real but is not true.

Explanation: The reason why is because they could look it up if you tod them the real answer and then follow you and kidnap you and they could do a school shooting it"s not lying it's not it's protecting your self and others.#bettersafethansorry

The right thing to do when  someone you don't know asks where you go to school, is do not respond.

Why talking to stranger has its cons?

The act of talking to Strangers is one that can help a person to know more about a thing but it also has its disadvantage.

Conclusively, note that someone asking you about where you school may want to harm you or do some really bad and as such it is better not to respond when someone you don't know asks where you go to school.

Learn more about school from

https://brainly.com/question/6947486

#SPJ2

Other Questions
You invested $4,500 in a project which gave you a return of 12.5% the 1st year. You were quite happy, but the 2nd year wasn't as good. You lost 3.3% that year. The 3rd year was better - you made 5.5% on this investment. What was your annual average rate of return over the three years what influenced poetry in the age of reason? what are the major characteristics of neoclassical poetry? enkins Company had the following information for the year: Direct materials used $ 301,100 Direct labor incurred (9,300 hours) $ 252,600 Actual manufacturing overhead incurred $ 420,000 Jenkins Company used a predetermined overhead rate using estimated overhead of $368,000 and 8,000 estimated direct labor hours. Assume the only inventory balance is an ending Finished Goods Inventory balance of $19,700. What was adjusted cost of goods sold CALCULATE: you need to type/show your work. There is no credit if the work is not show/typed Titanium has five common isotopes: 46Ti (8.00%), mass= 45.953 amu 47 Ti (7.80%), mass= 46.952 amu 48Ti (73.40%), mass= 47.947 amu 49Ti (5.50%), mass= 48.948 amu 50Ti (5.30%), mass = 49.945 amu Calculate the average atomic mass of titanium. How did settlers migrating west along the Oregon Trail fulfill the promise of Manifest Destiny? A dual-core system requires each core has its own cache memory.a. trueb. false 5) 1 - 13 x 2 + 25 - 3+15 - 3 HURRY HELP I NEED AN ESSAY on bad magic1000 words g The tolerance of a Class A 50 mL transfer pipet is 0.05 mL. A student uses an uncalibrated Class A transfer pipet to deliver a total of 150 mL of solution. What is the uncertainty in the delivered 150 mL? Note: tolerance is different from the uncertainty, so it does not follow the propagation formula of errors difference between nationalism and extreme nationalism help!!!!!!plz help!!!!!!!help me!!!!!helppppppppppppppppppppppp!!!!!!when did civil war begin? give me a mnemonic. According to the passage, why did the islamic empire break into three parts? Read the excerpt from the Haida creation myth. Instead, he decided, his daughter would just have to give it away to another woman. But the daughter refused. She had grown to love the baby, despite his irritable behavior. Read the excerpt from the Maori creation myth. Tane was driven to hide in his forests, which Tahwiri destroyed with horrible floods. Tangora was thrown into the sea, where he was attacked by the wind and lightning. Rongo and Haumia took refuge in the earth, shielding themselves in Papas embrace. Based on these excerpts, how do the Haida and Maori cultures view the mother-child relationship? Both view mothers as being easily fooled by their children. Both view mothers as willing to sacrifice themselves for their children. Both view mothers as trying to reduce their childrens power over them. Both view mothers as caring and protective over their children. what is the coefficient of the y-term in the expression 4x+5xy+2y State governments across the United States are creating programs aimed at reforming juveniles. Do you think juvenile offenders should receive special consideration in the criminal justice system? Write a few paragraphs explaining your stance and give reasons for your answer. Tectonic activity happens when changes to the Earths crust are caused by __________.A.changes to the Earths gravityB.changes to the Earths temperatureC.the movement of the Earths platesD.the rising of the Earths oceans In managerial leadership, which part is leadership?a. understanding.b. facilitating.c. exhibiting.d. influencing.e. demonstrating. Give an example of each type of electromagnetic radiation. Describe the biological community you live in and explain what role (niche) you play in it. Solve for n.d=2m +3n