Jane, a marketing manager for the Grocery SuperStore retail chain, fired up a computer program that gave her ready access to information about product availability and customer buying. The program helped her immediately set prices for bananas and cherries. This type of computer program is called ________.

Answers

Answer 1

Answer:

This type of computer program is called Intranet.

Explanation:

Intranet is a computer network with restricted access.  

In a company intranet, one can share and manage corporate information, tools, systems, and services only within an organization.

Jane, as an authorized member of company network, she was able to access to information about product price and changed it. She used Intranet of the Grocery SuperStore retail chain.


Related Questions

When starting a computer running Windows Vista, a technician sees that the error message "BOOTMGR is missing" appears after the POST. What are two possible solutions for this problem? (Choose two.)a. Restore boot.ini from the installation media.b. Restore BOOTMGR using the Windows Recovery Environment.c. Run the bootrec /fixboot command.d. Run virus removal software.e. Secure the display adapter on the motherboard.f. Run chkdsk /F /R from the recovery console.

Answers

Answer:

B and C

Explanation:

Possible solution to solving "BOOTMGR is missing" error in Windows Vista is to use the Windows Recovery Environment.

Another option is to run "bootrec/fixboot" command from the comman prompt and the command prompt is also accessible from the windows recovery environment.

If it can be applied, the least-damaging recovery option is ________. Group of answer choices restoration from backup tapes total reinstallation repair during continuing server operation All of these are about equally damaging

Answers

Answer:

Repair during continuing server operation

Explanation:

If it can be applied, the least-damaging recovery option is Repair during continuing server operation Group of answer choices restoration from backup tapes total reinstallation repair during continuing server operation All of these are about equally damaging

n a MenuStrip, if you create each main menu item with a(n) ____ in front of a unique letter, then the user can press Alt and the given letter to activate the menu choice as an alternative to clicking it with the mouse.
A) %
B) $
C) &
D) >

Answers

Answer:

C) &

Explanation:

In the C# programming language a MenuStrip adds a custom menu bar to the program that you are making in which you can create unique menu items. When doing so, if you create a menu item with an & in front of a unique letter, the user can press ALT and the letter to activate the menu choice. These shortcuts are known as Access Keys.

You are designing a disaster recovery plan that includes a multi-site configuration. The backup site must include all necessary hardware and current backups of the original site. Which type of site do you need to design?

A Cold site
B. Warm site
C. Hot site
D. Virtual site

Answers

Answer: C. Hot site

Explanation:

Hot site is a type of backup site which must include all necessary hardware, software, network, internet connectivity and current backup of the original site. It also allows a company or firm to resume back to normal business operations, within a short period of time after a disaster

Write a public interface named Test with the following behavior:
a. a method getDuration that returns a Duration object.
b. a method check that accepts an int parameter and returns a Result object.
c. a method getScore that returns a double.

Answers

Answer:

The code to this question can be given as:

Code:

public interface Test  //define interface  

{

   public abstract Duration getDuration(); //define method

getDuration.  

   public abstract Result check(int a);

//define method

check .

   public abstract double getScore();

//define method getScore.  

}

Explanation:

In the above code, we define an interface that is "Test" inside an interface, we define three methods that can be defined as:

First, we define a method that is "getDuration" that method returns  Duration as an object. Second, we define a method that is "check" this method accepts an integer parameter that is a and return Result. The third method is "getScore" this method will return a double value.

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

Answers

Answer:

Management

Explanation:

Because Microsoft Access includes not only the software needed to create a database but also the software needed to create forms, reports, data dictionaries, and other capabilities, it is often referred to as a Database Management System (DBMS). A DBMS is used to maintain data consistency by managing the storage and retrieval of the data. Microsoft access can create and administer a database and has query components that are analogues to most DBMS.

Technician A says that vehicles with electronic returnless fuel systems use pulse width modulation to power the fuel pump and maintain fuel pressure. Technician B says that the electronic returnless fuel system uses a power transistor to control the fuel pump. Which technician is correct?
A) Technician A only
B) Technician B only
C) Both technicians
D) Neither technician

Answers

Answer:

The correct option to the following question is option (C) Both technician.

Explanation:

Because both the technician says correct that is the returnless fuel system use both of the techniques which is by the use of transistor or by the use of the width modulation by which they control fuel pump.

PWM(Pulse Width Modulation) can work by pulsates the direct current and the other ways by which it works.

So, the other options are false because both are true.

Final answer:

Both Technician A and B are correct as electronic returnless fuel systems use pulse width modulation, controlled by a fuel pump driver module, which may include a power transistor to manage the fuel pump and maintain pressure.

Explanation:

The question pertains to the control mechanisms used in electronic returnless fuel systems in vehicles. Technician A states that these systems use pulse width modulation to control the fuel pump speed and thereby maintain fuel pressure. Technician B suggests that a power transistor is used to control the fuel pump in these systems.

Electronic returnless fuel systems do indeed use pulse width modulation to control the fuel pump, which allows for precise control over fuel pressure without returning excess fuel to the tank. A fuel pump driver module controls the voltage sent to the fuel pump, which can include using a power transistor. Therefore, both technicians are correct as they're describing different aspects of the same system.

The answer to the question is C) Both technicians.

Passing by reference is used if a parameter's data flow is A. one-way, into the function. B. one-way, out of the function. C. two-way, into and out of the function. D. a and b above E. b and c above

Answers

Passing by reference is used if a parameter's data flow is two-way, into and out of the function.

C. two-way, into and out of the function.

Explanation:

If a function in programming language passing the parameter by reference means it only sending the address of parameter to a function. If any value is changed on reference parameter it will changed original value.

If parameter passed by value means it is one way, where value been send to the function.

Whereas by reference means it two-way, in and out of the function. Mostly it called as pointer.

It is available in c , c++, where declare of variable “*” or “&” address off.

A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the following requirements:_______
Must be able to MITM web-based protocols
Must be able to find common misconfigurations and security holes
Which of the following types of testing should be included in the testing platform?
A. Reverse engineering tool
B. HTTP intercepting proxy
C. Vulnerability scanner
D. File integrity monitor
E. Password cracker
F. Fuzzer

Answers

The manager has provided the following requirements Password cracker:

E. Password cracker

Explanation:

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

An OR function nested in an IF function results in

A. returning a certain formula or value if one of either two conditions is met.
B. returning a certain formula or value if all listed conditions are met.
C. applying either one formula or another regardless of which conditions are met.
D. applying two or more formulas regardless of which conditions are met.

Answers

I think it’s C I hope this helps

Answer: C: an IF function within an IF function

Explanation:

In the source-code file containing a class's member function definitions, each member function definition must be tied to the class definition by preceding the member function name with the class name and ::, which is known as the:

Answers

Answer:

"Binary scope resolution operator" is the correct answer to the following question.

Explanation:

The following answer is correct because the Binary scope resolution operator is represented by the double colon(::).

The Binary scope resolution operator is used in many ways in different programming languages. In C++, the Binary scope resolution operator is used to call the global variable if the name of both global and local variables is the same and also use when we want to define method from the external side of the class and we also used to access any static data type variable.

Which of the following statements is false? Question 22 options: a) Companies that use Software-as-a-Service are running applications on the vendor’s hardware. b) Application service providers are similar to Software-as-a-Service providers. c) Companies that purchase open-source software cannot modify it. d) Outsourcing refers to acquiring IT applications from outside contractors. e) Insourcing refers to building IT applications in-house.

Answers

Answer:

A is your answer I think

The statement which is false among the given answer options is: a) Companies that use Software-as-a-Service are running applications on the vendor’s hardware.

Software-as-a-Service (SaaS) can be defined as a cloud computing delivery model that typically involves making licensed software programs (applications) available over the Internet for use by end users (clients) on a subscription basis through a vendor (third-party) or by centrally hosting it in the cloud.

Some examples of Software-as-a-Service (SaaS) include the following:

BigcommerceSalesforceSlackDropbox

Generally, companies that use Software-as-a-Service (SaaS) are running software programs (applications) on their computer's hardware rather than the vendor’s hardware.

In conclusion, all of the other answer options except A are true and correct.

Find more information: https://brainly.com/question/15062747

Title text boxes on every slide must be the same format.

A) True
B) False

Answers

Answer:

B) False

Explanation:

You can adjust the boxes to whatever you'd like, and even add more if you needed too.

Answer:

A) True

Explanation:

Title text boxes on all the slides must be the same format. It looks professional. Moreover, it doesn't mess up your drawings or other writings in the rest of the slide.

Assume the existence of a BankAccount class. Define a derived class, SavingsAccount that contains two instance variables: the first a double, named interestRate, and the second an integer named interestType. The value of the interestType variable can be 1 for simple interest and 2 for compound interest. There is also a constructor that accepts two parameters: a double that is used to initialize the interestRate variable, and a string that you may assume will contain either "Simple", or "Compound", and which should be used to initialize the interestType variable appropriately. There should also be a pair of functions getInterestRate and getInterestType that return the values of the corresponding data members (as double and int respectively).

Answers

Answer:

Class SavingsAccount : public BankAccount

{

double interestRate;

int interestType;

public SavingsAccount(double interestRate, string interestType)

{

this.interestRate=interestRate;

if(interestType=="Simple")

this.interestType=1;

else if(interestType=="Compound")

this.interestType=2;

}

public double getInterestRate()

{

return this.interestRate;

}

public int getInterestType()

{

return this.interestType;

}

}

Explanation:

A well-structured relation is a relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies and is also known as a ________.

Answers

Answer:

"Table" is the correct answer for the given question.

Explanation:

Table are the collection of rows and table in database we can insert the data in the table .The well-structured relation is a table which contains the minimum duplicacy  i.e redundancy with the help of normalization concept.

In a table the user can insert ,modify and delete the record without any error .The main advantage of  well structured relation is that record is consistent .In the well structured relation the duplicacy of record is very minimum.

"What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?

A. network access control
B. virtual LANs
C. network address translation
D. host health checks "

Answers

Answer:

a network access control

Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. ​
Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client?​
A. ​A bus network
B. ​A ring network
C. ​A hub network
D. ​A star network

Answers

Answer:

Neil should recommend to this client a star network.

Explanation:

A star network is a computer network where every host is connected to a central hub, switch, or computer.

Main advantage of a star network is that one corruption (unless it is central hub) doesn't affect the rest of the network, and it's easy to modify.

The star network is one of the most common computer network setups

Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the correct way to read data from the file until the end of the file is reached?
a. while (inputFile != null)
b. while (!inputFile.EOF)
c. while (inputFile.hasnextInt())
d. while (inputFile.nextLine == " ")
e. while (inputFile.hasnextInt())

Answers

Answer:

The answer is letter C

Explanation:

The correct way to read data from the file until the end of the file is reached is while (inputFile.hasnextInt())

What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate​ computers?a. the android os
b. cloud computing
c. grid computing
d. use of web os
e. the use of non sql databases?

Answers

Answer:

Option (D) i.e., cloud computing is the correct answer to the following question.

Explanation:

The following option is correct because cloud computing is a better way to store our application, data, and programs on the internet with privacy and without storing them into the hard drives.  

So, that's why the following option is correct. It simple words, cloud computing provides us the facility to store data through the internet without storing them into the drive.

Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?

Answers

Answer:

restore the last full backup first.

Explanation:

Based on the information provided within the question it can be said that what you should do is restore the last full backup first. This is because a differential backup, backs up all the progressive changes made after the last full backup. Therefore the last full backup would contain all the data before the drive failed. Once this is done then you may restore the last successful differential backup prior to the drive failure.

Suppose your school’s computer lab provides high-end architecture software that can be accessed from any lab computer, but a maximum of 5 students can use it at any given time. What kind of license does it have

Answers

Answer:

Multiple-user licence.

Explanation:

A multiple-user licence allows the software to be accessed by the maximum number of users specified within the licence. In this scenario, it is 5 students, the connections are concurrent, meaning at any given time there can only be five users running the software. The software can be installed on more than 5 computers, but the number of active users is limited to 5.

Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section reference 1The intern responds that he found the design on the Internet. Shelli replies that they can’t use it. Her decision reflects which ethical issue related to IT?

Answers

Answer:

Copyright issue

Explanation:

Copyright issue is very much a problem in the field of IT. Copyright means that whatever an author created cannot be used or published by anyone else without the consent of the author. The content created by an author can be in any form: art, idea or whatever form.

After Maya gave her friend the password to a protected website, the friend was able to remember it only long enough to type it into the password box. In this instance, the password was clearly stored in her ________ memory.

Answers

Answer:

short term

Explanation:

Short-term memory is the capacity for holding, but not manipulating, a small amount of information in mind in an active, readily available state for a short period of time.

For example, after Maya gave her friend the password to a protected website, the friend was able to remember it only long enough to type it into the password box. In this instance, the password was clearly stored in her short term memory.

Answer:

Short-term memory

The digital wallet stores a user’s payment information such as bank account and credit card numbers, a __________ to identify the user, and information that the user provides such as shipping information to speed up Internet transactions.

Answers

Answer:

Digital Certificate

Explanation:

By examining the source and destination addresses, the application usage, the source of origin, and the relationship between current packets with the previous packets of the same session, __________ firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.A. Static packet-filteringB. Application-level gatewayC. Stateful inspectionD. Circuit-level gateway

Answers

The relationship between current packets with the previous packets of the same session, Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

C. Stateful inspection

Explanation:

Basically packet filtering handles in gateways level at firewall. As Network administrator he or she keep monitoring the network packet, if any unauthorized user login is found on any session or same session it is consider as high risk.

These shows some illegal access to computer has be executed as immediate action network engineer has to see logs and their activities in firewall either if it invalid transaction immediately he has put filter of ip address or mac address possible.

Network administration he or she update firewall patches at regular intervals.

If you type too much text on a PowerPoint slide, the additional text is added to a second slide.

A) True
B) False

Answers

Answer:

This is false

The text just goes out of the slide and you can't see it until you lower the font size or until you delete some of it.

Explanation:

Answer:

false

Explanation:

im taking the test

To remove any hidden data from your document before sharing it, what should you do?

A. Click the View tab and then click Protect Document.
B. Click the File tab, click Check for Issues, and then click Protect Document.
C. Click the File tab, click Check for Issues, and then click Inspect Document.
D. Click the File tab, click Check for Issues, and then click Check Accessibility.

Answers

C. click the file tab, click check for issues, and then click inspect document

Your computer sign-in screen is visible, but after you enter your sign-in credentials the computer fails to sign in and present your desktop, then finally it restarts and takes you back to the sign-in screen. You want to get in to the Windows Recovery environment. What key do you hold down when you restart the computer to start the Windows Recovery environment?
a F8
b Ctrl
c F10
d Shift

Answers

Answer:

A

Explanation:

The answer is F8. The key that will usually take one into the windows recovery environment is F8, though it do varies with regard to the type of computer because some computer define explicit key that take one to the windows recovery environment. Even in other computer, it is usually between F1 - F12.

Which is a net ionic equation for the neutralization of a weak acid with a strong base?

Answers

Answer:  A net ionic equation for the neutralization of a weak acid with a strong base is:

Explanation:

- Let´s consider this balanced molecular equation:

                                HCN(aq) + NaOH(aq) --------} NaCN(aq) + H2O(l)

- You can see it is an acid-base reaction because OH (-) is taking away the H from HCN.

Where:     NaOH(aq) is the base and  

                 HCN(aq) is a weak acid as it has no oxygen.

- For the total ionic equation we will break up all the possible break ups and we get:

   HCN(aq) + Na (+)(aq)+ OH(-) (aq)  --------- }  Na (+)(aq)+CN(-) (aq) + H2O(l)

- For the net ionic equation we reduce:

     HCN(aq) + OH(-)(aq)  -------- }  CN(-)(aq) + H2O(l)

- We get the weak acid HCN(aq) plus the hidroxide ion which is the base.  

The spectator ions is Na(+)

The net ionic equation for the reaction of any strong acid with any strong base is identical

Net ionic equations for acid-base reactions a neutralization reaction between a weak acid, HCN, and a strong base, KOH.

A weak acid, weak base reaction can be shown by the net ionic equation example:  

HCl(aq) + NaOH(aq) ↔ H2O(l) + NaCl(aq) HF(aq) + OH-(aq) ↔ H2O(l) + F-(aq) HF(aq) + NaOH(aq) ↔ H2O(l) + NaF(aq) H3O+(aq) + OH-(aq) ↔ 2 H2O(l)  

When a strong acid neutralizes a weak base, the resulting solution's pH will be less than 7.

Weak acids as hydrofluoric, HF only dissociate partially or will react with sodium hydroxide, NaOH , a strong base, to produce aqueous sodium fluoride, NaF , and water to get the net ionic equation that describes this neutralization reaction.  

They are not considered to split apart into ions when writing net ionic equations.

This reaction is considered a neutralization reaction. The base (NaOH) and weak acid (CH3COOH) react to produce a salt (NaNO3 and water (H2O).

In the code segment below, assume that the int array numArr has been properly declared and initialized. The code segment is intended to reverse the order of the elements in numArr. For example, if numArr initially contains {1, 3, 5, 7, 9}, it should contain {9, 7, 5, 3, 1} after the code segment executes. /* missing loop header */

Answers

Final Answer:

The missing loop header should be:

c for (int i = 0; i < numArr.length / 2; i++)

   {int temp = numArr[i];

   numArr[i] = numArr[numArr.length - 1 - i];

   numArr[numArr.length - 1 - i] = temp;}

Explanation:

To reverse the order of elements in `numArr`, we need to iterate through the array using a loop that goes up to half its length. This is because we are swapping elements from the beginning with elements from the end, gradually moving towards the center. The loop header `for (int i = 0; i < numArr.length / 2; i++)` accomplishes this.

Inside the loop, we use a temporary variable `temp` to temporarily store the value at index `i`. We then assign the value at the corresponding position from the end of the array to index `i` and finally assign the value stored in `temp` to the position from the end. This swapping process continues until we reach the middle of the array, effectively reversing its order.

In mathematical terms, the loop iterates from `i = 0` to `i = numArr.length / 2 - 1`, ensuring that each element is swapped with its corresponding element from the end. The use of the temporary variable ensures that the values are exchanged without loss. The loop operates in O(n/2) time complexity, which simplifies to O(n), where n is the length of the array. This algorithm is efficient and widely used for reversing arrays in-place.

Other Questions
When connecting a trunk link between two switches, it is important to configure the allowed VLANs correctly on either end. If this is not done correctly _________ will occur. Im stuck on how to do these for Geometry. Bacchus, Inc. is a large, multinational corporation with various business units around the world. After a fire destroyed the corporation headquarters and largest manufacturing site, plans for which of the following would help Bacchus ensure a timely recovery?(A) Backup power.(B) Daily backup.(C) Business continuity.(D) Network security. PLEASE SHOW YOUR WORK I NEED THIS ASAP. thanksMrs. Bailey had 12 pieces of candy. She gave away some candy and has 3 pieces left. What is the percent decrease of candy? A brick is dropped from a big scaffold. What is its velocity after 4.0s? A community theater sold a total of 400 for price tickets for adults and children the price was $8.00 per adult to get in $5.00 per childrens ticket and the total revenue was $2750 how many adult tickets and how many Childers tickets were sold which place is the tenths and what is it rounded to? please answer quick thx The temperature and number of moles of a gas are held constant. Which of the following is true for the pressure of the gas? A. It is inversely proportional to the volume of the gas. B It is directly proportional to the volume of the gas.C It is inversely proportional to the mass of the gas. D It is equal to the mass of the gas. How fast does a 3 kg rocket accelerate if a force of 140 N is applied? what part of the ancient world where the seven wonders of the world from the Expression 4x^2-p(x)+7 leaves a remainder of -2 when divided by (x-3) find the value of pA) 11B)-2C)15D)40 What was the first ocean the caspian sea lost connection with The map shows medieval Europe. Map of Charlemagne's Empire. The empire is shaded in purple and reaches the Atlantic Sea, North Sea, and Mediterranean Sea.Charlemagne was known as the "father of Europe. How does this map help to explain that title? A modem from which communications occur in discrete units, and in which the start of a unit is signaled by a start bit at the front, and a stop bit at the back signals the end of the unit. A binomial probability experiment is conducted with the given parameters. Compute the probability of x successes in the n independent trials of the experiment.n= 15, p=0.8, x = 12P(12) =(Do not round until the final answer. Then round to four decimal places as needed.) Wailoo argues pervasively that the health crisis after Hurricane Katrina did not begin with the hurricane, but has deeper social roots in the high rates of kidney failure and other health problems among New Orleans poor and minority populations.True / False. Verbos Complete the chart. Question 1 with 8 blanks Infinitivo cruzar decir comenzar descubrir correr Participio pasado (masc.) cruzado (1) (2) (3) (4) Infinitivo aprender tener ver dormir traer Participio pasado (fem.) aprendida (5) (6) (7) (8) David wants to go to a community college, but his parents are pushing him to attend a four-year university. He is frustrated. During an argument about the subject, he yelled at his parents, told them their opinions were irrelevant, and did not give them time to respond to his points. He ended the conversation by storming out of the room and slamming the door.Which actions could David have taken to improve his communication on this issue? Check all that apply.A.) talk more until his parents understood himB.) practice active listeningC.) show respect to his parentsD.) change his opinion to match that of his parentsE.) use techniques to diffuse his angerANSWER: B, C AND E What does bubonic refer to if the store design allows for 43 feet for each row how many total carts fit in a row?