At north wind headquarters, where were penguins first reported missing on the giant TV screen? And what did the penguins react?

Answers

Answer 1

Answer:

Berlin zoo

The penguins reacted that they must respond with action ASAP

Answer 2

Answer:

Berlin zoo, the penguins reacted that "It's time to go".

This means that the penguins care about each other and must rescue each other.


Related Questions

For a lens with focal length f find the smallest distance possible between the object and its real image.​

Answers

Answer:

Ray optics and optical instruments show that the least possible distance between an object and its real image for convex lens is 4f where f is the focal length of lens

During the reverse engineering process, a is
performed which identifies the design elements and principles incorporated into
the product design.

Structural Analysis
O Functional Analysis
O Visual Analysis
O Design Analysis

Answers

During the reverse engineering process, the performed which identifies the design elements and principles incorporated into the product design is Visual Analysis.

What is reverse engineering process?

Reverse engineering process involves putting or separating into parts an already made equipment or machines.

It can be done in aircraft, structural designs and many other products. It  is done to generate information on materials and design that is used in fabricating a design.

It make use of visual observation and analysis for it judgement and data collection.

Therefore,

During the reverse engineering process, the performed which identifies the design elements and principles incorporated into the product design is Visual Analysis.

Learn more on engineering below

https://brainly.com/question/17169621

#SPJ1

Which statement best explains how a vehicle's power steering system uses
abstraction?
O A. Data
O B. Applications
O C. Programming
O D. Communication systems

Answers

Answer:

C. Programming

(C) is the correct option

can
Vehicles equipped with Anti-Lock Brakes (ABS)
stop in shorter distances than vehicles without ABS

Answers

No. Vehicles equipped with Anti-Lock Brakes cannot stop at shorter distances than vehicles without ABS.

You'll apply the concepts of Lesson 1 to create pseudocode and a flowchart for a modular program. The body mass index (BMI) is often used to determine whether a person with a sedentary lifestyle is overweight or underweight for his or her height. A person's BMI is calculated with the following formula: BMI = Weight × 703 ÷ Height²​

Answers

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

//Ask user for height & weight//"Enter weight (in pounds):""Enter height (in inches"//Calculate the person's (BMI)//"BMI = weight * (703 / pow(height, 2));"//Display the person's (BMI)//

What is a flowchart?

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

What is a pseudocode?

A pseudocode can be defined as a description of the steps contained in an algorithm, especially through the use of a plain (natural) language.

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

//Ask user for height & weight//"Enter weight (in pounds):""Enter height (in inches"//Calculate the person's (BMI)//"BMI = weight * (703 / pow(height, 2));"//Display the person's (BMI)//

Read more on pseudocode here: https://brainly.com/question/13208346

#SPJ1

Which statement describes an advantage of DevOps

Answers

The correct statement that describes an advantage of DevOps is that  It enables the capability to continuously release software with high confidence.

What are the advantages of DevOps?

Teams who are known to fully uses DevOps practices are known to be one that often functions more smarter and also more faster, and they tend to deliver a good and better quality to their customers.

Note that there is an increased use of automation and also that of cross-functional collaboration that tends to lower complexity and errors.

Hence, The correct statement that describes an advantage of DevOps is that  It enables the capability to continuously release software with high confidence.

See options below

A) It allows for a slower and more reasonable time frame for making fixes in production mode.

B) It enables the capability to continuously release software with high confidence.

C) It promotes individual efforts for both development and operations.

D) It provides a clear separation between application methods and infrastructure methods.

E) None of these

Learn more about DevOps from

https://brainly.com/question/24306632

#SPJ1

Using TWO practical life experiences, discuss the critical section problem in
the context of an operating system

Answers

For instance, given a system of n processes (P₀, P₁, ....… Pₙ₋₁} with each process having critical section segment of code:

The critical section problem would cause the processes to change shared resources, writing file, updating table, etc.When one process enters the critical section, no other process would be in its critical section.

What is an operating system?

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

What is the critical section problem?

A critical section problem can be defined as a code segment in which all of computer processes access and make use of shared resources such as digital files and common variables, as well as performing write operations on these shared resources.

This ultimately implies that, a critical section problem can be used to design and develop a secured protocol followed by a group of computer processes, so that no other process executes in its critical section when another process has entered its critical section.

For instance, given a system of n processes (P₀, P₁, ....… Pₙ₋₁} with each process having critical section segment of code. The critical section problem would cause the processes to change shared resources, writing file, updating table, etc., so that when one process enters the critical section, no other process would be in its critical section.

Read more on critical section problem here: https://brainly.com/question/12944213

#SPJ1

Example of critical section problem in the context of an operating system is when process A change the data in a memory location  and process C want to read the data from the same memory.

What is  critical section problem in OS?

The critical section problem can be regarded as the problem  that involves the notification that one process is executing its critical section at a given time.

It should be noted that ,The critical section  can be seen in code segment  when there is access to shared variables .

Learn more about operating system at:

https://brainly.com/question/1763761

#SPJ1

Which of the following is a key feature of a relational database?

A) It has high scalability and performance that can enable almost unlimited growth
B) It has flexible data models that make it easy to store and combine
data of any structure and allow dynamic changes to the schema.
C) It is designed for highly available systems that should provide a consistent, high-quality experience for all users globally
D) It uses primary keys and foreign keys as a means to provide
efficient access to data and is supported directly in the database
rather than maintained in the application code.

Answers

It uses primary keys and foreign keys as a means to provide efficient access to data and is supported directly in the database rather than maintained in the application code.

Explanation: Relational databases use an expressive query language, make efficient use of indexes within the database, ensure strong consistency, and fit well within an enterprise management system. Non-relational databases have a flexible data model, have high scalability, and performance, and have always-on global deployments.

The statement which describes a key feature of a relational database is that it uses primary keys and foreign keys as a means to provide efficient access to data and is supported directly in the database rather than maintained in the application code. Thus, the correct option for this question is D.

What is a Relational database?

A relational database may be defined as a collection of information that organizes data in predefined relationships where data is stored in one or more tables or relations of columns and rows, making it easy to see and understand how different data structures relate to each other.

The key features of a relational database may include atomicity, consistency, isolation, durability, data consistency, flexibility, togetherness, data sharing, independence, etc. Each relation (table) must have a unique field that describes each record. This unique field is called a primary key.

Thus, the correct option for this question is D.

To learn more about Relational databases, refer to the link:

https://brainly.com/question/13262352

#SPJ2

What (if any) are the same feature requirements that might be found in server software/OS environments

Answers

The same feature requirements that might be found in server software/OS environments

They include:

Server Hardware Requirements  such as  Quad-Core 2 Ghz or much more high,  8 GB RAM  or more  and also free disk space.

What are the software requirements for a server?

The Software requirements for any given database server includes;

Database server Operating system, etc.

Some of the key features of the key server operating system is made up of: the capability to access the server when using either GUI and command-level interface. the ability to execute all or a lot of processes from OS commands and others.

Learn more about software/OS environments from

https://brainly.com/question/26424062

#SPJ1

4:when a computer is on it is
normally termed......
A:information
B:programming
C:running ↓

Answers

Answer:

c: running

Explanation:

when the computer is turned on The operating system keeps things organized in the background so that multiple programs can run at the same time

What is computer viras? Loist 2 preventive measures against it​

Answers

A computer virus is a sort of malicious software, often known as malware, that travels across computers and causes data and software harm. Computer viruses are designed to cause system disruption, serious operational challenges, and data loss and leaking.

Types of Computer Viruses.

They include

Macro viruses – These are the largest of the three virus types.

Boot record infectors – These viruses are known also as boot viruses or system viruses.

File infectors – These viruses target

Thank you,

Eddie

what are the 49 questions for creat and edit Excel assessment​

Answers

Answer:

1. What is the keyboard shortcut key to lock cell references in a formula

2. What are the shortcut keys for Auto Sum?

3. What are the shortcut keys to insert a new row in an Excel spreadsheet?

4. What are the shortcut keys to group rows so you can expand/contract a section of data?

5. Which of the following Excel features allows you to select/highlight all cells that are formulas?

6. What are the keyboard shortcut keys to paste special?

7. Assuming cell A1 is displaying the number "12000.7789". What formula should be used to round this number to the closest integer?

8. What are the keyboard shortcut keys to edit formula in a cell?

9. What are the keyboard shortcut keys to insert a table?

10. In which tab of the ribbon can you change Workbook Views to Page Break Preview?

11. What is the best practice for financial modeling in excel?

12. Which of the following features cannot be found in the Data ribbon?

13. The shortcut keys to increase the number of decimal places are

14. What are the shortcut keys to open up the Find and Replace window?

15. Which tab of the ribbon should you go to for removing grid lines on a worksheet?

16. What is a cell address in Excel?

17. What do you mean by Relative cell referencing and Absolute cell referencing in MS Excel?

18. How can you restrict someone from copying a cell from your worksheet?

19. How is a Formula different from a Function in Excel?

20. Mention the order of operations used in Excel while evaluating formulas.

21. What is the difference between count, counta, and countblank?

22. What is the shortcut to add a filter to a table?

23. How can we merge multiple cells text strings in a cell?

24. How many report formats are available in Excel?

25. What is a Pivot Table?

26. How do you find duplicate values in a column?

27. How can you remove duplicate values in a range of cells?

28. What are the wildcards available in Excel?

29. What is Data Validation? Illustrate with an example.

30. How do you create a column in a pivot table?

31. How does a Slicer work in Excel?

32. What are macros in Excel?

33. What is the What-If Analysis in Excel?

34. What is the difference between a function and a subroutine in VBA?

35. What is the difference between This Workbook and Active Workbook in VBA?

36. How do we check whether a file exists or not in a specified location?

37. Write a VBA function to calculate the area of a rectangle.

38. Write a VBA function to check if a number is a prime number or not.

Explanation:

I think these questions are enough for you.

To set up scenarios,then set up a list, then set up the reference cell. to set up the cells that display the output results from the scenario. what do you use

Answers

To  set up the cells that display the output results from the scenario, you will use data table , then Vlookup and Choose.

What do you use to set up the cells that display the output results from the scenario?

In setting up the cells that display the output results from the scenario, then the first thing needed is data table which is necessary when  setting up a list.

Followed by the , Vlookup  which is used in the setting up of  the reference cell and lastly Choose.

Learn more about  reference cell on:

https://brainly.com/question/21644802

#SPJ1

The seven web design elements that drive the customer experience include which of these?

Answers

The seven web design elements that drive the customer experience include:

(1) context;

(2) content

(3) community

(4) customization

(5) communication

(6) connection

(7) commerce.

What are the elements of website design?

Some other elements to web design:

1) Content.

2) Usability.

3) Aesthetics.

4) Visibility.

5) Interaction.

What is web design?

Web design is known to be the act of making or creating websites.

Note that is one that is made up of all or a lot of different element such as; webpage layout, content production, and others.

The terms web design and web development are known to be used a lot of times as one or interchangeably.  web design is said to be a subset of a wider category of web development.

Hence, he seven web design elements that drive the customer experience include:

(1) context;

(2) content

(3) community

(4) customization

(5) communication

(6) connection

(7) commerce.

Learn more about web design from

https://brainly.com/question/25941596

#SPJ1

As a computer starts up, you see an error message about the hal. at what point in startup does this error occur?

Answers

If you see an error message about the HAL as a computer starts up, the point in startup at which this error occurs is: C. When Windows attempts to launch critical device drivers.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouse

What is an operating system?

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

In Computer technology, if you see an error message about the HAL as a computer starts up, the point in startup at which this error occurs is typically when the Windows operating system attempts to launch critical device drivers.

Read more on computer here: https://brainly.com/question/10811580

#SPJ1

Complete Question:

As a computer starts up, you see an error message about the HAL. At what point in startup does this error occur?

A. When BIOS/UEFI is searching for an OS using devices listed in the boot priority order

B. When Windows attempts to load the user profile

C. When Windows attempts to launch critical device drivers

D. When Windows attempts to launch the Windows kernel

What type of computer system can recognize and act on patterns or trends that it detects in large sets of data and is developed to operate like the human brain?.

Answers

The type of computer that can recognize and act on patterns or trends that it detects in large sets of data is a neural network.

What is a neural network?

A neural network is a type of computer system that can spot patterns or trends in massive amounts of data and take appropriate action. An architecture for a neural network is based on the mesh-like design of the human brain and makes use of massively parallel processors.

As a result, neural networks can process multiple bits of data simultaneously and discover patterns. A computer may adapt its response to circumstances based on the feedback it gets thanks to learning systems. To find information on any topic, a genetic algorithm can be used to scan the huge Internet's resources.

Therefore, a neural network is a sort of computer that can spot patterns or trends in huge amounts of data and take appropriate action on them.

To learn more about neural networks, refer to the link:

https://brainly.com/question/14632443

#SPJ2

A neural network is a sort of computer that can spot patterns or trends in huge amounts of data and take appropriate action on them.

What is neural network?

Neural network is defined as a technique used in artificial intelligence that instructs computers to process information in a manner modeled after the human brain.  A certain kind of computer system called a neural network can identify patterns or trends in vast volumes of data and take the necessary action. Massively parallel processors are used in a neural network architecture that is based on the human brain's mesh-like structure.

As a result, neural networks are able to analyze numerous pieces of data at once and find patterns. Thanks to learning systems, a computer may modify its response in reaction to the situation. A genetic algorithm can be used to search the vast Internet's resources to find information on any subject.

Thus, a neural network is a sort of computer that can spot patterns or trends in huge amounts of data and take appropriate action on them.

To learn more about neural network, refer to the link below:

https://brainly.com/question/14632443

#SPJ5

Project 12-2: Bird Counter
Help me make a Python program for birdwatchers that stores a list of birds along with a count of the
number of times each bird has been spotted.


Console
Bird Counter program

Enter 'x' to exit

Enter name of bird: red-tailed hawk
Enter name of bird: killdeer
Enter name of bird: snowy plover
Enter name of bird: western gull
Enter name of bird: killdeer
Enter name of bird: western gull
Enter name of bird: x

Name Count
=============== ===============
Killdeer 2
Red-Tailed Hawk 1
Snowy Plover 1
Western Gull 2


Specifications
 Use a dictionary to store the list of sighted birds and the count of the number of times
each bird was sighted.
 Use the pickle module to read the dictionary from a file when the program starts and
to write the dictionary to a file when the program ends. That way, the data that's
entered by the user isn't lost.

Answers

The program based on the information given is illustrated below.

How to illustrate the program?

It should be noted that a computer program is a set of instructions in a programming language for the computer to execute.

Based on the information, the program is illustrated thus:

Code:

import pickle

#function to read birds data

def readBirdsData():

try:

birdsFile = open("birdsData","rb")

birdWatcher = pickle.load(birdsFile)

birdsFile.close()

birdWatcher ={}

except EOFError:

birdWatcher ={}

return birdWatcher

#function to write the data into file using pickle

def writeBirdsData(birdWatcher):

if birdWatcher == {} :

return

sorted(birdWatcher)

birdsFile = open("birdsData","ab")

pickle.dump(birdWatcher,birdsFile)

birdsFile.close()

#function to display birds data in sorted order

def displayBirdsData(birdWatcher):

print("Name\t\tCount")

print("========\t===========")

for key in sorted(birdWatcher.keys()):

print("{}\t\t{}".format(key,birdWatcher[key]))

#main function

def main():

birdWatcher = readBirdsData()

print("Bird Counter Program")

print ("\nEnter 'x' to exit\n")

name = input("Enter name of bird: ")

while True:

#break the loop if x is entered

if name == 'x':

#if the name exists in dictionary then increase the value

if the name in birdWatcher.keys():

birdWatcher[name] = birdWatcher[name] + 1

else:

#dd it otherwise

birdWatcher[name] = 1

name = input("Enter name of bird: ")

displayBirdsData(birdWatcher)

writeBirdsData(birdWatcher)

#driver code

if __nam__ == '__main__':

main()

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the network.

Answers

Answer:

Save of data is the answer

Are there every circumstances where u skip requirements engineering

Answers

No,  there is no circumstances where you can skip requirements engineering. This is because the Requirements for engineering makes a bridge to set up  and construction and it is one that a person cannot skipped.

Why is that many software developers pay enough attention to requirements engineering?

Some software engineers are known to be people who are said to record initial software requirements.

The requirements of engineering  is known to be a very difficult one and it is one that is made up of  Unrealistic expectations demand unrealistic a lot of requirements that is known to be made up of factors that cannot be fulfilled but it is one that people or its student cannot skipped.

Therefore based on the above, my answer is No,  there is no circumstances where you can skip requirements engineering. This is because the Requirements for engineering makes a bridge to set up  and construction and it is one that a person cannot skipped.

Learn more about engineering from

https://brainly.com/question/17169621

#SPJ1

what are the ways to deal with stress from workplace​

Answers

Answer:

alcohol

Explanation:

speaking from experience

Assemble a client computer based on your programmed of study (e.g IT, CS, Business etc), discussing the type of components ( giving their exact names and functions) you would need and gives reasons why you need them

Answers

The assembly of client computer based on IT  are:

The monitor -  Acer Nitro XV282K KVbmiipruzx The CPU -  64-Core TR 3990XThe mouse - Logitech MX Master 3Voltage regulator- APC Line-R Automatic Voltage RegulatorSolar battery - Tesla Powerwall 2.Microsoft office 365

The  reasons why I need the above hardware and software is because they are the one of the best in regards to IT and they will really help me a lot in regards to gaming and programming.

What is a client computer in regards to computer?

The term client computer is known to be one that is often used at home and also in corporate environment.

A  client is seen as an kind of computer hardware or software device that is known to often needs access to a service that is said to be provided by a server. Clients are known to be the requesting program or the user that is in a client-server base.

Therefore, The assembly of client computer based on IT  are:

The monitor -  Acer Nitro XV282K KVbmiipruzx The CPU -  64-Core TR 3990XThe mouse - Logitech MX Master 3Voltage regulator- APC Line-R Automatic Voltage RegulatorSolar battery - Tesla Powerwall 2.Microsoft office 365

Learn more client computer from

https://brainly.com/question/14753529

#SPJ1

Accenture has engaged with a new financial client who is looking for a comprehensive,company-wide security solution, and has operations in Europe. When designing the client's solution, what should be prioritized between Confidentiality, Integrity, and Availability (CIA)?​

Answers

They should be prioritized between Confidentiality, Integrity, and Availability is Integrity is necessary to guarantee that funds are moved to the correct accounts, next come Availability and Confidentiality.

What is integrity?

It is the consistent practise of telling the truth and upholding lofty moral and ethical ideals and convictions. Internal consistency is viewed as a value, and it is advised that those with internally inconsistent principles either explain the discrepancy or adjust their ideas.

Is necessary to prioritized the  Integrity because guarantee that funds are moved to the correct accounts.

See more about CIA at brainly.com/question/12413406

#SPJ1

USPS stuck on "We are preparing your order for shipment" for 3 days. What does this mean?

Answers

What the message  "We are preparing your order for shipment" for 3 days means is that it is stuck on a loop.

What is a loop in computer science?

In programming the word loop is used to refer to the fact that an instruction or a sequence is repeated for a period that is longer or than is necessary. In order for this to change, certain modifications may have to be done on the program, else it may continue to run till it gets to when it is completed.

The condition would then be checked in order to show that it has been able to reach the prescribed number that it was supposed to for the message to terminate.

Read more on loops here: https://brainly.com/question/16922594

#SPJ1


Question 9
The boom in collaboration between U.S. companies and workforces in India created a
need for blank

Answers

Answer:

Outsourcing

Explanation:

The boom in collaboration between U.S. companies and workforces in India created a need for Outsourcing.

I believe this is correct, but I'm not 100% certain.

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to transfer a good file to the computer?

Answers

The fastest way to transfer a good file to the computer is Use the C$ administrative share to copy the file.

How do I copy a file?

To copy a file, right-click on the desired file and select Copy. Alternatively, you can use the keyboard shortcut. To copy the item: click Ctrl+C. Navigate to the folder you want to move or copy the item to and click Ctrl+V or right-click and select paste.

To automatically paste the text, you will be inserting the copied content, which is in the clipboard to the desired location by the user, since such an operation only works if something has previously been copied or cut.

See more about copy a file at brainly.com/question/18241798

#SPJ1

"using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer."

Answers

The use of the broadband type of communications channel is one where several users can simultaneously use a single connection for high-speed data transfer.

What is wireless medium?

In wireless transmission, the tool that is often used is the air, is via electromagnetic, radio and microwave signals.

What does broadband mean?

The term Broadband is known to be the sharing or the transmission of wide bandwidth data in course of a high speed internet connection.

Note also that broadband internet is the lowest of 25 Mbps download and that of 3 Mbps upload speeds.

Hence, The use of the broadband type of communications channel is one where several users can simultaneously use a single connection for high-speed data transfer.

Learn more about communications from

https://brainly.com/question/26152499

#SPJ1

A user tells you that microsoft word gives errors when saving a file. what should you do next?

Answers

Answer:try to change the name of the file not adding any symbols not accepted as file, or try to change the destination of the file, ex. an external usb. Or double check if the destination folder is not full.

Explanation:

errors when saving may occur because of the above


How does a fully integrated Data and Analytics Platform enable organizations to
convert data into consumable information and insight?

Answers

A  fully integrated Data and Analytics Platform enable organizations to  convert data into consumable information and insight by:

How does a fully integrated Data and Analytics Platform enable convert data?

This is done by putting together or  the archiving of all the captured data and also the act of getting them back if and when needed for business purpose.

Note that it is also done by making analytics reports and creating Machine Learning models to refine the data.

Learn more about Analytics Platform from

https://brainly.com/question/27379289

#SPJ1


[tex] { \green \bigstar}\rm \: Convert \: ( \: 268.75 \: )_{10} \: into \: binary \: equivalent. \: [/tex]






Thank uh ~​

Answers

[tex]\huge\underline{\underline{\boxed{\mathbb {SOLUTION:}}}}[/tex]

Divide 268 by 2, keeping notice of the quotient and the remainder. You will have to keep dividing the quotient by 2 until you get a quotient of zero as shown below:

[tex]\small\longrightarrow \sf{\dfrac{268}{2} =134 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{134}{2} = \: 67 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{67}{2} = \: 33 \: R \: 1 }[/tex]

[tex]\small\longrightarrow \sf{\dfrac{33}{2} = \: 16 \: R \: 1}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{16}{2} = \: 8 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{8}{2} = \: 4 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{4}{2} = \: 2 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{2}{2} = 1 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{1}{2} = \: 0 \: R \: 1}[/tex]

Writing out the remainder from bottom to top will give 100001100.

Multiply the decimal 0.75 by 2 and keep noting down by integer values as shown:

[tex]\sf\longrightarrow{\small 0.75 \cdot 2 = 1.5 = 1 + 0.5}[/tex]

[tex]\sf\longrightarrow{\small 0.5 \cdot 2 = 1.0 = 1 +0}[/tex]

The equivalent binary for 0.75 will be 0.11.

▪ [tex]\sf\longrightarrow{100001100 + 0.11 = 100001100.11}[/tex]



[tex]\huge\underline{\underline{\boxed{\mathbb {ANSWER:}}}}[/tex]

[tex]\large\boxed{\bm{100001100.11}}[/tex]

Security hardware and software that control access to a company’s intranet and other internal networks is called a(n):_________

Answers

Answer:Firewall

Explanation:

Other Questions
what are the features of an honest person? Give an review on this work, give an epilogue on this work. How would you conceive of the author? What kind of person appears to have filled these pages? Write a character sketch of the person captured in these pages from an outsider's point of view. Refer to specific pieces of the writing to support your impression of the author of this writing. Briefly describe what the nestorian controversy/heresy was and the reason for the conflict. A successful organization can involve its employees in the control system in all of the following ways EXCEPT A sine bar is used to determine the angle of a part feature. The length of the sinebar=8.000in. The rolls have a diameter of 1.000 in. All inspection is performed on a surface plate. Inorder for the sine bar to match the angle of the part, the following gage blocks must be stacked: 2.0000,0.5000, 0.2500, and 0.0050. Determine the angle of the part feature. which number best represents the scope of the graphed line? a. -5 b. -1/5 c. 1/5 d.5 Out of all the fights with the Morlocks, which one does the Time Traveller classify as the worst in The Time Machine?A. The fight they have when the Time Traveller first enters the underworldB. The fight they have around the burning forestC. The fight they have when the Time Traveller is finally reunited with the time machineD. The fight they have against all the Eloi people Use the recursive formula to find the first five terms in the arithmetic sequence. inflation is a substantial problem. which word can you use instead of substantial to make the sentence more precise without changing its meaning? Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems. Explain how abigail might have ""set up"" elizabeth proctor. list the events chronologically A landscaper accidentally had their leg crushed by a tree. their femur was impacted with such force that a section of the bone completely shattered into fragments. what type of break is this? PLS HELP ASAP! TyLet g(x)= 2x^2+3x-9 and h(x)=x^2+2x-6Find (h-g)(2.1) Write the first five terms of the sequence with the given nth term. an = 3n 1 n!. To select the correct student's t-distribution requires knowing the degrees of freedom. How many degrees of freedom are there for a sample of size n? What were the primary reasons why the united states agreed to support the israeli cause after initial reluctance in the 1970s? What is the de broglie wavelength of this electron? [ke[ke = 12mv2;12mv2; 1 electron volt (ev)(ev) = 1. 6021019j] An important difference between agents and brokers and merchant wholesalers is that:________ You have recently joined in an academic programme to learn more about programming. You have learnt a few programmes. Your teacher has now given you a number of tasks to complete. a) Explain the concept of an algorithm and describe common algorithmic techniques and solutions.b)Create a flowchart from the following algorithm.Step 1: Input VALUE1, VALUE2Step 2: if (VALUE1 > VALUE2) then MAX VALUE1 else MAX VALUE2 endifStep 3: Print The largest value is, MAX At what temperature must a hot reservoir operate in order to achieve a 30arnot efficiency when the cold reservoir operates at 200 c?