The distant connection's firewall needs to be configured to allow the following protocol and port number combinations in order to establish this link.
One Windows user reported a problem that required the operator to connect to a remote server using Remote Assistance in order to view the user's screen and display a lengthy and confusing error message. The operator's attempts to connect to the remote access almost always result in a notification saying that the connection has been rejected. The distant connection's firewall needs to be configured to allow the following protocol and port number combinations in order to establish this link. The response to this query is Windows Remote Desktop. Because Windows Remote Desktop is a feature of an OS (Operating System) or an application, users can connect their systems to computers that are located in other places by using this capability. Therefore, Windows Remote Desktop is the appropriate response.
Learn more about Windows Remote Desktop here:
https://brainly.com/question/13991120
#SPJ4
One way to format text is Blank Space__________ it.
Choose the answer.
Question 8 options:
inserting
underlining
moving
deleting
Answer:
underlining
Explanation:
It really doesn't matter what language or software you use.
Formatting is the process of changing the way existing text appears
Only underlining changes the existing format of the text
The others - inserting, moving, deleting are editing commands.
* Describe the five components of a
computer
Answer:screen, keyboard, cpu, mouse, processor, mother board, power box. Ports
Explanation:
given the integer variable numinches, type cast numinches to a double and assign the value to the variable newinches. ex: if the input is 12, then the output is:
System.out.print (num +"5.13"+ cost + "n"); Type cast the double variable numInches to an integer and assign the value to the variable newInches.
It is necessary to make a double variable in some way. A double value can be defined by putting the double keyword in front of the variable. You commonly used this type of data, which has decimal digits of 14 or 15. Variables use the double 64-bit floating data type. A double type can be used to represent values in both their whole and fractional forms. It can have a maximum of 15 digits, including the digits before and after the decimal point. When stored as IEEE 64-bit (8-byte) floating-point integers, negative values for double (double-precision floating-point) variables vary from -1.79769313486231E308 to -4.94065645841247E-324.
Learn more about Double variable here:
https://brainly.com/question/29989514
#SPJ4
Meaning of U.R.L in computer
Uniform Resource Locator, or URL, is an Internet resource address and a reference to that resource.
A URL has two main components:
Protocol identifier: For the URL http://example.c0m, the protocol identifier is http.Resource name: For the URL http://example.c0m, the resource name is example.com.The resource name and the protocol identification are separated from one another by a colon and two forward slashes. The name of the protocol to be used to get the resource is indicated by the protocol identifier. The Hypertext Transfer Protocol (HTTP), which is frequently used to serve up hypertext content, is utilized in the sample. One of the many different protocols used to access various kinds of online content is HTTP. The File Transfer Protocol (FTP), Gopher, File, and News are further protocols.
The full address to the resource is contained in the resource name. However, for many protocols, including HTTP, the resource name comprises one or more of the following elements. The structure of the resource name totally depends on the protocol being used.
Host Name: The name of the computer that houses the resource.
Filename: The computer's pathname for the file.
the port number to which you should connect (typically optional).
Referencing a named anchor inside a resource that often designates a particular spot within a file (typically optional).
Many protocols only need the host name and filename, while others allow for the port number and reference. For instance, the resource name for an HTTP URL must include the host name of the network server, the filename of the content on that server, a port number, and a reference.
the size of a newly created folder on the computer is
Answer:
2,345,696 bytes
Explanation:
in order to figure out how many bytes a newly created folder is right click the folder and go into properties
in at least 150 words, explain what the socratic method is, how it works, and what type of conclusions it generally draws
Socratic method is cooperative argumentative
dialogue
It was named after Greek philosopher Socrates who asked his students to ask more and more question
• Socrates wanted to expose contradictions in the students' thoughts and ideas
The Socratic method is that students learn through use of critical thinking and logic.
The Socratic method is method of teaching that Socrates used to teach philosophy. It is a method of inquiry that is based on the idea that best way to learn is to ask questions. The Socrate method is a
way of teaching philosophy that is not only
effective, but also fun.
The Socrates method of learning is not just about asking questions. It also involves a lot of thinking and discussion. The Socrates method is not a way to get an answer, but away for you to understand the answer
learn more about socratic method at
https://brainly.com/question/17452457
#SPJ4
A cooperative argumentative dialogue is the Socratic method. Socrates wanted the students' ideas and thoughts to be contradictory.
What is the Socratic method objective?The objective is to acquire skills in legal problem-solving, analogy-based reasoning, critical thinking about one's own and others' arguments, and comprehension of how the law affects those who are subject to it.
The Socratic Method: What is It?The Socratic Method, which was developed by the Greek philosopher Socrates, is a dialogue between teachers and students that is sparked by the teacher's persistently probing questions in an effort to investigate the underlying beliefs that shape the students' perspectives and opinions.
Learn more about Socratic method :
brainly.com/question/17502350
#SPJ4
G. Write OOP in foll. What's aprogramming language?examples programming languages ? Outline any five
Explanation:
Significant object-oriented languages include: Java, C++, C#, Python, R, PHP, Visual Basic.NET, JavaScript, Ruby, Perl, SIMSCRIPT, Object Pascal, Objective-C, Dart, Swift, Scala, Kotlin, Common Lisp, MATLAB, and Smalltalk.
I hope it helps you don't forget to give ratings
Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer.
In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in fast time.
What is file structure?A file structure is known to be the ways or combination of depiction for data in files.
Hence, In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in fast time.
Learn more about files from
https://brainly.com/question/1178560
#SPJ1
Should a UDP packet header contain both Sour Port # and Destination Port #?
Yes, a UDP packet header should contain both Sour Port # and Destination Port #.
Which fields are included in a UDP header?The fields that one can see in a UDP header are:
Source port :This is known to be the port of the device that is known to be sending the data. This field is one that a person can set to zero only if the destination computer do not require one to reply to the sender.
Destination port :This is known to be the port of the device that is said to be getting or receiving the data.
Hence, to the answer above, my response is Yes, a UDP packet header should contain both Sour Port # and Destination Port #.
Learn more about UDP packet from
https://brainly.com/question/10748175
#SPJ1
3.12.1: LAB: Instrument information (derived classes)
class Instrument:
def __init__(self, name, manufacturer, year_built, cost):
self.name = name
self.manufacturer = manufacturer
self.year_built = year_built
self.cost = cost
def print_info(self):
print('Instrument Information:')
print(' Name:', self.name)
print(' Manufacturer:', self.manufacturer)
print(' Year built:', self.year_built)
print(' Cost:', self.cost)
class StringInstrument(Instrument):
# TODO: Define constructor with attributes:
# name, manufacturer, year_built, cost, num_strings, num_frets
if __name__ == "__main__":
instrument_name = input()
manufacturer_name = input()
year_built = int(input())
cost = int(input())
string_instrument_name = input()
string_manufacturer = input()
string_year_built = int(input())
string_cost = int(input())
num_strings = int(input())
num_frets = int(input())
my_instrument = Instrument(instrument_name, manufacturer_name, year_built, cost)
my_string_instrument = StringInstrument(string_instrument_name, string_manufacturer, string_year_built, string_cost, num_strings, num_frets)
my_instrument.print_info()
my_string_instrument.print_info()
print(' Number of strings:', my_string_instrument.num_strings)
print(' Number of frets:', my_string_instrument.num_frets)
** I REALLY NEED HELP**
definitiva year vuelta const
Discuss the key benefits organisations like Amazon gain after adopting Cloud Computing.
Answer:
larger access to storage and the ability to send and receive information at improved speeds
What does this function do?
def guess_function(guess_List):
if len(guess_List) == 1:
return guess_List[0]
else:
return guess_List [0] + guess_function(guess_List[1:])
Answer:
below
Explanation:
It checks guess_List and if it only has 1 item, returns the first item as the function. Otherwise, it returns the first item added to the items from the second item onwards in guess_List.
In this lab, you complete a prewritten Python program for a carpenter who creates personalized house signs. The program is supposed to compute the price of any sign a customer orders, based on the following facts:
The charge for all signs is a minimum of $35.00.
The first five letters or numbers are included in the minimum charge; there is a $4 charge for each additional character.
If the sign is make of oak, add $20.00. No charge is added for pine.
Black or white characters are included in the minimum charge; there is an additional $15 charge for gold-leaf lettering.
Instructions
Make sure the file HouseSign.py is selected and open.
You need to assign variables for the following:
A variable for the cost of the sign assigned to 0.00 (charge).
A variable for the number of characters assigned to 8 (numChars).
A variable for the color of the characters assigned to "gold" (color).
A variable for the wood type assigned to "oak" (woodType).
Write the rest of the program using assignment statements and if statements as appropriate. The output statements are written for you.
Execute the program by clicking the Run button at the bottom of the screen. Your output should be: The charge for this sign is $82.0.
Using the computer language in python to write a function code that personalized house signs
Writting the code in python:#Assign varibles
charge = 0.00
numChars = 8
color = "gold"
woodType = "oak"
#Checking for number of characters
if numChars > 5:
charge = 35 + (numChars-5)*4
elif numChars > 0:
charge = 35
#Checking wood type
if woodType == "oak":
charge += 20
#Checking for color
if color == "gold":
charge += 15
#Print output
print("The charge for this sign is $"+str(charge)+".")
See more about python at brainly.com/question/13437928
#SPJ1
printer runs out of paper during the printing job. A signal is sent back to the computer to stop temporarily its current task. Name this type of signal
The signal is sent back to the computer to stop temporarily its current task is known as interrupt signal.
What is interrupt signal?An interrupt is known to be a form of a signal emitted by any kind of device such as printer that is said to be attached to a computer or from a program that is seen in the computer.
Hence, The signal is sent back to the computer to stop temporarily its current task is known as interrupt signal.
Learn more about printer from
https://brainly.com/question/145385
#SPJ1
Explain how advanced analytics (e.g., Machine learning) helps the threat life cycle management. State the stage of the threat life cycle management where advanced analytics is mostly needed in your explanation.
Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.
What is Advanced analytics?Advanced analytics refers to the computation strategies that are able to manage a huge number of parameters to model a situation.
Advanced analytics is very useful in epidemiology because this approach allows for predicting the transmissible behavior of infectious diseases caused by pathogenic microorganisms (e.g., bacteria) and viruses.
In conclusion, Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.
Learn more about Advanced analytics here:
https://brainly.com/question/15007647
#SPJ1
Describe the specific job you would want to have if you were going to pursue a career in digital music or video.
Explain what this job entails, and discuss why it appeals to you. What skills and interests do you have that
would be well-represented and utilized in this job? What skills would you need to learn or improve?
The specific job you that i would want to have if you were going to pursue a career in digital music or video is to be a gospel music producer.
What does a gospel music producers do?A gospel producer, or record producer, is known to be a person who is said to often help an artist in regards to their recording project.
Note that the field i am interested in is Christian gospel music and the skills is that it requires one to be:
Be able to Play an Instrument.Be a Sound EngineerMusic Theory & CompositionManaging People. Communication and others.The skill that i need to improve on is music theory.
Hence, The specific job you that i would want to have if you were going to pursue a career in digital music or video is to be a gospel music producer.
Learn more about Music from
https://brainly.com/question/26373912
#SPJ1
In what order would you arrange these steps for sequential reboot
Answer:
The orders that you would you to arrange these steps for a sequential reboot are;. Power up the router. Power up the modem. Reset the Network.
Explanation:
The orders that you would you to arrange these steps for a sequential reboot are Power up the router, Power up the modem and Reset the Network.
What do you mean by reboot ?The term reboot is defined as the act or an instance of shutting down and restarting something such as a computer or program.
The process of shutting down and restarting a computer or its operating system from the initial boot loading sequence is known as rebooting.
This procedure reloads the operating system files and is used to resolve a variety of common computer issues, such as slow processing or freezing. Reboot is also spelled restart.
Thus, The orders that you would you to arrange these steps for a sequential reboot are Power up the router, Power up the modem and Reset the Network.
To learn more about the reboot, follow the link;
https://brainly.com/question/14059348
#SPJ2
Discussion Topic
Personal finance includes income as well as expenses. You must manage your
personal finances daily, weekly, or monthly. Discuss the advantages of using
spreadsheets for managing personal finances.
The advantages of using spreadsheets for managing personal finances is that:
Spreadsheets are known to be tools that are very quick and easy and helps one to add into a workflow. Spreadsheets are regarded as an efficient tools for financial documents. A person can have access to a lot of spreadsheet templates and they can be able to visualize data along with caveats.What is the advantage of using a spreadsheet?The Advantage is that it is one that help[s a person to be able to organizing a lot of data.
Note that The advantages of using spreadsheets for managing personal finances is that:
Spreadsheets are known to be tools that are very quick and easy and helps one to add into a workflow. Spreadsheets are regarded as an efficient tools for financial documents. A person can have access to a lot of spreadsheet templates and they can be able to visualize data along with caveats.Learn more about spreadsheets from
https://brainly.com/question/26919847
#SPJ1
you are the manager in charge of maintaining desktop computers. a user reports that she can't turn her computer on. after some investigation, you find that the power supply is malfunctioning. which of the following actions should you perform next?
The correct answer is Make a strategy of action. you are the manager in charge of maintaining desktop computers.
Verify You Have the Correct Printer, Clear the Printer Queue, Secure the Connection, and Check Your Printer's Error Lights.Install the software and drivers.Add a printer.Verify that the paper tray is filled up and not jammed.Play withthe cartridges for the ink.A laser printer should only be connected to surge protection outlets or a wall outlet directly. External hard drives, second LED displays, and inkjet printers should all be hooked into battery backup outlets. 2 Placing your printer on a desk or other flat, sturdy, and noise- and vibration-free surface is recommended. Use the printer in a room with good ventilation. Don't put your machine near a lot of people. The printer SHOULD NOT BE PLACED WHERE THE VENTILATION HOLE IS BLOCKED.
To learn more about manager click the link below:
brainly.com/question/29023210
#SPJ4
what is the factor of 200
The Factors of 200 are: 1, 2, 4, 5, 8, 10, 20, 25, 40, 50, 100 and 200.
What are factors of a number?In math, the factors of any number or algebraic expression is known to be that number that can be able to divides another number or expression in an even way.
Therefore, The Factors of 200 are: 1, 2, 4, 5, 8, 10, 20, 25, 40, 50, 100 and 200 because they can divide 200 evenly without reminder.
Learn more about Number factor from
https://brainly.com/question/2058395
#SPJ1
The postmortem lessons learned step is the last in the incident response. Why is it the most important step in the process
The postmortem lessons is the most important step in the process because it is one that gives an highlight to analyzing an incidence and the reason it occurred.
What is this lesson about?The post-mortem review of an incident is known to be a form of a review that gives a person the answers to questions recording a case such as who, what, how, when, and where of both the incident and the ways and methods that can be used in handling the incident by the response team.
Note that the team is one that now has the space or luxury of time and also an hindsight to analyze what has occurred, what was done right, and what can be improved.
Hence, The postmortem lessons is the most important step in the process because it is one that gives an highlight to analyzing an incidence and the reason it occurred.
Learn more about postmortem from
https://brainly.com/question/21123962
#SPJ1
Every problem has a solution, Now
what is the solution of this?
Record the issue of 4,000 shares of $5 par value common stock for $35000 cash
The outcome are:
Cash = $35,000Common Stock $ 5 Par Value = $20,000Paid-in Capital in exc of par val CS = $15,000What is the shares about?Shares are known to be the units of measurement for any equity ownership that is found in a corporation.
Note that in the case above, since the Corporation were said to have issued 4000 shares. the cash they have is $35,000.
To get the Paid-in Capital in exc of par val CS =
Cash ($35,000) - Common Stock $ 5 Par Value ($20,000)
= $15,000
Therefore, The outcome are:
Cash = $35,000Common Stock $ 5 Par Value = $20,000Paid-in Capital in exc of par val CS = $15,000See the question below
A Corporation issued 4000 shares of $5 par value common stock for $35,000
Learn more about shares from
https://brainly.com/question/25818989
#SPJ1
Protecting your identity is essential, even on your personal or home computer. You should consider doing all of following except:
Should not respond to emails asking you to verify your personal infoinformation.
Protecting identity
Because of the prevalence of phishing emails. Such emails may look legitimate as though from someone or an organization you know, but most often they are designed to steal your personal information. Hence, it is often recommended by cyber security experts to avoid responding to emails asking you to provide your personal information.
You can learn more about protecting your identity here https://brainly.com/question/15252417
#SPJ1
which of the following panels (labelled a, b, c, and d) in (figure 2) correctly depicts the field lines from an infinite uniformly negatively charged sheet? note that the sheet is being viewed edge-on in all pictures.
Since the dipole's lines are most closely spaced together between and immediately around the two charges, this pattern tells us that the electric field is strongest in that area.
Where is the electric field strongest in a dipole?Because it is more practical, Electric field lines are only depicted in two dimensions. An endless number of field lines could be formed as they radiate out from the charges in three dimensions. But just a few are ever depicted in photographs for clarity's sake. Accordingly, five times as many lines would appear from a +5q charge as from a +q charge. The number is chosen to be proportional to the size of the charge.Information regarding the size or strength of the field can also be gleaned from the arrangement of electric field lines. The lines are more closely spaced together near the charges, where the electric field is stronger.Lines are more dispersed at farther distances from charges, where the electric field is weaker. It is true that, generally speaking, areas with closer-spaced field lines have a stronger electric field. The number of lines per unit area travelling perpendicularly through a surface is, in reality, proportional to the strength of the electric field regardless of the amount of charges present.The number of lines per unit area is constant across the region where the electric field lines are evenly spaced, and the strength of the electric field is constant throughout.To Learn more About electric field Refer To:
https://brainly.com/question/28027633
#SPJ4
given 2,4,3,-1 as input, what is the output for the following program:total_product = 1 user_value = int(input()) while user_value > 0: total_product = total_product * user_value user_value = int(input()) print('Product:', total_product, end='')
The python program for any of the given values is as written below.
How to run a Program in Python?We are told to use input for the python program as;
2, 4, 3, -1
Now, the python program using 2 as user value and 1 as total product gives us the program as;
total_product = 1
user_value = (input(1)) #while user_value > 0:
total_product = total_product * user_value
user_value = (input(2))
print('Product:2', total_product, end='2')
Read more about Python Program at; https://brainly.com/question/26497128
#SPJ1
I am trying to sum up a set of data based on 2 criteria (needs to have "green" in column E, and "January 2020" in collum A). Column D is the set of numbers I need to add. I am getting "Error, array arguments in SUMIFS are of different size.
In summing the set of data using the 2 criteria, the best way to do it is to avoid the error is that On cell G16, one should type the formula "=SUMIF(G2:G11, ">=40")".
What is the code about?In computing, Formulas seen In Microsoft Excel are known to be employed to be able to generate some outcome or values to any cell.
Note that the formula need to begin with an equal sign. The formula that is written above has the function "SUMIF" that helps to give the sum of numeric values as a result of the condition.
Learn more about SUMIFS from
https://brainly.com/question/19595606
#SPJ1
Jazmine just finished setting up an operating system that's designed to work between a VM guest OS and computer hardware. What is the name of the operating system Jazmine is setting up?
Client
Host
Hybrid
Network
The name of the operating system Jazmine is setting up is option A: Client operating system.
What is the operating system running in virtual machines?A guest or client operating system is known to be the operating system that one can installed on a virtual machine (VM) or on any kind of partitioned disk.
Hence, the name of the operating system Jazmine is setting up is option A: Client operating system.
Learn more about operating system from
https://brainly.com/question/22811693
#SPJ1
Answer:
Host
Explanation:
I got it right on the test.
Which of the following is not one of the C++ control structures?
A. if
B. do...while
C. switch
D. break
Answer: (D) break
Explanation:
"break" is not one of the C++ control structures. It is a keyword that is used to exit a loop or a switch statement.
if/else, do...while, and switch are all control structures in C++. They are used to control the flow of a program.
In cell I5, enter a formula without using a function that divides the General Medicine total in cell H5 by the annual total in cell H9 to display the department’s percentage of total revenue. Use an absolute reference for cell H9, and then enter the same formula without formatting from cell I5 to the range I6:I9.
The formula to enter in cell I5 is = $H$5/H9
How to enter the formula?The given parameters are:
Cell H5 = Medicine TotalCell H9 = Annual TotalTo divide H5 by H9, we have
H5/H9
Cell H5 is to be referenced by absolute reference
So, we have:
$H$5/H9
To enter the formula in cell I5, we use the following:
= $H$5/H9
When the same formula is entered in I6 to I9, we have:
= $H$5/H10
= $H$5/H11
= $H$5/H12
= $H$5/H13
Read more about Excel formulas at:
https://brainly.com/question/14299634
#SPJ1