Answer:
Voltage spike – This is a momentary change in the supply of electric power. It’s important to remember that the size of the transient can range from just milliseconds to longer periods of time. Even a small power glitch can damage a computer and corrupt data. If the screen goes blank during a thunderstorm, it’s likely that a voltage spike is responsible.
Circuit board fails with no visible indication of damage – This is the typical scenario: A computer goes down. A defective circuit board is suspected of the fault, but an inspection reveals no signs of physical damage. A replacement board is installed and operation resumes.
Failure to load software upgrades – Computer software often comes with various bugs, or vulnerabilities. These are simply programming mistakes, but they can make the software susceptible to viruses and glitches. When an error is discovered, the software designer sends out a “patch” that requires downloading and rebooting. Failing to upgrade the software by running the patch can lead to corruption of data.
Failure to keep virus protection up to date – There are several malware protection packages available for computer rooms or data centers. Once installed, the subscription must be maintained. One telltale sign of a malware infected computer is slow data processing.
Inadequate cooling – Computers produce heat, and the more data they process, the more heat must be eliminated. Servers, the “brains” of computers, fail under excess heat, so adequate cooling is essential.
Environment – If a computer room has a dedicated cooling system, there may be an opportunity to closely control the heat. If the cooling is shared with other equipment or the space contains offices, we often face a more challenging task. People have comfort needs different to those of computers.
Loss of Power, PDU fails – Power Distribution Units (PDU’s) are similar to power bars in homes and offices. They distribute power to different components in a computer room, and are usually located next to the server racks. PDU’s suffer a range of problems. Receptacles wear out and can be the sources of bad contacts, and moisture can lead to corrosion.
UPS batteries – Uninterruptible Power Supply (UPS) batteries are found in computer rooms. Most often, they are used to provide continuous power for a limited time, during an outage. Depending on how it’s used and the design of the battery, the life span can be as short as 4-5 years for what is considered a “10 year life” battery. Elevated room temperatures will shorten the life of any battery. Even a small facility such as a dentist office uses UPS batteries.
Transfer switch battery defective – This can be an indication that the site lacks an effective battery maintenance program. It can also be a sign that the transfer switch is “frozen” in position. Preventive maintenance could help avoid a breakdown.
Failure of standby power to synchronize (come on line) – When electric power from the grid disappears, standby power takes over in two different ways. In a small computer room, the focus is on turning computers off in a controlled manner. A fully charged UPS will provide power for 10-15 minutes to allow a computer to save its data and turn off. In a larger facility, it’s the matter of keeping cooling and power going long enough to give the standby generator an opportunity to “synchronize,” to get up to a rate of speed sufficient to power the infrastructure and continue data processing.
Diesel fuel contaminated – Most medium to large facilities have generators powered by diesel fuel, which can become contaminated and useless when a power outage occurs. Water is usually the culprit. Regular fuel testing is necessary to avoid contamination.
Storage defective – Data is stored on magnetic disks or tape. Both can be damaged during normal operation, so it’s a good practice to back up stored data on a regular basis. Backing up means creating a spare data storage. Failure of a tape or disk drive is often, but not always, proceeded by noise. Opening the unit to attempt data restoration is better left to a professional.
Sprinkler system turns on above the servers – Where a data room is protected by a water sprinkler system, a small spill can damage the electronic components. This is particularly true in cases where sprinkler heads are located directly above the servers.
Computers are crucial to business today, but there are so many things that can cause them to fail. By addressing the above common culprits, you could help reduce the overall risk of your computer systems failing.
Explantion: I hope this helps!!!!! :)
What is a feature of Accenture’s myNav platform?
A. supports a more responsive, cost-efficient, and secure workplace platform for project deployment and full upgrades.
B. powers a highly automated, data-driven, and low-risk approach to adopting and maintaining MS Office suites
C.helps assess, architect, and simulate Cloud solutions to determine the right Cloud architecture based on our clients’ business needs
D. enhances ability to innovate, boost business results, and speed up a client’s journey to intelligent enterprises
D.
One feature of Accenture’s myNav platform is that it:
C. Helps assess, architect, and simulate Cloud solutions to determine the right Cloud architecture based on our clients’ business needsAccording to the given question, we are asked to state one feature of Accenture’s myNav platform and how it affects the cloud computing for businesses.
As a result of this, we can see that this Accenture’s myNav platform is designed to help businesses navigate through their cloud solutions so that they can choose the package that would meet their client's business needs.
Therefore, the correct answer is option C
Read more here:
https://brainly.com/question/25675206
What is the primary reason for compressing video files?
increase frames per second
increase bit rate
decrease file size
decrease playback delay
Answer:
Decrease file size
Explanation:
This goes for almost every file you compress. If you compress it, you try to decrease the storage space it takes up as a way to make it more portable. After a compressed file is extracted, it does not have many effects on the state of the extracted file.
Answer:C
Explanation:Decrease file size
The following code will not display the results expected by the programmer. Can you find the error? Declare Real lowest, highest, average Display "Enter the lowest score." Input lowest Display "Enter the highest score." Input highest Set average = low + high / 2 Display "The average is ", average, "."
Based on the information given, the first error in the code is that the Variable name is lowest, NOT low, and Set average = low + high / 2.
How to find the error in the code.For Error 2: Variable name is highest, NOT high and Set average = low + high / 2
For Error 3 : Set average = low + high / 2. Thus, you will need to add the lowest and highest, then perform the division by 2
Set average = (lowest + highest) / 2 is the the correct statement.
Learn more about codes on:
https://brainly.com/question/25875879
It's common to print a rotating, increasing list of single-digit numbers at the start of a program's output as a visual guide to number the columns of the output to follow. With this in mind, write nested for loops to produce the following output, with each line 60 characters wide: | | | | | | 123456789012345678901234567890123456789012345678901234567890
Answer:
The program in python is as follows:
for i in range(0,6):
for i in range(0,9):
print(" ",end='')
print("|",end='')
print()
for i in range(1,61):
print(i%10,end='')
Explanation:
See attachment for program output format
The next two instructions create a nested for loop
for i in range(0,6):
for i in range(0,9):
This prints 9 spaces
print(" ",end='')
This prints a vertical line at the top of the end of the spaces printed
print("|",end='')
This prints a new line
print()
This iterates from 1 to 60
for i in range(1,61):
This prints 1, 2, 3....9, then 0, 6 times on a straight line
print(i%10,end='')
____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.
Answer:
System software.
Explanation:
System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.
An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
Question # 2
Dropdown
Identify the type of error described.
___5 / 0
___ float('two')
Answer:
ZeroDivisionError
ValuError
Explanation: Edg 2020-2021
Answer:
1.ZeroDivisionError
2.ValueError
Explanation:
took test
i need help with this
Answer:
Answer is D
Explanation:
cameras did not use disks until the late 1990s :D
edit: sorry my previous answer was wrong, I apoligize for the mishap :(
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send an packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure. a = IP() a.dst = ’1.2.3.4’ a.ttl = 3 b = ICMP() send(a/b) If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result.
Answer:
answer b
is correct
pdf
B. Ayusin ang mga titik sa bawat bilang upang mabuo ang mga
tamang salita na bumubuo ng web browser at mga ilang
bahagi ng web browser. Isulat ang iyong sagot sa sagutang
papel.
1. terterin ploexrer
2. glegoo mechro
3. foxfire zillamo
4. bat mena
5. bat wen
Answer:
Question wants the misspelled words to be properly arranged to give the correct names in relation to web browsers.
terterin ploexrer ⇒ Int-ernet Ex-plorerglegoo mechro ⇒ Goo-gle Ch-romefoxfire zillamo ⇒ M-o-z-i-l-l-a Fire-foxbat mena ⇒ Tab name.bat wen ⇒ New TabA line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of data?
Answer:
Line graphs allow us to see overall trends such as an increase or decrease in data over time. Bar graphs are used to compare facts.
Elza hos a document with plain text. She wants to format only the second paragraph of the fifth page to have two
columns. What sequence of buttons will Eliza click to set up the correct type of section break for this?
O Page Layout, Breaks, Page
O Page Layout, Breaks, Continuous
Insert, Page Break
O Insert, Continuous
Issues in plagiarism and copyright when blogging can be prevented. True or false
Answer:
It’s false
Explanation:
I can’t explain it’s too confusing
OBJECTIVE QUESTIONS
1. In a computer keyboard the Alt, Ctrl, Shift, Del & Insert
keys are known as
Answer:
A modifier
Explanation:
because this modified a computer keyboard
V. Write a program in python for the following:
[10]
a) Jennifer wants to carpet her new room with pink carpet. Create a program that will ask the user for the two
dimensions of a room (length and width) and then calculate the area of the room, (length x width), before
finally displaying the answer
Answer:
length = input("length of room: ")
width = input("Width of room: ")
Area = float(length) * float(width)
print("Area of room is: ", Area)
Give
25
Input devices examples
True or False? A three shot is a series of any three individual
camera shots.
You are the systems administrator for a large trust company. Most of the Linux servers in the company host databases that are accessed frequently by company employees. One particular Linux server has been reported as being very slow today. Upon further investigation using the top utility, you have found a rogue process that is wasting a great deal of system resources. Unfortunately, the rogue process is a database maintenance program and should be killed with caution. Which kill signal would you send this process and why? If the rogue process traps this signal, which other kill signals would you try? Which command could you use as a last resort to kill the rogue process?
Answer:
soo long this one is ufff
Exercise 3.7.1: Proving statements about odd and even integers with direct proofs. info About Each statement below involves odd and even integers. An odd integer is an integer that can be expressed as 2k 1, where k is an integer. An even integer is an integer that can be expressed as 2k, where k is an integer.
The question is incomplete. The complete question is :
Each statement below involves odd and even integers. An odd integer is an integer that can be expressed as 2k+1, where k is an integer. An even integer is an integer that can be expressed as 2k, where k is an integer. Prove each of the following statements using a direct proof. (a) The sum of an odd and an even integer is odd. (b) The product of two odd integers is an odd integer.
Solution :
Odd number integers = 2k + 1, where k is integer
Even number integer = 2k
a). Odd integer + even integer
= 2k + 1 + 2k
= 4k + 1
= 2(2k) + 1
Let 2k = t, where t is integer
= 2t + 1
= Odd integer by definition
If number is 2t + 1 where t belongs to integer, then it is odd integer.
Hence proved.
b). Product of two odd integers : [tex]$2k_1 + 1,\ \ 2k_2 +1 $[/tex] where [tex]$k_1, k_2 $[/tex] belongs to integer.
[tex]$(2k_1+1)(2k_2+1)= 4k_1k_2+2k_1+2k_2+1$[/tex]
[tex]$2(2k_1k_2)+2(k_1+k_2)+1$[/tex]
Let [tex]$2k_1k_2 = a$[/tex] and [tex]$k_1+k_2 = b $[/tex]
here, a and b belongs to integers since [tex]$k_1$[/tex] and [tex]$k_2$[/tex] are integers.
We get:
2a+2b+1
= 2(a+b)+1
= 2l + 1, Let (a+b)=l and l belongs to integers.
It is odd integer by definition.
Hence proved.
Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of a mailbox for storage.
Creating an Outlook data file
data files in storage on a computer.
Answer:
Archiving data files manages the size of a mailbox for
✔ local
storage.
Creating an Outlook data file
✔ protects
data files in storage on a computer.
Explanation:
Because its right.
Answer:
an increase in cloud computing
Explanation:
PLEASE HELP ME WITH THIS i will mark you brainlist
Answer: you have to check your email and click on the microsoft email they sent you and enter the code in the email.
Explanation: plz mark brainliest
Click this link to view O*NET’s Tasks section for Psychiatrists. Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what are some common tasks performed by Psychiatrists? Select four options.
Answer:its 2.3.5.6
Explanation: i just did it on edge
Answer:
B,C,E,F
Explanation:
Cuz i said so
Logistic Regression is a type of __________ problem.
Answer:
Logistic Regression is used to solve the classification problems, so it’s called as Classification Algorithm that models the probability of output class. It is a classification problem where your target element is categorical
Explanation:
The answer is "classification" because the named the Classification Algorithm.
It was used to solve classification difficulties. You are faced with a categorization situation wherein your goal component is a category.In the presence of more than one dependent variable, it's being used to calculate odds ratios. The binomial dependent variables render this approach similar to multiple linear regression. In the end, each variable's impact on a particular event's odds ratio is calculated.Learn more:
Logistic Regression: brainly.com/question/20363984
You want to read input from the user to know how many apples they would like
to buy. Which statement should you use to read in a number from the user?
var applesToBuy = readLine("How many apples would you lik
e? ");
o
var applesToBuy - println("How many apples would you like?
Dj
var applesToBuy - readInt("How many apples would you like?
1);
var applesToBuy
= nextInt("How many apples would you like?
")
Answer:
var applesToBuy = readLine("How many apples would you lik
e? ");
Explanation:
It asks the user to enter answer the question and it stores the answer into the applesToBuy variable.
Its right dont worry.
In the given scenario, if we use "InputStream" class object that inputs value from the user-end, in which we use "readInt" keyword. In Java, this function of the DataInputStream class reads 4 input bytes and returns an integer value. This method takes the next 4 bits from the input stream, transforms them to integers, and would then returns.
And the wrong choice can be defined as follows:
For choice 1, it use the "readLine" method which inputs the string value.For choice 2, it use the "println" method which prints value.For choice 4, the "nextInt" method is the part of "Scanner" class.Therefore, the answer is "Option 3", which is "var applesToBuy - readInt("How many apples would you like?");".
Learn more:
brainly.com/question/20637377
type in computer code for Sonic the Hedgehog, does it look weird yes or no
Answer:
yes.
Explanation:
Select the correct answer.
A computer using a connectionless network protocol sends too many data packets to another computer, causing loss of a few packets. As a result, the message appears jumbled to the user at the destination computer. How does TCP overcome this issue?
A.
by using flow control
B.
by using cables
C.
by using terminals
D.
by using a larger IP address
Please only answer if you are 100% sure
Answer:
D by using a larger IP address correct
Explanation:
Correct answer I hope this helps you :)
During critical thinking, the evaluation of information should use
some emotions
O True
O False
What are the paparazzi?
O A. Professional artists hired by stars for portraits
B. Tabloids that expose celebrities acting rudely
O C. Fans who watch videos of stars doing silly things
O D. Photographers who follow stars to take pictures
Answer:
d.photographers who follow stars to take pictures
Data entered in a cell will appear in the bar, found about the worksheet
a.status Bar
b.Equation Bar
c.Formula Bar
d.Data Entry Bar
Answer:
formula bar
Explanation:
The formula bar in Excel is located next to the name box
and above the worksheet area. It displays the data stored in
the active cell. The formula bar is used to view, enter, and
edit values and formulas in cells.
An algorithm to print a set of 10 integers in ascending order
Answer:
Program - Array Sorting
Author - Vishal Solanki
Language - C Language
Date - 03/02/2018 (dd/mm/yyyy)
*/
//IDE used for this code is "Visual Studio 2017"
#include <stdio.h> //including stdio.h for printf and other functions
#include<conio.h>
int main() //default function for call
{
int a[100],n,i,j;
printf("Array size: ");
scanf("%d",&n);
printf("Elements: ");
for(i=0;i<n;i++)
{
scanf("%d",&a[i]);
}
for (int i = 0; i < n; i++) //Loop for ascending ordering
{
for (int j = 0; j < n; j++) //Loop for comparing other values
{
if (a[j] > a[i]) //Comparing other array elements
{
int tmp = a[i]; //Using temporary variable for storing last value
a[i] = a[j]; //replacing value
a[j] = tmp; //storing last value
}
}
}
printf("\n\nAscending : "); //Printing message
for (int i = 0; i < n; i++) //Loop for printing array data after sorting
{
printf(" %d ", a[i]);
}
for (int i = 0; i < n; i++) //Loop for descending ordering
{
for (int j = 0; j < n; j++) //Loop for comparing other values
{
if (a[j] < a[i]) //Comparing other array elements
{
int tmp = a[i]; //Using temporary variable for storing last value
a[i] = a[j]; //replacing value
a[j] = tmp; //storing last value
}
}
}
printf("\n\nDescending : "); //Printing message
for (int i = 0; i < n; i++) //Loop for printing array data after sorting
{
printf(" %d ", a[i]); //Printing data
}
return 0; //returning 0 status to system
getch();
}
//Ouput
/*
Array size: 10
Elements : 3 4 7 6 5 1 2 8 10 9
Ascending : 1 2 3 4 5 6 7 8 9 10
Descending : 10 9 8 7 6 5 4 3 2 1
*/
Explanation:
Why should you try out a camera bag before taking it on a vacation?
So you can make sure that your passport fits in it
So that you can make sure it is comfortable
So that you can get a different color
So that you can add more equipment
Answer:
b or c
Explanation: