what is OS and functions of OS ?​

Answers

Answer 1

Answer:

OS is an interface between a computer user and computer hardware. The function of OS is controls the backing store and peripherals such as scanners and printers.

Explanation:

An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.


Related Questions

a web administrator visits a website after installing its certificate to test the ssl binding. the administrator's client computer did not trust the website's certificate. the administrator views the website's certificate from the browser to determine which certificate authority (ca) generated the certificate. which certificate field would assist with the troubleshooting process

Answers

A reputable company that issues digital certificates for websites and other organizations is known as a certificate authority (CA). The certificate field would help the issuer's troubleshooting efforts.

What does a certificate authority do?

An organization that stores, signs, and issues digital certificates is known as a certificate authority or certification authority in the field of cryptography. A digital certificate attests to the named subject of the certificate's ownership of a public key.

A certificate authority is a trustworthy company that issues Secure Sockets Layer (SSL) certificates (CA). These digital certificates are data files used to cryptographically connect an entity to a public key. They enable trust in online content delivery by enabling web browsers to validate material sent from web servers.

A reputable company that issues digital certificates for websites and other organizations is known as a certificate authority (CA). The certificate field would help the issuer's troubleshooting efforts.

To learn more about certificate authority refer to:

https://brainly.com/question/17011621

#SPJ4

a vpn is designed to connect 15 film animators and programmers from around the state of california. at the core of the vpn is a router connected to a high-performance server used for storing the animation files. the server and router are housed in an isp's data center. the isp provides two different t3 connections to the internet backbone. what type of connection must each of the animators and programmers have to access the vpn?

Answers

The kind of connection that each animator and programmer must have to access the VPN is any type of internet connection.

VPN or also known as a Virtual Private Network has the opportunity to establish a protected network connection when using public networks. VPN encrypts your internet traffic and disguises your online identity. This makes it more difficult for third parties to track your activities online and steal data. A VPN (virtual private network) means a service that built a safe, encrypted online connection. Internet users may use a VPN to provide themselves more privacy and anonymity online or circumvent geographic-based blocking and censorship. Network-based VPNs are used for virtual private networks that securely associate two networks together across an untrusted network. One regular example is an IPsec-based WAN, where all the offices of a business associate with each other across the internet using IPsec tunnels.

You can learn more about VPN at

#SPJ4

what is the output of an adt stack for the peek() operation? group of answer choices true or false there is no output the object that is at the top of the stack the number of items left on the stack

Answers

The output of an ADT stack for the peek operation is The number of items left on the stack.

The user can see the element at the top of the stack with the peek operation. This operation does not alter the stack in any way. Without removing the top object, the peek operation retrieves it. The ADT stack is unaffected by the peek operation.

The total number of elements on a data stack can be obtained from the built-in function QUEUED. For instance, you can use the QUEUED function with no arguments to determine the number of elements on the data stack.

Learn more about the output of an adt stack for the peek operation here: https://brainly.com/question/13105612

#SPJ4

are critical regions on code sections really necessary in an smp operating system to avoid race conditions or will mutexes on data structures do the job as well?

Answers

The answer to this question is Yes, it will. SMP or Symmetric Multiprocessing means computer processing done by multiple processors that distributed a common operating system (OS) and memory. In SMP, the processors share the same input/output bus or data path.

SMP (symmetric multiprocessing) can be described as computer processing done by multiple processors that distributed a common operating system (OS) and memory. In symmetric multiprocessing, the processors distributed the same input/output (I/O) bus or data path. A single copy of the OS is in charge of all the processors.

The characteristic SMP (symmetric multiprocessing) are all the processors are treated equally i.e. all are identical. Communication: Shared memory is the mode of communication among processors.

You can learn more about SMP (symmetric multiprocessing) at https://brainly.com/question/13384575

#SPJ4

A device-free rule to show respect

Answers

An example of device-free rule to show respect to others are:

Avoid looking at your phone during meetings.Avoid having it on your lap.Concentrate on the individual who needs to get your whole attention, such as a client, customer, coworker, or boss.

What is proper smartphone behavior?

Don't allow your phone rule your life; take back control of it! Talk quietly. Respect people you are with by putting your phone away if it will disrupt a discussion or other activity.

Therefore, Be mindful of how you speak, especially when others may hear you. Never discuss private or secret matters in front of others.

Learn more about respect from

https://brainly.com/question/1309030
#SPJ1

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________ system.

Answers

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a mobile system.

What is meant by mobile operating systems?

Smartphones, tablets, 2-in-1 PCs, smart speakers, smart watches, and smart eyewear all use mobile operating systems. Because they were originally developed for desktop computers, which historically did not have or require specific mobile capability, the operating systems that are used on "mobile" machines, like ordinary laptops, are often not referred to as mobile operating systems.

The distinction between mobile and other forms has become more hazy recently as a result of current hardware becoming more compact and portable than earlier equipment. This distinction is being muddled by the introduction of tablet computers and lightweight laptops, two major advancements.

Mobile operating systems combine desktop operating system elements with additional functionality that is useful for handheld or mobile use. For voice and data access, these systems typically incorporate a wireless integrated modem and SIM tray.

To learn more about mobile operating systems refer to:

brainly.com/question/14113526

#SPJ4

you are given an array segments consisting of n integers denoting the lengths of several segments. your task is to find among them four segments from which a rectangle can be constructed. what is the minimum absolute difference between the side lengths of the constructed rectangle?

Answers

Using the knowledge of computational language in python it is possible to describe an array segments consisting of n integers denoting the lengths of several segments.

Writting the code:

int solution(int[] segments) {

 

 int size = segments.length;

 

 if(size < 4) {

 

  /*

   * A rectangle needs at least 4 segments.

   */

  return -1;

 }

 

 /*

  * We count the number of segments of each length.

  */

 Map<Integer, Integer> counts = new HashMap<Integer, Integer>();

 for(int i = 0; i < size; i++) {

  counts.put(segments[i], counts.getOrDefault(segments[i], 0) + 1);

 }

 

 /*

  * If count of any length is >= 4, then the minimum difference is 0, as a rectangle

  * can be constructed using same-length segments.

  */

 for(int key : counts.keySet()) {

  if(counts.get(key) >= 4) {

   return 0;

  }

 }

 

 /*

  * Else, we do the following :

  *

  * 1. Remove all entries with counts less than 2.

  */

 Set<Integer> keysToRemove = new HashSet<Integer>();

 for(int key : counts.keySet()) {

  if(counts.get(key) < 2) {

   keysToRemove.add(key);

  }

 }

 

 for(int key : keysToRemove) {

  counts.remove(key);

 }

 

 /*

  * 2. Sort all the keys.

  */

 Object[] keys = counts.keySet().toArray();

 Arrays.sort(keys);

 

 /*

  * 3. Return the difference of last 2 elements (if size is >= 2).

  */

 if(keys.length < 2) {

  return -1;

 }

 

 return ((int)keys[keys.length - 1] - (int)keys[keys.length - 2]);

}

See more about python at brainly.com/question/19705654

#SPJ1

THIS QUESTION IS ABOUT NETWORK ACCESS LAYER! WILL GIVE 30 POINTS PLEASE ANSWER ASAP
Diagram: Include a diagram (using squares, circles, arrows, etc.) showing the data unit and what its headers and footers do.

Answers

Answer:

it's 15 points

Explanation:

send a photo...can't understand like this

listen to exam instructions you have configured ospf routing on routera. a partial configuration is shown below: hostname routera ! interface fastethernet 0/0 ip address 172.16.1.65 255.255.255.224 duplex auto speed auto ! interface fastethernet 0/1 ip address 172.16.1.97 255.255.255.240 duplex auto speed auto ! interface serial 0/1/0 ip address 10.21.177.85 255.255.255.252 encapsulation ppp ! router ospf 100 network 172.16.0.0 0.0.255.255 area 0 network 10.0.0.0 0.0.0.255 area 0 auto-cost ! routera is connected to routerb through the serial link. what routes will routerb have in its routing table that it has learned from routera?

Answers

Loopback is the unintentional processing or modification of electrical signals or digital data streams as they are returned to their source. Due to the IP address of the loopback interface, Router A will be the DR.

What is meant by loopback interface?

As long as at least one of the IP interfaces on the switch is operational, a loopback interface is a virtual interface that is constantly up and reachable. In light of the fact that a loopback interface's IP address may always be ping-ed if any other switch interface is up, it is advantageous for debugging activities.

Because it never goes down, a loopback interface is frequently used as a termination address for several routing protocols. A loopback address is frequently used to identify a router. For instance, let's imagine you want to know if a specific router is operational.

Loopback is the unintentional processing or modification of electrical signals or digital data streams as they are returned to their source. It serves largely as a tool for evaluating the communications network. There are numerous application examples. It might be a channel of communication with just one endpoint.

Due to the IP address of the loopback interface, Router A will be the DR.

To learn more about loopback interface refer to:

https://brainly.com/question/24941137

#SPJ4

packaged information is a special form of secondary data and consists of two broad classes, which include syndicated data and packaged services. true false

Answers

A sort of secondary data known as "packaged information" consists of two broad classes, that include syndicated data and packaged services the Given statement is True.

What are the applications of Packaged information?

Information Packaged Applications used for numerous research decisions in marketing, including:

1) Measuring Consumer Attitudes and Opinions

2) Market segmentation -> Geodemographics is the process of categorising geographic areas according to the socioeconomic characteristics of their residents.

There are two major categories of packed information: Syndicated data is a type of external data that is provided to subscribers from a shared database in exchange for a service charge. A prepackaged marketing research procedure is referred to as a "packaged service," and it is used to produce data for a specific user.

Therefore, the given statement is True.

To learn more about secondary data from the given link

https://brainly.com/question/14806486

#SPJ4

question 26 options: a (very small) computer for embedded applications is designed to have a maximum main memory of 8,192 cells. each cell holds 16 bits. how many address bits does the memory address register of this computer need?

Answers

13 address bits are needed for the main memory of 8192 cells.

How to calculate the address bits?

Step 1 is to determine the address's bit length (n bits)

Step 2: Determine how many memory locations there are (bits)

To calculate the address bits we need to know which power of the cells is raised to 2. so 13 address bits because 2 ^ 13 = 8192 cells

What are the address bits?

An index in memory is the main storage address. The address of a single byte is a 32-bit address. An address can be found on 32 of the bus's wires (there are many more bus wires for timing and control). Addresses like 0x2000, which appear to be a 16-bit pattern, are occasionally brought up in conversation.

Hence 13 address bits are needed for the main memory

To know more about address bits please follow the link

https://brainly.com/question/13267271

#SPJ4

a plc program requires a routine where a sint value is subtracted from a sint value. what is the smallest data type available that can accurately hold the full result for all possible input cases.

Answers

INT is the smallest data type available that can accurately hold the full result for all possible input cases.

An int way is a datum of important information type, an information kind that represents some styles of mathematical integers. Integral information types may be of numerous sizes and might or may not be legal to embody bad values. Integers are normally represented in a computer as a fixed of binary digits.

The int() is used to head again to the numeric integer identical to a given expression. An expression whose numeric integer is identical is returned. This example truncates the decimal and returns the integer as a part of the number.

Learn more about The int at brainly.com/question/16856574

#SPJ4

when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it must be authenticated. authentication can be done by

Answers

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
https://brainly.com/question/28240257

#SPJ4

Why have cybersecurity issues become so politicized?

Answers

There are a number of reasons why cybersecurity has become politicized. One reason is that cybersecurity threats are often seen as emanating from other countries, which can lead to a politicization of the issue. Another reason is that the private sector is often seen as the primary victim of cyberattacks, which can lead to calls for the government to do more to protect businesses. Finally, there is a growing recognition that cyberattacks can have major national security implications, which has led to increased calls for the government to take a more active role in cybersecurity.

What do you mean by cybersecurity?

Cybersecurity is the protection of internet-connected systems from cyberthreats such as hardware, software, and data. Individuals and businesses use the practice to prevent unauthorized access to data centers and other computerized systems. A strong cybersecurity strategy can provide a good security posture against malicious attacks aimed at gaining access to, altering, deleting, destroying, or extorting an organization's or user's systems and sensitive data. Cybersecurity is also important in preventing attacks that aim to disable or disrupt the operation of a system or device.

To learn more about cybersecurity

https://brainly.com/question/28004913

#SPJ13

The ___________, a time of rebirth of the arts and humanities, was also an important development in the history of technology.

Answers

The Renaissance is a time of the rebirth which is considered an important development in the history of development.

What does Renaissance mean?

The French term "renaissance" means "rebirth." It alludes to a time in European history when the knowledge and wisdom of the Classical era flourished.

Why is history important in development?

Understanding how past events shaped current events is one of the benefits of studying history. Lessons from history help us understand who we are and how we came to be, but they also help us avoid mistakes and forge better paths for our society.

Significant technical developments from this renaissance time period include the printing press, linear perspective in drawing, patent law, double shell domes, and bastion fortifications.

Hence, the Renaissance era is a time of rebirth of the arts and humanities.

To learn more about the Renaissance from the given link

https://brainly.com/question/879750

#SPJ4

after locating the characters that separate the components of a string you wish to parse, which functions would you to extract the individual components?

Answers

In SQL, the functions used to extract individual components are LEFT, RIGHT, SUBSTRING, and LEN.

what is the LEFT() function?

The LEFT() function retrieves a string's first few characters (starting from the left).

what is the SUBSTRING() function?

A string of characters can be extracted using the SUBSTRING() function.

Once you've identified the characters that divide the parts of a string you want to parse. So the functions that are used to extract individual components are LEFT, RIGHT, SUBSTRING, and LEN.

Therefore, LEFT, RIGHT, SUBSTRING, and LEN functions are used.

To learn more about the SUBSTRING() function from the given link

https://brainly.com/question/28290531

#SPJ4

Estelle is the proud owner of one of the first commercial computers that was built with an os already installed. Who produced this classic machine?.

Answers

IBM is a company that produced this classic machine.

IBM is well known for producing and selling computer hardware and software, as well as cloud computing and data analytics. The company has also serve as a major research and development corporation over the years, with significant inventions like the floppy disk, the hard disk drive, and the UPC barcode.

IBM (International Business Machines) ranks among the world's largest information technology companies, serving a wide spectrum of hardware, software and services offerings.

You can learn more about IBM at https://brainly.com/question/17156383

#SPJ4

which is true? a. a class can implement only one interface b. a class can inherit from multiple classes c. an interface can implement multiple classes d. a class can implement multiple interfaces

Answers

A class can implement multiple interfaces. So option (d) holds the correct answer which is "a class can implement multiple interfaces".

In Java, an interface is a reference type that is implemented by a class. All methods of an interface are defined in the class that implements the interface unless otherwise the class that implements the interface is defined to be abstract. The Java class offers the feature to implement more than one interface from a single class that reflects an effect of multiple inheritance.

Since the question asks in the context of Java programming language and the only correct answer is that a class in Java has the ability to implement multiple interfaces.

You can learn more about Java interfaces at

https://brainly.com/question/28481652

#SPJ4

What form of lookup is used when you have a small list of values and the values remain constant over time?.

Answers

Answer:

Array Form is used when you have a small list of values and the values remain constant over time.

Explanation:

Define Array Form.

The array form of the LO

The Lookup function's array form locates the supplied value in the array's first column or row and retrieves it from the same point in the array's last column or row.

Two arguments are provided for the array Lookup, and both are necessary:

lookup value, an array

Where:

A lookup value is a value that can be used to search an array.

An array is a group of cells in which you want to Lookup a value. In order to do a V-lookup or H-lookup, the values in the array's first column or row must be sorted in ascending order. Characters in both upper- and lowercase are considered to be equal.

To learn more about array form, refer to:

https://brainly.com/question/21613466

#SPJ4

Array Form

      When you have a small list of values that remain constant over time, use Array Form.

What is Array Form :

              The static method Array.from() creates a new, shallow-copied Array instance from an iterable or array-like object. It is defined as a sequence of objects of the same data type. It is used to store a group of data, and it is more useful to think of an array as a group of variables of the same type. It is possible to declare and use arrays. An array requires a programmer to specify the types of elements and the number of elements. This is known as a one-dimensional array. The array size should be a constant integer greater than zero. Arrays can be multidimensional as well. They can also be passed to functions and returned from functions. You can also use pointers to generate the first element of an array, and you can simply specify the array name without specifying the index.

          An array's memory can be allocated dynamically. This advantage of an array aids in the saving of system memory. It is also useful when the pre-defined array does not have enough memory. Memory can be manually allocated during run time. Furthermore, when memory allocation is not dynamic, data is stored in contiguous memory locations. The amount of storage required is determined by the type or size of the data. Zero-length arrays are also advantageous because they are flexible and can be used to implement variable-length arrays. When considering a structure, the user frequently ends up wasting memory, and the constants are too large. When using zero-length arrays, the allocated structures consume no memory. They serve as pointers. Zero-length arrays are pointers whose contents are identical to themselves.

To learn more about Array refer :

https://brainly.com/question/20351133

#SPJ4

consider a multicomputer in which the network interface is in user mode, so only three copies are needed from source ram to destination ram. assume that moving a 32-bit word to or from the network interface board takes 20 nsec and that the network itself operates at 1 gbps. what would the delay be for a 64-byte packet being sent from source to destination if we could ignore the copying time? what is it with the copying time? now consider the case where two extra copies are needed, to the kernel on the sending side and from the kernel on the receiving side. what is the delay in this case?

Answers

35.7 MB/sec would the delay be for a 64-byte packet being sent from source to destination if we could ignore the copying time.The delay in this case would be 1792 nsec.

What is byte?

The byte is a digital data unit consisting of eight bits.The byte was historically the number of bits used to encode a single character of text in a computer, and it is thus the smallest addressable unit of memory in many computer architectures.

By using a network time of 1nsec per bit or a time delay of 512nsec per packet.

If network operates itself in 1gbps means the network delivers 125 MB/sec

To copy 64bytes  4 bytes at a time, 320 nsec are needed on each side, or 640 nsec total(source +destination)

Adding  the  512-nsec  wire  time,  we  get  1132  nsec total. We get 1792 nsec if we need two more copies.

Relocating 64 bytes in 1792 nsec is equivalent to 35.7 MB/sec.

To learn more about byte

https://brainly.com/question/14927057

#SPJ4

Joey needs to create a LAN network that will allow multiple devices to communicate. Which type of
network connection device should Joey use?
A.Access port
B.Hub
C.Router
D.Modem

Answers

Hub is the type of network connection device should Joey use.

What do you mean by network?

A network is a collection of computer systems, servers, mainframes, network devices, peripherals, or even other devices that are linked together to share data. The Internet, that also connects millions of people all over the world, is an example of a network.

A hub is a physical device that connects multiple devices on the same local area network (LAN). A laptop, desktop computer, and printer, for example, can all connect to a hub's ports via Ethernet cables and be part of the same local network.

So, B is the right answer.

To learn more about network

https://brainly.com/question/26956118

#SPJ13

a desktop technician just fixed an issue where a computer would not connect to a network and verified the computer is communicating with the network again. what should the technician do now that will help with future troubleshooting efforts?

Answers

The effective way to solve troubleshooting is to identify and report in detail the root cause so that the problem does not crop up again. When you're under a time crunch and can only make the symptom go away to meet a deadline, ensure you report that you have not identified the root cause and the fix is temporary.

Troubleshooting means a systematic approach to solving a problem. The purpose of troubleshooting is to determine why something does not work as expected and explain how to resolve the problem. The first step in the troubleshooting process is to define the problem completely.

You can learn more about troubleshooting at https://brainly.com/question/9057330

#SPJ4

Which of the following statements is NOT true about the linear equation, y + 3 = -2(x – 7)?

Answers

The statement which is not true about the linear equation, y + 3 = -2(x - 7) is that: D. The line contains the point (-7, 3).

What is the point-slope form?

The point-slope form can be defined as a form of linear equation which is used when the slope of a line and one of the points on this line is known.

Mathematically, the point-slope form of a line is given by this linear equation:

y - y₁ = m(x - x₁)

Where:

m represents the slope.x and y are the points.

Simplifying the linear equation, we have:

y + 3 = -2(x – 7)

y + 3 = -2x + 14

y = -2x + 14 - 3

y = -2x + 11

By comparison, we can reasonably and logically deduce the following information:

The line contains the coordinate (7, -3).The linear equation be re-written as y = -2x + 11.The line has a slope (m) of -2.

Read more on slope here: brainly.com/question/25239789

#SPJ1

Complete Question:

Which of the following statements is NOT true about the linear equation, y + 3 = -2(x - 7)?

A. The line contains the point (7,-3).

B. The linear equation can also be written as y = -2x + 11.

C. The line has a slope of -2.

D. The line contains the point (-7, 3).

why is hierarchical design important, both when writing hdl code, and when implementing physical circuits? what are the benefits and potential drawbacks?

Answers

Hierarchical design is important because it described the importance and sequence of elements within a composition. It influences the order in which your audience views your content. Requirements can significantly impact comprehension, impact, and value.

A hierarchical design separates a network into distinct layers, which is each layer has a series of functions that define its role in the network. Because of this, a network designer can decide the optimal hardware, software, and appearance to take on a particular role for that network layer.

A hierarchical structure means typical for larger businesses and organizations. It relies on having different levels of authority with a chain of command connecting multiple management levels within the organization. The decision-making process is kind of formal and flows from the top down.

You can learn more about A hierarchical design at https://brainly.com/question/24107868

#SPJ4

3.1. in pam encoding, the general rule is that we need to sample at twice the bandwidth. in addition, if we use n bits for each sample, we can represent 2n loudness (amplitude) levels. what transmission speed would you need if you wanted to encode and transmit, in real time and without compression, two-channel music with a bandwidth of 22 khz and 1000 loudness levels? (10 points) note: the sampling size, in bits, must be an integer. to minimize quantizing errors, it is customary to select a sampling rate that is twice as much as the signal bandwidth. 3.2. how much disk space would you require to store 1 minutes of digital music as you calculated above? (10 points)

Answers

3.1) Transmission speed would you need if you wanted to encode and transmit, in real time and without compression is 640kbps.

3.2) 137.33MB  disk space would required to store 1 minutes of digital music.

What is transmission speed?

The rate at which data packets travel a computer network from one server to another is referred to as transmission speed.

3.1) According to the inquiry, the bandwidth is 20 kHz.

The bandwidth will be doubled using Nyquist sampling.

So, bandwidth = 2 × 20 kHz= 40 kHz.

Loudness level = 40, 000 that is log₂ (40,000)~ 16 bits for each samples transmitted.

Now compute the transmission speed using the below way

Transmission speed = 16 bits × 40 kHz

= 640 kbps

Therefore, transmission speed is 640 kbps.

3.2) 30 minutes must be saved from the given question.

Now convert the given minutes to seconds that is 30 minutes × 60 sec = 1800 sec.

The disc space required to store 30 minutes of digital music is listed below.

= transmission speed × 1800 sec.

=640kbps ×1800sec

=640×1000bps × 1800 sec (that is 1kbps=1000bps)

=1152000000bits

1152000000/8 bytes (For convert bits to bytes)

=144000000bytes

144000000/1024 KB (For convert bytes to kilobytes)

=140625KB

=140625/1024MB (For convert kilobytes to mega bytes)

=137.33MB

Therefore, disk space for storing 30 minutes of digital music is 137.33 MB.

To learn more about transmission speed

https://brainly.com/question/13013855

#SPJ4

if you leave your study place in the library and leave your laptop open, or some indication that the space is being used, you are probably making use of:

Answers

If you leave your study place in the library and leave your laptop open, or some indication that the space is being used, you are probably making use of: a territorial marker.

What is library?

A library is a collection of resources, books, or media that are available for use rather than merely display. A library is a physical venue or a virtual area that provides physical (hard copies) or digital access (soft copies) to materials. A library's collection may comprise printed materials and other physical resources in a variety of media such as DVD, CD, and cassette, as well as access to information, music, or other content stored in bibliographic databases.

To learn more about library

https://brainly.com/question/27888406

#SPJ4

consider the problems with the rio olympics sites that quickly occurred following completion of the 2016 summer games. access the internet to find evidence of the current state of the sochi olympic site. how is it being used and what are the current problems and opportunities for sochi?

Answers

According to Russia’s Welcom2018.com, many venues were constructed for the Olympics in Sochi still being used today. A few of the venues are: The Mandarin recreational center and beach has a shopping and restaurant. The opportunity for Sochi is 2014 Sochi Winter Olympics made an operating profit of 3.25 billion roubles ($53.15 million), officials announced on Thursday. The International Olympic Committee said it was planning to give its share of the profits back to the Russian organizers.

During the 2016 Olympics, there was the main focus on judging after a contra between Ireland's Michael Conlan and Russian Vladimir Nikitin. After the judges awarded the fight to Nikitin, Conlan showed them his middle fingers and accused Russia and AIBA of corruption. The negative impact of the Rio Olympics are evictions, congestion, rising land-rent value as well as the rise in food prices.

You can learn more about The Rio Olympics at https://brainly.com/question/16966760

#SPJ4

your azure active directory contains three users named user1, user2, and user3. you have an azure storage account named storage1 that has the following access: user1 is assigned the storage account contributor role on storage1 user2 has a access key for storage1 user3 has a shared access signature for storage1 you rotate the keys for storage1. which user or users can access storage1?

Answers

Since  your azure active directory contains three users named user1, user2, and user3,  the user or users can access storage is option  A: User1 only.

What is the purpose of Azure Active Directory?

The enterprise identity service Azure Active Directory (Azure AD), which is a component of Microsoft Entra, offers single sign-on, multifactor authentication, and conditional access to protect against 99.9% of cybersecurity assaults. Without third-party solutions, Active Directory does not natively support mobile devices.

An access key called the storage account key is used to authenticate users when they access the storage account. When the storage account is made, it is generated automatically.

Therefore, If a user has Storage/storageAccounts/listKeys/action rights, they can use Shared Key authorization to access the portal using the storage account keys. The storage account's shared key access must be enabled in order to use the keys. Hence, The only user who has direct access to storage1 is User1.

Learn more about  azure active directory  from
https://brainly.com/question/28400230

#SPJ1

Select only one answer.

* User1 only

* User1 and User2 only

* User2 and User3 only

Learn more about from
#SPJ1

See full question below

Your Azure Active Directory contains three users named User1,...

Your Azure Active Directory contains three users named User1, User2, and User3.

You have an Azure storage account named storage1 that has the following access:

- User1 is assigned the Storage Account Contributor role on storage1

- User2 has a access key for storage1

- User3 has a shared access signature for storage1

You rotate the keys for storage1.

Which user or users can access storage1?

Select only one answer.

* User1 only

* User1 and User2 only

* User2 and User3 only

* User1, User2 and User3

to address this vulnerability, you recommend that the client hire additional network administrators who have cybersecurity credentials and experience. what type of vulnerability does this address?

Answers

This addresses the vulnerability of not having enough staff with the necessary skills to protect the network.

What is vulnerability?

Vulnerability is defined as "the condition or state of being vulnerable to being attacked or damaged, either physically or emotionally."A window of vulnerability (WOV) is a period of time during which protective mechanisms are reduced, compromised, or absent. As a methodological technique, understanding social and environmental vulnerability entails analysing the risks and assets of disadvantaged populations, such as the elderly. The concept of vulnerability raises high expectations for social policy and gerontological planning.

This vulnerability addresses the issue of weak network security. By hiring additional network administrators who have cybersecurity credentials and experience, the client will be better able to protect their network from attacks.

To learn more about vulnerability

https://brainly.com/question/25633298

#SPJ4

What uses clickstream data to determine the efficiency of the site for the users and operates at the server level?.

Answers

Answer:

Website traffic analytics

Explanation:

Other Questions
You have been hired as ceo of a new company focused on providing home health services. What could you do to establish a strong and positive organizational culture?. Find the volume of 12 cm decide wether the following sides are acute obtuse or a right triangle. Consider the parabola given by the equation: f ( x ) = 2 x 2 12 x 9 Find the following for this parabola: A) The vertex: B) The vertical intercept is the point C) Find the coordinates of the two x intercepts of the parabola and write them as a list of points of form (x, y) separated by commas: It is OK to round your value(s) to to two decimal places. The Caldwell family placed a large back-to-school order online. The total cost of the clothing was $823,59 and the shipping weight was 32 lb. 10 oz. They live in the LocalZone (shipping = $5.87, plus $. 11 per lb. for each lb. or fraction of a lb. above 15 lbs.) and the sales tax rate is 7.5%. Find the total cost of the order.$864.43$876.77$893.21o $901.22None of these choices are correct. URGENT!! ILL GIVEBRAINLIEST!!!!! AND 100 POINTS!!!!! Write an equation of a parabola with a vertex at the origin and a directrix at y=5 Student must identify at least 1 cultural aspect of Africa summarized in one complete paragraph. Be sure to use vocabulary from the instruction videos or from teacher led instruction what proportion of american households has at least one television? group of answer choices virtually all american households have at least one tv. except for adolescents who live in low-income, single-parent, or disadvantaged homes, the majority of american households have at least one tv. more than 50% of american households have at least one tv. virtually all middle-class and upper-class households have at least one tv; however, about 50% of lower-income families have a tv. the variable y is directly proportional to x. if y equals -0.6 when x equals 0.24, find x when y equals -31.5. Solve x^2 - 3x - 10 = 0 by factoring. *Mark only one oval.O {-5,2}O (-2,-5)O {-2,5} {-10,1} A family is traveling from their home to avacation resort hotel. The table below showstheir distance from home as a function of time.Time (hrs)0257Distance(mi)0140375480Determine the average rate of change betweenhour 2 and 7, including the units. What is a correct congruence statement for the triangles shown?Enter your answer in the box. Using India's rate of natural increase shown in the table, describe how to calculate the doubling time of India's population.WRITE A Shot answer using Assertion Evidence Commentary According to the label on a soft drink, one serving provides 185 kcal. If all of this energy is used to lift 1.0-kg blocks, how many blocks can be lifted 7.0 meters? Note: 1 J is approximately equal to the energy required to raise a 1-kg block a distance of 10 cm against Earths gravity. a pregnant mother in her third trimester is scheduled for an amniotic fluid index (afi) test. the nurse understands the reason for the test when she verbalizes which statement? which section of an issp should outline a specific methodology for the review and modification of the issp? a. policy review and modification b. limitations of liability c. systems management d. statement of purpose A local children's center has 46 children enrolled, and 6 are selected to take a picture for the center'sadvertisement. How many ways are there to select the 6 children for the picture? I have to create a graph but I need some help and clarification Use the long division method to find the result when 9x +30x + 10x - 24 isdivided by 3x + 8. If there is a remainder, express the result in the formq(x)+7(2).