What describes accenture's approach to automation, both internally as well as for clients?

Answers

Answer 1
It's approach is to provide custom based services to it's client, mainly through a cloud based system that enable their clients to shift to an automatic system leading to better business operations.

Related Questions

Imagine a mythical set of protocols with the following details. Maximum Link-Layer data frame: 1,008 bytes Network-Layer header size: 40 bytes Transport-Layer header size: 15 bytes What is the size, in bytes, of the MSS

Answers

Since there is 1,008 bytes Network-Layer header size: 40 bytes Transport-Layer header size: 15 bytes the size, in bytes is 953.

What is the Network-Layer  about?

Given that

Layer data frame:

1,008 bytes- Network-Layer header size: 40 bytes - Transport-Layer header size: 15 bytes  - Transport-Layer header size:

Therefore:

1,008  - 40 -  15 = 953

In the case above, one  just  need to subtract the header sizes from the data frame and thus have the answer.

Therefore, Since there is 1,008 bytes Network-Layer header size: 40 bytes Transport-Layer header size: 15 bytes the size, in bytes is 953.


Learn more about Network-Layer from

https://brainly.com/question/14657014

#SPJ1

Given a list of syntax errors from a compiler, a programmer should focus attention on which error(s), before recompiling?

Answers

Given a list of syntax errors from a compiler, a programmer should focus attention on the first errors before recompiling,

What is first error?

This is referred to a type of error which occurs during compilation in a syntax operation.

This error is suaully as a resuklt of incorrect spelling of variable or function name or parenthesis absence and should be corrected alone before recompiling is done thereby making it the most appropriate choice.

Read more about Syntax here https://brainly.com/question/18497347

#SPJ1

When you group together related variables, the group is referred to as a(n) ____ of variables

Answers

Answer:

Array of variables

Explanation:

This occurs when you group together related variables

When delivering 2023 murano, demonstrate how to turn the driver assistance technologies on or off using ________.

Answers

In the case above, it is by using

The Driving Aids screen that is shown in the Advanced Drive-Assist Display The Driver Assistance menu  seen under Settings in the Advanced Drive-Assist Display.

What are the packages is added for Murano?

Murano is known to adds a lot of feature such as new Midnight Edition package, and blackout front grille, amidst others.

Note that In the case above, it is by using

The Driving Aids screen that is shown in the Advanced Drive-Assist Display The Driver Assistance menu  seen under Settings in the Advanced Drive-Assist Display.

Learn more about Cars from

https://brainly.com/question/124419

#SPJ1

What are the nuclear codes?

Answers

Answer:

Nuclear codes allow the president to prove the individual is authorized to order the launch.

Explanation:

Hope this helps!

If not, I am sorry.

How to display the name and address of customer from cuseast table through descending order using their id in

Answers

Answer:

to show the records in descending order used desk keyword

You need to display the placement of three new function keys on a cell phone prototype. What should you use to illustrate the data

Answers

In the case above, one will need an  illustration should be use to illustrate the data.

What is considered an illustration?

An illustration is known to be a kind of a visual  depiction that is known to be often made by an artist and its examples are drawing, sketch, painting, photograph and others.

Note that, In the case above, one will need an  illustration should be use to illustrate the data.

Read the scenario, and answer the question. You need to display the placement of three new function keys on a cell phone prototype. What should you use to illustrate the data?

An illustration

Maps

An organizational chart

Learn more about illustration from

https://brainly.com/question/26475534

#SPJ1

You are reviewing a PR package for a grounds maintenance requirement. While reading the performance work statement (PWS), you notice the requesting activity described the work to be completed by establishing the methods and processes, including number of personnel and equipment to be used, the potential contractor must use to perform the work. What conclusion can you draw from the review of this PWS?

Answers

The conclusion that could be drawn from the review of this PWS is that Construction of a security fence and guardhouse, $2M, full-and-open competition.

What are PR packages?

PR packages is known to be  a kind of packages that are said to be made by a carefully selection of a brand's products and it is one that is often sent to what we call the list of influencers or some celebrities,

Note that this is often done with the hopes of them getting and also using the product and then they can also post it on his or her social media page.

Hence,  based on the scenario given above, The conclusion that could be drawn from the review of this PWS is that Construction of a security fence and guardhouse, $2M, full-and-open competition.

Learn more about PR package from

https://brainly.com/question/24466382

#SPJ1

Se options below

-Eighty high-end, commercial off-the-shelf computers, $230,000, GSA Supply Schedule

-Construction of a security fence and guardhouse, $2M, full-and-open competition

-Office furniture for 100 individuals plus 2 conference areas, $325,000, to be purchased through UNICOR

-Office supplies for nine months, $250,000, to be purchased through the AbilityOne program.

For a direct mapped cache design with a 32-bit address, the following bits of the address are used to access the cache. assume a write through cache policy.
tag index offset
31-10 9-5 4-0
1. what is the cache block size (in words)?
2. 151 how many entries does the cache have?
3. 151 cod $5.3> what is the ratio between total bits required for such a cache implementation over the data storage bits?
address
starting from power on, the following byte-addressed cache references are recorded.
0 4 1 132 232 160 3024 30 140 3100 180 2180
4. [10 how many blocks are replaced?
5. what is the hit ratio?
6. list the final state of the cache, with each valid entry represented as a record of sindex, tag, data>

Answers

From the information given, the cache block size is 32. See explanation below.

How do we arrive at the cache block size?

Where the offset is 5 bits, the block size is given as:

2⁵ = 32.

Hence, the total number of blocks in the cache is 32.

How many entries does the cache have?

Note that

Total cache size = No. of entries (No. of tag bits + data bits + valid bit)

Hence,

= 32 x (22+ 256 +1)

= 8, 928 bits

Learn more about cache block at;
https://brainly.com/question/3522040
#SPJ1

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address

Answers

The keyword that should be listed after the hosts statement in the  file so that the system will consult the hosts  file  to resolve a name to an IP address is The files keyword.

What is an IP address?

An IP address is known to be a kind of a special address that tells or detect a device that is known to be used on the internet or a local network.

Note that the IP stands for "Internet Protocol," and this is known to be a set or compositions of rules that is said to monitors the format of data sent through the use of the internet or local network

Hence, The  files keyword is one that should be listed after the hosts statement in the file so that the system will consult the hosts file to resolve a name to an IP address.

Learn more about IP address from

https://brainly.com/question/24930846

#SPJ1

"necessarily is the mother of computer " justify this statement with respect to the evolution of computer.​

Answers

Explanation:

Computers in the form of personal desktop computers, laptops and tablets have become such an important part of everyday living that it can be difficult to remember a time when they did not exist. In reality, computers as they are known and used today are still relatively new. Although computers have technically been in use since the abacus approximately 5000 years ago,

________ is installed in special, read-only memory in devices like printers or communication devices.

Answers

A firmware is installed in special, read-only memory in devices like printers or communication devices.

What is firmware and give example?

Firmware is known to be a kind of software that makes or produce the basic machine instructions that gives room for the hardware to act and be able to communicate with other kinds of software that is said to be running on a device.

Note that Firmware makes low-level control in for a lot of device's hardware and its example is microcontroller which is said to be an aspect of the microprocessor that informs the microprocessor the right actions to take.

Hence A firmware is installed in special, read-only memory in devices like printers or communication devices is the right answer.

Learn more about firmware from

https://brainly.com/question/3522075

#SPJ1

Choose the term that matches each definition.

: increasing capacity by adding nodes or units


: increasing capacity by upgrading individual resources to be more powerful

Horizontal Scaling
Vertical Scaling

Answers

Horizontal Scaling is the act of increasing capacity by adding nodes or units while increasing capacity by upgrading individual resources to be more powerful is called Vertical Scaling.

What is vertical and horizontal scalability?

Horizontal scaling is known to be the act of  adding more nodes while vertical scaling is a term that connote the act of adding a lot of power to one's current machines.

Therefore, Horizontal Scaling is the act of increasing capacity by adding nodes or units while increasing capacity by upgrading individual resources to be more powerful is called Vertical Scaling.

Learn more about Vertical Scaling from

https://brainly.com/question/15685539

#SPJ1

In this program you will draw some ASCII art using System.out.println(). Write a program that outputs exactly this drawing. ()_____ // O)___ // ) // _____/

Answers

This is known as ASCII Art. The program that give the above output is given below.

What is the program that give the above output?

The codes that resort to the above output are given below:


public class ASCIIArt{

public static void main(String[] args) {

System.out.println(" /)___");

System.out.println(" / o|___");

System.out.println(" / )");

System.out.println("/ )___/");

}

}

What is ASCII Art?

The 95 readable characters from the total of 128 established by the ASCII Standard from 1963 and ASCII compliant character sets with proprietary extra characters make up ASCII art, a visual design style that leverages computers for display (beyond the 128 characters of standard 7-bit ASCII).

The phrase is also figuratively used to describe all forms of text-based visual art. Any text editor may be used to make ASCII graphics, which is frequently used with free-form languages.

Learn more about ASCII:
https://brainly.com/question/17147612
#SPJ1

Full Question:

See attached image.

Ginny just enrolled in a C-SNP that uses the post-enrollment verification method. When will the plan send her a termination notification letter if it has not yet been able to verify a qualifying chronic condition

Answers

The plan will be sent to her for a termination notification letter at the end of her first month of her enrollment.

What is a notification of termination?

A notice of termination is known to be that which is often given to an employee or a person and it states that it is the end of their employment or other contract.

Hence, The plan will be sent to her for a termination notification letter at the end of her first month of  her enrollment.

Learn more about verification method from

https://brainly.com/question/17274244

#SPJ1

True or false: Nessus is a useful tool when preventing attacks as it identifies vunlerabilities that a hacker may use to penetrate your network.

Answers

FALSE, Nessus does not actively prevent attacks, it is only a tool that checks your computers to find vulnerabilities that hackers could exploit.

What is Nessus?

Nessus is a proprietary vulnerability scanner developed by Tenable, Inc.

What is Nessus used for?

Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.

Thus, Nessus does not actively prevent attacks, it is only a tool that checks your computers to find vulnerabilities that hackers could exploit.

As a system administrator you need to check these vulnerability indications and work on solutions to prevent the attack.

The correct answer is FALSE.

Learn more about Nessus here: https://brainly.com/question/5619326

#SPJ1

An operator can be overloaded to define functionality that is drastically different from the original operator.
a. True
b. False

Answers

A. True

Explanations:

You can redefine or overload the function of most built-in operators in C++. These operators can be overloaded globally or on a class-by-class basis. Overloaded operators are implemented as functions and can be member functions or global functions. An overloaded operator is called an operator function.

The security team at an organization looks to protect highly confidential servers. Which method does the team propose when protecting the servers against explosives?

Answers

The method that the team propose in protecting the servers against explosives is Physical Security.

What are the Physical Security Considerations?

Physical security is known to be a key part as it acts in network security and tends to protect an organization and employees.

Note that   An organization's physical components is one that can have vulnerabilities that need to be mitigated by using appropriate physical security measures by:

The use of Building and grounds control Fire risks control, etc.

Hence, The method that the team propose in protecting the servers against explosives is Physical Security.

Learn more about security team from

https://brainly.com/question/26035259

#SPJ1

You need a(n) _____ to play an mp3 audio file on a desktop or laptop computer

Answers

You need a stand alone player to play an mp3 audio file on a desktop or laptop computer.

What is a stand alone player?

The standalone player is known to be a device that gives room for a person or is one that allows a Blender game to be able to run without one trying to load the Blender system.

Note that in the above, You need a stand alone player to play an mp3 audio file on a desktop or laptop computer.

Learn more about laptop computer from

https://brainly.com/question/13213990

#SPJ1

Given five positive integers, find the minimum and maximum values that can be calculated by summing exactly four of the five integers. Then print the respective minimum and maximum values as a single line of two space-separated long integers.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that  print the respective minimum and maximum values as a single line

Writting the code in JAVA:

import java.io.*;

import java.util.*;

import java.text.*;

import java.math.*;

import java.util.regex.*;

public class Solution {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       long sum = 0;

       long max = Long.MIN_VALUE;

       long min = Long.MAX_VALUE;

       for (int i = 0; i < 5; i++){

           long n = in.nextLong();

           sum += n;

           max = Math.max(max, n);

           min = Math.min(min, n);

       }

       System.out.println((sum - max) + " " + (sum - min));

   }

}

See more about JAVA at brainly.com/question/12974523

#SPJ1

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

Answers

Answer:

those people are called hackers

Explanation:

Answer:

They are called hackers.

Explanation:

hope it helps

Simon would have regarded with impotent fury the disturbance between the North and the South, as it left his descendants stripped of everything but their land, yet the tradition of living on the land remained unbroken until well into the twentieth century, when my father, Atticus Finch, went to Montgomery to read law, and his younger brother went to Boston to study medicine. meaning

Answers

The meaning is that when my father, Atticus Finch, was known to have went to Montgomery to study law.

What is the quote about?

The quotes is known to be seen from the book that is titled how to kill a mocking bird and it is one that can be seen in chapter 1 and it is one that matches the big question.

When Atticus went to Montgomery to read law, the tradition of "living on the land" was known to have been broken.

Note that the quotation last part is that The meaning is that when my father, Atticus Finch, was known to have went to Montgomery to study law.

Learn more about law from

https://brainly.com/question/820417

An attacker compromises a Linux host, installing a web shell as a backdoor. If the attacker gained access to the host through a connection the host established, what type of attack has occurred?

Answers

Reverse shell is known to be the type of attack that is said to have occurred in the above case.

What is reverse shell?

A reverse shell is said to be “connect-back shell,” and it is one that often takes advantage of the computer weakness of the target to start a shell session and it often access the victim's system.

Hence, Reverse shell is known to be the type of attack that is said to have occurred in the above case.

See options below

A.) Man-in-the-Browser (MitB)

B.) Reverse shell

C.) Rootkit

D.) Session hijacking

Learn more about Reverse shell from

https://brainly.com/question/16607263

#SPJ1

Which epolicy orchestrator component gathers the events from the managed systems and uploads them to the epo server?

Answers

The policy orchestrator component that gathers the events from the managed systems and uploads them to the epo server is mcAfee agent.

Which ePolicy orchestrator component  is enforced?

The McAfee Agent can be described as the one that is distributed component of McAfee ePolicy Orchestrator (McAfee ePO).

It helps in downloads and enforcement of policies and it executes client-side tasks.

To find  find  McAfee agent, one can follow these steps:

View McAfee Agent Status MonitorOn the managed system,  select McAfee Agent Status Monitor. Save Contents to Desktop to save the contents of the McAfee Agent log to a file.

Learn more about mcAfee agent at:

https://brainly.com/question/28070242

#SPJ1

A(n) blank______ is hardware and software that control access to a company's intranet and other internal networks

Answers

A firewall  is hardware and software that control access to a company's intranet and other internal networks.

What is firewall and how does it functions?

The term firewall is known to be that which acts as a form of protection of your network from that holds of attackers.

Note that A firewall is one that functions as the shield of your network as it is known to often  acts as a kind of a 24/7 filter that often scan the data that tries to enter your network.

Hence, A firewall  is hardware and software that control access to a company's intranet and other internal networks.

Learn more about hardware from

https://brainly.com/question/24231393

#SPJ1

Javascript and java are really just two slightly different names for the same language.
a) True
b) False

Answers

Answer:

False

Explanation:

JavaScript is language used along with html documents.

Java is a full-fledged programming language that handles applications.

Write a short program that asks the user to enter a month & prints a message based on the month

Answers

Answer:

The Code:

def month(x):

    if (x==1):

        print ("January")

    if (x==2):

        print("February")

    if (x==3):

        print("March")

    if (x==4):

        print("April")

    if (x==5):

        print("May")

    if (x==6):

        print("June")

    if (x==7):

        print("July")

    if (x==8):

        print("August")

    if(x==9):

        print("September")

    if(x==10):

        print("October")

    if(x==11):

        print("November")

    if(x==12):

        print("December")

    if(x<1 or x>12):

        print("Wrong Input! Try again")

month = int(input("Enter the month number: "))

month(month)

Explanation:

The above program is written in the PYTHON programming language.

In this program, the user inputs the number of any month, showing the month name in the output. For example,

if user enters 1, month name = JANUARY

if user enters 5, month name = MAY

and if the user enters 13, then output = Wrong Input! try again

#SPJ2

Every time you call a method, the address to which the program should return at the completion of the method is stored in a memory location called the ____.

Answers

Answer:

Stack

Explanation:

Every time you call a method, the address to which the program should return at the completion of the method is stored in a memory location called the stack.

If a DBMS enforces a DELETE CASCADE option on the referential integrity constraint between SELLER and REALTOR in the HOMETOWN REALESTATE database, what will be the outcome after a user tries to delete the third record (R3, Cliff) from REALTOR

Answers

The outcome will be option b: ) CLIENT will have 6 records, AGENT will have 3 records.

What are client records?

Client record is known to be a form of a written composition of information that tells and documents the examination , diagnosis or others of a client.

Based on the above scenario, The outcome will be option b: ) CLIENT will have 6 records, AGENT will have 3 records.

Learn more about Client record from

https://brainly.com/question/238697

#SPJ1

Simple statistics looks catalog 3.15 LAB: Simple statistics Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and the average as integers (rounded, then as floating point numbers Output each rounded integer using the following print (1.0).tornat (your_value)) Output each floating point value with three digits after the decimal point, which can be achieved as follows print(1.3).format(your value)) Ex If the input is 3.3 10. 5.0 the output is 20722 2071. 7. 125 ACTIVITY 3151 LAB Simple statistics 0/10 main.py 1 2 - Floatinet()) - Floatinus Fotout Flatirot)

Answers

Based on the given instructions:

1. you must set the display format for all values: %0.2f

2. use f-string in this format: f"{}" and add your value in {}

3. int: convert float to integer and round: round up the number

The given code

num1 = float(input())

num2 = float(input())

num3 = float(input())

average = (num1+num2+num3) / 3

your_value = num1*num2*num3

print('%0.0f %0.0f %0.2f %0.2f' % (int(average), int(your_value), average, your_value))

# or:

print(f"{int(average)} {int(your_value)} {round(average,2)} {round(your_value,2)}")

Read more about floating point numbers here:

https://brainly.com/question/13440970

#SPJ1

Other Questions
when one attempts to assess and understand a particular society's customs, traditions, practices, and values on their own terms and without bias, this is called A solid consists of a conical part ,a clyindrical part and a hemispherical part. All the parts have the same diameter of 12cm. The height of the cylindrical part is 15cm and the slanting height of the conical part is 10cm. ( take pie as 3. 143). Calculate the height of the solid?calculate the surface of the solid to one decimal place? 1. A 70kg skydiver lies out with a frontal area of 0.5m2, Cd = 0.9, r = 1.2 kg/m3. What is their terminal velocity during free-fall? Answer in MPH, 1609m = 1 mile, 3600 sec = 1 hour.2. If 60kg Roberto can ride his 8 kg bicycle up a 10% incline at 3 m/sec, how fast could he ride on level ground? Cd = 0.9, A = 0.3m2; ignore rolling resistance. a motor attached to a 120 v/60 hz power line draws an 8.00 a current. its average energy dissipation is 840 w.a)What is the power factor?b)What is the rms resistor voltage?c)What is the motor's resistance?d)How much series capacitance needs to be added to increase the power factor to 1? which of the following is not one of the narrative staples of characters in the corrections film genre? Long Text (essay)Explain the similarities between the skills needed to maintain a greenhouse growing potted plants, an orchard, and a golf course. based on the greek base contained in its name, you know that the medication pepcid is designed to help with what? determine the mass of potassium in 31.0 g g of kcl k c l . Your friend invites you to a baseball game, however, you don't really want to go. Based on the lecture, which of the following could get you to change your mind?- The weather is good- The teams both have high win percentages- Team is playing in a new stadium- All of the above Find two integers whose product is 20 and whose sum is 9. (enter your answers as a comma-separated list.) 2 ) The tax on _______________ began in the Middle Ages and wasn't repealed until 1853 in Britain The salesperson earns a commission on the first she has in sales. The salesperson earns a commission on the amount of her sales that are greater than. Part AThis month the salesperson had in sales. What amount of commission, in dollars, did she earn? .Rob is retiring from his teaching job. His annual pension will be $84,500, which he will receive every year until he dies. However, he has a choice to make. If he agrees to take a 10% reduction in his pension, his wife can continue to receive that annual payment even after his death, until she dies.1. What is the amount of the reduced annual pension?2. If Rob lives 10 years after retirement and receives the full $84,500 per year, how much will he have received in total?e n3. If Rob lives 20 years, and takes the reduced pension amount, and his wife lives 11 years past his death, how much will the pension have paid in total?4. If Rob lives 6 years after retirement and then dies, and he took the reduced pension, how much less did I receive than if he took the full $84,500 amount each year?5. For how many years would Rob's wife have to live to collect pension money that was more than the a (Path, Electricity, Series circuit, Loads, One, Brightness, Brighter, Lesser, Dimmer, Source)A circuit is a 1. ________ that allows 2. ________ to pass trough it. In 3. ________, only one path of current electricity is being utilized, in which all 4. ________ are connected one after another, thus it needs only 5. ________ switch to control the whole connection. The 6. _________ of the bulb is affected when an additional batteries or dry cells is added in the connection. The light of the bulbs becomes 7. _________ since you added an additional source that provides more current electricity to flow in a circuit. The more current electricity flow in a circuit the brighter the bulbs light up. However, the 8. _________ source of electricity the 9. _________ the light bulbs light up. Since the light bulbs are connected one after another using only one path of electricity and do not have direct connection from the 10. _________. That is why the brightness of the bulbs are affected. Patulong po dito Underline the complete subject once and simple subject twice. A small family lived on a faraway planet In a given population 12% of the people have blue eyes (the recessive phenotype). What is the frequency [percentage] of the recessive allele in this population's gene pool? a gas mixture in a 1.40- l container at 297 k contains 10.0 g of ne and 10.0 g of ar . calculate the partial pressure (in atm ) of ne and ar in the container. Extreme and absolute language of three cheers for the nanny state You are purchasing a 20-year, zero-coupon bond. The yield to maturity is 8.68 percent and the face value is $1,000. The interest rate is compounded semi-annually. What is the current market price? a. $106.67 b. $108.18 c. $182.80 d. $221.50 e. $228.47 Identify the following group of words: Change your password once every six weeks. A)command. B)statement. C)question. D)exclamation.