being the server administrator how often will you conduct a server maintenance?

Answers

Answer 1
Weekly server checks

Nonetheless, a weekly check is essential. Another check you should do weekly or even every two weeks is your disk usage. Again, disk usage rarely suddenly changes so it's not something you need to check every day. However running out of disk space can mean that your server breaks down.

Related Questions

If you see or hear of information in the media or on the internet that you suspect is classified, what should you do?

Answers

Answer:

Do not comment on the information or discuss with unauthorized recipients.

Explanation:

As a rule, it is pertinent to have the knowledge that when working with information that are sensitive, one has to be very careful to know and understand what information to share , what not to share and who the recipient should be.

Unauthorized disclosure is when classified information are transfered to unauthorized persons or recipients. Classified information are information not meant for public knowledge which if disclosed, could undermine national security. To be a recipient of classified information, there must be an execution of approved non disclosure agreement, certification of favorable eligibility must be obtained and also possession of the need to know for the classified information.

What are the common operations performed on character strings?

Answers

Answer(:

•concatenation

• scanning

• substringing

• translation

• verification

if you want to remember means csstv;-)

Brainly account. How to open?

Answers

You would have to take a picture of TOR work your working on or you can type it in here and myself and other will be Able to help you:)

Help me with this digital Circuit please

Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please

Answers

A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Thus, These circuits receive input signals in digital form, which are expressed in binary form as 0s and 1s. Logical gates that carry out logical operations, including as AND, OR, NOT, NANAD, NOR, and XOR gates, are used in the construction of these circuits.

This format enables the circuit to change between states for exact output. The fundamental purpose of digital circuit systems is to address the shortcomings of analog systems, which are slower and may produce inaccurate output data.

On a single integrated circuit (IC), a number of logic gates are used to create a digital circuit. Any digital circuit's input consists of "0's" and "1's" in binary form. After processing raw digital data, a precise value is produced.

Thus, A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Learn more about Digital circuit, refer to the link:

https://brainly.com/question/24628790

#SPJ1

How can we work together to fix problems with our websites?

Answers

i think this is or what hihi

Explanation:

The value proposition, or mission statement, tells the visitor what you do and why you do it.

Put your value proposition on your home page, in your headline if possible. Add it to your blog or about page. Let the visitors know exactly what they will be getting if they hire you, buy your product, subscribe to your newsletter or read your blog.

the documents created in ms-excel is call what?​

Answers

Answer:

It is called a Spreadsheet

The documents created in MS-excel are called a workbook that is stored in the computer.

What is a workbook?

A workbook in Microsoft Excel is a grouping of one or more spreadsheets, also known as worksheets, in a single file. The spreadsheet "Sheet1" from the Excel workbook file "Book1" is an example below.

The "Sheet2" and "Sheet3" sheet tabs are likewise present in our example and are a part of the same worksheet. It may include both worksheets and chart sheets, among other types of sheets.

A blank spreadsheet is shown along with the Excel Starter beginning screen. A spreadsheet is known as a worksheet in Excel Starter, and worksheets are kept in a file known as a workbook.

Therefore, workbooks are the name given to the documents created in Microsoft Excel and kept on the computer.

To learn more about the workbook, refer to the link:

https://brainly.com/question/18273392

#SPJ2

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

Luke is setting up a wireless network at home and is adding several devices to the network. During the setup of his printer, which uses 802.11g standard, he finds that he can't connect to the network. While troubleshooting the problem, he discovers that his printer is not compatible with the current wireless security protocol because it is an older version of hardware.


What wireless network security protocol can Luke implement on the WAP so that the printer can connect to his wireless network?

Answers

Answer:

WPA2

Explanation:

The best wireless network security protocol for Luke would be WPA2. This is the latest security protocol version which brings with it extra encryption for a more secure connection. Aside from this WPA2 is backwards compatible with devices made for WPA. Therefore, it makes WPA2 the best solution for connecting the printer wirelessly to the network since it allows for 802.11g standard connection, the same as the printer.

1. What are the first tasks the Team Leader (TL) must perform after arriving at the staging area?
O A. Assign volunteers to specific positions and prioritize response activities.
OB. Gather and document information about the incident.
O C. Take the team to the most pressing need.
O D. Communicate with emergency responders to let them know the CERT is in place.

Answers

A. Assign volunteers to specific positions and prioritize response activities.

a software development management tool that easily integrates into his business’s enterprise software/information system

Answers

Answer:

Enterprise software/system

Explanation:

Enterprise software which is also known as Enterprise Application Software (EAS) is computer software that its primary function is to meet the needs of an organization rather than that of an individual.

EAS or Enterprise System is the software development management tool that easily integrates into a business' enterprise software system.

In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year

Answers

Answer:

In Python:

tuition = 7180

year = 2019

rate = 0.035

for i in range(2019,2027):

   print(str(year)+": "+str(round(tuition,2)))

   tuition = tuition * (1 + rate)

   year = year + 1

   

Explanation:

This initializes the tuition to 7180

tuition = 7180

This initializes the year to 2019

year = 2019

This initializes the rate to 3.5%

rate = 0.035

This iterates through years 2019 to 2026

for i in range(2019,2027):

This prints the year and tuition

   print(str(year)+": "+str(round(tuition,2)))

This calculates the tuition

   tuition = tuition * (1 + rate)

This increments year by 1

   year = year + 1

A developer is creating an application to track engines and their parts an individual part can be used in different types of engines. What data model should be used to track the data and to prevent orphan records?

Answers

Answer:

C

Explanation:

An orphan record are records that have been left out of the new system when a company changes its model of operation since they have no transition path. Therefore the best way to prevent this would be to create a master-detail relationship to represent the one-to-many model of engines to parts. This would allow these records to be captured and reprocessed into the new system that the company has moved to in order for them not to be left out.

where do you think data mining by companies will take us in the coming years

Answers

In the near future, the practice of companies engaging in data mining is expected to greatly influence diverse  facets of our daily existence.

What is data mining

There are several possible paths that data mining could lead us towards.

Businesses will sustain their use of data excavation techniques to obtain knowledge about each individual customer, leading to personalization and customization. This data will be utilized to tailor products, services, and advertising strategies to suit distinctive tastes and requirements.

Enhanced Decision-Making: Through the use of data mining, companies can gain valuable perspectives that enable them to make more knowledgeable decisions.

Learn more about data mining from

https://brainly.com/question/2596411

#SPJ1

Which of these describes the majority of our space observations humans have utilized over the history of human space exploration?

A) Gamma ray telescope
B) Radio wave telescopes
C) Ultraviolet telescopes
D) Visible light observations

Answers

visible light observations is the correct answer

Answer:

D) visible light observatories

Visible light observations have guided our observations for thousands of years. All of the other technologies are much newer.

Explanation:

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

In cell D15, enter a formula using a counting function to count the number of cells in the Billable? column

Answers

The formula that could be entered as a counting function to count the number of cells would be COUNTA.

What formula can be used in cell D15?

If you want to count the number of cells that are not empty in the Billable column, you can go to cell D15 and type in =COUNTA(.

After that, you highlight the entire Billable column from D2 to D14 and then close the formula and press enter. It will return the number of cells that are not empty.

Find out more on the spreadsheet functions at https://brainly.com/question/1395170.

Write a function to calculate the distance between two points Distance( x1, y1,x2.2) For example Distance(0.0,3.0, 4.0.0.0) should return 5.0 Use the function in main to loop through reading in pairs of points until the all zeros are entered printing distance with two decimal precision for each pair of points.
For example with input
32 32 54 12
52 56 8 30
44 94 4439 6
5 19 51 91 7.5
89 34 0000
Your output would be:__________.
a. 29.73
b. 51.11
c. 55.00
d. 73.35
e. 92.66

Answers

Answer:

The function in Python3  is as follows

def Distance(x1, y1, x2, y2):

   dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5

   return dist

   

Explanation:

This defines the function

def Distance(x1, y1, x2, y2):

This calculates distance

   dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5

This returns the calculated distance to the main method

   return dist

The results of the inputs is:

\(32, 32, 54, 12 \to 29.73\)

\(52,56,8,30 \to 51.11\)

\(44,94,44,39\to 55.00\)

\(19,51,91,7.5 \to 84.12\)

\(89,34,00,00 \to 95.27\)

You are reviewing the IP address associated to an alert generated by Microsoft Defender for Endpoint.
You need to identify the number of managed devices that successfully connected to the IP address during the previous 30 days.
Which section of the Microsoft 365 Defender portal can you use to identify the device?

Answers

The section of the Microsoft 365 Defender portal that can be used to identify the device is "Device inventory".

To identify the number of managed devices that successfully connected to the IP address during the previous 30 days, the device should be verified and traced. It is possible to determine the identity of the devices from which the alert was generated and to see their recent activity from the Microsoft 365 Defender portal.

The section of the Microsoft 365 Defender portal that can be used to identify the device is "Device inventory". Device inventory helps to understand the devices in your environment and any associated risk level.

Devices that are enrolled in a device management solution like Microsoft Intune or Configuration Manager, or that are running Windows 10 and later, can be viewed with the Microsoft 365 Defender portal. This helps to locate the assets that are most important to the organization and track their compliance.

The Device inventory section helps to track information such as device health, policies and configurations, vulnerability assessment results, and compliance level. This will help to know if the managed devices that are being monitored are meeting the compliance and security requirements of the organization.

In conclusion, the Device inventory section of the Microsoft 365 Defender portal can be used to identify the number of managed devices that successfully connected to the IP address during the previous 30 days.

For more such questions on Microsoft 365, click on:

https://brainly.com/question/30612299

#SPJ8

What does NOT match with Agile Manifesto?
Select the correct option(s) and click Submit.
Processes and tools over individuals and interactions
Working software over comprehensive documentation
Responding to change over following a plan
ent...
ed!
e Ai...
Contract negotiation over customer collaboration

Answers

Answer:

yes

Explanation:

James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. What can James use to wipe the data clean?

a. Zero-fill utility
b. Format the drive
c. ATA Secure Erase
d. Smash the USB drive

Answers

Answer:

C. ATA Secure Erase

D. Smash the USB drive

Explanation:

Zero fill utility is a specialized way of formatting a storage device particularly secondary storage such as hard disk, flash drive e.t.c. In this process, the disk contents are overwritten with zeros. Once this has been done, undoing is essentially hard but possible. In most cases, this might just mean that the data content is corrupt and as such might still be recovered, maybe not in its pure entirety.

Formatting the drive on another hand does not essentially mean cleaning the drive and wiping off data. It just means that operating systems cannot see those data contents anymore. They are still present in the drive and can be recovered.

ATA Secure Erase is actually a way of completely and permanently erasing the content in a drive. Once the function has been done, undoing is not possible. Both the data content and even the data management table will be completely gone.

Smashing the USB drive is the surest way of cleaning data as that will permanently destroy the working components of the drive such as the memory chip. And once that happens then there's no drive let alone its contents.

1) What is Database? List its Uses.

Answers

Answer:

a database stores a large sum of data

Explanation:

its used to keep track of things like student names bank accounts and other things

If a set of routers response to change in state of network slowly, then their routing table must be?

Answers

Explanation:

if its happen then i will wait for network

Explain why the scenario below fails to meet the definition of competent communication with a client about
website design.
Situation: Jim, an owner of a small business, wants a website to expand his business.
Web designer: "Jim, you have come to the right place. Let me design a website, and then you can tell me if it meets
your needs."

Answers

Answer:

The scenario fails to meet the definition of competent communication with a client about website design because the web designer does not engage in a proper dialogue with Jim, the client. Competent communication involves actively listening to the client, asking questions to understand their needs, and working collaboratively to develop a website that meets those needs.

In this scenario, the web designer is assuming that they know what Jim wants without seeking his input. Instead of having a conversation with Jim to identify his business goals, target audience, and design preferences, the web designer is proposing to create a website on their own and then ask Jim if it meets his needs.

This approach does not take into account Jim's unique needs and preferences, and it could result in a website that does not align with his business objectives. Competent communication requires a partnership between the web designer and the client, where both parties work together to create a website that meets the client's specific needs and goals.

Explanation:

______ is defined as the level of power and control that an individual has over their learning.

A.
Student agency

B.
E-Learning

C.
Educational agency

D.
Independence

Answers

Answer:

B, E-Learning

Explanation:

A standard method for labeling digital files is called a file-labeling what? Question 5 options: protocol tool setting configuration

Answers

Answer:What is the file-labeling protocol (standard method for labeling files)--protocol

Explanation:

Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N : Lather and rinse." num_cycles times, where N is the cycle number, followed by "Done.".

Answers

Answer:

Following are the code to the given question:

def shampoo_instructions(num_cycles):#defining a method shampoo_instructions that accepts num_cycles as a parameter

   if num_cycles < 1:#defining an if block that num_cycles value is less than 1

       print('Too few.')#print message  

   elif num_cycles > 4:#defining elif block that checks num_cycles is greater than 4

       print('Too many.')#print message  

   else:#defining else block

       N= 1;#defining N variable that holds a value 1

       for N in range(N, num_cycles+1):#defining for loop that check value in range

           print(N , ": Lather and rinse.")#print message  

       print('Done.')#print message  

shampoo_instructions(2)#calling the method

Output:

1 : Lather and rinse.

2 : Lather and rinse.

Done.

Explanation:

In this code, a method "shampoo_instructions" is defined, that accepts a variable "num_cycles" in its parameter, and in the next step, the multiple conditional statements have used that check the "num_cycles" values which can be defined as follows:

The if the block checks the parameter value is less than 1, and it prints the value as the message. In the next step, the elif block is used that checks parameter value is greater than 4, and it prints the value as the message. In the else block, it uses the for loop that checks the value in the range and prints its value and calling the method.

Why is it important to mark a starting point when checking reading rate?

to see how many lines were read
to count the number of words read
to review how many pages were read in one minute
to document how many minutes it took to read the paragraph

Answers

Answer:

B. To count the number of words read.

Explanation:

Reading speed is calculated by counting the number of words read on the page. The formula for calculating the reading speed is dividing the number of words in two lines by two. Then count the number of lines on the page and multiply by the number of words per line. Then calculate how long you read in sixty seconds.

It is important to mark a starting point when checking the reading rate to count the number of words read. Therefore, option B is correct.

Answer:

lol im just  trying to pass LMOA

Explanation:

yo momma and B

explain the steps to adding a password in Smart Art

explain the steps to adding a password in Smart Art

Answers

Answer:

To add a password to a SmartArt graphic in Microsoft PowerPoint, follow these steps:

Open the PowerPoint presentation containing the SmartArt graphic that you want to add a password to.

Select the SmartArt graphic by clicking on it.

In the ribbon at the top of the window, click the "Format" tab.

In the "Format" tab, click the "Security" button.

In the "Security" dialog box that appears, click the "Password" tab.

In the "Password" tab, enter a password in the "Password" field.

Re-enter the password in the "Confirm password" field to confirm it.

Click the "OK" button to save the password.

Save the presentation. The SmartArt graphic will now be protected with the password that you set. You will need to enter the password to edit or modify the SmartArt graphic.

PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
________________________________________
Output: Your goal

You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses. ________________________________________
Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Write your pseudocode here:










________________________________________

Part 2: Code the Program
Use the following guidelines to code your program.
1. Use the Python IDLE to write your program.
2. Using comments, type a heading that includes your name, today’s date, and a short description.
3. Set up your def main(): statement. (Don’t forget the parentheses and colon.)
4. Conclude the program with the main() statement.
5. Include at least two print statements and two variables.
6. Include at least four input prompts.
7. Use concatenation to join strings.
8. Follow the Python style conventions regarding indentation in your program.
9. Run your program to ensure it is working properly. Fix any errors you may observe.

Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!

When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE.
When you submit your assignment, you will attach this Python file separately.
________________________________________
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?



How could your program be useful in the real world?



What is a problem you ran into, and how did you fix it?



Describe one thing you would do differently the next time you write a program.

btw don't talk unless you are answering the question

Answers

Answer:

i can only give you pseudocode my fren

Explanation:

# information about me

def main():

MyName =  “malaki”

print(myName)

myInfo = “I was born in wichita, Kansas U.S. I live in japan. I love hotdogs.”

print(myInfo)

main()

sorry if this did not help :( i tried

In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

What is pseudocode?

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

Pseudocode is a description of the steps in an algorithm using simple or everyday language. In essence, a pseudocode uses straightforward (concise) words and symbols to summarize the steps taken during a software development process.

Consequently, the following are some characteristics of a pseudocode as the Pseudocode needs to be clear, Pseudocode ought to be ending. Executable pseudocode is required.

Therefore, In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

Learn more about language on:

https://brainly.com/question/20921887

#SPJ2

What device that will have the most network ports.

Answers

Answer:

switch device

Explanation:

because its purpose is to connect many devices.

Answer: SWITCH DEVICE

Explanation:

Other Questions
The standard gui uses blank______ to present commands, and are typically displayed at the top of the screen. write a poem on protest what is the example of red lie? how today astronomy benefits from ancient peoplebelieves and local legends about the night sky? give two examplesof that. Of the 100 entries in a costume contest, 39 entrants were dressed as heroes and 45 entrants were wearing a mask. If 21 entrants were dressed as heroes wearing a mask, how many entrants were neither dressed as heroes nor wearing a mask?1. 102. 83. 11 in order to deal with the large number of southern sympathizers and the dissenters (people vocally against the war) in the union states, what did lincoln suspend ? Write a cost function for the problem. Assume that the relationship is linear. Marginal cost, $80; 40 items cost $4,300 to produce + A. C(x) = 28x +4,300 B. C(x) = 80% +4,300 C. C(x) = 28x + 1.100 OD. firms that follow a single-business or dominant-business strategy at the corporate level generally employ a structure. A food truck did a daily survey of customers to find their food preferences. The data is partially entered in the frequency table. Complete the table to analyze the data and answer the questions: Likes hamburgers Does not like hamburgers TotalLikes burritos 29 41 Does not like burritos 54 135Total 110 205Part A: What percentage of the survey respondents liked neither hamburgers nor burritos? Show all work. (3 points)Part B: What is the marginal relative frequency of all customers who like hamburgers? Show all work. (3 points)Part C: Which category has the lowest joint relative frequency? Show all work. (4 points) A parabola can be drawn given a focu of (4,8) and a directrix of y=4. What can be aid about the parabola? Each of J, K, L, M and N is a linear transformation from R2 to R2. These functions are given as follows: J(21, 22)-(521-522,-10z1+10z2), K(21, 22)-(-522, 521), L(21,22)=(2,-2), M(21, 22)-(521+522,1021-622) N(21, 22)-(-521, 522). (a) In each case, compute the determinant of the transformation. [5 marks- 1 per part] det J- det K- det L det M- det N- (b) One of these transformations involves a reflection in the vertical axis and a rescaling. Which is it? [3 marks] (No answer given) (c) Two of these functions preserve orientation. Which are they? [4 marks-2 per part] Select exactly two options. If you select any more than two options, you will score zero for this part. a.J b.K c.L d.M e.N (d) One of these transformations is a clockwise rotation of the plane. Which is it? [3 marks] (No answer given) (e) Two of these functions reverse orientation. Which are they? [4 marks-2 each] Select exactly two options. If you select any more than two options, you will score zero for this part. a.J b.K c.L d.M e.N (f) Three of these transformations are shape-preserving. Which are they? [3 marks-1 each] Select exactly three options. If you select any more than three options, you will score zero for this part. a.Jb.K c.L d.M e.N What is the pH of 0.056 M HNO3? Is the solution neutral, acidic, or basic? Acidic neutral basic A refrigerator is priced at $525.50. There is a 6% sales tax rate. What is the sales tax for the refrigerator in dollars and cents? pls help Using the table, what is the average daily balance of the credit card for the November 1 - November 30 billing period? Round your answer to the nearest cent. Do not include a dollar sign or comma in your answer. For example, $5,678.00 should be entered as 5678.00. Complete las siguientes oraciones con la forma apropiada de los infinitivos. En algunos casos el infinitivo es la formaapropiada, pero en otros casos es necesario usar el presente de subjuntivo.Please be right 2513.27412 to the nearest tenths place Use the following information below and later do the calculations at the end of the question: Direct material purchased R750 000 Indirect material purchased R100 000 Rent R130 000 Indirect labour Freight on direct material R112 000 Freight on indirect material R20 000 Direct labour R370 000 Freight on sales R70 000 Packing of finished product Rent received Salary: typist R111 000 Advertising R40 000 Insurance R215 000 Depreciation: Factory R300 000 Depreciation: administrative R240 000 Inventory (31 December 2022) Direct material R120 000 Indirect material R50 000 WIP R360 000 Inventory (01 January 2022) Direct material R350 000 Indirect material R80 000 WIP 2460.000 Note: Only 80% of joint manufacturing overheads are applicable to the factory. Indirect material is only used in production. Required: 2.1 Primary cost [J] 2.2 Conversion cost 2.3 Manufacturing cost [L] R105 000 R210 000 R160 000 Explain why Haytham 's prediction is likely to be correct. Cost Concept On February 3, McCade Repair Service extended an offer of $100,000 for land that had been priced for sale at $114,000. On February 28, McCade Repair Service accepted the seller's counteroffer of $109,000. On October 23, the land was assessed at a value of $164,000 for property tax purposes. On January 15 of the next year, McCade Repair Service was offered $174,000 for the land by a national retail chain. At what value should the land be recorded in McCade Repair Service's records?$ 174,000 X a large company surveys 100 employees by taking random samples of 101010 managers and 909090 non-managerial employees. what type of sample is this?