Answer:
Bridges and switches
Explanation:
4a) A bridge is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the bridge and can forward packets accordingly.
A switch is an intelligent hub that examines the MAC address of arriving packets in order to determine which port to forward the packet to.
4b) Twisted-pair cable is a type of cabling that is used for telephone communications and most modern Ethernet networks
Factors to consider when buying a computer
Answer:
money
Explanation:
for working for socializing with orher
write an algorithm for finding the perimeter of a rectangle
Computer data that is suitable for sound
Answer:
Answer:In this context sound data is stored and transmitted in an analog form. Since computers represent data in digital form, (as bits and bytes) the
Jessica sees a search ad on her mobile phone for a restaurant. A button on the ad allows Jessica to click on the button and call the restaurant. This is a(n) Group of answer choices product listing ad (PLA) dynamic keyword insertion ad (DKI) click-to-call ad call-to-action ad (CTA)
It’s a click-to-call ad
3. Most widely used structure for recording database modifications is called
A. Scheduling
B. Buffering
C. Log
D. Blocking
Answer:
C. log
Explanation:
The log is a sequence of log records, recording all the update activities in the database
hope this helps
Answer:
C. Log is the
answer
Explanation:
a sequence of log records recording all update activity in database
If the signal is going through a 2 MHz Bandwidth Channel, what will be the maximum bit rate that can be achieved in this channel? What will be the appropriate signal level?
Answer:
caca
Explanation:
Una persona decide comprar un número determinado de quintales de azúcar, ayúdele a presentar el precio de venta al público por libra, considerando un 25% de utilidad por cada quintal.
Print the two-dimensional list mult_table by row and column. Hint: Use nested loops.
Sample output with input: '1 2 3,2 4 6,3 6 9':
1 | 2 | 3
2 | 4 | 6
3 | 6 | 9
How can I delete that whitespace?
Answer:
The program is as follows:
[tex]mult\_table = [[1, 2, 3], [2, 4, 6], [3, 6, 9]][/tex]
count = 1
for row in mult_table:
for item in row:
if count < len(row):
count+=1
print(item,end="|")
else:
print(item)
count = 1
Explanation:
This initializes the 2D list
[tex]mult\_table = [[1, 2, 3], [2, 4, 6], [3, 6, 9]][/tex]
This initializes the count of print-outs to 1
count = 1
This iterates through each rows
for row in mult_table:
This iterates through each element of the rows
for item in row:
If the number of print-outs is less than the number of rows
if count < len(row):
This prints the row element followed by |; then count is incremented by 1
count+=1
print(item,end="|")
If otherwise
else:
This prints the row element only
print(item)
This resets count to 1, after printing each row
count = 1
To delete the whitespace, you have to print each element as: print(item,end="|")
See that there is no space after "/"
Answer:
count = 1
for row in mult_table:
for item in row:
if count < len(row):
count+=1
print(item,end=" | ")
else:
print(item)
count = 1
Explanation: Other answers didnt have the spacing correct
Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint showing them). So is it possible to update???
Please help
Answer:
For me yes i guess you can update an app store in any deviceI'm not sure×_× mello ×_×A process needs 103 KB of memory in order to run. If the system on which it is to run uses paging with 2 KB pages, how many frames in memory are needed
Answer: 52
Explanation:
Following the information given in the question, we are informed that a process needs 103 KB of memory in order to run and that the system on which it is to run uses paging with 2KB pages, then the number of frames in memory that are needed will be:
= 103/2
= 51.5
= 52 approximately
Therefore, 52 frames in memory are needed.
9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input.
Answer:
Hence the code is given as follows,
import java.util.Scanner;
public class LabProgram {
public static String createAcronym(String userPhrase){
String result = "";
String splits[] = userPhrase.split(" ");
for(int i = 0;i<splits.length;i++){
if(splits[i].charAt(0)>='A' && splits[i].charAt(0)<='Z')
result += splits[i].charAt(0);
}
return result;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
String s = scan.nextLine();
System.out.println(createAcronym(s));
}
}
Write an expression that evaluates to True if the string associated with s1 is greater than the string associated with s2
Answer:
Explanation:
The following code is written in Python. It is a function that takes two string parameters and compares the lengths of both strings. If the string in variable s1 is greater then the function returns True, otherwise the function returns False. A test case has been provided and the output can be seen in the attached image below.
def compareStrings(s1, s2):
if len(s1) > len(s2):
return True
else:
return False
print(compareStrings("Brainly", "Competition"))
Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance. True False
Answer:
True
Explanation:
Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance.
Select the correct statement(s) regarding 4B5B encoding.
a. 4B5B is used to map four codeword bits into a five bit data word
b. 4B5B information bit rate is 80% of the total (information plus overhead) bit rate
c. 4B5B information bit rate is 20% of the total (information plus overhead) bit rate
d. all statements are correct
Answer:
b. 4B5B information bit rate is 80% of the total information plus overhead bit rate.
Explanation:
4B5B bit rate encoding means there is 80% of the bit rate which included all the information plus the overheads. There is 20% of lack in bit rate due to encoding code words which converts data into smaller bits.
When computer users have trouble with their machines or software, Roland is the first person they call for help. Roland helps users with their problems, or refers them to a more-experienced IT employee. Roland holds the position of __________ in the organization. Support Analyst Systems Analyst Network Administrator Database Administator
Answer:
The correct answer is A) Support Analyst
Explanation:
From the question, we can see that Roland is familiar with both machines and software. He is familiar with the operations of both parts of a computer to the end that he can attempt a fix. And if he can't he knows who to refer the end-users to. Usually, some IT personnel that is more experienced.
From the above points, we can safely say that Roland is an IT Support Analyst. He cannot be the Systems analyst because Systems Analysts are usually at the top of the Pyramid. They take on problems that are referred upwards to them from support analysts.
Cheers
how to identify mistakes in a html code??
Write a RainFall class that stores the total rainfall for each of 12 months into an array of doubles. The program should have methods that return the following: the total rainfall for the year the average monthly rainfall the month with the most rain the month with the least rain Demonstrate the class in a complete program and use java 8 examples to do so. Input Validation: Do not accept negative numbers for monthly rainfall figures.
Answer:
Explanation:
The following code is written in Java. It creates the Rainfall class with two constructors, one that passes the entire array of rainfall and another that initializes an array with 0.0 for all the months. Then the class contains a method to add rain to a specific month, as well as the three methods requested in the question. The method to add rain validates to make sure that no negative value was added. 8 Test cases were provided, and any methods can be called on any of the 8 objects.
class Brainly {
public static void main(String[] args) {
Rainfall rain1 = new Rainfall();
Rainfall rain2 = new Rainfall();
Rainfall rain3 = new Rainfall();
Rainfall rain4 = new Rainfall();
Rainfall rain5 = new Rainfall();
Rainfall rain6 = new Rainfall();
Rainfall rain7 = new Rainfall();
Rainfall rain8 = new Rainfall();
}
}
class Rainfall {
double[] rainfall = {0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0};
public Rainfall(double[] rainfall) {
this.rainfall = rainfall;
}
public Rainfall() {
}
public void addMonthRain(double rain, int month) {
if (rain > 0) {
rainfall[month-1] = rain;
}
}
public double totalRainfall() {
double total = 0;
for (double rain: rainfall) {
total += rain;
}
return total;
}
public double averageRainfall() {
double average = totalRainfall() / 12;
return average;
}
public double rainiestMonth() {
double max = 0;
for (double rain : rainfall) {
if (rain > max) {
max = rain;
}
}
return max;
}
}
Many companies possess valuable information they want to guard closely (ex. new chip design, competition plans, legal documents). Personal computer hard disks these days are full of important photos, videos, and movies. As more and more information is stored in computer systems, the need to protect it is becoming increasingly important. Which of the following statements is incorrect with respect to Security?
a. security has many facets; three of the more important ones are: the nature of the threats, the nature of intruders, and cryptography
b. data integrity means that unauthorized users should not be able to modify any data without the owner's permission
c. a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for
d. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes
Answer: D. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes
Explanation:
Data security is essential to protecting unwanted people from having access to ones data, malicious attack should also be prevented and unusual behavior should be monitored.
Data security has many facets such as threat nature, the nature of intruders, and cryptography. Furthermore, data integrity means that unauthorized users should not be able to modify any data without the owner's permission. Also, the statement that a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for is correct.
It should be no noted that rats gnawing backup tapes cannot prevent data loss. Therefore, the correct option is D
Explain the following terms.
a) Explain Final keyword with example. b) Define Static and Instance variables
Answer:
A.
the final keyword is used to denote constants. It can be used with variables, methods, and classes. Once any entity (variable, method or class) is declared final , it can be assigned only once.
B.
Static variables are declared in the same place as instance variables, but with the keyword 'static' before the data type. While instance variables hold values that are associated with an individual object, static variables' values are associated with the class as a whole.
What is the default return type of a method in Java language?
A.Void
B.Int
C.None
D.Short
Answer:
The default return data type in function is int
Answer: Option (b)
Explanation:
The default return data type in a function is int. In other words commonly if it is not explicitly mentioned the default return data type of a function by the compiler will be of an integer data type.
If the user does not mention a return data type or parameter type, then C programming language will inevitably make it an int.
mark me brainlist
Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate type (such as including a .0 at the end of a double or quotes around a String).
4 + 1 + 9 + "." + (-3 + 10) + 11 / 3
8 + 6 * -2 + 4 + "0" + (2 + 5)
1 + 1 + "8 - 2" + (8 - 2) + 1 + 1
5 + 2 + "(1 + 1)" + 4 + 2 * 3
"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)
Answer:
[tex](a)\ 14"."43[/tex]
[tex](b)\ 0"0"7[/tex]
[tex](c)\ 2"8 - 2"611[/tex]
[tex](d)\ 7"(1 + 1)"46[/tex]
[tex](e)\ "1"23"4"30"7"17[/tex]
Explanation:
Required
Evaluate each expression
The simple rules to follow are:
(1) All expressions in bracket will be evaluated based on its data type
(2) Divisions will return only integer values
(3) Integers immediately after string values will be concatenated (not added)
So, the results are as follows:
[tex](a)\ 4 + 1 + 9 + "." + (-3 + 10) + 11 / 3[/tex]
Evaluate till a string is encountered
[tex]4 + 1 + 9 = 14[/tex]
Followed by "."
Then:
[tex](-3 + 10) = 7[/tex]
[tex]11/ 3 = 3[/tex]
[tex]"." + (-3 + 10) + 11/3 = "."73[/tex] -- because expressions after string operations are concatenated.
So, we have:
[tex]4 + 1 + 9 + "." + (-3 + 10) + 11 / 3 = 14"."43[/tex]
[tex](b)\ 8 + 6 * -2 + 4 + "0" + (2 + 5)[/tex]
Evaluate till a string is encountered
[tex]8 + 6 * -2 + 4 =0[/tex]
[tex]"0" + (2 + 5) ="0"7[/tex]
So, we have:
[tex]8 + 6 * -2 + 4 + "0" + (2 + 5) = 0"0"7[/tex]
[tex](c)\ 1 + 1 + "8 - 2" + (8 - 2) + 1 + 1[/tex]
Evaluate till a string is encountered
[tex]1 + 1 = 2[/tex]
[tex]"8 - 2" + (8 - 2) + 1 + 1 = "8 - 2"611[/tex]
So, we have:
[tex]1 + 1 + "8 - 2" + (8 - 2) + 1 + 1 = 2"8 - 2"611[/tex]
[tex](d)\ 5 + 2 + "(1 + 1)" + 4 + 2 * 3[/tex]
Evaluate till a string is encountered
[tex]5 + 2 =7[/tex]
[tex]"(1 + 1)" + 4 + 2 * 3 = "(1 + 1)"46[/tex] --- multiply 2 and 3, then concatenate
So, we have:
[tex]5 + 2 + "(1 + 1)" + 4 + 2 * 3= 7"(1 + 1)"46[/tex]
[tex](e)\ "1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)[/tex]
Since a string starts the expression, the whole expression will be concatenated except the multiplication and the expressions in bracket.
So, we have:
[tex]"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9) = "1"23"4"30"7"17[/tex]
information technology please help
Answer:
Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...
Browse Online Tutorials. ...
Build-up online profile. ...
Learn new Tools. ...
Implement what you learned. ...
Enrich your skillset. ...
Try-out and Apply.
A computer with a five-stage pipeline deals with conditional branches by stalling for the next three cycles after hitting one. How much does stalling hurt the performance if 20% of all instructions are conditional branches
Answer:
The stalling hurt the performance by 60%.
Explanation:
This can be calculated as follows:
Value of CPI ideally taken by pipeline = 1
From the question, we are given:
Stall frequency = 20%,
Number of frequency = 3
Therefore, we have:
Cycles per instruction (CPI) of the architecture = Value of CPI ideally taken by pipeline + (Stall frequency * Number of frequency) = 1 + (20% * 3) = 1.60
Amount by which the stalling hurt the performance = Cycles per instruction (CPI) of the architecture Value of CPI ideally taken by pipeline = 1 - 0.60 = 0.60, or 60%
Therefore, the stalling hurt the performance by 60%.
How many ways are there to arrange the letters in the word ALGORITHMS? Note, the letter arrangement does not have to spell a word in the dictionary, but the new word must contain all the letters and each letter can be used only once.
there are ten letters in the word, so for the first position we can choose out of 10 option.
no matter wich specific option we choose, we will have 9 letters left for the 2nd letter.
and 8 for the third place.
...
when we will have used up 9 of 10 letters, there will be only one option for the last place.
the number of possible decision-paths is therefore given by this expression:
10*9*8*7*6*5*4*3*2*1
wich is 3,628,800
there are quite a few ways to rearrange 10 letters
The sorting method which commands entries in a going to head predicated on each character without regard to space as well as punctuation, therefore there are 3628800 ways.
The word 'ALGORITHMS' has 10 letters. There is no repeated letter so, the first Letter can hold 10 places if we start taking one letter at a time. The second can then hold nine positions, the third can hold eight, and so on.So, as [tex]\bold{ 10\times 9 \times 8.... \times 3 \times 2 \times 1 = 362,8800}[/tex] ways, we have such a total number of ways.
Learn more:
brainly.com/question/17276660
Write a statement that assigns numCoins with numNickels + numDimes. Ex: 5 nickels and 6 dimes results in 11 coins. Note: These activities may test code with different test values. This activity will perform two tests: the first with nickels = 5 and dimes = 6, the second with nickels = 9 and dimes = 0.
1 import java.util.Scanner;
2
3 public class AssigningSum {
4 public static void main(String[] args) {
5 int numCoins;
6 int numNickels;
7 int numDimes;
8
9 numNickels = 5;
10 numDimes - 6;
11
12 /* Your solution goes here
13
14 System.out.print("There are ");
15 System.out.print(numCoins);
16 System.out.println(" coins");
17 }
18 }
Answer:
Explanation:
The statement solution was added to the code and then the code was repeated in order to create the second test case with 9 nickels and 0 dimes. The outputs for both test cases can be seen in the attached image below.
import java.util.Scanner;
class AssigningSum {
public static void main(String[] args) {
int numCoins;
int numNickels;
int numDimes;
numNickels = 5;
numDimes = 6;
/* Your solution goes here */
numCoins = numNickels + numDimes;
System.out.print("There are ");
System.out.print(numCoins);
System.out.println(" coins");
// TEST CASE 2
numNickels = 9;
numDimes = 0;
/* Your solution goes here */
numCoins = numNickels + numDimes;
System.out.print("There are ");
System.out.print(numCoins);
System.out.println(" coins");
}
}
You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the discussion forum. Which of the following would be appropriate in a post?
A. Including an advertisement for how to subscribe to the data analytics magazine.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.
Select All that apply
Answer:
These are the things that are would be appropriate in a post.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.
Explanation:
The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.
When rating ads, I should only consider my personal feelings on the ad.
Answer:
yes when rating ads you should only consider your personal feelings on the ad
What is the future of marketing automation?
Answer:
give me number I will explain fast I am free now reply bro I am waiting
Answer:
To put it into simple words: the future of marketing automation is customers centric.
From data collection to lead generation, marketing automation will stay B2B marketers’ favorite in the future. Based on the current analytics, let’s have a look at how automation is driving lead generation today as well as what’s to come.
It’s going to be all about customersPersonalization will become even more importantMore Jobs and Activities Will Require Marketing AutomationGeneric Content Will Become Almost Non-ExistentMarketers Should Stay Current With Marketing Automation for Maximum ROIMarketing automation is a dynamic field and it will continue to evolve and transform processes in the future. If you in the marketing frontier, and looking to transform your lead generation processes, don’t be afraid to give marketing automation a shot.
A retail department store is approximately square, 35 meters (100 feet) on each side. Each wall has two entrances equally spaced apart. Located at each entrance is a point-of-sale cash register. Suggest a local area network solution that interconnects all eight cash registers. Draw a diagram showing the room, the location of all cash registers, the wiring, the switches, and the server. What type of wiring would you suggest?
Answer:
The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server
Explanation:
The local area network ( LAN ) solution that will be used to interconnect all the POS registers is ; The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server .
This is because category 5e/6 twisted pair cable has a data rate transfer of up to 10 Mbps and it is best used for LAN connections
while The function of the three switches is to connect each cash register to the the central server been used .
attached below is a schematic representation
command create database in oracle database ::((
Answer:
kdkskskiisidiodoosooddodod