A junior network administrator has used the wrong cable type to connect his or her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the OSI reference model does this problem appear to reside at

Answers

Answer 1

Answer: Application Layer

Explanation: trust


Related Questions

Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using Excel over lists, paper files, or simple word documents? Summarize one thing in you home life that could be improved or more easily managed using Excel?​

Answers

Excel

Excel is a software program that contains spreadsheet. Spreadsheet is an electric document that works numbers and display results in graphs. There are vertical columns and horizontal rows.

they are several advantages of excel which is;

Excel is very efficient to use, especially when you have to calculate your data, it's not hard to calculate the computer itself calculates it for you.

they are also disadvantages of excel which is;

some users might get a little bit problem when you send Microsoft Excel, here is one sometimes the spreadsheet are difficult to share internally.

Your new trainee is interested in ACLs (access control lists). He asks you want they can be used for. What should you tell him? A. Protect hosts from viruses.B. Classify network traffic.C. Provide high network availability.D. IP route filtering.

Answers

Answer:

B. Classify network traffic.

D. IP route filtering.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a network or file.

In Computer networking, access control lists (ACLs) can be used to perform the following tasks;

I. Classify network traffic: it can be used to classify the different networks on a router and define whether packets are rejected or accepted.

II. Internet protocol (IP) route filtering: any internet protocol (IP) address that's is not on the accept list would be refused permission into accessing a network. Thus, ACLs can either deny or accept IP addresses depending on the routing table configured on the router.

What are some of the advantages and disadvantages of connection-oriented WAN/Man as opposed to connection-less?

Answers

Answer and Explanation:

Connection oriented WAN/MAN as opposed to connection less network is a type of wide area network that requires communicating entities in the network to establish a dedicated connection for their communication before they start communicating. This type of network will use these established network layers only till they release it, typical of telephone networks.

Advantages include:

Connection is reliable and long.

Eliminates duplicate data issues.

Disadvantages include:

Resource allocation while establishing dedicated connection slows down speed and may not fully utilize network resources.

There are no plan B's for network congestion issues, albeit occurring rarely with this type of network.

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. Which of the following is a step that the cloud administrator needs to perform as part of the move?
a. Migrate to an external DNS solution
b. Create a new VPC that will serve DNS needs for multiple other VPCs
c. Discontinue using DNS
d. Remove the DNS entries within the VPC that are no longer relevant

Answers

Answer:

Here the correct option is option b Create a new VPC that will serve DNS needs for multiple other VPCs.

Explanation:

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. It's not possible to maneuver an existing instance to a different subnet or VPC. Instead, you'll manually migrate the instance by creating a new VPC Image from the source instance.  

b. Create a new VPC that will serve DNS needs for multiple other VPCs

convert 198 / 61 to ratio​

Answers

I think the answer is

198:61

I'm not sure

Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subject. As they're discussing some of the topics, he gives the co-worker permissions to the resources so they can look at the information on their own. Which of the following access control methods does Kareem's company use?

a. DAC
b. RBAC
c. MAC
d. TSAC

Answers

Answer: RBAC

Explanation:

The access control methods that Kareem's company uses us the role based access control.

The Role-based access control (RBAC) simply means assigning permissions to users based on the role that such individual plays within an organization.

RBAC is a simple approach to access management and is typically less prone to error than in a scenario whereby permissions are assigned to users individually. Access rights are given to the workers based on what their job entails and what is needed and other information which isn't needed won't be accessible to them.

Scenario You are a network engineer and it is your first day working with ASU and you have been given the job of creating a network for the IT program. You are given the following three tasks to complete. 1. Configure IP addressing settings on network devices. 2. Perform basic device configuration tasks on a router. 3. Verify Layer 3 connectivity via a routing protocol. 4. Setup some access control lists.

Answers

B because one cause…………………

Select the correct answer.
What testing approach does a development team use when testing the developed code rather than just the functionality of the code?
A.
white box testing
B.
black box testing
C.
acceptance testing
D.
usability testing

Answers

Answer:

D. usability testing

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis and requirements.

3. Software design and prototyping.

4. Development (coding).

5. Integration and testing

6. Deployment.

7. Operations and maintenance.

Usability testing is a testing technique used by a software development team to test a developed code rather than just the functionality of the code.

The main purpose of usability (user experience) testing is to determine how easy, user-friendly or difficult it is for end users (real people) to use a software application or program.

User-Defined Functions: Miles to track lapsOne lap around a standard high-school running track is exactly 0.25 miles. Define a function named MilesToLaps that takes a float as a parameter, representing the number of miles, and returns a float that represents the number of laps.Then, write a main program that takes a number of miles as an input, calls function MilesToLaps() to calculate the number of laps, and outputs the number of laps. Ex: If the inout is 1.5the output is 6.0 Ex: If the input is 2.2the output is 8.8 Your program should define and call a function Function Miles ToLaps(float userMiles) returns float userLaps 12 // Deine Milestola hert. 34 // Deine Minhert. Your code ust call llestola 5

Answers

Answer:

Explanation:

The following is written in Java. The MilesToLaps method creates a variable called laps and gives it the value of the input parameter miles divided by 0.25. Then it returns the variable laps to the user. In the main method a Scanner object was created and asks the user for the number of miles which are passed to the MilesToLaps method which returns the number of laps. This can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("How many miles?");

       float miles = in.nextFloat();

      System.out.println("This is " + MilesToLaps(miles) + " laps");

   }

   public static float MilesToLaps(float miles) {

       float laps = (float) (miles / 0.25);

       return laps;

   }

}

Use the Internet to research external storage devices. Find at least three devices, with a minimum storage size of 1 terabyte (TB), from three different manufacturers. Write a paragraph, IN YOUR WORDS, for each device explaining the features and benefits. Provide the retail cost and include a reference link to each device. Next, write

Answers

Hi, you've asked an incomplete question. However, I provided suggestions on getting the desired information.

Explanation:

Considering the fact that you are required to find information about not just the cost, but also the features and benefits of three storage devices having a minimum storage size of 1 terabyte, it is recommended that you check this on a reputable e-commerce site (eg Amazon).

There you could find information about their features and benefits, as well as customer feedback about their experience using these devices.

There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object of D to perform some computations. Besides, C consists of two C1s and one C2 as subcomponents. Object of C2 is still reusable when its major component C is depleted. C1 has a method that takes in an object of E as argument. Which one is invalid

Answers

Answer:

are u in HS or college work

I am trying to understand

Select the correct statement(s) regarding PONS. a. only MMF cables can be used, since MMF enables greater data capacities compared to SMF b. PONS systems require active amplifiers, since high frequency signals attenuate quickly over distance c. PONS systems use passive devices between OLT and ONT d. all are correct statements

Answers

Answer:

The correct statement regarding PONS is:

c. PONS systems use passive devices between OLT and ONT

Explanation:

PON means Passive Optical Network. Based on fiber-optic telecommunications technology, PON is used to deliver broadband network access to individual end-customers.  It enables a single fiber from a service provider to maintain an efficient broadband connection for multiple end-users (homes and small businesses).  OLT means Optical Line Terminal, while ONT means Optical Network Terminal.  They provide access to the PON.

In which generation of computers are we in?​

Answers

It should be the Sixth generation

which animal is the computer to store data information and instruction ​

Answers

Answer:

human is the answwr of the quest

It's currently 1:00 in the afternoon. You want to schedule the myapp program to run automatically tomorrow at noon (12:00). What two at commands could you use

Answers

Answer:

at 12 pm tomorrow

at now +23 hours

Explanation:

The at command could be used in the command line to perform a scheduled command in Unix related systems. The at command coule be ua d to program a complex script or used to perform simple scheduled reminders.

The at command is initiated by first writing the at string followed by the condition or statement to be performed.

Currently (1:00 pm) ; To make a schedule for 12pm then that will be at noon the following day:

at 12:00 pm tomorrow

Or :

Using the number of hours between the current tone and the schedule time : 12 pm tomorrow - 1:00 pm today is a difference of 23 hours ;

Hence, it can be written as :

at +23 hours

Consider a system with seven processes: E, F, G, H, I, J, K and six resources: U, V, W, X, Y, Z. Process E holds U and wants V. Process F holds nothing but wants W. Process G holds nothing but wants V. Process H holds X and wants V and W. Process I holds W and wants Y. Process J holds Z and wants V. Process K holds Y and wants X. Is this system deadlocked?

a. Yes
b. No

Answers

Answer:

a. Yes

Explanation:

System is deadlock due to process HIK. Process H holds X and wants V and W. Process I holds W and wants Y. Process K holds Y and wants X. The system will become deadlock due to these three different processes.

what is example of application of machine learning that can be imposed in eduction. (except brainly.)

Answers

Answer:

Machine Learning Examples

Recommendation Engines (Netflix)

Sorting, tagging and categorizing photos (Yelp)

Self-Driving Cars (Waymo)

Education (Duolingo)

Customer Lifetime Value (Asos)

Patient Sickness Predictions (KenSci)

Determining Credit Worthiness (Deserve)

Targeted Emails (Optimail)

What is the full form of USB​ ?

Answers

Answer:

universal serial bus: an external serial bus interface standard for connecting peripheral devices to a computer, as in a USB port or USB cable.

Explanation:

The process by which the kernel temporarily moves data from memory to a storage device is known as what?

Answers

Answer: Swapping

Explanation:

Swapping is referred to as the process by which the kernel temporarily moves data from memory to a storage device.

Swapping is simply a memory management scheme whereby the process can be swapped temporarily from the main memory to the secondary memory in order for the main memory to be available for other processes. Swapping is used for memory utilization.

If x=50.7,y=25.3 and z is defined as integer z,calculate z=x+y​

Answers

Answer:

Ans: 76

Explanation:

z=x+y

=50•7 + 25•3

=76#

when describing a software lincense what does the phrase "open source" mean?

Answers

Open source is like we’re you can your your notes

Imagine you are trying to choose what restaurant to visit. You have a list of restaurants, each with a collection of star ratings. You also have a minimum standard; you will only go to a restaurant whose star rating is at least your minimum standard. Write a function called restaurant_rating. restaurant_rating has two parameters. The first is a dictionary, where the keys are restaurant names and the values are lists of ratings. The second parameter is your minimum rating. If a restaurant's average rating is above your minimum rating, you might visit it. If it is not, you won't. restaurant_rating should return a list of restaurants eligible for you to visit. That is, it should return a list of restaurant names from the dictionary whose average ratings (the average of the ratings in their lists) is greater than or equal to your minimum rating. This list should be sorted alphabetically. For example: rest_and_rating

Answers

Answer:

The function in Python is as follows:

def restaurant_rating(restaurants,minRatings):

   restaurantList = []

   for key in restaurants:

       if restaurants[key] >= minRatings:

           restaurantList.append(key)

           

   restaurantList.sort()

   return restaurantList

Explanation:

This declares the function

def restaurant_rating(restaurants,minRatings):

This initializes the list of eligible restaurants

   restaurantList = []

This iterates through the restaurant dictionary

   for key in restaurants:

If the ratings is greater than or equal to minimum ratings

       if restaurants[key] >= minRatings:

The restaurant name is appended to the restaurant list

           restaurantList.append(key)

Sort the eligible lists            

   restaurantList.sort()

Return the list

   return restaurantList

DEFINITION of COMPONENT HARDWARE?

Answers

Answer: See explanation

Explanation:

Computer hardware refers to the physical parts of a computer, which includes the monitor, mouse, central processing unit (CPU), keyboard, computer data storage etc.

Hardware are the physical, computer devices, which helps in providing support for major functions like input, processing, output, and communication. The computer hardware is directed by the software to perform an instruction.

If one wish to create a loop such that it will continuously add time elapsed between two functions with variable computation time until 1 hour is passed, what type of loop would be best

Answers

"Between two functions" not sure of what you mean there but here's a quick way to execute a function for an hour

Answer and Explanation:

var interval=setInterval(function(){

var i=0;

for (i=0; i <=60; i++){

for (i=0; i <70; i++){

console.log(i); }

}}, 60000);

Study the following two class interfaces: class Question { public: Question(); void set_text(string new_text); void set_answer(string new_answer); void display() const; private: string text; string answer; }; class ChoiceQuestion : public Question { public: ChoiceQuestion(); void set_text(string new_text); }; Which member function from the Question class is overridden in the ChoiceQuestion class?

Answers

Answer:

The question function

Explanation:

The ChoiceQuestion function inherits from the Question class and should have it's functions and attributes as it is now a child of the Question class. It however overides the Question class function where it sets the ChoiceQuestion class function in the first function definition of the ChoiceQuestion class definition. This allows the child class to have it's own functions as well have access to the attributes and functions of the parent class.

Write a Java program which displays a menu to allow user the following functionality: 1. Load employees’ data - prompts user for the number of employees to be loaded and then prompts for each employee name, id (5 digit number), and annual salary

Answers

Answer:

Explanation:

The code I created is written in Java. It creates an Employee class that holds the employee's name, id, and salary. Then the main method has a menu that asks the user if they want to load data, print data, or exit. Each of which is fully functioning. If the user wants to load data, it asks them how many employees they want to add and then allow them to add the employees by calling the Employee class every time and saving the objects in an ArrayList. The program has been tested and the output can be seen in the image below.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

      Scanner in = new Scanner(System.in);

      ArrayList<EmployeeData> companyData = new ArrayList<>();

      boolean loopAgain = true;

      while (loopAgain) {

          System.out.println("Menu:");

          System.out.println("1: Load Employee Data");

          System.out.println("2: Print Employee Data");

          System.out.println("3: Exit");

          int answer = in.nextInt();

          switch (answer) {

              case 1: {

                  System.out.println("How many employees will you add?");

                  int loop = in.nextInt();

                  for (int i =0; i < loop; i++) {

                      companyData.add(new EmployeeData());

                  }

              } break;

              case 2: {

                  for (EmployeeData x : companyData) {

                      x.printData();

                  }

              } break;

              case 3: loopAgain = false; break;

          }

      }

   }

}

class EmployeeData {

   String name;

   int id, salary;

   public EmployeeData() {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Employee Name: ");

       String name = in.nextLine();

       System.out.println("Enter Employee ID:");

       int id = in.nextInt();

       System.out.println("Enter Employee Salary: ");

       int salary = in.nextInt();

       this.name = name;

       this.id = id;

       this.salary = salary;

   }

   public void printData() {

       System.out.println("Employee: " + this.name);

       System.out.println("ID: " + this.id);

       System.out.println("Salary: " + this.salary);

   }

}

What will be the output of the following code
1 Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
2
3
Pim val As Double
val - Math.Sqrt (12)
5
TextBox1.Text = val
6
7 End Sub

Answers

Answer:

3.4641016151377544

Explanation:

See picture for corrected code. The OCR messes up the code.

While using PERT (Program Evaluation Review Technique) and CPM (Critical Path Method) techniques, activities that are on the critical path are more flexible than those activities which are not on the critical path.

a. True
b. False

Answers

Answer:

b. False

Explanation:

The Critical Path Method(CPM) is used to determine the maximum time to finish a project based on the total maximum time of the network of interdependent activities in the project. The CPM is usually used in conjunction with the Program Evaluation Review Technique(PERT). If an activity is in the critical path then it is at its maximum or longest duration time and cannot be more flexible at this point.

For this assignment, you will use pointers to write a program that can be used to gather statistical data about the number of movies college students see in a month. The program should ask the user how many students were surveyed and dynamically allocate an array of that size. The program should then allow the user to enter the number of movies each student has seen. The program should then calculate the average, median, and mode of the values entered. Be sure to include comments throughout your code where appropriate.
Complete the C++ code

Answers

Answer:

Following are the program to the given question:

#include <iostream>//header file

#include <bits/stdc++.h>//header file

using namespace std;

int main()//main method

{

   int x,i,sum=0;//defining integer variable

   double average, median;//defining double variable

   cout<<"How many students were surveyed? ";//print message

   cin>>x;//input value

   int *a = new int[x]; //dynamically created array

   for(i = 0;i<x;i++)//defining for loop to input value in array

   {

       cout<<"Enter the number of movies seen by student number "<<i+1<<": ";//print message  

       cin>>a[i];//input value

   }

   for (int i = 0; i < x; i++)//defining loop for add value

       sum += a[i];   //use sum to add array value

   average = (double)sum/x;//defining average variable to calculate average

   cout<<"Average is "<<average<<endl;//print average value with message

   sort(a, a+x); //use sort method to sort array to find the median

   if (x % 2 != 0)//use if to check the even value

      median = (double)a[x/2];//calculating the median value

   else//esle block

       median = (double)(a[(x-1)/2] + a[x/2])/2.0;//calculating median value

   cout<<"Median is "<<median<<endl;//print median value with message

   int m_count=1 ,mode= a[0], c_count = 0;//defining integer variable

   for( i=1;i<x;i++)//defining for loop arrenge value

   {

       if(a[i]==a[i-1])//use if to check array value

       {

           c_count++;//increment c_count variable value

       }

       else//else block

       {

           if(c_count>m_count)//use if to check c_count greater than m_count

           {

               m_count = c_count;//holding value in m_count

               mode = a[i-1];//holding mode value

           }

           c_count = 1;//holding value integer value in c_count

       }

   }

   cout<<"Mode is "<<mode;//print mode value with message

   return 0;

}

Output:

Please find the attachment file.

Explanation:

Including header file.Defining the main method. Declaring integer and double type variables.Declaring integer array.Use the loop to the input value.After input, the value uses double variable "average, the median" that uses the for loop and conditional statement to check the value and hold in its variable.In the next step, another integer variable "m_count, mode, and c_count" is defined that uses the loop and conditional statement to check the median and mode value and hold its value into their variable.

What are the types of Operating System​

Answers

Answer:

1. Gestión de la memoria principal

Esta es una característica del sistema operativo básica. La memoria principal de la computadora almacena los datos que serán usados por el CPU en la ejecución de los programas. El sistema operativo se encarga de gestionarla, es decir, asignar partes de memoria a la nueva información usada, y evitar que se sature.

2. Gestión de la memoria secundaria

Es la memoria más “permanente” de una computadora. Al igual que la memoria principal, el SO sistema operativo asigna el orden de guardado en esta memoria y la mejor manera de aprovechar el espacio libre.  

3. Gestión de procesos

Cuando envías un comando para que el ordenador realice una tarea, una de las funciones del sistema operativo es organizar los recursos de la computadora para ejecutarla. Esto incluye la memoria, el tiempo del CPU, los programas y archivos necesarios para ejecutar la tarea, los procesos que podrían entorpecerla y los periféricos que podrían ser necesarios para cumplirla.

4. Gestión de recursos  

¡Esta es una de las características del sistema operativo más importantes! El sistema operativo coordina los recursos del hardware que integra la computadora para cumplir con las tareas requeridas. El CPU, los periféricos, las memorias principal y secundaria, los programas, todo tiene que trabajar al unísono para cumplir con las tareas de forma óptima.

5. Gestión de usuarios  

El software operativo controla el acceso de los usuarios a las cuentas individuales o grupales. También, se encarga de administrar a qué recursos e información tiene acceso cada uno de ellos.  

6. Gestión de la seguridad  

Así como controla el acceso de usuarios, el sistema operativo también está encargado de gestionar los controles de seguridad de la computadora, entre ellos el firewall. Por ejemplo, en cuanto a la función del sistema operativo para la seguridad informática es evitar la pérdida de datos, controlar la confidencialidad de los datos y controlar el acceso a la información y a los recursos del equipo.

Other Questions
what is the answer for 7 to the negitive second power. Which of the following is not a component of internal control?AIntegrationBControl activitiesControl environment.DRisk assessment What is the solution to the system of equations below?2x+3y=6x-3y=9 Will give brainliest to correct answer The hypotenuse of a right angled triangle is 8 cm more than its shortest side. The third side is 1 cm shorter than the hypotenuse. Find the three sides of ths is triangle. scientists who believe global warming is happening would agree with which of the following statements?(A) There are few, if any, misconceptions about global warming(B) Most scientists agree that global warming is occuring(C) Human activity is a minor cause of global warming.(D) There is little humans can do to stop global warming Surface area of triangular prism the table of values below represents a liner function and show the amount of money in the savings account since she began her part-time job what is her monthly rate of savings Please helpGiven O below, if XY and YZ are congruent, what is the measure of chord XY? HELP ASAP HOMEWORK FOR TMR!!!! Determine el radio vector del punto medio del segmento que se forma al unir los puntos (-8, 7) y (6, 3).Es para hoy 1. Is the figure defined by points H, I, J, and Ka rhombus? complete the following sentences with the suitable form of the adjective and/or adverb of the word in the parenthesis in each sentence.1. I heard a __(little) polite laughter when I told my jokes but everyone laughed ___(loud) when Gaby was telling hers. Her jokes are always__(fun) than mine Someone help plsssss If you were driving the blue Prius in the situation pictured above, explain why the red Mustang should be given right-of-way at this intersection. Ti sao s mt xch khng c l bi s ca s rng a xch Joes bait shop brought in a gross profit in sales of $4,100.00 in the month of June. During the same month their operating expenses totaled $1990.00. Calculate the net income of the bait shop for the month of June times square big ben merlion dicken yoooooo. ian got nun to do. fr.ee pts. what's 14 1/4 in lb into ounces