Answer:
Yes
Explanation:
We known that TCP is the connection [tex]\text{oriented}[/tex] protocol. So the TCP expects for the target host to acknowledge or to check that the [tex]\text{communication}[/tex] session has been established or not.
Also the End stations that is running reliable protocols will be working together in order to verify transmission of data so as to ensure the accuracy and the integrity of the data. Hence it is reliable and so the data can be sent A will still be delivered reliably and it is in-sequence at B.
If every company is now a technology company, then what does this mean for every student attending a business college
Answer:
Explanation:
There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.
But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.
Which of the following is true for creating a new file?
a. ifstream objects do not create a new file.
b. create a file with the same name as an existing file, you will be prompted to rename your new file.
c. files cannot be created using the fstream library
d. None
Answer:
create a file with the same name as an existing file ,you will be prompted to rename your new file
(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.
Answer:
The answer is "True".
Explanation:
The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available
Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.
Explanation:
Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.
REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.
A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised
Answer:
computer.
Explanation:
it uses data that is labeled to train.
write the full form of E-mail?
Answer:
Electronic Mail. This is your answer.
Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C
Validate the user input so that the user can only enter positive values for sides A, B, C. All three must be true:
A > 0
B > 0
C > 0
Answer:
The program in Python is as follows:
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
while A<=0 or B <= 0 or C <= 0:
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
print("Valid inputs")
Explanation:
Get input for A, B and C
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
The loop is repeated until inputs for A, B and C are above 0
while A<=0 or B <= 0 or C <= 0:
Get input for A, B and C
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
Print valid inputs when user inputs are correct
print("Valid inputs")
In the right situations, the use of multi-threads can allow for application speedup. Provide a small code example that illustrates how threads can be used to arrive at an appropriate result. Identify if there is a point where too many threads might impact performance of the application. g
Answer:
Explanation:
Threads allow an applications to run faster because they allow various tasks to run at the same time instead of doing one at a time and having to wait for one to finish before starting the next task. However, if too many threads are running at the same time, or a thread has a very large task or requires another task to finish before finishing its own then this can drastically impact performance. Mainly because too many resources are being used at a single moment. The following code is a small example of how threads work in Python.
import threading
import time
def thread_function(name):
print("Thread {name}: starting")
time.sleep(2)
print("Thread {name}: finishing")
thread1 = threading.Thread(target=thread_function, args=(1,))
thread1.start()
time.sleep(1)
thread2 = threading.Thread(target=thread_function, args=(2,))
thread2.start()
thread2.join()
Identify the statement about Windows tasks that is FALSE.
To launch an application, click the Windows icon, select "All Programs," and then click an application.
The boot process is the process for powering off a computer.
A common way to shut down the computer’s operating system is by using the Start menu.
Users log into their accounts on the Welcome screen, before Windows is ready to use.
The statement about Windows tasks that is FALSE is
The boot process is the process for powering off a computer.According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.
As a result of this we can see that in launching an application;
we need to click on Windows iconselect "All Programs," click an application.Therefore, The boot process is not the process for powering off a computer.
Learn more about Windows tasks .
https://brainly.com/question/1594289
The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.
The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.
Learn more about the boot process here.
https://brainly.com/question/24355262
#SPJ6
give one advantage of saving file in the same folder
Answer:
it's easier to find
Explanation:
things are much more organized
What is hacking? Why is hacking a concern for law enforcement?
Answer:
hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.
Which terms means device that converts one voltage to another ?
Answer:
I believe it is an adapter
Explanation:
An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.
slide transition can be defined as ____ of one slide after another
Answer:
visual effect
Explanation:
A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.
Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.
Which network type is Marco using?
LAN
PAN
WAN
MAN
Answer:
PAN
Explanation:
For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.
What are the PAN network type is Marco using?The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).
A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.
Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.
Learn more about network type here:
https://brainly.com/question/29515062
#SPJ2
is there similarities between plagiarism and software piracy? explain.
what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?
1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...
3.Obtain permissions when posting videos or 4.images of others on your networks. ...
Scrub your accounts. ...
5.Password diligence. ...
Spread love, not hate.
Create union integer with members char c, short s, int i and long b. Write a program that inputs the values of type char, short, int, and long and stores the values in union variables of type union integer. Each union variable should be printed as a char, a short, an int and a long. D the values always print correctly? Also create pseodocode or flowchart.
Here is the feedback that I received when I originally turned this in:
I have the following concerns: You need to save your program file with a .c extension. You should declare your union above the main module and then utilize it from within this portion. You have declared the union and then created a function definition prior to entering the main() function.
Here is the original code provided by homework help: Thanks in advance
#include
union myUnion {
char c;
short s;
int i;
long l;
};
void print(myUnion u) {
printf("As a character: %c\n", u.c);
printf("As a short: %hd\n", u.s);
printf("As an int: %d\n", u.i);
printf("As a long: %ld\n\n", u.i);
}
int main() {
myUnion u;
printf("Please enter a character: ");
scanf("%c", &(u.c));
print(u);
printf("Please enter a short: ");
scanf("%hd", &(u.s));
print(u);
printf("Please enter an int: ");
scanf("%d", &(u.i));
print(u);
printf("Please enter a long: ");
scanf("%ld", &(u.l));
print(u);
return 0;
Answer:
The updated program in C is as follows:
#include <stdio.h>
union myUnion{ char c; short s; int i; long l; };
int main(){
union myUnion inputs;
printf("Character: "); scanf("%c", &inputs.c);
printf("Output: %c", inputs.c);
printf("\nShort: "); scanf("%hd", &inputs.s);
printf("Short: %hd", inputs.s);
printf("\nInteger: "); scanf("%d", &inputs.i);
printf("Output: %d", inputs.i);
printf("\nLong: "); scanf("%ld", &inputs.l);
printf("Long: %ld", inputs.l);
return 0;
}
The pseudocode is as follows:
Function union myUnion {
character; short; int; long
}
main() {
myUnion inputs;
Input inputs.c; Print inputs.c
Input inputs.s; Print inputs.s
Input inputs.i; Print inputs.i;
Input inputs.l; Print inputs.l
}
Explanation:
This defines the union function
union myUnion{ char c; short s; int i; long l; };
The main begins here
int main(){
This calls the union function to main
union myUnion inputs;
This prompts and gets input for character variable
printf("Character: "); scanf("%c", &inputs.c);
This prints the character input
printf("Output: %c", inputs.c);
This prompts and gets input for short variable
printf("\nShort: "); scanf("%hd", &inputs.s);
This prints the short input
printf("Short: %hd", inputs.s);
This prompts and gets input for integer variable
printf("\nInteger: "); scanf("%d", &inputs.i);
This prints the integer input
printf("Output: %d", inputs.i);
This prompts and gets input for long variable
printf("\nLong: "); scanf("%ld", &inputs.l);
This prints the long input
printf("Long: %ld", inputs.l);
return 0;
}
5 Write full forms of the following: CPU b. MHz с. СВТ d. CAI e. ICU f. POS a. Write suitable technical term for the following statements. The continuously working capacity of computer without loos its speed and accuracy. b. The computer terminology, in which output is determined accord to the input The computer device used in hospitals that helps to main heartbeat of the patient. Opiemak The collection of eight bits or two Nibbles. C. I byte d. ng School Level Computer Science - 6
Answer:
CPU = Central prossing Unit
Output is the act of is the act of entering the data to the computer?
Answer:
Output is the act of the computer display information based on your input
Explanation:
Funny thing is that output is the exact opposite of what you just described
31. Explain what the program does. Write out the output 20 PRINT "Hellooo00000000000, world!" 30 PRINT "I'm learning about commands in BASIC." 40 PRINT 'This text is being printed via the PRINT commarrd. 2 209
o_num = input ("Please enter the amount of \"o\": ")
zero_num = input ("Please enter the amount of zeros: ")
i = 0
while i < o_num and i < zero_num:
repeat_o = "Hell" + o_num
repeat_zero = repeat_o + zero_num
i+=1
print (repeat_zero)
please i need helpWhen something is not in accordance with the rules or standards for right conduct or practice, it is called
copyright
global plagiarism
plagiarism
unethical
The answer is:
D) unethical
Explain what 10CLS program does and the write the output
In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics
Answer: demographics
Explanation:
Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.
The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.
It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.
I need someone to explain gor me python coding!
Answer:
Explanation:
Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems
12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the AcademicGroups table.
Answer:index(E3:H12,1)
Explanation:
Answer: =INDEX(AcademicGroups,1,1)
Explanation:
Use the INDEX function (fx) button and you will be provided two different arguments to choose from.
Select the argument: array,row,num,column,num
In the Array section, click the up-arrow and then highlight the range A2:G12 (this is the AcademicsGroups table).
In the Row_num section, enter the number 1
In the Column_num section, enter the number 1
Press OK
Hopefully the logic behind this, after seeing it, makes sense.
Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in bytes, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)
Answer:
ArraySize = ($ - newArray)
Explanation:
Given
Array name: newArray
Type: DWORD
Required
The size of the array in bytes
The following formula is used to calculate the size of an array in assembly language.
Variable = ($-Array name)
So, we have:
ArraySize = ($ - newArray)
Where ArraySize is the variable that holds the size of newArray (in bytes)
So, I need to use an external mic for my phone, but the problem is that I need a "dual mic adapter". My dad gave me an "audio splitter" instead. Can I use the audio splitter instead in order to connect the external mic to my phone???
But you can't use this device alone to connect two microphones to your USB C port and expect it to have usable volume. So the description is somewhat misleading ...
Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message.
Answer:
Sample output:
Enter the number: 25
The square root of 25 is: 5
Enter the number: -25
The square root of 25 is: Nan
Explanation:
Here the code is given as follows,
What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?
Answer:
Fiber Optic, it allows for speeds up to 1200 mbps
Explanation:
https://ref.surveyj.co/Oware111
What is the link?
IS IT A HACKING LINK