Which are the best networking projects for a final year student in college

Answers

Answer 1

Answer:

The best networking project for a final year are Security issues with mobile IP.IP based patients monitoring systems.

Related Questions

Explain how you would find a book on a given subject in the library.

Answers

Answer:

In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.

what is operating system?

Answers

Answer:

operating system (os)is translator between the operator (user)and the computer

Operating system (OS) is the low-level software that supports a computer's basic functions, such as scheduling tasks and controlling peripherals.

if someone wants to use a technology that allows the automation of manufacturing cars in a factory was technology should they use?

Answers

Answer:

Physical Robots with specific coded instructions

Explanation:

In this specific scenario, they would need to use Physical Robots with specific coded instructions. Each robot would need to be coded to perform a specific and unique task, so that they are able to physically create the part that is needed for the manufacturing of the car, just like a real human employee would need to do. The different robots would create all the necessary parts and then another set of robots would put those pieces together. Artificial Intelligence could also be implemented to increase efficiency and prevent future errors.

how OS manages the reusable resources

Answers

Answer:

Resources

A resource is anything required by a process.

Anything - os as resource manager.

Process - owns the resource.

Required - no resource, no progress; adaptive processes.

Resources - sharable, serially reusable, and consumable.

Explanation:

Resource durability determines how a resource reacts to being used. A reusable resource remains after being used. Disks, networks, CPUs are reusable resources.Oct 9, 201

Draw any five (5) basic symbols used for flowcharting

Answers

Answer:

Image below ⏬

You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
O True
O False

Answers

False because you just need a specific email not copy and paste.

Hope this helps

Microsoft outlook is a part of the office suite which allows users to scheuie meetings usually within an organization. Hence, copying attendees email from outside of outlook is false.

Uisng the Calendar, a meeting schedule Can be initiated by opting to create a new meeting.

The teams should be selected and the required information filled out.

From outlook, the information of attendees including email can be added with a click, rather from outside outlook.

Hence, the statement is False.

Learn more : https://brainly.com/question/20388678

have fire have ....

babi​ from babi098

Answers

Answer:

yessss I tooo have a fire at my home

lolololololololololo

ok have a great day what is your name ?

Answer:

..... ....

.... .....

....................

....................

__________ is a software development methodology that seeks to create multiple sample versions of a project for client review, allowing for plenty of feedback and ease of data refinement, but leaving the potential for major changes high.

Answers

Answer:

Prototyping!! :)

Explanation:

Prototyping is a software development methodology that seeks to create multiple sample versions of a project for client review, allowing for plenty of feedback and ease of data refinement, but leaving the potential for major changes high.

What is software development?

The process of writing code to develop a program is handled by a computer programmer.

A software developer oversees every step of the process, defining the project's requirements before collaborating with programmers to construct the code.

According to that, software developer differs from computer programmer since they need leadership abilities because they have to oversee every step of the program-making process and interact with others.

Therefore, the goal of the software development approach known as prototyping is to provide numerous test versions of a project for client assessment.

To learn more about software development, refer to the link:

https://brainly.com/question/24085818

#SPJ5

Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for the given program: Acura made in Japan Fiat made in Italy Tesla made in USA

Answers

Answer:

car_makers = {'Acura':'Japan','Fiat':'Egypt'}

car_makers['Tesla'] = "USA"

car_makers['Fiat'] = "Italy"

print("Acura made in",car_makers['Acura'])

print("Fiat made in",car_makers['Fiat'])

print("Tesla made in",car_makers['Tesla'])

Explanation:

The first line is a define object in the python code, containing two entries of Acura and Fiat and their respective countries.

The python code adds an entry to the object "car maker" using the bracket notation, the tesla car from USA.

The country of the Fiat car is changed from Germany to Italy, using the bracket notation.

The output of the complete object and the individual cars is given.

output of the python code:

{'Acura': 'Japan', 'Fiat': 'Italy', 'Tesla': 'USA'}

Acura made in Japan

Fiat made in Italy

Tesla made in USA.

Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?

Answers

Answer:

public void removePrefixStrings(List<String> list , String prefix) {

if(list==null || list.size()==0)

return;

for(int i=0; i<list.size();) {

if(list.get(i).startsWith(prefix))

list.remove(i);

else

++i;  

}  

}  

Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2

Then removal is also n  

So the total time complexity is O(n3)

What constructs break or bend the normal Syntax patterns of scheme?

Answers

Answer:

let and begin break or bend the normal syntax patterns of the scheme. Explanation:

let performed sequentially from left to right and region of binding indicated by variable. The second binding is done in which the first binding is visible and so on. The syntax is can contain multiple statements by the Begin and END keywords. Begin constructs can be nested and each block can define the variables.

Assume that the PIC18F is currently executing a 16-bit instruction addressed by 0x00015A. What are the current contents of the program counter

Answers

Answer:

0x00015C

Explanation:

Given that the counter is executing a 16-bit instruction ( currently )  

addressed as  0x00015A

The counter keeps/records the address of the next executable instruction hence the current contents of the program counter

= 0x00015A + 16 bits         note: ( 16 bits = 2 bytes )

hence current content of program counter  = 0x00015C

a which is the smallest chunk of information of computer can work with​

Answers

Answer:

I still mad for that spam

Explanation:

Answer:

The bits are the smallest chunk of info that is used by computers.

Explanation:

Bit: A short abbreviation for binary digit which is the smallest unit of data.

You're welcome.

I hope I helped you.

If there are 18 people in your class and you want to divide the class into programming teams of 3
members, you can compute the number of different teams that can be arranged using this formula
(n!/r!(n−r)!).

Answers

Using a combination method to determine how many ways can 18 people be divided into programming teams of 3 members, the number of programming teams can be arranged in 816 ways.

What is Combination?

In mathematical model, a combination is a mathematical approach for calculating the number of potential arrangements in a set of things without taking the order arrangement of the items is into consideration.

It can be expressed by using the formula;

[tex]\mathbf{ _nC_r = \dfrac{n !}{ r!(n-r)! } }[/tex]

where:

[tex] \mathbf{ _nC_r = number \: of \: combinations \: \} }[/tex]n = total number of set objects = 18r = number of choosing objects = 3

[tex] \mathbf{ _nC_r = \dfrac{18!}{ 3!(18-3)! } }[/tex]

[tex]\mathbf{ _nC_r = \dfrac{18!}{ 3!(15)! } }[/tex]

[tex] \mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 \times 15!}{ 3!(15)! } }[/tex]

[tex]\mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 }{ 3 \times \: 2 \times 1} }[/tex]

= 816 ways

Learn more about combinations here:

https://brainly.com/question/11732255

When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.

Answers

when an external device becomes ready to be serviced by the processor the device sends a(n) interrupt signal to the processor

Joanne is working on a project and goes to access one of the web applications that her organization provides to retrieve some data. Upon searching for the data that she needs, she receives a pop-up message that top-secret clearance is required and she only has secret clearance. Which of the following access control methods does her organization use?

a. DAC
b. RBAC
c. MAC
d. TSAC

Answers

Answer:

The answer is "Option c".

Explanation:

This required user access policy is a tool used for a central authority that assigns access privileges depending on regulations.

It is a security method that limits the capacity of foreign firms to give or refuse access to a file program's resource objects.

It is a system that imposed access control on the premise of object labels and subject clearance. Such topics and items, like confidential, secret, and top-secret, have clearances and designations, appropriately.

You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to configure the proxy server settings as follows: Port: 9000

Answers

Answer:

okay if I am it administration I will port 10000

To configure the computer in the lobby to use the corporate proxy server, you will need to follow these steps:

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

What is Proxy Server?

A proxy server is a device or router that acts as a connection point between users and the internet.

Proxy Server settings would be the same for both Wifi and Ethernet connections, explaining about the configuration in Windows Operating System.

Open the internet browser on the laptop and go to the settings or preferences page. The exact location of the proxy settings will vary depending on the browser you are using.

In the settings or preferences page, look for the "Proxy" or "Network" section.

In the proxy settings, select the option to use a proxy server.

Enter the address of the corporate proxy server in the "Server" or "Address" field.

Enter the port number "9000" in the "Port" field.

Save the changes and close the settings or preferences page.

Test the proxy server configuration by attempting to access a website. If the configuration is correct, the laptop should be able to access the internet through the proxy server.

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

To learn more about the Proxy Server settings click here:

https://brainly.com/question/14403686

#SPJ12

examples in types of experimental methods

Answers

Lab Experiment

Field Experiment

Natural Experiment.

Answer:

Experimental research for individuals in the physical sciences and many other fields is the best-known kind of research design. The main reason is that experimental research is a typical scientific experiment, similar to that carried out in secondary schools.

Explanation:

The types of research designs are determined by how the researchers assign subjects to various conditions and groups. They are of three different types: pre-experimental, almost experimental, and real experimental research.

Pre-experimental Research Design:-

In pre-experimental research, the effect of the application of a supposedly changing independent variable is observed by either a group or different dependent groups. It is the simplest form of experimental design and does not involve a control group.

Quasi-experimental Research Design:-

The term "almost" refers to partial, half, or pseudo. The quasi-experimental research therefore resembles, but not the same, the real experimental research. The participants are not assigned randomly in quasi-examples and are therefore used in environments that are difficult or unable to randomize.

True Experimental Research Design:-

To confirm or refute a hypothesis, real experimental research is based on statistical analyses. It is the most exact experimental type and can be performed on two randomly assigned subjects with, or without a pretest.

The true experimental design of the research must include a control group, a variable that the researcher can manipulate and the distribution must be random.

When you are making multiples of a brownie recipe, you cannot - without great difficulty - use a fraction of an egg. The calculate_eggs function uses the ceil function in the math module to always round up and provide the total number of eggs you need on hand to make your recipe.
1. On Line 2, import just the ceil function from the math module
2. On Line 6, call the ceil function to calculate 0.6*servings
When you run the code, it should match the output under Desired Output
# Import ceil function only from the math module
import math.ceil
# Define Function
def calculate_eggs(servings):
total_eggs = (0.6*servings)
return total_eggs
# Call Function
print(calculate_eggs(14))
Desired Output = You need 9 eggs

Answers

The answer is one ☝️ question for the poll of a vote

Write a program that asks the user to enter 5 test scores. The program will display a letter grade for each test score and an average grade for the test scores entered. Three functions are needed for this program.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

double average(double s1, double s2, double s3, double s4, double s5){

   double avg = (s1 + s2 + s3 + s4 + s5)/5;

   return avg;}

char lGrade(double score){

   char grade;

   if(score>= 90 && score <= 100){ grade ='A'; }

   else if(score>= 80 && score <= 89){ grade ='B'; }

   else if(score>= 70 && score <= 79){ grade ='C'; }

   else if(score>= 60 && score <= 69){ grade ='D'; }

   else if(score < 60){ grade ='F'; }

   return grade;}

int main(){

   double s1,s2,s3,s4,s5;

   cin>>s1>>s2>>s3>>s4>>s5;

   double avg = average(s1,s2,s3,s4,s5);

   cout<<s1<<" "<<lGrade(s1)<<endl;

   cout<<s2<<" "<<lGrade(s2)<<endl;

   cout<<s3<<" "<<lGrade(s3)<<endl;

   cout<<s4<<" "<<lGrade(s4)<<endl;

   cout<<s5<<" "<<lGrade(s5)<<endl;

   cout<<avg<<" "<<lGrade(avg)<<endl;

   return 0;}

Explanation:

The three functions to include in the program are not stated; so, I used the following functions in the program

1. The main function

2. average function

3. Letter grade function

The average function begins here

double average(double s1, double s2, double s3, double s4, double s5){

This calculates the average

   double avg = (s1 + s2 + s3 + s4 + s5)/5;

This returns the calculated average

   return avg;}

The letter grade function begins here

char lGrade(double score){

This declares the grade

   char grade;

If score is between 90 and 100 (inclusive), grade is A

   if(score>= 90 && score <= 100){ grade ='A'; }

If score is between 00 and 89 (inclusive), grade is B

   else if(score>= 80 && score <= 89){ grade ='B'; }

If score is between 70 and 79 (inclusive), grade is C

   else if(score>= 70 && score <= 79){ grade ='C'; }

If score is between 60 and 69 (inclusive), grade is D

   else if(score>= 60 && score <= 69){ grade ='D'; }

If score is less than 60, grade is F

   else if(score < 60){ grade ='F'; }

This returns the calculated grade

   return grade;}

The main begins here

int main(){

This declares the 5 scores

   double s1,s2,s3,s4,s5;

This gets input for the 5 scores

   cin>>s1>>s2>>s3>>s4>>s5;

This calls the average function for average

   double avg = average(s1,s2,s3,s4,s5);

This calls the letter grade function for the 5 scores

   cout<<s1<<" "<<lGrade(s1)<<endl;

   cout<<s2<<" "<<lGrade(s2)<<endl;

   cout<<s3<<" "<<lGrade(s3)<<endl;

   cout<<s4<<" "<<lGrade(s4)<<endl;

   cout<<s5<<" "<<lGrade(s5)<<endl;

This calls the average function for the average

   cout<<avg<<" "<<lGrade(avg)<<endl;

what is the best programming language now​

Answers

Answer:

python is the best programming language

Answer:

The 9 Best Programming Languages to Learn in 2021

JavaScript. It's impossible to be a software developer these days without using JavaScript in some way. ...

Swift. If you're interested in Apple products and mobile app development, Swift is a good place to start. ...

Scala. ...

Go. ...

Python. ...

Elm. ...

Ruby. ...

C#

Write a Java program to create a class called Cars. The class should include three instance variables: makes (type: String), models (type: String), and years (type: int); and two methods: a constructor() to initialize three variables and a show() to display the information of a car. Write a class called TestCars to test the class Cars. This class should be able to read the makes, models, and years of three cars from screen input, create three-car objects using the constructor() and display each car's make, model, and years using the show(). (5pts)

Answers

Answer:

Explanation:

This code was written in Java. It creates the Cars class with the requested variables and methods. It also creates the TestCars class which asks the user for the necessary inputs and then creates three Cars objects and passes the input values to the constructors. Finally, it uses the show() method on each object to call the information. A test has been created and the output can be seen in the attached image below.

import java.util.Scanner;

class TestCars{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.print("Enter Car Make: ");

       String make1 = in.next();

       System.out.print("Enter Car Model: ");

       String model1 = in.next();

       System.out.print("Enter Car Year: ");

       int year1 = in.nextInt();

       System.out.print("Enter Car Make: ");

       String make2 = in.next();

       System.out.print("Enter Car Model: ");

       String model2 = in.next();

       System.out.print("Enter Car Year: ");

       int year2 = in.nextInt();

       System.out.print("Enter Car Make: ");

       String make3 = in.next();

       System.out.print("Enter Car Model: ");

       String model3 = in.next();

       System.out.print("Enter Car Year: ");

       int year3 = in.nextInt();

       Cars car1 = new Cars(make1, model1, year1);

       Cars car2 = new Cars(make2, model2, year2);

       Cars car3 = new Cars(make3, model3, year3);

       car1.show();

       car2.show();

       car3.show();

   }

}

class Cars {

   String makes, models;

   int years;

   public Cars(String makes, String models, int years) {

       this.makes = makes;

       this.models = models;

       this.years = years;

   }

   public void show() {

       System.out.println("Car's make: " + this.makes);

       System.out.println("Car's model: " + this.models);

       System.out.println("Car's year: " + this.years);

   }

}

Which of the following is not a benefit provided by a stakeholder analysis document

Answers

Answer:

This is not a benefit provided by a stakeholder analysis document: You can prioritize stakeholders so you make sure to keep the most important ones happy. Explanation: ... The purpose of the document is not to prioritize stakeholders but to identify the groups.

Explanation:

Which statement regarding dialogues in multiplayer games is true?
A.
Dialogues are based only on players’ actions.
B.
Dialogues are restricted to the game’s characters.
C.
Dialogues may be between the game’s characters as well as the players.
D.
Dialogues serve the sole purpose of advancing the storyline.
E.
Dialogues are based only on events that have occurred in the game.

Game Development

Answers

Answer:

A. Dialogues are based only based on player's actions.

Explanation:

In multiplayer games, there is a feature of dialogue which makes a game interesting. These dialogues are displayed when a player acts in a certain way. The actions of the player defines the dialogues. There are various sets of dialogues which are fed into the game and they are displayed one by one when player performs actions.

Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented here. Write a program called primes.js that implements this algorithm. Have the program find and display all the prime numbers up to n = 150

Answers

Answer:

Explanation:

The following code is written in Javascript and is a function called primes that takes in a single parameter as an int variable named n. An array is created and looped through checking which one is prime. If So it, changes the value to true, otherwise it changes it to false. Then it creates another array that loops through the boolArray and grabs the actual numberical value of all the prime numbers. A test case for n=150 is created and the output can be seen in the image below highlighted in red.

function primes(n) {

   //Boolean Array to check which numbers from 1 to n are prime

   const boolArr = new Array(n + 1);

   boolArr.fill(true);

   boolArr[0] = boolArr[1] = false;

   for (let i = 2; i <= Math.sqrt(n); i++) {

      for (let j = 2; i * j <= n; j++) {

          boolArr[i * j] = false;

      }

   }

   //New Array for Only the Prime Numbers

   const primeNums = new Array();

  for (let x = 0; x <= boolArr.length; x++) {

       if (boolArr[x] === true) {

           primeNums.push(x);

       }

  }

  return primeNums;

}

alert(primes(150));

If i took my SIM card out of my phone and put it in a router then connect the router and my phone with Ethernet cable would the ping change?

Answers

Answer:

The ping will change.

Explanation:

Assuming you mean ping from device with SIM card to another host (no mater what host), the ping will change. Ping changes even on the same device because network speed and performance of all the nodes on the route changes continuously. However, if two of your devices (phone & router) are configured differently (use different routing under the hood), then it will also affect the ping.

hãy giúp tôi giảiiii​

Answers

Answer:

fiikslid wugx uesbuluss wuz euzsbwzube

Question: Name the person who originally introduced the idea of patterns as a solution design concept.

Answers

Answer:

architect Christopher Alexander is the person who originally introduced the idea of patterns as a solution design concept.

The person who originally introduced the idea of patterns as a solution design concept named as Christopher Alexander who was an architect.

What is architecture?

Architecture is referred to as an innovative technique or artwork based on buildings or physical structures that aims at creating cultural values for upcoming generations to understand the importance of history.

The external layout can be made to best support human existence and health by using a collection of hereditary solutions known as the "pattern language." It creates a set of helpful relationships by combining geometry and social behavior patterns.

Christopher Alexander, a British-American engineer and design theorist of Austrian heritage, is renowned for his several works on the design and construction process introduced the idea of patterns as a solution design concept.

Learn more about pattern language architecture, here:

https://brainly.com/question/4114326

#SPJ6

explain the reason why vector graphics are highly recommended for logo​

Answers

Answer:

Currently, raster (bitmap files) and vector graphics are used in web design. But if you want to make a great logo and fully enjoy the use of it you should pick vector graphics for it in the first place. And this is why most designers opt for it.

Explanation:

Easier to re-editNo image distortionIt is perfect for detailed imagesVector drawings are scalableVector graphics look better in print

1) Declare an ArrayList named numberList that stores objects of Integer type. Write a loop to assign first 11 elements values: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024. Do not use Math.pow method. Assign first element value 1. Determine each next element from the previous one in the number List. Print number List by using for-each loop.

Answers

Answer:

Explanation:

The following is written in Java and uses a for loop to add 10 elements to the ArrayList since the first element is manually added as 1. Then it calculates each element by multiplying the previous element (saved in count) by 2. The program works perfectly and without bugs. A test output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       ArrayList<Integer> numberList = new ArrayList<>();

       numberList.add(0, 1);

       int count = 1;

       for (int i = 1; i < 11; i++) {

           numberList.add(i, (count * 2));

           count = count * 2;

       }

       for (Integer i : numberList) {

           System.out.println(i);

       }

   }

}

Other Questions
88 POINTS PLS HELP!!! The parents/guardians of a third grader ask to have a statement by the child's current teacher removed from their child's permanent file because they believe it is inaccurate. If school officials deny this request, the school must inform the parents/guardians that they have a right to: What is the subject of the following sentence? Please, stay a little longer."A. The subject is impliedB. littleC. pleaseD. stay SOMEONE HELP PLEASE I NEED ANSWER (c) Describe and explain how fractional distillation can be used to separate a mixture of neon,argon, krypton and xenon. Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. Which of the following is a step that the cloud administrator needs to perform as part of the move?a. Migrate to an external DNS solutionb. Create a new VPC that will serve DNS needs for multiple other VPCsc. Discontinue using DNSd. Remove the DNS entries within the VPC that are no longer relevant Katrina needs to use her communication and conflict management skills every day with her team. What stage of development is her team in? You think that $39,500 is a good salary and are interested in a job with Fast Pax. What other information might you want to know about Fast Pax salaries, and why? Who wrote the most accurate summary of how scientists classify organisms Which inequality best represent that ice cream at -3C is cooler than ice cream at 1C? checa mi question for answers with a lot of points Plesssse help me with this The credit department of Lion's Department Store in Anaheim, California, reported that 30% of their sales are cash, 30% are paid with a credit card, and 40% with a debit card. Twenty percent of the cash purchases, 90% of the credit card purchases, and 60% of the debit card purchases are for more than $50. Ms. Tina Stevens just purchased a new dress that cost $120. What is the probability that she paid cash? How do you write 56 and 64 as a prime of its product of its prime factors in expended form and in exponential form 99999+999=???????????????????????????? What are the main sources of greenhouse gas emissions on Earth? Which of the following function pairs are inverses? The Nelson Company has $1,196,000 in current assets and $460,000 in current liabilities. Its initial inventory level is $325,000, and it will raise funds as additional notes payable and use them to increase inventory. How much can Nelson's short-term debt (notes payable) increase without pushing its current ratio below 2.0 consecuencias de las reformas borbonicas rado pliss en el 30 min Sand, gravel and cement are mixed in a ratio of 5 : 10 : 3 to make concrete. If 35 shovels of sand are used, how many shovels of gravel, and how many shovels of cement are used?