Answer:
[tex]netstat[/tex]
Explanation:
The netstat command displays network connections for TCP and can help to view the open ports on the computer.
Hope this helped!
Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a library system which is an interactive system providing access to a large document database and which allows the automated ordering and electronic delivery of documents to local and remote end-users. Some requirements for this system are: Req. 1 The user interface shall be html. Users shall access the system via standard web browsers such as Netscape and Internet Explorer. Req. 2 The system shall primarily an end-user system. Users shall use the system within the constraints of the permissions assigned by the administrator to identify, locate, order and receive documents. Req. 3 Users shall communicate with the system mainly via the html interface. Req. 4 User shall provide input to the system via the html interface. Req. 5 The system shall give output to the user via the html interface, email and print. The print output shall mainly be documents.
Answer:
Redundancy
Req. 1 and Req. 3 are seemed to say the same thing. We need to remove the first sentence in Req. 1
Conflict and understandability
Req. 1 states that access is through web browser while Req. 4 states that access is via html. We have to re-write the Req. 3 to make it clear that users do not actually have to write directly html to communicate with the system.
Completeness
Req. 5 states that print out will “mainly” be documents. What else might be printed? What other inputs will be produced?
Either remove mainly or clarify other print out.
What version of html or web browser is assumed in Req. 1 and Req. 3?
Explanation:
A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and the address is 32-bit, find the number of bits needed for tag, index, and byte select fields of the address.
Answer:
A) Number of bits for byte = 6 bits
B) number of bits for index = 17 bits
C) number of bits for tag = 15 bits
Explanation:
Given data :
cache size = 64 kB
block size = 32 -byte
block address = 32 -bit
number of blocks in cache memory
cache size / block size = 64 kb / 32 b = 2^11 hence the number of blocks in cache memory = 11 bits = block offset
A) Number of bits for byte
[tex]log _{2} (6)^2[/tex] = 6 bits
B) number of bits for index
block offset + byte number
= 11 + 6 = 17 bits
c ) number of bits for tag
= 32 - number of bits for index
= 32 - 17 = 15 bits
A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.
a. community cloud
b. hybrid cloud
c. public cloud
d. private cloud
[tex]\Huge{\fbox{\red{Answer:}}}[/tex]
A public cloud infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.
[tex]<font color=orange>[/tex]
a. community cloud
b. hybrid cloud
c. public cloud ✔
d. private cloud
Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.
a. True
b. False
Answer:
True
Explanation:
Please mark me as the brainiest
GIVING BRANLIEST IFFF CORRECT James uses a database to track his school football team. Which feature in a database allows James to list only the players that didn't play in the last game? Title Filter Search Sort
Answer:
filter
Explanation:
the filter feature allows him to fetch data that only meets a certain criteria(those who didn't play in the last game)
The FILTER feature in a database allows James to list on the players that did not play in the game.
What is the filter feature in EXCEL?The FILTER feature in Excel is used to clear out a number of statistics primarily based totally on the standards which you specify. The feature belongs to the class of Dynamic Arrays functions.
The end result is an array of values that mechanically spills into a number cells, beginning from the Cells wherein you input a formula.
Thus, The FILTER feature in a database allows James to list on the players that did not play in the game.
Learn more about FILTER feature here:
https://brainly.com/question/11866402
#SPJ2
what makes''emerging technologies'' happen and what impact will they have on individuals,society,and environment
Answer:
Please refer to the below for answer.
Explanation:
Emerging technology is a term given to the development of new technologies or improvement on existing technologies that are expected to be available in the nearest future.
Examples of emerging technologies includes but not limited to block chain, internet of things, robotics, cognitive science, artificial intelligence (AI) etc.
One of the reasons that makes emerging technology happen is the quest to improving on existing knowledge. People want to further advance their knowledge in terms of coming up with newest technologies that would make task faster and better and also address human issues. For instance, manufacturing companies make use of robotics,design, construction, and machines(robots) that perform simple repetitive tasks which ordinarily should be done by humans.
Other reasons that makes emerging technology happens are economic benefit, consumer demand and human needs, social betterment, the global community and response to social problems.
Impact that emerging technology will have on;
• Individuals. The positive effect of emerging technology is that it will create more free time for individuals in a family. Individuals can now stay connected, capture memories, access information through internet of things.
• Society. Emerging technology will enable people to have access to modern day health care services that would prevent, operate, train and improving medical conditions of people in the society.
• Environment. Before now, there have been global complains on pollution especially on vehicles and emission from industries. However, emerging technology will be addressing this negative impact of pollution from vehicles as cars that are currently being produced does not use petrol which causes pollution.
what makes ''emerging technologies'' happen is the necessity for it, the need for it in the society.
The impact they will have on individuals ,society,and environment is that it will improve areas of life such as communication, Transportation, Agriculture.
What is Emerging technologies?Emerging technologies can be regarded as the technologies in which their development as will as practical applications are not yet realized.
Learn more about Emerging technologies at:
https://brainly.com/question/25110079
_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adaptable computer systems.A) IaaSB) EAP peerC) CPD) SaaS
Answer:
The correct answer to the question is option A (IaaS)
Explanation:
IaaS (Infrastructure as a Service) can be used for data storage, backup, recovery, web hosting, and various other uses as it is cost-effective, and it also has secured data centers. It is a service delivery method by a provider for cloud computing as it enables customers to be offered the service the possibility to combine basic computing services to build and direct access to safe servers where networking can also be done. These services rendered by the providers allow users to install operating systems thereby making it possible to build highly adaptable computer systems.
SaaS (Software as a Service): Here, the service provider bears the responsibility of how the app will work as what the users do is to access the applications from running on cloud infrastructure without having to install the application on the computer.
The cloud provider (CP) as the name suggests is anybody or group of persons that provide services for operations within the cloud.
3. Which of the following is called address operator?
a)*
b) &
c).
d) %
Answer:
The Ampersand Symbol (Option B)
Explanation:
A 'address of operator' specifies that a given value that is read needs to be stored at the address of 'x'.
The address operator is represented by the ampersand symbol. ( & )
Hope this helps.
mplement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the integers within this file, close the file, and then return the sum.If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.Please Use This Code Template To Answer the Question#include #include #include //needed for exit functionusing namespace std;// Place fileSum prototype (declaration) hereint main() {string filename;cout << "Enter the name of the input file: ";cin >> filename;cout << "Sum: " << fileSum(filename) << endl;return 0;}// Place fileSum implementation here
Answer:
Which sentence best matches the context of the word reticent as it is used in the following example?
We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.
Explanation:
Which sentence best matches the context of the word reticent as it is used in the following example?
We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.
What will be assigned to the variable s_string after the following code executes? special = '1357 Country Ln.' s_string = special[ :4] Group of answer choices
Answer:
s_string = 1357
Explanation:
character: index
1: 0
3: 1
5: 2
7: 3
: 4
C: 5
o: 6
u: 7
n: 8
t: 9
r: 10
y: 11
: 12
L: 13
n: 14
. : 15
s_tring = special[:4]
s_tring = special[0] + special[1] + special[2] + special[3]
s_string = 1357
Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the attacker to stay on the system long enough for administrators to respond. These are all benefits of what network appliance?
Answer:
Honeypot is the correct answerExplanation:
A computer system that is meant to mimic the likely targets of cyber attacks is called honeypot. It is used to deflect the attackers from a legitimate target and detect attacks. It also helps to gain info about how the cyber criminals operate. They have been around for decades, it works on the philosophy that instead of searching for attackers, prepare something that would attract them. It is just like cheese-baited mousetraps. Cyber criminals get attracted towards honeypots by thinking that they are legitimate targets.
When you start your computer then which component works first?
What will be displayed after the following code executes? mystr = 'yes' yourstr = 'no' mystr += yourstr * 2 print(mystr)
Answer:
yesnono
Explanation:
mystr = 'yes'
yourstr = 'no'
mystr += yourstr * 2
mystr = "yes"yourstr * 2 = "no"+"no"yes + no+noyesnono3. How many bytes of storage space would be required to store a 400-page novel in which each page contains 3500 characters if ASCII were used? How many bytes would be required if Unicode were used? Represent the answer in MB
Answer:
A total of 79.3mb will be needed
Which of the factors below is NOT a cause of online disinhibition?
O Anonymity
O Lack of nonverbal cues
Lack of tone of voice
Smartphones
Answer:
Lack of tone of voice
Explanation:
Remember, online disinhibition refers to the tendency of people to feel open in communication via the internet than on face to face conversations.
A lack of tone voice isn't categorized as a direct cause of online disinhibition because an individual can actually express himself using his tone of voice online. However, online disinhibition is caused by people's desire to be anonymous; their use of smartphones, and a lack of nonverbal cues.
Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives an error if the last item entered violates the heap condition. Use will enter at most 7 numbers. Example runs and comments (after // ) are below. Your program does not print any comments. An output similar to Exp-3 and Exp-4 is expected.
Exp-1:
Enter a number: 65
Enter a number: 56 // this is first item (root,[1]) in the heap three. it does not violate any other item. So, no // this is third [3] number, should be less than or equal to its root ([1])
Enter a number: 45 // this is fourth number, should be less than or equal to its root ([2])
Enter a number: 61 // this is fifth number, should be less than or equal to its root ([2]). It is not, 61 > 55. The 61 violated the heap.
Exp-2:
Enter a number: 100
Enter a number: 95 1/ 95 < 100, OK
Enter a number: 76 // 76 < 100, OK
Enter a number: 58 // 58 < 95, OK
Enter a number: 66 1/ 66 < 95, OK
Enter a number: 58 // 58 < 76, OK
Enter a number: 66 // 66 < 76, OK
Exp-3:
Enter a number: -15
Enter a number: -5
-5 violated the heap.
Exp-4:
Enter a number: 45
Enter a number: 0
Enter a number: 55
55 violated the heap.
Answer:
Following are the code to this question:
#include<iostream>//import header file
using namespace std;
int main()//defining main method
{
int ar[7];//defining 1_D array that stores value
int i,x=0,l1=1,j; //defining integer variable
for(i=0;i<7;i++)//defining for loop for input value from user ends
{
cout<<"Enter a Number: ";//print message
cin>>ar[i];//input value in array
if(l1<=2 && i>0)//using if block that checks the array values
{
x++;//increment the value of x by 1
}
if(l1>2 && i>0)//using if block that checks the array values
{
l1=l1-2;//using l1 variable that decrases the l1 value by 2
}
j=i-x;//using j variable that holds the index of the root of the subtree
if(i>0 && ar[j]>ar[i])// use if block that checks heap condition
{
l1++; //increment the value of l1 variable
}
if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule
{
cout<<ar[i]<<" "<<"Violate the heap";//print message with value
break;//using break keyword
}
}
return 0;
}
Output:
1)
Enter a Number: -15
Enter a Number: -5
-5 Violate the heap
2)
Enter a Number: 45
Enter a Number: 0
Enter a Number: 55
55 Violate the heap
Explanation:
In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.Gary frequently types his class assignment. His ring automatically types the letter O. What is Gary using when he types?
A.Keyboard shortcut
B.Home row
C.Muscle memory
D.Windows logo
While the Internet can be a great resource, the information is not always reliable, as anyone can post information. Select one: True False
Answer: True
Explanation: Because anyone can post something and it can be non reliable
What command would you use to place the cursor in row 10 and column 15 on the screen or in a terminal window
Answer:
tput cup 10 15
Explanation:
tput is a command for command line environments in Linux distributions. tput can be used to manipulate color, text color, move the cursor and generally make the command line environment alot more readable and appealing to humans. The tput cup 10 15 is used to move the cursor 10 rows down and 15 characters right in the terminal
Discuss the 21 st century competencies or skills required in the information society and 4 ways you can apply it during supported teaching on schools
Answer:
Life skills, learning skills, The literacy skills
Explanation:
There are different type of skills that are required in schools, educational societies, organizations. Now these students need more attention to focus on their carrier. There are different of skills such as:
There are another three skills like
The learning skillsThe literacy skillsThe life skills. CreativityCollaborationCommunicationMedia literacyLeadershipFlexibilityInitiativeSocial skillsProductivityCritical thinking.These are some skills that help students that keep up the lightening -pace in todays modern society. All skills are unique and used differently by students.
Why operating system is pivotal in teaching and learning
Answer:
Without it learning and teaching cannot take place.
Explanation:
It is worthy to note that an operating system enables a computer install and run (lunch) computer programs. In a teaching environment that involves the use of computers, sending lessons to students; would mean that they have software programs that can successfully open this lessons.
In summary, an operating system is indeed pivotal in teaching and learning.
Write a program that reads the input.txt file character by character and writes the content of the input file to output.txt with capitalize each word (it means upper case the first letter of a word and lowercase remaining letters of the word)
Answer:
def case_convertfile( file_name):
with open(" new_file","x") as file:
file.close( )
with open("file_name", "r") as txt_file:
while True:
word = txt_file.readline( )
word_split= word.split(" ")
for word in word_split:
upper_case = word.uppercase( )
file= open("new_file","w+")
file= open("new_file","a+")
file.write(upper_case)
txt_file.close( )
file.close( )
Explanation:
This python function would open an existing file with read privilege and a new file with write and append privileges read and capitalize the content of the old file and store it in the new file.
which programming paradigm do programmers follow to write code for event driven applications? a. object oriented programming. b. functional c. nonprocedural. d. procedural
Answer:
D) Procedural
Explanation:
Answer:
Object-Oriented Programming
Explanation:
If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. what is the smallest and largest address that can be represented
Answer:
The answer is "0 to 4294967295"
Explanation:
Given bit:
32 bits
Calculating smallest and largest bits:
In any processor, it works only on the 0 and 1 bit and it also stores 0 and 1 values. so, the smallest address in bit value is= 0 and the largest bit value can be defined as follows:
largest address value in bits:
[tex]\Longrightarrow 2^{32}-1\\\\\Longrightarrow 4294967296 -1\\\\\Longrightarrow 4294967295\\\\[/tex]
smallest address= 0
largest address = 4294967295
Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57, 60} becomes {53, 57, 60, 67}.
#include
#include
using namespace std;
int main() {
vector tempReadings(3);
int newValue = 0;
unsigned int i = 0;
tempReadings.at(0) = 53;
tempReadings.at(1) = 57;
tempReadings.at(2) = 60;
newValue = 67;
/* Your solution goes here */
for (i = 0; i < tempReadings.size(); ++i) {
cout << tempReadings.at(i) << " ";
}
cout << endl;
return 0;
}
2.Remove the last element from vector ticketList.
#include
#include
using namespace std;
int main() {
vector ticketList(3);
unsigned int i = 0;
ticketList.at(0) = 5;
ticketList.at(1) = 100;
ticketList.at(2) = 12;
/* Your solution goes here */
for (i = 0; i < ticketList.size(); ++i) {
cout << ticketList.at(i) << " ";
}
cout << endl;
return 0;
}
3. Assign the size of vector sensorReadings to currentSize.
#include
#include
using namespace std;
int main() {
vector sensorReadings(4);
int currentSize = 0;
sensorReadings.resize(10);
/* Your solution goes here */
cout << "Number of elements: " << currentSize << endl;
return 0;
}
4. Write a statement to print "Last mpg reading: " followed by the value of mpgTracker's last element. End with newline. Ex: If mpgTracker = {17, 19, 20}, print:
Last mpg reading: 20
#include
#include
using namespace std;
int main() {
vector mpgTracker(3);
mpgTracker.at(0) = 17;
mpgTracker.at(1) = 19;
mpgTracker.at(2) = 20;
/* Your solution goes here */
return 0;}
Answer:
Following are the code to this question:
In question 1:
tempReadings.push_back(newValue); //using array that store value in at 3 position
In question 2:
ticketList.pop_back(); //defining ticketList that uses the pop_back method to remove last insert value
In question 3:
currentSize = sensorReadings.size(); /defining currentSize variable holds the sensorReadings size value
In question 4:
cout<<"Last mpg reading: "<<mpgTracker.at(mpgTracker.size()-1)<<endl;
//using mpgTracker array with at method that prints last element value
Explanation:
please find the attachment of the questions output:
In the first question, it uses the push_back method, which assigns the value in the third position, that is "53, 57, 60, and 67 "In the second question, It uses the pop_back method, which removes the last element, that is "5 and 100"In the third question, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10".In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".Using data from interviews with ESCO executives conducted in late 2012, this study examines the market size, growth forecasts, and industry trends in the United States for the ESCO sector.
Thus, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10". In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".
There are numerous types of gateways that can operate at various protocol layer depths.
Application layer gateways (ALGs) are also frequently used, albeit most frequently a gateway refers to a device that translates the physical and link layers. It is best to avoid the latter because it complicates deployments and is a frequent source of error.
Thus, Using data from interviews with Gateway executives conducted in late 2012, this study examines the market size, growth Esco size and industry trends in the United States for the Gateway.
Learn more about Gateway, refer to the link:
https://brainly.com/question/30167838
#SPJ6
what are three ways to add receipts to quick books on line receipt capture?
Answer:
1) Forward the receipt by email to a special receipt capture email
2) You can scan, or take a picture of the receipt and upload it using the QuickBooks mobile app.
3) You can also drag and drop the image, or upload it into QuickBooks Online receipt center.
Explanation:
1) Th first process is simply done using the email address
2) On the app, tap the Menu bar with icon ≡. Next, tap Receipt snap., and then
tap on the Receipt Camera. Yo can then snap a photo of your receipt, and tap on 'Use this photo.' Tap on done.
3) This method can be done by simply navigating on the company's website.
In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?
Complete Question:
In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?
Group of answer choices
a. Denial of service
b. Web attack
c. Session hijacking
d. None of the above
Answer:
a. Denial of service
Explanation:
Denial of service (DOS) is a type of hacking in which the user (hacker) blocks access from legitimate users without actually accessing the attacked system.
It is a type of cyber attack in which the user (an attacker or hacker) makes a system or network inaccessible to the legitimate end users temporarily or indefinitely by flooding their system with unsolicited traffic and invalid authentication requests.
A denial of service is synonymous to a shop having a single entry point being crowded by a group of people seeking into entry into the shop, thereby preventing the legitimate customers (users) from exercising their franchise.
Under a DOS attack, the system or network gets stuck while trying to locate the invalid return address that sent the authentication requests, thus disrupting and closing the connection. Some examples of a denial of service attack are ping of death, smurf attack, email bomb, ping flood, etc.
Write an INSERT statement that adds this row to the Categories table:
CategoryName: Brass
Code the INSERT statement so SQL Server automatically generates the value for the CategoryID column.
Answer:
INSERT INTO categories (CategoryName)
VALUES ('Brass Code');
Explanation:
The SQL refers to the Structured Query Language in which the data is to be designed and maintained that occurred in the relational database management system i.e it is to be used for maintaining and query the database
Now the INSERT statement should be written as follows
INSERT INTO categories (CategoryName)
VALUES ('Brass Code');
what are 3 important reasons to reconcile bank and credit card accounts at set dates?
Answer:
To verify transactions have the correct date assigned to them.
To verify that an account balance is within its credit limit.
To verify that all transactions have been recorded for the period.
Explanation:
In which situation would it be appropriate to update the motherboard drivers to fix a problem with video?
Answer:
you may need to do this if you need to play video game that may need you to update drivers
it would be appropriate to update the motherboard drivers to fix a problem with video while playing video game.
What is motherboard?A motherboard is called as the main printed circuit board (PCB) in a computer or laptop. The motherboard is the backbone of processing in PCs.
All components and external peripherals connect through the motherboard.
Thus, the situation in which it is needed to update the motherboard drivers to fix a problem is while playing video game.
Learn more about motherboard.
https://brainly.com/question/15058737
#SPJ2