A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN.
Which of the following should be placed on the router interface to accomplish this goal?
A. Static routes for all port 80 traffic
B. DHCP reservations for all /24 subnets
C. ACL for ports 20 and 21
D. MAC filtering using wildcards

Answers

Answer 1

Answer:

The technician will want to add ACL for ports 20 and 21

Explanation:

The FTP protocol by default will attempt to use 21 for TCP access and 20 for data access.  By enabling an Access Control List (ACL) on ports 20 and 21, the technician can prevent FTP traffic from leaving the network on the default ports.

Cheers.


Related Questions

What is industry 4.0 -automation revolution-, what is your opinion about the direction this revolution is taking the industry in, and discuss the fate of unskilled and semi-skilled workers affected by industry 4.0.

Answers

Answer:

Find the explanation below.

Explanation:

1. Industry 4.0 -automation revolution is a term first used in Germany in 2011 to describe the fourth generation of the industrial revolution. It is the incorporation of digitalized procedures that use smart technology that can work in real-time to industrial production. This means that the machines used in production can independently interact between themselves to accomplish tasks that would otherwise have needed human involvement.

2. My opinion regarding this industrial revolution is that it is a welcome development for businesses because it will help them execute projects at faster rates and limit some working expenses.

3. Unskilled and Semi-skilled workers will be badly affected by this revolution because tasks ordinarily performed by them would be mostly taken over by these machines. This means that companies would most likely lay off these workers whose jobs would now be performed by machines. Job regulation agencies would do well to seek ways to intervene for this group of workers. They may also have to improve their skills if they want to remain relevant to their jobs.

The revolution, however, would be favorable for high-skilled workers because they would be needed to perform jobs such as the maintenance and programming of these machines.

Use the following cell phone airport data speeds​ (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.6 0.7 0.7 0.7 0.8 0.8

Answers

Answer:

[tex]P_{10} =0.1[/tex]

Explanation:

Given

[tex]0.1, 0.1, 0.3, 0.3, 0.3, 0.4, 0.4, 0.4, 0.6, 0.7, 0.7, 0.7, 0.8, 0.8[/tex]

Required

Determine [tex]P_{10}[/tex]

[tex]P_{10}[/tex] implies 10th percentile and this is calculated as thus

[tex]P_{10} = \frac{10(n+1)}{100}[/tex]

Where n is the number of data; n = 14

[tex]P_{10} = \frac{10(n+1)}{100}[/tex]

Substitute 14 for n

[tex]P_{10} = \frac{10(14+1)}{100}[/tex]

[tex]P_{10} = \frac{10(15)}{100}[/tex]

Open the bracket

[tex]P_{10} = \frac{10 * 15}{100}[/tex]

[tex]P_{10} = \frac{150}{100}[/tex]

[tex]P_{10} = 1.5th\ item[/tex]

This means that the 1.5th item is [tex]P_{10}[/tex]

And this falls between the 1st and 2nd item and is calculated as thus;

[tex]P_{10} = 1.5th\ item[/tex]

Express 1.5 as 1 + 0.5

[tex]P_{10} = (1 +0.5)\ th\ item[/tex]

[tex]P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item[/tex]

From the given data; [tex]1st\ item = 0.1[/tex] and [tex]2nd\ item = 0.1[/tex]

[tex]P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item[/tex] becomes

[tex]P_{10} =0.1 +0.5(0.1 - 0.1)[/tex]

[tex]P_{10} =0.1 +0.5(0)[/tex]

[tex]P_{10} =0.1 +0[/tex]

[tex]P_{10} =0.1[/tex]

A systems analyst attended a week-long workshop on Agile software development. When she returned to her job, she told her boss that agile practices were not worth the time to learn and use on the job. Her view was that it was too academic and idealistic to be useful. Do you agree or disagree?Defend your position.

Answers

Answer:

The answer is "disagree"

Explanation:

The system analyst is responsible, who uses research and methods of solving industrial problems with IT. He or she may act as representatives of change that identify, that process improvements needed design systems for such improvements, or inspire us to use systems.

Analysts testing and diagnosing issues in operating systems for QA applications and the programmer analyst design and write custom software, that satisfy the requirements of their employers or customers. For the system analysis, the analyst uses all types of techniques, which may be old's, that's why we disagree with the analyst.

A brand of shame .. from infancy " is a brand on Jocasta​

Answers

Answer: DIDN'T UNDERSTAND

Assume userName equals "Tom" and userAge equals 22. What is displayed in a dialog box when the following statement is executed? alert(userAge + " \nis " + userName + "'s age.");

Answers

Answer:

22

is Tom's age.

Explanation:

Since userAge is initialized as 22, 22 will be displayed in a line. Then, since there is a "\n" which means go the new line, the program will display in the new line. is will be displayed. Since userName is initialized as Tom, Tom will be displayed. Then 's age. will be displayed in the same line.

There is a colony of 8 cells arranged in a straight line where each day every cell competes with its adjacent cells(neighbour). Each day, for each cell, if its neighbours are both active or both inactive, the cell becomes inactive the next day,. otherwise itbecomes active the next day.
Assumptions: The two cells on the ends have single adjacent cell, so the other adjacent cell can be assumsed to be always inactive. Even after updating the cell state. consider its pervious state for updating the state of other cells. Update the cell informationof allcells simultaneously.
Write a fuction cellCompete which takes takes one 8 element array of integers cells representing the current state of 8 cells and one integer days representing te number of days to simulate. An integer value of 1 represents an active cell and value of 0 represents an inactive cell.
Program:
int* cellCompete(int* cells,int days)
{
//write your code here
}
//function signature ends
Test Case 1:
INPUT:
[1,0,0,0,0,1,0,0],1
EXPECTED RETURN VALUE:
[0,1,0,0,1,0,1,0]
Test Case 2:
INPUT:
[1,1,1,0,1,1,1,1,],2
EXPECTED RETURN VALUE:
[0,0,0,0,0,1,1,0]
This is the problem statement given above for the problem. The code which I have written for this problem is given below. But the output is coming same as the input.
#include
using namespace std;
// signature function to solve the problem
int *cells(int *cells,int days)
{ int previous=0;
for(int i=0;i {
if(i==0)
{
if(cells[i+1]==0)
{
previous=cells[i];
cells[i]=0;
}
else
{
cells[i]=0;
}
if(i==days-1)
{
if(cells[days-2]==0)
{
previous=cells[days-1];
cells[days-1]=0;
}
else
{
cells[days-1]=1;
}
}
if(previous==cells[i+1])
{
previous=cells[i];
cells[i]=0;
}

else
{
previous=cells[i];
cells[i]=1;
}
}
}
return cells;
}
int main()
{
int array[]={1,0,0,0,0,1,0,0};
int *result=cells(array,8);
for(int i=0;i<8;i++)
cout< }
I am not able to get the error and I think my logic is wrong. Can we apply dynamic programming here If we can then how?

Answers

Answer:

I am writing a C++ program using loops instead of nested if statements.

#include <iostream> // to use input output functions

using namespace std; // to identify  objects like cin cout

void cells(int cells[],int days){ /* function that takes takes one array of integers cells, one integer days representing the number of days to simulate. */

int pos ,num=0; //declares variables pos for position of two adjacent cells and num to iterate for each day

int result[9]; //the updated output array

while (num< days)   { //this loop keeps executing till the value of num is less than the value of number of days

num++;

for(pos=1;pos<9;pos++)   //this loop has a pos variable that works like an index and moves through the cell array

    result[pos]=(cells[pos-1])^ (cells[pos+1]); //updated cell state determined by the previous and next cells (adjacent cells) by bitwise XOR operations

     for(pos=1;pos<9;pos++) //iterates through the array

         cells[pos]=result[pos];    } //the updated cells state is assigned to the cell array simultaneously

   for(pos=1;pos<9;pos++) //iterates through the array and prints the resultant array that contains the updated active and inactive cells values

        cout << result[pos]; }

int main() { //start of the main function body

int j,day;

int output[9];

*/the two cells on the ends (first and last positions of array) have single adjacent cell, so the other adjacent cell can be assumed to be always inactive i.e. 0 */

output[0]=output[9]=0;

for(j=1;j<9;j++) //takes the input array from user

cin >> output[j];

cin >> day;

cells(output,day); } //calls the function cells to print the array with active and inactive cells states.

Explanation:

The program is well explained in the comments mentioned with every statement of the program. I will explain with the help of example:

Suppose the user enters the array = [1,0,0,0,0,1,0,0] and days=1

The while loop checks if the value of num is less than that of days. Here num is 0 and days is 1 So this means that the body of while loop will execute.

In the body of while loop the value of num is incremented by 1. The first loop initializes a variable pos for position of adjacent cells. The statement is a recursive statement result[pos]=(cells[pos-1])^ (cells[pos+1]) that uses previous state for updating the state of other cells. The “^” is the symbol used for bitwise exclusive operator. In bitwise XOR operations the two numbers are taken as operands and XOR is performed on every bit of two numbers. The result of XOR is 1 if the two bits are not same otherwise 0. For example XOR of 1^0 and 0^1 is 1 and the XOR of 0^0 and 1^1 is 0. The second for loop update the cell information of all cells simultaneously. The last loop prints the updated cells states.

The main function takes the input array element from user and the value for the days and calls the cells function to compute the print the active and inactive cells state information.

The screenshot of the program along with its output are attached.

Which tab group is used to modify the background of a chart that is contained in a PowerPoint presentation?
Chart styles
Data
Type
Chart layouts

Answers

Answer:

Chart styles

Explanation:

In PowerPoint, once you have inserted a chart (e.g a bar or pie chart), the format tab would be enabled so that you can format your chart to your taste. In this format tab, there are a bunch of tab groups such as:

(i) Chart styles: This allows you to typically change the component background colors of your chart.

(ii) Data: This contains sub-tabs that allow you to edit and select the data on your chart.

(iii) Type: This contains sub-tabs such as "Change Chart Type" which will allow you to change the type of the chart. For example if you were using a pie chart and you want to change it to a bar chart or any other chart, you can do that here.

(iv) Chart Layouts: This allows to change or modify how the selected chart is laid out.

1. Railroad tracks present no problems for a motorcyclist.
A. O TRUE
B. O FALSE

2. Which of the following is considered to be a vulnerable road user?
A. Bicyclists
B. Motorcyclists
C. Pedestrians
D. all of the above

Answers

Answer: 1 is A

2 is D

Explanation:

A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag, and word position for the 20-bit address 94EA616 using the direct mapping method.

Answers

Answer:

Given address = 94EA6[tex]_{16}[/tex]

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

Explanation:

using the direct mapping method

Number of lines = 512

block size = 8 words

word offset = [tex]log ^{8} _{2}[/tex]  = 3 bit

index bit = [tex]log^{512}_{2}[/tex]  = 9 bit

Tag = 20 - ( index bit + word offset ) = 20 - ( 3+9) = 8 bit

Given address = 94EA6[tex]_{16}[/tex]

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

How many times does the following loop execute? double d; Random generator = new Random(); double x = generator.nextDouble() * 100; do { d = Math.sqrt(x) * Math.sqrt(x) - x; System.out.println(d); x = generator.nextDouble() * 10001; } while (d != 0); exactly once exactly twice can't be determined always infinite loop

Answers

Answer:

The number of execution can't always be determines

Explanation:

The following points should be noted

Variable d relies on variable x (both of double data type) for its value

d is calculated as

[tex]d = \sqrt{x}^2 - x[/tex]

Mere looking at the above expression, the value of d should be 0;

However, it doesn't work that way.

The variable x can assume two categories of values

Small Floating Point ValuesLarge Floating Point Values

The range of the above values depend on the system running  the application;

When variable x assumes a small value,

[tex]d = \sqrt{x}^2 - x[/tex] will definitely result in 0 and the loop will terminate immediately because [tex]\sqrt{x}^2 = x[/tex]

When variable x assumes a large value,

[tex]d = \sqrt{x}^2 - x[/tex] will not result in 0  because their will be [tex]\sqrt{x}^2 \neq x[/tex]

The reason for this that, the compiler will approximate the value of [tex]\sqrt{x}^2[/tex] and this approximation will not be equal to [tex]x[/tex]

Hence, the loop will be executed again.

Since, the range of values variable x can assume can not be predetermined, then we can conclude that the number of times the loop will be executed can't be determined.

A Fast Critter moves twice as fast as a regular critter. When asked to move by n steps, it actually moves by 2 * n steps. Implement a Fast Critter subclass of Critter whose move method behaves as described.

Answers

Answer and Explanation:

The code:

FastCritter.java

Public class FastCritter

{

public static void main(string[]args)

{

Critter DoubleFast = new FastCritter();

DoubleFast.move(10);

System.out.println(DoubleFast.getHistory());

system.out.println(" the critter object will move to 20]");

}

}

in the above, the critter class is assumed to have been defined and the the object DoubleFast which moves twice the distance of the Critter was achieved by using the move method which was defined in the critter class. The move method takes the position of the Critter and adds the steps given to its parameter to the object's move thus getting twice the distance. The get history is assumed to get the history of positions and moves made by the object in an array as defined in the class

Write a method named removeDuplicates that accepts a string parameter and returns a new string with all consecutive occurrences of the same character in the string replaced by a single occurrence of that character. For example, the call of removeDuplicates("bookkeeeeeper") should return "bokeper" .

Answers

Answer:

//Method definition

//Method receives a String argument and returns a String value

public static String removeDuplicates(String str){

       //Create a new string to hold the unique characters

       String newString = "";

       

       //Create a loop to cycle through each of the characters in the

       //original string.

       for(int i=0; i<str.length(); i++){

           // For each of the cycles, using the indexOf() method,

           // check if the character at that position

           // already exists in the new string.

           if(newString.indexOf(str.charAt(i)) == -1){

               //if it does not exist, add it to the new string

               newString += str.charAt(i);

           }  //End of if statement

       }   //End of for statement

       

       return newString;   // return the new string

   }  //End of method definition

Sample Output:

removeDuplicates("bookkeeeeeper") => "bokeper"

Explanation:

The above code has been written in Java. It contains comments explaining every line of the code. Please go through the comments.

The actual lines of codes are written in bold-face to distinguish them from comments. The program has been re-written without comments as follows:

public static String removeDuplicates(String str){

       String newString = "";

       

       for(int i=0; i<str.length(); i++){

           if(newString.indexOf(str.charAt(i)) == -1){

               newString += str.charAt(i);

           }

       }

       

       return newString;

   }

From the sample output, when tested in a main application, a call to removeDuplicates("bookkeeeeeper") would return "bokeper"

Lily is in her first year of undergraduate coursework and has not yet declared a major. She has attended a lot of career fairs and undergraduate major "open house" events to investigate her options. Marcia's theory of identity status suggests that the dimension Lily is most concerned with is the_____of 1 dimension.

Answers

Answer:

exploration

Explanation:

According to Marcia's theory of identity, the status suggests that the dimension Lily is most concerned with is the exploration dimension.

James E. Marcia who came up with the Marcia's theory of identity is a clinical and developmental psychologist. He also once taught at Simon Fraser University which is located in British Columbia, Canada and also in the State University of New York at Buffalo in Upstate, New York City.

James E. Marcia is also very much involved in clinical private practice, community consultation, clinical psychology supervision, and also in international clinical-developmental research and teaching.

Similar to Wi-Fi, ____ is designed to provide internet access to fixed locations (sometimes called hot zones), but the coverage is significantly larger

Answers

Answer:

WiMAX.

Explanation:

WiMAX is an acronym for Worldwide Interoperability for Microwave Access, it is a wireless communications which is primarily based on the IEEE 802.16 standards for creating Metropolitan Area Network (MAN) for the internet users.

Similar to Wi-Fi, WiMAX is designed to provide internet access to fixed locations (sometimes called hot zones), but the coverage is significantly larger.

WiMAX is capable of covering large metropolitan distance of several kilometers while Wi-Fi covers just a local (short) area measured in meters.

Generally, WiMAX was invented by the WiMAX forum and is a telecommunications standard protocol that provides fixed and fully mobile internet access services over a wide range.

#Imagine you're writing some code for an exercise tracker. #The tracker measures heart rate, and should display the #average heart rate from an exercise session. # #However, the tracker doesn't automatically know when the #exercise session began. It assumes the session starts the #first time it sees a heart rate of 100 or more, and ends #the first time it sees one under 100. # #Write a function called average_heart_rate. #average_heart_rate should have one parameter, a list of #integers. These integers represent heart rate measurements #taken 30 seconds apart. average_heart_rate should return #the average of all heart rates between the first 100+ #heart rate and the last one. Return this as an integer #(use floor division when calculating the average). # #You may assume that the list will only cross the 100 beats #per minute threshold once: once it goes above 100 and below #again, it will not go back above.

Answers

Answer:

Following are the code to this question:

def average_heart_rate(beats):#defining a method average_heart_rate that accepts list beats  

   total=0 #defining integer variable total,that adds list values  

   count_list=0#defining a count_list integer variable, that counts list numbers  

   for i in beats:#defining for loop to add list values  

       if i>= 100:#defining if block to check value is greater then 100

           total += i#add list values

           count_list += 1# count list number  

   return total//count_list #return average_heart_rate value  

beats=[72,77,79,95,102,105,112,115,120,121,121,125, 125, 123, 119, 115, 105, 101, 96, 92, 90, 85]#defining a list

print("The average heart rate value:",average_heart_rate(beats)) # call the mnethod by passing value

Output:

The average heart rate value: 114

Explanation:

In the given question some data is missing so, program description can be defined as follows:

In the given python code, the method "average_heart_rate" defined that accepts list "beats" as the parameter, inside the method two-variable "total and count_list " is defined that holds a value that is 0.In the next line, a for loop is that uses the list and if block is defined that checks list value is greater then 100. Inside the loop, it calculates the addition and its count value and stores its values in total and count_list  variable, and returns its average value.

A byte addressable direct-mapped cache has 1024 blocks/lines, with each block having eight 32-bit words. How many bits are required for block offset, assuming a 32-bit address

Answers

Answer and Explanation:

"The inquiry as presented is not necessarily responsible. A word has been states as 32-bit. We need to ask if the frame is "byte-addressable" (From this we can access to get an 8-bit piece of information) or "text-addressable" (the smallest open lump is 32-bit) or maybe "half-word-addressable" (the tiny bundle of information it could reach to 16-bit).

To understand what the smallest request bit of a position is to let anyone know, you have to remember this.

You operate from base up at that stage. We will agree with the byte-addressable structure. Every reserved square at a certain point contains 8 words * (4 bytes/word) = 32 = 25 bytes, so the counterbalance seems to be 5 bits.

The history in a direct-mapped stored is the squares in reserves (12 bits for this position due to 212 = 4096). at a certain point, as you have seen, the tag is also one of the bits left behind.

As the reserve becomes increasingly cooperative. And a similar size remains. These are lesser bits on the list and more bits on the mark.'

Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response (ICMP echo reply) from the internal 192.168.12.11 Windows server.

Answers

Answer:

The file and printer sharing (Echo Request - ICMPv4-In) rule option should be listed for all profile.

Explanation:

The main reason why it is not compulsory or obligatory to design an inbound rule on the internal 192.168.12.10 Windows server in other to be able to accept the response (ICMP echo reply) generated from the internal 192.168.12.11 Windows server is that the file and printer sharing (Echo Request - ICMPv4-In) rule option or alternative needed to be listed for all profile.

Inbound rules filter or sieve traffic advancing from the network to the local computer based on the filtering conditions set out in the rule.

Explain ways that computer-related errors are associated with the people using those computers. Contrast that with errors made by the computer systems directly.

Answers

Answer and Explanation:

Computer related errors associated with people that use these computers are errors that are made by human beings in instructing(or programming) the computer to do or complete a certain task. This could involve such things as moving paper based data to the computer(electronic data) where the human could enter incorrect data or inconsistent programs or code.

Computer related errors which directly have to do with the computer consist of error thrown by the system as a result of ineffective code or software related issues or faulty hardware. In either case all computer related errors are inherently caused by humans since a computer would only take instruction given to it.

Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on the environment. HLN can handle large amounts of traffic more efficiently because __________.

Answers

Answer:

The networks are intelligent and send packets at the highest speed and most efficiently.

Explanation:

Alcatel-Lucent was founded in 1919, it was a French global telecommunications equipment manufacturing company with its headquarter in Paris, France. Alcatel-Lucent provide services such as telecommunications and hybrid networking solutions deployed both in the cloud and on properties.

Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on the environment. This high leverage network can handle large amounts of traffic more efficiently because the networks are intelligent and send packets at the highest speed and most efficiently. HLN are intelligent such that it delivers increased bandwidth using fewer devices and energy.

Generally, when the High Leverage Network (HLN) is successfully implemented, it helps telecommunications companies to improve their maintenance costs, operational efficiency, enhance network performance and capacity to meet the bandwidth demands of their end users.

A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in units of 40 msec.

Required:
a. What is the chance of success on the first attempt?
b. What is the probability of exactly k collisions and then a success?
c. What is the expected number of transmission attempts needed?

Answers

Answer:

The answer is below

Explanation:

Given that:

Frame transmission time (X) = 40 ms

Requests = 50 requests/sec, Therefore the arrival rate for frame (G) = 50 request * 40 ms = 2 request

a) Probability that there is success on the first attempt = [tex]e^{-G}G^k[/tex] but k = 0, therefore Probability that there is success on the first attempt = [tex]e^{-G}=e^{-2}=0.135[/tex]

b) probability of exactly k collisions and then a success = P(collisions in k attempts) × P(success in k+1 attempt)

P(collisions in k attempts) = [1-Probability that there is success on the first attempt]^k = [tex][1-e^{-G}]^k=[1-0.135]^k=0.865^k[/tex]

P(success in k+1 attempt) = [tex]e^{-G}=e^{-2}=0.135[/tex]

Probability of exactly k collisions and then a success = [tex]0.865^k0.135[/tex]

c) Expected number of transmission attempts needed = probability of success in k transmission = [tex]e^{G}=e^{2}=7.389[/tex]

What is the value of the variable named myNum after the statements that follow are executed? var myNum = 14; var yourNum = 4; myNum++; yourNum-- myNum = myNum * yourNum;

Answers

Answer:

45

Explanation:

Initially, myNum is equal to 14 and yourNum is equal to 4

Then, myNum is incremented by 1 and becomes 15

Also, yourNum is decremented by 1 and becomes 3

Finally, myNum is set to myNum x yourNum, 15 x 3 = 45

Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available. baseline infrastructure applications network

Answers

Answer:

Network.

Explanation:

Availability is an essential part of network security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available.

Availability in computer technology ensures that systems, applications, network connectivity and data are freely available to all authorized users when they need them to perform their daily routines or tasks. In order to make network systems available regularly, it is very essential and important to ensure that all software and hardware technical conflicts are always resolved as well as regular maintenance of the systems.

A network administrator can monitor the network traffics and unusual or unknown activities on the network through the user behavior analysis and data gathered from the application analysis to ensure the effective and efficient availability of systems.

You are a project manager for Laredo Pioneer's Traveling Rodeo Show. You're heading up a project to promote a new line of souvenirs to be sold at the shows. You are getting ready to write the project management plan and know you need to consider elements such as policies, rules, systems, relationships, and norms in the organization. Which of the following is not true? A These describe the authority level of workers, fair payment practices, communication channels, and the like. B This describes organizational governance framework. C This describes management elements. D This is part of the EEF input to this process.

Answers

Answer:

A. These describe the authority level of workers, fair payment practices, communication channels, and the like.  

Explanation:

As seen in the question above, you have been asked to write the project management plan and know that you need to consider elements such as policies, rules, systems, relationships and standards in the organization. These elements are part of EEF's entry into this process, in addition they are fundamental and indispensable for the description not only of the organizational governance structure, but also describe the management elements that will be adopted and used.

However, there is no way to use them to describe the level of authority of workers, fair payment practices, communication channels and the like, as this is not the function of this.

Use the loop invariant (I) to show that the code below correctly computes the product of all elements in an array A of n integers for any n ≥ 1. First use induction to show that (I) is indeed a loop invariant, and then draw conclusions for the termination of the while loop.

Algorithm 1 computeProduct(int[ ] A, int n)
p = a[0]
i = 0
while i < n − 1 do
//(I) p = a[0] · a[1] · · · a[i] (Loop Invariant)
i + +
p = p · a[i]
end while
return p

Answers

Answer:

Given Loop Variant P = a[0], a[1] ... a[i]

It is product of n terms in array

Explanation:

The Basic Step: i = 0, loop invariant p=a[0], it is true because of 'p' initialized as a[0].

Induction Step: Assume that for i = n - 3, loop invariant p is product of a[0], a[1], a[2] .... a[n - 3].

So, after that multiply a[n - 2] with p, i.e P = a[0], a[1], a[2] .... a[n - 3].a[n - 2].

After execution of while loop, loop variant p becomes: P = a[0], a[1], a[2] .... a[n -3].a[n -2].

for the case i = n-2, invariant p is product of a[0], a[1], a[2] .... a[n-3].a[n-2]. It is the product of (n-1) terms. In while loop, incrementing the value of i, so i=n-1

And multiply a[n-1] with p, i.e P = a[0].a[1].a[2].... a[n-2].

a[n-1]. i.e. P=P.a[n-1]

By the assumption for i=n-3 loop invariant is true, therefore for i=n-2 also it is true.

By induction method proved that for all n > = 1 Code will return product of n array elements.

While loop check the condition i < n - 1. therefore the conditional statement is n - i > 1

If i = n , n - i = 0 , it will violate condition of while loop, so, the while loop will terminate at i = n at this time loop invariant P = a[0].a[1].a[2]....a[n-2].a[n-1]

A developer writes a SOQL query to find child records for a specific parent. How many levels can be returned in a single query?

Answers

Answer:

One.

Explanation:

In this case, when a developer writes a SOQL query in order to find  to find child records for a specific parent, one search will return only one child. One level down i.e., from parent to child, or five levels up i.e., from child to parent. Note that SOQL statements will not return relationships that are greater than one level apart from the root entity object.

Teachers in most school districts are paid on a schedule that provides a salary based on their number of years of teaching experience. For example, a beginning teacher in the Lexington School District might be paid $30,000 the first year. For each year of experience after this first year, up to 10 years, the teacher receives a 2% increase over the preceding value. Write a program that displays a salary schedule, in tabular format, for teachers in a school district. The inputs are:

Answers

Answer:

Here is the python code:

StartingSal = int(input("Enter the starting salary: "))

AnnualIncrease = (int(input("Enter the annual % increase: ")) / 100)

Years = int(input("Enter the number of years: "))

for count in range(1,Years+1):  

  print("Year ", count, " Salary: ", StartingSal*((1+AnnualIncrease)**(count-1)))

  

Explanation:

This program prompts the user to enter starting salary, percentage increase in salary per year and number of years.

The for loop has range function which is used to specify how many times the salaries are going to be calculated for the number of years entered. It starts from 1 and ends after Years+1 means one value more than the year to display 10 too when user inputs 10 days.

The year and corresponding salary is displayed in output. At every iteration the starting salary is multiplied by annual percentage increase input by user. Here count is used to count the number of salaries per year, count-1 means it will start from 30000.

Some systems analysts maintain that source documents are unnecessary. They say that an input can be entered directly into the system, without wasting time in an intermediate step.
Do you agree? Can you think of any situations where source documents are essential?

Answers

Answer:

The summary including its given subject is mentioned in the portion here below explanatory.

Explanation:

No, I disagree with the argument made by 'system analyst' whether it is needless to preserve source records, rather, therefore, the details provided input would be fed immediately into the machine. Different source document possibilities can be considered may play a significant role in accessing data.Assumed a person experiences a problem when collecting and analyzing data that has no complete access or that individual is not happy with the system or that may want comprehensive data search. However, a need arises to keep data both sequentially and fed further into the desktop system that would help us through tracking purposes.Even with all the documentation that has been held is essentially for the user to do anything efficiently and conveniently without even any issues and 'device analyst' would guarantee that it has been applied in a very well-defined way.

You turn on your Windows computer and see the system display POST messages. Then the screen goes blank with no text. Which of the following items could be the source of the problem?
1. The video card
2. The monitor
3. Windows
4. Microsoft word software installed on the system.

Answers

Answer:1)The video card
***HOPE THIS HELP YOU***

Oops, we made a mistake: we created a key "short" and gave it the value "tall", but we wanted to give it the value "long" instead. Write the line of code that will change the value associated with the key "short" to "long". Be consistent in whether you use single or double quotes to declare your strings: our autograder assumes you'll be consistent.

Answers

Answer:

Using java

//assuming that hashmap object name is ChangeMap

ChangeMap. replace("short", "long");

System.out.println("New HashMap: "

+ ChangeMap.toString());

Explanation:

From the above we have used the replace method to replace the value of the "short" key in the hashtable with "long" instead of the previous value "tall". We have used the printed the hashtable to the console using println and the ".toString()" method that we added to the function's parameter.

in an agile team who is responsible for tracking the tasks

Answers

Answer:

All team members

Explanation:

In respect of the question, the or those responsible for tracking the tasks in an agile team comprises of all the team members.

Agile in relation to task or project management, can be refer to an act of of division of project or breaking down of project or tasks into smaller unit. In my opinion, these is carried out so that all team members can be duly involved in the tasks or project.

Other Questions
PLEASE ASAP There are 20 players on a soccer team. From them, a captain and an alternate captain have to be chosen. How many possibilities are there? Which of the following statements is true? a. Predicate methods typically test a condition and modify the object on which they're called. b. Predicate methods typically do not test a condition and do not modify the object on which they're called. c. Predicate methods typically test a condition and do not modify the object on which they're called. d. Predicate methods typically do not test a condition and modify the object on which they're called. What is supplications in islam PLEASE HELP!What is the length of the shortest altitude in a triangle, if the lengths of the sides are 15 cm, 17 cm, 8 cm. NO DECIMALS Which equation represents a line that is perpendicular to line FG? A. y=-1/2x+5 B. y=1/2x+2 C. y=-2x-3 D. y=2x-6 Read the text and the question, and then choose the option that best answers the questionSoy Marta y no estoy bien me duelen el estmago y la cabeza. Para el estmago, el doctor quiere que yo no coma pasteles o galletas y tengo que beber ms aguaWhat might Marta have?Ahead injuryBreathing issuesStomach problemsWounds in her mouth Describe the meaning of the different symbols and abbreviations found on the drawings/documents that they use (such as BS8888, surface finish to be achieved, linear and geometric tolerances, electronic components, weld symbols and profiles, pressure and flow characteristics, torque values, imperial and metric systems of measurement, tolerancing and fixed reference points) Choose the items below that correctly describe some aspect of Joseph Campbells heros journey. Select all that apply. The hero must leave his common world. All forces in the new region are evil. The hero has no help on her journey. The new region is exciting, and, yet, wonderfully safe. The hero returns with power that she can give to others. The hero must venture forth. The hero encounters powers and overcomes them. Explaining Graphs of FunctionsExplain how to use a graph of the function f(x) tofind f(3)h Suppose, in an experiment to determine the amount of sodium hypochlorite in bleach, you titrated a 26.34 mL sample of 0.0100 M K I O 3 with a solution of N a 2 S 2 O 3 of unknown concentration. The endpoint was observed to occur at 15.51 mL . How many moles of K I O 3 were titrated The formula for the volume of a pyramid is =13V=13Bh, where B is the area of the base and h is the height. Rearrange the formula to solve for the height (h).Select one:a. =3h=3VB b. =3h=B3V c. =3h=V3B d. =3 These satellites circle the Earth in a north-to-south direction, and obtain images of the entire Earth twice a day by drifting about 15 degrees westward over the Earth's surface during each orbit. The graph for the equation y = x minus 4 is shown below. On a coordinate plane, a line goes through (0, negative 4) and (4, 0). Which equation, when graphed with the given equation, will form a system that has an infinite number of solutions? y minus x = negative 4 y minus x = negative 2 y minus 4 = x y + 4 x = 1 Brainliest reward griffin ordered a pair of sneakers online. he had 16 credit that he applied toward the purchase, and then he used a credit card to pay for the rest of the cost. if the the shoes cost 80, then how much did griffin charge to his credit card when he bought the sneakers? PLEASE ANSWER I BEG Y'ALL A technician has a clients laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooting theory that the technician will perform to resolve the laptops issue? A. Document finding, actions, and outcomes B. Identify the problem C. Establish a theory D. Establish a plan of action to resolve the problem help please. Find the length of x. Answer Quick!!!!!!!!!!!!!!!!!!!(What idea did George Washington introduce as president of the United States?OA The US president's first two years should be the most productive.OB. US presidents should play an important role in maintaining world peace.OCUS presidents should not belong to any political party.OD. US presidents should run for election for only two terms. simplify[tex] {a}^{ - 2} {b}^{3} [/tex] Scenario : Mr. and Mrs. Lahud have come to the clinic to initiate family therapy. The whole family is under stress because their youngest daughter, 10-year-old Elia, loses her temper "almost constantly," the parents say. In fact, she seems to be always seething under the surface, even when she's laughing and seeming to have a good time, just waiting to explode. She argues about the simplest thingsyou can try to give her choices, like, instead of saying, 'time to get dressed for school,' you might say, 'Elia, do you want your green sweater or your yellow one today?' She just starts screaming and says, 'You can't tell me to get dressed!' And she's ten." Jaival, their new therapist, asks, "Can you tell me how often, on average, you'd say Elia loses her temper? Can you make an average guess at, say, how many times a week?" Elia's mother says, "It would be easier to estimate how many times per day." Mr. Lahud nods, "Yes, I'd say about 18 times a day, at least once for every hour that she's awake." And that's on a daily basis?" says Jaival. Both parents nod without hesitation. "How long has it been like this?" "Well," Mrs. Lahud tilts her head. "She was always kind of a fussy baby. She's never slept much and has just kind of always thrown tantrums and never stopped." Jaival takes some notes and then asks, "Is there anything else about her behavior that fits a pattern that's fairly longstanding?" Mr. Lahud sighs. "It just feels like she wants a big fight, then blames everyone else for something that she startedeven when it's clear no one else is even participating in the fight. It's getting to be really hard on the other two kids because she just never lets up from the time she wakes up until late into the night; she tries to annoy us and them pretty equally, and now they're having trouble with her at school too. She's not getting along with other kids there either." "We've tried positive reinforcement, like a sticker chart for good behavior" "but after a while," Mrs. Lahud adds, "we just took it down. The other two kids would have rows of stickers, but she defies even the simplest of rules, so she'd have maybe 1 or 2 stars to their 8 or 10. It started to feel like the sticker chart was just making her feel worse about herself. Her teachers say the same thing." Mrs. Lahud's eyes fill with tears. "We don't know what to do any more. I feel sorry for her. We can't help feel that this is not the 'real' her, if you know what I mean." She looks at her husband, who nods and squeezes her hand. "She does some pretty mean, spiteful things to 'get even with everyone.'" Mrs. Lahud continues, "but then the other night, she was quiet and thoughtful when I cuddled with her at bedtime, and while we were alone, she whispered, 'Mom, why does it have to be so hard to be good? It's really hard.'" She breaks down and cries, and her husband hugs her. 1. Jaival meets with Elia subsequently, and though she is very charming and intelligent at first, she does make an effort to annoy him, but he doesn't take the bait. The next day, with her parents' permission, the school counselor also calls Jaival, asking if she can share some concerns of her own, which confirm for Jaival that Elia's parents have pretty accurately described her behavior. Subsequent testing does not reveal a psychotic or mood disorder, and Jaival initially makes a tentative diagnosis of "oppositional defiant disorder." Do you agree or disagree? What criteria would you cite to support your opinion? 2. Over a period of years, Elia continues to see therapists; and as adolescent hormones are added into the mix, times get a little rougher for her and her family. What kinds of comorbidity might she be at risk for? please help with this