Describe in detail how TCP packets flow in the case of TCP handoff, along with the information on source and destination addresses in the various headers.

Answers

Answer 1

Answer:

Following are the answer to this question:

Explanation:

There will be several ways to provide it, although it is simpler to let another front side Will work out a three-way handshake or transfer packages to there with a Server chosen. Its application responds TCP packets with both the destination node of the front end.

The very first packet was sent to a computer as an option. Mention, even so, that perhaps the end of the queue end remains in the loop in this scenario. Rather than obtaining this information from the front end like in the primary healthcare services, you have the advantage of this capability: its selected server helps to generate TCP state.


Related Questions

Write an application that calculates and displays the amount of money a user would have if his or her money could be invested at 5 percent interest for one year. Create a method that prompts the user for the starting value of the investment and returns it to the calling program. Call a separate method to do the calculation, and return the result to be displayed. Save the program as Interest.java.

Answers

Answer:

Following are the program to this question:

import java.util.*;//import package for user input

class Interest //defining class Interest

{

   static double rate_of_interest = 5.00;//defining static double varaibale  

   public static double Invest_value()//defining method Invest_value

   {

           double invest;//defining double variable invest

           Scanner inc = new Scanner(System.in);//creating Scanner class object  

           System.out.print("Enter investment value: ");

           invest = inc.nextDouble();//input value in invest variable

           return invest;//return invest value

  }

  public static double calculated_Amount(double invest)//defining method calculated_Amount that accept parameter

  {

           double amount;//defining double variable

           amount = invest+ (invest * (rate_of_interest/100));//use amount to calculat 5 % of invest value

           return amount;//return amount value

  }

   

   public static void main(String[] as)//defining main method

   {

   double investment_value;//defining double variable

   investment_value= Invest_value();//use investment_value to hold method Invest_value value

   System.out.println("The 5% of the invest value: "+ calculated_Amount(investment_value));//use print method to print calculated_Amount value

  }

}

Output:

Enter investment value: 3000

The 5% of the invest value: 3150.0

Explanation:

In the above program a class "Interest", is defined inside the class a static double variable "rate_of_interest"  is declared that store a double value, in the next step, two methods "Invest_value and calculated_Amount" is declared.

In the "Invest_value" method, scanner class object is created for input value in the "invest" variable and the "calculated_Amount" accepts an "invest" value in its parameter and calculate its 5% and store its value in the "amount" variable.

Inside the main method, the "investment_value" is declared that holds the "Invest_value"  method value and pass the value in the "investment_value" variable in the "calculated_Amount" method and prints its return value.

Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class. Show and explain work.
[25 4
3 25]

Answers

It can also be calculated as 1 – specificity. False positive rate is calculated as the number of incorrect positive predictions (FP) divided by the total number of negatives (N

Modularize the program by adding the following 4 functions. None of them have any parameters. void displayMenu() void findSquareArea() void findCircleArea() void findTriangleArea() To do that you will need to carry out the following steps: Write prototypes for the four functions and place them above main. Write function definitions (consisting of a function header and initially empty body) for the four functions and place them below main. Move the appropriate code out of main and into the body of each function. Move variable definitions in main for variables no longer in main to whatever functions now use those variables. They will be local variables in those functions. For example, findSquareArea will need to define the side variable and findCircleArea will need to define the radius variable. All of the functions that compute areas will now need to define a variable named area. Move the definition for the named constant PI out of main and place it above the main function. In main, replace each block of removed code with a function call to the function now containing that block of code.

Answers

Answer:

It is a C++ program  :

#include <iostream>  // to use input output functions

using namespace std;  //to identify objects like cin cout

//following are the prototypes for the four functions placed above main

void displayMenu();  

void findSquareArea();  

void findCircleArea();

void findTriangleArea();

//definition for constant PI out of main

const float PI = 3.14159;  

int main(){  //start of main function

displayMenu(); //calls displayMenu() method

}

  void displayMenu(){  // to make user selection and calls relevant function to compute area according to the choice of user

int selection=0;  //to choose from 4 options

cout<<"Program to calculate areas of objects:\n" ;  //displays this message at start

do  {  //this loop asks user to enter a choice and this continues to execute and calculate depending on users choice until user enters 4 to exit

cout<<"\n1.Square \n2.Circle \n3.Right Triangle \n4.Quit";

cout<<"\nEnter your choice:";  //prompts user to enter choice

cin>>selection;  //reads the input choice

if(selection==1)  //if user enters 1

{  //computes area of square by calling findSquareArea

findSquareArea();  //function call to the findSquareArea function

}  

else if(selection==2)  //if user enters 2

{  //computes area of circle by calling findCircleArea

findCircleArea();  //function call to the findCircleArea function

}  

else if(selection==3)   //if user enters 3

{  //computes area of triangle by calling findTriangleArea

findTriangleArea();  //function call to the findTriangleArea function

}  

else if(selection==4)   //if user enters 4

{  

cout<<"\nTerminating!!.";  //exits after displaying this message

break;

}

else  // displays the following message if user enters anything other than the given choices

{

cout<<"\nInvalid selection";  //displays this message

}

}

while(1);  

}  

void findSquareArea(){  //function definition. this function has no parameters

float area=0.0;  //variable to store the area of square

float side=0;  //local variable of this method that stores value of side of square

cout<<"\nLength of side: ";  //prompts user to enter length of side

cin>>side;  //reads value of side from user

area=side*side;  //formula to compute area of square and result is assigned to area variable

cout<<"\nArea of Square: "<<area<<endl;   //displays are of the square

}  

void findCircleArea(){  //function definition. this function has no parameters

float area=0.0;  //variable to store the area of square

float radius=0.0;  //local variable of this method that stores value of radius of circle

cout<<"\nRadius of circle: ";  //prompts user to enter radius of circle

cin>>radius;  // reads input value of radius

area=PI*radius*radius;  //formula to compute area of circle

cout<<"\nArea of circle: "<<area<<endl;}  //displays are of the circle

void findTriangleArea(){  //function definition. this function has no parameters

   float area=0.0;  //variable to store the area of triangle

   float base=0.0;  //local variable of this method that stores value of base of triangle

   float height=0.0;  //holds value of height of triangle

cout<<"\nHeight of Triangle: ";  //prompts user to enter height

cin>>height;  //reads input value of height

cout<<"\nBase of Triangle: "; //prompts user to enter base

cin>>base;  //reads input value of base

area=0.5*height*base;  //computes area of triangle and assign the result to area variable

cout<<"\nArea of Triangle: "<<area<<endl;  //displays area of triangle

}

Explanation:

The program is modified as above. The prototypes for the four functions that are named as :

void displayMenu();  to display the Menu of choices and call relevant function to compute area

void findSquareArea();  To compute area of square

void findCircleArea(); To compute area of circle

void findTriangleArea();  To compute area of triangle

Note that these methods have no parameters and their return type is void. These 4 methods prototypes are placed above main() function.

Next the function definitions (consisting of a function header and initially empty body) for the four functions are written and placed below main() For example definition of findTriangleArea() is given below:

void findTriangleArea()

{

}

Next the code in the main is moved to the relevant methods. Then variables selection=0;  is moved to displayMenu method,  radius=0.0 to findCircleArea method , side=0; to findSquareArea float area=0.0;  to each method, float height=0.0;  and float base=0.0; to findTriangleArea method.

The relevant code moved to each method is shown in the above code.

The definition for the named constant PI is moved out of main and placed above the main function. const keyword before datatype of PI variable shows that PI is declared constant and its value is initialized once only to 3.14159.

why does study state that unless you were sleeping it is almost impossible not to be communicating?

Answers

Answer:

Because your movements, expressions, and posture are also a type of communication

Explanation:

Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file (directory.txt) that contains the numbers in random order. Handle lookups by name and also reverse lookups by phone number. Use a binary search for both lookups. A driver program and templates have been created for you.

Answers

Answer:

Here is the JAVA program:

Items.java

public class Item {  // Item class

private String name, ph_num;  // class data members name to hold the name and ph_num stores the telephone numbers

public Item(String fullName, String PhoneNo){  //constructor of Item class , so fields full name and ph_num can be initialized when the object is created

name = fullName;  // holds the name field

ph_num = PhoneNo;}  //holds the telephone number

public String getFullName(){  // accessor method to get access to the name field

return name;}  //returns the name from directory

public String getPhoneNo(){  //accessor method to get access to the ph_nujm field

return ph_num; } } //returns the telephone number

Explanation:

LookupTable.java

public class LookupTable{  //class name

private ArrayList<Item> data;  // dynamic array list named data of Item class. This array list stores the names and telephone numbers from file

public LookupTable(){  //default constructor

data = new ArrayList<Item>();}  // creates an array list of Item type which holds the names and phone numbers

public void read(Scanner in){  // Scanner class object is created and this class is used to read input and the method reads the names and phone numbers

while(in.hasNext()){  // the loop moves through each line of the file. scanner class method hasNext checks for the tokens in the input

String name = in.nextLine();  // scans for the name in the input

String ph_num = in.nextLine();  //scans for the phone numbers in the input

data.add(new Item(name, ph_num));}}  // adds the names and phone number in to the Array list

public String lookup(String k){  //method looks up for an item in the table.  param k is the key to find . returns the value with the given key, or null if no       such item was found

String result = null;  //result initialized to to null

for(Item item: data){  //creates Item object and traverses the array list for each item i.e. name or phone numbers

if(k.equals(item.getFullName())){  //access the getFullName method through object item and checks if that name matches the key to find.

result = item.getPhoneNo();}}  //gets the corresponding phone number and assigns it to result variable

return result;}  //returns the result containing the phone number

public String reverseLookup(String v){  //Looks up an item in the table. param v is the value to find . returns the key with the given value, or null if no  such item was found. This method performs the lookup through phone number

String result = null;  //result is set to null to start

for(Item item: data){  //Traversing list through the for each item in data  

if(v.equals(item.getPhoneNo())){  //if the value of v is equal to the phone number accessed by using accessor method and object item

result = item.getFullName();}}  //accesses the corresponding name of that phone number and assigns it to the result

return result;}}  //returns the result                                

The data from directory file which contains the number and names. The LookupTable class has a method lookup which handles the lookups by names and the method reverseLookup that handles the lookups by phone number.  

Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for the given program with one call to inc_num_kids():

Answers

Answer:

This is the instance method inc_num_kids()

def inc_num_kids(self):

       self.num_kids += 1

Explanation:

The first line is the definition of function inc_num_kids() which has a parameter self. self is basically an instance of  class PersonInfo

self.num_kids += 1 this statement incremented the data member num_kids by 1. This means that the instance method inc_num_kids, using instance self, increments the value of num_kids data member by 1.

The complete program is as following:

class PersonInfo:  #class name PersonInfo

   def __init__(self):   #constructor of the class

       self.num_kids = 0  # data member num_kids

   def inc_num_kids(self):  # method inc_num_kids

       self.num_kids += 1  #increments num_kids by 1

person1 = PersonInfo()  #creates object person of class PersonInfo

print('Kids:', person1.num_kids)  # prints num_kids value before increment

person1.inc_num_kids()  #calls inc_num_kids method to increment num_kids

print('New baby, kids now:', person1.num_kids) #prints the value of num_kids after increment by inc_num_kids method

The person1 object first access the initial value of num_kids initialized by the constructor. So the first value of num_kids is 0. self.num_kids = 0  This statement assigns the value 0 to num_kids data member. Next the method inc_num_kids() using the object person1. Now when this method is called the value of data member num_kids is incremented to 1.

So previously the value was 0 which now increments by 1 and becomes 1. Last print statement displays this new value which is incremented by the inc_num_kids() method.

Hence the output is:

Kids: 0

New baby, kids now: 1

The program along with its output is attached.

In this exercise we have to use the knowledge of computational language in python to describe a code, like this:

The code can be found in the attached image.

To make it easier the code can be found below as:

class PersonInfo:  

  def __init__(self):  

      self.num_kids = 0  

  def inc_num_kids(self):  

      self.num_kids += 1  

person1 = PersonInfo()

print('Kids:', person1.num_kids)  

person1.inc_num_kids()

print('New baby, kids now:', person1.num_kids)

See more about python at brainly.com/question/26104476

what is filter in image processing

Answers

Answer:

Image processing operations implemented with filtering include smoothing, sharpening, and edge enhancement.

a) five benefits of having
an operating system over not having one.

Answers

Answer:

Software Updates, Computing Sources, No Coding, Relatively Inexpensive, Safeguards Data.

Explanation:

Velma is graduating from Ashford at the end of next year. After she completes her final class, she will reward herself for her hard work with a week-long vacation in Hawaii. But she wants to begin saving money for her trip now. Which of the following is the most effective way for Velma to save money each month?

Answers

This question is incomplete because the options are missing; here are the options for this question:

Which of the following is the most effective way for Velma to save money each month?

A. Automatically reroute a portion of her paycheck to her savings account.

B. Manually deposit 10% of her paycheck in her savings account.

C. Pay all of her bills and then place the remaining money in her savings account.

D. Pay all of her bills and then place the remaining money in her piggy bank.

The correct answer to this question is A. Automatically reroute a portion of her paycheck to her savings account.

Explanation:

In this case, Velma needs to consistently save money for her vacation as this guarantees she will have the money for the trip. This means it is ideal every month she contributes consistently to her savings for the vacation.

This can be better be achieved by automatically rerouting a part of her paycheck for this purpose (Option A) because in this way, every month the money for the vacations will increase and the amount of money will be consistent, which means Velma will know beforehand the money she will have for the vacation. Moreover, options such as using a piggy bank or paying the bills and using the rest for her savings, do not guarantee she will contribute to the savings every month, or she will have the money she needs at the end.

Volume of Pyramid = A*h/3 where A is the area of the base of the pyramid and h is the height of the pyramid. Write a C++ program that asks the user to enter the necessary information about the pyramid (note that the user would not know the area of the base of the pyramid, you need to ask them for the length of one of the sides of the base and then calculate the area of the base). Using the information the user input, calculate the volume of the pyramid. Next display the results (rounded to two decimal places). Example Output (output will change depending on user input): The area of the base of the pyramid is: 25.00 The height of the pyramid is: 5.00 The volume of the pyramid is: 41.67 *Pseudocode IS required for this program and is worth 1 point. The program IS auto-graded.

Answers

Answer:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

   double side, height;

   

   cout<<"Enter the length of one of the sides of the base: ";

   cin>>side;

   cout<<"Enter the height: ";

   cin>>height;

   

   double area = side * side;

   double volume = area * height / 3;

   

   cout<<"The area of the base of the pyramid is: "<<area<<endl;

   cout<<"The height of the pyramid is: "<<height<<endl;

   cout<<"The volume of the pyramid is: "<<fixed<<setprecision(2)<<volume<<endl;

   return 0;

}

Pseudocode:

Declare side, height

Get side

Get height

Set area = side * side

Set volume = area * height / 3

Print area

Print height

Print volume

Explanation:

Include <iomanip> to have two decimal places

Declare the side and height

Ask the user to enter side and height

Calculate the base area, multiply side by side

Calculate the volume using the given formula

Print area, height and volume (use fixed and setprecision(2) to have two decimal places)

Type the correct answer in the box.

Who is responsible for creating and testing the incident response plan?

The _______ is responsible for creating and testing the incident response plan.

Answers

Answer: CSIRT

Explanation: CSIRT is team that specializes in day to day cyber incidents  

The CSIRT is responsible for creating and testing the incident response plan.

What is CSIRT?

CSIRT is the Computer emergency response team. One of the key areas for the efficient operation of a corporation is the legal department. Professionals face enormous challenges, particularly when you take into account the need for other bodies within the company itself.

We can list the reviews of the CSIRT procedures that are conducted through this department as one of its key responsibilities. This department also has the responsibility of comprehending the actions that the CSIRT will take to ensure that they comply with all applicable federal, state, and local laws and regulations.

Therefore, the incident response strategy must be written and tested by the CSIRT.

To learn more about CSIRT, refer to the link:

https://brainly.com/question/18493737

#SPJ2

17. Write a query to get the Order ID, the name of the company that placed the order, and the first and last name of the associated employee. g

Answers

Answer:

Required code present in image attached

Explanation:

At first, the subquery (i.e., the inner query) will execute one time before executing the main query (i.e., outer query).  This sequence is important since the result from the subquery is being utilized for when the main query executes to produced the desired outcome. The final result will be obtained after the last line of code executes.

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

Answers

Answer:

Op code table.

Explanation:

In Computer programming, an Op code is the short term for operational code and it is the single instruction which can be executed by the central processing unit (CPU) of a computer.

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the Op code table. The Op code can be defined as a visual representation of the entire operational codes contained in a set of executable instructions.

An Op code table is arranged in rows and columns which basically represents an upper or lower nibble and when combined depicts the full byte of the operational code. Each cells in the Op code table are labeled from 0-F for the rows and columns; when combined it forms values ranging from 00-FF which contains information about CPU cycle counts and instruction code parameters.

Hence, if the operational code table is created and sorted alphabetically, the binary search algorithm can be used to find an operational code to be executed by the central processing unit (CPU).

Below is some info for some internet transactions. We want to sort it by time and by location. Which sorting algorithm is appropriate for this particular problem?
a. radix sort.
b. heap sort.
c. selection sort.
d. shell sort.

Answers

Answer:

c. selection sort

Explanation:

The best way to sort the internet transactions data based on time and location is selection sort. The algorithms sorting technique is used to sort the complex data in computer programs. Shell sort is the technique which sorts the data apart from each other and reduces interval between them. Heap sort is sorting technique based on binary heap data structure. Radix sort is an integer sorting technique in algorithms.

Suppose that a server sends four packets of audio data, in 15 seconds each. The first is sent by the server exactly at noon (12:00:00), while each of the three successive packets is sent immediately after the completion of its predecessor. The client, on the other hand, receives the four packets beginning at 12:00:03, 12:00:20, 12:00:41, 12:00:59 respectively. What is the smallest delayed wait time (buffer) in seconds that would ensure the client had seamless playback (i.e. each packet plays immediately after the previous one ends)?

Answers

Answer:

15

Explanation:

for seamless playback each packet should be played before their predecessor so

4th packet will start at 12:01:03

3rd packet will start at 12:00:48

2nd packet will start at 12:00:33

1st packet will start at 12:00:18

as first packet arrives at 12:00:03 so wait time is 15 seconds for seamless playback

Would you expect all the devices listed in BIOS/UEFI setup to also be listed in Device Manager? Would you expect all devices listed in Device Manager to also be listed in BIOS/UEFI setup?

Answers

Answer:

1. Yes

2. No

Explanation:

1 Note that the term BIOS (Basic input and Output System) refers to instructions that controls a computer device operations. Thus, devices that shows up in BIOS should be in device manager.

2. Not all devices listed in devcie manager of a computer system will be listed in BIOS.

what is the difference between ram and rom​

Answers

Answer:

RAM is used to store programs and data the CPU needs. ROM has prerecorded data and is used to boot the computer

Explanation:

Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation once for every millisecond of CPU computing and that each I/O operation takes 10 milliseconds to complete. Also assume that the context switching overhead is 0.1 millisecond and that all processes are long-running tasks. What is the CPU utilization for a round-robin scheduler when:

Answers

Answer:

10 minutes

Explanation:

Why do you think it is necessary to set the sequence in which the system initializes video cards so that the primary display is initialized first

Answers

Answer:

Because if you don't do it BIOS doesn't support it. ... In troubleshooting a boot problem what would be the point of disabling the quick boot feature in BIOS setup

Explanation:

Write a small program that asks the user how many asterisks it should print out. The user responds with a number, then the program prints that number of asterisks.

Answers

Answer:

I am writing a C++ program. Let me know if you want the program in some other programming language.

#include <iostream> //to use input output functions

using namespace std; // to identify objects like cin cout

int main(){  //start of main() function body

int n; // number of asterisks

cout<<"how many asterisks do you want to print? "; //asks user how many asterisks it should print

   cin>>n; // reads the value of number of asterisks that user want to print

   for( int i=0; i< n; i++)    { //loop to display the number of asterisks in output

       printf("*");    } } // print * asterisks

Explanation:

I will explain how the for loop works.

Suppose the user entered 3 as number of asterisks that user wants to print.

So n=3

Now for loop has a variable i that is initialized to 0. For loop checks if the value of i is less than that of n. It is true because i=0 and n=3 and 0<3. So the body of the loop executes. This prints the first asterisk *

Then the value of i is incremented to 1 and becomes i=1

At next iteration loop again checks if value of i is less than n. It is true because i=1 and n=3 and 1<3. So the body of the loop executes. This prints the second asterisk **

Then the value of i is incremented to 1 and becomes i=2

At next iteration loop again checks if value of i is less than n. It is true because i=2 and n=3 and 2<3. So the body of the loop executes. This prints the third asterisk ***

Then the value of i is incremented to 1 and becomes i=3

At next iteration loop again checks if value of i is less than n. This time it evaluates to false because i=3 and n=3 so 3=3. So the loop ends and the output is

***

The output screenshot is attached.

Open up your database administraton GUI, and use the appropriate SQL Query Tool to write the SQL CREATE statement for your BOOK_TAGS table. You can either write the script manually and execute it through pgAdmin or you can create the table by using pgAdmin's wizard.
Afterwards, insert one row of dummy data that adds a tag to the sample book in the BOOKS table.

Answers

Answer:

nxlskshwhhwwlqlqoejebx znznxjslaa

You should see an error. Let's examine why this error occured by looking at the values in the "Total Pay" column. Use the type function and set total_pay_type to the type of the first item from the "Total Pay" column.

Answers

Answer:

See below

Explanation:

Under this topic of functions, this question has been precisely answered in a word file and attached as an image herewith (in proper format). Visualizations and CEO incomes are some of the applications of this concept.

The response to this part shows the relation between total pay and raw compensation.

Hope that answers the question, have a great day!

Implement function easyCrypto() that takes as input a string and prints its encryption
defined as follows: Every character at an odd position i in the alphabet will be
encrypted with the character at position i+1, and every character at an even position i
will be encrypted with the character at position i 1. In other words, ‘a’ is encrypted with
‘b’, ‘b’ with ‘a’, ‘c’ with ‘d’, ‘d’ with ‘c’, and so on. Lowercase characters should remain
lowercase, and uppercase characters should remain uppercase.
>>> easyCrypto('abc')
bad
>>> easyCrypto('Z00')
YPP

Answers

Answer:

The program written in python is as follows;

import string

def easyCrypto(inputstring):

      for i in range(len(inputstring)):

             try:

                    ind = string.ascii_lowercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

                           print(string.ascii_lowercase[ind+1],end="")

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

anystring = input("Enter a string: ")

easyCrypto(anystring)

Explanation:

The first line imports the string module into the program

import string

The functipn easyCrypto() starts here

def easyCrypto(inputstring):

This line iterates through each character in the input string

      for i in range(len(inputstring)):

The try except handles the error in the program

             try:

This line gets the index of the current character (lower case)

                    ind = string.ascii_lowercase.index(inputstring[i])

This line adds 1 to the index

                    pos = ind+1

This line checks if the character is at even position

                    if pos%2 == 0:

If yes, it returns the alphabet before it

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

It returns the alphabet after it, if otherwise

                           print(string.ascii_lowercase[ind+1],end="")

The except block does the same thing as the try block, but it handles uppercase letters

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

The main starts here

This line prompts user for input

anystring = input("Enter a string: ")

This line calls the easyCrypto() function

easyCrypto(anystring)

Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is done today. * 5 points technology and mathematics principles the engineering design process technical know-how positive and negative effects of using technology

Answers

Answer:

Early in the history of technology, the development of tools and machines was based on technical know-how versus scientific knowledge as is done today.

Explanation:

In the era prior to technological development, men had a basic and at times rudimentary manufacturing development, based on artisan processes that developed their tools and machinery by hand, without any type of automation or mass production rules.

Thus, each part or tool was manufactured in a unique way, which required a broad mastery of the production process by the manufacturer. This is how the first professions began to emerge, such as blacksmiths for example, who mastered the technique of manufacturing different implements and carried them out without any scientific knowledge.

what is the difference between head header and heading in HTML​

Answers

Answer:

<Head>the appears the "<body>" of a web page.

<Heading> the appears the body of the web page.

Explanation:<Head> it contains that provides the information about web page.

<Heading> it contains such as the title,date, summary.

<Heading> are the<h1>,<h2>,tags

it provides the title and subtitles of the web page.

<Heading>

</Heading>

Head is element is metadata.

Heading is element is actual element.

Answer:

Head>the appears the "<body>" of a web page.

<Heading> the appears the body of the web page.

Explanation:

function of network security​

Answers

Answer:ffffffffffffgggggg

Explanation:vvvc

Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0 otherwise. Assume that x, y and n are all of type int.

Answers

Answer:

See comments for line by line explanation (Lines that begins with // are comments)

The function written in C, is as follows:

//The function starts here

int check(x,y,n)

{

//This if condition checks if x and y are within range of 0 to n - 1

if((x>=0 && x<=n-1) && (y>=0 && y<=n-1))

{

//If the if conditional statement is true, the function returns 1

 return 1;

}

else

{

//If the if conditional statement is false, the function returns 0

 return 0;

}

//The if condition ends here

}

//The function ends here

Explanation:

A systems administrator wants to replace the process of using a CRL to verify certificate validity. Frequent downloads are becoming problematic. Which of the following would BEST suit the administrators needs?
A. OCSP
B. CSR
C. Key escrow
D. CA

Answers

Answer:

A. OCSP

Explanation:

Online Certificate Status Protocol (OCSP) is an Internet Protocol that is used as an alternative for CRL and is used to obtain the revocation status of a digital certificate.

A certificate revocation list (CRL) is a set of digital certificates that have been rendered invalid/revoked by the Certificate Authority (CA) because they can no longer be trusted.

Because an OCSP response uses less data than a CRL, it would be best suited to the administrator's needs.

We will pass in a value N. Write a program that outputs the complete Fibonacci sequence for N iterations. Important: If N is 0, then we expect to get an output of 0. If N=1 then we expect 0, 1 etc.

Answers

Answer:

The program written in Python is as follows

def fibonac(N):

    series = ""

    for i in range(0,N+1):

         series = series + str(i) + ","

   return series[:-1]

N = int(input("Number: "))

print(fibonac(N))

Explanation:

This line defines the function fibonac

def fibonac(N):

This line initializes variable "series" to an empty string

    series = ""

This line iterates through the passed argument, N

    for i in range(0,N+1):

This line determines the Fibonacci sequence

         series = series + str(i) + ","

Lastly, this line returns the Fibonacci sequence

   return series[:-1]

The main starts here

The firs line prompts user for input

N = int(input("Number: "))

This line prints the Fibonacci sequence

print(fibonac(N))

Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write your code so that it works no matter how many items are in the list

Answers

Answer:

sports = ["football", "basketball", "volleyball", "baseball", "swimming"]

last = sports[-3:]

print(last)

Explanation:

*The code is in Python.

Create a list called sports

Create a variable called last and set it to the last three elements of the sports list using slicing

Print the last

Other Questions
What is the Domain and Range *DON'T FORGET PARENTHESES AND BRACKETS* Which of the following is a power reserved for the States? A regulating interstate commerce B coining money C signing treaties D establish local governments Tunde and Martha are married and share their income. Tunde earns $1,500 per year less than Martha. If their annual income is $47,500, how much does each earn? Suppose a cube is given. How many different segments can be formed by connecting the vertices of the cube? *PLEASE ANSWER ASAP TY* Which of the following statements best describes a segment of a circle? a.) A segment is a portion of a sector that is bound by a chord and the major arc formed by that chord. b.) A segment is a portion of a sector that is bound by a radius and the minor arc formed by that radius. c.) A segment is a portion of a sector that is bound by a radius and the major arc formed by that radius. d.) A segment is a portion of a sector that is bound by a chord and the minor arc formed by that chord. What are the coordinates of the vertex of the function f(x)=x2+ 10x-3?O (-5. -28)(-5, 28)O (5,-28)(5.28) Need help ASAP thank you sorry if you cant see the picture but you can zoom in :) !!! yesai nerai alapadai sandru tharuga Sorry for the bad Angle, anyways if anyone could help me out that be great, I would do the question myself if I'd know how to do it, have a nice day Ellie and her friends have started a fan club for their favorite band, the Ticks. Their goals include selling Ticks T-shirts, to keep a list of upcoming performances, and ticket purchases. Which revisions should be made to achieve parallel structure using gerunds? Select all that apply. A) to sell Ticks T-shirts B) purchasing tickets C) are starting a fan club D) listing upcoming performances 100 POINTS!!!! Answer to the picture below. Net income is $1,000,000 for the year, EBT is $2,500,000, retained earnings in January were $5,000,000, common stock dividends paid for the year are $300,000, and common shares outstanding are 1,000,000. What are end-of-year retained earnings? Group of answer choices what is the area of the shaded region between the two z-scores indicated in the diagram? z=-1.24 and z= 0.84 Bay Beach Industries wants to maintain their capital structure of 40% debt and 60% equity. The firm's tax rate is 34%. The firm can issue the following securities to finance the investments: Bonds: Mortgage bonds can be issued at a pre-tax cost of 9 percent. Debentures can be issued at a pre-tax cost of 10.5 percent. Common Equity: Some retained earnings will be available for investment. In addition, new common stock can be issued at the market price of $46. Flotation costs will be $3 per share. The recent common stock dividend was $3.60. Dividends are expected to grow at 6% in the future. What is the cost of capital using debentures and external equity? a. 10.96% b. 13.12% c. 11.30% d. 11.69% e. 11.35% PLEASE HELPPPPPPPPP!!! Graph the line that represents a proportional relationship between d and t with the property that an increase of 3 units in t corresponds to an increase of 4 units in d. What's the unit rate of change of d with respect to t? (That is, a change of 1 unit in t will correspond to a change of how many unites in d?) The unit rate is _____? Graph the relationship. Write the equations after translating the graph of y = | 1 /2 x2|+3 one unit down, Which sentences uses deductive reasoning Based on its structure, which word most likely means "someone who takes advantage of circumstances"?O credulousO disdainfulO proactiveO opportunistic please please help !! PLZZ HELPP WILL GIVE 100 POINTS Which ordered pairs are solutions to the inequality 2x+y4? Select each correct answer. (0, 5) (1, 2) (3, 1) (0, 1) (1, 1)