Answer:
It would have seriously negatively affected civilian morale in London. Hearing about the horrors of the war even from far away does a number on morale. This, however, was not exactly the case for London in WWII, because even as air raids were executed on the city, the citizens, confined to underground bomb shelters, still managed to pull together and keep morale high, causing London NOT to plunge into chaos, but to stand united against Germany.
What information will you find in the 16-bit field in an IP datagram?
Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.
Explanation: Hopefully this helps you with what ever u are doing.
An information which you will find in the 16-bit field in an IP datagram is: the total length of the datagram it's attached to.
An IP address is an abbreviation of internet protocol address and it can be defined as a unique number assigned to a computer or other network devices such as routers, switches, etc., in order to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network device connected to the internet or an interconnected network.
In Computer networking, IP address are classified into two (2) main categories and these are;
Local (internal) IP address.Global (external) IP address.An IP datagram can be defined as the standard format of data that an internet protocol (IP) recognizes.
Generally, an IP datagram comprises two (2) main components and these include:
1. The header: it is used for sending messages on a computer to the protocol in the same layer of a destination (recipient) computer.
2. The data: this is a set of information that is transmitted from one computer to another over an interconnected network.
On a related note, an IP datagram contain three (3) fields which are typically used for the transmission of data;
Header length.IP version.Total length.The Total length is a field that is used to specify the total length of an IP datagram and it is typically 16-bits in size.
In conclusion, an information which is found in the 16-bit field in an IP datagram is the total length of the datagram it's attached to.
Find more information here: https://brainly.com/question/19204809
Can someone plz answer these questions plz
Answer:
ñbyte I'm pretty sure, sorry if u get it wrong you should do more research about the question if i get it wrong!!
Draw a data flow diagram that indicates the condition and factors that must be satisfied before a customer request for goods can be granted from a factory
Click this link to view O*NET’s Work Contexts section for Librarians.
It describes the physical and social elements common to this work. Note that common contexts are listed toward the top, and less common contexts are listed toward the bottom. According to O*NET, what are common work contexts for Librarians? Check all that apply.
face-to-face discussions
pace determined by speed of equipment
cramped work space, awkward positions
indoors, environmentally controlled
telephone and electronic mail
freedom to make decisions
Answer:
1. b,d,f 2. a,b,c,f 3. b,c,e,f 4. a,c 5. a,b,c,e 6. a,b,c
7. d,e,f 8. a,b,e,f 9. a,c,d 10. b,d,f 11. c,e,f 12. a,c,e,f
Explanation:
all the answers to Finance Workplaces and Tasks Assignment 100%
Answer:
1, 4, 5, 6
Explanation:
the only options that are on the website
The process of using the new
information system and doing away
with the old system is known as
system ___.
Answer:
The process of using the new
information system and doing away
with the old system is known as
system development
All of the following are problem-solving steps except:
A. taking action.
B. defining the problem.
c. doing the first solution that comes to mind.
D. creating possible solutions.
Answer:
C. Doing the first solution that comes to mind.
Explanation:
Lets break this down a bit.
A is a great problem solving step, so we can mark that off.
We can do the same for B.
However, for C, I am hesitant about this one, so I wont mark it off quite yet.
Finally, for D, it is definitely a step, so I can mark that off.
You should never do the first solution that comes to mind, since you haven't done enough brainstorming about other ideas.
Hope this helps!
9.6 code practice edhesive
Answer: i got 50% for this I don’t know what to fix
Explanation:
Answer:
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N= []
for r in range(4):
N.append([])
for r in range(len(N)):
value = 1
for c in range(5):
N[r].append(value)
value = value +1
printIt(N)
print("")
newValue = 1
for r in range(len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
Explanation: Ez clap
PLZZ HELP!!!
Select the correct answer.
Brian’s team has built a new application based on the client’s requirements. They will deploy this application in multiple locations on the client side. Brian is unsure about the hardware and software specifications at the client side. Which option will help him best solve this issue?
A.
creating multiple test scripts
B.
automating test scripts
C.
creating multiple test plans
D.
creating multiple test environments
E.
communicating with the development team
Answer: Option D creating muiltiple test enviroments
Explanation: I had the same question and I hope this helps ( :
The option that will help Brain best solve this issue is by creating multiple test environments.
What is the specification of software?A software requirements specification (SRS) is known to be a type of requirement that are often written in a document that tells more about what the software can do.
Hence in the above scenario, what will help help Brain best solve this issue is by creating multiple test environments where the client can see a demonstration and be convince in getting the product.
Learn more about application from
https://brainly.com/question/24847617
HELPPPPP PLZZZZZZZZZZZZZZZ!!!!!!!!
Select the correct answer.
What type of diagram does the following image depict?
A.
class diagram
B.
deployment diagram
C.
activity diagram
D.
sequence diagram
E.
use case diagram
Answer:
A
Explanation:
The aim of this activity is to implement an algorithm that returns the union of elements in a collection. Although working with sets is quick and easy in Python, sometimes we might want to find the union between two lists. Create a function called unite_lists, which uses a loop to go through both lists and return common elements. Do not use the built-in set function.
Answer:
The function in Python is as follows:
def unite_lists(A, B):
union = []
for elem in A:
if elem in B:
union.append(elem)
return union
Explanation:
This defines the function
def unite_lists(A, B):
This initializes an empty list for the union list
union = []
This iterates through list A
for elem in A:
This checks if the item in list A is in list B
if elem in B:
If it is present, the item is appended to the union list
union.append(elem)
This returns the union of the two lists
return union
HELPPPPPP How is does technology impact the career of your choice? Write 5-6 sentences about how technology impacts the career of your choice.
Answer:
Explanation:
Summary. Technology has had a dramatic impact on the nature of work itself, individual applicants and employees, employers, and career counselors. It has changed the nature of work and the types of jobs that people do today. It has altered the knowledge and skills individuals need to be effective workers.
what is information richness
Information Richness is the ability of information to change understanding within a time interval.
Hope it helps. Have a great day.
Brainliest would be greatly appreciated.
___________________________________________________________
#SaveTheEarth
#SpreadTheLove
- Mitsu JK
red + blue =
Red + green =
Magenta - blue =
Yellow - green =
Cyan - blue =
Answer:
red + blue is green
red + green is blue
PLZZZ HELP
Select the correct answer.
A company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design methodology would they be using?
A.
structured design
B.
modular design
C.
object-oriented design
D.
rapid application development
E.
use-case design
Answer:
C is object-oriented design
Evaluate the following information that shows the projected change in employment from 2014-2024: How can job seekers use the chart? Add data to a résumé and cover letter Gain awareness of how growth trends can impact career plans Research which careers match current skills Talk to community members in a knowledgeable manner You must check the box below prior to submitting your exam! Check this box to indicate you are ready to submit your exam Submit Exam FDK191.10
Answer:
Answer is B.
Gain awareness of how growth trends can impact career plans
Explanation:
Write
algorithm to read 100 numbers
then display the largest.
Answer:
see picture
Explanation:
There is no need to store all the values, you can just keep track of the highest. Up to you to create a numbers file with 100 values.
Is this correct? I say its B, but my friend says its D.
An array stores data using multiple variable names.
True
False
Answer: False
Explanation:
It is false that an array stores data using multiple variable names, as it may not as, for starters, an Array cannot store multiple types of variable values. A container object that holds a fixed number of single-type values is known as an array.
What is an array?A data structure that stores a collection of elements of the same data type under a single variable name is known as an array.
The index number, which is an integer value that represents the element's position within the array, is used to access it.
In other words, an array stores multiple values of the same data type in contiguous memory locations using a single variable name.
For starters, we cannot store multiple types of variable values in an Array. An array is a container object that holds a fixed number of single-type values.
Thus, the given statement is false.
For more details regarding an array, visit:
https://brainly.com/question/19570024
#SPJ3
. What is piracy? ???????????????????
Answer: a practice similar to piracy but in other contexts, especially hijacking.
"air piracy"
the unauthorized use or reproduction of another's work.
Explanation:
who was the first inventor of computer
Answer:
Explanation:
English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine.
Answer:
Charles Babage is the first inventor of computer.
5) Write a program to read text to end-of-file, and print a count of word lengths, i.e. the total number of words of length 1 which occurred, the number of length 2, and so on. Define a word to be a sequence of alphabetic characters. You should allow for word lengths up to 25 letters. A typical output should be like this: length 1 : 10 occurrences length 2 : 19 occurrences length 3 : 127 occurrences length 4 : 0 occurrences length 5 : 18 occurrences
Answer:
Explanation:
The following code is written in Python. It is a function that takes in the name of the file to be read and the size of the word. Then the function reads the file, removes whitespace and commas, splits the text into words, and scans the words for all the words that have the same length as the number passed. It counts all those words and prints out the number of occurrences of words of that length.
def countOccurrences(file_name, word_size):
f = open(file_name, 'r')
text = f.read()
text = text.replace(',', '')
split_text = text.split(' ')
occurrences = 0
for word in split_text:
if len(word) == word_size:
occurrences += 1
print("Length 1: " + str(occurrences) + " occurrences")
Create a program that: Provides access to a rolodex (list of names and contact information). Have the program accept a name to lookup and that prints the contact information of the matching name. Use an array for names and an array for email address and another array for phone numbers. Make sure that all three arrays contain corresponding information.
Answer:
Explanation:
The following code is written in Java, it asks the user for a name and looks that name up in the names array. If it finds it prints out all the values in that same index within every array to get the name, email, and phone number. If the name is not found it prints out that the client is not found.
//The code is attached in the text file below and picture shows the output of the working code.
Which option is used to determine whether information that should remain private is included in the final version of a PowerPoint presentation?
Compatibility Check
Grammar Checker
Document Inspector dialog box
Trust Center
Answer:
Im pretty sure you should put a document inspector dialog box
Answer:
Document Inspector dialog box
Explanation:
edge 2022
Consider the following relation with functional dependencies as shown below.R{sno,sname,age,cno,cname,group}
R(A,B,C,D,E,F)
A-B,C
C-F
D-E
which normal form is the relation R is in?
Answer:
First Normal Form
Explanation:
The correct answer is - First Normal Form
Reason -
Given that,
A-B,C
C-F
D-E
Here the key is AD
The two partial Functional dependencies are -
A-B,C
D-E
So,
They are not in Second Normal Form, but they are in First Normal Form.
What keys on the keyboard have the ability to move the cursor around on a window?
No links and files or I report!
Will give Brainliest!
Answer:
Press the Windows key on your keyboard. In the box that appears, type Ease of Access mouse settings and press Enter . In the Mouse Keys section, toggle the switch under Use numeric pad to move mouse around the screen to On. Press Alt + F4 to exit this menu.
"Wake up to reality! Nothing ever goes as planned in this world. The longer you live, the more you realize that in this reality only pain, suffering and futility exist.
Where is this quote from
Answer:
Naruto Shippuden and from madara uchiha
Explanation:
Answer:
Madara to Obito in Naruto Shippuden after Obito regains conscious from passing out under the rock from the third graet ninja war
Explanation:
Write a program that computes the sum of squares for a sequence of positive whole numbers. The program asks the user to enter the starting number. Then it asks the user to enter an ending number. It computes the square for each number from the starting number to the ending number. It also calculates the sum of these squares. It displays the numbers, their squares and the sum of the squares.
Answer:
In Python:
start = int(input("Start: "))
end = int(input("End: "))
total = 0
print("Number\t Squares")
for num in range(start,end+1):
print(num,"\t",num**2)
total+=num**2
print("Total: ",total)
Explanation:
This gets the starting number
start = int(input("Start: "))
This gets the ending number
end = int(input("End: "))
This initializes total to 0
total = 0
This prints the header
print("Number\t Squares")
This iterates through start to end
for num in range(start,end+1):
This prints each number and its square
print(num,"\t",num**2)
This calculates the total squares
total+=num**2
This prints the calculated total
print("Total: ",total)
the process of preparing and setting up a software on a computer is called
Answer:
installation
Explanation:
Installation (or setup) of a computer program (including device drivers and plugins), is the act of making the program ready for execution.
HELP PLZZZZZZZZ!!!!!!!!!!!
Type the correct answer in the box. Spell all words correctly.
Before a new email application could be released to the public, it was released for a few days to some account holders of a website. The project team then collected feedback from this limited number of users and later made the email application available for public use. What type of testing did the project team use?
The project team used_____________testing for the email application.
Answer:
Its either business format franchise or business brokers
PLZ HELP!!!
Select the correct answer.
Emma, the quality control manager in a software development company, asks the testing team to check whether the user interface is friendly. To which type of testing is Emma referring?
A.
usability testing
B.
data comparison
C.
validation testing
D.
stress testing
E.
destruction testing