Answer:
Base-10 (decimal)
Explanation:
A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home
Answer:
The answer to this question can be defined as follows:
Explanation:
The static NAT stands for (static Network Address Translation), which enables the user to modify a single interpretation for a local second-order to the external environment addresses, and all IP and port numbers were also transcribed inside to random traffic as well as from outside with the internal traffic.
It is used to map network traffic by an internal IP address from a static external IP address. It provides a fixed conversion for actual addresses onto maps. It offers Internet access to the network equipment via a private LAN with such a private IP address which is not recorded.Please find the attachment of the ip address.Which of the following statements is false? a. The Java API consists of packages. b. The Java API helps programmers avoid "reinventing the wheel." c. The Java API consists of import declarations. d. None of the above.
Answer:
The answer is "Option c".
Explanation:
In Java programming, the API stands for "application programming interface", which is also known as the lists of all classes in the JDK. It contains all packages, classes, and interfaces, with their techniques, fields. It is a built-in class, which gives the programmer a great deal of usability, and correct choices can be described as follows:
In option a, It is correct because it imports the package to use API. In option b, It allows you to "re-invent the wheel" by developers, that's why it is correct.Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.
Answer:
B) Create all new regional folders and move the reports to the respective region folder with viewer access.
Explanation:
Below are the options
A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.
B) Create all new regional folders and move the reports to the respective region folder with viewer access.
C) Create all new regional folders and move the reports to the respective region folder with subscribe access.
D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region
In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime
Hence, the correct option is B.
Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.
From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.
Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.
Learn more about folders on:
https://brainly.com/question/20262915
What are the flowchart symbols?
Answer:Flowchart use to represent different types of action and steps in the process.These are known as flowchart symbol.
Explanation:The flowchart symbols are lines and arrows show the step and relations, these are known as flowchart symbol.
Diamond shape: This types of flow chart symbols represent a decision.
Rectangle shape:This types of flow chart symbols represent a process.
Start/End : it represent that start or end point.
Arrows: it represent that representative shapes.
Input/output: it represent that input or output.
Question 3 of 10
What is one advantage of video tutorials about maintenance and repairs?
O A. Video tutorials help you fix problems by doing the work for you.
O B. Sometimes, seeing a picture of the process is more helpful than
reading about it.
O C. Video tutorials are easier to make than written guides.
O D. Video tutorials cannot do the repair or maintenance for you.
SUBMIT
PREVIOUS
Answer:
B. Sometimes, seeing a picture of the process is more helpful than reading about it.
Explanation:
Video tutorials are a form of communication in which the instructions are given through video instructions. The users drive more information from video tutorials than written or audio. The visual and the auditory aids together helps in creating a better impact on the users. The video tutorial is more user friendly and can easily be controlled by the user. This helps in better understanding and analyzing the information.
Answer: B. Sometimes, seeing a picture of the process is more helpful than reading about it.
Explanation: took the quiz
A user's computer will not boot. A technician notices four indicator lights on the backside of the
computer. Two of the lights are green, and two are amber. Which of the following documentation
should the technician read to determine what the lights are indicating?
A. Network diagram
B. Computer manual
C. Asset management
D. Wiring scheme
Answer:
B.
Explanation:
Computer manual is the user guide that comes along with the computer set to inform the users about the functions, ways to assemble the parts, and so on.
The user manual consists of guide for the users specially for electronic products such as computers, refrigerators; softwares, and so on. These manuals are written by technical writers, programmers, etc.
In the given scenario the technician needs to refer to computer manual to know the meaning of the lights on the backside of the computer.
So, the correct answer is option B.
Does anyone know how to fix this problem My kali Linux is getting stuck on the failed to send host log message the first time I run it but when I reset it it gets fixed but I wanna stop it from freezing and getting stuck on that error message
Answer:
Is
Explanation:
You should check with a person repairing computers or call him and ask him Wats the problem with your pc or laptop or computer. This is just a suggestion. U can also get what to do from sites in the internet.
Hope this helps....
Have a nice day!!!!
Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O. b. Tubes are synchronized communication channels between threads. c. A filter stream provides additional functionality, such as aggregating data bytes into meaningful primitive-type units. FilterInputStream and FilterOutputStream are typically extended, so some of their filtering capabilities are provided by their concrete subclasses. d. A PrintStream performs text output. System.out and System.err are PrintStreams.
Answer:
The answer is "Option b".
Explanation:
Tubes were streams among processes, that are interconnected. It is coordinated ways to communicate between threads, that's why the only option b is wrong, and the correct choice can be defined as follows:
In option a, the byte-based I/O the input and output stream abstract class is used, that's why it correct. In option c, It is used to provide additional functionality, that's why it correct. In option d, It is used to provide the text output.what is the best phone company that sells long lasting battery life phones?
Answer:
A lot of people won't agree with me, but I have had phones from a variety of companies and found Motorola phones to be by far the best.
Explanation:
Answer:
apple but sometimes the batterys be breaking fast lol
Explanation:
A 1kg block is being pushed against a wall by a force F = 75 N as shown. The coefficient of friction is
0.25. The magnitude of acceleration of the block is
Answer:
37deg
Explanation:
Answer:
37n
Explanation:
Referential integrity states that:______.
A. Something assigned to an attribute when no other value applies (N/A) or when the applicable value is unknown;
B. Values of an attribute must be taken from a pre-defined domain;
C. No primary key attribute (or component of a primary key) can be null;
D. Each foreign key value MUST match a primary key value in another relation or the foreign key value must be null;
Answer:
D. Each foreign key value MUST match a primary key value in another relation or the foreign key value must be null.
Explanation:
In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.
Basically, there are four (4) types of integrity constraints and these are;
1. Key constraints.
2. Domain constraints.
3. Entity integrity constraints.
4. Referential integrity constraints.
Referential integrity states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.
For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.
Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid.
Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective data______program.
a. data structuring.
b. data privacy.
c. data recovery.
d. data piracy.
Answer:
b. data privacy
Explanation:
one of the importance jobs is establishing an effective data privacy program inorder to keep tracks of sensitive information or documents and how it is collected, stored, and use.
Data privacy which is also refer to as information privacy is the aspect of information technology that deals with the capacity of an organization in safeguarding the information received.
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud
Answer:
D) A private cloud
Explanation:
Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.
Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.
Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.
What is the best use of a line chart? (A.)to show parts of a whole while emphasizing specific data,(B.)to compare and contrast discrete categories of data,(C.)to display data that changes over time(D.)to display data points that are unconnected and distinct
I think the answer to the question is C
A string array:
A. Stores an actual string in each of its elements.
B. Can only provide access to strings of a certain length.
C. Is actually an array of pointers.
D. Is always less memory efficient than an equivalent double-subscripted array.
Answer:
C :Is actually an array of pointers
Explanation:
Here, we want to choose which of the options fit best as the answer to the question.
The correct answer here is that the string array is an array of pointers
A string array is used to store string of characters. The term array is an indication of the fact that it is a collection
Common concerns with backups are disk failure, lack of redundancy, and the necessity of future growth of disk capacity. Which backup method adresses these concerns and has multiple levels of use depending on how you want to prioritize features like performance, capacity, or reliability
Answer:
RAID Array
Explanation:
Backups are needed in the IT industry to take care of some harm that can affect data resulting in its lose. RAID is the acronym for Redundant Array of Independent Disks. RAID combines multiple physical disks into a large virtual disk. It has different levels which range from 0, 1, 5, 6, and 10. RAID has a high degree of optimizing the data capacity of a backup device and its different levels prioritize features like performance, capacity, and reliability.
It also accommodates the future growth of disk capacity and reduces to the minimum the risk of data loss. It is very useful in ensuring data storage.
Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software components. c. Performing a task in a program requires a method. d. A class is an instance of its object.
Answer:
A class is an instance of its object
Explanation:
By what decade were books readily available to the public across the United States and Europe? A. 1690 B. 1750 C. 1860 D. 1820
Answer: 1820
Explanation:
I believe the answer is the 1820, as the introduction of steam powered printing presses and steam powered paper mills significantly lowered the cost of books to decrease and significantly increased their circulation/availability.
hope this helps
-lvr
How do I make my kali Linux faster in my virtual box?
Answer:
If you run any operating system as a VM, it is going to be slower than if you were to run it as a native OS. You can, however, make a VM run faster by allocating more CPU cores and RAM to it in your hypervisor's (such as Virtualbox or VMWare) settings menu for your VM.
does that make sense?
What VM are you using? if your using virual box then try adding more RAM to it. I use VMware player 16 and its REALLY fast so try that. Also, go on online and look up this guy called network chuck.
Before Class B network 172.16.0.0 is subnetted by a network engineer, what parts of the structure of the IP addresses in this network already exist, with a specific size? (Choose two answers.)
Answer:
Host and network.
Explanation:
The parts of the structure of the IP addresses in this network already exist, with a specific size, are Host and network.
Find dy/dx and d2y/dx2. x = t2 + 5, y = t2 + 5t dy dx = Correct: Your answer is correct. d2y dx2 = Correct: Your answer is correct. For which values of t is the curve concave upward? (Enter your answer using interval notation.) Changed: Your submitted answer was incorrect. Your current answer has not been submitted.
Answer:
The answer to this question can be defined as follows:
Explanation:
Given value:
[tex]x = t^2 + 5......(1)\\\\ y = t^2 + 5t........(2)[/tex]
To find:
[tex]\bold {\frac{dy}{dx} \ \ \ and\ \ \ \frac{d^2y}{dx^2} = ?}[/tex]
Differentiate the above equation:
equation 1:
[tex]\frac{dx}{dt}= 2t.......(1)\\[/tex]
equation 2:
[tex]\frac{dy}{dt}= 2t+5[/tex]
Formula:
[tex]\frac{dy}{dx}= \frac{\frac{dy}{dt}}{\frac{dx}{dt}}\\\\[/tex]
[tex]\boxed{\bold{\frac{dy}{dx}=\frac{2t+5}{2t}}}[/tex]
To calculate the [tex]\bold{\frac{d^2y}{dx^2}}[/tex] we Differentiate the above equation but before that first solve the equation:
Equation:
[tex]\frac{dy}{dx}=\frac{2t+5}{2t}[/tex]
[tex]=\frac{2t}{2t}+\frac{5}{2t}\\\\= 1+\frac{5}{2t}\\\\=1+\frac{5}{2} t^{-1} \\[/tex]
Formula:
[tex]\bold{\frac{d}{dx} \ x^n = nx^{n-1}}[/tex]
[tex]\frac{dy^2}{dx^2}= 0+\frac{5}{2} (-1 t^{-2})\\\\[/tex]
[tex]= -\frac{5}{2} t^{-2}\\\\= -\frac{5}{2 t^2} \\\\[/tex]
[tex]\boxed{\bold{\frac{d^2y}{dx^2}=-\frac{5}{2t^2}}}[/tex]
Answer:
d2y dx2
Explanation:
Consider a Rational class designed to represent rational numbers as a pair of int's, along with methods reduce (to reduce the rational to simplest form), gcd (to find the greatest common divisor of two int's), as well as methods for addition, subtraction, multiplication, and division. Why should the reduce and gcd methods be declared to be private.
Answer:
There is not a reason for the two methods to be private unless you want to only allow objects of the class Rational to have access to these methods. Perhaps your professor has a particular reason for requiring it to be set up as such.
Explanation:
The use of the private space simply restricts access to either variables or methods contained within the space to the class object that is associated with the variable or methods.
The use of the public space allows the method or variable to be accessed from anywhere within the program.
Note, if using class inheritance, classes that inherit from the Rational class will not be able to access the private functions.
Identify the statement below which is true. Cloud computing eliminates the need for companies to own their own software and servers. Cloud computing is a control technique for system availability. Cloud computing eliminates the need for backup of applications and data. Cloud computing refers to the practice of storing application files and backup data on satellites "in the clouds."
Answer:
The answer is "Cloud computing is a control technique for system availability".
Explanation:
The term cloud computing provides on-demand computer network services, which including storing data (information) and computing resources, without client-specific active management. Its definition is often used to identify network infrastructure for several web users, that's why the above choice is a correct and wrong choice can be described as follows:
It also needs in businesses with using their apps and servers but can't be removed, that's why it is wrong It does n't only one the satellites, that's why it is wrong It is used for storing data not for removing, that's why it is wrong.Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data
Answer:
A
Explanation:
Ethernet connections allow the most mobility for users
Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access
Answer: D. The actual speed of a network can differ from the maximum advertised speeds
Explanation:
just got it correct on the test
Which one of these tasks best describes the process of localization?
Answer:
Localization is the process of adapting the project and service at a particular language.
Explanation:
Localization is that adapted to the product and service that need a desired to the popular look and feel.
Localization is to perform that including changing the local culture.
Localization is addition to perform the such details and time zone ,local color, holiday and name translation, money all to be considered.
Localization can sometimes be perform with automatic language translation.
Localization that requirement to the enabling product to be different national product known as globalization.
Brainly won't let me see any answers. I've been trying to check my answers for 45 minutes now. I am unable to see ANY answers at all. Please help. I really need to finish all my work by tonight. *URGENT*
Answer:
I'm having the same problem. I think it has something to do with the Honor Code
Explanation:
Meaning of software
Answer:
Is a collection of data or computer instructions that tell the computer how to work.
Explanation:
The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class that implements this interface represents a task to perform.
Answer:
Runnable.
Explanation:
Java is an all round programming language which is typically object-oriented and class-based. It was designed by James Gosling, developed by Sun microsystems and released officially on the 23rd of May, 1995. Java programming language is designed to have only a few implementation dependencies as possible because it was intended to be written once, and run on any platform.
Java makes concurrency to be available to software developers through the application programming interface (API) and the language. Also, it supports multiple threads of execution, by making each thread have its respective program counter and method-call stack, which then allow concurrent executions with other threads.
The preferred means of creating multithreaded Java applications is by implementing the runnable interface. An object of a class that implements this interface represents a task to perform. The code is public void run ().
CO! Oher...9
pressure
14.
large
The barometric height in a town is 65cmHg. Given that the standard atmospheric pressure
is 76cmHg and density of mercury is 13600kg/m", determine the altitude of the town. (Density of
(3mks)
air is 1.25kg/mº).
Answer:
Altitude of the town(h1) = 1,196.8 m
Explanation:
Given:
Height of barometer(h) = 65 cm Hg = 0.65
Standard atmospheric pressure = 76 cm Hg = 0.76
Density of mercury(Pm) = 13,600 kg/m³
Density of air (Pa) = 1.25 kg/m³
Find:
Altitude of the town(h1)
Computation:
Pressure due column = Δp mercury column
(Pa)(h1) = (Pm)(h)
(1.25)(h1) = (13,600)(0.76-0.65)
(1.25)(h1) = 1,496
Altitude of the town(h1) = 1,196.8 m
Dr. Garcia is a business professor at a large state college. At the start of each workday, he opens a Web browser on his office computer and accesses the university’s Web site. From there, he logs into his institution’s "MyCollege" portal with his username and password. From the portal he can access his email, Web pages for each of his courses, and confidential information about the students he advises. Most likely, Dr. Garcia is using what kind of network when using the portal?
Answer:
b. Intranet
Explanation:
An intranet refers to the private network that used to sharing the information, for collaboration, connecting the servcies, etc. It can be accessed by only the users who are authorized to use it. Plus, it only used inside the outside organization
So according to the given situation, since Dr Garcia has his credentials that represents the confidential information so it is an intranet netwrok