Answer:
probably false
Explanation:
because u dont want a budget to b exact u want it completely covered
What is the minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP addresses?
Question Completion with options:
The options are :
a. 1000
b . 10000
c. 100
d. 5000
Answer:
The minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP addresses is:
a. 1000
Explanation:
This means that one public IP address can expose 10 Internet of Things (IoT) devices with private IP addresses. This will make the load lighter and avoid conflicts. In addition, private IP addresses promote access on a network without taking up the limited public IP address space. All IoT devices must have their unique IP addresses to communicate through a network. No two computers or devices on the network should have the same IP address.
Which of these is NOT an example of a GUI?
a
virus protections software
b
microphone
c
icons
d
USB cord
Answer:
The answer to this question is given below in the explanation section.
Explanation:
First, we need to know what is the graphic user interface (GUI)?
A GUI is a form of user interface that allows the users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of a text-based user interface as in MS-DOS. Users interact through such devices using their icon, navigation using the mouse cursor, etc , and touching. In short, an interface that has graphical options.
so, in the context of the question, the following are examples of GUI.
Virus protection software: Because virus protection software has a graphical interface and user can use it easily by using its graphics and exploration functionality.
Icon: icon is an example of GUI because ICON built on other many graphics parts. In short, the icon is part of the GUI.
The followings are not the example of GUI:
Microphone and USB cord because these are the electronic parts and they don't possess the GUI.
list pros and cons of HCI technology
Answer:
Advantages:
• very flexible with the use of "switches"
• Good for "expert" users - can quickly access commands
• uses the fewest system resources
Disadvantages:
• requires the user to learn "complex" commands or languages
• "Hidden" features i.e. if you don't know the commands you won't know the features are there!
• not very good for novice users Command Line Interface Applications
• system administration
• engineering applications
• scientific applications
Explanation:
not much need of explanation
Azra wants to learn to program and knows it is important to be able to type well. Which of the following will contribute to the achievement of this goal? A. words per mile B. keys per line C. words per minute D. keys per function
Answer:
The answer to this question is given below in the explanation section.
Explanation:
In this question, a scenario is given about typing speed. The typing speed of someone can be easily monitored or guessed by how many words someone can write per minute.
So, in this context, Azra's goal to achieve fast and very well typing while doing programming.
so, she needs to learn and increase typing speed and this is measured in words per minute. That is about how many words she can type in a minute with accuracy.
So, the correct answer to this question is words per minute.
While the other options are not correct because:
words per mile, key per mile, and key per function don't determine its typing speed. and also note that the given options are also not logically suitable such as words per mile etc.
Answer:
Words Per Minute (WPM)
Explanation:
The other ones are not a thing.
-----------------------------------------------
I hope this helpedPlease tell me if it is wrongThank you and have a wonderful and blessed day!
-- Juri Davis
Describe the steps involved in data mining or data analytics when viewed as a process of knowledge discovery.
Answer:
1. Data Cleaning
2. Data Integration
3. Data Selection
4. Data transformation
5. Data Mining
6. Pattern Evaluation
7. Knowledge presentation
Explanation:
The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:
Step 1. Data cleaning: this involves the elimination of inconsistent data.
Step 2. Data integration: this involves the combination of data from multiple sources.
Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.
Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.
Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.
Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.
Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.
________ implies the maximum allowed size of each individual element in the data structure to be encoded to ziplist short structure.
Answer:
counting semaphore
Explanation:
Counting Semaphore is a technical term that is used to describe a form of Semaphore in computer operation that utilizes a count that enables assignments to be obtained or published on several occasions. The counting semaphore is established in such a way that it equals its count.
Hence, COUNTING SEMAPHORE implies the maximum allowed size of each individual element in the data structure to be encoded to ziplist short structure.
Modern CPUs need only a few ___________ to execute an instruction when all operands are in its registers.
Answer:
Nanoseconds.
Explanation:
A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.
Modern CPUs need only a few nanoseconds to execute an instruction when all operands are in its registers.
In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.
Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).
let Xi; i=1,2....,n from distribution with p.d.f , f(x) = ϑx^ϑ-1, 0
Answer:
User is very angry...................
..
Which type of hardware on a VM can be easily removed?
Fast
Physical
Real
Virtual
Virtual
Explanation: Because it is easy to remove from a VM because it is like a viries.
It is very easy to remove a virtual hardware on a Virtual Machine, as there is no use of physical attachments.
What is a hardware?A hardware is such component of a computer network that is used as equipment for smooth functioning of the system. For example, keyboard and mouse are hardwares.
A virtual hardware, on the other hand, is created on a cloud computing software, and is easily removable or detachable, as it does not require any actual physical hardware.
Hence, option D holds true regarding a hardware.
Learn more about hardware here:
https://brainly.com/question/15232088
#SPJ2
Select the three business advantages of globalization.
There is increased collaboration in problem solving.
It is easier for small businesses to compete.
There is an overall decrease in competition for business.
There are increased business opportunities.
It facilitates ease in communication.
Answer:
There is increased collaboration in problem solving.
There are increased business opportunities.
It facilitates ease in communication
100 POINTS!!!!!!
How does forecast information get to other government and business entities and to the public?
Answer:
Forecasting is valuable to businesses because it gives the ability to make informed business decisions and develop data-driven strategies. ... Past data is aggregated and analyzed to find patterns, used to predict future trends and changes. Forecasting allows your company to be proactive instead of reactive.
Answer:
Explanation:
There are many forecast information provided by government agencies. Since the question mentions business entities, it is likely related to economic forecast; like the quarterly report from the Federal Reserve Bank. That is usually how forecast info is shared: through released reports, public announcements, and printed sources like the Federal Register papers.
When looking at a program board at the end of program increment (PI) planning, what does it mean when a feature is placed in a team's swim lane with no strings
Answer:
It simply means that other teams can independently complete the feature.
Explanation:
PI or program increment is a planning interval during which an agile release train (ART) plans and produces working and tested software and systems. It takes a duration of 8 to 12 weeks
Agile teams can access and independently complete various ARTs found in their swim lanes with no strings.
Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or a mobile camera? Explain your answer by providing three reasons why your choice suits your needs.
Answer:
I would purchase a high-quality digital camera
Explanation:
As a blogger, I most times take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.
The light sensitivity as seen in the ISO, the shutter speed, megapixels, and view-finder are some features I would look out for in a high-quality digital camera.
Answer: To take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.
Explanation: copied the previous answer a bit to better suit the exam requirements.
Why I/O modules is needed between system bus
and I/O devices?
Answer:
1. Processor communication -- this involves the following tasks:
a. exchange of data between processor and I/O module
b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc.
c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors.
d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address.
2. Device communication – The I/O module must be able to perform device communication such as status reporting.
3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.
4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.
5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.
If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = int * N total int / 2 total = int. 2
Answer:
Yes
Explanation:
Because all answers are intotal (2)
Examine the following function header, then write a statement that calls the function, passing 12 as an argument. def show_value(quantity):
Based on the name of the function, it seems that we're supposed to only print the value of quantity to the console.
def show_value(quantity):
print(quantity)
show_value(12)
The first line of code creates the function, the second line of code prints the value of quantity to the console, and the last line of code calls our show_value function with 12 as our argument. I wrote my code in python 3.8. I hope this helps.
The top and bottom margins of each page are called the header and footer, respectively. The program is as follows:
def show_value(quantity):
print(quantity)
show_value(12)
What is meant by function header?The function's name is included in the header, which also provides information about the parameters and the type of data the function will return to the caller function or application. The instructions that must be followed are contained in the function's body.
The top and bottom margins of each page are called the header and footer, respectively. Headers and footers are useful for information that you want to appear on every page of a document, such as your name, the document's title, or page numbers.
It appears that we should only print the quantity's value to the console based on the function's name.
def show_value(quantity):
print(quantity)
show_value(12)
To learn more about function header refer to:
https://brainly.com/question/20358520
#SPJ2
Which statement will read an entire line of input into the following string object?
Select one:
a. cin << address;
b. cin address;
c. getline(cin, address);
d. cin.get(address);
e. None of these
Answer:
getline(cin, address);
Explanation:
Given
String object: address
Required
Statement that reads the entire line
The list of given options shows that the programming language is c++.
Analysing each option (a) to (e):
a. cin<<address;
The above instruction will read the string object until the first blank space.
Take for instance:
The user supplied "Lagos state" as input, only "Lagos" will be saved in address using this option.
b. cin address:
This is an incorrect syntax
c. getline(cin,address);
Using the same instance as (a) above, this reads the complete line and "Lagos state" will be saved in variable address
d. cin.get(address);
address is created as a string object and the above instruction will only work for character pointers (i.e. char*)
From the above analysis, option (c) is correct.
What skills, knowledge, and strengths do you feel you bring to the FlexPath program?
Answer:
The answer is below
Explanation:
Skills: Problem-solving skills, Great attention to details skills
Knowledge: Computer Literacy, Mathematical and Statistical skills
Strength: highly disciplined and well determined.
Hence, I understand that I possess all the aforelisted skills, knowledge, and strength, that would assist me during the Flexpath program.
This will make me excel and complete the required courses with good grades.
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
short description about your penfriend
Answer:
USEFUL WORDS:
Starting the first Letter. Hi! ...
Starting the second Letter. Hi! ...
Starting the second letter with an apology. I am sorry I did not reply earlier. ...
Saying Goodbye. Bye for now and write back soon! ...
Do not write everything in the first letter. The following are some ideas:
Introduce Yourself. ...
Introduce your family.
Explanation:
Check ALL that apply. Which statement is TRUE about Test Driven Development (TDD)? a) in TDD, when a program failure is observed it is a direct result of the last code written b) In TDD, there are no untested code sections in the delivered code c) In TDD, if all the tests pass, there is no need to refactor the code. d) In TDD, only the new tests are supposed to pass after implementing the new feature. e) In TDD, your tests should cover all the code that has been developed
The statements TRUE about Test Driven Development (TDD) are
In TDD, there are no untested code sections in the delivered code.In TDD, your tests should cover all the code that has been developed.The correct options are (b) and (e).
What is Test Driven Development?The test- driven development is used in the programming language for the designing many type of test cases in the computer system. The main goal of the test driven development is that it uses to make the system bug free and simple.
It is basically used in the organization to avoid duplication in the code and make the function more efficient.
The basic approach of the test driven development is that the test are develop so that it specify the function for the code to perform.
In TDD, there are no untested code sections in the delivered code.In TDD, your tests should cover all the code that has been developed.Thus, the statements (b) and (e) are TRUE.
Learn more about Test Driven Development.
https://brainly.com/question/13156414
#SPJ2
Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to a2d. Write some statements that assign true to isNegative if more integer elements in entire 2-dimensional array are negative than not.
Answer:
#include <iostream>
using namespace std;
int main(){
int rows, cols;
bool isNegatives;
cout<<"Rows: ";
cin>>rows;
cout<<"Columns: ";
cin>>cols;
int a2d[rows][cols];
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
cin>>a2d[i][j];} }
int negatives, others = 0;
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
if(a2d[i][j]<0){
negatives++;}
else{
others++;}} }
if(negatives>others){
isNegatives = true;}
else{
isNegatives = false;}
cout<<isNegatives;
return 0;
}
Explanation:
For clarity and better understanding of the question, I answered the question from the scratch.
This line declares number of rows and columns
int rows, cols;
This line declares the Boolean variable
bool isNegatives;
This line prompts user for rows
cout<<"Rows: ";
This line gets the number of rows
cin>>rows;
This line prompts user for columns
cout<<"Columns: ";
This line gets the number of columns
cin>>cols;
This line declares the array
int a2d[rows][cols];
This line gets user input for the array
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
cin>>a2d[i][j];} }
This line declares and initializes number of negative and others to 0
int negatives, others = 0;
The following iteration counts the number of negatives and also count the number of non negative (i.e. others)
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
if(a2d[i][j]<0){
negatives++;}
else{
others++;}} }
This checks of number of negatives is greater than others
if(negatives>others){
If yes, it assigns true to isNegatives
isNegatives = true;}
else{
If otherwise, it assigns false to isNegatives
isNegatives = false;}
This prints the value of isNegatives
cout<<isNegatives;
See attachment
Which of these AWS resources cannot be monitored using VPC Flow logs?a) V​PCb) A​ subnet in a VPCc) A network interface attached to EC2d) An Internet Gateway attached to VPC
Answer:
d) An Internet Gateway attached to VPC.
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Infrastructure as a Service (IaaS).
3. Software as a Service (SaaS).
Amazon Web Services (AWS) is an example of a cloud computing platform that offer its users a global cloud-based products and services such as storage, security, computing resources, database, analytics and management tools etc.
Some of the Amazon Web Services (AWS) resources that can be monitored using virtual private cloud (VPC) Flow logs includes;
I. A VPC
II. A subnet in a VPC
III. A network interface attached to EC2
However, an Internet Gateway attached to VPC is an AWS resource that cannot be monitored using virtual private cloud (VPC) Flow logs.
Here is the header for a function named computeValue:
void computeValue(int value)
Which of the following is a valid call to the function?
A) computeValue(10)
B) computeValue(10);
C) void computeValue(10);
D) void computeValue(int x);
Answer:
B) computeValue(10);
Explanation:
Given
Header: void computeValue(int value)
Required
Determine the valid call
To call a function from another function or from the main, the following syntax has to be used.
function-name(parameter-1, parameter-2, parameter-3,.....,parameter-n);
In the function header given:, the following can be observed:
The function name is computeValueIt has only one parameter and it is of type integerSo, to call the function; we make use of computeValue(10);
Where 10 represents the value of the parameter (i.e. argument)
When analyzing an image, you should consider composition, color, and
A. plot
B. lighting
C. audio
D. characters
Answer:
lighting
Explanation:
Imagine that we have a list of names called nameList. There are various algorithms we could run on it. Here's one such algorithm, which compares each name in the list to every other name:
Answer:
The algorithm has a quadratic time complexity of O(n^2)
Explanation:
The algorithm has two nested for-loop statements. The length of the name list is denoted as "n". Every name searched in the name list has a time complexity of n, therefore the time complexity of finding two names is (n x n) = n^2, which is denoted as O(n^2) in Big-O notation.
Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s fine because they are just teasing him. Which challenge is making it difficult to stop the cyberbullying of Mohammed? The classmates are using secure computers. The classmates are using technology positively. Mohammed doesn’t have any evidence of the cyberbullying. Mohammed doesn’t believe the cyberbullying exists
Answer:
Mohammed doesn't believe the cyberbullying exists.
Explanation:
If he knew he wouldn't say they are teasing him. I mean, how would their parents know he is being cyberbullied without evidence? Text messages(such as imessages) are most likely on phones, and not on computers.(Unless its an mac I believe.) And they are bullying him; its not using technology positively.
Answer:
d
Explanation:
🃒🂧🃖🃯🂶🂤ã¨ã’ã½ã‚…ãã£ã–
anyone have the Dell xps 13 laptop? if not pls don't answer but if you do, how is it going for you?
I do and it’s going alright; would recommend. Here’s what I think in bullet points.
- Good aesthetic design. Weave-like texture is nice and somewhat opulent.
- Good performance; you can overclock the i7 CPU.
- Battery life is at the upper end of the spectrum.
- No USB Type A Ports, big downside.
- Graphics are about 1000 points above industry average (3D Mark Fire Spark)
- Uses an SSD rather than a HDD; much quicker load time.
- I’d go for the $1,899 personally; it’s worth the extra money.
Thanks.
Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries
Answer:
The answer is "One week".
Explanation:
Following are the number represents of the given values:
Serial number (se) [tex]= 200302028[/tex]
Refresh (ref) [tex]= 3600 \ second = 1 \ hour[/tex]
Updated -retry (ret)[tex]= 3600 \ second = 1 \ hour[/tex]
Expiry [tex]= 3600 \times 24 \times 7 = 604800 \ second \ = 1 \ week[/tex]
Minimum [tex]TTL = 3600 \ min = 1 \ h[/tex]
What is the value of grade after the segment of code executes int result = 95?
if (result >= 90) grade = "A";
if (result >= 80) grade = "B";
if (result >= 70) grade = "C";
if (result >= 60) grade = "D";
else grade = "E";
Asnwer Choices
1.A
2.B
3.C
4.D
5.E
Answer:
the answer is A
because 80 to 90 is B
so 90 to 100 is A