Answer:
B) Network Systems
Explanation:
Is 10 teraflops good? How much does the best PC in the world have?
you are responsible for the design of a communications switch that has to provide 24/7 availability but that is not safety-critical. giving reasons for your answer, suggest an architectural style that might be used for this system.
Software architecture is the simply known as the platform or framework of a software system. There are different styles of software architecture such as data-centric, layered and object-oriented styles. etc.
What happens in architecture style?In Architecture Style, all software needs a well plan and detailed framework before trying to develop. Software architecture is regarded as a high level structure used for making software systems.
The reason for software creation with a specific functionalities is the center of software's architectural style and pattern used. Architectural style is focused based. it focuses on how to organize the code that is needed for creating the software.
Therefore, Software architecture is the simply known as the platform or framework of a software system. There are different styles of software architecture such as data-centric, layered and object-oriented styles. etc.
Learn more about software from:
brainly.com/question/23405852
#SPJ1
PLEASEEE HELP HURRY
To start searching for a scholarly article on G. o. ogle Scholar, you should:
"Type the title of the article or keywords associated with it." (Option A)
What is the rationale for the above response?Here are the steps you can follow:
Go to Go. o. gle Scholar website In the search box, type the title of the article or relevant keywords associated with it.Click the "Search" button.Browse through the search results to find the article you are looking for.Click on the title of the article to view the abstract and other details.If the article is available for free, you can download or access it directly from the search results page. If not, you may need to purchase or access it through a library or other academic institution.Note that you can also use advanced search options and filters available on Go. ogle Scholar to narrow down your search results based on various criteria, such as publication date, author, and journal.
Learn more about G. o. ogle at:
https://brainly.com/question/28727776
#SPJ1
you are trying to decide which disk technology to use on your new windows server 2019 installation. the server will be in heavy use around the clock every day, so high performance and reliability is a necessity. which technology is the best choice?
SAS is the server that will be in heavy use around the clock every day, so high performance and reliability is a necessity.
What is server?
A server is a piece of computer hardware or software (computer programme) that offers functionality to other programmes or devices known as "clients" in computing. The client-server model is the name given to this architecture. Servers can provide a variety of functions, sometimes referred to as "services," such as exchanging data or resources across several clients or conducting computation for a client. Multiple clients can be served by a single server, while a single client can use multiple servers.
To learn more about server
https://brainly.com/question/28392452
#SPJ4
echnician A says that UHSS is designed to absorb collision energy.
Technician B says that mild steel is designed to transfer collision energy.
Who is right?
A only
B only
Both A and B
Neither A nor B
Answer the following question by choosing the best option from the list below.
The need to upgrade which component would likely lead to replacing the computer?
CPU
hard drive
RAM
mouse
Answer:
RAM
Explanation:
Adding more memory is the easiest and most accessible way to upgrade your PC. It's affordable, you can do it on almost any desktop computer, and it doesn't require much tech know-how. It's also one of the best laptop upgrades if your machine allows it.
Which game is better? Among us or ROBLOX -
Answer:
Both are equally good, but Roblox is better for kids
Explanation:
This is because when you are imposter and kill someone it shows a bone and there is a bit of blood!
Answer:
Gud question...
Explanation:
Among us is violent
Roblox is good for kids
so 50 50
how many bits would be needed to count all the students in class today
Answer:
5 bits
Explanation:
Most classes have around 20 student with a 5-bit system goes up to 31 ( 1+2+4+8+16) and a 4-bit system(1+2+4+8) goes up to 15. Bits are the 1s and 0s and so a 5-bit system looks like this: 01001(18).
PLEASE HELP ASAP 100 POINTS AND BRAINLIEST
Which is the best description of the laws governing IT professionals? Most IT professionals have legal expertise and stay abreast of workplace laws. There are not any laws that impact the work and responsibilities of IT professionals and their workplace. IT professionals will find that all situations that are ethical also abide by the law Most laws are directed at the information, data, or intellectual property rather than the IT professional.
Answer:
d
Explanation:
If you wanted a smartphone with the fewest restrictions on application development which smartphone operating system should you choose
Answer:
Apple iOS
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Basically, softwares are categorized into two (2) main categories and these are;
I. Proprietary software: it's also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer.
II. Open-source software: it's a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.
An Apple iOS is an example of an operating system that has the open-source software features and as such its users are faced with minimal restrictions on application development.
This ultimately implies that, if you wanted a smartphone with the fewest restrictions on application development the smartphone operating system you should choose is Apple iOS.
A good DBMS incorporates the services of a ____ to organize the disk files in an optimal way, in order to minimize access time to the records.
Answer:
A good DBMS incorporates the services of a "file manager" to organize the disk files in an optimal way, in order to minimize access time to the records.
Create a flowchart that will accept 10 whole numbers one at a time and print the highest and the lowest. Use Switch.
I will create a sequence of steps that would accept 10 whole numbers one at a time and print the highest and the lowest in Java:
Import javax.swing.JOptionPane;
public class loop_exer2 {
public static void main(String agrs[])
{ String input; int trial=10, sc=0, h=0, l=0, test=0;
System.out.print("Scores: ");
for (int ctr=1;ctr<=10;ctr ) {
input=JOptionPane.showInputDialog("Enter the Scores [" trial "] trials "); sc=Integer.valueOf(input); System.out.print(sc ", ");
if(test==0){h=sc;l=sc;test=1;}
if(sc>h){h=sc;}
else if(sc>h){
h=sc; {
else if(sc<1) {
l=sc;
}
JOptionPane.showMessageDialog (null, "Highest score is:" h "Lowest score is:" l);
System.out.println();
System.out.println ("Highest score is: " h);
System.out.println ( "Lowest score is: "l);
}
}
What is a Flowchart?This refers to a diagram which is used to represent the various steps which a system uses to create a step by step solution.
From the above code, there is the command to accept whole numbers in String and then request for them one at a time and after the computation, display the highest and lowest numbers.
Read more about flowcharts here:
https://brainly.com/question/6532130
A _______ occurs when access to a website is interrupted because there are to many simultaneous requests, and result in a _______ when the time limit for accessing the resource is reached.
Blank 1: Denial of Service or Timeout
Blank 2: Denial of Service or Timeout
Answer:
A timeout occurs when access to a website is interrupted because there are too many simultaneous requests, and may result in a denial of service when the time limit for accessing the resource is reached.
Explanation:
The timeout occurs when access to a website is interrupted because there are too many simultaneous requests and results in a Denial of service when the time limit for accessing the resource is reached.
What is a website?A website is a collection of web pages and related material that is published on at least one server and given a shared domain name.
Websites like Face-book, Linkedin, Etsy, and Online databases are examples of well-known ones. The World Wide Web is the aggregate name for all publicly accessible websites.
As we know,
When there are too many requests made at once, access to a website is interrupted, and when the time limit for accessing the resource is met, a Denial of Service occurs.
Thus, the timeout occurs when access to a website is interrupted because there are too many simultaneous requests and results in a Denial of service when the time limit for accessing the resource is reached.
Learn more about the website here:
https://brainly.com/question/19459381
#SPJ6
does the rfid tag have a portion of memory that can be locked (for item number) and a portion that can be re-programmed?
Yes, RFID tags typically have a portion of memory that can be locked and a portion that can be re-programmed.
RFID tags consist of a microchip that contains a small amount of non-volatile memory, which can be used to store data such as item numbers, serial numbers, and other information. This memory is typically divided into several blocks or sectors, each of which can be locked or unlocked independently.
The idea behind locking a block of memory is to prevent its contents from being modified. This can be useful in situations where the data stored in the memory is critical or sensitive, and needs to be protected from unauthorized access or tampering. For example, an RFID tag on a high-value item might have a lockable block of memory that contains a unique identifier for the item, which cannot be changed once it has been programmed.
On the other hand, other blocks of memory on the tag may be left unlocked, and can be re-programmed as needed. This allows the tag to be updated with new information, such as the item's location, status, or other relevant data.
In summary, RFID tags typically have a portion of memory that can be locked to prevent modification, as well as a portion that can be re-programmed to update the tag's data.
Yes, RFID tags do have a portion of memory that can be locked and a portion that can be re-programmed.
What's The locked portion of memoryThe locked portion of memory is typically used to store unique identifiers, such as item numbers or serial numbers, which cannot be changed once programmed. This ensures that the tag can always be identified and tracked throughout its lifecycle.
The re-programmable portion of memory, on the other hand, can be used to store variable information, such as shipping information, location data, or maintenance history. This allows the tag to be updated as needed to reflect changes in the item or its surroundings.
The ability to lock and re-program portions of the tag's memory makes RFID technology a powerful tool for inventory management, supply chain logistics, and asset tracking across a wide range of industries.
Learn more about RFID tags at
https://brainly.com/question/31441836
#SPJ11
Assign numMatches with the number of elements in userValues that equal matchValue. Ex: If matchvalue = 2 and uservals = [2, 2, 1, 2], then numMatches = 3. function numMatches = Findvalues(uservalues, matchvalue) % userValues: User defined array of values % matchValue: Desired match value arraysize = 4; % Number of elements in uservalues array numMatches = 0: % Number of elements that equal desired match value % Write a for loop that assigns numMatches with the number of % elements in uservalues that equal matchvalue.
The provided code defines a function called "Findvalues" that takes two input arguments: "uservalues" (an array of user-defined values) and "matchvalue" (the desired value to match).
The goal is to determine the number of elements in "uservalues" that equal "matchvalue" and assign this count to the variable "numMatches".To accomplish this, the code initializes "numMatches" to 0 and then utilizes a for loop to iterate through each element in "uservalues". Inside the loop, it checks if the current element is equal to "matchvalue" and increments "numMatches" by 1 if a match is found.
The implementation of the function is as follows:
function numMatches = Findvalues(uservalues, matchvalue)
arraysize = numel(uservalues); % Number of elements in uservalues array
numMatches = 0; % Number of elements that equal the desired match value
% Iterate through each element in uservalues
for i = 1:arraysize
% Check if the current element is equal to matchvalue
if uservalues(i) == matchvalue
numMatches = numMatches + 1; % Increment numMatches
end
end
end
This function can be called with the appropriate arguments to determine the number of elements in "uservalues" that equal "matchvalue". For example, if "uservalues" is [2, 2, 1, 2] and "matchvalue" is 2, the function will return numMatches as 3.
Learn more about matchvalue here: brainly.com/question/15739286
#SPJ11
Which of the following is Microsoft Windows 10 virtualization technology?
Guest OS
Hyper-V
Hyper-10
Network utilities
Answer:
Hyper-V
Explanation:
lets you run a software version of a computer, called a virtual machine. Each virtual machine acts like a complete computer, running an operating system and programs
example:
you can run a virtual Linux computer on your windows
microsoftdocs
Prior to privatization, which form of electronic media was the result of a collaboration between the u. S. Government and higher education?.
Before privatization, the form of electronic media that was the result of a collaboration between the U.S. government and higher education was:
the ARPANET.
ARPANET (Advanced Research Projects Agency Network) was the first operational packet switching network and the predecessor to the global Internet.
It was created in the late 1960s as a collaboration between the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) and several universities.
The goal of ARPANET was to develop new computer communication technologies and to explore the potential for wide-area networking. The success of ARPANET paved the way for the widespread commercialization of the Internet.
The first message sent on the ARPANET network was sent by computer science researcher Charley Kline from the University of California, Los Angeles to computer science researcher Bill Duvall at the Stanford Research Institute on October 29, 1969.
Learn more about ARPANET:
brainly.com/question/30156686
#SPJ4
What kind of file is this? What is it used for? Describe a situation where you might want to create
this type of file.
Write two example use of relationships ICT
Answer:
Read it all before you write if this isn't what you searching for I'm sorry...:(
A relationship, in the context of databases, is a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table. Relationships allow relational databases to split and store data in different tables, while linking disparate data items.
For example, in a bank database a CUSTOMER_MASTER table stores customer data with a primary key column named CUSTOMER_ID; it also stores customer data in an ACCOUNTS_MASTER table, which holds information about various bank accounts and associated customers. To link these two tables and determine customer and bank account information, a corresponding CUSTOMER_ID column must be inserted in the ACCOUNTS_MASTER table, referencing existing customer IDs from the CUSTOMER_MASTER table. In this case, the ACCOUNTS_MASTER table’s CUSTOMER_ID column is a foreign key that references a column with the same name in the CUSTOMER_MASTER table. This is an example of a relationship between the two tables.
What can aspects of a digital paint brush can you customize ( Choose all that apply) A) size B) color C)Opacity D) Edge hardness
All because it all counts.
in cell reference if you copy formula to another cell the cell reference to the formula will change according
Answer:
the type of reference
Explanation:
There are many cell reference types eg relative,absolute and mixed cell referencing. if you write your cell reference in relative type then it will change as you copy it to another cell. if you select absolute cell referencing then it will not change if you copy to another cell.
In a day, a car passes n
kilometers. How many days does it take to travel a route of length m
kilometers?
The program receives as input in the first line a natural number n
and in the second line a non-negative integer m
. Python code
#Calculate days.
def calculateDay(m, n):
assert isinstance(m, int) and m >= 0, "m should be a natural number."
assert isinstance(n, int) and n > 0, "n shouldn't be negative."
return m/n
#Main function
def Main():
m, n = input().split()
print(f'Result: {calculateDay(int(m),int(n)):.2f} days.')
#Point.
if(__name__ == "__main__"):
Main()
a person who creates a computer virus is called
Answer:
A person who creates computer virus is known as hacker.
Which HTML tag would you use to create a list like the one below? red blue green ol ul unorderlist orderlist
Answer:
Unordered list
Explanation:
Given
The html tag needed to create the given list
The list is not properly presented; however, the list in a properly presented question is as follows:
redbluegreenThe code to generate the above output is:
<ul>
<li>red</li>
<li>blue</li>
<li>green</li>
</ul>
When a list is generated using the <ul> ... </ul> tag, such list is an unordered list.
Answer:
ul
Explanation:
The < ul > tag is used to create an unordered list.
Why is it so important to have a checking account?
Answer: Having a checking account sets you up for financial success. Get access to your money quicker, complete financial transactions on your phone or tablet, rest assured that your money is protected, and easily track your spending so you can make better money choices.
Explanation: Hopefully this helps you. (pls don't report if wrong)
Which is the fastest CPU and why?
Answer:
the core i7 9700k because first it has a higher ghz count and its unlocked and has more cores
Explanation:
The coordinates that determine the position of an element in space are expressed as:
A. Different Shapes
B. 1, 2, 3
C. X, Y, Z
D. L, T, P
Answer:
xyz
Explanation:
think of it like a graph, you graph on the x, y, and z coordinates
Assume that three jobs arrive at approximately the same time (arrival time are all 0), but Job A arrives slightly before Job B, and Job B arrives slightly before job C (if the jobs must be selected in order, the order should be A->B->C). Job A requires 3 sec of CPU, Job B is 5 secs, and Job C is 4 secs. Assume a time-slice of 1 second.
i. Given a RR scheduler, what is the average response time of the three jobs?
ii. Given an SJF scheduler, what is the turnaround time of job B?
iii. Given a FIFO scheduler, what is the turnaround time of job B?
The average response time for all three jobs in the RR scheduler is 1 second. The turnaround time for Job B in the SJF scheduler is 5 seconds, while the turnaround time for Job B in the FIFO scheduler is 8 seconds
For the average response time in the RR scheduler, since all three jobs arrive at the same time and have equal priority, the average response time will be the same for each job. The average response time is the time it takes for a job to receive its first time slice. In this case, the time slice is 1 second, so each job will get its first time slice in the first second. Therefore, the average response time for each job is 1 second.
For the turnaround time in the SJF scheduler for Job B, the turnaround time is the total time from the arrival of the job until it completes its execution. Since Job B has a CPU burst time of 5 seconds, and it arrives after Job A, it will start its execution after Job A completes its 3-second CPU burst. So, the turnaround time for Job B will be 5 seconds.
For the turnaround time in the FIFO scheduler for Job B, the turnaround time is calculated based on the order of arrival of the jobs. Since Job B arrives after Job A, it will start its execution after Job A completes its 3-second CPU burst. Therefore, the turnaround time for Job B will be 8 seconds, which is the sum of the CPU burst times of Job A and Job B.
To learn more about CPU burst, click here:
brainly.com/question/22266515
#SPJ11
.
you've just installed a new network-based ids system that uses signature recognition. what should you do on a regular basis? answer check for backdoors. update the signature files. modify clipping levels. generate a new baseline.
In order to detect any suspicious activity, a signature-based IDS monitors packets moving across the network and compares each packet against a database of known IOCs or attack signatures.
However, anomaly-based intrusion detection systems can alert you to unknown suspicious behavior. Similar to antivirus software, a signature-based intrusion detection system (SIDS) tracks every packet moving through a network and compares it to a database of attack signatures or characteristics of known dangerous threats.
A network-connected system known as a "honeypot" is used as a decoy to lure online attackers to detect, block and investigate attempts to break into information systems without authorization.
Learn more about intrusion here-
https://brainly.com/question/10848561
#SPJ4
Suppose cell C5 contains the formula =B$6+C1.
Match each formula with its respective cell if you copied it.
=A$6+B4 =B$6+C6 =C$6+D2 =D$6+E1
Thank you, have a great week.
Answer:
=A$6+B4 will be in B8
=B$6+C6 will be in C10
=C$6+D2 will be in D6
=D$6+E1 will be in E5
Explanation:
$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.
As formulars are copied, the references change respectively.
With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.
As we move left and right, the column alphabet will also experience change like the rows did.
Only the absolute reference won't change no matter the direction.
Hence,
=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8
=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10
=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6
=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5