Answer:
Authentication
Explanation:
Remote access connections must be secured using authentication and encryption software. Authentication software confirms the identity of the user or computer system.
which of the following is not a suggestion used for evaluating a web site? question 1 options: a) who is the author of the web site? b) are the data up-to-date? c) does the site give accurate and complete references? d) all of these choices are suggestions for evaluating a web site.
d) all of these choices are suggestions for evaluating a web site. All of the options a), b), and c) are commonly used as suggestions for evaluating the credibility and authority of a website.
However, option d) "all of these choices are suggestions for evaluating a web site" is not a suggestion for evaluating a website because it is a statement about the other options. When evaluating a website, it's important to consider the credibility and authority of the author, the timeliness and accuracy of the information, and the completeness and quality of the references provided. These are some of the key factors that can help you determine whether the information on a website is credible and reliable.
Learn more about cloud: https://brainly.com/question/14723382
#SPJ4
help
If we are looking at the predictor "car type," which can take on the values "sedan" "coupe" "truck" "suv" "van" how many binary decision variables would we need to code this data into a usable format?
If we are looking at the predictor "car type," which can take on the values "sedan" "coupe" "truck" "suv" "van", we would need 4 binary decision variables to code this data into a usable format.
A binary decision variable is a variable with only two possible values: 1 or 0. The variable is referred to as a binary variable, a binary indicator, or a 0-1 variable .The binary variable is used to answer yes/no questions. the binary variable " the binary variable is set to 0.To code the car type data into a usable format, we can use the binary decision variables.
We can use four binary variables to code the data into a usable format. We can use one variable for each category of car type. The values of the binary variables for the different categories are as follows:Sedan - 1000Coupe - 0100Truck - 0010SUV - 0001Using this format, if a car is a sedan, its binary decision variable would be set to 1000. If a car is a coupe, its binary decision variable would be set to 0100, and so on.
To know more about sedan visit:
https://brainly.com/question/24286177
SPJ11
15
In the formula, =A5 - SD$26, SD525 is best bestbed as a
(1 Point)
absolute erence
function
eie eerence
Answer:
hi
Explanation:
The different between a compiler and a translaror
Answer:
Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. A translator usually has a fixed body of code that is required to translate the program.
Answer:
Answer: Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. ... A translator usually has a fixed body of code that is required to translate the program.
Explanation:
yall like portal 1 or 2
Answer:
i like both, but i personally like portal 2 the most.
Explanation:
What is the output for the following program? numB = 2 while numB < 15: numB = numB + 5 print(numB) Output:
The following program is a while loop that will output the following data
7,12,17.
In the first iteration, the variable numB is 2, since 2 is less than 15, the program will run the command
numB = numB+5 and it will print 7
The second iteration is still valid because numB is now 7 and is less than 15, so the program will run the command
numB = numB+5 and it will print 12
The third iteration is still valid because numB is now 12 and is less than 15, so the program will run the command
numB = numB+5 and it will print 17
The fourth iteration is not valid because numB is now 17 and is greater than 15, so the program will not run the command
Learn more:
https://brainly.com/question/19344465
Answer: 7,12,17.
Explanation: got it right on edgen
what is the relationship between a table of movies and a table of actorsactresses and how might it be implemented in a relational database?
The relationship between a table of movies and a table of actors/actresses in a relational database is a many-to-many relationship.
This is because a movie can have multiple actors/actresses, and an actor/actress can appear in multiple movies.To implement this relationship in a relational database, a third table known as a junction table or association table is used. This table contains foreign keys that reference the primary keys of the two related tables (movies and actors/actresses).The junction table typically includes additional columns that relate to the relationship between the two tables, such as the character name of the actor/actress in the movie, the year the movie was made, or the rating of the movie.
Learn more about many-to-many relationship: https://brainly.com/question/13437434
#SPJ11
television is a technological development that occurred during the .
Television has been a major technological development of the 20th century that has had a profound impact on our lives. With advances in technology and the rise of streaming services, it will continue to be an important part of our culture and society for years to come.
Television is a technological development that occurred during the 20th century. Invented in the late 1920s, television has become an integral part of modern society, serving as a means of communication, entertainment, and education.Television technology has advanced significantly since its inception. Early televisions used cathode ray tubes to display images, which were large and bulky. These have been replaced by flat-screen displays that are much thinner and more energy-efficient. Television signals have also evolved over time, from analog to digital, resulting in improved picture and sound quality.Television has played a significant role in shaping our culture and society.
It has brought us news and current events from around the world, allowing us to witness historical events as they happen. Television has also been a source of entertainment, bringing us countless hours of drama, comedy, and reality shows. It has also been used as a tool for education, with programs that teach everything from science and history to cooking and home improvement.In conclusion, television has been a major technological development of the 20th century that has had a profound impact on our lives. With advances in technology and the rise of streaming services, it will continue to be an important part of our culture and society for years to come.
Learn more about Historical events here,https://brainly.com/question/24513174
#SPJ11
Question 1
The acronym ISO stands for:
A.
Interconnection System Organization
B.
Interconnection System Operator
C.
Independent System Organization
D.
Independent System Operator
ISO stands for Independent System Operator, which is responsible for managing and ensuring the reliable operation of an electrical grid system.
The correct answer for the acronym ISO is D. Independent System Operator.
The term ISO refers to an Independent System Operator, which is an entity responsible for managing, controlling, and ensuring the reliable operation of an interconnected electrical grid system. The ISO plays a crucial role in maintaining the balance between electricity supply and demand, managing transmission congestion, and coordinating the operation of power generation units.
The ISO operates as a neutral and independent organization, separate from electricity generators and transmission owners, to ensure fair and efficient grid operation. Its primary objective is to maintain the stability, reliability, and security of the power system while facilitating competitive electricity markets.
The ISO's responsibilities typically include:
Grid Operation: The ISO continuously monitors the grid, manages real-time operations, and takes corrective actions to maintain system stability. It oversees the dispatch of power plants, manages transmission constraints, and maintains frequency and voltage within acceptable limits.Market Facilitation: The ISO facilitates the operation of competitive electricity markets. It ensures fair and transparent access to the transmission system for all market participants, schedules energy transactions, and settles financial transactions between buyers and sellers.Planning and Expansion: The ISO collaborates with stakeholders to develop long-term plans for the expansion and improvement of the transmission system. It assesses the need for new transmission infrastructure and coordinates its development to enhance system reliability and efficiency.Grid Reliability: The ISO establishes and enforces rules, standards, and protocols to ensure the reliable operation of the grid. It implements measures to prevent and mitigate system disturbances, coordinates emergency response, and fosters grid resilience.By fulfilling these responsibilities, the ISO acts as a vital entity in the electricity sector, promoting competition, reliability, and efficiency in power system operations. Its independent nature helps ensure impartial decision-making and fosters a level playing field for all market participants, contributing to the overall stability and performance of the electrical grid.
Learn more about Independent System Operator
brainly.com/question/16647759
#SPJ11
What is true about the command line in C++?
I. The first argument is the name of the program
II. Command line arguments are passed in an array
III. Use main(int argc, char* argv[])
I and III
All of these are true
I only
II and III
II only
The correct answer is I and III:
I. The first argument is the name of the program.
III. Use `main(int argc, char* argv[])`.
In C++, when executing a program from the command line, the first argument passed to the program is the name of the program itself. This is stored in the `argv[0]` element of the `argv` array.
The standard signature for the `main` function in C++ that accepts command line arguments is `main(int argc, char* argv[])`. Here, `argc` represents the number of command line arguments passed to the program, and `argv` is an array of strings (`char*`) containing those arguments. The first element of `argv` (`argv[0]`) is always the name of the program.
For example, if you run a C++ program called "myprogram" from the command line with additional arguments, it would look like this:
```
./myprogram arg1 arg2 arg3
```
In this case, `argc` would be 4 (including the program name), and `argv` would contain the following values:
```
argv[0] = "./myprogram"
argv[1] = "arg1"
argv[2] = "arg2"
argv[3] = "arg3"
```
So, to access the command line arguments within the C++ program, you can use the `argc` and `argv` parameters of the `main` function.
Learn more about C++ program here:
https://brainly.com/question/33180199
#SPJ11
Isla is writing a report on the best roller coasters in America. Which device could help her with this?
Drone
Navigation system
Smart watch
VR headset
The device could help Isla with the above is VR headset.
What is a report?Report writing is known to ne a kind of formal style of writing a lot about a topic. People of report writing about a school event , Business, etc.
The device could help Isla with the above is VR headset because it will help her to be as if she is inside the roller coasters.
Learn more about writing a report from
https://brainly.com/question/192736
Which among the following is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return?
A. Internet scams
B. Data manipulation
C. Theft
D. Malicious programs
Answer:
A. Internet scams.
Explanation:
Internet scams is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return through the use of a cloud service or the internet. Some examples of an internet scam are phishing scams, email spams, credit card scam, etc. It is simply centred around the provision of false information or misrepresentation of another party for the sole purpose of theft.
Hence, an internet scam is an illegal means of obtaining things from people and such is a cyber crime that is punishable by law.
in a wireless lan implementing wpa enterprise mode, where is the user's identification being verified? question 10 options: user's mobile device access point backend authentication server file server of lan
When using WPA Enterprise mode, the user's identification is being verified by an authentication server. The authentication server is usually a RADIUS server.
What is authentication server?
Applications utilise an authentication server to validate their users' credentials, which are often account names and passwords, via the network. A client that submits an valid set of credentials is given a cryptographic ticket that they can use to access different services later on. Authentication serves as the foundation for authorization, which determines whether a privilege may well be granted to a specific user or process, privacy, which prevents non-participants from learning information, and non-repudiation, which is inability to back out of actions that were carried out with the proper authorization and on the basis of authentication. Public key encryption, Kerberos, and passwords are common authentication algorithms.
To learn more about authentication server
https://brainly.com/question/28344936
#SPJ4
When downloading a large file from the iniernet Alexis interrupted the download by closing ber computer, Later that evening she resumed tbe download and noticed that the file was bowniosding at a constant rate of change. 3 minutes since resaming the download 7440 total MegaBytes (MB) of the file had been downloaded and 6 mintues siace resuming the download 13920 total MesaBytes (MB) of the file had been donstoaded A. From 3 to 6 minutes after she resumed downlooding, how many minutcs elapod? misules b. From 3 to 6 minutes after she resumed downloading, how many total MB of the file were dowaloaded? MB c. What is the consuant rate at which the file downloads? MegaByes per minule d. If the file continues downloadisg for an additional 1.5 minner (after tbe 6 mimutes afts she feramed downloading). 4. How many aditipeal MB of the flie were downloaded? MIB 14. What is the new total number of MB of the file Bhat have been downloaded? MEI
a) From 3 to 6 minutes after resuming the download, 3 minutes elapsed.
b) From 3 to 6 minutes after resuming the download, 6,480 MB of the file were downloaded.
c) The constant rate at which the file downloads is 2,160 MB per minute.
d) If the file continues downloading for an additional 1.5 minutes, an additional 3,240 MB of the file will be downloaded.
e) The new total number of MB of the file that have been downloaded will be 17,160 MB.
a) From the given information, we can determine the time elapsed by subtracting the starting time (3 minutes) from the ending time (6 minutes), resulting in 3 minutes.
b) To calculate the total MB downloaded, we subtract the initial downloaded amount (7,440 MB) from the final downloaded amount (13,920 MB). Therefore, 13,920 MB - 7,440 MB = 6,480 MB were downloaded from 3 to 6 minutes after resuming the download.
c) The constant rate at which the file downloads can be found by dividing the total MB downloaded (6,480 MB) by the elapsed time (3 minutes). Therefore, 6,480 MB / 3 minutes = 2,160 MB per minute.
d) If the file continues downloading for an additional 1.5 minutes, we can calculate the additional MB downloaded by multiplying the constant rate of download (2,160 MB per minute) by the additional time (1.5 minutes). Hence, 2,160 MB per minute * 1.5 minutes = 3,240 MB.
e) The new total number of MB of the file that have been downloaded can be found by adding the initial downloaded amount (7,440 MB), the MB downloaded from 3 to 6 minutes (6,480 MB), and the additional MB downloaded (3,240 MB). Thus, 7,440 MB + 6,480 MB + 3,240 MB = 17,160 MB.
In summary, Alexis resumed the download and observed a constant rate of download. By analyzing the given information, we determined the time elapsed, the total MB downloaded, the rate of download, the additional MB downloaded, and the new total number of MB downloaded. These calculations provide a clear understanding of the file download progress.
Learn more about constant rate
brainly.com/question/32636092
#SPJ11
Short response!
What is one way to prevent wardriving?
Answer:
Securing your wireless network with a strong password, encryption, and hiding your network's SSID can make it harder for unauthorized users to connect to your network, preventing wardriving. Monitoring your network and addressing security breaches can also help.
how to check if a string is a palindrome in java using recursion
To write a recursive function palindrome that checks if a given string is a palindrome, we can follow these steps. If the length of the string is 0 or 1, then it is a palindrome by definition, so return true.
The palindrome function takes a string s as input and checks if it is a palindrome using a recursive approach. In the base case, if the length of s is 0 or 1, then it is already a palindrome, so we return True. In the recursive case, we compare the first and last characters of s. If they are not the same, then s is not a palindrome, so we return False.
First, we define the function `palindrome(s)` with the input `s` being the string.
2. If the length of the string `s` is less than or equal to 1, we return True since single-character strings and empty strings are palindromes.
3. If the first character of the string `s[0]` is equal to the last character `s[-1]`, we move forward to check the substring without the first and last characters (`s[1:-1]`).
4. We repeat steps 2 and 3 recursively until we find a pair of characters that are not equal, in which case the function returns False, or the length of the substring becomes less than or equal to 1, in which case the function returns True, confirming that the input string is a palindrome.
To know more about palindrome visit:
brainly.com/question/23552790
#SPJ4
You use the analogy that a four-dimensional array is like a shelf of books.
Which part of the analogy does 3 refer to in myData[1] [3] [2] [6]?
page
book
row in the table
shelf
Answer:
Page
Explanation:
Edge 2020
The page part of the analogy, 3 refer to in myData[1] [3] [2] [6]. The correct option is A.
What is array?An array is a collection of memory locations, or "boxes," each of which has the same name and can store a single piece of data. An array's data must all be of the same data type.
The metaphor suggests that a four-dimensional array is similar to a book shelf.
A dimension is used in addition to length, breadth, and depth to enable the use of geometrical language when discussing occurrences that depend on four parameters.
Consequently, it may be said that a four-dimensional array is comparable to a shelf of books. In my Data are page, 2 refers to the analogy's relevant section.
Thus, the correct option is A.
For more details regarding analogy, visit:
https://brainly.com/question/2403481
#SPJ5
why is it dangerous to use hazard lights if you are parked by the roadway in bad weather
We never ………. TV in the morning.
Answer:
watch................
________ are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.
The storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives are called as Hybrid drives.
What is drive?Drive provides a storage space and speed for processing the data in the drive on the personal computers or laptops at low cost.
There are two types of drives- Solid state hard drives and Hard disks.
So, the combination of both the drives is named as Hybrid drives containing features of large space as well as higher processing speed.
Thus, Hybrid drives are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.
Learn more about drive.
https://brainly.com/question/10677358
#SPJ2
Describe how a cell’s content and format attributes are related.
Answer: They are independent and not related.
Explanation: Changing the format affects the content. Which of the following is NOT a way to change the column width in Excel?
what do you think are the IPO components in an online movie ticket booking system?
Pls answer correctly ASAP
Explanation:
Online Movie Ticket Booking System is a website to provide the customers facility to book tickets for a movie online and to gather information about the movies and theaters. Customer needs to register at the site to book tickets to the movie
Advantages of Online Booking Systems
Your business is open around the clock. ...
You can maximize reservations. ...
You get paid quicker. ...
You're not tied to a phone. ...
You can effortlessly up-sell add-ons. ...
It's easy to manage your calendar. ...
You get valuable insight about your business
write a paragraph on plastic and pollution within 100 words
Plastic is everywhere nowadays. People are using it endlessly just for their comfort. However, no one realizes how it is harming our planet. We need to become aware of the consequences so that we can stop plastic pollution. Kids should be taught from their childhood to avoid using plastic. Similarly, adults must check each other on the same. In addition, the government must take stringent measures to stop plastic pollution before it gets too late.
Plastic has become one of the most used substances. It is seen everywhere these days, from supermarkets to common households. Why is that? Why is the use of plastic on the rise instead of diminishing? The main reason is that plastic is very cheap. It costs lesser than other alternatives like paper and cloth. This is why it is so common.
Secondly, it is very easy to use. Plastic can be used for almost anything either liquid or solid. Moreover, it comes in different forms which we can easily mold.
Furthermore, we see that plastic is a non-biodegradable material. It does not leave the face of the Earth. We cannot dissolve plastic in land or water, it remains forever. Thus, more and more use of plastic means more plastic which won’t get dissolved. Thus, the uprise of plastic pollution is happening at a very rapid rate.
Most importantly, plastic pollution harms the Marine life. The plastic litter in the water is mistaken for food by the aquatic animals. They eat it and die eventually. For instance, a dolphin died due to a plastic ring stuck in its mouth. It couldn’t open its mouth due to that and died of starvation. Thus, we see how innocent animals are dying because of plastic pollution.
In short, we see how plastic pollution is ruining everyone’s life on earth. We must take major steps to prevent it. We must use alternatives like cloth bags and paper bags instead of plastic bags. If we are purchasing plastic, we must reuse it. We must avoid drinking bottled water which contributes largely to plastic pollution. The government must put a plastic ban on the use of plastic. All this can prevent plastic pollution to a large extent.
Answer:
Plastic is everywhere nowadays. People are using it endlessly just for their comfort. However, no one realizes how it is harming our planet. We need to become aware of the consequences so that we can stop plastic pollution. Kids should be taught from their childhood to avoid using plastic. Similarly, adults must check each other on the same. In addition, the government must take stringent measures to stop plastic pollution before it gets too late.
Uprise of Plastic Pollution
Plastic has become one of the most used substances. It is seen everywhere these days, from supermarkets to common households. Why is that? Why is the use of plastic on the rise instead of diminishing? The main reason is that plastic is very cheap. It costs lesser than other alternatives like paper and cloth. This is why it is so common.
Secondly, it is very easy to use. Plastic can be used for almost anything either liquid or solid. Moreover, it comes in different forms which we can easily mold.
Furthermore, we see that plastic is a non-biodegradable material. It does not leave the face of the Earth. We cannot dissolve plastic in land or water, it remains forever. Thus, more and more use of plastic means more plastic which won’t get dissolved. Thus, the uprise of plastic pollution is happening at a very rapid rate.
RGM Science and Math Tutoring Center, owned and managed by Argem Galang was established in 2019 to cater for the needs of grade school and high school students for online tutoring in Science and Mathematics subjects during the time of COVID19 pandemic. During 2020, Argem wants to know whether the center has sufficient cash to continue operating the center. She was able to collect the following transactions. The center's cash account was affected by receipts collected from tutees, P370,000; proceeds from sale of old computer, P8,000; the loan granted by CITIBANK to the tutoring center, P150,000; and additional investment from Argem, P50,000. On the other hand, cash was used to buy writing tablets, P15,000; to pay the bank interest of P7,500 and principal of P30,000; and to pay operating expenses of P185,000. Argem also made cash withdrawal of P20,000 during the year. The balance of the account "Cash" as of January 1, 2020 amounted to P 195,000. Required: Prepare the Statement of Cash Flows and answer the following: 1. How much is the net cash provided by operating activities? 2. How much is the net cash used for investing activities? 3. How much is the net cash provided by financing activities? 4. How much is the net increase/(decrease) in cash? 5. What is the ending cash balance?
The net cash provided by operating activities is P177,500. The net cash used for investing activities is P7,500. The net cash provided by financing activities is P200,000. The net increase in cash is P370,000. The ending cash balance is P560,000.
To prepare the Statement of Cash Flows, we need to categorize the transactions into operating, investing, and financing activities.
Operating Activities:
Receipts collected from tutees (P370,000) and proceeds from the sale of an old computer (P8,000) are cash inflows from operating activities. Operating expenses paid (P185,000) is a cash outflow from operating activities. The net cash provided by operating activities is the total cash inflow minus the total cash outflow, which is P370,000 + P8,000 - P185,000 = P177,500.
Investing Activities:
The purchase of writing tablets (P15,000) is a cash outflow for investing activities.
Financing Activities:
The loan granted by CITIBANK (P150,000) and additional investment from Argem (P50,000) are cash inflows from financing activities. The payment of bank interest (P7,500) and principal (P30,000) is a cash outflow for financing activities. The net cash provided by financing activities is the total cash inflow minus the total cash outflow, which is P150,000 + P50,000 - P7,500 - P30,000 = P200,000.
Net Increase/(Decrease) in Cash:
The net increase in cash is the sum of the net cash provided by operating activities and the net cash provided by financing activities, which is P177,500 + P200,000 = P377,500.
Ending Cash Balance:
The ending cash balance is the sum of the beginning cash balance (P195,000) and the net increase in cash, which is P195,000 + P377,500 = P572,500. However, since Argem made a cash withdrawal of P20,000 during the year, the ending cash balance is P572,500 - P20,000 = P560,000.
Learn more about activities here:
https://brainly.com/question/32352325
#SPJ11
what derogatory title do experienced hackers give to inexperienced hackers who copy code or use tools created by knowledgeable programmers without und
Inexperienced hackers benefit from script kiddie' expertise as computer operators.
What are novice hackers known as?A derogatory term known as "script kiddie" was created by computer hackers to describe immature but frequently just as dangerous individuals who take advantage of internet security flaws. Not all inexperienced hackers use script kids. Unskilled attackers do make an effort to become familiar with and comprehend the tools they employ.
What three categories of hackers are there?Black hat, white hat, and gray hat hackers are the three main subcategories of hackers. Although hackers are sometimes thought of as people who break into systems or networks and take advantage of security flaws, not all hacking is harmful or prohibited.
To know more about hackers visit :-
https://brainly.com/question/30419117
#SPJ4
Changing the position of the wing will
Answer:
will cause error in your pc many many many
Answer:
change the center of gravity and neutral point
Explanation:
I could use some research on the Palo Alto school though it has to be original
Answer:
in your own words .say what you think this sonnet is about
A(n) ____ filename is the name that differentiates a file from other files in the same directory. Group of answer choices
A(n) unique filename is the name that differentiates a file from other files in the same directory.
What is a file name?A file name is an identifier that uniquely identifies a file in a filesystem. A directory or folder is a container in a filesystem that contains files and other directories.Each file has a name that uniquely identifies it within that directory, which is a group of related files.
When a file is saved, it is given a filename that distinguishes it from other files in the same directory. A filename may include any combination of letters, numbers, and symbols, depending on the operating system and the filesystem in use.A unique filename is required for every file to prevent conflicts, such as overwriting or deleting files unintentionally.
A filename also aids in file retrieval and management by allowing users to locate and open files quickly. A filename may include a file extension that indicates the type of file and what program should be used to open it.
To summarize, a filename is the name given to a file to differentiate it from other files in the same directory. It is essential to provide a unique filename to each file to prevent any conflicts or issues.
To learn more about file :
https://brainly.com/question/28578338
#SPJ11
8.6 Code Practice: Question 2
Instructions
Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.
After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.
Sample Run
How many values to add to the array:
8
[17, 99, 54, 88, 55, 47, 11, 97]
Total 468
Answer:
import random
def buildArray(a, n):
for i in range (n):
a.append(random.randint(10,99))
arr = []
def sumArray(a):
tot = 0
for i in range(len(a)):
tot = tot + a [i]
return tot
arr = []
numbers = int(input("How many values to add to the array:\n"))
buildArray(arr, numbers)
print(arr)
print("Total " + str(sumArray(arr)) )
Explanation:
The program is an illustration of lists
ListsLists are variables that are used to hold multiple values in one variable name
Python ProgramThe program in Python, where comments are used to explain each line is as follows:
#This gets the number of inputs to the array
n = int(input("How many values to add to the array: "))
#This initializes the sum to 0
sumArray = 0
#This initializes a list
myList = []
#This iterates through n
for i in range(n):
#This gets input for the list elements
num = int(input())
#This appends the input to the list
myList.Append(num)
#This calculates the sum
sumArray+=num
#This prints the list elements
print(myList)
#This prints the sum of the list elements
print("Total",sumArray)
Read more about lists at:
https://brainly.com/question/24941798
Assuming auto-mdix is not supported, which of these devices would require a crossover cable when connecting to a router? (select all that apply.)
Devices that would require a crossover cable when connecting to a router are:
(B) Router(D) Host (PC)What is auto-MDIX?A medium-dependent interface (MDI) in a computer network describes the interface (both physical and electrical/optical) between a physical layer implementation and the physical medium used to carry the transmission. A medium-dependent interface crossover (MDI-X) interface is also defined by Ethernet over twisted pair. Auto MDI-X ports on newer network interfaces detect whether the connection requires a crossover and select the appropriate MDI or MDI-X configuration to match the other end of the link.If auto-MDIX is not supported, the router and host (PC) would require a crossover cable when connecting to a router.Therefore, devices that would require a crossover cable when connecting to a router are:
(B) Router(D) Host (PC)Know more about auto-MDIX here:
https://brainly.com/question/14014890
#SPJ4
The correct question is given below:
Assuming Auto-MDIX is not supported, which of these devices would require a crossover cable when connecting to a router? (Select all correct answers.)
(A) Bridge
(B) Router
(C) Hub
(D) Host (PC)
(E) Switch