5. Which one of the following best defines a network server?
O A A type of network system that provides resources to network clients
B A type of system where all devices on the network are clients
C A type of network with one server and multiple clients
O D A type of device that connects all all other network devices together

Answers

Answer 1

Answer:

i thank it is B for the answer


Related Questions

What makes Java platform independent?

Answers

Answer:

Java it is the use of Byte code that makes it platform independent.

Explanation:

Java platform independent language allows its the end users to access they source code and other language automatically,its a human readable language.

Java is created in the James Gosling at the sun micro systems,and java is an open source programming language, generally the people refer the java because its source connections.Java code may be use sequence of machine that can be use executed by the directly CPU,and all the program in java are compiled by java c.Java is an independent platform and variety of methods, its object oriented language, and java is study platform.Java program are compiled into byte code and that byte code is platform independent, and they machine execute the byte code the java virtual machine.Java is the platform independent because it does not depend on the type of platform,and the virtual machine also interpret the representations.Java compiler is the .class file or the byte code and the machine native code,java is that depend on java virtual machine.Java is does not required any licence to the run and they also reliable platform to work on.

Which symbol is at the beginning and end of a multiline comment block?

Answers

The beginning of a block comment or a multi-line comment is marked by the symbol /* and the symbol */ marks its end.

ethical issues of cyber bullying

Answers

Answer:

Explanation: As a student, I am aware of the existence of Cyber-bullying and the manner in which it can be carried out. I am also sensitive to the serious nature of the problem. However, I realise that I need to know more about the issue if I am to be effective in fostering a supportive learning environment in which students can grow as good digital citizens.

Cyber-bullying is similar to traditional psychological bullying in that-

There is an imbalance of power between the victim & perpetrator.

Victims draw negative attention & are isolated from their peer group.

Perpetrators are often encouraged & supported by their peer group.

The actions of the perpetrator are deliberate, repeated & relentless.

The negative attention is uninvited & unwanted by the victim.

The effects often cause depression, anxiety, low self-esteem, poorer mental & physical health and school avoidance.

_______tools enable people to connect and exchange ideas.A) Affective computing. B) Social media. C) Debugging D) Computer forensics.

Answers

Answer:

B) Social media.

Explanation:

Social media is well, a media, that allows you to share things with people and have discussions.

Imagine you were using some of our pixelation tools to create an image and you posted it online for your friends to see - but, a week later you find out someone took that image and put it on a T-shirt that they’re selling for $10 each.


Now that we understand Copyright, what would need to change in order for the scenario from the warm-up to be okay?

Answers

Answer:

I will develop a CREATIVE COMMONS LICENSE

Explanation:

Based on the scenario given what i would need to change for the scenario from the warm-up to be okay is for me develop CREATIVE COMMONS LICENSE and the reason why I would develop this type of license is that it will enable people or the public to freely make use of my work or have free licence to the work that I have created by freely using it on their own products which will enables them to sell their work which have my own work on them easily and freely without any form of restrictions.

Copyright allows the creator or owner of a property (usually intellectual property) to have an absolute right over his property.

What needs to be done in this scenario is to create a creative common license.

In copyright, creative common license allows the members of the public to make use of an intellectual property for free, while the owner still retains the ownership and right, over the property.

When the creative common license is done, the seller of the T-shirt can sell the T-shirt without remitting any incentive to you; however, the seller gives you credit and recognition for the image.

Read more about copyrights at:

https://brainly.com/question/17357239

How can you say that a computer is a versatile machine?​

Answers

Answer:

A computer is a versatile machine because is used for many purposes,a modern day computer can run multiple data at once making a fast and efficient machine very durable and effective for our use in all areas of life.

What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times. B. Only authorized personnel can access data. C. Each website should have privacy control settings. D. Clients cannot refuse to make payments once they place an order.

Answers

Answer:

Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data

Explanation:

Answer:

Clients cannot refuse to make payments once they place an order.

Explanation:

PLATO Cyber-security

I got 5/5 on the quiz.

if you exit a program without saving the document on which you are working, or the computer accidentally losses electrical power, the document will be lost

Answers

Depends on which program you are using. Some programs automatically save your work, even if you exit out of it or turn off your computer

One of the simplest and best known polyalphabetic ciphers is _________ cipher. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.

Answers

Answer:

Vigenere

Explanation:

Vigenere Cipher is an encryption method of alphabetic symbols that utilizes an easy form of polyalphabetic exchange which is carried out through Vigenere table.

Hence, in this situation, the correct answer is VIGENERE Cipher because it is the form of cipher whereby the set of related monoalphabetic substitution rules comprises of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is indicated by a key letter which is the ciphertext letter that substitutes for the plaintext letter.

Discuss the main characteristics of the database approach and how it differs from traditional file systems.

Answers

The database system allows the creation of a single depository of information, which is updated periodically and which can be used simultaneously by many users, since this type of system allows the effective sharing of all data stored in its depository . In addition, this is a secure system and is very difficult to break into. This is because of the efficiency of the software used to maintain it. However, the use of these softwares can be a little complicated for users, in addition to requiring a high economic cost to obtain them.

The traditional file system, in turn, each user must obtain their own file related to the application they want to run. This may seem dull in comparison to the database, but it is advantageous as it does not require any spending on software, as it is simple and there are several cheap and efficient tools and editors on the market. However, this system is not so safe, it can cause isolation of data and even data inconsistency, which disrupts the entire system.

HELP FAST PLEASE!!! What is a glass tube containing electrodes used as a switch to produce on or off signals for the computer? First person to answer gets branliest. :3

Answers

Answer:

The answer is... Vaccum Tubes...

This is one which was used in computers before the Phenomenal invention of Transisitors.

A glass tube containing electrodes used as a switch to produce on or off signals for the computer is a Vacuum Tube.

What is a vacuum tube?

A vacuum tube is a tube that controls the transfer of electrons inside a tub. It is a valve. It is also called an electronic device used in television, amplifiers, radios, etc.

A vacuum tube contains a cathode and anode. The cathode is heated, and it emits or releases electrons. This emission is called thermionic emission. It controls the transfer of electrons, in a high-charge device. This is applied to the device where the electric potential difference is very high.

Vacuum tubes are used in old times, they are still used in some industries.

Thus, a vacuum tube is a glass tube with electrodes that serves as a switch to generate on or off signals for the computer.

To learn more about vacuum tubes, refer to the link:

https://brainly.com/question/14992264

#SPJ2

How many pins are in the power supply connector that is typically used on most motherboards today?

Answers

Answer: 4 pins

Explanation:

Answer: 20+4 ATX pins.

Explanation: If you’re talking about supplying power from the PSU to the Motherboard then it would be the 20+4 pin connector. Back on old ATX motherboards it used to be the 20 pin connector.

Chunking is a good strategy for completing large assignments because it makes the work
O less boring.
more thorough.
less difficult
O more manageable.

Answers

I think it would be the fourth answer choice.

Answer:

D. more manageable

Explanation:

it wouldn't make the work less boring, wont make work less difficult and and it wont help u get more through quicker

Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to convert (a String) Accept that String Prompt the user for the value of the initial base (an integer) Accept that integer Prompt the user for the desired base of the output (an integer) Accept that integer If the String is not a legal expression of a number in the initial base, display an error message and exit the program. Convert the value represented by the String in the initial base to the desired base. Display the result.

Answers

Explanation:

import java.util.Scanner;

import java.math.BigInteger;

public class Main

{

private int x;  

public static boolean isValidInteger(String theValue, int theBase)

{    

BigInteger number = new BigInteger(theValue,theBase);

if(theValue.equals(number.toString(theBase)))

{

return true;

}

else

return false;

}

public static String convertInteger(String theValue, int initialBase, int finalBase)

{

boolean valid=isValidInteger(theValue,initialBase);

if(valid==true)

{

BigInteger number = new BigInteger(theValue);

return(number.toString(finalBase));

}

else

return("String not in initial base");  

}

public static void main(String[] args)

{

System.out.println("Welcome");

String value;

int ibase, dbase;

if(args.length==0)

{

Scanner S = new Scanner(System.in);

System.out.println("Enter Value to be converted :: ");

value = S.nextLine();

System.out.println("Enter initial base :: ");

ibase = S.nextInt();

System.out.println("Enter desired base :: ");

dbase = S.nextInt();

}

else

{

value=args[0];

ibase=Integer.parseInt(args[1]);

dbase=Integer.parseInt(args[2]);

}

  System.out.println("Change base "+convertInteger(value,ibase,dbase));  

}

}

Output

For demultiplexing a UDP socket is identified by:_____.

Answers

Answer:

1. Destination IP address

2. Destination Port number

Explanation:

Demultiplexing is a term that describes a procedure of transforming a signal that has multiple analog or digital signal flows into different initial and unconnected signals.

Hence, in this situation, the correct answer is that for the demultiplexing process, a UDP (User Datagram Protocol) socket is identified by both the destination IP address and destination port number

Today technology is based in Science and engineering, earlier it was based on
__________ _____-_____.

Answers

Answer:

Technical know-how

Explanation:

_______ tools enable people to connect and exchange ideas.
A) Affective computing.
B) Social media.
C) Debugging
D) Computer forensics.

Answers

Social media is a tool that enables people to connect and exchange ideas. Thus the correct option is B.

What is communication?

Communication is referred to the exchange of information between two individuals in the form of conversation, opinion, suggestion, or advice with the help of medium or direct interaction.

Social media is referred to as a tool of communication that enables people to share their ideas, thoughts, and opinions with a wide network of people and helps them to get information about the events happening in the world.

An internet tool for interaction, information sharing, and social networking is social media. Networking software that connects people around the world is an internet-based technology, strictly understood.

Therefore, option B is appropriate.

Learn more about Communication, here:

https://brainly.com/question/22558440

#SPJ5

Social media is a tool that enables people to connect and exchange ideas. Therefore, the correct answer is option B.

The exchange of information between two people in the form of conversation, opinion, suggestion, or advice with the use of a medium or direct interaction is referred to as communication.

Social media is referred to as a communication tool that enables individuals to communicate their thoughts, ideas, and opinions with a large network of people and assists them in learning about global events.

Social media is an online medium for communication, sharing of knowledge, and social networking. According to the definition of the term, internet-based technology includes networking software that links individuals worldwide.

Therefore, the correct answer is option B.

Learn more about communication here:

brainly.com/question/22558440

#SPJ6

Question 4
When something is saved to the cloud, it means it's stored on Internet servers
instead of on your computer's hard drive.

Answers

Answer:

Wait is this a question or are you for real

Answer:it is stored on the internet server instead

of your computer's hard drive.

Explanation:

the cloud is the Internet—more specifically, it's all of the things you can access remotely over the Internet.

Write a program to compute answers to some basic geometry formulas. The program prompts the user to input a length (in centimeters) specified as a floating point value. The program then echoes the input and computes areas of squares and circles and the volume of a cube. For the squares, you will assume that the input length value is the length of a side. For the circles, this same value becomes the diameter. Use the meter value input to calculate the results in square (or cubic) meters and then print the answers in square (or cubic) meters.

Answers

Answer:

import math

l = float(input("Enter length in cm: "))

l = l / 100;

print("Entered length is " + str(l) + " meters")

area_square = l * l

print("Area of square is " + str(area_square))

area_circle =  math.pi * l/2 * l/2

print("Area of circle is " + str(area_circle))

volume_cube =  l * l * l

print("Volume of cube is " + str(volume_cube))

Explanation:

*The code is in Python

Ask the user to enter the length in cm

Convert the length to meters and print it

Calculate the area of the square and print it (Since length is equal to a side, the area is length * length)

Calculate the area of the circle and print it (Since length is equal to the diameter, you need to divide it by two to get the radius. The area is pi * length/2 * length/2)

Calculate the volume of the cube and print it (Since length is equal to a side, the volume is length * length * length)

Which of the following statement about device formatting is FALSE?
A) Device manufacturers store the initial file-system data structures in the device.
B) Operating system can create multiple partitions with in a single device.
C) Volume creation is implicit when a file system is placed directly within a partition.
D) Not every partition contains a copy of the operating systems.

Answers

Answer:

The correct option is;

A) Device manufacturers store the initial file-system data structures in the device.

Explanation:

Before a storage device can be used for data storage, it is required to prepare the device for use and to make the device to become visible to the operating system by formatting of the device

New storage devices are not pre-formatted or come with a ready to use file system as there are different file systems specifically designed for particular  operating systems or operating environment.

Formatting creates partitions, makes the hard drive visible to the operating system and creates a file system that is new such that the storage device can be used for storing files.

Egyptian hieroglyphs were part of a writing system used by the ancient Egyptians. What type of graphic design elements did they contain?

Answers

Answer:

Logographic, syllabic, and alphabetic elements. I think thts what u were asking for?

Explanation:

Read the following code:

x = currentAge
print(x + 20)

What value will this code calculate?

Select one:
a. Age in 20 years
b. Age 20 years ago
c. Age at 20 years old
d. Age in the year 2020

Answers

Answer:

The answer is "A) Age in 20 years"

Explanation:

Assuming currentAge is declared and is an integer, you are adding 20 to your current age which means it will print your age in 20 years.

Its Option A - Age in 20 Years.
Thank You!

Web pages are accessed through a software program called a _____.A) ​web crawlerB) ​web browserC) ​web serverD) ​web app drawer

Answers

Answer: B) ​web browser

Explanation: A web browser may be explained as a software program or application available on various operating systems such as windows, Mac, Android, iOS among others. This program acts as an interface between information available on websites or pages and users. This application takes a specified uniform resource locator or web address as input and outputs the information available on a web page. Google Chrome, Internet Explorer, Microsoft edge, opera mini, Safari, Firefox and so on.

Why do I have two random warnings?

Answers

Just a guess, maybe you’ve been reported for having an incorrect answer two times? I’m really not sure I’m just trying to give out possibilities. Maybe if your a Brainly Helper you haven’t been active so they are giving you warnings? Does clicking on the warning tell you the reason for them? Maybe the system thinks your a robot? I’m not sure just trying to give possible reasons, but you could try contacting customer support, but they aren’t always the quickest at responding.

Have a good day!

Answer:

bc of katie

Explanation:

Does the submission include the file "SuperPower.java"? Does the file include a public class called "SuperPower"? Does the class include a public method called "main"? Is the "main" method static? Does the main method have a String assignment statement that uses "JOptionPane.showInputDialog"? Does the main method have a statement that uses "JOptionPane.showMessageDialog"? Does the program convert the String from "JOptionPane.showInputDialog" using the "toUpperCase" method? Does the submission include a screenshot that shows an Input dialog that asks, "What is your superpower?" Does the submission include a screenshot that shows a Message dialog stating " TO THE RESCUE!", where "" is the input converted to upper case?

Answers

Answer:    

Here is the program fulfilling all the requirements given:

import javax.swing.JOptionPane;      

public class SuperPower{

public static void main(String[] args) {

String power;

power = JOptionPane.showInputDialog("What is your super power?");

power = power.toUpperCase();

JOptionPane.showMessageDialog(null, power);} }

Explanation:

Does the file include a public class called "SuperPower"

See the statement:

public class SuperPower

Does the class include a public method called "main"? Is the "main" method static?

See the statement:

public static void main(String[] args)

Does the main method have a String assignment statement that uses "JOptionPane.showInputDialog"

See the statement:

power = JOptionPane.showInputDialog("What is your super power?");

Does the main method have a statement that uses "JOptionPane.showMessageDialog"?

See the statement:

JOptionPane.showMessageDialog(null, power);

Does the program convert the String from "JOptionPane.showInputDialog" using the "toUpperCase" method?

See the statement:

power = power.toUpperCase();

Does the submission include a screenshot that shows an Input dialog that asks, "What is your superpower?" Does the submission include a screenshot that shows a Message dialog stating " TO THE RESCUE!", where "" is the input converted to upper case?

See the attached screenshots

If the program does not let you enter an exclamation mark after "to the rescue" then you can alter the code as follows:

import javax.swing.JOptionPane;

public class SuperPower{

public static void main(String[] args) {

String power;

power = JOptionPane.showInputDialog("What is your super power?");

power = power.toUpperCase();

JOptionPane.showMessageDialog( null, power+"!");} } // here just add an exclamation mark which will add ! after the string stored in  power

The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups. Active Directory Administrative Center Active Directory Domains and Trusts Active Directory Sites and Services Active Directory Users and Computers

Answers

Answer:

Active Directory Users and Computers

Explanation:

Active Directory Users and Computers is a term that describes Microsoft Management Console that is utilized in conducting and managing Active Directory, the objects; which comprises of the users and computers, the Organizational Units, together with their characteristics.

Hence, the Active Directory Users and Computers utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups.

Research and a well-written problem statement are important because A)they give a clear understanding of the problem and its solution. B)they ensure that anyone in the general public will be able to understand and solve the problem. C)they give a list of the needs of the stakeholders. D)they ensure that questions still need to be asked about the problem.

Answers

Answer:

A. they give a clear understanding of the problem and it's solution

Explanation:

Research and a well-written problem statement are important because they give a clear understanding of the problem and its solution.

Answer:

Research and a well-written problem statement are important because

they give a clear understanding of the problem and its solution.

they ensure that anyone in the general public will be able to understand and solve the problem.

they give a list of the needs of the stakeholders.

they ensure that questions still need to be asked about the problem.

Write a program that prompts the user to input an integer that represents the money in cents. The program will the calculate the smallest combination of coins that the user has. For example, 42 cents is 1 quarter, 1 dime, 1 nickel, and 2 pennies. Similarly, 49 cents is 1 quarter, 2 dimes, and 4 pennies

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cent: "))

quarter = int(cents/25)

if quarter > 1:

     print(str(quarter)+" quarters")

elif quarter == 1:

     print(str(quarter)+" quarter")

cents = cents - quarter * 25

dime = int(cents/10)

if dime>1:

     print(str(dime)+" dimes")

elif dime == 1:

     print(str(dime)+" dime")

cents = cents - dime * 10

nickel = int(cents/5)

if nickel > 1:

     print(str(nickel)+" nickels")

elif nickel == 1:

     print(str(nickel)+" nickel")

penny = cents - nickel * 5

if penny > 1:

     print(str(penny)+" pennies")

elif penny == 1:

     print(str(penny)+" penny")

Explanation:

This line prompts user for input in cents

cents = int(input("Cent: "))

This line calculates the number of quarters in the input amount

quarter = int(cents/25)

This following if statement prints the calculated quarters

if quarter > 1:

     print(str(quarter)+" quarters")

elif quarter == 1:

     print(str(quarter)+" quarter")

cents = cents - quarter * 25

This line calculates the number of dime in the input amount

dime = int(cents/10)

This following if statement prints the calculated dime

if dime>1:

     print(str(dime)+" dimes")

elif dime == 1:

     print(str(dime)+" dime")

cents = cents - dime * 10

This line calculates the number of nickels in the input amount

nickel = int(cents/5)

This following if statement prints the calculated nickels

if nickel > 1:

     print(str(nickel)+" nickels")

elif nickel == 1:

     print(str(nickel)+" nickel")

This line calculates the number of pennies in the input amount

penny = cents - nickel * 5

This following if statement prints the calculated pennies

if penny > 1:

     print(str(penny)+" pennies")

elif penny == 1:

     print(str(penny)+" penny")

A general rule for printing is to use _____ fonts for headlines and serif fonts for body text. sans-serif fantasy cursive monospace

Answers

Answer:

sans-serif

Explanation:

Fonts can be defined as a graphical representation of texts which includes a collection of characters such as numbers, letters, symbols etc in various size, color, typeface, design or weight.

A general rule for printing is to use sans-serif fonts for headlines and serif fonts for body text. This ultimately implies that, for any printed work such as novels, books, newspapers etc, it is a general rule for a printer to use sans-serif fonts for headlines and serif fonts for body text in order to enhance readability.

Also, it can be reversed in some instances by using a serif font for headlines and a sans-serif font for the body of a text.

paragraph on how atms work

Answers

ATM (Automatic Teller Machine) is a banking terminal that accepts deposits and dispenses cash. ATMs are activated by inserting cash (in cases of ATM Depositing) or debit /credit card that contain the user's account number and PIN on a magnetic stripe (for cash withdrawals)
Other Questions
"In an ancient woods,made of ancient wood"What element does the author use in this line from the poem?A. MetaphorB. RepetitionC. Personification D. Hyperbole Find the sum of 4x^2-4x + 10 and 2x^2+ 5x 8. is y=x 4th power a function The number of ATP molecules produced during the anaerobic phase of cellular respiration is _______281632 what is justice? help me write an essay Round 45.396 to the nearest tenth what is the gradient of the line 3x+y=4 Find the remainder when x4+x3-2x2+x+1 is divided by x-1 (a)1 (b)5 (c)2 (d)3 What is Lennie's last name? Listen to the audio and then answer the following question. Feel free to listen to the audio as many times as necessary before answering the question.What is most likely going to happen? por qu entre el calcio (Ca) que pertenece al segundo grupo y el galio (Ga) que pertenece al tercer grupo hay 10 elementos, Que nombre reciben estos elementos? list out the problem of solution of communication in Nepal HELP PLEASE!!!what is the density of a cube that has the volume of 12mL and a mass of 6g? express in g/mL Which statement describes a disadvantage of Marnie paying a bill by telephone with a credit card or a debit card? Marnie will not have to find a stamp and a mailbox. Marnie will have to share her card account information. Marnies bill is paid immediately. Marnie may be eligible for a discount The A. J. Croft Company (AJC) currently has $200,000 market value (and book value) of perpetual debt outstanding carrying a coupon rate of 6 percent. Its earnings before interest and taxes (EBIT) are $100,000, and it is a zero-growth company. AJC's current cost of equity is 8.8 percent, and its tax rate is 40 percent. The firm has 10,000 shares of common stock outstanding selling at a price per share of $60.00.1. What is AJC's current total market value and weighted average cost of capital?2. The firm is considering moving to a capital structure that is comprised of 40 percent debt and 60 percent equity, based on market values. The new funds would be used to replace the old debt and to repurchase stock. It is estimated that the increase in riskiness resulting from the leverage increase would cause the required rate of return on debt to rise to 7 percent, while the required rate of return on equity would increase to 9.5 percent. If this plan were carried out, what would be AJC's new WACC and total value?3. Now assume that AJC is considering changing from its original capital structure to a new capital structure with 50 percent debt and 50 percent equity. If it makes this change, its resulting market value would be $820,000. What would be its new stock price per share?4. Now assume that AJC is considering changing from its original capital structure to a new capital structure that results in a stock price of $64 per share. The resulting capital structure would have a $336,000 total market value of equity and $504,000 market value of debt. How many shares would AJC repurchase in the recapitalization? Love, which cant be observed or measured directly, is an example of a psychological construct. true or false Miguel did the following math problem: 65 64 = 369. Which of the following is a true statement? 1.He is correct. 2.He is incorrect because he should have subtracted the exponents. 3.He is incorrect because he should have multiplied the exponents. 4.He is incorrect because he multiplied the bases. If A= -3, B= -7, C= 5, and D= 2, what does AB - CD= Question options: A.11 B.31 C. -11 D. -15 Which organelle is like the brain of the cell?O vacuoleO endoplasmic reticulumO cytoplasmO nucleus please help i cant do this and its due today please help !!