Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The function adds offsetAmount to each of the first two parameters. Make the first two parameters pass by pointer. Sample output for the given program:

Answers

Answer 1

Answer:

Here is a UpdateTimeWindow() method with parameters timeStart, timeEnd, and offsetAmount

// the timeEnd and timeStart variables are passed by pointer

void UpdateTimeWindow(int* timeStart, int* timeEnd, int offsetAmount){

// this can also be written as  *timeStart = *timeStart + offsetAmount;

*timeStart += offsetAmount;  //adds value of offsetAmount to that of //timeStart

// this can also be written as  *timeEnd = *timeEnd + offsetAmount;

  *timeEnd += offsetAmount;  } //adds value of offsetAmount to that of //timeEnd

Explanation:

The function has three int parameters timeStart, timeEnd, and offsetAmount.

First two parameters timeStart and End are passed by pointer. You can see the asterisk sign with them. Then in the body of the function there are two statements *timeStart += offsetAmount; and *End+= offsetAmount; in these statements the offsetAmount is added to the each of the two parameters timeStart and timeEnd.

Define A Function UpdateTimeWindow() With Parameters TimeStart, TimeEnd, And OffsetAmount. Each Parameter

Related Questions

(Convert letter grade to number) Write a program that prompts the user to enter a letter grade A/a, B/b, C/c, D/d, or F/f and displays its corresponding numeric value 4, 3, 2, 1, or 0.

Sample Run 1 Enter a letter grade: B The numeric value for grade B is 3

Sample Run 2 Enter a letter grade: b The numeric value for grade b is 3

Sample Run 3 Enter a letter grade: T T is an invalid grade

Answers

Answer:

This program is written in Python Programming Language

Program doesn't make use of comments (See Explanation Section for detailed explanation)

letterg = ['A','B','C','D','F']

inp = input("Enter a Letter Grade: ")

for i in range(len(letterg)):

if inp.upper() == letterg[i]:

print('The numeric value for grade ', inp, ' is ',4 - i)

break;

else:

print(inp, "is an invalid grade")

Explanation:

This line initializes all letter grade from A to F

letterg = ['A','B','C','D','F']

This line prompts user for letter grade

inp = input("Enter a Letter Grade: ")

This line iterates through the initialized letter grades

for i in range(len(letterg)):

This line checks if the user input is present in the initialized letter grades (it also takes care of lowercase letters)

if inp.upper() == letterg[i]:

This line is executed if tge about condition is true; the line calculates the number grade and prints it

print('The numeric value for grade ', inp, ' is ',4 - i)

This line terminates the iteration

break;

If the condition above is not true

else:

This line is executed

print(inp, "is an invalid grade")

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?

Answers

Answer:

third ighjojdudjz

ghddduewjj

wkckdjjj

Explanation:

cchmddkhwmx

ndhdnahdd

jruditndjed

What physical security measure is used to ensure that portable devices will be more difficult to steal?
O Cable lock
O Password
O PIN
O VPN

Answers

Cable lock, key word “physical”.

A portable gadget is any equipment that may be transported conveniently. The correct option is A.

What is a portable device?

A portable gadget is any equipment that may be transported conveniently. It is a computer device with a compact form factor that is meant to be handled and utilized in the hands.

The physical security measure that is used to ensure that portable devices will be more difficult to steal is a Cable lock.

Hence, the correct option is A.

Learn more about Portable Device:

https://brainly.com/question/11213213

#SPJ2

There is a function we are providing in for you in this problem called square. It takes one integer and returns the square of that integer value. Write code to assign a variable called xyz the value 5*5 (five squared). Use the square function, rather than just multiplying with *. Save

Answers

Answer:

xyz = 25  

result = square(xyz)

print(result)

The above code assigns the value 25 to variable xyz as 5*5=25. Then next statement is a function call to square() function passing xyz to this function in order to compute the square of 25. The output is:

625

Explanation:

The above code can also be written as:

xyz = 5*5

result = square(xyz)

print(result)

The difference is that xyz is assiged 5*5 which is equal to 25 so the output produced will be the same i.e.  625.

The result variable is used to store the value of square of 25 after the square() method computes and returns the square of 25. So print(result) prints the resultant value stored in the result variable i.e. 625

in java how do i Write a method named isEven that accepts an int argument. The method should return true if the argument is even, or false otherwise. Also write a program to test your method.

Answers

Answer:============================================

//Class header definition

public class TestEven {

   

   //Method main to test the method isEven

   public static void main(String args[ ] ) {

       

       //Test the method isEven using numbers 5 and 6 as arguments

       System.out.println(isEven(5));

       System.out.println(isEven(6));

     

   }

   

   //Method isEven

   //Method has a return type of boolean since it returns true or false.

   //Method has an int parameter

   public static boolean isEven(int number){

       //A number is even if its modulus with 2 gives zero

      if (number % 2 == 0){

           return true;

       }

       

       //Otherwise, the number is odd

       return false;

   }

}

====================================================

Sample Output:

=========================================================

false

true

==========================================================

Explanation:

The above code has been written in Java. It contains comments explaining every part of the code. Please go through the comments in the code.

A sample output has also been provided. You can save the code as TestEven.java and run it on your machine.

Methods are collections of named program statements that are executed when called or evoked

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

   public static void main(String args[ ] ) {

       //This creates a Scanner Object

       Scanner input = new Scanner(System.in);

       //This gets input for the number

       int num = input.nextInt();

       //This calls the function

       System.out.println(isEven(num));

  }

  public static boolean isEven(int num){

      //This returns true, if num is even

      if (num % 2 == 0){

          return true;

      }

      //This returns false, if otherwise

      return false;

  }

}

Read more about methods at:

https://brainly.com/question/20442770

A virus that attaches to an executable program can do anything that the program is permitted to do.
a) true
b) false

Answers

Answer:

a) True

Explanation:

A macro virus infects executable portions of code. A virus that attaches to an executable program can do anything the program is permitted to.

Most use an Email for spreading macro viruses, which is a common method and is rather easy. Although, more advanced softwares trick people into giving personal information.

The goal of what technology research is to provide solutions to physical and health related problems

Answers

Answer:Crisis-mapping

Explanation:

Answer:

Crisis Mapping

Explanation:

The famous Fibonacci sequence, 1, 1, 2, 3, 5, 8, 13, . . . , begins with two 1s. After that, each number is the sum of the preceding two numbers. Write a program using a recursive function that requests an integer n as input and then displays the nth number of the Fibonacci sequence.

Answers

Yo bro I just need help with you

Answer:

int recursiveFunction(int n) {

 

if (n == 0 || n == 1) {

 

 return n;

}

else {

 

 return recursiveFunction(n - 2) + recursiveFunction(n - 1);

}

Explanation:


Enter key is also known as Return key. (True or false)

Answers

Answer:

I think false

hope it helps

Answer:

False

Explanation:

The return key is the backspace or escape key.

Hope it helps.

Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require at least a paragraph for each type of firewall.
Acme Corporation wants to be sure employees surfing the web aren't victimized through drive-by downloads. Which type of firewall should Acme use? Explain why your answer is correct.

Answers

Answer:

packet filtering

Explanation:

We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D

ICMP
(a) is required to solve the NAT traversal problem
(b) is used in Traceroute
(c) has a new version for IPv6
(d) is used by Ping

Answers

Answer:

(b) is used in Traceroute

(d) is used by Ping

Explanation:

ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;

i. Requested service is not available

ii. Host could not be reached

ICMP does not use ports. Rather it uses types and codes. Some of the most common types are echo request and echo reply.

Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as Time Exceeded) to trace a network route.

Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP echo request packets to the host and then waits for an ICMP echo reply from the host.

ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.

Bernard has a visual disability. Which type of assistive technology would he use to access print on the chalkboard or overhead screen?

Answers

Answer:

a tactile input device

Explanation:

Based on the scenario being described it can be said that the best assistive technology for Bernard would be a tactile input device. Such a device would allow Bernard to physically interact with the print on the chalkboard or overhead screen from the device itself without having to actually get close to the chalkboard or screen. Thus allowing him to view its content from the palm of his hand.

Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}

Answers

Answer:

double ComputeGasVolume(double pressure, double temperature, double moles){

   double volume = moles*GAS_CONST*temperature/pressure;

    return volume;        

}

Explanation:

You may insert this function just before your main function.

Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles

Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.

A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS

Answers

Answer:

FIN

Explanation:

A TCP is an acronym for Transmission Control Protocol and it is one of the essential and important protocol of the internet protocol network. This simply means that, it is an essential part of the TCP/IP network.

The TCP has a wide range of applications in the following areas, file transfers, world wide web, remote administration, e-mail, etc.

The TCP connection are mainly established in the network using the three-way handshake.

A TCP FIN segment is a request to the other transport process to close a connection. The FIN in transmission control protocol (TCP) is an acronym for finish and it involves the packets associated with termination or closing of a network connection.

Generally, the TCP in networking is made up of all of the following flag bits, namely;

1. SYN: used for synchronizing packets associated with a connection.

2. ACK: this is mainly where an acknowledgement of packets in a network takes place.

3. FIN:  it is used for closing connections.

4. PSH: used for pushing packets that are to meant to be delivered at the far end.

5. RST: used as a reset in times of errors in the connection.

6. URG: used to denote urgent and high priority packets in the network.

7

In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?

Answers

Answer:

The answer is "It uses the section access with in the qlikview script".

Explanation:

QlikView is now QlikSense, it comes with section access, that protects against this danger. It a way of determining, which can display certain details, it is also known as objects, that can be displayed by whom and out of which domain, etc.

It can also be configured using the publishing of the company. In the data load script, users can use section access to maintain security.  It uses the data for authentication and authorization within segment access and automatically decreases the information, such that users only have their information.

There are different aspect of  security mechanism. The security mechanism that one does find the file containing data of the users/user groups have inbuilt security is that  the section access with in the qlikview script".

There are different mechanisms that is often used to secure the Web.  This is made of the mechanisms that is often used to apply security and they includes virtual private networks (VPNs), encryption, firewalls, routing filters, etc.

Note that a security mechanism in QlikView is often set up in two distinct ways or means, This can be done by building it into the QlikView document script, or by setting it up via the use of QlikView Publisher.

Learn more about Security mechanism from

https://brainly.com/question/14378794

You are in a library to gather information from secondary sources, and you want to find a current print resource that can supplement information from a book. What source should you use

Answers

Answer:

Periodical Literature

Explanation:

In this specific scenario, the best source for you to use would be the periodicals. Periodical Literature is a category of serial publications that get released as a new edition on a regular schedule, such as a magazine, newsletters, academic journals, and yearbooks. Some real-life examples include Sports Illustrated, Discovery, or even Time Magazine. These periodical literary sources all provide up to date data on any topic that is needed.

based on the condition.
The starting value of looping statement is calle
This is the final (last) value of loop statement a
This is a non-executable statement which is al
of QBASIC.
This statement is used to make variable global
It is declared in the main program and changes
This statement is used to close the one or more​

Answers

Answer:

A subroutine is a block of statements that carries out one or more tasks. ... they share all variables with the rest of the main program. ... Once you have defined a function in your program, you may use it in any appropriate expression, such as: ... Thus, functions can- not change the values of the arguments passed to them.

Explanation:

Convert +41.50 in a IEEE 754 single precision format.
Convert - 72.125 in a IEEE 754 double precision format.

Answers

Answer:

+41.50 = 0 10000100 01001100000000000000000  [single precision]

-72.125 = 1 10000000101 0010000010000000000000000000000000000000000000000000 [double precision]

Explanation:

(I) +41.50 using single precision

Follow the following steps:

(a) Single precision has 32 bits in total and is divided into three groups: sign (has 1 bit), an exponent (has 8 bits) and a mantissa (also called fraction, has 23 bits)

(b) Divide the number (41.50) into its whole and decimal parts:

Whole = 41

Decimal = 0.50

(c) Convert the whole part to binary:

2    |    41

2    |    20 r 1

2    |    10 r 0

2    |    5 r 0

2    |    2 r 1

2    |    1 r 0

     |    0 r 1

Reading upwards gives 41 = 101001₂

(d) Convert the decimal part to binary:

0.50 x 2 = 1.0  = 1 [number in front of decimal]

0.0 x 2 = 0.0 = 0  [number in front of decimal]

Reading downwards gives 0.5 = 10₂

(e) Put the two parts together as follows;

    101001.10₂

(f) Convert the result in (e) to its base 2 scientific notation:

Move the decimal to just before the leftmost bit as follows;

1.0100110

In doing so, we have moved over 5 numbers to the left. Therefore, the exponent is 5. Moving to the left gives a positive exponent while moving to the right gives a negative exponent.

Altogether we have;

1.0100110 x 2⁵

(g) Determine the sign bit of the number and display in binary: Since the number +41.50 is positive, the sign bit is 0.

(h) Determine the exponent bits.

Since this is a single precision conversion, the exponent bias is 127.

To get the exponent we add the exponent value from (e) to the exponent bias and get;

5 + 127 = 132

(i) Convert the exponent to binary:

2    |    132

2    |    66 r 0

2    |    33 r 0

2    |    16 r 1

2    |    8 r 0

2    |    4 r 0

2    |    2 r 0

2    |    1 r 0

     |    0 r 1

Reading upwards gives 132 = 10000100₂

(j) Determine the mantissa bits:

The mantissa is the rest of the number after the decimal of the base 2 scientific notation found in (f) above.

0100110 from 1.0100110 x 2⁵                  [Just remove the leftmost 1 and the decimal point]

(k) Combine the three parts: sign bit (1 bit), exponent bits (8 bits) and mantissa bits (23 bits)

sign bit = 0                [1 bit]

exponent bits = 10000100        [8 bits]

mantissa bits = 0100110        [7 out of 23 bits]

Then fill out the remaining part of the mantissa with zeros to make it 23 bits.

mantissa bits = 01001100000000000000000        

Putting all together we have

0 10000100 01001100000000000000000 as +41.50 in  a IEEE 754 single precision format.

(II) -72.125 using double precision

Follow the following steps:

(a) Double precision has 32 bits in total and is divided into three groups: sign (has 1 bit), an exponent (has 11 bits) and a mantissa (also called fraction, has 52 bits)

(b) Divide the number (72.125) into its whole and decimal parts:

Whole = 72

Decimal = 0.125

(c) Convert the whole part to binary:

2    |    72

2    |    36 r 0

2    |    18 r 0

2    |    9 r 0

2    |    4 r 1

2    |    2 r 0

2    |    1 r 0

     |    0 r 1

Reading upwards gives 72 = 1001000₂

(d) Convert the decimal part to binary:

0.125 x 2 = 0.25  = 0 [number in front of decimal]

0.25 x 2 = 0.50 = 0  [number in front of decimal]

0.50 x 2 = 1.00 = 1  [number in front of decimal]

0.00 x 2 = 0.00 = 0  [number in front of decimal]

Reading downwards gives 0.125 = 0010₂

(e) Put the two parts together as follows;

    1001000.0010₂

(f) Convert the result in (e) to its base 2 scientific notation:

Move the decimal to just before the leftmost bit as follows;

1.0010000010

In doing so, we have moved over 6 numbers to the left. Therefore, the exponent is 6. Moving to the left gives a positive exponent while moving to the right gives a negative exponent.

Altogether we have;

1.0010000010 x 2⁶

(g) Determine the sign bit of the number and display in binary: Since the number -72.125 is negative, the sign bit is 1.

(h) Determine the exponent bits.

Since this is a double precision conversion, the exponent bias is 1023.

To get the exponent we add the exponent value from (e) to the exponent bias and get;

6 + 1023 = 1029

(i) Convert the exponent to binary:

2    |    1029

2    |    514 r 1

2    |    257 r 0

2    |    128 r 1

2    |    64 r 0

2    |    32 r 0

2    |    16 r 0

2    |    8 r 0

2    |    4 r 0

2    |    2 r 0

2    |    1 r 0

     |    0 r 1

Reading upwards gives 1029 = 10000000101₂

(j) Determine the mantissa bits:

The mantissa is the rest of the number after the decimal of the base 2 scientific notation found in (f) above.

0010000010 from 1.0010000010 x 2⁶                  [Just remove the leftmost 1 and the decimal point]

(k) Combine the three parts: sign bit (1 bit), exponent bits (11 bits) and mantissa bits (52 bits)

sign bit = 1                [1 bit]

exponent bits = 10000000101    [11 bits]

mantissa bits = 0010000010        [10 out of 52 bits]

Then fill out the remaining part of the mantissa with zeros to make it 52 bits.

mantissa bits = 0010000010000000000000000000000000000000000000000000

Putting all together we have

1 10000000101 0010000010000000000000000000000000000000000000000000 as -72.125 in  a IEEE 754 double precision format.

12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE function to find the average bonus multiplier (C7:C10).

Answers

Answer:

1. Divide each bonus by regular bonus apply this to all the data

2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

Explanation:

The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.  

After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

24. Which of the following statements about Emergency Support Functions (ESFs) is correct?
O A. ESFs are not exclusively federal coordinating mechanism
O B. ESFs are only a state or local coordinating mechanism
O C. ESFs are exclusively a federal coordinating mechanism
O D. ESFs are exclusively a state coordinating mechanism

Answers

(ESFs) is correct: ESFs are not exclusively federal coordinating mechanism.

When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate

Answers

Answer:

Verifying digital signature

Explanation:

In order to guarantee authenticity of digital messages an documents, the certificate authority will perform the verification of the digital signature. A valid digital signature indicates that data is coming from the proper server and it has not been altered in its course.

Write a program that displays the values in the list numbers in ascendingorder sorted by the sum of their digits.

Answers

Answer:

Here is the Python program.

def DigitList(number):  

   return sum(map(int, str(number)))  

 

list = [18, 23, 35, 43, 51]  

ascendList = sorted(list, key = DigitList)  

print(ascendList)

Explanation:

The method DigitList() takes value of numbers of the list as parameter. So this parameter is basically the element of the list. return sum(map(int, str(number)))  statement in the DigitList() method consists of three methods i.e. str(), map() and sum(). First the str() method converts each element of the list to string. Then the map() function is used which converts every element of list to another list. That list will now contain digits as its elements. In short each number is converted to the string by str() and then the digit characters of each string number is mapped to integers. Now these digits are passed to sum() function which returns the sum. For example we have two numbers 12 and 31 in the list so each digit is 1 2 and 3 1 are added to get the sum 3 and 4. So now the list would have 3 4 as elements.

Now list = [18, 23, 35, 43, 51] is a list of 5 numbers. ascendList = sorted(list, key = DigitList)  statement has a sorted() method which takes two arguments i.e. the above list and a key which is equal to the DigitList which means that the list is sorted out using key=DigitList. DigitList simply converts each number of list to a another list with its digits as elements and then returns the sum of the digits. Now using DigitList method as key the element of the list = [18, 23, 35, 43, 51] are sorted using sorted() method. print(ascendList) statement prints the resultant list with values in the list in ascending order sorted by the sum of their digits.

So for the above list [18, 23, 35, 43, 51] the sum of each number is 9 ,5, 8, 7, 6 and then list is sorted according to the sum values in ascending order. So 5 is the smallest, then comes 6, 7, 8 and 9. So 5 is the sum of the number 23, 6 is the sum of 51, 7 is the sum of 43, 8 is the sum of 35 and 9 is the sum of 18. So now after sorting these numbers according to their sum the output list is:

[23, 51, 43, 35, 18]                                                                                                          

How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = futureValue * (1 + monthlyInterestRate); i = i+1; }
a. 5
b. 4
c. 6
d. 0

Answers

Answer:

I believe it is A

Explanation:

Write a program that read two numbers from user input. Then, print the sum of those numbers.

Answers

Answer:

#This is in Python

number1 = raw_input("Enter a number: ")

number2 = raw_input("Enter another number: ")

sum = float(number1) + float(number2)

print(sum)

Explanation:

It is acceptable to create two TCP connections on the same server/port doublet from the same client with different port numbers.
A. True
B. False

Answers

the answer is a. true
I think the answer is A

Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3. Your program should make use of the sqrt() method. Math.sqrt(number).

Answers

Answer:

I am writing a JAVA program. Let me know if you want the program in some other programming language.

public class FourthRoot{ //class to calculate fourth root of 81

public static void main(String[] args) { //start of main() function body

   double square_root; //declares to hold the fourth root of 81

   double number=81; // number is assigned the value 81

/* calculates the fourth root of number using sqrt() method twice which means sqrt() of sqrt(). This is equivalent to pow(number,(0.25)) where pow is power function that computes the fourth root by raising the number 81 to the power of 0.25 which is 1/4 */

   square_root=Math.sqrt(Math.sqrt(number));

//displays the fourth root of 81 i.e. 3

     System.out.println("Fourth Root of 81 is "+ square_root); } }

Explanation:

The program is well explained in the comments given along with each statement of the program . Since it was the requirement of the program to user Math.sqrt() method so the fourth root of number= 81 is computed by taking the sqrt() of 81 twice which results in the fourth root of 81 which is 3.

So the first sqrt(81) is 9 and then the sqrt() of the result is taken again to get the fourth root of 81. So sqrt(9) gives 3. So the result of these two computations is stored in square_root variable and the last print statement displays this value of square_root i.e. the fourth root of number=81 which is 3.

Another way to implement the program is to first take sqrt(81) and store the result in a variable i.e. square_root. After this, again take the sqrt() of the result previously computed and display the final result.

public class FourthRoot{

   public static void main(String[] args) {

   double square_root;

   double number=81;

   square_root=Math.sqrt(number);

  System.out.println("Fourth Root of 81 is: "+ Math.sqrt(square_root)); } }

The program along with its output is attached in a screenshot.

The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

Deployment

Explanation:

Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.

So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.

Answer:

Deployment

Explanation:

SONET is the standard describing optical signals over SMF, while SDH is the standard that describes optical signals over MMF fiber.
A. True
B. False

Answers

Answer:

False.

Explanation:

SONET is an acronym for synchronous optical networking while SDH is an acronym for synchronous digital hierarchy. They are both standard protocols used for the transmission of multiple digital bit streams (multiplex) synchronously through an optical fiber by using lasers.

Hence, both SONET and SDH are interoperable and typically the same standard protocols in telecommunication networks. Also, the SONET is a standardized protocol that is being used in the United States of America and Canada while SDH is an international standard protocols used in countries such as Japan, UK, Germany, Belgium etc.

The synchronous optical networking was developed in 1985 by Bellcore and it was standardized by the American National Standards Institute (ANSI). SDH was developed as a replacement for the plesiochronous digital hierarchy (PDH).

Generally, SONET comprises of four functional layers and these are;

1. Path layer

2. Line layer.

3. Section layer.

4. Physical or Photonic layer.

The SDH comprises of four synchronous transport modules and these are;

1. STM-1: having a basic data rate of 155.52Mbps.

2. STM-4: having a basic data rate of 622.08Mbps.

3. STM-16: having a basic data rate of 2488.32Mbps.

4. STM-64: it has a basic data rate of 9953.28Mbps.

These two standard telecommunications protocols are used to transmit large amounts of network data over a wide range through the use of an optical fiber.

Suppose that you have a class called Student that is defined in student.h file. The class is in a namespace called fhsuzeng. Fill in the following blanks for the structure of the header file student.h.

#ifndefine STUDENT_H
______________
namespace _______
{
___________Student
{
};
}
_____________________

Answers

Answer:

u r

Explanation:

dumb

A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.)
A. LCD power inverter
B. AC adapter
C. Battery
D. Processor
E. VGA card
F. Motherboard
G. Backlit keyboard
H. Wireless antenna

Answers

Answer:

A, B and C

Explanation:

When talking about a computer or laptop charging, there are ONLY 3 things that matter.

The Battery - This is where the electricity or "wall juice" is stored.

AC Adapter - This is how the Battery gets its juice, it plugs into the computer itself.

LCD Power Adapter - This plugs into the wall to pull the electricity from the grid into your computer passing through AC Adapter.

On a side note... the most logical reason the computer could not be going over 15% nor charge anymore than 30mins is because the battery has been shortened by either a storm or a power surge.

Other Questions
Find the greatest common factor of thefollowing monomials:15r2548353 what property of water results from high boiling point During the Tunguska event, People were thrown 20' through the air, even though they were________ Away from the explosion a. 2 miles b. 500' feet c. 5 milesd. 40 miles 3 reasons why qualified educators struggle to get employed education sector Find the interquartile range (IQR) of the data in the dot plot below. chocolate chips 0 0 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10. Number of chocolate chips. Chocolate chips in different cookies in a package organism must go through mitosis to build new tissues.Part CBased on your model, do you think frogs reproduce sexually or asexually? What are the benefits and drawbacks to thisform of reproduction? How did Congress attempt to solve the dispute over the organization of the Nebraska Territory?It required Kansas to enter the Union as a free state,It split Nebraska into two distinct territories: Nebraska and Kansas.It required Nebraska to enter the Union as a slave state.It allowed Nebraska to be organized according to popular sovereignty. Scientists think that oxygen produced by the first photosynthetic bacteria contributed to the creation of the ozone layer we have today. If the ozone layer blocked visible instead of UV radiant energy, what do you think would have happened to life on early Earth?A. Life on earth would have evolved more quickly due to mutations in the DNA of early cellsB. The photosynthetic bacteria would have lost the radiant energy source they used to make a chemical energy and would have died outC. The photosynthetic bacteria would have turned to aerobic respiration for chemical energy productionD. Photosynthetic bacteria on land would have depended on the higher energy UV light to make chemical energy instead Which expression is equivalent to (x y) z? Consider the following hypothetical data for an open economy (in millions): Assets owned inside the U.S. by U.S. citizens = $140, 000140,000 Assets owned outside the U.S. by U.S. citizens = $23,35723,357 Assets owned outside the U.S. by foreign citizens = $110,000110,000 Assets owned inside the U.S. by foreign citizens = $22,78622,786 The value of the International Investment Position (IIP) of the U.S. is__________ $ nothing million. How can psychic distance influence tone?A. A smaller psychic distance makes the tone feel cold and removed.B. A larger psychic distance usually creates a somber, unhappy tone.C. A smaller psychic distance makes it difficult to interpret the tone.D. A larger psychic distance usually creates a less intimate tone. Me ayudan con esto 63X=1.06 A 10-m long steel linkage is to be designed so that it can transmit 2 kN of force without stretching more than 5 mm nor having a stress state greater than 200 N/mm2. If the linkage is to be constructed from solid round stock, what is the minimum required diameter? A helicopter rotor blade is 3.40m long from the central shaft to the rotor tip. When rotating at 550rpm what is the radial acceleration of the blade tip expressed in multiples of g? differentiate between parallel circuit and series circuit Suppose you are a manager at an advertising agency who is eager to utilize Coveys advice about delegation. Today, you need to work on a presentation for a potential new client. This requires delegating a routine status report about an ongoing advertising campaign to Patricia. You ask Patricia to complete the status report, making her haveresponsibility for its completion. Which of the following are true after you delegate the status report to Patricia? Check all that apply. You should guide Patricia through each step of the assignment to serve as a mentor. Patricia must have authority over the resources and personnel needed to complete the status report. You should help Patricia with the status report, to the extent you have time. Patricia will be held accountable for the results of the assignment. The advertising agency recently reorganized. Patricia now reports to both the regional sales manager and a senior product manager which means there unity of command. Unity of command in matrix organizations. Lower-level employees have the authority to act without first seeking approval for activities in a company. Continue without saving Initially stationary, a train has a constant acceleration of 0.8 m/s2. (a) What is its speed after 27 s? m/s (b) What is the total time required for the train to reach a speed of 41 m/s? Que diferencia hay entre un monologo y un soliloquio? Steve Fossett is approaching the shores of Australia on the first successful solo hot air balloon ride around the world. His balloon, the Bud LightTM Spirit of Freedom, is being escorted by a boat (directly below him) that is 108 meters away. The boat is 144 meters from the shore. How far is Fossett's balloon from the shore? What challenges did Birgitta face when she started school? Check all that apply. learning English going to a new school understanding the teacher teaching her classmates Swedish knowing what to do in school