Define the term residential subscriber as it pertains to the telecommunications industry. Explain what is meant by the term rate center as it pertains to local telephone service. Who is responsible for determining the rate center boundaries for a calling region? Explain the difference between the terms rate center and wire center as they pertain to the local telephone serving area.

Answers

Answer 1

Answer:

According to section 40-15-102(18) of the Colorado Revised Statutes (CRS), a residential “Residential subscriber” is an individual who has elected to receive residential telephone service with a local exchange provider. The definition of “Person” here is extended to include any other persons living or residing with the residential subscriber.

A rate center is a geographical area used to define and organise the perimeter for local calling, for billing, and for assigning specific phone numbers, which can include multiple area codes.

The rate center boundaries are determined by Local Exchange Carriers (LEC)

LEC is just a regulatory jargon in the telecoms sector for the local telephone company.

A wire center is the actual physical telephone exchange building.

A rate center, on the other hand, is a regulatory concept designed with the primary goal to make billing administration within the local telephone serving area easy.

Cheers!

 


Related Questions

In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers.

Answers

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

What's the value of this Python expression? ((10 >= 5*2) and (10 <= 5*2))

Answers

Answer:

The Boolean value returned by that expression will be True

Explanation:

We have two logical statements in that expression:

Expression 1: (10 >= 5*2)

This can be read as: is 10 greater than or equal to 5 multipled by 2. This evaluates to true as 10 is equal to 5 * 2. Hence expression 1 returns true

Expression 2: (10 <= 5*2)

This can be read as: is 10 less than or equal to 5 multiplied by 2. This also evaluates to true as 10 is equal to 5*2. Hence expression 2 returns true.

Now between this two expression is the and operator which evaluates to true if and only if both logical expressions returnes true.

True and True ==> True

Since Expression 1 ==> True and Expression 2 ==> True

This means Expression 1 and Expression 2 ==> True which is the Boolean value returned by the statement

The value of the python expression ((10 >= 5*2) and (10 <= 5*2)) is True

The code will definitely return a Boolean value(True or False).

For the expression to be True , the two statements must be True. The AND gate returns True if the whole statement is True.

(10 >= 5*2) is True because 10 is equals to 5 × 2 = 10.

(10 <= 5*2) is True because 10 is equals to 5 × 2 = 10.

The two statements are True . Therefore,

True and True = True.

learn more on python code; https://brainly.com/question/17013562?referrer=searchResults

A technician is evaluating malware that was found on the enterprise network. After reviewing samples of the malware binaries, the technician finds each has a different hash associated with it. Which of the following types of malware is MOST likely present in the environment?

a. Trojan
b. Polymorphic worm
c. Rootkit
d. Logic bomb
e. Armored virus

Answers

Answer:

(b) polymorphic worm

Explanation:

A polymorphic worm can be compared with a chameleon. It changes its color so as to blend with the background of the surrounding to avoid being seen or caught. A polymorphic worm is a special type of worm that keeps changing its constituent features in order to avoid being detected. The most common way in which polymorphic worms hide their codes is by using encryption.

Polymorphic worms have two parts: the part that changes and the one that does not change. The part that changes include the characteristics of the worm such as encryption key, associated hash value e.t.c. The part that does not change is basically its functionality. Therefore, although the characteristics of the worm keep changing, its overall function remains the same.

Consider the Palindrom class discussed in class. Which of the following is true? It uses one stack and one queue to find out if a given string is palindrom It uses a glass queue to find out if a string is a palindrome It uses a recursive method to find out if a string is a palindrome It uses 2 stacks to find out of a string is a palindrome

Answers

Answer:

It uses a recursive method to find out if a string is a palindrome

Explanation:

Palindrome is a word or a sequence which is read same as backward as forwards. There are various method to find a palindrome. Palindrome can be determined recursively by identifying the first and last letters of the word. These first and last letter should be same. If they are same then the word or sequence is palindrome.

Please discuss what you consider to be some of the biggest challenges your company will face when working from the Linux command line. Discuss some of the different ways in which employees might be able to remember and associate commands with common tasks.

Answers

Answer:

Command remembering issues.

Explanation:

The biggest challenge my company will face when working on Linux is remembering issues of the commands. The commands in Linux are a bit difficult to remember as they are complicated bit but practice can solve this issue. "Practice makes a man perfect" this well known saying suggests that practice can make perfect and this well known saying also works with Linux the more practice the employees do the more perfect they get.

A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Choose two.)
A. Vishing
B. Whaling
C. Spear phishing
D. Pharming
E. War dialing
F. Hoaxing

Answers

Answer: Spear phishing; Pharming

Explanation:

Based on the information given in the question, the security concerns that need to be identified and mitigated are spear phishing and pharming.

Spear phishing is the fraudulent practice whereby emails are sent from a trusted sender in which people are targeted to give out some confidential information.

Pharming is a cyberattack whereby the traffic of a website is redirected to another fake site. This is typically done when the host file on the computer of the victim has been changed.

Since database data items are stored in compatible formats and logical connections among them are also stored, we describe database data as Group of answer choices

Answers

Answer:

integrated

Explanation:

Due to this compatibility, we describe database data as integrated. This is because data integration refers to the process of combining data from different sources into a single, and unified view/database. This creates a large gathering of various information that can all be interswapped and used with the same software as one another.

Select the correct answer.

Maggie is preparing a business report. Which type of keys will she use to type in letters, numbers, symbols, and punctuations?

A typing keys

B. navigation keys

C.

function keys

OD

control keys

Answers

Answer:

Explanation:

On a windows operating system or any computer based application there are only three types of keys, these are alphanumeric keys, punctuation keys and special keys.  Therefore the answers provided are not accurate. Each of these types of keys serves different purposes as follows.

Letters – use alphanumeric keys Numbers – use alphanumeric keys Symbols – use punctuation keys Punctuations – use punctuation keys

If you must use the answers choices provided we can say the following

Letters – use alphanumeric keys  - typing keysNumbers – use alphanumeric keys  - typing keysSymbols – use punctuation keys  - function keysPunctuations – use punctuation keys  - typing keys

The type of keys Maggi will use to type in letters, numbers, symbols, and punctuations are: A. typing keys.

An input device can be defined as an electronic device that is typically designed and used for sending data to a computer system. Thus, these devices are used for entering data (information) into a computer system.

In Computer technology, some examples of input devices include the following:

MouseScannerMicrophoneKeyboard

A keyboard refers to a an electronic device that is typically designed to allow end users type textual information such as letters, numbers, symbols, and punctuations.

In this scenario, the type of keys Maggi will use to type in letters, numbers, symbols, and punctuations are typing keys because it comprises the 26 alphabets, number one to nine, and special characters or symbols.

Read more: https://brainly.com/question/17402566

Problem You Need to Solve for This Lab:

You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should save the data back to the same data file when the program exits.

What Your Program Should Do:

Write an interactive text based menu interface (using a loop) that will allow the user to

ï‚· Enter information for a new song

ï‚· Display information for all the songs in the database with index for each song

ï‚· Remove a song by index

ï‚· Search for songs by a certain artist

ï‚· Search for songs by a certain album

ï‚· Quit

For each song, you need to keep track of:

title

artist

duration

album

Allow the program to keep looping until user wants to quit. When the program starts, it should load the tasks from external file ("songs.txt") into memory. When user enters information about the new song, the program needs to read them in, save them in memory and eventually write them to the external data file ("songs.txt"). The file format could look like:

Stereo Hearts;Gym Class Heroes;3;34;The Papercut Chronicles II
Counting Stars;OneRepulic;4;17;Native
The ';' is used as a delimiter or field separator. Each record ends with a new line character.

Some Implementation Requirements:

Write at least four functions WITH arguments for this assignment.

Use struct named Song to model each song

Use array of structs to model the collection of songs.

Hint: In this assignment, some data fields may have multiple words in it. Therefore,

you now SHOULD read using the 3 argument version of get.

Watch out. When using the 3 argument version of get you need to make sure to

remove the delimiter or newline. Therefore, anytime you read (even a confirmation

message), make sure to eat the newline using cin.ignore(...)!

Make sure to have a delimiter written between each item in the file – like a newline.

This will be important when you read the information back from the file.

For submission, your data file should contain a sufficient set of test data. It should have test cases for same artist with multiple songs and same album with multiple songs in it.

Do-Not List:

No Global Variables (you can have global constants)

Do not use Classes or Linked Lists

You must use cstring and char arrays. (do not use )

No use of the stdio library (use iostream and fstream)

Instead of the string class, you will be using arrays of characters and the cstring library

No STL containers such as vector. You must implement your own array for this class.

Answers

Answer:

Write questions properly

Explanation:

Then it is easy to say answer

State the Common Ratio of the sequence 1/6, 1,
6, 36​

Answers

Answer:

6

Explanation:

The common ratio can be found by dividing terms with previous terms.

1 ÷ 1/6 = 6

6 ÷ 1 = 6

36 ÷ 6 = 6

6, you divide the terms

Write a split check function that returns the amount that each diner must pay to cover the cost of the meal The function has 4 parameters:
1. bill: The amount of the bill,
2. people. The number of diners to split the bill between
3. tax_percentage: The extra tax percentage to add to the bill.
4. tip_percentage: The extra tip percentage to add to the bill.
The tax or tip percentages are optional and may not be given when caling split_check. Use default parameter values of 0.15 (15%) for tip percentage, and 0.09 (9%) for tax_percentage
Sample output with inputs: 252
Cost per diner: 15.5
Sample output with inputs: 100 2 0.075 0.20
Cost per diner: 63.75
1 # FIXME: write the split.check function: HINT: Calculate the amount of tip and tax,
2 # add to the bill total, then divide by the number of diners
3.
4. Your solution goes here
5.
6. bill - float(input)
7. people intinout)
8.
9. Cost per diner at the default tax and tip percentages
10. print('Cost per diner: split_check(bill, people))
11.
12. bill - float(input)
13. people int(input)
14. newtax_percentage - float(input)
15. nen_tip percentage float(input)
16.
17. Oust per dinero different tox and tip percentage
18. print('Cost per diner: split checkbull people, new tax percentage, new tip percentage)

Answers

Answer:

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

   tip = bill * tip_percentage

   tax = bill * tax_percentage

   total = bill + tip + tax

   

   return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

print("Cost per diner: " + str(split_check(bill, people, new_tax_percentage, new_tip_percentage)))

Explanation:

Create a function called split_check that takes four parameters, bill, people, tax_percentage and tip_percentage (last two parameters are optional)

Inside the function, calculate the tip and tax using the percentages. Calculate the total by adding bill, tip and tax. Then, return the result of total divided by the number of people, corresponds to the cost per person.

For the first call of the function, get the bill and people from the user and use the default parameters for the tip_percentage and tax_percentage. Print the result.

For the second call of the function, get the bill, people, new_tip_percentage and new_tax_percentage from the user. Print the result.

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

  tip = bill * tip_percentage

  tax = bill * tax_percentage

  total = bill + tip + tax

 

  return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

print("Cost per diner: " + str(split_check(bill, people, new_tax_percentage, new_tip_percentage)))

Create a function called split_check that takes four parameters, bill, people, tax_percentage and tip_percentage (last two parameters are optional)

Inside the function, calculate the tip and tax using the percentages. Calculate the total by adding bill, tip and tax. Then, return the result of total divided by the number of people, corresponds to the cost per person.

For the first call of the function, get the bill and people from the user and use the default parameters for the tip_percentage and tax_percentage. Print the result.

For the second call of the function, get the bill, people, new_tip_percentage and new_tax_percentage from the user. Print the result.

Learn more about function on:

https://brainly.com/question/30721594

#SPJ6

The terminal window wants to evaluate your current bash knowledge by using the ~/workspace/nested-directories folder:

a. cd into the nested-directories/nested-level-1/ directory by using an absolute path
b. cd into the nested-level-3/ directory by using a relative path
d. Move the entire ~/workspace/config/ directory to the nested-level-1/ directory

Answers

Answer:

a. cd into the nested directories/ nested - level - 1 / directory using an absolute path

Explanation:

The directory is a location on the hard disk, which is also called a folder. It contains the files and also contains the other directories called sub directories.

A path to a file is merged with a slash and determines the file or directory in the operating system. An absolute path is the location file or directory from the actual file system

The directory's absolute path starts with a slash, and all slashed in the directory separates the directions.

All directions in the absolute path are written on the left side. The last name in the path may belong to the file, and the pwd command can determine the current directory.

The relative path is the location of the file. It begins with the working directory. An absolute path is unambiguous and working with deeply nested directories.

There are two commands which are used such as

cd pwdcd is used for changing directorypwd is used for the working directory

We easily navigate the file system with the help of an absolute path.

The common channel signaling (CCS) system provides a separate network dedicated to control and signaling over the PSTN. This enables subscribers to establish calls on an on-demand basis.
A. True
B. False

Answers

The correct answer is A.True

Common Channel Signaling (CCS) is a type of signaling used in multichannel communications systems to control, account for, and manage traffic on all the channels of a link. User information is not sent over the common-channel signaling channel.

What CCS system provides a separate network?

Digital communication signaling takes the form of channel-associated signaling (CAS), often referred to as per-trunk signaling (PTS).

It uses routing information, like the majority of telecommunication signaling techniques, to send the voice or data payload to the intended recipient.

The SMS effectively serves as the CAS's administration hub. It is a hardware and software combination that is integrated with the CAS server. Each subscriber's information, including the TV stations they have chosen to subscribe to, is stored and managed via SMS.

Therefore, it is true that  (CCS) is a type of signaling where a collection of speech and data channels share an exclusive channel for control signals.

Learn more about system here:

https://brainly.com/question/29491324

#SPJ5

Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp Bright Firewood. Dean wants to identify the staff members eligible for leadership training in the table.
In cell M2, enter a formula using a nested IF function and structured references to determine first if a staff member already has completed Academic Technology training, and if not, whether that staff member is eligible for Academic Technology training.
If the value of the Leadership Training column is equal to the text "Yes", the formula should return the text Completed. Remember to use a structured reference to the Leadership Training column.If the value of the Leadership Training column is not equal to yes, the formula should determine if the value in the Service Years column is greater than 1.The formula should return the text Yes if the staff member’s Service Years value is greater than 1.The formula should return the text No if the staff member’s Service Years value is not greater than 1.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given question attachment file is missing so, following the code to this question:

using function IF:

=IF(Logical test, how to do it when testing is right, how to do it when testing is wrong)

In this scenario, a leader development Worker should pass 2 tests

In the First test may not finish his training

If yes-" satisfied"  

It is not true, it will go to 2nd test  

In the second test, If employee served a service period of even more than 1 year (to be performed in a first check if not correct)

If, It is yes=" yes"  else  not ="No"  

= IF(Leader Training = Yes, "Completed," IF(Service time> 1," Yes ","No")  

That's means,  

The sort IF(I2 = "Yes","Completed"),IF(D2>1," Yes","No") must be used in cell M2)

Copy Cell M2 Then the selected M3 over M30

Write a Python program that gets a number using keyboard input. (Remember to use input for Python 3 but raw_input for Python 2.) If the number is positive, the program should call countdown. If the number is negative, the program should call countup. Choose for yourself which function to call (countdown or countup) for input of zero.

Answers

Answer:

def countup():

pass

def countdown():

pass

x = int(input("Choose a number: "))

if x >= 0:

countup()

if x < 0:

countdown()

Explanation:

I start by getting a user input which is saved to variable called "x." I then make if statements to see whether is greater than, equal to, or less than 0. After that, I call the functions.

(Find the index of the smallest element) Write a function that returns the index of the smallest element in a list of integers. If the number of such elements is greater than 1, return the smallest index. Use the following header: def indexOfSmallestElement(lst): Write a test program that prompts the user to enter a list of numbers, invokes this function to return the index of the smallest element, and displays the index.

Answers

Answer:

Here is the function that returns the the smallest element in a list of integers

def indexOfSmallestElement(lst):

  smallest = lst.index(min(lst))

  return smallest

Explanation:

The function indexOfSmallestElement() takes a list of integers lst as parameter.

  smallest = lst.index(min(lst))

In the above statement two methods are used i.e. index() and min().

The first method index returns the index position of the list and the second method min() returns the minimum element of the list.

Now as a whole the statement min() first returns the smallest element in the list (lst) of integers and then the index() method returns the position of that minimum element of lst. At the end the index position of this smallest element in the list (lst) is stored in the smallest variable.

So lets say if we have a list of the following elements: [3,2,1,7,1,8] then min() returns the smallest element in this list i.e. 1 and index() returns the index position of this smallest element. Now notice that 1 occurs twice in the list and index() method only returns the the first index found in the list. So it returns the smallest index of the two index positions of 1 i.e 2. Hence the output is 2.

The test program is given below:

lst=list()  

num=int(input("Enter the list size: "))

print("Enter a list of numbers: ")

for i in range(int(num)):

  integers=int(input(""))

  lst.append(integers)

print("The index of the smallest element is: ")

print(indexOfSmallestElement(lst))

First the list named lst is created. After that the user is prompted to enter the size of the list which determines how many elements user wants to add to the list. num holds the size input by user. After that print statement displays the line"Enter a list of numbers: ". Next the for loop takes the integers from user num times. Suppose user want to enter 3 as list size then loop will take 3 elements from user. int(input("")) in this statement integer type input is taken from user using input() method. lst.append(integers)  statement is used to append these input integers into the list i.e. lst. print(indexOfSmallestElement(lst)) the statement calls the indexOfSmallestElement by passing lst to this method to return the index of the smallest element in the list of integers.

Write a program in python that ask the user to enter a word and then capitalizes every other letter of that word

Answers

Answer:

a = input("please enter a word: ")

print("Here is the capitalized version: ")

print(a.upper())

For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addresses to satisfy them? and explain why? b. Say the first block of 64 customers want 128 addresses/customer - what would the address space look like?

Answers

Answer / Explanation:

195.200.0.0/16

Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.

2ⁿ = number of subnets

where n is additional bits borrowed from the host portion.

2ˣ - 2 = number of hosts

where x represent bits for the host portion.

Assuming we have 195.200.0.0/25

In the last octet, we have one bit for the network

number of subnets  = 2¹  =2 network addresses  

number of host = 2⁷ - 2= 126 network addresses per subnets

Define a function named swap_nums that has 2 parameters: num_one and num_two. The function should swap the two numbers by using only one additional variable!

Answers

Answer:

def swap_nums(num_one, num_two):

   temp_value = num_one

   num_one = num_two

   num_two = temp_value

   

   return num_one, num_two

print(swap_nums(10, 20))

Explanation:

Create a function called swap_nums that takes num_one and num_two as parameters.

Inside the function, create a temporary variable, temp_value, and set it to the num_one. Set the num_one as num_two and num_two as temp_value. Return the num_one and num_two

Call the function with two numbers and print the result

What are the differences between editing manually and editing digitally? What tools are used for each?

Answers

Answer:

Both manual and digital editing are concepts used in proofreading.

Manual editing is also called "hard proofreading" (or "hard proofing" for short). It is the process of proofreading, modifying or revising printed documents. In this type of proofreading, one would normally manually mark parts of the printed documents with editing materials such as ink, pen, marker e.t.c

Digital editing is also called "soft proofing". In contrast to manual editing, this type is done on digital documents. These documents include, but not limited to, DOC, txt, PDF, image, audio and video files.

Tools for editing manually are;

i. pen

ii. ink

iii. tipex

Tools for editing digitally are;

i. Photoshop application

ii. Text editors such as notepad++, Microsoft word

Proofreading has evolved in recent times as a result of advancements in technology. Now, manual proofreading has paved way for digital proofreading, which allows revising of PDF and  DOC files. The difference in both forms is as follows:

Manual Editing: In the process of revising or proofing printed documents, one would manually apply standard proofreading marks. Manual editing is also known as "Hard proofing", as the process requires proofreaders to mark the hard copies.

Digital Editing: In the process of revising or proofing digital documents i.e. PDF and DOC files, one would digitally apply the proofreading marks. Thus, corrections and edits are transferred electronically among authors, proofreaders. Digital editing is also known as "Soft proofing", as the process requires proofreaders to mark the soft copies i.e. without using any paper or pen.

There are a number of electronic tools and marks available for both techniques of

proofreading. Some tools used for manual proofreading include- deletion, capitalization, and  insertion, close-up, transpose.

Tools used in digital proofreading include- spell check, readability levels, trite expressions,  and comment, track changes.

Learn More: https://brainly.com/question/10002469

A cashier distributes change using the maximum number of five-dollar bills, followed by one-dollar bills. Write a single statement that assigns num_ones with the number of distributed one-dollar bills given amount_to_change. Hint: Use %. Sample output with input: 19

Answers

Answer:

amount_to_change = int(input("Enter amount to change: "))

num_fives = amount_to_change // 5

num_ones = amount_to_change % 5

print("There are " + str(num_fives) + " five dollars and " + str(num_ones) + " one dollars in the change")

Explanation:

Ask the user to enter the amount_to_change

Calculate the number of five dollars, use floor division

Calculate the number of one dollars, use modulo operator

Print the number of five dollars and number of one dollars

Brainstorm ideas for a new information system that could be implemented by your school or university to benefit the student community in some way. Create a one- to two-page document requesting the IS department of your school or university to initiate systems investigation for this project. Be sure to cover all the information that is typically contained in a system request form as described in the text.

Answers

My current employer can implement Oracle based Enterprise Resource Planning to cover the information management along its 8 factories , 22 warehouses and 15 branches all over India . They can cover all functional areas of Procurement , Inventory , Finance and Accounts , Warehouse , Engineering , Production Planning , Human Resource and Sales . All these functions can be integrated with information interphase . There are tremendous benefits of this information system . The biggest advantage is inventory management as this information system has the potential to reduce inventory holding costs tremendously . The information system provide real time access of the inventory of any item at any place to every person in the organization at any time which is very esential for multifacility organizations . As a result we can keep items especially maintenace and insurance items at only one place instead of keeping them at eight places . So we can reduce the inventory of maintenace spares by eight times which can be major boost to the working capital which is generally locked in dead and non moving inventories . Simillarly on finished goods we can have an integrated view of the inventories of finished goods and work in progress so that we can take into account the availability of finished goods and WIP inventories correctly while doing the production planning . This again has the potential to reduce the working capital requirement as generally the inventories in an integrated manner are not taken into account and even if they are taken into account they are mannualy taken which may not be correct. On procurement side we can look into the live status of our pending orders on account of which we can reduce duplicate ordering and can again reduce inventories. Through MRP and Advanced Supply Chain Planning we can in one go release orders to suppliers . On Finance and Accounts side we can get an integrated picture of receivables and payables so we can see where we are and can make balanced decisions . On production side we can have a live update of the production plan completed so far and what needs to be completed . They can also see what they can accomplish and what they cannot on account of non availability of raw materials . So proper production planning can be done . Through distribution requirement planning we can set priorities for our production department as to what is needed when for dispatch so that the plan gets modified and the requirement is also met . Engineering department can view the sub assembly preparedness of each unit in an integrated fashion and it may not be necessary for keeping sub assemblies at all units as equipments are same at all places . So for one engineering department do not have to do job duplication and again inventories can be reduced tremendously . Engineering can also schedule their maintenance activities through the system as they can get an alert on the basis of manufacturing as to when the maintenance of which equipement has become due . Simillarly sales can make out the inventories of finished goods in an integrated manner and if any thing is short at some place it can be arranged from a neighbouring warehouse at the earliest if it is available . They can also do fast analysis as to which areas or geographic locations are performing better and which are not so that instead of moving finished goods to better performing areas inventories can be dispatched from non performing areas so that the inventories do not become tale and later written off as each product is dated and has a shelf life . Human resource can maintain their skill inventories of employees and in case a requirement from any facility they can first lookin with in if they have additional inventories of skill at some location and instead of hiring from inside we can meet the inventory from within.

So all in all it is an excellent system which has the potential of integrating all the elements of the organization , making it more compact and delivering tremendous savings which can help the bottomline grow tremendously.

What would be suggested way to share and sustain knowledge with members in a team ?
A) Sharing of best practices and lessons learnt through emails
B) Sharing knowledge through knowledge sharing sessions
C) Sharing knowledge through informal conversations, for example, during lunch breaks.
D) Sharing best practices, lessons learnt and other topics in a central place where team can collaborate

Answers

Answer: D) Sharing best practices, lessons learned and other topics in a central place where the team can collaborate

Explanation: Knowledge sharing within a team is usually an important aspect of building a strong and efficient team. Acquiring knowledge usually comes from the experience gathered from previous projects, learning, or tips learned from various sources. Therefore, sharing knowledge is always a good way to ensure that what is gained is sustained by letting others know. Sharing and sustaining knowledge is most effective when transmitted or aired to a group of people usually a team gathered in an interactive setting which allows members to freely share experience and get feedback, views, or thoughts from other collaborators.

cal address EtherAddr. What would happen if, when you manually added an entry, you entered the correct IP address, but the wrong Ethernet address for that remote interface

Answers

The arp command allows users to download and edit the Address Resolution Protocol cache.Whenever time a laptop's TCP/IP stack utilizes ARP to determine its Multimedia Access Control address after an IP address, it records the mappings in the ARP cache because the future ARP iterators proceed quicker.In this, when the Router removes the IP address from the Ethernet frame after receiving the destination IP address & uses ARP to determine the destination MAC address.The information is sent to the ethernet address; IP is on a higher layer, therefore this would be lost before the user stored their layer.That's why the solution in "all information would be lost".

Learn more:

brainly.com/question/7342246

The Address Resolution Protocol ARP cache maintained by ARP keeps a record of IP addresses and their corresponding Media Access Control, MAC address

The correct response to what would happen if the wrong EtherAddr is

entered into the arp-s InetAddr EtherAddr command is that;

The system will not be able to connect to the IP address linked to the wrong Ethernet address.

The reason the above response is correct is as follows:

Characteristics of the ARP protocol;

The ARP protocol is a protocol that has a high level of control such that

the reply is trusted and can be used to redirect traffic through spoofing of

the responses to ARP which are then stored in the cache.

Functioning of the arp -s InetAddr EtherAddr command;

The command arp -s InetAddr EtherAddr command inputs a manual entry

into the ARP cache that works to assign the inputted IP address in InetAddr

to the MAC physical address in EtherAddr.

The ARP provides the translation from physical MAC addresses of Layer 2

to  the IP address of Layer 3 by mapping the MAC address to the IP

address.

Solution:

What would happen if, when you manually added an entry, you entered the correct IP address, but the wrong Ethernet address for that remote interface is as follows;

When the wrong Ethernet address is entered in the arp -s command, the

IP-address is resolved as belonging to the wrong Ethernet  or MAC

address, and if the address does not exist, it will not be possible to

connect to the correct or desired IP address.

Learn more about ARP here:

https://brainly.com/question/13068535

https://brainly.com/question/22696379

https://brainly.com/question/12975431

Write a program that asks users to enter letter grades at the keyboard until they hit enter by itself. The program should print the number of times the user typed A on a line by itself.

Answers

Answer:

The complete code in Python language along with comments for explanation and output results are provided below.

Code with Explanation:

# the index variable will store the number of times "A" is entered

index = 0

while True:

# get the input from the user

   letter = input('Please enter letter grades: ')

# if the user enters "enter" then break the loop

   if letter == "":

       break

# if user enters "A" then add it to the index

   if letter == "A":

       index = index + 1

# print the index variable when the loop is terminated

# the str command converts the numeric type into a string

print("Number of times A is entered: " + str(index))

Output:

Please enter letter grades: R

Please enter letter grades: A

Please enter letter grades: B

Please enter letter grades: L

Please enter letter grades: A

Please enter letter grades: A

Please enter letter grades: E

Please enter letter grades:

Number of times A is entered: 3

Can Someone Help
Please Show Work​

Answers

Answer:

1) 1/14

2) 1/7

Explanation:

Summer Vacation

Number of times letters listed

S 1

U 1

M 2

E 1

R 1

V 1

A 2

C 1

T 1

I 1

O 1

N 1

Probability= Successful outcome ÷ Possible outcome.

Successful outcome(C)=1

*Successful outcome(M)=2

Successful outcome refers to letters chosen.

*Possible outcome=14

*Possible outcome refers to total number of letters.

Probability of C =1/14

Probability of M= 2/14=1/7

Hope this helps ;) ❤❤❤

Let me know if there is an error in my answer.

Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75).

Answers

Answer:

Following is the program in the python language

hr = input("input hours:") #Read input by user

h1 = float(hr)

rate =input("Input Rate:") #Read RATE BY USER

r1 = float(rate) #CONVERT INTO FLOAT

if h1 <= 40: #check condition

   t=h1 * r1

   print (t) #DISPLAY

else :#else block

   t1=(40 * r1) + (h1 -40) * r1 * 1.5

   print('The pay is :')

   print(t1)#DISPLAY

Output:

input hours:45

Input Rate:10.50

The pay is :

498.75

Explanation:

Following are the description of program

Read the value of hour in the "hr" variable and convert into the float value in the "h1" variable .Read the value of rate in the " rate" variable and convert into the float value in the "r1" variable .After that check the condition of hour if block if the hour is less then or equal to 40 then it multiplied h1 *t1 otherwise else block will be executed and print the value of pay .

Constructing a concurrent server by spawning a process has some advantages and disadvantages compared to multithreaded servers. Discuss a few.

Answers

Answer:

The advantage and the disadvantage of the relevant query are illustrated in the explanation in the paragraph below.

Explanation:

Advantage:

The benefit of creating a simultaneous server through spawning a mechanism seems to be that alternative methods are shielded against everyone else, which would be very necessary whenever the extremely database manages communication services entirely.

Disadvantage:

The downside about creating a concurrent system through spawning a methodology seems to be that this process seems to be very expensive but using multicore processing systems should save this expense. It is also easier when using threads again for the aim of communicating between two or even more participants although we stop the kernel executing the correspondence.

#this is 34 lines -- you can do it! # #In web development, it is common to represent a color like #this: # # rgb(red_val, green_val, blue_val) # #where red_val, green_val and blue_val would be substituted #with values from 0-255 telling the computer how much to #light up that portion of the pixel. For example: # # - rgb(255, 0, 0) would make a color red. # - rgb(255, 255, 0) would make yellow, because it is equal # parts red and green. # - rgb(0, 0, 0) would make black, the absence of all color. # - rgb(255, 255, 255) would make white, the presence of all # colors equally. # #Don't let the function-like syntax here confuse you: here, #these are just strings. The string "rgb(0, 255, 0)" #represents the color green. # #Write a function called "find_color" that accepts a single #argument expected to be a string as just described. Your #function should return a simplified version of the color #that is represented according to the following rules: # # If there is more red than any other color, return "red". # If there is more green than any other color, return "green". # If there is more blue than any other color, return "blue". # If there are equal parts red and green, return "yellow". # If there are equal parts red and blue, return "purple". # If there are equal parts green and blue, return "teal". # If there are equal parts red, green, and blue, return "gray". # (even though this might be white or black). #Write your function here!

Answers

Answer:

Following are the code to this question:

def find_color(color):#definig a method find_color that accepts color parameter

   color = str(color).replace('rgb(', '').replace(')', '')#definig color variable that convert parameter value in string and remove brackets

   r, g, b = int(color.split(', ')[0]), int(color.split(', ')[1]), int(color.split(', ')[2])#defining r,g,b variable that splits and convert number value into integer

   if r == g == b:#defining if block to check if r, g, b value is equal

       return "gray"#return value gray

   elif r > g and r > b:#defining elif block that checks value of r is greater then  g and b

       return "red"#return value red

   elif b > g and b > r:#defining elif block that checks value of b is greater then g and r

       return "blue"#return value blue

   elif g > r and g > b:#defining elif block that checks value of g is greater then r and b

       return "green"#return value green

   elif r == g:#defining elif block that checks r is equal to g

       return "yellow"#return value yellow

   elif g == b:#defining elif block that checks g is equal to b

       return "teal"#return value teal

   elif r == b:#defining elif block that checks r is equal to b

       return "purple"#return value purple

print(find_color("rgb(125, 50, 75)"))#using print method to call find_color method that accepts value and print its return value

print(find_color("rgb(125, 17, 125)"))#using print method to call find_color method that accepts value and print its return value

print(find_color("rgb(217, 217, 217)"))#using print method to call find_color method that accepts value and print its return value

Output:

red

purple

gray

Explanation:

In the above method "find_color" is declared that uses the color variable as the parameter, inside the method a color variable is declared that convert method parameter value into the string and remove its brackets, and three variable "r,g, and b" is defined.  In this variable first, it splits parameter value and after that, it converts its value into an integer and uses the multiple conditional statements to return its calculated value.

if block checks the r, g, and b value it all value is equal it will return a string value, that is "gray" otherwise it will go to elif block. In this block, it checks the value of r is greater then g, and b if it is true it will return a string value, that is "red" otherwise it will go to another elif block.   In this block, it checks the value of b is greater then g, and r if it is true it will return a string value, that is "blue" otherwise it will go to another elif block.    In this block, it checks the value of g is greater then r and b if it is true it will return a string value, that is "green" otherwise it will go to another elif block.    In the other block, it checks r is equal to g or g is equal to b or r is equal to b, it will return the value, that is "yellow" or "teal" or "purple".

When backing up a database server to LTO tape drives, the following schedule is used. Backups take one hour to complete.
Sunday (7PM) : Full backup
Monday (7PM) : Incremental
Tuesday (7PM) :I Incremental
Wednesday (7PM) : Differential
Thursday (7PM) : i Incremental
Friday (7PM) : i Incremental
Saturday (7PM) : Incremental
On Friday at 9:00PM there is a RAID failure on the database server. The data must be restored from backup. Which of the backup tapes that will be needed to complete this operation?
A. 1
B. 2
C. 3
D. 4
E. 5

Answers

Answer:

C. 3

Explanation:

Linear Tape Open LTO tape drives are magnetic tapes used to store data. This can be used with small and large computers for backup purposes. The backup needs to maintained frequently so that new data is backup on every interval. The is a RAID failure on database server to ensure complete backup there must be 3  backup tapes needed.

Other Questions
Please tell me the answer to c ignore the question b thank you The community and the neighborhood address quality of life by making opportunities for meaningful community involvement and participation in recreation available to residents. True False A spherical balloon is inflated with helium at a rate of 140pift^3/min How fast is the balloon's radius increasing when the radius is 7ft Xavier and Yifei have been married for exactly 37 years.Yifei is four years older than Xavier. Now the sum of their ages is 124. How old was Yifei when theywere married?a) Set up and write an equation that represents Allen is running a marathon. He would like to finish the race in under 5.5 hours. He has already run 3 hours. The inequality 3 + t less-than 5.5 represents the situation. Which number line shows how much longer Allen can run and still meet his goal? helpppDetermine the x-intercept of the line whose equation is given:y = StartFraction x Over 2 EndFraction minus 3a.(6, 0)b.(negative 6, 0)c.(0, three-halves)d.(Negative three-halves, 0) GPAs at CCSU are normally distributed with a mean of 2.38 and a standard deviation of 0.45. Find the z-score for a GPA of 3.06. and discuss the significance of the z-score. In which of the following circumstances, under the doctrine of stare decisis, does the common law rule stated in an earlier judgment not apply to a present case?A. Only when the case concerns a government agency. B. Only when the court distinguishes the earlier decision. C. Only when the parties involved jointly appeal to the courts to do so. D. The doctrine of stare decisis does not allow this kind of a situation. Economists are: Select one: a. concerned with developing theories and interested in solving problems. b. interested in solving problems but not concerned with developing theories. c. reluctant to predict changes in variables such as prices, employment, and spending. d. always in agreement on the best way to implement policy decisions. What two examples of patterns and repetition? a) Complete the table of values for y = 3x 1X-2-10123yI-45 Jasper made a list of the properties of electromagnetic waves. Identify the mistake in the list. Electromagnetic Wave Properties 1. Are made up of an electric field and a magnetic field 2. Are longitudinal waves 3. Can travel through space 4. All travel at the same speed in a vacuum Line 1 has a mistake. Line 2 has a mistake. Line 3 has a mistake. Line 4 has a mistake. Multiply the polynomial.(4x+2)(x-2)PLEASE HELP!!! ASAP!!! The diagram shows a parallelogram.4 cm7 cm100Work out the area of the parallelogram.Give your answer to 2 significant figures. Points A,B,C and D are midpoints of the sides of the larger square. If the smaller square has area 60, what is the area of the bigger square? HELP ASAP!!! Will give brainiest if u get it right! A microbiologist would like to use a noncompetent genus of streptococcal bacteria, Enterococcus faecalis, as a cloning host to express genes from Streptococcus pneumoniae, which is naturally competent. Is this possible? Group of answer choices Which is an example of the bystander effect?A. Of all the people in the park on Sunday, only two of them chooseto use the hiking trail.B. People work together in groups to clean up a park so that it can beused by children who live in the surrounding area.C. Of the 100 people who witnessed a crime in a local park, no onereported it.D. Hundreds of people use a park's facilities every day, and very fewcrimes are committed on the park grounds. A baseball player has a batting average of 0.25. What is the probability that he has exactly 2 hits in his next 7 at bats Which is the role of the gall bladder?