ow can you know if the person or organization providing the information has the credentials and knowledge to speak on this topic? One clue is the type of web site it is--the domain name ".gov" tells you that this is a government web site.

Answers

Answer 1

Answer:

The answer to this question can be defined as follows:

Explanation:

In the question it is defined the given site is a government site because its domain is ".gov"  and all the gov website is a launching place for people can read about both the past of government, organizational principles, ethical standards, and data on elected politicians and other city employees. Its data is very relevant because it is based on the research that's why it is we know the data is credentials.


Related Questions

Consider the following table used for grading assignments.
Score in points Grade
90-100 A
80-89 B
70-79 C
60-69 D
59 and below F
Your task is to test a course assessment utility that uses the criteria given above. List the valid and invalid equivalent partitions and give the test cases for each. Your test cases are required to incorporate boundary value testing.

Answers

Answer:

We can use if-else statements to implement the given problem.

C++ Code:

#include <iostream>

using namespace std;

int main()

{

   int marks;

   cout<<"Enter the marks"<<endl;

   cin>>marks;

  if (marks>=90 && marks<=100)

  {

cout<<"Grade: A"<<endl;

  }

else if (marks>=80 && marks<=89)

{

cout<<"Grade: B"<<endl;

}

else if (marks>=70 && marks<=79)

{

cout<<"Grade: C"<<endl;

}

else if (marks>=60 && marks<=69)

{

cout<<"Grade: D"<<endl;

}

else if (marks>=0 && marks<=59 )

{

cout<<"Grade: F"<<endl;

}

else

{

cout<<"Invalid marks!"<<endl;

}

   return 0;

}

Test results:

Enter the marks

100

Grade: A

Enter the marks

90

Grade: A

Enter the marks

89

Grade: B

Enter the marks

80

Grade: B

Enter the marks

79

Grade: C

Enter the marks

70

Grade: C

Enter the marks

69

Grade: D

Enter the marks

60

Grade: D

Enter the marks

59

Grade: F

Enter the marks

45

Grade: F

Enter the marks

105

Invalid marks!

Enter the marks

-6

Invalid marks!

Hence all the cases are working fine!

In a telephone system, the lines that connect customers to the nearest switch are called ________. the access loop local lines the local loop trunk lines

Answers

Answer: T1 and T3 lines

Explanation:

Suppose the count function for a string didn’t exist. Define a function that returns the number of non-overlapping occurrences of a substring in a string.

Answers

Answer:

I am writing a Python program:

import re

def NonOverlapping():

   string = input("Enter a string: ")

   substring = input("Enter a substring to find its non-overlapping occurances in " + string +": ")

   occurrences=len(re.findall(substring,string))

   return occurrences

print("The number of non-overlapping occurrences: " , NonOverlapping())

Explanation:

I will explain the program line by line.

import re  this is the module for performing regular expressions matching operations in Python.

def NonOverlapping(): this is the function definition. The function name is NonOverlapping and this function returns the number of non-overlapping occurrences of a substring in a string.

string = input("Enter a string: ")

substring = input("Enter a substring to find its non-overlapping occurances in " + string +": ")

The above two statement ares used to take input from the user. First the user is prompted to enter a string and the string is stored in string variable. Next user is asked to input the substring and its stored in susbtring variable.

occurrences=len(re.findall(substring,string)) This is the main line of the function. It has two methods i.e. len() and re.findall().

The re.findall() method returns all non-overlapping matches of substring in string. The string is checked for the given substring from left to right and all the non-overlapping occurrences of the substring are found and a list of matches is returned. len() method is used to return the length of the string but here it is used to count the number of non-overlapping occurrences substring in a string which are returned by re.findall() method. The whole result of these two methods is stored in occurrences.

return occurrences  This statement returns the number of non-overlapping occurrences of a substring in a string computed in the above statement.

print("The number of non-overlapping occurrences: " , NonOverlapping())

This statement displays the result by calling NonOveralling() method.

Select the correct answer.

Maggie is preparing a business report. Which type of keys will she use to type in letters, numbers, symbols, and punctuations?

A typing keys

B. navigation keys

C.

function keys

OD

control keys

Answers

Answer:

Explanation:

On a windows operating system or any computer based application there are only three types of keys, these are alphanumeric keys, punctuation keys and special keys.  Therefore the answers provided are not accurate. Each of these types of keys serves different purposes as follows.

Letters – use alphanumeric keys Numbers – use alphanumeric keys Symbols – use punctuation keys Punctuations – use punctuation keys

If you must use the answers choices provided we can say the following

Letters – use alphanumeric keys  - typing keysNumbers – use alphanumeric keys  - typing keysSymbols – use punctuation keys  - function keysPunctuations – use punctuation keys  - typing keys

The type of keys Maggi will use to type in letters, numbers, symbols, and punctuations are: A. typing keys.

An input device can be defined as an electronic device that is typically designed and used for sending data to a computer system. Thus, these devices are used for entering data (information) into a computer system.

In Computer technology, some examples of input devices include the following:

MouseScannerMicrophoneKeyboard

A keyboard refers to a an electronic device that is typically designed to allow end users type textual information such as letters, numbers, symbols, and punctuations.

In this scenario, the type of keys Maggi will use to type in letters, numbers, symbols, and punctuations are typing keys because it comprises the 26 alphabets, number one to nine, and special characters or symbols.

Read more: https://brainly.com/question/17402566

(Find the index of the smallest element) Write a function that returns the index of the smallest element in a list of integers. If the number of such elements is greater than 1, return the smallest index. Use the following header: def indexOfSmallestElement(lst): Write a test program that prompts the user to enter a list of numbers, invokes this function to return the index of the smallest element, and displays the index.

Answers

Answer:

Here is the function that returns the the smallest element in a list of integers

def indexOfSmallestElement(lst):

  smallest = lst.index(min(lst))

  return smallest

Explanation:

The function indexOfSmallestElement() takes a list of integers lst as parameter.

  smallest = lst.index(min(lst))

In the above statement two methods are used i.e. index() and min().

The first method index returns the index position of the list and the second method min() returns the minimum element of the list.

Now as a whole the statement min() first returns the smallest element in the list (lst) of integers and then the index() method returns the position of that minimum element of lst. At the end the index position of this smallest element in the list (lst) is stored in the smallest variable.

So lets say if we have a list of the following elements: [3,2,1,7,1,8] then min() returns the smallest element in this list i.e. 1 and index() returns the index position of this smallest element. Now notice that 1 occurs twice in the list and index() method only returns the the first index found in the list. So it returns the smallest index of the two index positions of 1 i.e 2. Hence the output is 2.

The test program is given below:

lst=list()  

num=int(input("Enter the list size: "))

print("Enter a list of numbers: ")

for i in range(int(num)):

  integers=int(input(""))

  lst.append(integers)

print("The index of the smallest element is: ")

print(indexOfSmallestElement(lst))

First the list named lst is created. After that the user is prompted to enter the size of the list which determines how many elements user wants to add to the list. num holds the size input by user. After that print statement displays the line"Enter a list of numbers: ". Next the for loop takes the integers from user num times. Suppose user want to enter 3 as list size then loop will take 3 elements from user. int(input("")) in this statement integer type input is taken from user using input() method. lst.append(integers)  statement is used to append these input integers into the list i.e. lst. print(indexOfSmallestElement(lst)) the statement calls the indexOfSmallestElement by passing lst to this method to return the index of the smallest element in the list of integers.

A technician is evaluating malware that was found on the enterprise network. After reviewing samples of the malware binaries, the technician finds each has a different hash associated with it. Which of the following types of malware is MOST likely present in the environment?

a. Trojan
b. Polymorphic worm
c. Rootkit
d. Logic bomb
e. Armored virus

Answers

Answer:

(b) polymorphic worm

Explanation:

A polymorphic worm can be compared with a chameleon. It changes its color so as to blend with the background of the surrounding to avoid being seen or caught. A polymorphic worm is a special type of worm that keeps changing its constituent features in order to avoid being detected. The most common way in which polymorphic worms hide their codes is by using encryption.

Polymorphic worms have two parts: the part that changes and the one that does not change. The part that changes include the characteristics of the worm such as encryption key, associated hash value e.t.c. The part that does not change is basically its functionality. Therefore, although the characteristics of the worm keep changing, its overall function remains the same.

Traffic shaping reduces traffic by ________. preventing certain undesirable traffic from entering the network limiting the amount of certain undesirable traffic entering the network both preventing certain undesirable traffic from entering the network and limiting the amount of certain undesirable traffic entering the network neither preventing certain undesirable traffic from entering the network nor limiting the amount of certain undesirable traffic entering the network

Answers

Answer:

Explanation:

Traffic Shaping is a technique for managing congestion on a network by delaying the flow of less important/desired packets on the network so more valuable/desirables ones are able to pass. Traffic shaping reduces traffic by preventing certain undesirable traffic from entering the network as well as limiting the amount of certain undesirable traffic entering the network.

True or False: It is okay to just paste the URLs of the items you used for references at the end of a paper. Select one: True False

Answers

True as long as it isn’t on a test

It is not okay to just paste the URLs of the items you used for references at the end of a paper therefore the answer is False

For better understanding, lets explain why the answer is false

When citing a reference it not OK to cite URLs. when you are citing onlh the URL is wrong because theURL could change at any time and the fact remain that it is not everyone who reads your paper can do it electronically or has access to the internet., so the url is not the first step to take. The right thing to do is to give the name of the paper, the author(s), the Journal it was published in and the year it was published.



From the above, we can therefore say that the answer is It is not okay to just paste the URLs of the items you used for references at the end of a paper therefore the answer is False, is correct.

Learn more about referencing from:

https://brainly.com/question/13003724

In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers.

Answers

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

Constructing a concurrent server by spawning a process has some advantages and disadvantages compared to multithreaded servers. Discuss a few.

Answers

Answer:

The advantage and the disadvantage of the relevant query are illustrated in the explanation in the paragraph below.

Explanation:

Advantage:

The benefit of creating a simultaneous server through spawning a mechanism seems to be that alternative methods are shielded against everyone else, which would be very necessary whenever the extremely database manages communication services entirely.

Disadvantage:

The downside about creating a concurrent system through spawning a methodology seems to be that this process seems to be very expensive but using multicore processing systems should save this expense. It is also easier when using threads again for the aim of communicating between two or even more participants although we stop the kernel executing the correspondence.

Your smartphone, digital camera, and printer are all part of a network in your workspace. What type of network is likely in use

Answers

Answer:

PAN

Explanation:

PAN, short form of Personal Area Network, is a type of computer network built for personal use typically within a building. This could be inside a small office or a bedroom in a residence. This type of network basically consists of one or more personal computers, digital camera, printer, Tv, scanner, telephones, peripheral devices, video games console, and other similar devices.

It is pretty much simple to set up and allow for great flexibility. In this network, a single modem can be set up to enable both wired and wireless connections for multiple devices within the building.

C program, Assign negativeCntr with the number of negative values in the linked list, including the list head.
#include
#include
typedef struct IntNode_struct {
int dataVal;
struct IntNode_struct* nextNodePtr;
} IntNode;
// Constructor
void IntNode_Create(IntNode* thisNode, int dataInit, IntNode* nextLoc) {
thisNode->dataVal = dataInit;
thisNode->nextNodePtr = nextLoc;
}
/* Insert newNode after node.
Before: thisNode -- next
After: thisNode -- newNode -- next
*/
void IntNode_InsertAfter(IntNode* thisNode, IntNode* newNode) {
IntNode* tmpNext = NULL;
tmpNext = thisNode->nextNodePtr; // Remember next
thisNode->nextNodePtr = newNode; // this -- new -- ?
newNode->nextNodePtr = tmpNext; // this -- new -- next
}
// Grab location pointed by nextNodePtr
IntNode* IntNode_GetNext(IntNode* thisNode) {
return thisNode->nextNodePtr;
}
int IntNode_GetDataVal(IntNode* thisNode) {
return thisNode->dataVal;
}
int main(void) {
IntNode* headObj = NULL; // Create intNode objects
IntNode* currObj = NULL;
IntNode* lastObj = NULL;
int i; // Loop index
int negativeCntr;
negativeCntr = 0;
headObj = (IntNode*)malloc(sizeof(IntNode)); // Front of nodes list
IntNode_Create(headObj, -1, NULL);
lastObj = headObj;
for (i = 0; i < 10; ++i) { // Append 10 rand nums
currObj = (IntNode*)malloc(sizeof(IntNode));
IntNode_Create(currObj, (rand() % 21) - 10, NULL);
IntNode_InsertAfter(lastObj, currObj); // Append curr
lastObj = currObj; // Curr is the new last item
}
currObj = headObj; // Print the list
while (currObj != NULL) {
printf("%d, ", IntNode_GetDataVal(currObj));
currObj = IntNode_GetNext(currObj);
}
printf("\n");
currObj = headObj; // Count number of negative numbers
while (currObj != NULL) {
/* Your solution goes here */
currObj = IntNode_GetNext(currObj);
}
printf("Number of negatives: %d\n", negativeCntr);
return 0;
}

Answers

Answer:

if(currObj->GetDataVal() < 0)

         {

            negativeCntr++;

}

Explanation:

This is the solution in C++ try in C see if it works (I'm more knowledgeable on C++)

You have to use the function GetDataVal() in order to receive the value attached to the currObj you are looking for. The while loop used above it goes through each node to see if it's not null, or in other words, if the memory location has a value. If the location has a value then the value itself is checked and if the value is less than 0, negativeCntr = negativeCntr + 1;

Problem You Need to Solve for This Lab:

You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should save the data back to the same data file when the program exits.

What Your Program Should Do:

Write an interactive text based menu interface (using a loop) that will allow the user to

ï‚· Enter information for a new song

ï‚· Display information for all the songs in the database with index for each song

ï‚· Remove a song by index

ï‚· Search for songs by a certain artist

ï‚· Search for songs by a certain album

ï‚· Quit

For each song, you need to keep track of:

title

artist

duration

album

Allow the program to keep looping until user wants to quit. When the program starts, it should load the tasks from external file ("songs.txt") into memory. When user enters information about the new song, the program needs to read them in, save them in memory and eventually write them to the external data file ("songs.txt"). The file format could look like:

Stereo Hearts;Gym Class Heroes;3;34;The Papercut Chronicles II
Counting Stars;OneRepulic;4;17;Native
The ';' is used as a delimiter or field separator. Each record ends with a new line character.

Some Implementation Requirements:

Write at least four functions WITH arguments for this assignment.

Use struct named Song to model each song

Use array of structs to model the collection of songs.

Hint: In this assignment, some data fields may have multiple words in it. Therefore,

you now SHOULD read using the 3 argument version of get.

Watch out. When using the 3 argument version of get you need to make sure to

remove the delimiter or newline. Therefore, anytime you read (even a confirmation

message), make sure to eat the newline using cin.ignore(...)!

Make sure to have a delimiter written between each item in the file – like a newline.

This will be important when you read the information back from the file.

For submission, your data file should contain a sufficient set of test data. It should have test cases for same artist with multiple songs and same album with multiple songs in it.

Do-Not List:

No Global Variables (you can have global constants)

Do not use Classes or Linked Lists

You must use cstring and char arrays. (do not use )

No use of the stdio library (use iostream and fstream)

Instead of the string class, you will be using arrays of characters and the cstring library

No STL containers such as vector. You must implement your own array for this class.

Answers

Answer:

Write questions properly

Explanation:

Then it is easy to say answer

For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addresses to satisfy them? and explain why? b. Say the first block of 64 customers want 128 addresses/customer - what would the address space look like?

Answers

Answer / Explanation:

195.200.0.0/16

Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.

2ⁿ = number of subnets

where n is additional bits borrowed from the host portion.

2ˣ - 2 = number of hosts

where x represent bits for the host portion.

Assuming we have 195.200.0.0/25

In the last octet, we have one bit for the network

number of subnets  = 2¹  =2 network addresses  

number of host = 2⁷ - 2= 126 network addresses per subnets

A security analyst is performing a BIA. The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use back up data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?
A. A maximum MTTR of 30 minutes
B. A maximum MTBF of 30 minutes
C. A maximum RTO of 60 minutes
D. An SLA guarantee of 60 minutes

Answers

Answer:

D.  A maximum RPO of 60 minutes

Explanation:

Note that an option is not included in this list of options.

The complete list of options is:

A. A maximum MTTR of 30 minutes

B. A maximum MTBF of 30 minutes

C. A maximum RTO of 60 minutes

D.  A maximum RPO of 60 minutes

E. An SLA guarantee of 60 minutes

The Recovery Point Objective tells how old a backup file must be before it can be  recovered by a system after failure.

Since the data in the failover systems described in this question must be backup and recovered after the failure, it will be important to include the Recovery Point Objective (RPO) in the Business Continuity Plan.

Since the failover systems must use back up data that is no older than one hour, the backup of the system data must be done at intervals of 60 minutes or less. Meaning that the maximum RPO is 60 minutes.

Note that RPO is more critical than RTO in data backup

#this is 34 lines -- you can do it! # #In web development, it is common to represent a color like #this: # # rgb(red_val, green_val, blue_val) # #where red_val, green_val and blue_val would be substituted #with values from 0-255 telling the computer how much to #light up that portion of the pixel. For example: # # - rgb(255, 0, 0) would make a color red. # - rgb(255, 255, 0) would make yellow, because it is equal # parts red and green. # - rgb(0, 0, 0) would make black, the absence of all color. # - rgb(255, 255, 255) would make white, the presence of all # colors equally. # #Don't let the function-like syntax here confuse you: here, #these are just strings. The string "rgb(0, 255, 0)" #represents the color green. # #Write a function called "find_color" that accepts a single #argument expected to be a string as just described. Your #function should return a simplified version of the color #that is represented according to the following rules: # # If there is more red than any other color, return "red". # If there is more green than any other color, return "green". # If there is more blue than any other color, return "blue". # If there are equal parts red and green, return "yellow". # If there are equal parts red and blue, return "purple". # If there are equal parts green and blue, return "teal". # If there are equal parts red, green, and blue, return "gray". # (even though this might be white or black). #Write your function here!

Answers

Answer:

Following are the code to this question:

def find_color(color):#definig a method find_color that accepts color parameter

   color = str(color).replace('rgb(', '').replace(')', '')#definig color variable that convert parameter value in string and remove brackets

   r, g, b = int(color.split(', ')[0]), int(color.split(', ')[1]), int(color.split(', ')[2])#defining r,g,b variable that splits and convert number value into integer

   if r == g == b:#defining if block to check if r, g, b value is equal

       return "gray"#return value gray

   elif r > g and r > b:#defining elif block that checks value of r is greater then  g and b

       return "red"#return value red

   elif b > g and b > r:#defining elif block that checks value of b is greater then g and r

       return "blue"#return value blue

   elif g > r and g > b:#defining elif block that checks value of g is greater then r and b

       return "green"#return value green

   elif r == g:#defining elif block that checks r is equal to g

       return "yellow"#return value yellow

   elif g == b:#defining elif block that checks g is equal to b

       return "teal"#return value teal

   elif r == b:#defining elif block that checks r is equal to b

       return "purple"#return value purple

print(find_color("rgb(125, 50, 75)"))#using print method to call find_color method that accepts value and print its return value

print(find_color("rgb(125, 17, 125)"))#using print method to call find_color method that accepts value and print its return value

print(find_color("rgb(217, 217, 217)"))#using print method to call find_color method that accepts value and print its return value

Output:

red

purple

gray

Explanation:

In the above method "find_color" is declared that uses the color variable as the parameter, inside the method a color variable is declared that convert method parameter value into the string and remove its brackets, and three variable "r,g, and b" is defined.  In this variable first, it splits parameter value and after that, it converts its value into an integer and uses the multiple conditional statements to return its calculated value.

if block checks the r, g, and b value it all value is equal it will return a string value, that is "gray" otherwise it will go to elif block. In this block, it checks the value of r is greater then g, and b if it is true it will return a string value, that is "red" otherwise it will go to another elif block.   In this block, it checks the value of b is greater then g, and r if it is true it will return a string value, that is "blue" otherwise it will go to another elif block.    In this block, it checks the value of g is greater then r and b if it is true it will return a string value, that is "green" otherwise it will go to another elif block.    In the other block, it checks r is equal to g or g is equal to b or r is equal to b, it will return the value, that is "yellow" or "teal" or "purple".

In a deployment with multiple indexes, what will happen when a search is run and an index is not specified in the search string?

Answers

Answer:

no events will be returned

Explanation:

Can Someone Help
Please Show Work​

Answers

Answer:

1) 1/14

2) 1/7

Explanation:

Summer Vacation

Number of times letters listed

S 1

U 1

M 2

E 1

R 1

V 1

A 2

C 1

T 1

I 1

O 1

N 1

Probability= Successful outcome ÷ Possible outcome.

Successful outcome(C)=1

*Successful outcome(M)=2

Successful outcome refers to letters chosen.

*Possible outcome=14

*Possible outcome refers to total number of letters.

Probability of C =1/14

Probability of M= 2/14=1/7

Hope this helps ;) ❤❤❤

Let me know if there is an error in my answer.

The common channel signaling (CCS) system provides a separate network dedicated to control and signaling over the PSTN. This enables subscribers to establish calls on an on-demand basis.
A. True
B. False

Answers

The correct answer is A.True

Common Channel Signaling (CCS) is a type of signaling used in multichannel communications systems to control, account for, and manage traffic on all the channels of a link. User information is not sent over the common-channel signaling channel.

What CCS system provides a separate network?

Digital communication signaling takes the form of channel-associated signaling (CAS), often referred to as per-trunk signaling (PTS).

It uses routing information, like the majority of telecommunication signaling techniques, to send the voice or data payload to the intended recipient.

The SMS effectively serves as the CAS's administration hub. It is a hardware and software combination that is integrated with the CAS server. Each subscriber's information, including the TV stations they have chosen to subscribe to, is stored and managed via SMS.

Therefore, it is true that  (CCS) is a type of signaling where a collection of speech and data channels share an exclusive channel for control signals.

Learn more about system here:

https://brainly.com/question/29491324

#SPJ5

The Employee class will contain a String attribute for an employee’s name and a double attribute for the employee’s salary. Which of the following is the most appropriate implementation of the class?

a. public class Employee

{
public String name;
private double salary;
// constructor and methods not shown
}

b. public class Employee
{
private String name;
private double salary;
// constructor and methods not shown
}

c. private class Employee
{
public String name;
public double salary;
// constructor and methods not shown
}

d. private class Employee
{
private String name;
private double salary;
// constructor and methods not shown
}

Answers

Answer:

The answer is "Option b".

Explanation:

In the choice b, a public class "Employee" is declared, in which two private variables "name and salary" is declared whose data type is a string and double. At this, the class is accessible outside the scope but it variable accessible in the class only and the wrong choice can be defined as follows:

In choice a, datatypes access modifiers were different that's why it is wrong.In choice c and d both classes use a priavte access modifier, which means it can't accessible outside that's why it is wrong.

cal address EtherAddr. What would happen if, when you manually added an entry, you entered the correct IP address, but the wrong Ethernet address for that remote interface

Answers

The arp command allows users to download and edit the Address Resolution Protocol cache.Whenever time a laptop's TCP/IP stack utilizes ARP to determine its Multimedia Access Control address after an IP address, it records the mappings in the ARP cache because the future ARP iterators proceed quicker.In this, when the Router removes the IP address from the Ethernet frame after receiving the destination IP address & uses ARP to determine the destination MAC address.The information is sent to the ethernet address; IP is on a higher layer, therefore this would be lost before the user stored their layer.That's why the solution in "all information would be lost".

Learn more:

brainly.com/question/7342246

The Address Resolution Protocol ARP cache maintained by ARP keeps a record of IP addresses and their corresponding Media Access Control, MAC address

The correct response to what would happen if the wrong EtherAddr is

entered into the arp-s InetAddr EtherAddr command is that;

The system will not be able to connect to the IP address linked to the wrong Ethernet address.

The reason the above response is correct is as follows:

Characteristics of the ARP protocol;

The ARP protocol is a protocol that has a high level of control such that

the reply is trusted and can be used to redirect traffic through spoofing of

the responses to ARP which are then stored in the cache.

Functioning of the arp -s InetAddr EtherAddr command;

The command arp -s InetAddr EtherAddr command inputs a manual entry

into the ARP cache that works to assign the inputted IP address in InetAddr

to the MAC physical address in EtherAddr.

The ARP provides the translation from physical MAC addresses of Layer 2

to  the IP address of Layer 3 by mapping the MAC address to the IP

address.

Solution:

What would happen if, when you manually added an entry, you entered the correct IP address, but the wrong Ethernet address for that remote interface is as follows;

When the wrong Ethernet address is entered in the arp -s command, the

IP-address is resolved as belonging to the wrong Ethernet  or MAC

address, and if the address does not exist, it will not be possible to

connect to the correct or desired IP address.

Learn more about ARP here:

https://brainly.com/question/13068535

https://brainly.com/question/22696379

https://brainly.com/question/12975431

When backing up a database server to LTO tape drives, the following schedule is used. Backups take one hour to complete.
Sunday (7PM) : Full backup
Monday (7PM) : Incremental
Tuesday (7PM) :I Incremental
Wednesday (7PM) : Differential
Thursday (7PM) : i Incremental
Friday (7PM) : i Incremental
Saturday (7PM) : Incremental
On Friday at 9:00PM there is a RAID failure on the database server. The data must be restored from backup. Which of the backup tapes that will be needed to complete this operation?
A. 1
B. 2
C. 3
D. 4
E. 5

Answers

Answer:

C. 3

Explanation:

Linear Tape Open LTO tape drives are magnetic tapes used to store data. This can be used with small and large computers for backup purposes. The backup needs to maintained frequently so that new data is backup on every interval. The is a RAID failure on database server to ensure complete backup there must be 3  backup tapes needed.

Write a statement that uses the decrement operator, in prefix mode, to decrease the value of the variable time.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

    int time = 60;

    --time;

    System.out.println(time);

}

}

Explanation:

*The code is in Java.

Initialize an integer called time and set it to some value, in this case 60

To use the decrement operator in prefix mode, you need to write the decrement operator, --, before the variable time. The decrement operator decreases the variable value by one first and then gives back the new value. In our example the output will be 59.

A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Choose two.)
A. Vishing
B. Whaling
C. Spear phishing
D. Pharming
E. War dialing
F. Hoaxing

Answers

Answer: Spear phishing; Pharming

Explanation:

Based on the information given in the question, the security concerns that need to be identified and mitigated are spear phishing and pharming.

Spear phishing is the fraudulent practice whereby emails are sent from a trusted sender in which people are targeted to give out some confidential information.

Pharming is a cyberattack whereby the traffic of a website is redirected to another fake site. This is typically done when the host file on the computer of the victim has been changed.

A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way
A. PEP
B. DDI
C. IDEP
D. IDME

Answers

Answer:

B. DDI

Explanation:

A(n) DDI event is an alert that is produce or invoke when the gossip traffic allow a platform to conclude that an attack or potential attack is under way.

A device driver is a computer program that operates or controls a particular type of device that is attached to a computer system.

A driver provides or supply a software interface to hardware devices which enable the operating systems and other computer programs to access hardware functions without needing to know the exact details in respect of the hardware being used.

DDI means Device Driver Interface

A driver relate or communicate with the device via the computer bus or communications subsystem to which the hardware is connected. Whenever a calling program invokes a routine in the driver, the driver will subsequently transmit commands to the device.

You are an ISP. For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addresses to satisfy them? and explain why? b. Say the first block of 64 customers want 128 addresses/customer - what would the address space look like?

Answers

Answer:

a. The network will not satisfy the customers because the required addresses is 128 but what can be offered is 126.

b. 195.200.0.0/22

Explanation:

195.200.0.0/16

The number of bits to give 512 is 9

2^9=512

2^8=256 which is not up to our expected 320 customers that requires a network ip

Note we have to use a bit number that is equal or higher than our required number of networks.

The number of host per each subnet of the network (195.200.0.0/25) is (2^7)-2= 128-2=126

The network will not satisfy the customers because the required addresses is 128 but what can be offered is 126.

b. 64 customers requires  6 bits to be taken from the host bit to the network bit

i.e 2^6 = 64

195.200.0.0/22

The number of host per each subnet of the network (195.200.0.0/22) is (2^10)-2=1024 - 2 = 1022 hosts per subnet

This network meet the requirement " 64 customers want 128 addresses/customer "

What would be suggested way to share and sustain knowledge with members in a team ?
A) Sharing of best practices and lessons learnt through emails
B) Sharing knowledge through knowledge sharing sessions
C) Sharing knowledge through informal conversations, for example, during lunch breaks.
D) Sharing best practices, lessons learnt and other topics in a central place where team can collaborate

Answers

Answer: D) Sharing best practices, lessons learned and other topics in a central place where the team can collaborate

Explanation: Knowledge sharing within a team is usually an important aspect of building a strong and efficient team. Acquiring knowledge usually comes from the experience gathered from previous projects, learning, or tips learned from various sources. Therefore, sharing knowledge is always a good way to ensure that what is gained is sustained by letting others know. Sharing and sustaining knowledge is most effective when transmitted or aired to a group of people usually a team gathered in an interactive setting which allows members to freely share experience and get feedback, views, or thoughts from other collaborators.

The ethical framework that assumes that people are deeply connected to one another in webs of relationships, and that ethical decisions cannot be made outside the context of those relationships is known as

Answers

Answer:

Ethics of Care

Explanation:

Ethics of care is a feminist philosophical idea that promotes the idea that the interpersonal relationship between individuals should be a determinant of their moral response to different situations. The theory was developed by Carol Gilligan. The emphasis of this theory is on how to respond to situations, taking into context, a person's relationship with others.

According to a philosopher named Tronto, for people to be effective at displaying care, they would need to;

1. be attentive to the needs of others

2. be responsible for their situations

3. be adequately qualified to render such help, and

4 be responsive enough to the needs of others.

Define the term residential subscriber as it pertains to the telecommunications industry. Explain what is meant by the term rate center as it pertains to local telephone service. Who is responsible for determining the rate center boundaries for a calling region? Explain the difference between the terms rate center and wire center as they pertain to the local telephone serving area.

Answers

Answer:

According to section 40-15-102(18) of the Colorado Revised Statutes (CRS), a residential “Residential subscriber” is an individual who has elected to receive residential telephone service with a local exchange provider. The definition of “Person” here is extended to include any other persons living or residing with the residential subscriber.

A rate center is a geographical area used to define and organise the perimeter for local calling, for billing, and for assigning specific phone numbers, which can include multiple area codes.

The rate center boundaries are determined by Local Exchange Carriers (LEC)

LEC is just a regulatory jargon in the telecoms sector for the local telephone company.

A wire center is the actual physical telephone exchange building.

A rate center, on the other hand, is a regulatory concept designed with the primary goal to make billing administration within the local telephone serving area easy.

Cheers!

 

What are the differences between editing manually and editing digitally? What tools are used for each?

Answers

Answer:

Both manual and digital editing are concepts used in proofreading.

Manual editing is also called "hard proofreading" (or "hard proofing" for short). It is the process of proofreading, modifying or revising printed documents. In this type of proofreading, one would normally manually mark parts of the printed documents with editing materials such as ink, pen, marker e.t.c

Digital editing is also called "soft proofing". In contrast to manual editing, this type is done on digital documents. These documents include, but not limited to, DOC, txt, PDF, image, audio and video files.

Tools for editing manually are;

i. pen

ii. ink

iii. tipex

Tools for editing digitally are;

i. Photoshop application

ii. Text editors such as notepad++, Microsoft word

Proofreading has evolved in recent times as a result of advancements in technology. Now, manual proofreading has paved way for digital proofreading, which allows revising of PDF and  DOC files. The difference in both forms is as follows:

Manual Editing: In the process of revising or proofing printed documents, one would manually apply standard proofreading marks. Manual editing is also known as "Hard proofing", as the process requires proofreaders to mark the hard copies.

Digital Editing: In the process of revising or proofing digital documents i.e. PDF and DOC files, one would digitally apply the proofreading marks. Thus, corrections and edits are transferred electronically among authors, proofreaders. Digital editing is also known as "Soft proofing", as the process requires proofreaders to mark the soft copies i.e. without using any paper or pen.

There are a number of electronic tools and marks available for both techniques of

proofreading. Some tools used for manual proofreading include- deletion, capitalization, and  insertion, close-up, transpose.

Tools used in digital proofreading include- spell check, readability levels, trite expressions,  and comment, track changes.

Learn More: https://brainly.com/question/10002469

Other Questions
Qu significa, segn tu propia opinin la frase llevar la pregunta a la mxima expresin, preguntar el porqu del porqu del porqu del porqu y as, al infinito? A quiz has twenty questions with 7 points awarded for each correct answer, 2 points deducted for each wrong answer and 0 for each question omitted. Jack scored 87 points. How many questions did he omit? My math teacher gave us this as an optional challenge problem for 8th grade math. I got stuck on it, so if someone could give me some hints or at least tell me what I should be doing, Id appreciate it. Like how the heck do I know which ones are correct vs which ones are omitted? Is it a multiple answer problem? The grade of a road is its slope written as a percent. A warningsign must be posted if a section of road has a grade of at least 8% and ismore than 750 feet long.a. Interpret and Apply A road rises 63 feet over a horizontal distanceof 840 feet. Should a warning sign be posted? Explain your thinking.b. Critical Thinking The grade of a section of road that stretches over ahorizontal distance of 1000 feet is 9%. How many feet does the roadrise over that distance? A motor is 85.4 % efficient: that is, the output is 85.4 % of the input.What is the input if the motor delivers 10.75 hp. ( Round your answer to 1decimal place.) What was the result of Huayna Capac's military campaigns in the north? Which of the following statement completions is CORRECT? If the yield curve is upward sloping, then the marketable securities held in a firm's portfolio, assumed to be held for emergencies, should a. consist mainly of long-term securities because they pay higher rates. b. be balanced between long- and short-term securities to minimize the adverse effects of either an upward or a downward trend in interest rates. c. consist mainly of short-term securities because they pay higher rates. d. consist mainly of U.S. Treasury securities to minimize interest rate risk. e. consist mainly of short-term securities to minimize interest rate risk. Based on Bontas (1997) research on nonviolent societies, a powerful way to reduce violence within a society would be to:______. a. emphasize a strict division of labor by gender. b. promote cooperation. c. harshly punish all acts of aggression. d. separate subcultures within the society. Samatha received $500 as a graduation present and decides to invest it in an account that iscompounded continuously. How much will be in the account at the end of 5 years if the interestrate is 3%? What is the solution to the system of equations x+y=10 and x+2y=4 using the linear combination method? What is one reason why a business may want to move entirely online?A. To limit the number of items in its inventoryOB. To double the number of employeesC. To focus on a global marketD. To avoid paying state and local taxes If y 4 = 2x, which of the following sets represents possible inputs and outputs of the function, represented as ordered pairs? Which order pair is it? {(2, 1), (4, 2), (6, 3)} {(1, 2), (2, 4), (3, 6)} {(4, 0), (6, 1), (8, 2)} {(0, 4), (1, 6), (2, 8)} HELP ASAP NEED HELPPP Advertising expenses are a significant component of the cost of goods sold. Listed below is a frequency distribution showing the advertising expenditures for 40 manufacturing companies. Estimate the mean, median, and standard deviation of advertising expense.Advertising Expenditure ($millions) Number of companies$20 to under $30 930 to under 40 1340 to under 50 2150 to under 60 1860 to under 70 14Total 75 Tyson is a 25 percent partner in the KT Partnership. On January 1, KT makes a proportionate, liquidating distribution of $16,000 cash and land with a $16,000 fair value (inside basis $8,000) to Tyson. KT has no liabilities at the date of the distribution. Tyson's basis in his KT Partnership interest is $20,000. What is the amount and character of Tyson's gain or loss from the distribution Which of the following people might enjoy working as a pharmacist? A. Joseph enjoys art, working alone, and having a schedule he can control. B. Linda enjoys learning how the body works, working out, and wants an exciting occupation. C. April enjoys science classes, likes to work with others, and finds medicine fascinating. D. Frank enjoys learning about history, working with children, and having a consistent schedule. Given that f(x) =2x-3 and g(x) =1-x^2 calculate f(g(0)) and f(g(0)) Why are physicists hired to work at computer manufacturing companies?O A. Computers are very popular products.O B. Computers are sold throughout the world.C. Computers involve matter and energy.O D. Computers are a new kind of product. An electron, moving west, enters a magnetic field of a certain strength. Because of this field the electron curves upward. What is the direction of the magnetic field? Select the correct answers. Which two changes might be suggested by a peer reviewer? a topic b spelling c punctuation d theme e tone An evaluation in which the performance level of employees is measured against established standards to make decisions about promotions, compensation, additional training, or termination is called an A. employment assessment. B. a performance appraisal. C. a job specification. D. a job analysis.