Answer:
GIVE this man Brainliest!
Explanation:
Write a program which asks the user for their name and age. The program should then print a sentence.
What is your name?
Cory
What is your age?
48
Cory is 48 years old.
Answer:
name = input("What is your name? ")
age = int(input("What is your age? "))
print("%s is %d years old."% (name, age))
Explanation:
This is a solution in python.
What Is an Antivirus?
Answer:
Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer.
Explanation:
write asswmbly prgram and do the following:
You have two numbers, the first one is 32 bits and the second is a 16 bits number. Find the result of division and store it in memory location called RESULT then store the reminder of division in memory location called MOD. (Use MACRO)
Answer:
I did this last year :/ i feel your pain.
Explanation:
Answer the following questions:
Question 4
............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.
Group of answer choices
Transforming
Framing
Separating
Messaging
Question 5
Functions of data link control includes
Group of answer choices
framing
flow and error control
addressing
All of above
Question 6
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
Group of answer choices
User mode
Enable mode
Global configuration mode
VLAN mode
Interface configuration mode
Question 7
It is how the receiver detects the start and end of a frame.
Group of answer choices
Error control
Flow control
Framing
None of the above
Question 8
Which of the following describes a way to disable IEEE standard autonegotiation on a 0/00 port on a Cisco switch?
Group of answer choices
Configure the negotiate disable interface subcommand
Configure the no negotiate interface subcommand
Configure the speed 00 interface subcommand
Configure the duplex half interface subcommand
Configure the duplex full interface subcommand
Configure the speed 00 and duplex full interface subcommands
Question 9
______ substitutes eight consecutive zeros with 000VB0VB.
Group of answer choices
B4B8
HDB3
B8ZS
none of the above
Question 0
In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of the receiver to group the bits.
Group of answer choices
synchronous
asynchronous
isochronous
none of the above
Question
In _______ transmission, bits are transmitted over a single wire, one at a time.
Group of answer choices
asynchronous serial
synchronous serial
parallel
(a) and (b)
Question 2
Digital data refers to information that is
Group of answer choices
Continuous
Discrete
Bits
Bytes
Question 3
Two common scrambling techniques are ________.
Group of answer choices
NRZ and RZ
AMI and NRZ
B8ZS and HDB3
Manchester and differential Manchester
Question 4
________ is the process of converting digital data to a digital signal.
Group of answer choices
Block coding
Line coding
Scrambling
None of the above
Question 5
A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
Group of answer choices
It drops the frame. .
It floods the frame out of all active ports, except the origination port.
It sends out an ARP request looking for the MAC address.
It returns the frame to the sender
Question 6
The _______ layer changes bits into electromagnetic signals.
Group of answer choices
Physical
Data link
Transport
None of the above
Question 7
Serial transmission occurs in
Group of answer choices
way
2 ways
3 ways
4 ways
Question 8
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Group of answer choices
RAM
ROM
Flash
NVRAM
Question 9
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Select Two)
Group of answer choices
User mode
Enable mode
Global configuration mode
Interface configuration mode
Question 20
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Select Two)
Group of answer choices
The TCP/IP model has seven layers while the OSI model has only four layers.
The TCP/IP model has four or five layers while the OSI model has seven layers.
The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model.
he TCP/IP Application layer is virtually identical to the OSI Application layer.
Answer:
nasaan po yung tanongkkkkk
Assume that the execution time for a program is directly proportional to instruction access time. The access to an instruction in the cache is 10 times faster than access to an instruction in the main memory. If an instruction is not found in the cache, i.e., cache miss, it is fetched from the main memory to the cache and then fetched from the cache to be executed. Assume that a requested instruction will cause cache miss has a probability of 0.08. Let the speedup factor is defined as the ratio of program execution time without the cache to program execution time with the cache.
a. Calculate the speedup factor to execute such a program.
b. using this assumption, assuming that the cache is 20 times faster than the main memory.
Answer:
a. 5.81
B. 7.93
Explanation:
A.
X is the time it takes to load instructions from cache
10X = time to execute program
0.08 = probability of cache instructions
1-0.08 = 0.92(92% instructions are going to be loaded from cache).
Tc = time to execute with cache
Tc = 0.92X+0.08x10X
= 0.92X+0.8X
= 1.72X
Speed factor = tm/tc
= 10X/1.72X
= 5.81
B.
If cache is 20 times faster
Tm = 20X
Tc = 0.92X + 0.08 x 20X
= 0.92X + 1.6X
= 2.52X
Speed factor = 20X/2.52X
= 7.93
In this section of your final project, you will write a basic script to create and back up files. You will create this script with the vi editor. The script will combine multiple commands and simplify a repeatable task. Your script should be named Firstname Lastname.BASH. Your script and your Linux directory structure should demonstrate that you have correctly written the script to do the following: Create files: In this section, you will demonstrate your ability to utilize various Linux commands to create text files. Create these files in the NEW directory. Ensure that the commands in your log file show that the following three text files were created using three different methods. Create the following files
XI A. A text file listing the quantity of operating system free space, titledFree_Space Content.txt B. A text file listing the directory contents of the OLD folder, titled OLD_Content.txt C. A text file showing the current month, day, and time (Title this fileTime File.tx.)
XI Modify and Move files: Utilize Linux commands to copy files to a different directory and renamethem A. Copy the following selected files from the OLD directory to the BACKUP directory. Ensure that you change the filename suffix fro XXX OLD to XXX BACKUP i. Free_Space_Content OLD.txt ii Directory Content OLD.txt i Time File OLD.txt Move all files from the NEW directory to the BACKUP directory (no renaming necessary). Clean up the Linux directory structure by deleting the items in the NEW directory B.
Answer:
bjdjdindbdubduf kndjnxjxjfujdjbdjbd bzjbd djbdibdu jdjdidnidndi xubdubdufjksk. xud ufbsjjdi djneibdudbdujfjfbjbdj fu. fjfjjdubdjjdbjd jdbdinkdkdnd. djjdibnfjdkndindundi jdudjbdubd djbdu bdudjdjjd djidndud dudbid anís us dj
Answer:
####Bash Script Start###################################
#######Please check the permissions on the folders inorder to make sure the script works
#!/bin/bash
if [ ! -d NEW ]; then
mkdir -p NEW;
fi
df > "NEW/Free_Space_Content.txt"
touch "NEW/OLD_Content.txt" | ls -l OLD > "NEW/OLD_Content.txt"
> "NEW/Time_File.txt" | date +"%B %c" > "NEW/Time_File.txt"
cp "OLD"/*.txt "BACKUP"
rename OLD BACKUP "BACKUP"/*.txt
mv "NEW"/*.txt "BACKUP"
#############Bash Script End##################################
########Script_Assessment.txt#####################
Commands which were used to create files:
touch filename
command > filename
> filename
Directory and its contents:
NEW: Contained the newly created file
OLD: Contained sample files with OLD suffix
BACKUP: Contains all the files moved from NEW and OLD directories
Free_Space_Content.txt contains the disk info such as used and free space
OLD_Content.txt contains the directory contents info of OLD directory
Time_File.txt : Contais the current month, day and time info
Explanation:
Write a program that prompts the user to enter two points (x1, y1) and (x2, y2) and displays their distance between them. The formula for computing the distance is: Square root of ((x2 - x1) squared + (y2 - y1) squared) Note that you can use pow(a, 0.5) to compute square root of a.
Answer:
x1 = input("enter x value of first number: ")
y1 = input("enter y value of first number: ")
x2 = input("enter x value of second number: ")
y2 = input("enter y value of second number: ")
ans = (float(x2)-float(x1))**2 + (float(y2)-float(y1))**2
ans = pow(ans, 0.5)
print(ans)
3.5 code practice question 1
Answer:
what is this a question or just saying something?
Explanation:
Answer:
uh what?
Explanation:
Can someone help me please
Answer:
She made a profit of 450$
Explanation:
What is an antivirus?
Your goals as the IT architect and IT security specialist are to: Develop solutions to the issues that the specified location of IDI is facing. Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability. Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods. Analyze the strengths and weaknesses in the current systems of IDI. Address remote user and Web site user’s secure access requirements. Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services. Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management. Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario. Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.
Answer the following questions:
Question 4
............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.
Group of answer choices
Transforming
Framing
Separating
Messaging
Question 5
Functions of data link control includes
Group of answer choices
framing
flow and error control
addressing
All of above
Question 6
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
Group of answer choices
User mode
Enable mode
Global configuration mode
VLAN mode
Interface configuration mode
Question 7
It is how the receiver detects the start and end of a frame.
Group of answer choices
Error control
Flow control
Framing
None of the above
Question 8
Which of the following describes a way to disable IEEE standard autonegotiation on a 0/00 port on a Cisco switch?
Group of answer choices
Configure the negotiate disable interface subcommand
Configure the no negotiate interface subcommand
Configure the speed 00 interface subcommand
Configure the duplex half interface subcommand
Configure the duplex full interface subcommand
Configure the speed 00 and duplex full interface subcommands
Question 9
______ substitutes eight consecutive zeros with 000VB0VB.
Group of answer choices
B4B8
HDB3
B8ZS
none of the above
Question 0
In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of the receiver to group the bits.
Group of answer choices
synchronous
asynchronous
isochronous
none of the above
Question
In _______ transmission, bits are transmitted over a single wire, one at a time.
Group of answer choices
asynchronous serial
synchronous serial
parallel
(a) and (b)
Question 2
Digital data refers to information that is
Group of answer choices
Continuous
Discrete
Bits
Bytes
Question 3
Two common scrambling techniques are ________.
Group of answer choices
NRZ and RZ
AMI and NRZ
B8ZS and HDB3
Manchester and differential Manchester
Question 4
________ is the process of converting digital data to a digital signal.
Group of answer choices
Block coding
Line coding
Scrambling
None of the above
Question 5
A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
Group of answer choices
It drops the frame. .
It floods the frame out of all active ports, except the origination port.
It sends out an ARP request looking for the MAC address.
It returns the frame to the sender
Question 6
The _______ layer changes bits into electromagnetic signals.
Group of answer choices
Physical
Data link
Transport
None of the above
Question 7
Serial transmission occurs in
Group of answer choices
way
2 ways
3 ways
4 ways
Question 8
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Group of answer choices
RAM
ROM
Flash
NVRAM
Question 9
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Select Two)
Group of answer choices
User mode
Enable mode
Global configuration mode
Interface configuration mode
Question 20
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Select Two)
Group of answer choices
The TCP/IP model has seven layers while the OSI model has only four layers.
The TCP/IP model has four or five layers while the OSI model has seven layers.
The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model.
he TCP/IP Application layer is virtually identical to the OSI Application layer.
Explanation:
4) Seperating
5) All the above
6) Interface configuration mode
7) None of the above
8)Configure the negotiate disable interface subcommand
9) B8ZS
10) Synchronous
11) a and b
2) Discrete
3) B8ZS and HDB3
4) Line coding
5) It drops the frame
6) Data link
7) 2 ways
8) NVRAM
9) User mode-Enable mode
20) The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model-
The TCP/IP model has four layers , while the OSI model has seven layers.
If a program has no syntax errors, can we assume that it is secure? Why or why not?
Answer:
We cannot say it is secure until it has gone through security testing.
Explanation:
Syntax errors are caused by errors that occur in the source code. Some of these errors are caused by spellings and punctuation. If the code does not follow the syntax of the programming language that it is being written, it would likely display a syntax error.
A program is secure only when it has gone through security testing and found to be protected from vulnerabilities and attacks.
What are the disadvantages of using folders
Answer:
√ folders can cause some inconvenience situation...
√ The decompress / compress action takes time.
√ When you double-click on a file inside a “folder”, what really happens is the file gets extracted to a temporary folder.
heres one:
when you delete a folder, he stuff inside gets deleted, and there isnt a way to get it back.
A restaurant buys a pizza oven that is 4.5 feet long, 5 feet wide and 6 feet tall. What is the volume of the pizza oven?
Answer:
135 as 4.5 times 5 times 6 gives you the volume and it =135
What are to be considered before software installation? Why?
Answer:
before software installation we should consider the following things:
1. Software must be virus free
2.Required components for software should be installed
3.Computer requirements must be little bit high required for that software
4.software musn't be corrupt
4.16 LAB: Count characters Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's
Answer:
In Python:
sttr = input("String: ")
ch = input("Character: ")
count = sttr.count(ch)
print(str(count)+" "+ch, end = '')
if count>1 or count==0:
print("'s")
Explanation:
This prompts the user for string
sttr = input("String: ")
This prompts the user for character
ch = input("Character: ")
This counts the number of occurrence
count = sttr.count(ch)
This prints the number of occurrence of the character
print(str(count)+" "+ch, end = '')
This checks if the number of occurrence is 0 or greater than 1.
if count>1 or count==0:
If yes, it prints 's
print("'s")
What sequence is used to create a brochure document from a template?
New, File, Brochures
File, New, Brochures
O Brochures, File, New
O Brochures, New, File
Answer:
I think its a or b
Explanation:
Sorry if I'm wrong
Answer:
The answer is B. File, New, Brochures
Explanation:
PLZ PLZ PLZ GIVE ME BRAINLIEST!!!!
is an electronics standard that allows different kinds of electronic instruments to
communicate with each other and with computers.
Explanation:
MIDI is an acronym that stands for Musical Instrument Digital Interface. It is a standard protocol that helps to connects musical instruments with computers and several hardware devices to communicate. It was invented in the 80's as a way to standardize digital music hardwares.
IF IT HELPED U MARK ME AS A BRAIN LIST
why use a chart legend?
Answer:
A legend or key helps the user build the necessary associations to make sense of the chart.
Explanation:
Legends summarize the distinguishing visual properties such as colors or texture used in the visualization.
3. Create tables CheckingAccount(CheckingAccountNumber, CustomerName, Balance, CustomerID), SavingsAccount(SavingsAccountNumber, CustomerName, Balance, InterestRate, CustomerID), Transactions(TransactionNumber, TransactionAmount, TransactionType, TransactionTime, TransactionDate, FromAccount, ToAccount, CustomerID). Use varchar(50) for any non-numerical value including AccountNumber and TransactionNumber, and float for any numerical value. CustomerID here means Username.
Answer:
Your answer is B
She forgot to record a transaction.
Explanation:
Edge 20 it’s right
Directions Interview your parent or any member of your family. Identity
v. Performance Tasks
sources of your family income. Classify the types of your family
income if it is Money Income, Real Oncome or Psychic income
Answer:
Total family income is first classified by it's four major source, earings of a male head , earings of a wife or female head , earings of a family members , and property or transfer income.