A message is encoded by the sender, who then sends it. (3) The message is decoded by the receiver.
The process by which the receiver interprets the symbols used by the message's source is known as decoding. He is the recipient of the communication from the sender. Feedback: Feedback is any behavior by the recipient that shows he has heard and understood the sender's message. The process through which information is conveyed and comprehended by two or more individuals is referred to as communication. Effective communication is about conveying the sender's intended message. The receiver's job is to accurately translate the sender's message, both verbal and nonverbal, into their own language. Decoding is the process of understanding the message.
Learn more about communication here-
https://brainly.com/question/18825060
#SPJ4
hich compatibility issues can be fixed for an app by using the capabilities included in windows 10? (choose all that ap
These compatibility issues can be fixed for an app by using the capabilities included in windows 10 are:
required to right-click and run as administratorodd colors issue, when the color depth is greater than 16 bits.When the screen resolution is 1920 X 1024, the display quality on full screen is poor.What is compatibility issues in Windows 10?
Some functions' implementations may change as the Windows operating system evolves to support new technology and functionality. This might cause issues for some applications that rely on original-implementation. You can avoid compatibility issues by creating a specific application fix for a specific version of an application using the Microsoft Windows Application Compatibility (Compatibility Fix) infrastructure.
To learn more about Windows 10, visit: https://brainly.com/question/28847407?referrer=searchResults
#SPJ4
in problem solving, a method that always produces a problem solution (though not necessarily very efficiently) is known as group of answer choices an algorithm. a heuristic. a matrix. the hill-climbing heuristic.
A method that always produces a problem solution, though not necessarily very efficiently, is known as an algorithm.
What is an Algorithm?An algorithm is a step-by-step procedure for solving a problem or achieving a specific goal. It is a set of instructions that, if followed in the correct order, will always produce the same result.
Algorithms are often used in computer programming and other fields where precise, repeatable steps are necessary to solve a problem or accomplish a task.
Algorithms are typically designed to be efficient and effective, but they may not always be the fastest or most efficient way to solve a problem. Other approaches, such as heuristics, may be faster but less reliable, as they may not always produce a solution.
To Know More About heuristics, Check Out
https://brainly.com/question/14718604
#SPJ1
What makes some websites more trustworthy than others?
_____ is data and instructions entered into the memory of a device.
Answer:storage
Explanation: this is the answer b/c any data that enters the memory of a computer is STORAGE
( hope this helped )
Beginners’ computer science!
Language- Java
Details of assignment-
3) As a coder at a pharmaceutical company,
you've been tasked with writing a program that will determine how long a particular drug may stay on shelves to be sold in
stores. Assume this drug loses 12% of its effectiveness every month (save into a
variable, but you don't have to get this value from the keyboard), and must be
discarded when effectiveness dips below 50%. Write a program that prints how many months the drug can remain on
shelves.
Please leave a comment if you would like a sample run!
Answer:
public class Drug {
public static void main(String[] args) {
int effectiveness = 100;
int months = 0;
while (effectiveness > 50) {
effectiveness *= 0.88;
months += 1;
}
System.out.println("The drug can remain on shelves for " + months + " months");
}
}
please let me know if this is correct! :D
Ups measures routes for each of its drivers, including the number of miles driven, deliveries, and pickups. Which step in the control process does this represent?.
The Monitoring step of the control process involves measuring and evaluating performance against the standards established in the Planning step. By measuring the number of miles:
DrivenDeliveriesPickups for each driverWhich step in the control process does this represent?UPS is monitoring the performance of its drivers by measuring the number of miles driven, deliveries, and pickups for each driver. This is part of the control process, which involves establishing standards in the Planning step and then measuring and evaluating performance against these standards in the Monitoring step. By monitoring the performance of its drivers, UPS can ensure that they are meeting the established standards and make any necessary adjustments to improve their performance.
Learn more about Control process: https://brainly.com/question/25646504
#SPJ4
you need to monitor the messages being written to the /var/log/messages file while troubleshooting a linux daemon that won’t start correctly. which command can you use to monitor the file and display each new message on the screen as they are added?
The following commands are the only commands you can use with the MONITOR command -DESCRIBE, -LIST, -Null, -QUERY.
What is terminal monitor command ?The terminal monitor is used to dynamically display selected logs on the VTYSH session. When the terminal monitor feature on the switch is enabled, it only displays the live or active logs. These logs are displayed during an SSH or console session.The MONITOR command defines or redefines a command and then outputs the results in the monitor window or log file. Only the following commands can be used in conjunction with the MONITOR command: - DESCRIBE, - LIST, - Null, - QUERYDebug Tool keeps track of the most recently entered MONITOR commands. Each command entered is assigned a number between 1 and 99, or you can enter your own. Use these numbers to tell Debug Tool which MONITOR command to redefine.To learn more about commands refer :
https://brainly.com/question/25808182
#SPJ4
a. consider a flow network in which vertices, as well as edges, have capacities. that is, the total positive flow entering any given vertex is subject to a capacity constraint. show that determining the maximum flow in a network with edge and vertex capacities can be reduced to an ordinary maximum-flow problem on a flow network of comparable size. b. describe an efficient algorithm to solve the escape problem and analyze its running time.
The following can be done to handle vertex capacities. We add two edge-containing vertices in and out for every vertex
What is a vertex?A vertex is a corner point formed by the junction of an object's edges, faces, or facets, and it can be a polygon, polyhedron, or any higher-dimensional polytope. If the internal angle of the polygon—the angle produced by the two edges at the vertices with the polygon inside the angle
In general, a polyhedron or polytope vertex is convex if the intersection with a suitably small sphere centered at the vertex is convex and concave otherwise.
The edge with the highest weight in a spanning tree is called a bottleneck edge. If there isn't a spanning tree with a smaller bottleneck edge weight in the graph, the tree is a minimum bottleneck spanning tree. A comparable issue is known as Minimum Bottleneck Spanning Arborescence for directed graphs (MBSA).
Therefore, All edges connect a reachable vertex to an unreachable vertex. Write down all such edges.
Learn more about vertex here:
https://brainly.com/question/29030495
#SPJ1
Which of the following is true regarding switched backbones?
Answers:
A. They place all network devices for one part of the building physically in the same room, often in a rack of equipment
B. They have an advantage of requiring less cable
C. They make it more difficult to move computers from one LAN to another
D. Network capacity is always tied to the physical location of the computers
E. They are harder to maintain and upgrade than a BN that is not rack-based
They place all network devices for one part of the building physically in the same room, often in a rack of equipment.
What is switched network?A computer network that uses only network switches, as opposed to Ethernet hubs on Ethernet networks, is referred to as a fully switched network.Switched Backbones are used in new construction, in the distribution layer, and occasionally in the core layer. They can be rack- or chassis-based. the numerous routers of other designs are replaced Backbone has fewer devices but more cables.Rack-Based Exchanged Backbones puts all network switch hardware in a single "rack" room. simple to upgrade and maintain. requires more cable, though this is typically a minor portion of the cost.switchable backbones based on a chassis Instead of using a rack, use a chassis switch that allows administrators to plug modules into it.To learn more about switched network refer :
https://brainly.com/question/12811608
#SPJ4
bookmark question for later a map of a database that shows tables and relationships is called what? erp erm relational mapping form schema
A map of a database that shows tables and relationships is called Schema.
What is database?A database is a structured collection of related data that has been systematically organized and is kept in a way that makes it simple to manage and update. It serves as the central repository for all data, comparable to a library's collection of books spanning a variety of genres. Imagine data as a library.
The data can be set up in a database in the form of a table with rows and columns. The data can be easily located and retrieved whenever necessary by indexing it. With the aid of databases, a large number of websites on the Internet are operated. Database handlers are used to build databases that allow users to access the data using just one set of software applications.
Learn more about database
https://brainly.com/question/518894
#SPJ4
a server is configured for dynamic nat and has used all public ip addresses in the pool. what will the router do when another device wants to reach the outside network?
Port numbers are used by NAT overloading to identify each local host. Because of this, the method is also known as port address translation (PAT).
Therefore, the Standard Public IP address assigned to the NAT gateway will remain dedicated to it and cannot be used by another device unless you unassign or delete it. To convert a large number of unregistered IP addresses into a smaller number of registered ones, use dynamic NAT. With the aid of dynamic NAT, you are able to use a small number of registered addresses to connect to numerous hosts on the open Internet. After a certain amount of inactivity, the entry times out, and new translations can be made using the global IP address.
Learn more about addresses here-
https://brainly.com/question/16011753
#SPJ4
Which type of loop is best in each situation? : you know ahead of time how many passes you wish to make through a loop. : you do not know ahead of time how many passes you wish to make through a loop.
In first situation, we will use "for loop" while in second situation we will use "While loop".
What is Loop in programming?
A loop is a software program or script that repeatedly executes the same instructions or processes the same data until it is told to stop. A loop, if not handled properly, can cause the computer to slow down as it becomes overburdened with repeating the same steps in an endless loop.
For Loop Syntax:
The for statement establishes a loop with three optional expressions:
for (expression 1o1; expression 2o2; expression 3o3) {
// code block to be executed
}
While Loop Syntax:
while ( condition ) {
/*....while loop body ....*/
}
To knw more about Loop in Programming, visit: https://brainly.com/question/16922594
#SPJ4
. consider the count-to-infinity problem in the distance vector routing. will the count-to-infinity problem occur if we decrease the cost of a link? why? how about if we connect two nodes which do not have a link?
No, this is because that decreasing link cost won't cause a loop (caused by the next-hop relation of between two nodes of that link).
The count-to-infinity problemThe count-to-infinity problem occurs when a node in a distance vector routing network propagates an incorrect distance to another node, causing a loop. This can happen when a link cost is decreased, since this could cause the node to incorrectly believe that the cost of the link is lower than it actually is, leading to a routing loop.
If two nodes are connected that do not have a link, then the count-to-infinity problem will not occur, as there is no potential for a routing loop. However, if the two nodes do have a link and the cost of the link is decreased, then there is the potential for a routing loop, and the count-to-infinity problem could occur.
Learn more about the count to infinity:
https://brainly.com/question/1622435
#SPJ4
what is true regarding the comparisons between asynchronous transfer mode (atm) and frame relay (fr)? a. fr has predictable data delays compared to atm where delays are variable b. atm cannot easily support real-time voice, whereas fr readily supports real-time voice c. fr consists of variable sized data frames, whereas atm is comprised of fixed cell sizes d. neither atm nor fr are connection-oriented protocols
It is TRUE to state that Frame Relay (FR) consists of variable-sized data frames, whereas Asynchronous Transmission Mode (ATM) is comprised of fixed cell sizes. (Option C)
What is Frame Relay?Frame Relay is a defined wide area network technology that uses packet switching to specify the physical and data connection levels of digital telecommunications channels.
Frame Relay is a packet-switching network technology that operates at the network's data connection layer. It is used to link LANs and to carry data over Wide Area Networks (WANs).
Asynchronous Transfer Mode is a telecommunications standard created by the American National Standards Institute and the International Telecommunication Union-T for the digital transfer of various types of traffic.
Asynchronous transfer mode (ATM) is a wide-area network (WAN) technique that effectively and flexibly arranges information into cells; it is asynchronous in the view that the recurrence of cells relies on the needed or instantaneous bit rate.
Learn more about Asynchronous Transmission Mode:
https://brainly.com/question/7475174
#SPJ`1
exercise 4. (problem: finding two points nearest to each other) objective: write a program thatfinds two points in plane with minimum distance between them. here is a test case for the input:
To find two points in place with minimum distance between there here is a test case for the input return Math.sqrt(Math.pow((p1.getX() - p2.getX()), 2)+Math.pow((p1.getY() - p2.getY()), 2));
//Java program
import java.util.Scanner;
class Point{
private double x,y;
public Point() {
x=0.0;
y=0.0;
}
public Point(double _x , double _y) {
x=_x;
y=_y;
}
public double getX() {
return x;
}
public double getY() {
return y;
}
}
public class Nearest {
public static void main(String args[]) {
int count;
Scanner in = new Scanner(System.in);
System.out.print("Enter number of points : ");
count = in.nextInt();
Point point[] = new Point[count];
Point p1=point[0],p2=point[0];
double x,y;
double min = Double.MAX_VALUE;
double dist=0.0;
System.out.println("Enter points");
for(int i=0;i<count;i++) {
System.out.print("Enter x : ");
x = in.nextDouble();
System.out.print("Enter y : ");
y = in.nextDouble();
point[i] = new Point(x,y);
}
for(int i=0;i<count;i++) {
for(int j=i+1;j<count;j++) {
dist = distance(point[i],point[j]);
if(dist<min) {
p1=point[i];
p2 = point[j];
min=dist;
}
}
}
System.out.println("Point with minimum distance \n");
System.out.println("point1 x: "+p1.getX()+" y : "+p1.getY());
System.out.println("point2 x: "+p2.getX()+" y : "+p2.getY());
in.close();
}
public static double distance(Point p1 ,Point p2) {
return Math.sqrt(Math.pow((p1.getX() - p2.getX()), 2)+Math.pow((p1.getY() - p2.getY()), 2));
}
}
To learn more about minimum distance
https://brainly.com/question/13169621
#SPJ4
A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?
A. Load balancer
B. VRRP
C. OSPF
D. BGP
A company wants to create highly available datacenters. BGP will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down.
About BGPBGP (Border Gateway Protocol) is a type of routing protocol that functions to exchange information between Autonomous Systems (AS). This BGP is a Dynamic Routing and on the proxy itself there are several kinds of dynamic routing features other than BGP such as OSPF and RIP. To exchange information, BGP utilizes the TCP protocol so that there is no need to use other types of protocols to handle fragmentation, retransmission, acknowledgment and sequencing.
Characteristics Of BGP Using distance vector routing algorithm. Distance vector routing algorithm periodically copies the routing table from router to router. Changes to the routing table are updated between interconnected routers when a topology change occurs. Used between ISPs with ISPs and clients. Used to route internet traffic between autonomous systems. BGP is Path Vector routing protocol. In the process of determining the best routes, it always refers to the best and selected path that it gets from other BGP routers. BGP routers establish and maintain peer-to-peer connections using port number 179. Inter-peer connections are maintained using periodic keepalive signals. The metrics (attributes) for determining the best route are complex and can be modified flexibly. BGP has its own routing table which usually contains the routing prefixes it receives from other BGP routersLearn more about BGP at https://brainly.com/question/9257367.
#SPJ4
Timothy works in the graphic arts department and has received approval to upgrade his video card. The card has arrived, and you are ready to begin the upgrade. To ensure your personal safety, which of the following should you do first.
Before handling any internal components, disconnect the computer and take the necessary anti-static procedures to safeguard your personal safety.
Regarding graphics
In order to inform, clarify, or amuse, graphics are graphic images or designs on a surface, including a wall, canvas, computer, newspaper, or stone. In modern usage, it refers to a visual visualization of data, such as that used in software for education and entertainment, design and manufacturing, typesetting, and the graphic arts. Computer graphics refers to images created by a computer. Graphics can be aesthetic or useful. The line between the two may become hazy if the latter is a documented form, such as a picture, or an analysis by a scientist to emphasize key characteristics.
To know more about graphics
https://brainly.com/question/11764057
#SPJ4
Which of the following is NOT an example of a game mechanic?
A.
solving a puzzle
B.
shooting a robot
C.
jumping over a building
D.
listening to the game sounds
The term that is NOT an example of a game mechanic is option D. listening to the game sounds.
What does a gaming mechanism mean?
Game mechanics are the guidelines or rules that control and direct the player's actions and the game's reactions in both tabletop and video games. A ludeme, or play element, is similar to the L-shaped move of the knight in chess while a rule is a set of instructions on how to play.
Therefore, The rules and procedures that direct the player and determine how the game will react to their moves and actions are known as the game's mechanics. You design the game's mechanics, which determine how it will function for the players.
Learn more about game from
https://brainly.com/question/29411392
#SPJ1
Answer: D
Explanation:
To any of you who are also taking Game Design, I have respect for you.
Ensure the Sales worksheet is active. Enter a function in cell B8 to create a custom transaction number. The transaction number should be comprised of the item number listed in cell C8 combined with the quantity in cell D8 and the first initial of the payment type in cell E8. Use Auto Fill to copy the function down, completing the data in column B.Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than or equal to $4000. Otherwise, the function will display a blank cell. Use Auto Fill to copy the function down, completing the data in column G.Create a data validation list in cell D5 that displays Quantity, Payment Type, and Amount.Type the Trans# 30038C in cell B5, and select Quantity from the validation list in cell D5.Enter a nested lookup function in cell F5 that evaluates the Trans # in cell B5 as well as the Category in cell D5, and returns the results based on the data in the range A8:F32.Create a PivotTable based on the range A7:G32. Place the PivotTable in cell I17 on the current worksheet. Place Payment Type in the Rows box and Amount in the Values box. Format the Amount with Accounting Number Format.Insert a PivotChart using the Pie chart type based on the data. Place the upper-left corner of the chart inside cell I22. Format the Legend of the chart to appear at the bottom of the chart area. Format the Data Labels to appear on the Outside end of the chart.Note, Mac users, select the range I18:J20, on the Insert tab, click Recommended Charts, and then click Pie. Format the legend, and apply the data labels as specified.Insert a Slicer based on Date. Place the upper-left corner of the Slicer inside cell L8.Ensure the Inventory worksheet is active. Import the Access database eApp_Cap2_Inventory.accdb into the worksheet starting in cell A3.Note, Mac users, download and import the delimited Inventory.txt file into the worksheet starting in cell A3.Sales SheetBeta ManufacturingMarch Transactions Search ResultsTrans # Category Results Date Trans # Item Quantity Payment Type Amount Status3/1/2018 3003 8 Credit $4,800 3/2/2018 5005 4 Financed $2,800 3/3/2018 5005 1 Credit $700 3/3/2018 5005 10 Financed $7,000 3/5/2018 1001 6 Credit $1,500 3/7/2018 5005 5 Credit $3,500 3/9/2018 1001 5 Credit $1,250 3/10/2018 5005 3 Credit $2,100 3/10/2018 2002 1 Financed $500 3/10/2018 4004 4 Financed $2,600 3/11/2018 2002 9 Financed $4,500 3/11/2018 3003 8 Credit $4,800 3/12/2018 1001 9 Financed $2,250 3/13/2018 2002 8 Financed $4,000 3/13/2018 2002 9 Credit $4,500 3/14/2018 3003 9 Credit $5,400 3/18/2018 3003 1 Credit $600 3/24/2018 4004 1 Credit $650 3/24/2018 4004 3 Financed $1,950 3/24/2018 4004 10 Cash $6,500 3/28/2018 2002 10 Credit $5,000 3/28/2018 1001 9 Cash $2,250 3/30/2018 3003 8 Credit $4,800 3/30/2018 4004 6 Financed $3,900 3/30/2018 2002 9 Cash $4,500
The Sales workbook is open. a formula in cell B8 that generates a unique transaction number. and the following outlines all procedures and formulas.
Goto cell B8 in Sales workbook and Type function “=C8&D8&LEFT(E8,1)” Now drag the Auto Fill handle for all the cells in column B
Goto cell G8 and Type function “=IF(AND(E8="Credit",F8>=4000),"Flag"," "). Now drag the Auto Fill handle for all the cells in column G
Step1: Goto cell D5, Select Data Validation from Data menu.
Step 2: Choose Data Validation option. A Data Validation window opens.
Step 3: In Settings tab, Select List from the drop down menu under Allow and Type “=$D$7:$F$7” under Source.
Step 4: Click on OK
Goto cell B5 and Type “30038C”. Then Goto cell D5 and Select Quantity from the drop down menu
Goto cell F5 and Type “=INDEX($A$7:$F$32,MATCH(B5,$B$7:$B$32,0),MATCH(D5,$A$7:$F$7,0))”
Learn more about Data Validation here:
https://brainly.com/question/29033397
#SPJ4
.To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?
bin
cgi-bin
cgi
Scripts
Before checking the URL in your web browser, save the software to your Web server's cgi-bin folders.
What is a URL?
A web address, also known as an universal resource locator (URL), is a reference to a web asset that identifies its position on a computer system and a method of retrieval. Although many people confuse the two concepts, a URL is a particular kind of Uniform Resource Identifier (URI). In addition to being used for file transfers (FTP), email (mailto), database queries (JDBC), and many other applications, URLs are most frequently utilized to refer to web pages (HTTP).
To know more about URL
https://brainly.com/question/10065424
#SPJ4
Assume you are an IT manager for a small- to medium-sized company. You are currently working on a new website and need someone to help develop your website. You need to place an ad for the position. Without listing the specific skills, state a name for the position and the minimum requirements for the position. Defend your answer with reasons why these are necessary minimum requirements.
Since You need to place an ad for the position. The position is Ad specialist, and the specific skills, is to have a good knowledge of marketing and ad making. The minimum requirements for the position is a BSC in advertising and media production or in marketing'
Who is a marketing expert?Creative concepts are transformed into advertising campaigns by advertising pros. They could specialize in advertising mediums like print, radio, television, and digital.
The daily management of paid digital marketing initiatives, including paid search, display, and social advertising strategies for B2B and B2C organization, is the responsibility of paid media specialists.
Most jobs are full-time or more. Sales representatives for advertising frequently put in extra hours. This profession has a dismal employment prognosis. The U.S. Bureau of Labor Statistics predicts a drop in employment through 2024.
Hence, People can prove they are experts in internet advertising by showing they have a Go ogle Ads certification and others.
Learn more about advertising from
https://brainly.com/question/1658517
#SPJ1
what is the term used to describe the connections and bonds people have with those in their social networks?
1. What is a naming model used for?
2. List the four major activities associated with software configuration management.
3. What are check-in and check-out?
4. List three concerns you may need to look into before choosing a configuration management tool.
5. What are the build steps of a single program?
6. What is linking and what are we linking in a build process?
7. Explain the difference between the view and the modify functions in the storage and access model of configuration management.
8. Name a tool from each of the three tiers of automating the configuration management activities.
The four major activities associated with software configuration management are:
1. Being aware of the necessary management of the policy, process activities, and producing artifacts
2. Establishing the framework that must be utilized to manage these artifacts.
3. Identifying and incorporating any tools that need to be expanded to make managing this item easier.
4. Providing instruction and making sure that the regal and configuration management prostheses are used and followed,
What does software configuration management refer to?The term Program configuration management, a subset of the broader, multidisciplinary area of configuration management, is the activity of monitoring and regulating changes to the software. SCM procedures is one that is made up of baseline creation and revision control.
Therefore, one can say that additionally referred to as "software change management," Version control, as well as security administration of software assets, software promotion, quality reviews, and software distribution are all part of the software lifecycle management (SCM) methodology.
Learn more about software configuration from
https://brainly.com/question/17080816
#SPJ1
Enter a function in cell H12 based on the payment and loan details that calculates the amount of cumulative principal paid on the first payment. Be sure to use the appropriate absolute, relative, or mixed cell references. All results should be formatted as positive numbers. Enter a reference to the remaining balance of payment 1 in cell B13. Use the fill handle to copy the functions created in the prior steps down to complete the amortization table. Expand the width of columns D:H as needed.
It is to be noted that what Microsoft Excel is to calculate here is "Cumulative Principal" The formula for doing this for the first payment is given as =CUMPRINC(rate, nper, pv, start_period, end_period, type).
How will the above be used to achieve the given prompt?The formula for calculating the cumulative principal paid on the first payment is as follows:
=CUMPRINC(B5/12,B6,B4,1,1,0)
To enter this formula into cell H12, type "=CUMPRINC(B5/12,B6,B4,1,1,0)" without the quotation marks.
To reference the remaining balance of payment 1 in cell B13, type "=B12-H12" without quotation marks.
To use the fill handle to copy the functions down to complete the amortization table, select cells H12 and B13, then hover the cursor over the bottom-right corner of the selected cells until the fill handle appears.
Click and drag the fill handle down to the last row of the amortization table. The functions will be automatically copied down and applied to each row of the table.
Learn more about Microsoft Excel Function:
https://brainly.com/question/23501096
#SPJ1
what do you need to consider prior to the administration of warfarin (coumadin) keeping in mind there is an iv heparin infusion running at 15 units/kg/hr.
You need to calculate the International Normalized Ratio (INR) of patients prior to the administration of Warfarin (Coumadin).
Warfarin is a prescription medication that interferes with normal blood clotting (coagulation). In some countries, Warfarin is sold under the brand name Coumadin. Warfarin is prescribed to those people who are at increased risk of developing harmful blood clots. Before the prescription of Warfarin, the blood test, known as prothrombin time, is used to calculate International Normalized Ratio (INR). INR helps the healthcare provider to determine how well Warfarin is working to prevent blood clots and whether the dose needs to be adjusted.
You can learn more about Warfarin at
https://brainly.com/question/29022659
#SPJ4
under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on?
Two circumstances that will switch flood frames from every port except the port on which the frame was received:
The frame has a broadcast address as the destination address. The destination address is not known by the switch.The switch will transfer the frames from the port the frames have been acquired on (where Host A is connected) to the port wherein the router is attached. Kind of visitors will a transfer flood out all ports are broadcast and multicast forwarding. Since broadcast packets should be received by all stations at the network, the switch will reap that goal by flooding broadcast packets out all ports besides the port that it was received on, since there's no need to send the packet back to the originating device. Because a switch by no means learns those addresses, it constantly floods the frames that have those addresses because a transfer by no means learns those addresses, it always floods the frames that have those addresses as the destination address.
Learn more about the switch, here https://brainly.com/question/9431503
#SPJ4
penny is setting up computers at a local nonprofit organization. the computers were donated by a company that was upgrading to new computers. penny must decide whether to use a 32-bit or 64-bit version of windows 8.1. what hardware on the computers should penny check? (select all that apply.)
The computer hardware to be tested by penny are:
Hard DriveRAMProcessorCorrect answer: letter B, D y E.
Penny needs to test the computer hardware (Hard Drive, RAM, Processor) to ensure with the Windows 8.1 operating system, regardless of whether she chooses a 32-bit or 64-bit version. Penny should also check the amount of RAM and the size of the hard drive to ensure the system will have enough space to run the operating system and any applications that may be installed.
What is computer hardware?Computer hardware refers to the physical components of a computer, such as:
The monitorKeyboardMouseHard driveGraphics cardMotherboardAs opposed to computer software, which are the programs and applications that run on the hardware.
Penny is setting up computers at a local nonprofit organization. The computers were donated by a company that was upgrading to new computers. Penny must decide whether to use a 32-bit or 64-bit version of Windows 8.1. What hardware on the computers should Penny check? Select all that apply:
A) Video card
B) Hard drive
C)Motherboard
D) RAM
E) Processor
F) Network card
Learn more about computer hardware:
https://brainly.com/question/3186534
#SPJ4
which of the following attacks involves modifying the ip packet header and source address to make it look like they are coming from a trusted source?
In a spoofing attack, the source address of the information is changed to make it appear as though it is coming from someone else.
What is spoofing?In order to trick the receiving computer system into believing the packet is coming from a reliable source.
Refactoring is another name for spoofing such as another computer on a valid network, and accepting it, modifying the IP packet header and source address.
An IP spoofing attack employs tools to change the source address in the packet header.
Therefore, spoofing attack, the source address of the information is changed to make it appear as though it is coming from someone else.
Learn more about IP addresses, here:
https://brainly.com/question/29506804
#SPJ1
Data visualization is best defined as the use of _____ to present _____ data in a way that's easy to understand.
Data visualization is best defined as the use of bar chart to present report data in a way that's easy to understand.
What is data visualization?The graphic display of information and data is known as data visualization. Data visualization tools offer a simple way to visualize and understand data by utilizing visual components like charts, graphs, and maps.
Hence, Data visualization is the study of data visualization, or data that has been abstracted in some schematic fashion and includes attributes or variables for the information units.
Learn more about Data visualization from
https://brainly.com/question/19566670
#SPJ1
Answer:
graphics; complex
Explanation:
I took the quiz
A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices.
Which of the following would be the appropriate wireless technology for this design?
A. 802.11g
B. 802.11ac
C. 802.11b
D. 802.11a