Answer:
B. False
Explanation:
You do NOT need to start from scratch when you program in a language that uses GUI components. You can think of it like the components are add-ons to your programming language.
Answer:
The correct answer is b. False
Explanation:
You don't need to create them from scratch.
Hope this helps!
When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate
Answer:
Verifying digital signature
Explanation:
In order to guarantee authenticity of digital messages an documents, the certificate authority will perform the verification of the digital signature. A valid digital signature indicates that data is coming from the proper server and it has not been altered in its course.
(Convert letter grade to number) Write a program that prompts the user to enter a letter grade A/a, B/b, C/c, D/d, or F/f and displays its corresponding numeric value 4, 3, 2, 1, or 0.
Sample Run 1 Enter a letter grade: B The numeric value for grade B is 3
Sample Run 2 Enter a letter grade: b The numeric value for grade b is 3
Sample Run 3 Enter a letter grade: T T is an invalid grade
Answer:
This program is written in Python Programming Language
Program doesn't make use of comments (See Explanation Section for detailed explanation)
letterg = ['A','B','C','D','F']
inp = input("Enter a Letter Grade: ")
for i in range(len(letterg)):
if inp.upper() == letterg[i]:
print('The numeric value for grade ', inp, ' is ',4 - i)
break;
else:
print(inp, "is an invalid grade")
Explanation:
This line initializes all letter grade from A to F
letterg = ['A','B','C','D','F']
This line prompts user for letter grade
inp = input("Enter a Letter Grade: ")
This line iterates through the initialized letter grades
for i in range(len(letterg)):
This line checks if the user input is present in the initialized letter grades (it also takes care of lowercase letters)
if inp.upper() == letterg[i]:
This line is executed if tge about condition is true; the line calculates the number grade and prints it
print('The numeric value for grade ', inp, ' is ',4 - i)
This line terminates the iteration
break;
If the condition above is not true
else:
This line is executed
print(inp, "is an invalid grade")
24. Which of the following statements about Emergency Support Functions (ESFs) is correct?
O A. ESFs are not exclusively federal coordinating mechanism
O B. ESFs are only a state or local coordinating mechanism
O C. ESFs are exclusively a federal coordinating mechanism
O D. ESFs are exclusively a state coordinating mechanism
(ESFs) is correct: ESFs are not exclusively federal coordinating mechanism.
The famous Fibonacci sequence, 1, 1, 2, 3, 5, 8, 13, . . . , begins with two 1s. After that, each number is the sum of the preceding two numbers. Write a program using a recursive function that requests an integer n as input and then displays the nth number of the Fibonacci sequence.
Answer:
int recursiveFunction(int n) {
if (n == 0 || n == 1) {
return n;
}
else {
return recursiveFunction(n - 2) + recursiveFunction(n - 1);
}
Explanation:
Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is entered.
Answer:
Here is the sentinel-controlled while loop:
#include <iostream> //to use input output functions
using namespace std; // to identify objects like cin cout
int main(){ // start of main() function body
int test_score; // declare an integer variable for test scores
//prompts user to enter test scores and type-99 to stop entering scores
cout << "Enter the test scores (enter -99 to stop): ";
cin >> test_score; // reads test scores from user
while (test_score != -99){ // while loop keeps executing until user enters -99
cin >> test_score; } } // keeps taking and reading test scores from user
Explanation:
while loop in the above chunk of code keeps taking input scores from user until -99 is entered. Sentinel-controlled loops keep repeating until a sentinel value is entered. This sentinel value indicates the end of the data entry such as here the sentinel value is -99 which stops the while loop from iterating and taking the test score input from user.
The complete question is that the code should then report how many scores were entered and the average of these scores. Do not count the end sentinel -99 as a score.
So the program that takes input scores and computes the number of scores entered and average of these scores is given below.
#include <iostream> // to use input output functions
using namespace std; // to identify objects like cin cout
int main(){ //start of main function body
double sum = 0.0; // declares sum variable to hold the sum of test scores
int test_score,count =0;
/* declares test_scores variable to hold the test scores entered by user and count variable to count how many test scores input by user */
cout << "Enter the test scores (or -99 to stop: ";
//prompts user to enter test scores and type-99 to stop entering scores
cin >> test_score; // reads test scores from user
while (test_score != -99){ // while loop keeps executing until user enters -99
count++; /* increments count variable each time a test cores is input by user to count the number of times user entered test scores */
sum = sum + test_score; // adds the test scores
cin >> test_score;} // reads test scores from user
if (count == 0) // if user enters no test score displays the following message
cout << "No score entered by the user" << endl;
else //if user enters test scores
//displays the numbers of times test scores are entered by user
cout<<"The number of test scores entered: "<<count;
/* displays average of test scores by dividing the sum of input test scores with the total number of input test scores */
cout << "\n The average of " << count << " test scores: " <<sum / count << endl;}
The program along with its output is attached.
differentiate between web site and web application?
Explanation:
A website is a group of globally accessible into linked pages which have a single domain name. A web application is a software or program is is accessible using any web browser.
Answer:
Explanation:
A website shows static or dynamic data that is predominantly sent from the server to the user only, whereas a web application serves dynamic data with full two way interaction.
Write a program that read two numbers from user input. Then, print the sum of those numbers.
Answer:
#This is in Python
number1 = raw_input("Enter a number: ")
number2 = raw_input("Enter another number: ")
sum = float(number1) + float(number2)
print(sum)
Explanation:
k- Add the code to define a variable of type 'double', with the name 'cuboidVolume'. Calculate the volume of the cuboid and set this variable value.
Answer:
Here is the JAVA program to calculate volume of cuboid:
import java.util.Scanner; // Scanner class is used to take input from user
public class CuboidVol { // class to calculate volume of cuboid
public static void main(String[] args) { // start of main() function body
Scanner input= new Scanner(System.in); //create Scanner class object
// prompts user to enter length of cuboid
System.out.println("Enter the cuboid length:");
double length=input.nextDouble(); //reads the input length value from user
// prompts user to enter width of cuboid
System.out.println("Enter the cuboid width:");
double width=input.nextDouble(); //reads the input width from user
// prompts user to enter height of cuboid
System.out.println("Enter the cuboid height:");
double height=input.nextDouble(); //reads the input height from user
/* the following formula is to calculate volume of a cuboid by multiplying its length width and height and a double type variable cuboidVolume is defined to store the value of the resultant volume to it */
double cuboidVolume= length*width*height; //calculates cuboid volume
//displays volume of cuboid and result is displayed up to 2 decimal places
System.out.printf("Volume of the cuboid (length " + length + "/ height " + height + "/ width" +width +" is: " + "%.2f",cuboidVolume); } }
Explanation:
The formula for the volume of a cuboid is as following:
Volume = Length × Width × Height
So in order to calculate the volume of cuboid three variable are required for length, width and height and one more variable cuboidVolume to hold the resultant volume of the cuboid.
The program is well explained in the comments added to each statement of the program. The program prompts the user to enter the value of height width and length of cuboid and the nextDouble() method is used to take the double type input values of height length and width. Then the program declares a double type variable cuboidVolume to hold the result of the volume of cuboid. Then the last printf statement is used to display the volume of cuboid in the format format "Volume of the cuboid (length / height / width ) is" and the result is displayed up to 2 decimal places.
The screenshot of the program along with its output is attached.
The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
Answer:
Deployment
Explanation:
Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.
So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.
Answer:
Deployment
Explanation:
How to set up a simple peer-to-peer network using a star topology?
Answer:
The description including its scenario is listed throughout the explanation section below.
Explanation:
Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.
Throughout this configuration or setup:
Each common network setups network unit, such as a firewall, switch, as well as computer. The main network computer serves as either a server as well as the peripheral system serves as just a client.It is acceptable to create two TCP connections on the same server/port doublet from the same client with different port numbers.
A. True
B. False
QUESTION 22 Select the correct statement(s) regarding Carrier Ethernet (CE). a. the Metro Ethernet Forum (MEF) created a CE framework to ensure the interoperability of service provider CE offerings b. MEF certified CE network providers, manufacturers and network professionals to ensure interoperability and service competencies c. MEF certified services include E-Line, E-LAN, E-Tree, E-Access, and E-Transit d. all are correct statements
Answer:
d. all are correct statements
Explanation:
CARRIER ETHERNET can be defined as the Ethernet which is a telecommunications network providers that provides and enables all Ethernet services to their customers and as well to help them utilize the Ethernet technology in their networks which is why the word “Carrier” in Carrier Ethernet networks is tend to refers to a large communications services providers that has a very wide reach through all their global networks. Example of the carriers are:
They help to provide audio, video, as well as data services to residential and to all business as well as enterprise customers.
CARRIER ETHERNET also make use of high-bandwidth Ethernet technology for easy Internet access and as well as for communication among the end users.
Therefore all the statement about CARRIER ETHERNET NETWORK are correct
a. Metro Ethernet Forum (MEF) is a type of ethernet which created a Carrier Ethernet framework in order to ensure the interoperability of service provider that the Carrier Ethernet is offerings.
b. The MEF also help to certifies CE network providers, as well as the manufacturers and network professionals in order to ensure interoperability as well as a great service competencies.
c. MEF certified services also include E-Line, E-LAN, E-Tree, E-Access, and E-Transit
Hence, MEF is an important part of Carrier Ethernet because they act as the defining body for them, reason been that they are as well telecommunications service providers, cable MSOs, as well as network equipment and software manufacturers among others.
You are in a library to gather information from secondary sources, and you want to find a current print resource that can supplement information from a book. What source should you use
Answer:
Periodical Literature
Explanation:
In this specific scenario, the best source for you to use would be the periodicals. Periodical Literature is a category of serial publications that get released as a new edition on a regular schedule, such as a magazine, newsletters, academic journals, and yearbooks. Some real-life examples include Sports Illustrated, Discovery, or even Time Magazine. These periodical literary sources all provide up to date data on any topic that is needed.
in java how do i Write a method named isEven that accepts an int argument. The method should return true if the argument is even, or false otherwise. Also write a program to test your method.
//Class header definition
public class TestEven {
//Method main to test the method isEven
public static void main(String args[ ] ) {
//Test the method isEven using numbers 5 and 6 as arguments
System.out.println(isEven(5));
System.out.println(isEven(6));
}
//Method isEven
//Method has a return type of boolean since it returns true or false.
//Method has an int parameter
public static boolean isEven(int number){
//A number is even if its modulus with 2 gives zero
if (number % 2 == 0){
return true;
}
//Otherwise, the number is odd
return false;
}
}
====================================================
Sample Output:
=========================================================
false
true
==========================================================
Explanation:
The above code has been written in Java. It contains comments explaining every part of the code. Please go through the comments in the code.
A sample output has also been provided. You can save the code as TestEven.java and run it on your machine.
Methods are collections of named program statements that are executed when called or evoked
The program in Java, where comments are used to explain each line is as follows:
import java.util.*;
public class Main {
public static void main(String args[ ] ) {
//This creates a Scanner Object
Scanner input = new Scanner(System.in);
//This gets input for the number
int num = input.nextInt();
//This calls the function
System.out.println(isEven(num));
}
public static boolean isEven(int num){
//This returns true, if num is even
if (num % 2 == 0){
return true;
}
//This returns false, if otherwise
return false;
}
}
Read more about methods at:
https://brainly.com/question/20442770
A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long file names. Can something approximating a hierarchical file system be simulated? How?
Answer:
Yes
Explanation:
Yes, something approximating a hierarchical file system be simulated. This is done by assigning to each file name the name of the directory it is located in.
For example if the directory is UserStudentsLindaPublic, the name of the file can be UserStudentsLindaPublicFileY.
Also the file name can be assigned to look like the file path in the hierarchical file system. Example is /user/document/filename
Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}
Answer:
double ComputeGasVolume(double pressure, double temperature, double moles){
double volume = moles*GAS_CONST*temperature/pressure;
return volume;
}
Explanation:
You may insert this function just before your main function.
Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles
Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.
SONET is the standard describing optical signals over SMF, while SDH is the standard that describes optical signals over MMF fiber.
A. True
B. False
Answer:
False.
Explanation:
SONET is an acronym for synchronous optical networking while SDH is an acronym for synchronous digital hierarchy. They are both standard protocols used for the transmission of multiple digital bit streams (multiplex) synchronously through an optical fiber by using lasers.
Hence, both SONET and SDH are interoperable and typically the same standard protocols in telecommunication networks. Also, the SONET is a standardized protocol that is being used in the United States of America and Canada while SDH is an international standard protocols used in countries such as Japan, UK, Germany, Belgium etc.
The synchronous optical networking was developed in 1985 by Bellcore and it was standardized by the American National Standards Institute (ANSI). SDH was developed as a replacement for the plesiochronous digital hierarchy (PDH).
Generally, SONET comprises of four functional layers and these are;
1. Path layer
2. Line layer.
3. Section layer.
4. Physical or Photonic layer.
The SDH comprises of four synchronous transport modules and these are;
1. STM-1: having a basic data rate of 155.52Mbps.
2. STM-4: having a basic data rate of 622.08Mbps.
3. STM-16: having a basic data rate of 2488.32Mbps.
4. STM-64: it has a basic data rate of 9953.28Mbps.
These two standard telecommunications protocols are used to transmit large amounts of network data over a wide range through the use of an optical fiber.
Enter key is also known as Return key. (True or false)
Answer:
I think false
hope it helps
Answer:
False
Explanation:
The return key is the backspace or escape key.
Hope it helps.
Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3. Your program should make use of the sqrt() method. Math.sqrt(number).
Answer:
I am writing a JAVA program. Let me know if you want the program in some other programming language.
public class FourthRoot{ //class to calculate fourth root of 81
public static void main(String[] args) { //start of main() function body
double square_root; //declares to hold the fourth root of 81
double number=81; // number is assigned the value 81
/* calculates the fourth root of number using sqrt() method twice which means sqrt() of sqrt(). This is equivalent to pow(number,(0.25)) where pow is power function that computes the fourth root by raising the number 81 to the power of 0.25 which is 1/4 */
square_root=Math.sqrt(Math.sqrt(number));
//displays the fourth root of 81 i.e. 3
System.out.println("Fourth Root of 81 is "+ square_root); } }
Explanation:
The program is well explained in the comments given along with each statement of the program . Since it was the requirement of the program to user Math.sqrt() method so the fourth root of number= 81 is computed by taking the sqrt() of 81 twice which results in the fourth root of 81 which is 3.
So the first sqrt(81) is 9 and then the sqrt() of the result is taken again to get the fourth root of 81. So sqrt(9) gives 3. So the result of these two computations is stored in square_root variable and the last print statement displays this value of square_root i.e. the fourth root of number=81 which is 3.
Another way to implement the program is to first take sqrt(81) and store the result in a variable i.e. square_root. After this, again take the sqrt() of the result previously computed and display the final result.
public class FourthRoot{
public static void main(String[] args) {
double square_root;
double number=81;
square_root=Math.sqrt(number);
System.out.println("Fourth Root of 81 is: "+ Math.sqrt(square_root)); } }
The program along with its output is attached in a screenshot.
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and user resources. briefly explain what must be done by the operating system protection mechanism in order to provide the required system protection
Answer:
The operating system must by the use of policies define access to and the use of all computer resources.
Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.
Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:
General PoliciesServer PoliciesVPN PoliciesBack-Up PoliciesFirewall Access and Configuration PoliciesCheers!
4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think operating system designers would use the same interface for both
Answer:
According to the principles of design, Repetition refers to the recurrence of elements of the design
One of the advantages of this is that it affords uniformity. Another is that it keeps the user of such a system familiar or with the interface of the operating system.
One major drawback of this principle especially as used in the question is that it creates a familiar route for hackers.
Another drawback is that creates what is called "repetition blindness". This normally occurs with perceptual identification tasks.
The phenomenon may be due to a failure in sensory analysis to process the same shape, figures or objects.
Cheers!
ICMP
(a) is required to solve the NAT traversal problem
(b) is used in Traceroute
(c) has a new version for IPv6
(d) is used by Ping
Answer:
(b) is used in Traceroute
(d) is used by Ping
Explanation:
ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;
i. Requested service is not available
ii. Host could not be reached
ICMP does not use ports. Rather it uses types and codes. Some of the most common types are echo request and echo reply.
Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as Time Exceeded) to trace a network route.
Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP echo request packets to the host and then waits for an ICMP echo reply from the host.
ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.
Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require at least a paragraph for each type of firewall.
Acme Corporation wants to be sure employees surfing the web aren't victimized through drive-by downloads. Which type of firewall should Acme use? Explain why your answer is correct.
Answer:
packet filtering
Explanation:
We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D
15. The primitive data types in JavaScript are:
Answer:
The three primitive data types in JavaScript are:
1. Numbers
2. Strings of text(known as "strings")
3. Boolean Truth Values (known as "booleans")
12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE function to find the average bonus multiplier (C7:C10).
Answer:
1. Divide each bonus by regular bonus apply this to all the data
2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.
Explanation:
The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.
After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.
All of the following are examples of being computer literate, EXCEPT ________. knowing how to use the web efficiently knowing how to build and program computers knowing how to avoid hackers and viruses knowing how to maintain and troubleshoot your computer
Answer:knowing how to build and program computers.
Explanation:
Step1: This file contains just a program shell in which you will write all the programming statements needed to complete the program described below. Here is a sample of the current contents of areas.cpp 1 // Assignment 5 is to compute the area (s) WRITE A COMMENT BRIEFLY DESCRIBING THE PROGRAM PUT YOUR NAME HERE. 2 3 4 // INCLUDE ANY NEEDED HEADER FILES HERE 5 using namespace std;l 7 int main) 9// DEFINE THE NAMED CONSTANT PI HERE AND SET ITS VALUE TO 3.14159 10 11 // DECLARE ALL NEEDED VARIABLES HERE. GIVE EACH ONE A DESCRIPTIVE 12// NAME AND AN APPROPRIATE DATA TYPE 13 14// WRITE STATEMENTS HERE TO DISPLAY THE 4 MENU CHOICES 15 16// WRITE A STATEMENT HERE TO INPUT THE USERS MENU CHOICE 17 18// WRITE STATEMENTS TO OBTAIN ANY NEEDED INPUT INFORMATION 19// AND COMPUTE AND DISPLAY THE AREA FOR EACH VALID MENU CHOICE 20 / IF AN INVALID MENU CHOICE WAS ENTERED, AN ERROR MESSAGE SHOULD 21 /BE DISPLAYED 23 return 0 24 )
Step 2: Design and implement the areas.cpp program so that it correctly meets the program specifications given below Specifications: Sample Run Program to calculate areas of objects Create a menu-driven program that finds and displays areas of 3 different objects. The menu should have the following 4 choices 1 -- square 2 circle 3 - right triangle 4 - quit 1square 2 -- circle 3 -- right triangle 4quit Radius of the circle: 3.0 Area 28.2743 . If the user selects choice 1, the program should find the area of a square . If the user selects choice 2, the program should . If the user selects choice 3, the program should . If the user selects choice 4, the program should . If the user selects anything else (i.e., an invalid find the area of a circle find the area of a right triangle quit without doing anything choice) an appropriate error message should be printed
Answer & Explanation:
This program is written in C++ and it combines the step 1 and step 2 to create a menu driven program
Each line makes use of comments (as explanation)
Also, see attachment for program file
Program Starts Here
//Put Your Name Here; e.g. MrRoyal
//This program calculates the area of circle, triangle and square; depending on the user selection
//The next line include necessary header file
#include<iostream>
using namespace std;
int main()
{
//The next line defines variable pi as a constant with float datatype
const float pi = 3.14159;
// The next two lines declares all variables that'll be needed in the program
string choice;
float length, base, height, radius, area;
// The next four lines gives an instruction to the user on how to make selection
cout<<"Press 1 to calculate area of a square: "<<endl;
cout<<"Press 2 to calculate area of a circle: "<<endl;
cout<<"Press 3 to calculate area of a triangle: "<<endl;
cout<<"Press 4 to quit: "<<endl;
//This next line prompts user for input
cout<<"Your choice: ";
//This next line gets user input and uses it to determine the next point of execution
cin>>choice;
if(choice == "1") //If user input is 1, then the choice is area of square
{
cout<<"Length: "; //This line prompts user for length of the square
cin>>length; // This line gets the length of the square
area = length * length; //This line calculates the area
cout<<"Area: "<<area; //This line prints the calculated area
}
else if(choice == "2") //If user input is 2, then the choice is area of circle
{
cout<<"Radius: "; //This line prompts user for radius
cin>>radius; //This line gets radius of the circle
area = pi * radius * radius; // This line calculates the area
cout<<"Area: "<<area; //This line prints the calculated area
}
else if(choice == "3") //If user input is 2, then the choice is area of triangle
{
cout<<"Base: "; //This line prompts user for base
cin>>base; //This line gets the base
cout<<"Height: "; //This line prompts user for height
cin>>height; //This line gets the height
area = 0.5 * base * height; //This line calculates the area
cout<<"Area: "<<area; //This line prints the calculated area
}
else if(choice == "4") //If user input is 4, then the choice is to quit
{
//Do nothing and quit
}
else //Any other input is invalid
{
cout<<"Invalid Option Selected";
}
return 0;
}
A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS
Answer:
FIN
Explanation:
A TCP is an acronym for Transmission Control Protocol and it is one of the essential and important protocol of the internet protocol network. This simply means that, it is an essential part of the TCP/IP network.
The TCP has a wide range of applications in the following areas, file transfers, world wide web, remote administration, e-mail, etc.
The TCP connection are mainly established in the network using the three-way handshake.
A TCP FIN segment is a request to the other transport process to close a connection. The FIN in transmission control protocol (TCP) is an acronym for finish and it involves the packets associated with termination or closing of a network connection.
Generally, the TCP in networking is made up of all of the following flag bits, namely;
1. SYN: used for synchronizing packets associated with a connection.
2. ACK: this is mainly where an acknowledgement of packets in a network takes place.
3. FIN: it is used for closing connections.
4. PSH: used for pushing packets that are to meant to be delivered at the far end.
5. RST: used as a reset in times of errors in the connection.
6. URG: used to denote urgent and high priority packets in the network.
7
The goal of what technology research is to provide solutions to physical and health related problems
Answer:Crisis-mapping
Explanation:
Answer:
Crisis Mapping
Explanation:
How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = futureValue * (1 + monthlyInterestRate); i = i+1; }
a. 5
b. 4
c. 6
d. 0
Answer:
I believe it is A
Explanation: