Answer:
DiffServ
Explanation:
The IP QoS which is fully known as QUALITY OF SERVICE mechanism that involves prioritizing traffic is DIFFERENTIATED SERVICES (DiffServ).
DIFFERENTIATED SERVICES help to differentiate ,arrange ,manage, control and focus on network traffic that are of great significance or important first before network that are less important or by their order of importance in order to provide quality of service and to avoid network traffic congestion which may want to reduce the quality of service when their is to much load on the network .
1. Normal view
the place where information for handouts can be added
2. Notes view
provide rows of icons to perform different tasks
3. Slide pane
the working window of a presentation
4. Title bar
displays thumbnails
5. toolbars
provides filename and Minimize icon
Match the feature to its function.
Answer:
1.- display thumbnails, 2.-the place where info can be put, 3.- working window of presentation 4.- provides file name, 5.- rows of icons to perform task ... I'm not sure if these are correct but I tried
1. Normal view
the working window of a presentation
2. Notes view
the place where information for handouts can be added
3. Slide pane
displays thumbnails
4. Title bar
provides filename and Minimize icon
5. Toolbar
provide rows of icons to perform different tasks
What is Microsoft PowerPoint?
Oa presentation program included with Microsoft Office
oa project management program available only in certain versions of Microsoft Office
Oa desktop publishing program included with Microsoft Office
oa collaboration program available only in certain versions of Microsoft Office
Answer:
ITS THE FIRST ONE :)
Explanation:
ALSO IF ITS NOT THE FIRST ONE GO ON YT!
Columns, margins and orientation can all be found on what tab
Answer:
The right answer is: Option C: Layout.
Explanation:
Columns are used to write text in a word document in more than one columns. Similarly, margins is the empty space that is left blank from all sides of the page. Orientation can be either landscape or portrait.
all these options are found in the Layout tab in MS word.
Hence,
The right answer is: Option C: Layout.
an event handler is..
a. a word that is open for interpretation.
b. a sentence that provides information.
c. a procedure that occurs as a result of a users action or another source.
Answer:
The correct answer is:
Option c. a procedure that occurs as a result of a users action or another source.
Explanation:
First of all, let us define what an event is.
An occurrence that is caused by any external user or entity towards a software or a website is called an event i.e. click from mouse, key pressed from keyboard.
When an event occurs, the software or functionality of the website has to respond to the event. An event handler is a function or procedure that contains the code which has to be run when the event occurs.
When the event occurs, the event handler for particular event is executed.
So from the given options,
The correct answer is:
Option c. a procedure that occurs as a result of a users action or another source.
Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time. If a review contains the desired word you should make a note of the review score in an accumulator variable. Finally, produce some output that tells your user how that word was used across all reviews as well as the classification for this word (any score of 2.0 or higher can be considered
Answer:
import numpy as np
word = input("Enter a word: ")
acc = []
with open("Downloads/record-collection.txt", "r") as file:
lines = file.readlines()
for line in lines:
if word in line:
line = line.strip()
acc.append(int(line[0]))
if np.mean(acc) >= 2:
print(f"The word {word} is a positive word")
print(f"{word} appeared {len(acc)} times")
print(f"the review of the word {word} is {round(np.mean(acc), 2)}")
else:
print(f"the word {word} is a negative word with review\
{round(np.mean(acc), 2)}")
Explanation:
The python program gets the text from the review file, using the user input word to get the definition of reviews based on the word, whether positive or negative.
The program uses the 'with' keyword to open the file and created the acc variable to hold the reviews gotten. The mean of the acc is calculated with the numpy mean method and if the mean is equal to or greater than 2 it is a positive word, else negative.
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
What is the missing line of code?
>>> phrase = "You are amazing!"
>>> _____
'u a'
phrase[3:6]
phrase[2:6]
phrase[3:5]
phrase[2:5]
Answer:
phrase[2:5]
Explanation:
Given:
The above code segment
Required
Which instruction returns 'u a'
First, we need to get the index of u in the phrase:
u is at the third position but in programming, index starts at 0.
So, u is at index 2
Next, we need to get the index of a in the phrase:
a is at index 4
One of the ways to return a sub string from a string in python is [tex]string[start:stop+1][/tex]
Where:
[tex]start = 2[/tex] ----- index of u
[tex]stop = 4[/tex] ----- index of a
phrase ---- The string variable
So, the instruction that returns 'u a' is: [tex]phrase[2:5][/tex]
Where 5 = 4 + 1
Answer:
phrase[2:5]
Explanation: got it right on edgen
Write a Python program to keep track of data for the following information in a medical clinic: doctors, patients, and patient_visits
Patients and Doctors have an ID, first name, and last name as common attributes. Doctors have these additional attributes: specialty (e.g. heart surgeon, ear-nose-throat specialist, or dermatologist), total hours worked, and hourly pay. Further, doctors keep track of the patient_visits. A patient_visit has the following attributes, number_of_visits to the clinic, the patient who is visiting, the doctor requested to be visited, and the number of hours needed for consultation. Based on the number of consultation hours, the doctor will get paid.
The following functions are required:
1. addVisit: this function adds a patient_visit to the doctor. A new visit will NOT be added if the doctor has already completed 40 hours or more of consultation. If this happens, an error is thrown mentioning that the doctor cannot have more visits this week.
2. calculatePay: this function calculates the payment for the doctor using the following logic: Each hour is worth AED 150 for the first two visits of the patient and all further visits are billed at AED 50.
3. calculateBill: this function calculates the bill for the patient, which displays the doctor's details, patient details, and payment details. An additional 5% of the total is added as VAT.
The student is required to identify classes, related attributes, and behaviors. Students are free to add as many attributes as required. The appropriate access modifiers (private, public, or protected) must be used while implementing class relationships. Proper documentation of code is mandatory. The student must also test the code, by creating at-least three objects. All classes must have a display function, and the program must have the functionality to print the current state of the objects.
What is the main reason for assigning roles to members of a group?
So that people with strengths in different areas can work on what they do best, plus it divides the workload.
8. Write the examples of freeware and Shareware softwares ?
Explanation:
People use freeware software because it is available free of cost and it can be distributed free of cost, that is why it is called FREEware.
Freeware software:
Adobe PDF
yahoo messenger
Go.ogle Talk
MSN messenger
People use shareware software because it helps them to know about the product more before buying it and this software is available free of cost.
Shareware software:
Adobe acrobat 8 professional
Winzip
Getright
Question # 6
Dropdown
Choose the correct ending to the sentence below.
The function localtime() _____________________
Answer:
returns a different value every time you use it
Explanation: :)
What is better to use for start Python or Java?
Answer:
here is your answer ......
hope it helps......
Answer:
python is better
Explanation:
because its my favourite
Assume the clock for a 4-bit binary counter is 80 kHz. The output frequency of the fourth stage (Q3) is
Answer:
5kHz
Explanation:
There are four stages so N = 2⁴ = 16.
The frequency at nth stage is given by
[tex]f_n = \frac{f_{clk}}{N} = \frac{80kHz}{16} = 5kHz[/tex]
The output frequency of the fourth stage (Q3) is 5kHz. Thus the correct option is A.
What is a 4-bit binary counter?On each clock cycle, the 4-bit synchronous counter successively counts up from 0 (0000) to 15 as outputs ( 1111 ). It is also known as a 4-bit Synchronous Up Counter as result.
We required four Flip Flops to create a 4-bit counter, as indicated by the number 4 Flip Flops. The counter also has a reset pin, which enables it to enter an all-zero mode in which its output is "0."
The Q output of the previous flip-flop triggers the CLK input in the 4-bit counter above, as opposed to the Q output as in the up counter configuration, where the output of each flip-flop changes state on the rising edge.
There are four stages so N = 2⁴ = 16.
The 4-bit binary counter is 80 kHz.
In order to calculate the output frequency the 4-bit binary counter is divided by 16 which is equal to 5kHz.
Therefore, option A is appropriate.
Learn more about the 4-bit binary counter, here:
https://brainly.com/question/29894384
#SPJ5
The complete question is Probably
Assume the clock for a 4-bit binary counter is 80 kHz The output frequency of the fourth stage (Q3) is. a) 5kHz. b) 10 kHz. c) 20 kHz. d) 320 kHz.
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False
Answer:
False
Explanation:
The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares
The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability
Always place the smallest dimensions ____ the object, with ____ the object.
Question 2 options:
A) closest to; progressively smaller dimensions outward from
B) closest to; progressively larger dimensions outward from
C) farthest from; progressively smaller dimensions above
D) farthest from; progressively larger dimensions above
E) none of the above
Relatively simple CRUD (create, read, update, delete) web applications development can be facilitated with: _________.
a. HTTP
b. HTTPS
c. Web Application Frameworks
d. Cascading Style Sheets (CSS)
e. Document Object Model (DOM)
Answer:
c. Web Application Frameworks
Explanation:
Web Application Frameworks is a form of a software framework that is made to perform support for the building of web applications such as web services, web resources, and web APIs. Web frameworks.
Also, Web Application Frameworks automatically perform the function of primary activities carried out in web development such as create, read, update, delete.
Hence, in this case, the correct answer is Web Application Framework.
Use the drop-down tool to select the phrase that completes each sentence,
In Windows, deleted files go to the
If you want to see the most information about a file, you can view them in
A file manager can help you
DONE
I
Answer:
1. recycle bin
2. details view
3. move a file
Explanation:
i did the assignment on edge. and got it right
Answer:
In Windows, deleted files go to the
✔ Recycle Bin
If you want to see the most information about a file, you can view them in
✔ details view
A file manager can help you
✔ move a file
Explanation: Hope it helps ^w^
2. The Warren Commission investigated the assassination of President _______________________ in 1964.
Answer:
President Kennedy
Explanation:
John F. Kennedy was the 35th President of US. He was assassinated in 1963 in Dallas
Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?
Answer:
120
Explanation:
This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.
5 permutation of 4
To find permutation, we use the formula
P(n, r) = n! / (n - r)!
Where
n is the size of the shirts available, 5
r is the color of each shirt available, 4
P(5, 4) = 5! / (5 - 4)!
P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!
P(5, 4) = 120 / 1
P(5, 4) = 120
Therefore, the total number of shirts available is 120
Is anyone else having an issue with brainly mobile, where they don't let you watch ads? If so, what do you do to fix it?
Answer:
no im not
Explanation:
but i sorry that you are
Thale cress is a plant that is genetically engineered with genes that break down toxic materials. Which type of organism is described?
recombinant
transgenic
transverse
restriction
Answer: Transgenic
Explanation:
Since the thale cress is a plant that is genetically engineered with genes that break down toxic materials, the type of organism that is described here is the transgenic plant.
Transgene is when a gene is naturally transferred or transferred from an organism to another organism by genetic engineering method.
Therefore, the correct option is transgenic.
Answer:
The answer is B (transgenic)
Explanation:
What is the best use of network in homes
Answer:
Spectrem
Explanation:
Designing the right elements for the tasks that the user is attempting to perform is called ________.
Answer:
Interface design
Explanation:
INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.
The question is in the photo
Answer:
a
the most suitable answer
Unless otherwise specified, entire arrays are passed __________ and individual array elements are passed __________.
Answer:
By reference ; by value
Explanation:
An array is defined as the arrangement of a certain item in a well orderly manner/ fashion.
Unless otherwise specified, entire arrays are usually passed by reference and individual array elements are passed by value which is the standard norm in the mode of operations.
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet (using a standard header with no options) and that the TCP packet gets put into an IP packets. What is the % of overhead that is added in because of TCP and IP combines?
1) 40%
2) 10%
3) 20%
4) 70%
Answer:
1) 40%
Explanation:
Given the data size = 60 byte
data traversed through TSP then IP
Header size of TCP = 20 bytes to 60 bytes
Header size of IP = 20 bytes to 60 bytes
Calculating overhead:
By default minimum header size is taken into consideration hence TCP header size = 20 bytes and IP header size = 20 bytes
Hence, the correct answer is option 1 = 40%
If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.
Answer:
D) Software problem
Explanation:
plz give me brainliest
D
edge2021 YWWWWWWWWWWWWWWWWWWWWW
What is the purpose of a Hyperlink
Can you answer both
Answer:
Number 16 is A Or B And Number 17 is B I think
Explanation:
Write one kid-friendly paragraph about a Software Developer's salary,.
What is the name for non-paid active links returned by an Internet search engine in the search results?
O sponsored links
O organic links
O dead links
O relevant links
Answer: b
Explanation: