Which IP QoS mechanism involves prioritizing traffic? Group of answer choices IntServ RSVP COPS DiffServ None of the above

Answers

Answer 1

Answer:

DiffServ

Explanation:

The IP QoS which is fully known as QUALITY OF SERVICE mechanism that involves prioritizing traffic is DIFFERENTIATED SERVICES (DiffServ).

DIFFERENTIATED SERVICES help to differentiate ,arrange ,manage, control and focus on network traffic that are of great significance or important first before network that are less important or by their order of importance in order to provide quality of service and to avoid network traffic congestion which may want to reduce the quality of service when their is to much load on the network .


Related Questions

1. Normal view
the place where information for handouts can be added
2. Notes view
provide rows of icons to perform different tasks
3. Slide pane
the working window of a presentation
4. Title bar
displays thumbnails
5. toolbars
provides filename and Minimize icon

Match the feature to its function.

Answers

Answer:

1.- display thumbnails, 2.-the place where info can be put, 3.- working window of presentation 4.- provides file name, 5.- rows of icons to perform task ... I'm not sure if these are correct but I tried

1. Normal view

the working window of a presentation

2. Notes view

the place where information for handouts can be added

3. Slide pane

displays thumbnails

4. Title bar

provides filename and Minimize icon

5. Toolbar

provide rows of icons to perform different tasks

What is Microsoft PowerPoint?
Oa presentation program included with Microsoft Office
oa project management program available only in certain versions of Microsoft Office
Oa desktop publishing program included with Microsoft Office
oa collaboration program available only in certain versions of Microsoft Office

Answers

Answer:

ITS THE FIRST ONE :)

Explanation:

ALSO IF ITS NOT THE FIRST ONE GO ON YT!

Columns, margins and orientation can all be found on what tab

Answers

Answer:

The right answer is: Option C: Layout.

Explanation:

Columns are used to write text in a word document in more than one columns. Similarly, margins is the empty space that is left blank from all sides of the page. Orientation can be either landscape or portrait.

all these options are found in the Layout tab in MS word.

Hence,

The right answer is: Option C: Layout.

an event handler is..

a. a word that is open for interpretation.
b. a sentence that provides information.
c. a procedure that occurs as a result of a users action or another source.

Answers

The answer here is C

Answer:

The correct answer is:

Option c. a procedure that occurs as a result of a users action or another source.

Explanation:

First of all, let us define what an event is.

An occurrence that is caused by any external user or entity towards a software or a website is called an event i.e. click from mouse, key pressed from keyboard.

When an event occurs, the software or functionality of the website has to respond to the event. An event handler is a function or procedure that contains the code which has to be run when the event occurs.

When the event occurs, the event handler for particular event is executed.

So from the given options,

The correct answer is:

Option c. a procedure that occurs as a result of a users action or another source.

Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time. If a review contains the desired word you should make a note of the review score in an accumulator variable. Finally, produce some output that tells your user how that word was used across all reviews as well as the classification for this word (any score of 2.0 or higher can be considered

Answers

Answer:

import numpy as np

word = input("Enter a word: ")

acc = []

with open("Downloads/record-collection.txt", "r") as file:

   lines = file.readlines()

   for line in lines:

       if word in line:

           line = line.strip()

           acc.append(int(line[0]))

   if np.mean(acc) >= 2:

       print(f"The word {word} is a positive word")

       print(f"{word} appeared {len(acc)} times")

       print(f"the review of the word {word} is {round(np.mean(acc), 2)}")

   else:

       print(f"the word {word} is a negative word with review\

{round(np.mean(acc), 2)}")

Explanation:

The python program gets the text from the review file, using the user input word to get the definition of reviews based on the word, whether positive or negative.

The program uses the 'with' keyword to open the file and created the acc variable to hold the reviews gotten. The mean of the acc is calculated with the numpy mean method and if the mean is equal to or greater than 2 it is a positive word, else negative.

Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?

Answers

Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.

What is the missing line of code?

>>> phrase = "You are amazing!"
>>> _____
'u a'

phrase[3:6]

phrase[2:6]

phrase[3:5]

phrase[2:5]

Answers

Answer:

phrase[2:5]

Explanation:

Given:

The above code segment

Required

Which instruction returns 'u a'

First, we need to get the index of u in the phrase:

u is at the third position but in programming, index starts at 0.

So, u is at index 2

Next, we need to get the index of a in the phrase:

a is at index 4

One of the ways to return a sub string from a string in python is [tex]string[start:stop+1][/tex]

Where:

[tex]start = 2[/tex] ----- index of u

[tex]stop = 4[/tex]  ----- index of a

phrase ---- The string variable

So, the instruction that returns 'u a' is: [tex]phrase[2:5][/tex]

Where 5 = 4 + 1

Answer:

phrase[2:5]

Explanation: got it right on edgen

Write a Python program to keep track of data for the following information in a medical clinic: doctors, patients, and patient_visits

Patients and Doctors have an ID, first name, and last name as common attributes. Doctors have these additional attributes: specialty (e.g. heart surgeon, ear-nose-throat specialist, or dermatologist), total hours worked, and hourly pay. Further, doctors keep track of the patient_visits. A patient_visit has the following attributes, number_of_visits to the clinic, the patient who is visiting, the doctor requested to be visited, and the number of hours needed for consultation. Based on the number of consultation hours, the doctor will get paid.


The following functions are required:

1. addVisit: this function adds a patient_visit to the doctor. A new visit will NOT be added if the doctor has already completed 40 hours or more of consultation. If this happens, an error is thrown mentioning that the doctor cannot have more visits this week.

2. calculatePay: this function calculates the payment for the doctor using the following logic: Each hour is worth AED 150 for the first two visits of the patient and all further visits are billed at AED 50.


3. calculateBill: this function calculates the bill for the patient, which displays the doctor's details, patient details, and payment details. An additional 5% of the total is added as VAT.


The student is required to identify classes, related attributes, and behaviors. Students are free to add as many attributes as required. The appropriate access modifiers (private, public, or protected) must be used while implementing class relationships. Proper documentation of code is mandatory. The student must also test the code, by creating at-least three objects. All classes must have a display function, and the program must have the functionality to print the current state of the objects.

Answers

This is too much to understand what you need the answer too. In my opinion I can’t answer this question

What is the main reason for assigning roles to members of a group?

Answers

So that people with strengths in different areas can work on what they do best, plus it divides the workload.

8. Write the examples of freeware and Shareware softwares ?

Answers

Explanation:

People use freeware software because it is available free of cost and it can be distributed free of cost, that is why it is called FREEware.

Freeware software:

Adobe PDF

yahoo messenger

Go.ogle Talk

MSN messenger

People use shareware software because it helps them to know about the product more before buying it and this software is available free of cost.

Shareware software:

Adobe acrobat 8 professional

Winzip

Getright

Question # 6
Dropdown
Choose the correct ending to the sentence below.


The function localtime() _____________________

Answers

Answer:

returns a different value every time you use it

Explanation: :)

What is better to use for start Python or Java?

Answers

Answer:

here is your answer ......

hope it helps......

Answer:

python is better

Explanation:

because its my favourite

Assume the clock for a 4-bit binary counter is 80 kHz. The output frequency of the fourth stage (Q3) is

Answers

Answer:

5kHz

Explanation:

There are four stages so N = 2⁴ = 16.

The frequency at nth stage is given by

[tex]f_n = \frac{f_{clk}}{N} = \frac{80kHz}{16} = 5kHz[/tex]

The output frequency of the fourth stage (Q3) is 5kHz. Thus the correct option is A.

What is a 4-bit binary counter?

On each clock cycle, the 4-bit synchronous counter successively counts up from 0 (0000) to 15 as outputs ( 1111 ). It is also known as a 4-bit Synchronous Up Counter as result.

We required four Flip Flops to create a 4-bit counter, as indicated by the number 4 Flip Flops. The counter also has a reset pin, which enables it to enter an all-zero mode in which its output is "0."

The Q output of the previous flip-flop triggers the CLK input in the 4-bit counter above, as opposed to the Q output as in the up counter configuration, where the output of each flip-flop changes state on the rising edge.

There are four stages so N = 2⁴ = 16.

The 4-bit binary counter is 80 kHz.

In order to calculate the output frequency the  4-bit binary counter is divided by 16 which is equal to 5kHz.

Therefore, option A  is appropriate.

Learn more about the 4-bit binary counter, here:

https://brainly.com/question/29894384

#SPJ5

The complete question is Probably

Assume the clock for a 4-bit binary counter is 80 kHz The output frequency of the fourth stage (Q3) is. a) 5kHz. b) 10 kHz. c) 20 kHz. d) 320 kHz.

The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False

Answers

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

Always place the smallest dimensions ____ the object, with ____ the object.
Question 2 options:

A) closest to; progressively smaller dimensions outward from

B) closest to; progressively larger dimensions outward from

C) farthest from; progressively smaller dimensions above

D) farthest from; progressively larger dimensions above

E) none of the above

Answers

The answer is B (Closest to; progressively larger dimensions outward from

Relatively simple CRUD (create, read, update, delete) web applications development can be facilitated with: _________.
a. HTTP
b. HTTPS
c. Web Application Frameworks
d. Cascading Style Sheets (CSS)
e. Document Object Model (DOM)

Answers

Answer:

c. Web Application Frameworks

Explanation:

Web Application Frameworks is a form of a software framework that is made to perform support for the building of web applications such as web services, web resources, and web APIs. Web frameworks.

Also, Web Application Frameworks automatically perform the function of primary activities carried out in web development such as create, read, update, delete.

Hence, in this case, the correct answer is Web Application Framework.

Use the drop-down tool to select the phrase that completes each sentence,
In Windows, deleted files go to the
If you want to see the most information about a file, you can view them in
A file manager can help you
DONE
I

Answers

Answer:

1. recycle bin

2. details view

3. move a file

Explanation:

i did the assignment on edge. and got it right

Answer:

In Windows, deleted files go to the

✔ Recycle Bin

If you want to see the most information about a file, you can view them in

✔ details view

A file manager can help you

✔ move a file

Explanation: Hope it helps ^w^

2. The Warren Commission investigated the assassination of President _______________________ in 1964.

Answers

Answer:

President Kennedy

Explanation:

John F. Kennedy was the 35th President of US. He was assassinated in 1963 in Dallas

Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?

Answers

Answer:

120

Explanation:

This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.

5 permutation of 4

To find permutation, we use the formula

P(n, r) = n! / (n - r)!

Where

n is the size of the shirts available, 5

r is the color of each shirt available, 4

P(5, 4) = 5! / (5 - 4)!

P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!

P(5, 4) = 120 / 1

P(5, 4) = 120

Therefore, the total number of shirts available is 120

Is anyone else having an issue with brainly mobile, where they don't let you watch ads? If so, what do you do to fix it?​

Answers

Answer:

no im not

Explanation:

but i sorry that you are

Thale cress is a plant that is genetically engineered with genes that break down toxic materials. Which type of organism is described?
recombinant
transgenic
transverse
restriction

Answers

Answer: Transgenic

Explanation:

Since the thale cress is a plant that is genetically engineered with genes that break down toxic materials, the type of organism that is described here is the transgenic plant.

Transgene is when a gene is naturally transferred or transferred from an organism to another organism by genetic engineering method.

Therefore, the correct option is transgenic.

Answer:

The answer is B (transgenic)

Explanation:

What is the best use of network in homes

Answers

Answer:

Spectrem

Explanation:

Designing the right elements for the tasks that the user is attempting to perform is called ________.

Answers

Answer:

Interface design

Explanation:

INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.

The question is in the photo

Answers

Answer:

a

the most suitable answer

Unless otherwise specified, entire arrays are passed __________ and individual array elements are passed __________.

Answers

Answer:

By reference ; by value

Explanation:

An array is defined as the arrangement of a certain item in a well orderly manner/ fashion.

Unless otherwise specified, entire arrays are usually passed by reference and individual array elements are passed by value which is the standard norm in the mode of operations.

Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet (using a standard header with no options) and that the TCP packet gets put into an IP packets. What is the % of overhead that is added in because of TCP and IP combines?
1) 40%
2) 10%
3) 20%
4) 70%

Answers

Answer:

1) 40%

Explanation:

Given the data size = 60 byte

data traversed through TSP then IP

Header size of TCP = 20 bytes to 60 bytes

Header size of IP = 20 bytes to 60 bytes

Calculating overhead:

By default minimum header size is taken into consideration hence TCP header size = 20 bytes and IP header size = 20 bytes

Hence, the correct answer is option 1 = 40%

If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.

Answers

Answer:

D) Software problem

Explanation:

plz give me brainliest

D

edge2021      YWWWWWWWWWWWWWWWWWWWWW                                  

What is the purpose of a Hyperlink

Can you answer both

Answers

Answer:

Number 16 is A Or B And Number 17 is B I think

Explanation:

Write one kid-friendly paragraph about a Software Developer's salary,.

Answers

According to BBC America, Software Developers made a median salary of $103,620 in 2018. The best-paid 25 percent made $130,460 that year, while the lowest-paid 25 percent made $79,340. The software developer field is growing in both salary and job volume. The BLS projects the software development (applications) field will grow by about 26% by 2028, with 241,500 jobs added by that time. This is compared with an estimated 12% growth for those in computer occupations.

What is the name for non-paid active links returned by an Internet search engine in the search results?
O sponsored links
O organic links
O dead links
O relevant links

Answers

Answer: b

Explanation:

Other Questions
Deontogical ethics are based on which of the following Support with three reasons the decision to use a plastic material for the package in the followingscenario.Situation: A client has hired Jose, a materials engineer, to develop a package for an item he has begunto market. The object needs to be mailed to customers within three days of being ordered. 3 questions. and there apart of JROTCWhat is another name for a Column? LineRowFileSquiggly LineWhat are the two types of formations?Column and MassLine and ColumnColumn and FileMass and LineIf a Cadet is at Present Arms, what is the command given to lower the hand salute? Present ArmsDrop Hand SaluteOrder ArmsNone of the above The harbormaster decides how many trips the ferry needs tomake for 37 cars. The ferry can carry 8 cars at a time. How many trips does the ferry need to make so that all cars can cross the harbor? (CG5e) By 1985, 32 States had petitioned Congress to call a convention to propose an amendment to require that the federal budget be balanced each yearHow many more States are needed for that step to be taken? A balloon contains 0.075 m^3 ofgas. The pressure is reduced to100kPa and fills a box of 0.45 m^3.What is the initial pressure inside theballoon if the temperature remainsconstant? How does the ionosphere help radio transmission? A convex polyhedron has faces that consist of 5 congruent squares and 4 congruent equilateral triangles. Thepolyhedron has 16 edges. How many vertices does it have?O 5 verticesO 9 verticesO 13 verticesO 14 vertices The length of a man's shadow is directly proportional with his height.At the same time of day, a man who is 1.8 meters tall casts a 25.2meter shadow and his son casts a 21 meter shadow. What is theheight of the man's son, in meters? If necessary, round to the nearesttenth. (18) PS help me what was unique about Wilmington &weldon railroad & the North Carolina when they were new? ill mark brainlist if i can!! What happened to people who protested apartheid in South Africa?OThey were put in jailOThey were given awardsOThey were allowed to protestO All the aboveO None of the above help pls !!!!!!!!!!!!!!!!!!!!!!! why do feet smell and noses run? Why did the United States break diplomatic relations with Germany in 1917?A. Germany refused to accept President Wilsons Fourteen Points.B. Germany signed the Treaty of Brest-Litovsk with Russian Bolsheviks.C. Germany declared unrestricted submarine warfare against all ships.D. Germany sank the British liners Lusitania and Arabic in quick succession.E. Germany offered to help Mexico recover Texas, New Mexico, and Arizona. LIGHTING Kyle is buying strands of outdoor lights for his luau. The total cost of the strands can be modeled by the function f(c) = 8.97c. He received an email with a coupon code to receive $5 off his online purchase. A. Write a function g(c) that represents the cost of purchasing strands of lights with the $5 discount. B. Find the cost of purchasing 6 strands of lights before and after the discount. How about this one anyone What is the midpoint of the segment shown below ? A. (1,5) B. (2,5), C ( 1 1/2,5), D. (2 1/2, 5) Solve the proportion34.5x=5672 , rounding your answer to the nearest tenth When does copyright protection start?Choose the answer.six months after work is produced, written, or developedonce the work is registered with the statethe moment work is produced, written, or developed90 days after a work is produced, written, or developed need help on these thank you if you help High-Quality memes lol