Which of the following is not used much anymore in networking, based on security and waste of bandwidth concerns: a) Switch, b) Router c) Server d) Hub

Answers

Answer 1

More intelligent than a hub is a switch. It functions as a connection point for every network device, much like the hub. The efficiency of transmitting a data packet through the network is improved. In a tabular manner, it keeps track of the MAC addresses of the connected machines.

What is a Hub?A multiport repeater, hub, is. It features a variety of ports that can connect to Ethernet using various network devices. Given that it neither filters the data nor understands where the data is supposed to go, it is regarded as the device with the least intelligence. A data packet is replicated to each of the other ports connected to the one where it arrives. Thus, even though the data packet is not intended them, all devices receive it. Active and passive hubs are the two different types. A connector that joins cables from various systems is a passive hub, but an active hub is a multi-point repeater that can renew signals.

To Learn more About hubs refer to:

https://brainly.com/question/13850320

#SPJ4


Related Questions

You are designing the architecture for an application that will be hosted on Azure virtual machines. The application will be available over TCP port 4359. You will have instances of the application in the following Azure Regions:

West US

East US

East Asia

West Europe

North Europe

Australia East

You need to recommend a solution to route user request for the application to the instance closest to the user.

What should you recommend?

Select only one answer.

Azure Front Door

Azure Traffic Manager

Azure Application Gateway

Azure Load Balancer

Answers

Answer:

azure front door

Explanation:

ONLY HAPPENING IN OHIO DAWG.

Answer: Azure Traffic Manager

Explanation: Azure Front Door cannot handle TCP, only HTTP

Traffic Manager — Any protocol: Because Traffic Manager works at the DNS layer, you can route any type of network traffic; HTTP, TCP, UDP, etc.

Front Door — HTTP acceleration: With Front Door traffic is proxied at the Edge of Microsoft’s network. Because of this, HTTP(S) requests see latency and throughput improvements reducing latency for SSL negotiation and using hot connections from AFD to your application.

What is the purpose of Switch here? And, why are there two switches?

Answers

Answer:

Keep electrical signal undistorted: When a switch forwards a frame, it regenerates an undistorted square electrical signal. And, In a simple light circuit, it switches between connected and disconnected. In a more complex multi-way system it switches between two wires which both go to the other switch. The other switch chooses which wire is connected and which is not. So both switches can connect or disconnect the circuit, at any time.

Explanation:

which of the following are actions and/or steps that can be taken to avoid leaks and disclosures when handling sensitive data?

Answers

Actions and/or activities that can be done to prevent leaks and disclosures while handling sensitive data include understanding what employees must do to complete their tasks.

Why is it important to understand the needs of your employees?

Assess the Potential Impact of Third Parties, watch every network access, Identification of all sensitive data, endpoint security, and Using Data Loss Prevention (DLP) software , Encrypt all data and review all permissions. By attending to the needs of employees, employers are more likely to retain talented individuals, boost production and productivity, and promote initiative and accountability.

According to a recent study, if businesses want to provide their staff with a peak experience that is profound and long-lasting, they must meet the "three essential needs" of their employees. Autonomy, connection, and mastery are these demands, according to O.C. Tanner's 2022 Global Culture Report. Competencies are the knowledge, skills, abilities, personal qualities, and other "worker-based" elements that help distinguish between exceptional performance and average performance in a given situation.

T learn more about data refer to :

https://brainly.com/question/30300203

#SPJ4

Given a string on one line and a second string on the second line, output the index where the second string starts in the first string Ex: If the input is: Fuzzy bear zy the output is: 3 Note: Using a pre-defined string function, the solution can be just one line of code. 1 #include 2 #include 3 using namespace std; 5 int main() { 6 string strVar; 7 string subString; 8 9 getline(cin, strVar); 10 cin >> subString; 11 12 return 0; 13 }

Answers

You can use the find() function from the C++ string library to find the starting index of a substring within a string. The string library in C++ provides several useful functions for manipulating strings.

Coding part of the given problem in C++:

#include <iostream>

#include <string>

using namespace std;

int main() {

   string strVar;

   string subString;

   getline(cin, strVar);

   cin >> subString;

   int index = strVar.find(subString);

   cout << index << endl;

   return 0;

}

This will output the index where the second string starts in the first string. If the substring is not found, it will return string::npos.

To learn more about C++ string library, visit: https://brainly.com/question/23693327

#SPJ4

contains additional hardware information when there are values in hkey local machine such as two different monitors

Answers

Contains details about the hardware installed on the computer, program preferences, and other details. All users that access that computer utilize the information.

The Windows Registry tree HKEY LOCAL MACHINE, sometimes known as HKLM, houses configuration information used by all users of Windows. Information on Windows services, drivers, applications that launch automatically for every user, and standard OS settings are all included. In order to map all the other subkeys, the system kernel keeps the key found by HKLM in memory rather than storing it on disk. Applications are not allowed to add more subkeys. Contains details about the hardware installed on the computer, program preferences, and other details. All users that access that computer utilize the information.

Learn more about configuration here-

https://brainly.com/question/14307521

#SPJ4

Which of the following is an advantage of a centralized information security organizational structure?
It is easier to promote security awareness.
It is easier to manage and control.
It is more responsive to business unit needs.
It provides a faster turnaround for security requests.

Answers

A centralised organisational structure for information security has the benefit of being simpler to maintain and exercise control over.

Explain the functions of centralized information security?

When there is a single integrated system acting as just a singular security solution and performing several security tasks from a single location, that situation is referred to as centralised security.

A centralised strategy implies that the entire institution's network is protected by a single global security control plane. It aids in ongoing system and network monitoring to enable prompt damage management. A prompt alert is sent whenever a common threat is discovered by a centralised security system. The threat is then eliminated with the use of a policy that is created from this warning.VPN networking is a component of a centralised security strategy that secures outgoing communication by encrypting as well as anonymizing network traffic.One or more cloud environments can be protected via a centralised approach to cloud security, which sends all logs generated by these environments to a single location.

To knwo more about the centralized information security, here

https://brainly.com/question/17373547

#SPJ4

you are connecting a laptop to a brand new digital high definition tv. unfortunately, the laptop is a little outdated and only has an analog display output. which of the following adapters could you use to convert the signal from analog to digital for use with the new television?

Answers

Only a functional connectivity and IP setup are required. To learn the status of hosts on the network, it sends ICMP requests.

It is unable to determine whether a problem is with an application or a network issue. The DHCP server will allocate a client an IP address from its DHCP scope and reserve it based on the client's MAC address when the client requests an IP address by sending a message to the DHCP server over the network. A temporary device may send the sender an ICMP error message if the ping is unsuccessful, such as Unreachable if there is a routing or packet fragmentation issue or Time Exceeded if the first packet is trapped in a loop.

Learn more about network here-

https://brainly.com/question/14276789

#SPJ4

The DiffServ technique for addressing QoS issues defines what two different types of data stream forwarding?

Answers

The following two forms of forwarding are defined by DiffServ: * EF (Expedited Forwarding): A minimum departure rate from a certain node is applied to a data stream.

any occurrence, regardless of size, that negatively impacts the resources or availability of a network. A security lapse, such as a hacker accessing a user's account, an infection from a worm or virus, or an environmental problem, like a fire or flood, could all be to blame. External factors, such as lightning strikes, can have an impact on power quality, but other factors, such as the starting and stopping of large machinery, circuit overloads, or poor wiring, can also be to blame.

Learn more about network here-

https://brainly.com/question/14276789

#SPJ4

SANs typically use what virtualization?

Answers

They use the SCSI protocol for communication between servers. A well-known transform boundary found in California is the San Andreas fault.

What is San Andreas Fault?

The San Andreas Fault has the most famous fault in the world.The San Andreas Fault is a place where two tectonic plates touch, the North American and Pacific Plates.

The plates are rigid (or almost rigid) slabs of rock that comprise the crust and upper mantle of the Earth. It is about 700 miles long as the crow flies and about 800 miles long when its curves are measured.

Therefore, They use the SCSI protocol for communication between servers. A well-known transform boundary found in California is the San Andreas fault.

Learn more about SCSI on:

https://brainly.com/question/24284823

#SPJ1

which of the following definitions best matches the concept of an account from a security standpoint? group of answer choices an arrangement in which a person may use computer or network services a record or statement of financial expenditure and receipts relating to a particular purpose a report or description of an event or experience to consider or regard in a specified way

Answers

from a security perspective, the idea of accountability keeping records of the actions you took or being accountable for keeping such records.

The correct option is C.

In a computer network, what is security?

Any action intended to safeguard the integrity and usefulness of your network and data is referred to as network security. Software and hardware technologies are also a part of it. Numerous threats are targeted by it. They can't get on your network or spread there because of it. Network access is controlled by effective network security.

How critical is network security?

The protection of sensitive data from cyberattacks and the maintenance of a reliable and functional network are two reasons why network security is crucial. Proper network security strategies use a variety of security tools to shield users and companies against malware and online threats like distributed denial of service.

To know more about computer network visit:

https://brainly.com/question/14276789

#SPJ4

Question is:

Which of the following definitions best matches the concept of accountability from a security standpoint?

A. Being able to explain your actions to figures of authority, such as a police officer or a manager

B. Having or being responsible to your records of actions you performed

C. The trustworthiness of a web site in holding bank account information

D. The principle of being judged for the purpose of punishment or reward

An engineering team’s new work project will shortly be bursting with many types of files and sub-project files. The team wants to be able to easily find the project files. What should it do to have the best organizational method for the project’s files?

Answers

Answer:

An engineering team can implement the following organizational methods to easily find project files:

File naming conventions: Establish a consistent and logical naming convention for all files within the project, such as using the project name and date in the file name. This will make it easier to identify and locate specific files.

File folders: Create folders for each project and sub-project, and organize the files within each folder. This will make it easy to find and access the files, and also easy to share files with team members.

Version control: Use a version control system (such as Git) to track changes to the files and keep track of different versions of the files. This will ensure that the team can access the most recent version of the files and also revert to previous versions if needed.

Cloud-based storage: Use a cloud-based storage service to store the files. This will allow team members to access the files from anywhere and collaborate in real-time.

Backups: Regularly backup the files to ensure that they are not lost in case of any technical issues.

File-sharing tools: Use file sharing tools such as SharePoint or Asana to share the files with the team and make it easy for them to access and collaborate on the files.

Document management systems: Use a document management system (DMS) to manage, store and share documents, images, videos and other files. This will provide an easy way to access, share and collaborate on the files, and also ensure that the files are stored in a secure location.

Access control: Implement access control to ensure that only authorized team members can access the files.

Explanation:

By implementing these organizational methods, the engineering team will be able to easily find and access the project files and collaborate efficiently on the project.

1.18 lab: winning team (classes) given main(), define the team class (in file team.java). for class method getwinpercentage(), the formula is: wins / (wins losses). note: use casting to prevent integer division. for class method printstanding(), output the win percentage of the team with two digits after the decimal point and whether the team has a winning or losing average. a team has a winning average if the win percentage is 0.5 or greater.

Answers

In object-oriented programming, a class is a template description of the method(s) and variable(s) of a given type of object.

How to define a Team class?

public class Team {        

private String name;    

private int wins;    

private int losses;    

// TODO: Define mutator methods -    

// setName(), setWins(), setLosses()    

public void setName(String name) {        

this.name = name;    

}    

public void setWins(int wins) {        

this.wins = wins;    

}    

public void setLosses(int losses) {        

this.losses = losses;    

}    

// TODO: Define accessor methods -    

// getName(), getWins(), getLosses()    

public String getName() {        

return name;    

}    

public int getWins() {        

return wins;    

}    

public int getLosses() {        

return losses;    

}    

// TODO: Define getWinPercentage()    

public double getWinPercentage() {        

//calculate percentage        

double percentage = (double) wins / (wins + losses);        

return percentage;    

}    

// TODO: Define printStanding()    

public void printStanding() {        

//call getWinPercentage() method        

double percentage = getWinPercentage();        

//display percentage with 2 decimal points        

System.out.printf("Win percentage: %.2f", percentage);        

//if percentage is greater than or equal to 0.5,then winning average        

if (percentage >= 0.5)            

System.out.println("\nCongratulations, Team " + name + " has a winning average!");        

//otherwise losing average        

else            

System.out.println("\nTeam " + name + " has a losing average.");    

}

}

WinningTeam class

//Adding the Scanner class to read input from users import java.util.Scanner;

public class WinningTeam {    

public static void main(String[] args) {        

//creating an instance of scanner class        

Scanner scnr = new Scanner(System.in);        

//creating an instance of team class        

Team team = new Team();        

//read name,wins and losses        

String name = scnr.next();        

int wins = scnr.nextInt();        

int losses = scnr.nextInt();        

//set values using setter methods        

team.setName(name);        

team.setWins(wins);        

team.setLosses(losses);        

//calling printStanding() method        

team.printStanding();  

To know more about class, visit:

https://brainly.com/question/9949128

#SPJ4

according to the text, subsetting can also be used to eliminate unwanted data such as: select all that apply!

Answers

Removing unneeded data from your dataset is a procedure known as data cleansing.

What is Data cleaning?Data cleaning is the process of repairing or eradicating inaccurate, corrupted, improperly formatted, duplicate, or insufficient data from a dataset. Data duplication or labeling errors are common when merging various data sources. Even though they may appear to be proper, wrong data might lead to erroneous results and algorithms. The procedures in the data cleaning process will differ from dataset to dataset, hence there is no one definite way to prescribe the precise steps. But in order to ensure that you are performing data cleaning in the proper manner each time, it is essential to create a template for your procedure.Removing unneeded data from your dataset is a procedure known as data cleansing. Transforming data from one structure or format into another is known as data transformation. Transforming and mapping data from one "raw" data form into another format for warehousing and analysis are procedures known as transformation, data wrangling, or data munging. This article is mostly concerned with the procedures for cleaning that data.

To Learn more About data cleansing Refer To:

https://brainly.com/question/27748920

#SPJ4

Which of the following describes the vision of incorporating Digital Engineering (DE) into the current Systems Engineering (SE) and acquisition environment? (Select all that apply)

Answers

Models provide an organised collection of digital data, information sharing and comparing data while making design decisions are the following describes the vision of incorporating Digital Engineering (DE) into the current Systems Engineering (SE) and acquisition environment.

What is Digital Engineering (DE)?

Digital Engineering (DE) is the use of digital technologies and techniques to improve the design, development, and maintenance of engineering systems and processes.

This can include the use of computer-aided design (CAD) software, simulation and modeling tools, and other digital technologies to improve efficiency, accuracy, and collaboration in the engineering process. DE can be applied to a wide range of industries, including aerospace, automotive, construction, and manufacturing.

To learn more about computer-aided design (CAD), visit: https://brainly.com/question/15683229

#SPJ4

which of the following statements is applicable for a peer-to-peer network and not for a client-server network model? group of answer choices problems on the network can be monitored, diagnosed, and fixed from one location. they are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

Answers

The following assertions apply to a peer-to-peer network architecture but not to a client-server network paradigm: "Because they are simple to configure, they may be employed in contexts where time or technical skill is limited."

What is network model?

The network model is a database model designed to represent objects and their relationships in a flexible manner. Its distinguishing feature is that the schema is not limited to being a hierarchy or lattice when viewed as a graph in which object types are nodes and relationship types are arcs. A network model is a database model that is intended to represent objects and their relationships in a flexible manner. The network model's schema, which is viewed as a graph with relationship types as arcs and object types as nodes, is a distinguishing feature.

Here,

The following statements apply to a peer-to-peer network model rather than a client-server network model: "Because they are simple to configure, they can be used in environments where time or technical expertise are limited."

To know more about network model,

https://brainly.com/question/15160527

#SPJ4

Computer Science.

1.14 zyLab training*: One large program

Most zyLabs are designed to be completed in 20 - 25 minutes and emphasize a single concept. However, some zyLabs (such as the one large program or OLP) are more comprehensive and may take longer to complete.

Incremental development is a good programming practice and is the process of writing, compiling, and testing a small amount of code, then repeating the process with a small amount more (an incremental amount), and so on.

Suggested process to complete longer zyLabs:

- Implement Step 1 and submit for grading. Only one test will pass.
- Continue to implement one step at a time and resubmit for grading. At least one additional test should pass after each step.
- Continue until all steps are completed and all tests pass.


Program Specifications:
For practice with incremental development, write a program to output three statements as specified.

Step 1 (4 pts). Use print() to output "Step 1 complete". Submit for grading to confirm one of three tests passes.

Output should be:

Step 1 complete


Step 2 (3 pts). Use print() to output "Step 2 as well". Submit for grading to confirm two of three tests pass.

Output should be:

Step 1 complete
Step 2 as well


Step 3 (3 pts). Use print() to output "All steps now complete". Submit for grading to confirm all tests pass.

Output should be:

Step 1 complete
Step 2 as well
All steps now complete

Answers

The instruction on line 9 should be changed to read: System.out.println(userNumSquared);

What is Program Specifications?

The program's bugs will be fixed by:

Change userNumSquared = userNum + userNum; to userNumSquared = userNum * userNum;

Change System.out.print(userNumSquared); to System.out.print(userNumSquared);

The program's purpose is to calculate a number's square.

Print the computed square, then a fresh line.

On line 8, the square of the input integer is calculated incorrectly as:

userNumSquared = userNum + userNum;

Only two times the input number will be returned by the operation above. We just switch the addition operator (+) to multiplication (*) to address the error on this line.

Consequently, the instruction on line 8 should be changed to read:

userNumSquared = userNum * userNum;

On line 9, when the squared number is written, a new line is intended to be produced using the print command.

There are a few ways to do this, but using println is the most straightforward.

Consequently, the instruction on line 9 should be changed to read:

System.out.println(userNumSquared);

To learn more about Program Specifications, refer to:

https://brainly.com/question/29538391

#SPJ1

Briefly explain a computer

Answers

Answer:

A computer is a machine that can perform a wide range of tasks, including data processing, storage, and communication. It is composed of both hardware and software. The hardware includes the physical components such as the central processing unit (CPU), memory, storage, and input/output devices such as a keyboard and monitor. The software includes the operating system, applications, and programming languages that run on the hardware. The CPU is the "brain" of the computer and it performs calculations and logical operations to execute instructions provided by the software. Computers can be used for a wide range of tasks, including word processing, data analysis, internet browsing, gaming, and many others. They can be found in various forms, including desktops, laptops, tablets, and smartphones.

You should know this but okay.

Explanation:

On the AP Exam, the modulus operator is denoted by MOD. The MOD operator has the same precedence as the * and / operators.
What will c evaluate to in the following code segment?
a ← 17
b ← 5
c ← a MOD b

Answers

The correct answer is prompts the user to enter text or click a button, then returns a String containing the contents of the text box. Required.

A function is defined in Python by using the def keyword, which is followed by the function's name, parentheses, and a colon. a function that is provided to an event handler and called each time an event occurs. a function that the start function calls at the end. Our programmes can only carry out a series of instructions using if statements if the condition is true. Use an else statement if you want your programmes to carry out an alternative set of instructions if the condition is untrue. Which data type is being utilised is disclosed by this function. This function's name is Python type ().

To learn more about String click the link below:

brainly.com/question/30099412

#SPJ4

People design computers and machines to assemble them. Gas is then used to transport the finished computers to stores. Select the factors used in producing computers.

Human resources
Health
Capital goods
Natural resources

Answers

The factors used in producing computers are:

1. Human resources

3. Capital goods

4. Natural resources

What is the at of  producing computers?

The factors used in producing computers are:

Human resources (people designing and assembling the computers)Capital goods (machines and equipment used to assemble the computers)Natural resources (gas used to transport the finished computers to stores)

Note that "Health" isn't a factor used in producing computers. It's related to the well-being of the human resources, and it's important to have healthy workers but it's not a direct factor in producing computers.

Learn more about computers  from

https://brainly.com/question/21474169

#SPJ1

balance 2 was affected most by systemic error - error that has a very specific cause or pattern. what was the consistent difference between the actual mass and the measured mass? enter your answer to two decimal places. (example: 8.37).

Answers

Balance 2 was most affected by systemic error mistake, which has a very specific source or pattern. What was the persistent change. The current problem has been solved.

What are errors and what kinds of errors are there?

Errors are the difference between the measurement that was actually made and what was actually measured. We show our accuracy by writing our measurement with an uncertainty. The three different types of errors are systematic, random, and human.

What constitutes a systematic error, specifically?

A error is considered systematic if it consistently moves in the same direction. For instance, if anything consistently or regularly raised the blood pressure shortly before the measurements were to be taken, this can happen when taking blood pressure.

To know more about systemic error visit:-

https://brainly.com/question/13571447

#SPJ4

Fill in the blank: A data analyst is working with the World Happiness data in Tableau. To get a better view of Moldova, they use the _____ tool.A. Radial
B. Pan
C. Lasso
D. Rectangular

Answers

The "Pan" tool is used to move the view of the data on the screen, rather than zooming in or out. This would allow the data analyst to navigate and explore the data for Moldova more easily.

Who is a Data Analayst?

A data analyst is a professional who is responsible for collecting, cleaning, analyzing, interpreting and visualizing data to extract valuable insights that can inform business decisions.

They use statistical, programming and data visualization tools to turn raw data into actionable information. They work with large data sets and use their analytical skills to identify patterns and trends that can help organizations make better decisions and improve their performance.

They may also use machine learning and artificial intelligence to build predictive models and forecast future trends.

To learn more about Data Analayst, visit: https://brainly.com/question/30023160

#SPJ4

the five number summary of a dataset is given as 1, 3, 7, 13, 19 an observation is considered an outlier if it is below 1 incorrect. an observation is considered an outlier if it is above 19 incorrect.

Answers

In this case, any value below (3-1.510) = -2.5 or above (13+1.510) = 22.5 will be considered an outlier. So, any observation below 1 or above 19 would be considered an outlier.

An observation is considered an outlier if it falls outside the range of the first and third quartile (Q1 and Q3) of a dataset. The five number summary, which includes the minimum value (1), the first quartile (3), the median (7), the third quartile (13), and the maximum value (19), is a way to describe the distribution of data in a concise manner.

In this dataset, the minimum value is 1, the first quartile is 3, the median is 7, the third quartile is 13, and the maximum value is 19. The range between Q1 and Q3 is known as the interquartile range (IQR) which is (13-3) = 10 in this case.

Outliers are defined as any value that falls outside the range of Q1 - 1.5IQR and Q3 + 1.5IQR.

Therefore, in this case, any value below (3-1.510) = -2.5 or above (13+1.510) = 22.5 will be considered an outlier. So, any observation below 1 or above 19 would be considered an outlier.

Learn more about outlier here:

https://brainly.com/question/26958242

#SPJ4

Write a program in python to calculate the cost for replacing the carpet for a room. Carpet is priced by square foot. Total cost of carpet replacement includes carpet, labor and sales tax. Dollar values are output with two decimals

Answers

The program in Phyton that  calculates the cost for replacing the carpet for a room. Carpet is priced by square foot. Total cost of carpet replacement includes carpet, labor and sales tax, where  dollar values are output with two decimals is given as follow:

carpet_price_per_sqft = float(input("Enter the price of the carpet per square foot: "))

room_length = float(input("Enter the length of the room: "))

room_width = float(input("Enter the width of the room: "))

labor_cost = float(input("Enter the labor cost: "))

sales_tax_rate = float(input("Enter the sales tax rate (as a decimal): "))

# Calculate the area of the room

room_area = room_length * room_width

# Calculate the cost of the carpet

carpet_cost = room_area * carpet_price_per_sqft

# Calculate the total cost, including labor and sales tax

total_cost = carpet_cost + labor_cost

sales_tax = total_cost * sales_tax_rate

total_cost += sales_tax

# Output the total cost with two decimal places

print("The total cost of replacing the carpet is ${:.2f}".format(total_cost))

See attached for run capture.

What is the explanation of the above program?

This tool questions the user for the carpet price per square foot, room length and breadth, labor cost, and sales tax rate.

It then utilizes these data to compute the room's size, carpet cost, total cost including labor and sales tax, and finally outputs the entire cost to two decimal places using the format function.

Learn more about phyton:

https://brainly.com/question/16757242
#SPJ1

Overview
Colleges and universities have begun offering online classes in order to attract a global audience. The concept of online classes was once considered challenging and complex. Today, schools have become more proficient in developing systems that serve thousands of students living anywhere in the world. These systems, sometimes called learning management systems (LMS), display course content, manage different user accounts, store grades, and more! In this assignment, you will research an LMS of your choice and how it provides its users with secured interaction, content, technical support, and more. You may also use your own experience as a student using Brightspace, Southern New Hampshire University’s LMS. With your knowledge of the system and your experience as a student, you will assume the role of a systems analyst who is designing a similar system for YOUser University, a new college offering online courses.
Prompt
Assume the role of a systems analyst designing an LMS for YOUser University. You have been asked to determine different functional and nonfunctional requirements for the new LMS. You have also been asked to determine limitations and assumptions for your system design. You will be asked to provide a rationale for your work, and to support your reasoning with quality sources.. based on your research, complete the module two assignment template included below. you will describe the requirements, assumptions, and limitations for the lms you are designing for youser university. be sure to do each of the following: identify six different functional requirements for your lms. for each requirement, you must include a rationale that explains why you chose that specific requirement. identify six different nonfunctional requirements for your lms. for each requirement, you must include a rationale that explains why you chose that specific requirement. identify two assumptions and two limitations for this lms design project. for each assumption and limitation, you must include a rationale that explains your choice. finally, be sure to include citations in apa format for the sources you used to help you determine different requirements, or explain your rationale.

Answers

All the functional requirement are mentioned below.

Give a short note on System Analysts?

A systems analyst is a professional who studies an organization's current systems and procedures, and then designs and implements new or modified systems to improve the organization's overall efficiency and effectiveness. The systems analyst is responsible for analyzing the business requirements of an organization and determining the best solutions to meet those needs.

Functional Requirements:

1. User account management: The LMS should have the capability to create, manage and delete user accounts for students, professors, and administrators. This is an essential requirement as it allows for secure access to the system and ensures that only authorized users are able to access the course content and other resources.

Rationale: User account management is a critical function of an LMS as it ensures that only authorized users have access to the system and its resources. This is important to protect the system from unauthorized access and to ensure that only students, professors, and administrators who are enrolled in a course have access to the course content.

2. Course management: The LMS should have the capability to create, manage, and delete courses. This includes the ability to add and remove students and professors, as well as the ability to create and upload course content.

Rationale: Course management is a critical function of an LMS as it allows professors to create and manage their courses and the students enrolled in them. This is important to ensure that students have access to the course content and resources they need to succeed in the class.

3.Content management: The LMS should have the capability to upload, manage, and deliver course content. This includes the ability to upload documents, videos, images, and other types of content.

Rationale: Content management is a critical function of an LMS as it allows professors to deliver course content to students in a variety of formats. This is important to ensure that students have access to the materials they need to succeed in the class.

4.Grading and assessment: The LMS should have the capability to grade and assess student performance. This includes the ability to create and manage quizzes, exams, and other assessments.

Rationale: Grading and assessment is a critical function of an LMS as it allows professors to evaluate student performance and provide feedback. This is important to ensure that students are held accountable for their learning and to provide them with feedback on their progress.

5. Communication and collaboration: The LMS should have the capability to facilitate communication and collaboration between students, professors

To know more about function visit:

https://brainly.com/question/29331914

#SPJ4

if a network scan reveals that port 88 is open and active, this means that the target network is using which of the following?

Answers

If a network scan reveals that port 88 is open and functional, the target network is using Kerberos Authentication.

What is the process of Kerberos authentication?

The Kerberos authentication system can be used to verify a user's or host's identity. This article contains details about Kerberos authentication for Windows Server 2012 and Windows 8.

The Windows Server operating systems implement the Kerberos version 5 authentication protocol's public key authentication, data transfer, and delegation features.

By employing Kerberos authentication within a domain or in a forest, a user or service can access resources that administrators have allowed without having to continuously ask for credentials. When access to resources is sought across the forest, Kerberos preserves the credentials following the initial domain sign-on using Winlogon.

To know more about Window Server, visit:

https://brainly.com/question/14587803

#SPJ4

holt computer services purchased $2,000 of new equipment and paid immediately. illustrate how to record the transaction of holt services by completing the following sentence.
- The equipment would be debited on the left side of the T Account and cash account would be credited in the right side of the T Account

Answers

The equipment account would be debited on the left side of the T-account, while the Cash account would be credited on the right side.

What is computer services?

The use of a computer, computer system, or computer network includes, but is not limited to, computer time, data processing, and storage functions. Computer support and services offer IT system diagnostics, troubleshooting, maintenance, and repair. It enables users to seek and receive computer maintenance and management services locally or remotely, and is frequently performed by Managed Services Providers (MSP). A computer system's main equipment functions are input, processing, storage, and output.

Here,

On the left side of the T-account, the equipment account would be debited, while the Cash account would be credited.

To know more about computer services,

https://brainly.com/question/16348788

#SPJ4

create a c console application to calculate how many squares can fit in a circle. ask the user for the side of the square and the diameter of the circle. tell the user how many of those squares can fit in the circle. they do not have to be full squares. for instance, the answer can be 2.79. you learned how areas of circle and square are calculated in the 7th grade. if you do not remember, please search the internet for it. Requirements • Add the following comments in the beginning of your codes. o Your name, date, and purpose of the program • Add other proper comments as you code. • Tell the user what the program does. • Follow all naming rules and conventions. • Do not use magic numbers in your codes (Pl must be a constant). Use 3.14159265358979 for the value of PI. • Use proper data es for your variables. • Format the output to display two decimals. Wed Mar 10 Assignment Details CS 18 Programming in Patas MSRING 2021 - SECTION 2514 Instructions: Create a C++ console application to calculate how many circles can fit in a square. Ask the user for the side of the square and the diameter of the circle. Tell the user how many of those circles can fit in the square. They do not have to be full circles. For instance, the answer can be 2.79 You learned how areas of circle and square are calculated in the 5th grade. If you do not remember, please search the internet for it. Requirements • Add the following comments in the beginning of your codes. • Your name, date, and purpose of the program • Add other proper comments as you code. • Tell the user what the program does. • Follow all naming rules and conventions. . Do not use magic numbers in your codes (Pl must be a constant), Use 3.14159265358979 for the value of Pl. • Use proper data types for your variables. • Format the output to display two decimals. How to do it: This is how you should organize your codes. Declare all your variables first. • Ask the user for input. • Do the calculations. Display the result properly labeled. Do not display just a number. How to submit: Create a text document (Notepad or any other text file with .txt file extension). • Include your name plus the lab name in the name of the text file. Examples: Sarah Gonzales_Lab3, or Roy Brown_CirclesinSquare • Copy and paste your codes in the text file. • Upload the text file. Submit Assignment Next « Previous

Answers

Name - Jack

Date - 11-03-2021

Purpose of the program - to determine the number of circles that can fit within a square with a particular side.

How to write a program?

#include<iostream>

#include<iomanip>

using namespace std;

const float PI = 3.14159265358979;

int main() {

   // Variable declaration

   float side_square, diameter_circle, area_square, area_circle, num_circle;

   // Take input from the user

   cout << "Enter the side of the square: ";

   cin >> side_square;

   cout << "Enter the diameter of the circle: ";

   cin >> diameter_circle;

   // Calculate area of the square and the circle

   area_square = side_square * side_square;

   area_circle = PI * diameter_circle * diameter_circle / 4;

   // Calculate the number of circles that can fit inside the square

   num_circle = area_square / area_circle;

   // Dispaly the output

   cout << fixed << setprecision(2) << endl;

   cout << num_circle << " circles of diameter " << diameter_circle << " can fit inside the square of side " << side_square << endl;

}

To know more about Variable, visit:

https://brainly.com/question/15862026

#SPJ4

a student is creating a procedure to determine whether the weather for a particular month was considered very hot. the procedure takes as input a list containing daily high temperatures for a particular month. the procedure is intended to return true if the daily high temperature was at least 90 degrees for a majority of days in the month and return false otherwise. the program consists of 14 lines. begin program line 1: procedure, one word is hot, open parenthesis, one word temperature list, close parenthesis line 2: open brace line 3: total, left arrow, 0 line 4: counter, left arrow, 0 line 5: for each temperature in, one word temperature list line 6: open brace line 7: if, open parenthesis, temperature is greater than or equal to 90, close parenthesis line 8: open brace line 9: counter, left arrow, counter plus 1 line 10: close brace line 11: total, left arrow, total plus 1 line 12: close brace line 13: return, open parenthesis, missing code, close parenthesis line 14: close brace end program. which of the following can be used to replace missing code so that the procedure works as intended? counter < 0.5 * total
counter > 0.5 * total
total < 0.5 * counter
total > 0.5 * counter

Answers

counter > 0.5 * total, is the code that can be used to replace missing code so that the procedure works as intended.

What is a program code in the computer?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming (i.e., the source code). It is also the name given to the source code after a compiler has prepared it for computer execution (i.e., the object code). Different platforms, operating systems, and uses are catered for by different coding languages.

Almost 9,000 coding languages have been developed, however, only a small number are now in use. The most widely used programming languages are Python, JavaScript, and C++. The process of translating a language into machine-readable binary commands is known as coding.

To learn more about programming language, visit:

https://brainly.com/question/28848004

#SPJ4

Allison exerts a steady net force of 48 N on a 16-kg shopping cart initially at rest for 1.2 s .

Answers

The acceleration when Allison exerts a steady net force of 48 N on a 16-kg shopping cart initially at rest for 1.2 s is 3m/s².

How to calculate the acceleration?

It should be noted that acceleration sikoky has to do with the change in motion of an object.

From the information, Allison exerts a steady net force of 48 N on a 16-kg shopping cart initially at rest for 1.2 s .

It should be noted that the formula to find the acceleration will be:

= Force / Mass

= 48 / 16

= 3 m/s²

In conclusion, the acceleration when Allison exerts a steady net force is 3m/s².

Learn more about acceleration on:

brainly.com/question/460763

#SPJ1

Complete question

Allison exerts a steady net force of 48 N on a 16-kg shopping cart initially at rest for 1.2 s . Calculate the acceleration.

when someone removes you from their close friends list can you still watch their close friends stories

Answers

No you are no longer on there list meaning you can’t watch there story.
Other Questions
Antibodies directed against granulocyte antigens have been implicated for all of the following EXCEPT?A. Febrile transfusion reactionsB. Acute hemolytic transfusion reactionsC. Transfusion-related acute lung injury (TRALI)D. Neonatal alloimmune neutropenia (NAN) The vector u is shown below. Find the component form of u. Round your final answers to the nearest hundredth. =( , ) IL 105 the quartiles of a dataset are the three values that divide the data into four equal groups, each group representing 25% of the data. the first quartile (q1), also known as the lower quartile, is the value that separates the lowest 25% of the data from the rest of the data. the second quartile (q2), also known as the median, is the value that separates the lowest 50% of the data from the highest 50% of the data. the third quartile (q3), also known as the upper quartile, is the value that separates the lowest 75% of the data from the highest 25% of the data. together, the three quartiles can give a sense of the distribution of the data and the spread of the values A daughter or son may not satisfy the criteria to be considered a qualifying child but may still qualify as a dependenta. Trueb. False Find the perimeter of thepolygon if ZB = ZD.DA10.5 cm12.5 cmCB11.5 cmP = [?] cm Develop a summary of the mission and corporate culture of these two retailers (Walmart vs Target). Note a corporate culture reflects the core values, norms, and behaviors that reflect how it behaves toward employees, customers, and suppliers. PLEASE 200 WORDS. HELP HELL GELPHELPFBDNAKAKIWKW PLEASE HEP HAS TO DO WITH THE GREAT GATSBY What is the 10th term of the geometric sequence where a1 = 384 and a7 = 6?Group of answer choices630.751.5 What is the purpose of the WHERE clause? Suppose we use an extremely high-degree polynomial as our model for a relatively small amount of data.We first train the model on a dataset with a moderate number of points. We then train the model on a nearly identical dataset: most of the points are identical, but some are shifted relative to where they were in the first dataset.What do we expect to happen to the coefficients of the second model when compared to the first? Which sentences were most likely combined to create this sentence?I have to walk to the bus stop, which is half a mile from my house.(1 point)I have to walk to the bus stop. The bus stop is half a mile from my house.O The bus stop is half a mile from my house. I like to walk.O The bus stop is near my house. I have to walk almost a mile to get there.O I have to walk to the bus stop. It is not far from my house Put the numbers in order from smallest to largest.50.5715015.25.899 espresso express operates a number of espresso coffee stands in busy suburban malls. the fixed weekly expense of a coffee stand is $1,200 and the variable cost per cup of coffee served is $0.22. state or true or false.1. true 2. false What actions characterize authoritarian governments? Select three answers.Leaders often seize power by illegitimate means.All citizens prosper under the government.Citizens support the governments official ideology.A single leader or a very powerful group rules.Leaders refuse to tolerate dissenting views. what effect did western-style education have on the indian elite? I dont even know english and i dont know nothing about this.A homozygous tall plant is crossed with a short plant. Do you think the benefits of managing timber as a resource outweigh the economic costs? Why or why not? Gumption by Langston Hughes Question Your Response Describe the setting of this story. From which point-of-view is this story told? How do you know? Who are the main characters in this story? Describe the primary conflict in this story, and state what type it is (Man vs. ____, etc. ). Describe the event that is the climax of this story. In your opinion, what do you think a major theme of this story could be? Did you enjoy this short story? Why or why not? Be specific mark wants to refinance his cooperative apartment in order to reduce the interest rate on his loan. what will the bank use as collateral for the loan...?