Universities such as MIT and blank
were instrumental in the development of the Internet.

Answers

Answer 1

Universities such as MIT and blank were instrumental in the development of the Internet. (True)

What is internet?

The Internet (or internet) is a networked, worldwide system of linked computers that communicate with one another using the TCP/IP protocol suite. It is a network of networks made up of local to international private, public, academic, business, and governmental networks that are connected by a wide range of electronic, wireless, and optical networking technologies.

The World Wide Web (WWW), which is composed of interconnected hypertext documents and applications, as well as email, phone service, and file sharing, are just a few of the many information resources and services available on the Internet.

The United States Department of Defense commissioned research in the 1960s that led to the development of packet switching, which made it possible for computers to be shared during workdays.

Learn more about internet

https://brainly.com/question/2780939

#SPJ1


Related Questions

Write a program that prompts the user to enter the number of students and each student’s matric number and score, and finally displays the student with the highest score.

Answers

The program that prompts the user to enter the number of students and each student’s matric number and score, and finally displays the student with the highest score is given below

# initialize variables

students = {}

highest_score = 0

highest_scorer = ""

# get number of students

num_students = int(input("Enter the number of students: "))

# get matric numbers and scores for each student

for i in range(num_students):

 matric = input("Enter matric number for student {}: ".format(i+1))

 score = int(input("Enter score for student {}: ".format(i+1)))

 # update highest score and highest scorer

 if score > highest_score:

   highest_score = score

   highest_scorer = matric

 # add student to dictionary

 students[matric] = score

# print highest scorer

print("Student with highest score:", highest_scorer)

What is the programming about?

This program prompts the user to enter the number of students and then asks for the matric number and score for each student. It stores the scores in a dictionary, with the matric numbers as the keys and the scores as the values.

Therefore, It also keeps track of the highest score and the matric number of the student with the highest score. Finally, it prints the matric number of the student with the highest score.

You can learn more about programming at

https://brainly.com/question/23275071

#SPJ1

A program that prompts the user to enter the number of students and each student’s matric number and score, and finally displays the student with the highest score is given below:

The Python Code

students = []

# Prompt the user to enter the number of students

num_students = int(input("Enter the number of students: "))

# Prompt the user to enter the matric number and score for each student

for i in range(num_students):

   matric_number = input("Enter the matric number for student {}: ".format(i+1))

   score = float(input("Enter the score for student {}: ".format(i+1)))

   students.append((matric_number, score))

# Find the student with the highest score

highest_score = 0

highest_score_student = ""

for student in students:

   if student[1] > highest_score:

       highest_score = student[1]

       highest_score_student = student[0]

# Display the student with the highest score

print("The student with the highest score is {} with a score of {}".format(highest_score_student, highest_score))

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

reimplement the bug class from this self check exercise, but use a different internal representation. represent the distance climbed by a string of - characters, one for every 10 cm. the up, reset, and get position member functions should have the exact same behavior as before, so the bug slides back to the bottom when it reaches the top of the pole (at 100 cm). of course, their implementation will be quite different.
#include
#include
using namespace std;
class Bug
{
public:
// Provide the public interface for get_position, reset, and up
private:
string climbed;
};
// Implement the get_position, reset, and up member functions
int main()
{
Bug bugsy;
Bug itsy_bitsy;
bugsy.reset();
itsy_bitsy.reset();
bugsy.up();
bugsy.up();
cout << bugsy.get_position() << endl;
cout << "Expected: 20" << endl;
itsy_bitsy.up();
itsy_bitsy.up();
itsy_bitsy.up();
cout << itsy_bitsy.get_position() << endl;
cout << "Expected: 30" << endl;
for (int i = 1; i <= 8; i++) { bugsy.up(); }
cout << bugsy.get_position() << endl;
cout << "Expected: 0" << endl;
bugsy.up();
cout << bugsy.get_position() << endl;
cout << "Expected: 10" << endl;
return 0;
}

Answers

//Implementation of class bug:

class Bug:

 def __init__(self,start=0):

       self.position = start

       self.units = 10

   def get_position(self):

       return self.position

   def reset(self):

       self.position = 0

   def up(self):

       self.position += self.units

       if self.position >= 100:

           self.reset()

   def down(self):

       self.position -= self.units

def main():

  bugsy = Bug()

  itsy_bitsy = Bug()

  bugsy.reset()

  itsy_bitsy.reset()

  bugsy.up()

  bugsy.up()

  print("bugsy's position: ",bugsy.get_position())

  print("Expected: 20")

  itsy_bitsy.up()

  itsy_bitsy.up()

  itsy_bitsy.up()

  print("itsy_bitsy's position: ",itsy_bitsy.get_position())

  print("Expected: 30")

for i in range(1,9):

       bugsy.up()

  print("bugsy's position: ",bugsy.get_position())

  print("Expected: 0")

  bugsy.up()

  print("bugsy's position: ",bugsy.get_position())

  print("Expected: 10")

if __name__ == "__main__":

  main()

What is member function?

A member function allows you to express yourself by associating functionality with a class. Make an informed decision. In general, functions are created equal, therefore they should all make the same assumptions about a class's interface. Member functions are operators and functions that have been specified as class members. Operators and functions specified with the friend specifier are not considered member functions. These are known as classmates' pals. A static member function is one that has been declared as static by the user.

To know more about member function,

https://brainly.com/question/17017198

#SPJ4

Grover Cleveland served as president of the United States from 1885 to 1889 and from 1893 to 1897. Which expression correctly detects this range? a. (x > 1885 && x< 1889) || (x > 1893 && x< 1897) b. (x >= 1885 && x<= 1889) || (x >= 1893 && x<= 1897)c. (x >= 1885 && x <= 1889) && (x >= 1893 && x <= 1897) d. (x > 1885 && x<= 1889) || (x > 1893 && x <= 1897)

Answers

The correct answer is option a

ie,  (x >= 1885 && x <= 1889) || (x >= 1893 && x <= 1897)

Grover ClevelandThe 22nd and 23rd President of USa

From March 4, 1885, to March 4, 1889, and again from March 4, 1893, to March 4, 1897, Grover Cleveland served as president of the United States. Cleveland, the first Democrat to be elected after the Civil War, is the first US president to leave office after one term and later come back for a second time.

He won the popular vote for three presidential elections—in 1884, 1888, and 1892—and was one of two Democrats (followed by Woodrow Wilson in 1912) to be elected president during the era of Republican presidential domination dating from 1861 to 1933.

To know more about Grover Cleveland, refer to :

https://brainly.com/question/28814814

#SPJ4

Which of the following methods would you use to transform an element so it appears wider than its original size?
a. scaley
b. translatex
c. translatey
d. scalex

Answers

ScaleX is the method would you use to transform an element so it appears wider than its original size.

What does scaleX do? An element's size is changed along the x-axis with the scaleX() CSS method (horizontally). A data type called "transform-function" is the outcome.With the exception of when the scale factor is 1, in which case the function is the identity transform, it alters the abscissa of each element point by a constant factor. The element's angles are not preserved, and the scaling is not isotropic. The axial symmetry defined by scaleX(-1) has a vertical axis that runs through the origin (as specified by the transform-origin property).The percentage of the view's unscaled width that the view is scaled in x around the pivot point.

Learn more about Transform-function refer to :

https://brainly.com/question/27960585

#SPJ4

which of the following is an area of an intranet that only certain corporations or individuals can access? O PAN O HAN O Extranet O VPN

Answers

Extranet is an area of an intranet that only certain corporations or individuals can access.

An extranet functions similarly to a company intranet, but it gives authorized users access from outside the organization. Suppliers and partners may be among these external users.

Authorized users can access an extranet by using a safe, web-based login. It enables interaction between customers, suppliers, and vendors and staff members of a company. These approved users are the only ones who can access the business's files and documents through the extranet.

A cloud-based portal is often used to access an intranet. Employees are given a login, a password, and rights by administrators. The employee can speak with coworkers, bosses, and executives once they have access. Within the parameters of their authorization, the employee even has access to forms, documents, and corporate manuals.

For Extranet, a supplier might securely transmit product information with a manufacturing company and see their invoices. Additionally, the supplier will get access to the company's customer support agents and accountants.

To learn more about Extranet click here:

brainly.com/question/5686097

#SPJ4

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?-Extranet-Intranet-Wireless network-Virtual private network

Answers

Answer:

Virtual private network

Explanation:

To protect confidential company information from hackers while at a work conference, you should use a virtual private network (VPN) when accessing the Internet at a hotel. A VPN is a secure, encrypted network that uses tunneling protocols to create a secure connection between your device and the Internet.

When you connect to a VPN, all of the data transmitted between your device and the VPN server is encrypted, making it difficult for hackers to intercept and steal your information. This can help to protect your confidential company information from being accessed by unauthorized parties, such as hackers or other malicious actors.

The Monte Carlo method uses ___________ for computer simulations.

Answers

The Monte Carlo method uses maths for computer simulations.

What is Monte Carlo method?

In a process that is challenging to predict due to the interference of random variables, the likelihood of various outcomes is simulated using a Monte Carlo simulation. It is a technique for understanding the impact of risk and uncertainty on a situation.

Monte Carlo simulations are used to address a wide range of problems in many diverse fields, including business, physics, investing, and engineering.

When there is a lot of uncertainty in the forecast or estimate, some approaches replace the uncertain variable with a single average number. Instead, the results are averaged out of multiple values from the Monte Carlo Simulation.

Learn more about Monte Carlo simulations

brainly.com/question/22390536

#SPJ1

Which of the following is the least effective power loss protection for computer systems?- Secondary power source- Backup power generator- Uninterruptible power supply- Surge protector

Answers

Surge Protector is the least effective power loss protection for computer systems.

Surge Protector:

A surge protector is an electrical device used to protect equipment from surges and spikes while blocking voltages above a safe threshold (approximately 120 V). When the threshold exceeds 120V, the surge protector shorts or cuts the voltage to ground. Without a surge protector, over 120V can cause component problems such as: B. Permanent damage, shortened internal device life, wire burnout, data loss.

Surge protectors are typically installed in telecommunication structures, process control systems, switchboards, or other large industrial systems. A smaller version is usually installed at the entrance of the electrical service in office buildings and residential buildings.

Working Of Surge Protector:

Surge protectors use one of two devices to dissipate unwanted voltage.

The most common are so-called metal oxide visitors (MOVs). The MOV is placed inside the surge protector to "absorb" the surge and act as a "shunt" resistor to shunt excess current to ground.

The second device is called a gas discharge arrester (GDR) and works similarly to a MOV. If the voltage is at a certain level, the composition of the gas is a weak conductor. When the voltage exceeds this level, the electrical energy becomes strong enough to ionize the gas, making it an effective conductor. Pass current through the ground wire until the voltage returns to its normal level, then it becomes a bad conductor again. Both are effective in keeping voltage transients away from the computer.

Learn more about Surge Protector here:

brainly.com/question/5583415

#SPJ4

you are the systems administrator for a marketing firm. you have users based all over the world. many of the users connect to the internet using a cellular connection. one of your users, suzie, calls you stating that she did not get the latest windows feature update you informed everyone to look out for last week. you have suzie check for updates and the update is listed but will not download. which of the following would most likely fix this issue?

Answers

Check Suzie's device to see if she has adequate space to apply the update.

Role  System Administrator:An information technology specialist who manages and runs multi-user computer systems is known as a systems administrator. To be prepared for the position, they might need a solid understanding of computer hardware, software, and networks. Understanding the functions and responsibilities of a systems administrator can help you comprehend the demands of the position and the significance of a systems administrator to organisations. In this post, we define a systems administrator, go over their duties, and list the qualifications needed to be successful in the area. The different types of computer, server, and software maintenance that maintain the system functioning at its best are collectively referred to as system maintenance. Both preventive and corrective maintenance may be a part of it. Preventive care entails taking measures to stop system failure that would cause expensive unplanned downtime.

To learn more about System Administrator refer to:

https://brainly.com/question/14364696

#SPJ4

Select the term for an online journal that allows users to post their own comments, graphics, and video.

Answers

The term for an online journal that allows users to post their own comments, graphics, and video is a. Blog.

What is Blog?

A blog (short for "weblog") is a discussion or informational website published on the World Wide Web, consisting of individual, often informal, journal-style text entries (posts). Posts are usually displayed in reverse chronological order, with the most recent posts at the top of his web page. Until 2009, blogs were generally the work of one individual, sometimes a small group, and often focused on one subject or topic. The 2010s saw the emergence of "multi-author blogs" (MABs), which feature writing by multiple authors and are sometimes professionally edited.

Learn more about how to create blog https://brainly.com/question/16687063

#SPJ4

The questions above should be equipped with answer choices so that students can choose them, such as a. blog, b. web browser, c. software, and others

select i.vendor id, max(i.invoice total) as largest invoice from invoices i join (select vendor id, avg(invoice total) as average invoice from invoices group by vendor id having avg(invoice total) > 100 order by average invoice desc) ia on i.vendor id

Answers

A principal or officer can create a NYC.ID by going to http://www.nyc.gov/passport, hitting the "Login" button, and then selecting the "Create Account" link. Please refer to the Vendor Account Creation User Manual for comprehensive step-by-step instructions.

What is a vendor ID issued by New York State?

In place of the federal ID/TIN/EID, a vendor is identified by their NYS Vendor ID, a 10-digit identifier. Since it became operational in 2011, the NYS Vendor Management Unit has contacted suppliers and given them information on how to get a NYS Vendor ID.

How can I set up shop in New York City?

The NYC Department of Health & Mental Hygiene's Food Vendor license and a permit for the cart or vehicle are required in order to sell food on the street (DOHMH). There are no restrictions on licenses, thus anyone can receive one and work on a permit-car holder's or truck.

To know more about NYC vendor ID visit;

https://brainly.com/question/18872118

#SPJ4

write code to read a list of song durations and song names from input. for each line of input, set the duration and name of currsong. then add currsong to songslist. input first receives a song duration, then the name of that song (which you can assume is only one word long). input example: 424 Time
383 Money
-1
In C++
#include
#include
#include
using namespace std;
class Song {
public:
void SetDurationAndName(int songDuration, string songName) {
duration = songDuration;
name = songName;
}
void PrintSong() const {
cout << duration << " - " << name << endl;
}
int GetDuration() const { return duration; }
string GetName() const { return name; }
private:
int duration;
string name;
};
int main() {
vector myPlaylist;
Song currSong;
int currDuration;
string currName;
unsigned int i;
cin >> currDuration;
while (currDuration >= 0) {
// code here
cin >> currDuration;
}
for (i = 0; i < myPlaylist.size(); ++i) {
currSong = myPlaylist.at(i);
currSong.PrintSong();
}
return 0;
}

Answers

Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

What is meant by Python?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Guido van Rossum created Python, an interpreted, object-oriented, high-level programming language with dynamic semantics. It was first made available in 1991. The name "Python" is a tribute to the British comedy group Monty Python and is meant to be both simple and entertaining.

The program illustrates the use of while loops

The program in Python where comments are used to explain each line is as follows:

#This initializes an empty string

quit = ""

#The following loop is repeated until the user quits

while quit != "y" and quit!="Y":

  #This gets input for the song name

  songName = input()

 #This gets input for the song duration

  duration = int(input())

  #This asks if the user wants to quit

  quit = input("Quit? Y/N: ")

The program will run unless the user quits by pressing Y or y.

To learn more about Python refer to:

https://brainly.com/question/26497128

#SPJ4

this element of the planning and source of power in a negotiation is especially important because this is the option that likely will be chosen should an agreement not be reached

Answers

Answer:

When negotiating, it is important to consider the alternative to a negotiated agreement (ATNA), also known as the "BATNA" or "best alternative to a negotiated agreement." The ATNA is the option that will likely be chosen if an agreement is not reached in the negotiation. This element of the planning and source of power in a negotiation is important because it helps the negotiator determine their bottom line and the minimum acceptable outcome for the negotiation. Knowing the ATNA also helps the negotiator assess their leverage and the potential consequences of not reaching an agreement. By considering their ATNA, the negotiator can make more informed decisions and negotiate more effectively.

The Baltimore Sun reported on a study by Dr. Sara Harkness in which she compared the sleep patterns of 6-month-old infants in the United States and the Netherlands. She found that the 36 U.S. infants slept an average of just under 13 hours out of 24, whereas the 66 Dutch infants slept an average of almost 15 hours. Suppose it was 0.5 hours for each group.
a. Compute the standard error of the mean (SEM) for the U.S. babies.
b. Compute an approximate 95% confidence interval for the mean sleep time for 6-month-old babies in the United States.
c. Compute an approximate 95% for the difference in average sleep time for 6-month-old Dutch and U.S. infants.

Answers

(a) The standard error of the mean (SEM) for the U.S. babies is 0.083.

(b) An approximate 95% confidence interval for the mean sleep time for 6-month-old babies in the United States is 12.8367< μ1< 13.163.

(c) An approximate 95% for the difference in average sleep time for 6-month-old Dutch and U.S. infants is −2.203< μ1 <μ2 < −1.7969.

What is standard error and how it is measured?

A statistical concept known as the standard error uses standard deviation to assess how accurately a sample distribution represents a population. The standard error of the mean describes the statistical variation between a sample mean and the population's actual mean.

According to the given information:

In United States:

Sample size [tex]$\boldsymbol{n}_1=\mathbf{3 6}$[/tex]

Mean, [tex]$\bar{x}_1=13$[/tex]

Standard deviation, [tex]$s_1=\mathbf{0 . 5}$[/tex]

In Netherlands:

Sample size, [tex]$n_2=66$[/tex]

Mean, [tex]$\bar{x}_2=15$[/tex]

Standard deviation, [tex]$s_2=\mathbf{0 . 5}$[/tex]

(a) For the newborns in the United States, the standard error of the mean (SEM) is determined as follows:

[tex]$$\begin{aligned}& S E\left(\bar{x}_1\right)=\frac{s_1}{\sqrt{n_1}} \\& S E\left(\bar{x}_1\right)=\frac{0.5}{\sqrt{36}} \\& S E\left(\bar{x}_1\right)=0.083\end{aligned}$$[/tex]

(b) The following formula is used to determine the 95% confidence interval for the mean sleep time for babies aged 6 months in the United States:

[tex]$$\bar{x}_1 \pm z_{0.05 / 2} \times \sqrt{\frac{s_1^2}{n_1}}$$[/tex]

[tex]$$\begin{aligned}& 13 \pm 1.96 \times \sqrt{\frac{0.5^2}{36}} \\& 12.8367 < \mu_1 < 13.163\end{aligned}$$[/tex]

(c) The 95% difference in the amount of time newborns in the Netherlands and the United States spend sleeping on average is computed as follows:

[tex]$$\begin{aligned}& \bar{x}_1-\bar{x}_2 \pm z_{0.05 / 2} \times \sqrt{\frac{s_1^2}{n_1}+\frac{s_2^2}{n_2}} \\& (13-15) \pm 1.96 \times \sqrt{\frac{0.5^2}{36}+\frac{0.5^2}{66}} \\& -2.203 < \mu_1 < \mu_2 < -1.7969\end{aligned}$$[/tex]

To know more about standard error:

https://brainly.com/question/29363195

#SPJ4

From the following list, select the two resources that organizations can track using accounting management software.
* tangible assets
* intangible assets
* customer relationships
* supply chain resources

Answers

The two resources that organizations can track using accounting management software are customer relationships  and supply chain resources.

What is accounting management software?

Accounts payable, accounts receivable, fixed asset management, expense management, subledger accounting, reporting, and analytics are just a few of the daily financial transactions that are managed and recorded by accounting software for an organization.

The assets, liabilities, revenues, and expenses of a company are all tracked by a complete accounting system. CFOs, treasurers, and controllers can then immediately access accurate financial data that is updated in real time as a result of these transactions in the general ledger. Additionally, it gives P&L owners access to information about their operational performance.

Financial statements, such as balance sheets, income statements, cash flow statements, and statements of stockholders' equity, can be produced on a quarterly and annual basis thanks to the systematic recording of these financial transactions. Enterprise resource planning (ERP) systems include accounting software as a crucial element.

Learn more about accounting software

https://brainly.com/question/28798067

#SPJ1

delay involves slowing down an attack so that even successful breaches give defenders time to respond. True or False ?

Answers

True- delay involves slowing down an attack so that even successful breaches give defenders time to respond.

What is data breach?

Sensitive, protected, or confidential data that is copied, communicated, viewed, stolen from, or utilized by someone not authorized to do so constitutes a data breach. Other terms include data spill, information leak, information leakage, and unintended information disclosure. Various types of incidents occur, including coordinated hacking attempts by people acting out of malice or for personal gain, organized crime, political activists, or national governments, inadequately configured system security, or reckless disposal of outdated technology or data storage media. Information that is leaked might cover everything from topics that jeopardize national security to details on actions that a government or official finds embarrassing and wants to hide. It is more common to refer to a data breach as a "leak" when it is intentional and done by someone with access to the data, usually for political reasons.

To know more about data breach visit:

https://brainly.com/question/29315979

#SPJ1

differentiate between cu and mu​

Answers

Control Unit is 5he part of computer where data is store to CPU.

MU directs the entire computer system to carry out stored programs..

a student is developing an algorithm to determine the name of the photographer who took the oldest photograph in the collection. photographs whose photographer or year are unknown are to be ignored. once the algorithm is complete, the desired entry will appear in the first row of the spreadsheet. if there are multiple entries that meet the desired criteria, then any of them can appear in the first row. the student has the following actions available.

Answers

A Once the simulation has been run, it is impossible to change the model that the simulation software utilized. In comparison to watching the audience leave the stadium at different events, running a simulation takes more time to generate data from trials.

What does simulation software entail?

The foundation of simulation software is the process of simulating a genuine phenomena using a set of mathematical equations. In essence, it's a program that enables the user to simulate a process while still observing it in action.

What class of computer program is simulation software?

A tool for supporting and analyzing decisions is simulation. Using simulation software, you may assess, contrast, and optimize various designs, programs, and policies. As a result, it offers a tool for justifying decisions to multiple stakeholders.

To know more about Simulation software visit;

https://brainly.com/question/16192324

#SPJ4

The Monte Carlo method was first developed during ________ to test ____________.




PYTHON

Answers

The Monte Carlo method was first developed during World war II to test probability.

What is Monte Carlo method?

A Monte Carlo simulation is used to simulate the likelihood of various outcomes in a process that is difficult to predict because of the interference of random variables. It is a method for comprehending how risk and uncertainty affect a situation.

Many different fields, such as investing, business, physics, and engineering, use Monte Carlo simulations to solve a variety of issues.

Some approaches substitute a single average number for the uncertain variable when there is a significant amount of uncertainty in the forecast or estimate. Instead, the Monte Carlo Simulation makes use of multiple values before averaging the outcomes.

Learn more about Monte Carlo simulations

https://brainly.com/question/22390536

#SPJ1

in addition, the systems engineer would like you to begin checking the update logs on the servers on a regular basis to determine if and how the updates were applied.

Answers

To make sure that the changes have been applied properly, I'll start routinely reviewing the update logs on the servers. Any inconsistencies I discover will be noted and reported to the systems engineer.

Describe Server

A server in computing is a piece of hardware or software (a computer programme) that offers functionality to other programmes or objects, known to as "clients." The client-server model is the name of this architecture. Several of the functions that servers can offer are known to as "services," such as executing computations for an user or sharing resources or data among many clients. Both a single client and a dedicated server can support many clients.

To know more about server
https://brainly.com/question/28871585
#SPJ4

Processing a large number of items in a(n) ________ is usually easier than processing a large number of items stored in separate variables.
A. Constant.
B. Variable
C. Array.
D. Loop.
E. None of the above.

Answers

An array is usually used to process a large number of items and stored in separate variables

What is an array?

An array is a collection of memory locations, or "boxes," each of which contains a single piece of data and which has the same identifier. An array must contain only elements of the same data type.

An array is an organised grouping of identically typed data components.

1) Indexed describes how the array's components are numbered (starting at 0).

2) Since arrays are kept in memory cells that follow one another, the restriction of the same type is crucial. All of the cells must be the same type (and therefore, the same size).

Hence to conclude the array can be used to process a large number of items

To know more on arrays follow this link:

https://brainly.com/question/28061186

#SPJ4

What is a roof plan and what is it important?

Answers

Answer:

A roof plan is a diagram or a drawing that shows the proposed development of a roof

Explanation:

it's important for the structure

you want to make sure that the correct ports on a firewall are open or closed. which document should you check? answer wireless site survey wiring schematic baseline configurations intermediate distribution frame

Answers

we want to make sure that the correct ports on a firewall are open or closed.The  document should you check is  configurations  distribution.

What is firewall?A firewall is a network security device used in computing that monitors and regulates incoming and outgoing network traffic in accordance with pre-established security rules. Typically, a firewall creates a wall between a trustworthy network and an unreliable network, like the Internet.The wall used to contain a fire inside a row of nearby buildings was the original meaning of the term firewall.Later uses refer to comparable constructions, as the metal panel separating the passenger compartment from the engine compartment of a car or an aeroplane. When network technology first appeared in the late 1980s, the Internet was still relatively young in terms of its widespread use and connectivity. In the late 1980s, routers were utilised as network security alternatives to firewalls.

To learn more about firewall refer to:

https://brainly.com/question/13693641

#SPJ4

consider the same main.c from the previous question. fill in the blank to alter foo.c such that the value printed by main is guaranteed to be 256. float n; void foo() { n

Answers

Answer:

To guarantee that the value printed by main.c is 256, the variable n in foo.c must be initialized to 256 before it is used in the foo() function. This can be done by adding an initializer to the n variable, as shown below:

// foo.c

float n = 256;

void foo() {

   n = n * 2;

   printf("n = %f\n", n);

}

With this change, the n variable will be initialized to 256 when it is declared, and the value of n will be guaranteed to be 256 when it is printed by the foo() function. This will ensure that the value printed by main.c is always 256, regardless of the order in which the main() and foo() functions are executed.

*Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home?

Answers

Both A and B is true propositions. IoT has more transparency, control, and performance.

A network of actual objects that communicate data via sensors, software, and connection is known as the Internet of Things (IoT). IoT devices are pieces of hardware, such as sensors, actuators, gadgets, appliances, or machines, that may transfer data over the internet or other networks and are designed for particular uses. The network of physical objects, or "things," that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet is referred to as the Internet of Things (IoT).

The complete question is - Which of the following statements are generally true of IoT devices? A. They are numerous. B. They are reliable. C. They consume a lot of power. D. They do not have much memory. E. They collectively produce a lot of data.

Learn more about system here-

https://brainly.com/question/14253652

#SPJ4

this is a hard one... for java
Conceptually, this program could be used to control the key statistics for a game. We want to be able to setup a new game and then when we quit the game, we would want to save those statistics that we can then load back into the game so that we can restart it at the same level at some later date/time. NOTE: This is not the game itself. We are NOT going to try to play or write a game.
So ... how this works is that we are planning to have "Players" and "Monsters" in our game. As this is a multi-player game, we can have more than 1 player. Both a Player and a Monster are subclasses of an Abstract class called Actor as

Answers

Java is easy to learn. Java was designed to be easy to use and is therefore easy to write, compile, debug, and learn than other programming languages.

What is Java used for?Java is the official language for Android mobile app development. In fact, the Android operating system itself is written in Java. Even though Katlin has recently become an alternative to using Java for Android development, Kotlin still uses the Java Virtual Machine and can interact with Java code.Show version is the correct answer because the output of the show version command includes the line 'System restarted by' followed by a reason. This line will provide a good indication of why the router restarted.Java is a programming language and computing platform first released by Sun Microsystems in 1995. It has evolved from humble beginnings to power a large share of today's digital world, by providing the reliable platform upon which many services and applications are built.Java Standard Edition (Java SE)Java Virtual Machine (JVM)Java Class Library (JCL)Java Runtime Environment (JRE)Java Development Kit (JDK)

To learn more about java programing language refer to:

https://brainly.com/question/28180161

#SPJ4

The amount of time an activity can be delayed without delaying the early start date of any immediately following activities is known as a _____.a.forward passb.backward passc.fast trackingd.free slack

Answers

Answer:

free slack

Explanation:

Free slack is the amount of time that an activity can be delayed without affecting the early start date of any activities that are dependent on it. It is a measure of the flexibility and potential for overlapping of activities in a project schedule.

The Office of Personnel Management (OPM) requires that federal agencies provide the training suggested by the National Institute of Standards and Technology (NIST) guidelines.

a. True
b. False

Answers

True that OPM requires that federal agencies provide the training suggested by the National Institute of Standards and Technology (NIST) guidelines

What are federal agencies?

Federal agencies are specialized government institutions created for a particular function, such as resource management, financial regulation of specific sectors, or matters of national security. Although a presidential order may sometimes be used to establish these organizations at first, legislative action is usually required to establish them. Typically, presidential appointments are used to choose the directors of these organizations.

The Telework Enhancement Act of 2010 (the Act) is a key factor in the Federal Government's ability to achieve greater flexibility in managing its workforce through the use of telework.  Well-implemented and established telework programs provide agencies with a valuable tool to meet mission objectives while helping employees enhance work-life effectiveness. A few guidelines are listed below.

Outlines obligations and expectations for telework policy advice and reporting Every Executive agency must collaborate with OPM to meet the criteria for mandated data collection and reporting. allows for agency consultation with numerous agencies, including the Office of Personnel Management (OPM), General Services Administration (GSA), Office of Management and Budget (OMB), Department of Homeland Security (DHS), including the Federal Emergency Management Agency (FEMA), National Archives and Records Administration (NARA), and National Institute of Standards and Technology (NIST), for guidance and support (NIST) OPM is required to keep up a central telework webpage. gives Federal agencies a framework for maximizing the use of telework and utilizing technology helps agencies work toward essential objectives including hiring and keeping a productive Federal workforce.

Therefore, The National Institute of Standards and Technology (NIST) recommendations for training are mandated by the Office of Personnel Management (OPM) for federal agencies.

Learn more about federal agencies here:

#SPJ12

What is one of the main purposes of a topographic map?; What is one of the main purposes of a topographic map ?; How do topographic maps indicate changes in elevation?; What is a topographic map ?

Answers

They employ contour lines to show the contour and elevation of surface features. Contour lines are fictitious (they only exist on paper) lines that link places on the surface of the earth with the same elevation.

What is topographic map?

A topographic map, also known as a topographic sheet, is a form of map used in modern mapping that is distinguished by large-scale detail and quantitative depiction of relief characteristics, historically utilizing a number of techniques but typically contour lines (linking points of equal height).

According to conventional criteria, a topographic map must display both natural and man-made elements.

A topographic survey is normally composed of two or more map sheets that are combined to create the entire map and is released as a map series based on a systematic observation.

A topographic map series employs a standard geodetic framework that specifies the map projection, coordinate system, ellipsoid, and geodetic datum as well as a common specification that covers the range of cartographic symbols used.

Learn more about topographic map click here:

https://brainly.com/question/181146

#SPJ4

Define a function calc_pyramid_volume() with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base calc_pyramid_volume() calls the given calc_base_area() function in the calculation. Relevant geometry equations Volume = base area x height x 1/3 (Watch out for integer division) Sample output with inputs: 4.52.13.0 Volume for 4.5, 2.1, 3.0 is: 9.45 1 def calc_base_area(base_length, base_width): 2 return base length base width 3 4 5 6 length float (input()) 7 width float(input)) 8 height float (input()) 9 print('Volume for, length, width, height, "is:", calc_pyramid_volume(length, width, height)))

Answers

Python is a well-liked computer programming language used to build websites and software, automate procedures, and conduct data analysis.

What is meant by Python?

Python is an interpreted, object-oriented, high-level programming language with dynamic semantics that was developed by Guido van Rossum. In 1991, it was initially made accessible. The name "Python" is designed to be both straightforward and entertaining, paying homage to the British comic troupe Monty Python.

Python is a well-liked computer programming language used to build websites and software, automate procedures, and conduct data analysis. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Given below is the necessary Python 3 software for calculating a pyramid's volume:

def calc_pyramid_volume(base_length,base_width,pyramid_height):

#initialize a function named calc_pyramid_volume and takes in 3 parameters

volume = (1/3) * base_length*base_width* pyramid_height

#the volume of pyramid formulae is used on the Parameters and the value is assigned to the variable named volume

return round(volume,2)

#the function returns the volume value rounded to 2 decimal places.

print(calc_pyramid_volume(4.5,2.1,3.0))

#the sample run

To learn more about Python refer to:

brainly.com/question/26497128

#SPJ4

Other Questions
how many service members received the medal of honor during the battle of mogadishu which would be included in the plan of care for an obstetrical client who has been taking carbamazepine as a recent hire to curtis, you are excited about the opportunity to find new customers. what should be your first step? If a cell has a nucleus and a cell membrane, but no cell wall, it is most likelyO a plant cellO an animal cellO a bacteria cell not a cell at all What was the Stamp Act Congress and what was its purpose? What is an element?Please help my little sis needs help and I forgot what it is for the year ended december 31, 20x4, mont co.'s books showed income of $600,000 before provision for income tax expense. to compute taxable income for federal income tax purposes, the following items should be noted: income from exempt municipal bonds $60,000 depreciation deducted for tax purposes in excess of depreciation recorded on the books $120,000 proceeds received from life insurance on death of officer $100,000 estimated tax payments 0 enacted corporate tax rate 30% ignoring the alternative minimum tax provisions, what amount should mont report at december 31, 20x4 as its current federal income tax liability? $96,000 $114,000 $150,000 $162,000 what are the Scribes of Egypt? put a picture? Which statement best summarizes the main idea of this quotation?A. The Constitution requires all citizens to vote by law.B. Citizens uphold our system of government by voting.C. Men and women should not bother to register to vote.D. All votes should be carried out by a secret ballot. two masses, a and b, are attached to different springs. mass a vibrates with amplitude of 8.0 cm at a frequency of 10 hz and mass b vibrates with amplitude of 5.0 cm at a frequency of 16 hz. how does the maximum speed of a compare to the maximum speed of b list the violations for the happy foods establishments. provide license no, inspection date, inspection results, fine, inspection point id, and description of the inspection point violated. hershel is an analyst with amalgamated company. his manager has asked him to estimate the number of cordless vacuum cleaners amalgamated company can expect to sell during the last quarter of the current year if it doubles its current marketing efforts. hershel has asked the company executives what they think the likely sales will be, he has surveyed buyers and sales personnel, developed a time-series analysis, and done correlation analysis. which of the following most accurately describes what hershel has been asked to do? the domain controllers are the computers that store and run which of the following? When you make an inference, you combine what you read with __ the details in the text. what you want to learn. what you already know. the authors point of view. The limited autonomy slave owners granted to slaves during their non working hours in the antebellum South contributed to... kashi, which markets healthier cereals and breakfast bars, is setting up a system to collect and track marketing trends. external sources of marketing data include all of the following except . What is the first step in applying activity-based costing? Why is overhead allocation under ABC usually more accurate than either the plantwide overhead allocation method or the departmental overhead allocation method? Why are direct labor hours and machine hours commonly used as the bases for overhead allocation? looking at the unemployment rates of scientists and engineers in 2017, the rates for both women (2.9%) and men (2.6%) were lower than that of the u.s. labor force (4.4%), indicating a strong demand for those with s How will you describe the eruption of volcano?; What is the best description of a volcano?; What are the 3 main causes of volcanic eruptions?; How would you describe the flow of lava? Please review the case titled Hecht v. Andover Assoc. Mgmt. Co. in the textbook and submit a written response summarizing what happened in the case (i.e., a summary of the facts). Be sure to include the following in your summary:Who are the parties in the case?What is the procedural history of the case? (i.e., how did the case get to the New York Supreme Court?)What facts may prove, upon remand to the trial court, that Andover Management was grossly negligent?