Answer:
Following are the responses to the given question:
Explanation:
The subnet mask /25 could be the host 128 hosts.
The subnet mask /26 could be the host 64 hosts.
The subnet mask /27 could be the host 32hosts.
The subnet mask /28 could be the host 16 hosts.
The subnet mask /29 could be the host 8 hosts.
The subnet mask /30 could be the host 4 hosts.
It is based on the requirement in which I have been using /25,/27,/28,/29 subnet masks on the basis of the usable slots.
How to make a project using PID and thermacouple
Explanation:
Required tools and components:
Soldering iron
Solder
Flux pen
Fine gauge solder (23 gauge or finer)
Wire cutter
MAX31855 thermocouple interface chip (available directly from Maxim Integrated)
Thermocouple with junction suitable for your application (e.g., probe, washer, etc.)
J-type (-40°C to +750°C)
K-type (-200°C to +1350°C)
T-type (-200°C to +350°C) Solid state relay (will depend on your application)
USB FTDI 5V cable (Note: A single cable can be used for many different microcontroller projects)
Computer with Arduino IDE v1.0
Wall-wart 9V/1.5A, 2.1mm center positive
def shared_motif(dna_list):
This function takes in a list of DNA strings and returns the longest common substring. A substring is a contiguous sequence of characters within a string. A common substring is a substring of every element in the given list of DNA strings. Note that the number of DNA strings in the input list is not always the same! There may be multiple solutions, but you only need to return the first one.
Example:
Sample input DNA list:
("GATTACA", "TAGACCA", "ATACA"]
The returned longest common substring:
"TA"
Answer:
Explanation:
The following code is written in Python, the function creates various nested loops to loop through each individual string comparing letter by letter in order to find the longest common substring. Finally, returning the substring itself.
def shared_motif(dna_list):
substr = ''
if len(dna_list) > 1 and len(dna_list[0]) > 0:
for x in range(len(dna_list[0])):
for i in range(len(dna_list[0]) - x + 1):
if i > len(substr) and all(dna_list[0][x:x + i] in y for y in dna_list):
substr = dna_list[0][x:x + i]
return substr
arr = ["GATTACA", "TAGACCA", "ATACA"]
stems = shared_motif(arr)
print(stems)
an image can have only one background layer true or false
Answer:
True
Explanation:
The background will always just be the background. You cannot blend two images together to make two background because it would be considered one background nonetheless.
Which of these is a type of social engineering attack?
Select one:
O Packet Sniffer
O Port Scan
O Phishing
O Ping Sweep
Answer:
phishing
Explanation:
all others are different ways of Hacking.
are you interested in cyber security?
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection contains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered?
a. Password length, password encryption, password complexity
b. Password complexity least privilege, password reuse
c. Password reuse, password complexity, password expiration
d. Group policy, password history, password encryption
Answer:
a. Password length, password encryption, password complexity
Explanation:
Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.
Apart from the OOPs concepts learned in this lesson, identify additional concepts and write an essay on their functions. Explain how they are used in a program.
PLSSSS HELLP MEEE ASAP!!!!
Explanation:
Object Oriented Programming (OOPS or OOPS for Object Oriented Programming System) is the most widely used programming paradigm today. While most of the popular programming languages are multi-paradigm, the support to object-oriented programming is fundamental for large projects. Of course OOP has its share of critics. Nowadays functional programming seems the new trendy approach. Still, criticism is due mostly to misuse of OOP.
Which of the following statements is TRUE of a peer-to-peer network?
A. Different parties have very different opinions on what can and can’t be shared through a peer-to-peer network.
B. In a peer-to-peer network, all files being shared are kept on one server. Anyone who wants to access one of those files can get it directly from the server.
C. A peer-to-peer network can create heavy traffic and makes download times increase significantly.
D. Creating a directory of which computers have certain files is an acceptable practice.
Answer:
A. Different parties have very different opinions on what can and can’t be shared through a peer-to-peer network.
Explanation:
CORRECT
Choice 'A' is very true. There have been many arguments and court cases over what content can and cannot be shared through a peer-to-peer network. Users of these networks often argue that free speech allows us to share whatever we want online. Content creators on the other hand frequently sue for copyright infringement.
INCORRECT
Choice 'B' is describing a centralized system, not a peer-to-peer network. In a peer-to-peer network, there is no central location of files. Files are transferred directly from one computer to another without a middleman.
Choice 'C' is also not true of peer-to-peer networks. These networks are actually much more efficient than centralized systems because there is no large server holding all the files. It takes less time to download files from a peer-to-peer network because there is no centralized source of information and files.
Choice 'D' is also false; this was decided in the court case about Napster, one of the first large peer-to-peer networks. Having a centralized directory of who has which files is not considered free speech.
The peer-to-peer network is said to have varying views that form the basis of what can and cannot be shared. Thus, option A is correct.
What is a peer-to-peer network?A peer-to-peer network is given as the connection of the computers that are linked with the following same responsibilities and permissions.
The network is said to have varying views. Many debates and court cases have erupted over what content can and cannot be shared over a peer-to-peer network.
Users of these sites frequently argue that freedom of speech allows us to share whatever we want on the internet.On the other hand, content creators frequently file copyright infringement lawsuits.Thus, option A is correct.
Learn more about peer-to-peer networks, here:
https://brainly.com/question/1172049
#SPJ2
There used to be a popular type of pulp book for younger readers. They were called "Choose Your Own Adventure" novels. The idea was pretty simple. You'd start reading and then a few pages into the book, there would be a plot development that required a choice. The book might describe that you've entered a spooky house and the door has locked behind you. It would then ask you if you want to try to exit by going through the kitchen or exploring upstairs. If you chose to go into the kitchen, you'd turn to page 200, if you chose to go upstairs, you'd turn to page 43. This would repeat maybe five or six times though the book. You could re-read it a few times and try different outcomes.
In this lab you are going to create a choose your own adventure application using navigation controllers. The introduction screen to your application will contain a few lines of text to set up a story and then leave the user with a choice. Below the text, you will present two buttons that correspond to the different choices.
For example, you might see the following text on the main screen:
You are walking down the street when a tiger runs up and takes your lunch and then runs away...
Do you want to chase the tiger or run away?
Chase
Run Away
The user must then tap one of the buttons. This will move the user to a new screen with a few more lines of the story and another choice and two more buttons. You will create three (3) turning points in your story. This means that your story will have eight (8) different possible outcomes and a total of 15 screens.
Requirements
The story must ask three (3) questions, no matter how the user answers the previous question. All the questions must be different and result in a different story text.
The story must have eight (8) possible different final outcomes.
The story must include a minimum of 15 screens in total.
Create content that is appropriate and not-offensive. We will share these and play them together.
For extra credit you can add an extra screen and use inputs to capture data from the user such as a name, favorite food, or lucky number and use this data in the story.
Answer:
click on the link
Explanation:
link is somewhere hidden
Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the method in a program that takes two integer inputs, and outputs the largest magnitude value.
Ex: If the inputs are: 5 7 the method returns: 7
Ex: If the inputs are: -8 -2 the method returns: -8
Answer:
The program in Java is as follows:
import java.util.*;
import java.lang.Math;
public class Main{
public static int maxMagnitude(int num1, int num2){
int mag = num2;
if(Math.abs(num1) > Math.abs(num2)){
mag = num1;
}
return mag;
}
public static void main(String[] args) {
int num1, num2;
Scanner input = new Scanner(System.in);
System.out.print("Enter two integers: ");
num1 = input.nextInt();
num2 = input.nextInt();
System.out.println(maxMagnitude(num1,num2));
}
}
Explanation:
The method begins here
public static int maxMagnitude(int num1, int num2){
This initializes the highest magnitude to num2
int mag = num2;
If the magnitude of num1 is greater than that of num2
if(Math.abs(num1) > Math.abs(num2)){
mag is set to num1
mag = num1;
}
This returns mag
return mag;
}
The main method begins here
public static void main(String[] args) {
This declares num1 and num2 as integer
int num1, num2;
Scanner input = new Scanner(System.in);
This prompts the user for two integers
System.out.print("Enter two integers: ");
This gets input for the first integer
num1 = input.nextInt();
This gets input for the second integer
num2 = input.nextInt();
This calls the maxMagnitude method and prints the number with the highest magnitude
System.out.println(maxMagnitude(num1,num2));
}
Where does your father go every morning?
Answer:
work
Explanation:
it's depends if you have a father because if you don't, that means he is with is other son/daughter.
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. g
Answer:
The program in Python is as follows:
string = input("String: ")
chr = input("Character: ")[0]
total_count = string.count(chr)
print(total_count,end=" ")
if total_count > 1:
print(chr+"'s")
else:
print(chr)
Explanation:
This gets the string from the user
string = input("String: ")
This gets the character from the user
chr = input("Character: ")[0]
This counts the occurrence of the character in the string
total_count = string.count(chr)
This prints the total count of characters
print(total_count,end=" ")
If the count is greater than 1
if total_count > 1:
Then it prints a plural form
print(chr+"'s")
If otherwise
else:
Then it prints a singular form
print(chr)
short note about micro miniaturzation
Answer:
the manufacture of extremely small versions of electronic devices.
Explanation:
asks
mxskssssksskwlwslskamzmzmsmsmz
which two of the following are goals of the cognitive therapist
requires the receiver to guess the message by
using redundant bits.
Select one
O Forward error correction
OPanity check
ORetransmission
OBlock rolina
Answer:
Forward error correction requires the receiver to guess the message by using redundant bits.
hope it is helpful to you
Answer:
forward error correction
is the first one
La herramienta …………………………... en el programa CorelDraw X8, está conformado por texto artístico.
Answer
what are you talking about, thats crazy!
Explanation:
no seriasly, what are you taking about
answer any one: write a computer program:
Answer:
hope this helps you look it once.
Factory Design Pattern Assignment This assignment will give you practice in using the Factory/Abstract Factory Design Pattern. You are going to create a Terraforming program. What does terraform mean
Answer:
Terraform is an open-source infrastructure as code software tool that enables you to safely and predictably create, change, and improve infrastructure.
Mark is six years younger than his sister Teri. Their combined ages equals 86. How old are Mark and Teri?
Mark's age = x
Teri's age = y
Answer:
x = 40
y = 46
Explanation is in the image above.
You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100 devices. Which cable should you use?
A.
RG-6
B.
RG-8
C.
RG-58U
D.
RG-59
Answer: C
Explanation:
Which line of code will use the overloaded multiplication operation?
class num:
def __init__(self,a):
self.number = a
def __add__(self,b):
return self.number + 2 * b.number
def __mul__(self, b):
return self.number + b.number
def __pow__(self, b):
return self.number + b.number
# main program
numA = num(5)
numB = num(10)
Which line of code will use the overloaded multiplication operation?
class num:
def __init__(self,a):
self.number = a
def __add__(self,b):
return self.number + 2 * b.number
def __mul__(self, b):
return self.number + b.number
def __pow__(self, b):
return self.number + b.number
# main program
numA = num(5)
numB = num(10)
a) product = numA * numB
b) product = numA.multiply(numB)
c) product = numA.mul(numB
For multiplication one: product = numA * numB
For the addition: result = numA + numB
got 100 on this ez
(searched all over internet and no one had the answer lul hope this helps!)
Answer: First option: product = numA * numB
second option-numA + numB
Explanation:
A project team using a linear, sequential model builds a software application over a long duration. All activities in the project are carried out one after the other. Once the product is tested, the team installs the application. Which phase of this model involves installation?
A.
system design
B.
coding
C.
deployment
D.
requirements gathering
E.
testing
Answer:
C. Deployment
Explanation:
Deployment is the phase at which the product is installed after testing.
Given that
f(x) = 5x +3.
Find f (4)
Answer:
Given that
f(x) = 5x +3.
f (4)=5×4+3=23
Explanation:
hope it's helps you have a good day☺
LAB: Output values below an amount - methods
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, and output all integers less than or equal to that value. Assume that the list will always contain less than 20 integers. Ex: If the input is: 5 50 60 140 200 75 100 the output is: 50 60 75
For coding simplicity, follow every output value by a space, including the last one. Such functionality is common on sites like Amazon, where a user can filter results. Write your code to define and use two methods: public static void getUserValues(int[] myArr, int arrSize, Scanner scnr) public static void outputIntsLessThanorEqualToThreshold (int[] userValues, int userValsSize, int upperThreshold) Utilizing methods will help to make main() very clean and intuitive.
Answer:
The program in Java is as follows:
import java.util.*;
public class Main{
public static void getUs erValues(int[ ] myArr, int arr Size, Scanner scnr){
for(int i = 0; i<arrSize;i++){
myArr[i] = scnr.nextInt(); }
outputIntsLessThanorEqualToThreshold (myArr, arrSize, myArr[arrSize-1]);
}
public static void outputIntsLessThanorEqualToThreshold (int[] userValues, int userValsSize, int upperThreshold){
for(int i = 0; i<=userValsSize;i++){
if(userValues[i]<upperThreshold){
System.out.print(userValues[i]+" "); } }
}
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int n;
n = scnr.nextInt();
int [] myArr = new int[n];
getUserValues(myArr,n,scnr); }
}
Explanation:
See attachment for complete program where comments are used to explain each line
You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. Canonical, the company that owns and maintains Ubuntu just releases an update to patch a security vulnerability in the system.
Required:
What BEST action you should take?
Answer:
Explanation:
I believe that the best course of action would be to divide the companies computers and run the critical applications on half of the systems while the other half update to the latest Ubuntu release. Once that half is done updating, you run the applications on the updated systems and update the other half of the systems. This will allow the company to continue its operations without any downtime, while also updating to the latest Ubuntu release on all systems and making sure that all systems do not have any security vulnerabilities due to outdated software.
True or false question :)
Handware can be tracked back to ancient times. Over six centuries ago.
°true
°false
Answer:
false and it's a recent technology
recent trends on operating system
Answer:
Windows 10 if this is what I think u mean
Write a MIPS assembly language program that prompts for a user to enter a series of floating point numbers and calls read_float to read in numbers and store them in an array only if the same number is not stored in the array yet. Then the program should display the array content on the console window.
Consult the green sheet and the chapter 3 for assembly instructions for floating point numbers. Here is one instruction that you might use:
c.eq.s $f2, $f4
bc1t Label1
Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be:
c.eq.s $f2, $f4
bc1f Label1
To load a single precision floating point number (instead of lw for an integer), you might use:
l.s $f12, 0($t0)
To store a single precision floating point number (instead of sw for an integer), you might use:
s.s $f12, 0($t0)
To assign a constant floating point number (instead of li for an integer), you might use:
li.s $f12, 123.45
To copy a floating point number from one register to another (instead of move for an integer), you might use:
mov.s $f10, $f12
The following shows the syscall numbers needed for this assignment.
System Call System Call System Call
Number Operation Description
2 print_float $v0 = 2, $f12 = float number to be printed
4 print_string $v0 = 4, $a0 = address of beginning of ASCIIZ string
6 read_float $v0 = 6; user types a float number at keyboard; value is store in $f0
8 read_string $v0 = 8; user types string at keybd; addr of beginning of string is store in $a0; len in $a1
------------------------------------------
C program will ask a user to enter numbers and store them in an array
only if the same number is not in the array yet.
Then it prints out the result array content.
You need to write MIPS assembly code based on the following C code.
-------------------------------------------
void main( )
{
int arraysize = 10;
float array[arraysize];
int i, j, alreadyStored;
float num;
i = 0;
while (i < arraysize)
{
printf("Enter a number:\n");
//read an integer from a user input and store it in num1
scanf("%f", &num);
//check if the number is already stored in the array
alreadyStored = 0;
for (j = 0; j < i; j++)
{
if (array[j] == num)
{
alreadyStored = 1;
}
}
//Only if the same number is not in the array yet
if (alreadyStored == 0)
{
array[i] = num;
i++;
}
}
printf("The array contains the following:\n");
i = 0;
while (i < arraysize)
{
printf("%f\n", array[i]);
i++;
}
return;
}
Here are sample outputs (user input is in bold): -- note that you might get some rounding errors
Enter a number:
3
Enter a number:
54.4
Enter a number:
2
Enter a number:
5
Enter a number:
2
Enter a number:
-4
Enter a number:
5
Enter a number:
76
Enter a number:
-23
Enter a number:
43.53
Enter a number:
-43.53
Enter a number:
43.53
Enter a number:
65.43
The array contains the following:
3.00000000
54.40000153
2.00000000
5.00000000
-4.00000000
76.00000000
-23.00000000
43.52999878
-43.52999878
65.43000031
Explanation:
Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be
Which of the following is not the disadvantage of closed
network model?
Select one:
O Flexibility
O Public network connection
O Support
O External access
Answer:
public network connection
Answer:
public network connection
What symbol next to the records indicates that a table includes a subdatasheet? an asterisk a plus sign a question mark an exclamation point
Answer: a plus sign
Explanation: I just did the assignment and got it right
Answer:
B)A plus sign
Explanation:
B)A plus sign just finished assignment
Use the drop-down menus to explain how to set up a lookup field to use a combo box control with a list of options. 1. Open a table in Design view, and right-click a field. 2. Select Change To in the drop-down menu, then select . 3. On the Data tab of the , make a number of choices. 4. For the Row Source Type, choose . 5. For Limit to List, select . 6. For Row Source, click the ellipsis and enter the values in the dialog box that opens. 7. Close the Property Sheet, and save the form.
Answer:
Combo Box, Property Sheet, Value List, Yes
Explanation:
Use the drop-down menus to explain how to set up a lookup field to use a combo box control with a list of options are the combo box, vause lkist.
What is the distinction between a mixture container and a drop-down listing?A drop-down listing is a listing wherein the chosen object is constantly seen, and the others are seen on call for via way of means of clicking a drop-down button. A combo container is a mixture of a listing container or a drop-down listing and an editable textual content container, as a consequence permitting customers to go into a fee that isn't always withinside the listing.
A drop-down listing in Access 2013 gives a listing of values to useful resources in statistics access in tables or forms. Although you could permit customers to manually input values that do not exist withinside the drop-down listing, you will want to disable this selection to limition alternatives to tiered values.
Read more about the combo box control:
https://brainly.com/question/17238933
#SPJ2