What term or phrase can be used to describe the process of networks linking to one another using a variety of tools and strategies? broadband network connectivity tunneling protocol

Answers

Answer 1

Answer:

The appropriate term would be Network Connectivity.

Explanation:


Related Questions

you need to design an ipv6 addressing scheme for your network. the following are key requirements for your design: infrastructure hosts, such as routers and servers, are assigned static interface ids. however, workstations, notebooks, tablets, and phones are assigned interface ids dynamically. internet access must be available to all hosts through an isp. site-to-site wan connections are created using leased lines. which type of ipv6 addressing is most appropriate for hosts on this network?

Answers

Global Unicast Addressing type of ipv6 addressing is most appropriate for hosts on this network.

What is IP address?

An IP address is made up of two parts: the network ID, which is made up of the first three numbers, and the host ID, which is the fourth number. The network ID on your home network, for example 192.168.1.1, is 192.168.1, and the host ID is the number after that.

What is ipv6 addressing?

An endpoint device in an IPv6 network is identified by an IPv6 address, which is a 128-bit alphanumeric value. The IPv6 addressing infrastructure replaces the IPv4 addressing infrastructure, which had constraints that IPv6 was created to address.

1. Global routing prefix: The part of the address that is given to a customer or site by the provider, such as an ISP, is known as the global routing prefix. A specific autonomous system is given a Global routing prefix, which is made up of the most important 48 bits.

2. Subnet ID: The subnet ID is the number that comes after the interface ID and before the global routing prefix.

3. Interface ID: A 64-bit ID is created by using /64 subnets, which is strongly advised in most situations. The Interface ID is equal to the host portion of an IPv4 address.

Learn more about IPV6 address click here:

https://brainly.com/question/15048370

#SPJ4

3. [5 pts] what are the differences among interrupt-driven i/o, memory-mapped i/o, direct memory access (dma), and channel i/o? at least provide 2 differences for each i/o.

Answers

The outcome of the I/O instructions written in the computer program is what drives programming I/O.

The outcome of the I/O instructions written in the computer program is what drives programming I/O. By informing the interface to send an interrupt request signal whenever data is available from any device using the interrupt facility and special commands. The speed of the CPU determines how quickly data can be transferred between a fast storage medium, like a magnetic disk, and a memory unit.

Since we can see in the example above, the CPU is kept busier than necessary. Using an interrupt-driven technique for data transfer can probably prevent this situation. by informing the interface to send an interrupt request signal whenever data is available from any device using the interrupt facility and specific commands.

The CPU can continue running any other programs in the interim. The interface continues to keep an eye on the object. When the device is ready to transfer data, it sends a signal to the computer asking for an interrupt.

To know more about CPU click here:

https://brainly.com/question/16254036

#SPJ4

Cubism was a 20th century art movement founded by two artists: pablo picasso and blank space__________. choose the answer. question 13 options: alphonse mucha windsor mccay franz marc georges braque

Answers

Cubism was a 20th century art movement founded by two artists: pablo picasso and Georges Braque.

What is Cubism art movement?

Cubism arose in the aftermath of Pablo Picasso's shocking 1907 Les Demoiselles d'Avignon, during a period of rapid experimentation by Picasso and Georges Braque.

These artists used multiple vantage points to fracture images into geometric forms, drawing on Paul Cezanne's emphasis on the underlying architecture of form. Figures were depicted as dynamic arrangements of volumes and planes where background and foreground merged, rather than as modelled forms in an illusionistic space.

The movement was one of the most innovative of the early twentieth century, challenging Renaissance depictions of space and leading almost directly to experiments with non-representation by a variety of artists. Cubist artists went on to experiment with sculpture and incorporate elements of collage and popular culture into their paintings.

To learn more about Architecture, visit: https://brainly.com/question/20568202

#SPJ1

3.2 Code Practice Question 3 please

Answers

Below is the code in C language to test the correct password with a numerical value as the secret phrase.

#include <stdio.h>

int main() {

int pass, x=10;

while (x!=0)

{

printf("\nEnter the password: ");

scanf("%d",&pass);

if (pass==1234)

{

 printf("Correct password");

 x=0;

   }

   else

   {

      printf("Not correct");      

}

printf("\n");

  }

return 0;

}

Since you didn't mention which programming language we have to use for the given problem, Hence, I gave you a sample code. Modify the code to take input as a string in your preferred programming language to solve the given problem.

To know more about C Programming code, visit: https://brainly.com/question/15683939

#SPJ13

a network has been crashed to the point where all activities are critical. additional crashing: group of answer choices is unnecessary. may require crashing multiple tasks simultaneously. can be done, but all critical tasks must be reduced in duration. is prohibitively expensive. is impossible.

Answers

Option D is correct. Project managers and stakeholders often use the project management technique of "crashing" to deal with emerging problems.

By allocating more resources where they are most needed, project crashing maintains or accelerates a project's scope and timeline. Crashing is a compression approach that focuses on the project timetable to hasten the project's completion date. Here are some plausible instances of crashing: Over-time. adding more resources to a particular activity. Crashing is the process of reducing the length of time it takes to complete a project by changing its scope or adding resources. Fast-tracking, which involves adjusting project activities so that they are completed in parallel and with less time spent, is typically the first option when a project's production duration needs to be shortened.

Learn more about crashing here-

https://brainly.com/question/4701800

#SPJ4

Question 5 of 10
How does a programmer instruct a video game on how to function?
A. By choosing parameters in a creative manner
B. By using phrases that can be interpreted in several different way=
C. By writing an algorithm using a computer language
OD. By creating a range of variables within the game
SUBMIT

Answers

Answer:

either C or D

Explanation:

From a logical and practical view, computer and technology is about code

for reporting purposes, an organization establishes a(n) , which is separate from the operational database.

Answers

For reporting purposes, an organization establishes a data warehouse, which is separate from the operational database. Therefore, the correct answer option is: a. data warehouse.

What is a data warehouse?

A data warehouse can be defined as a logical collection of information that are gathered or obtained from many different operational databases, in order to both support and enhance day-to-day business analysis activities and decision-making tasks of various employees who are working in a business organization.

This ultimately implies that the primary purpose of a data warehouse is to logically aggregate a collection of information from all the departments in a business organization into a single repository, especially to be used for reporting purposes.

Read more on data warehouse here: brainly.com/question/18565560

#SPJ1

Complete Question:

For reporting purposes, an organization establishes a(n) _____, which is separate from the operational database.

a. data warehouse

b. autonomous database

c. embedded database

d. star schema

when an access point configured to use eap first discovers a new client the first thing the access point does is:

Answers

The user is required to authenticate against a login server when an access point set up to use EAP discovers a new client.

You can choose the computer that executes commands and handles procedures using the Server Login dialog box. You can decide between a nearby computer and a distant server. In the list, you can add, change, or remove remote servers. An ID and password are often required for remote servers, and occasionally a domain name is also required.

Any device that manages remote logins to create a point-to-point protocol connection is referred to as a network access server (NAS). Some individuals refer to these gadgets as remote access servers or media access gateways.

Whatever name you give them, these tools manage authentication and make sure users can access the resources they require. They can be used to connect users to the internet or a phone system.

To know more about server click here:

https://brainly.com/question/14617109

#SPJ4

Answer:

Explanation:

Using the Server Login dialog box, you may select the computer that processes instructions and procedures. You have the option of selecting a nearby computer or a far-off server. You can add, modify, or remove remote servers from the list. For distant servers, an ID and password are frequently required, and occasionally a domain name as well.

A network access server is any device that controls remote logins to establish a point-to-point protocol connection (NAS). Some people call these devices media access gateways or remote access servers.

Regardless of the name you give them, these programs handle authentication and guarantee that users may access the resources they need. They can be used to link consumers to a phone system or the internet.

which data over cable service interface specification (docsis) layer is used by the cable modem termination system (cmts) to differentiate between cable modems? ncti

Answers

The DOCSIS Media Access Control (MAC) Layer used by the cable modem termination system (CMTS) to differentiate between cable modems.

This part of the DOCSIS protocol stack controls all data that is present on the upstream. Since every communication device in an HFC plant uses the same cable, much like an Ethernet network, it is crucial that a systematic procedure exists so that the CMTS can instruct the cable modem when and how long to transmit data.

Coordination of upstream traffic from the cable modem to the CMTS takes place at the MAC layer.

Each of the different protocols used in the DOCSIS standard serves a particular purpose. Every cable modem operates on the basis of these protocols.

The foundation of communication between any cable modem (CM) and the cable modem termination system is laid by the lower four layers, which are specific to the cable data network (HFC plant and CMTS).

The lower layers establish the communication path, and the upper layers carry out protocols over that path. All well-known IP services are delivered as Transmission Control Protocol/Internet Protocol (TCP/IP) traffic, including e-mail, the Web, file transfers, and network news.

To learn more about Cable Modem Termination System (CMTS) click here:

brainly.com/question/17990873

#SPJ4

What are two possible challenges of online collaboration?
A. Outside noises like lawn mowers or sirens might be heard by
other team members.
B. Team members never get along while collaborating on a project.
C. Online collaboration that relies heavily on inputting text to
communicate can be challenging for those who have limited
keyboard skills.
D. Team members that are uncomfortable with online tools may feel
excluded.

Answers

The two possible challenges of online collaboration are:

c)Online collaboration that relies heavily on inputting text to

communicate can be challenging for those who have limited

keyboard skills.

d)Team members that are uncomfortable with online tools may feel

excluded.

What are the possible challenges due to online collaboration?

creating seamless communication is challenging.the vision that is blurry.The requirement to advance diversityfosters a culture of trust among team members.productivity issues.an employee with a negative mentality.destroying organizational silos.Lack of compliance and employee reluctance.

Hence along with the above challenges, the ones that are noted as answers are considered more challenging

To learn more about online collaboration

https://brainly.com/question/28289861

#SPJ1

two's complement allows us to reuse an adder circuit for subtraction. this saves (answer)​

Answers

Answer:

I don't know I only want points

in the field of technology, an algorithm could be defined as . a set of styles that can be referenced by a web application through html a mathematical formula used to write markup language logic an api used by web applications to retrieve data a set of common instructions that can be used with different input values to extrapolate information

Answers

An algorithm is described as a group of standard instructions that may be applied to information extrapolation using various input values.

What is an algorithm?An algorithm is an approach used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.An algorithm is indeed a codified formula that is included within software that, when activated, directs the tech to take the proper action to address a challenge. Input and output are how computer algorithms operate. A system analyses the data entered and issues the appropriate orders to bring about the intended outcome.Quicksort. One of the most popular sorting algorithms is quicksort since it is also among the most effective. The first step is to choose a pivot number. This number will divide the data, with smaller numbers to its left and larger numbers to its right.

To learn more about algorithm refer to :

https://brainly.com/question/24953880

#SPJ4

Answer: D. A set of common instructions that can be used with different input values to extrapolate information

to achieve a lan capacity of 10 gbps over utp, cat 5e is used, combined with m-ary modulation techniques and the use of hybrid canceller transceivers. true false

Answers

To achieve a lan capacity of 10 gbps over utp, cat 5e is used, combined with m-ary modulation techniques and the use of hybrid canceller transceivers , the statement is true

What is  lan capacity?

Twisted pair cables can be as long as 100 m (328 ft), although the maximum length of a fiber optic cable can be anywhere between 10 km and 70 km, depending on the type of fiber used.

Today, data rates can vary from 100 Mbit/s to 10,000 Mbit/s depending on the twisted pair or fiber optic cable type being used.

A CAT-5 cable may only be up to 100 meters in length, according to the Cat-5 Ethernet specification.

A local area network (LAN) is made up of several computers that are connected to one another to create a network in a certain area. LANs use TCP/IP ethernet or Wi-Fi to connect the computers to one another.

To learn more about lan capacity refer to:

https://brainly.com/question/14242759

#SPJ4

which internet protocol security (ipsec) core component negotiates, creates, and manages security associations?

Answers

Layer 2 Tunneling Protocol (L2TP) is the essential component of internet protocol security (ipsec) that negotiates, builds, and manages security associations.

What is the internet protocol?

The Internet Protocol (IP) is a protocol, or set of rules, that is used to route and address data packets so that they can travel across networks and arrive at their intended destination.

Layer 2 Tunneling Protocol (L2TP) connections, also known as virtual lines, enable corporate network systems to manage the IP addresses assigned to remote users, resulting in cost-effective access for remote users.

Therefore, L2TP is a critical component of internet protocol security (ipsec) that negotiates, establishes, and manages security associations.  

Learn more about the Internet Protocol, refer to:

https://brainly.com/question/27581708

#SPJ1

Roland knew that the code to his sister toy safe was only two digits ong he was able to crack the safe open by attempting every two digit code until he found the correct one what method code breaking did Roland use

Answers

Answer:

Brute-force attack

Explanation:

a brute force attack is when you use a bunch of random passwords in the hopes of eventually getting it right

Answer:

Permutation cipher

This is a complete enumeration of all possible keys of small length (we have a length of 2).

The first digit is 1, 2, 3, ..., 8, 9.

Second digit 0, 1, 2,…, 8, 9

Number of options: 9*10 = 90

10, 11, 12, … 97, 98, 99

oracle database is an example of the . a. hierarchical model b. file system data model c. relational database d. xml/hybrid data model.mcq answer

Answers

Option a is correct. The oracle database is an example of the a hierarchical model.

A group of data that is handled as a whole is called an Oracle database. A database's main function is to store and retrieve relevant data. The solution to information management's challenges is a database server. In a multiuser scenario, a server often manages a lot of data reliably so that multiple users can access the same material at once. Delivering excellent performance while accomplishing all of this. A database server also offers effective solutions for failure recovery and prevents illegal access.

The first database created for enterprise grid computing, the most adaptable and economical method of managing data and applications, is Oracle Database. Large pools of industry-standard, modular storage and servers are produced by enterprise grid computing.

To know more about Oracle database click here:

https://brainly.com/question/14256914

#SPJ4

8. given the ip address of a host: 180.199.199.79, and its subnet mask 255.255.255.240 compute the subnet address in the decimal dotted format, and the broadcast address.

Answers

the ip address of a host: 180.199.199.79, and its subnet mask 255.255.255.240. The decimal dotted format is 180.199.156.7 and the broadcast address is 180.199.199.79.

What is the broadcast address?

A network address used to send data to every device connected to a multiple-access communications network is called a broadcast address. All hosts that are connected to the network may receive a message sent to a broadcast address.

All hosts on the local subnet can receive data sent to the broadcast address. Many protocols, including ARP, the Routing Information Protocol (RIP), and others that must transmit data before they know the local subnet mask, use the broadcast address.


To learn more about broadcast address, use the link given
https://brainly.com/question/29370842
#SPJ1

a data analyst uses the aes() function to define the connection between their data and the plots in their visualization. what argument is used to refer to matching up a specific variable in your data set with a specific aesthetic?

Answers

You can build your own affinity audience with Custom Affinity Audiences, which are particularly designed by interest keywords, URLs, and apps that you enter.

In other words, its inputs are stated to be assessed in light of the data. Because you may name those variables directly, working with variables from the data frame is made simple. A plotting software called ggplot2 offers helpful functions for generating intricate graphs from data in a data frame. It offers a more programmatic interface for choosing which variables to plot, how to present them, and other visual characteristics. In other words, its inputs are stated to be assessed in light of the data.

Learn more about variables here-

https://brainly.com/question/13111084

#SPJ4

What is the correct way to write an argument? =A1 > 4= [A1 > 4] “A1 > 4” (A1 > 4)

Answers

The correct way to write an argument is  [A1 > 4]

What is meant by argument?

You can provide a function more information by using an argument. The data can then be used by the function as a variable as it executes. To put it another way, when you construct a function, you have the option of passing data as an argument, also known as a parameter.

A value that is passed between programmes, functions, or subroutines in programming. Arguments are autonomous objects, or variables, that include information or codes. It is customary to refer to an argument as a "parameter" when it is used to modify a programme for a user. view argc

Astronomy, which historically used tables to determine the spatial positions of planets from their positions in the sky, is where the term "argument" in this sense originated.

To learn more about parameter refer to:

https://brainly.com/question/29223118

#SPJ9

4. Which of the following is NOT a common file type for a text document?
O xlsx
O docx
Opdf
Oodt

Answers

Answer:

xlsx

Explanation:

pdf, is a document file, so is docx and odt. which leaves the remaining file, xlsx.

modern computer systems enable users to work with more than one program at the same time. this technique is known as

Answers

The modern computer systems enable users to work with more than one program at the same time. This technique is known as Multitasking or Multiprogramming .

What is mean by Multitasking?Computer multitasking is the practice of running many tasks concurrently for a predetermined period of time. New tasks can start and stop old ones before they are finished, as opposed to waiting for them to finish. Multitasking is often referred to as multiprocessing.A user can manage numerous computer tasks simultaneously using an operating system's multitasking feature, such as by running application software. When switching between these jobs without losing data, the operating system can keep track of where you are in each of them.Multitasking is the ability to manage several responsibilities at once while focusing on one task and keeping an eye on others.

To learn more about multitasking refer to:

brainly.com/question/12977989

#SPJ4

When Stacy tries to delete the field "Image,” in the Design view image below, she receives no warning message and the field deletes. But when she attempts to delete "BotanicalOrigin,” a warning message appears. Which best explains this difference?

a. “Image” is a primary key, and “BotanicalOrigin” is not a unique identifier.
b. “Image” is not a unique identifier, but “BotanicalOrigin” is a primary key.
c. “Image” contains no data, but “BotanicalOrigin” does contain data.
d. “Image” contains data, but “BotanicalOrigin” does not contain data.

Answers

When Stacy attempts to delete "Botanical Origin,” a warning message appears. The best explanation of the difference is “Image” is not a unique identifier, but “Botanical Origin” is a primary key. The correct option is b.

What is the primary key?

The column or columns that each row in a table uses to uniquely identify itself is known as the primary key. For Optim to insert, update, restore, or delete data from a database table, the table must contain a primary key. The primary keys set for the database are used by Optim.

Therefore, the correct option is b.“Image” is not a unique identifier, but “Botanical Origin” is a primary key.

To learn more about the primary key, refer to the link:

https://brainly.com/question/27170818

#SPJ1

if you were projecting a raster containing land use code values, the best resampling method to use would be

Answers

The best resampling method to employ when projecting a raster of land use codes is nearest neighbor, bilinear, cubic convolution, affine.

What is raster resampling?Raster resampling is the process of altering the spatial resolution of a raster dataset (raising or reducing). The uncorrected image's original digital pixel values are used to calculate the new pixel values throughout the resampling process.The bicubic resampling technique is typically regarded as the finest choice for obtaining highly effective outcomes. However, bilinear or nearest neighbor may be preferable choices if speed is more crucial than quality. The jackknife and bootstrap resampling techniques are two of the most used. These two are illustrations of nonparametric statistical techniques. In statistical inference, the Jackknife method is used to calculate the bias and standard error of a test statistic.

To learn more about resampling refer to:

https://brainly.com/question/25006407

#SPJ4

joaquin is a senior network technician for a mid-sized company who has been assigned the task of improving security for the it infrastructure. he has been given a limited budget and must increase security without redesigning the network or replacing all internetworking security devices. he focuses on an approach that will identify a single vulnerability. what does he recommend?

Answers

Weakest Link is the correct answer. The flaw that hackers would exploit is the weakest link in the cyber chain, where many business processes require manual, human input, and exploit the link, which would remain a fertile field for any of the hackers.

What is weakest link in network?

For far too many networks, the weakest link in security is the user, not the technology.

Let me provide an example. A major financial services firm with extensive network security disclosed in March 2006 that one of its portable computers had been stolen. The laptop contained nearly 200,000 people's Social Security numbers. What caused it to happen? An employee of the firm had locked the laptop in the trunk of an SUV while dining with colleagues in a restaurant. During dinner, one of the employee's coworkers took something from the vehicle and forgot to re-lock it. As fate would have it, a rash of car thefts occurred in that specific area at that specific time, and the rest is history.

The moral of the story is simple: no matter how secure your network is, it is only as strong as its weakest link. And people, specifically you and your employees, are frequently the weakest link. It is critical to understand that inadequate security puts your company and its partners at risk. As a result, many businesses and organizations, such as credit card companies, now specify and require minimum levels of security before doing business with them.

To know more about the weakest link in a network, visit: https://brainly.com/question/20912255

#SPJ1

Carla is creating a presentation that will include tables, lists, and charts. What will help her present these different types of content appropriately?

Answers

Answer:

An Excel spreadsheet will help her

suppose your company has built a database application that runs on a centralized database, but even with a high-end computer and appropriate indices created on the data, the system is not able to handle the transaction load, leading to slow processing of queries. what would be some of your options to allow the application to handle the transaction load?

Answers

Multiple database updates are managed through transactions within a single application as a single unit of work.

What is the application to handle the transaction load?

In a DBMS, a transaction is a logical processing unit that includes one or more database access operations. A transaction is a computer unit whose execution might or might not alter a database's contents.

In other words, if you have an application that manages data in one or more databases, you can make sure that all updates are committed simultaneously across all databases if they are handled as part of a transaction.

Therefore, Concurrent access should be managed to prevent problems like hardware failure and system failures.

Learn more about transaction here:

https://brainly.com/question/24215121

#SPJ1

what is a possible situation when it might be necessary to boot windows 7 from a usb device, a cd, or a dvd?

Answers

Necessary to boot windows 7 from a usb device, a cd, or a dvd to repair the system

How do I make a bootable Windows 7 DVD from USB?A Windows 7 ISO file on a DVD or USB flash device.Download the ISO file, and then launch the Windows 7 USB/DVD Download program to turn it into a bootable DVD or USB flash drive.After completing this, you can install Windows 7 directly from a DVD or USB flash drive. To generate a bootable CD or USB, launch Windows Boot Genius, insert a blank media into the functional computer, and select "Burn."To start your PC from the bootable CD or USB you just produced, insert it into the problematic machine. Making use of the Windows 7 USB/DVD Download ToolClick Browse in the Source File area to locate the Windows 7 ISO image on your computer and load it.Choose Next.Identify a USB device.From the drop-down option, pick the USB flash driveClick Copying to start.When the procedure is finished, close the application. You can burn the Windows 7 download to disc or make a bootable USB drive using the free Windows USB/DVD download tool from Microsoft.

To learn more about boot Windows 7 refer

https://brainly.com/question/29220833

#SPJ4

Necessary to boot windows 7 from a usb device, a cd, or a dvd to repair the system.

How do I make a bootable Windows 7 DVD from USB?A USB flash drive or DVD with the Windows 7 ISO file. To create a bootable DVD or USB flash drive, download the ISO file, then run the Windows 7 USB/DVD Download program.You can then install Windows 7 straight away from a DVD or USB flash drive after finishing this. Launch Windows Boot Genius, place a blank piece of media into a working computer, and choose "Burn" to create a bootable CD or USB.Put the bootable CD or USB you just created into the faulty machine to start your PC from it. The Windows 7 USB/DVD Download Tool is usedTo locate and load the Windows 7 ISO image from your computer, click Browse in the Source File area.Select Next.Find a USB gadget.

To learn more about boot Windows 7 refer:

brainly.com/question/29220833

#SPJ4

in which of the following cases should you consider storing functions in a module file? group of answer choices a and b only when the functions use reference parameters. when the functions will be used by multiple programs. all of the above when it helps divide a long source code file into smaller files that are easier to manage.

Answers

Option and b are correct :

When it helps divide a long source code file into smaller files that are easier to manage and when the functions will be used by multiple programs .

What is source code?

The text file is referred to as containing the source code when a programmer enters a series of C programming language commands into Windows Notepad and saves the sequence as a text file, for instance. The "before" and "after" versions of a built computer program are commonly referred to as source code and object code.

What is functions?

Simply put, a function is a "chunk" of code that you can reuse repeatedly rather than having to write it out several times. Programmers can divide a problem into smaller, each performing a specific task, chunks using functions.

It is always advantageous to use a header file to declare all the functions and define them in a separate file if the program is very large and consists of more than four files.

Header files make it unnecessary to declare or define functions in each file, making it possible to manage huge code that has 3-5 class files. You can do it by merely including the function header file.

Therefore, only options a and b will be the correct selection.

Learn more about functions click here:

https://brainly.com/question/25741060

#SPJ4

electronic retailers can collect transaction data for their data warehouse, but they can also collect information by placing cookies on a visitor's hard drive. cookies are:

Answers

Cookies are tiny text files kept in a web user's browser directory or data folder. They are sometimes referred to as browser cookies or HTTP cookies.

Cookies are very little text files that are saved in the data folder or browser directory of a web user. They are sometimes referred to as browser cookies or HTTP cookies. To remember login information and keep track of consumers, e-commerce websites put cookies on visitors' browsers.

When a person visits an e-commerce website for the first time, a cookie is put in their browser, and the website logs their activity on a distant server. The cookie is one short line of text. It contains no information about the user or their computer. Instead, it typically contains the URL of the website, a number that is created at random, and the cookie's expiration date.

To know more about website click here:

https://brainly.com/question/28644651

#SPJ4

Design a pseudo program that asks the user for two numbers and then sends these two numbers as arguments to four arithmetic functions: addition multiplication division and modulus the remainder after dividing one number by the other

Answers

function add(a, b){ //This is an addition function

return a+b;

}

function mod(a, b){ //This is a module function

return a%b;

}

function mul(a, b){ //This is the multiplication function

return a*b;

}

function div(a, b){ //This is a division function

return a/b;

}

var a=prompt("Enter a number");

var a1=parseInt(a); //Convert string input to Integer

var b=prompt("Enter a number");

var b1=parseInt(b); //Convert string input to Integer

var add=add(a1,b1); //Call the addition function

var multiplication=mul(a1,b1); //Calling the multiplication function

var division=div(a1,b1); //Calling the split function

var module=mod(a1,b1); //Call function modulus

document.write("Addition = " + addition + "<br>");

document.write("Multiplication = " + multiplication + "<br>");

document.write("Division = " + division + "<br>");

document.write("Module = " + module + "<br>");

You can learn more through link below:

https://brainly.com/question/23631339#SPJ4

Other Questions
what is the probability of producing the genotype aabbcc in a cross of individuals who both possess this genotype: aabbcc? How would this aid the Europeans in gaining power and influence in the Americas? So wind and rain make?-extra water in the ocean-different temperatures of water-different parts of the ocean have different amounts of salt-the same temperature and salt in all areas To make the argument stronger, the best way for the writer to revise the paragraph is to add a counterclaim to address the rebuttal. a more detailed initial claim statement. a rebuttal to address the counterclaim. a rhetorical device to appeal to logic HELP OMOne positive thing about using adjustment layers is that they are ___ because they are above the layers they affect. Sleeping with an even a small amount of light can cause negative changes to peoples metabolism. for example, a studies shown that those who slept in dim light had more trouble _______ the next morning.A) processing sugarB) maintaining postureC) slowing down their heart rateD) avoiding devices like smart phonesPLS HELP 50 PO IN TS Your factory has been offered a contract to produce a part for a new printer. The contract would last for years and your cash flows from the contract would be million per year. Your upfront setup costs to be ready to produce the part would be million. Your discount rate for this contract is. A. What does the npv rule say you should do? b. If you take the contract, what will be the change in the value of your firm?. in a culture of green alga that is carrying out photosynthesis in the presence of co2 in the laboratory, what would happen to the levels of ribulose 1,5-bisphosphate and 3-phosphoglycerate in the minutes after the lights were turned off and the cultures were plunged into darkness? caroline company began operations in 2018. the company reported $128,000 of depreciation expense on its income statement in 2018 and $84,000 in 2019. on its tax returns, the company deducted $192,000 for depreciation in 2018 and $112,000 in 2019. the 2019 tax return shows taxes due of $132,000 based on a 25% tax rate. how much deferred tax liability will caroline report at the end of 2019? 2 When writing the original United States Constitution, theFounding Fathers believed that once these officials were inoffice, they would be protected from political pressuresbecause they served for life. Which officials does this referto?1 Senators2 Presidents3 Supreme Court Justices4 Members of the House of Representatives Multiply and simplify: 3i(4 - 3i) - i (2 + i) the rate of return that financial investors require to hold a risky asset minus the rate of return on a safe asset is called the: multiple choice real interest rate. nominal interest rate. risk premium. discount rate. .Radioactive Strontium The half-life of strontium-90 is 28 years. How long will it take a 50- mg sample to decay to a mass of 32 mg? which of the following would not cause a shift in the long-run aggregate-supply curve? a. an increase in the available labor b. an increase in the available capital c. an increase in the available technology d. an increase in price expectations e. all of the above shift the long-run aggregate-supply curve. use f(x)=|x| f(x) is shifted down 4 and right 3 to create h(x)which answer shows the correct function for h(x) When a glucose molecule loses a hydrogen atom as the result of an oxidation-reduction reaction, the glucose molecule becomes. what are the two problems with having so much data available for data-driven decision making? (check all that apply) lauren is an administrative assistant at a big law firm. while her days are busy answering phones, preparing documents on the computer, and scheduling appointments, it is mostly sedentary work. lauren has poor eating habits and is overweight. because of a family history of heart disease, lauren's doctor suggested that she join a new weight loss support group at the hospital that teaches healthy lifestyle changes such as diet and exercise. this is an example of GCF ( 160, 320, 480) ayana enjoys cycling and is in the market for a new bicycle. she is fairly knowledgeable about bikes and knows most of the major brands, such as trek, cannondale, specialized, and giant, and will likely purchase one of these brands. these four brands are