Answer:
The answer is "One week".
Explanation:
Following are the number represents of the given values:
Serial number (se) [tex]= 200302028[/tex]
Refresh (ref) [tex]= 3600 \ second = 1 \ hour[/tex]
Updated -retry (ret)[tex]= 3600 \ second = 1 \ hour[/tex]
Expiry [tex]= 3600 \times 24 \times 7 = 604800 \ second \ = 1 \ week[/tex]
Minimum [tex]TTL = 3600 \ min = 1 \ h[/tex]
Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or a mobile camera? Explain your answer by providing three reasons why your choice suits your needs.
Answer:
I would purchase a high-quality digital camera
Explanation:
As a blogger, I most times take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.
The light sensitivity as seen in the ISO, the shutter speed, megapixels, and view-finder are some features I would look out for in a high-quality digital camera.
Answer: To take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.
Explanation: copied the previous answer a bit to better suit the exam requirements.
3. A year contains 365 days normally, so on
what number day does Christmas fall on?
Answer:
359 is December 25 in a 365 day year.
Explanation:
Answer:
For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.
Application software helps run the computer and coordinates instructions with the hardware.
A. True
B. False
Answer:
A. True
Explanation:
help with these 2 questions srry for the horrible pic
Answer:
the first one is email address nd the second one is semi-blocked letters ? sorry if im wrong.
Explanation:
Answer:
I cant read
Explanation:
Write a program that takes a String containing a text using the method signature
String useProperGrammar(String text)
Your method should replace the word ‘2’ with ‘to’ and return the updated text.
For example,
useProperGrammar("can you go 2 the store?")
should return
"can you go to the store?"
This method should also print out the number of grammatical errors that were fixed.
For example, for useProperGrammar("back 2 back 2 back"), the method would also print:
Fixed 2 grammatical errors:
In the main method, ask the user to input a String, and print the results of useProperGrammar using the user input.
import java.util.*;
public class MyClass {
public static String useProperGrammar(String message){
String newMessage = "";
int count = 0;
for (int i = 0; i < message.length(); i++){
if(message.charAt(i) == '2'){
newMessage = newMessage + "to";
count ++;
}
else{
newMessage = newMessage + message.charAt(i);
}
}
System.out.println("Fixed "+count+" grammatical error(s):");
return newMessage;
}
public static void main(String args[]) {
Scanner scan = new Scanner(System.in);
System.out.println("Enter a string: ");
String text = scan.nextLine();
System.out.println(useProperGrammar(text));
}
}
I hope this helps.
_______and ________ enables computers to communicate and it can pass information between two networks.
Answer:
Internet Protocol and Transmission Control Protocol
Explanation:
Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other. They are developed by Bob Kahn and Vint Cerf.
Databases and EC2 instances are most performant using block-level storage.
A. True
B. False
Answer:
A. True
Explanation:
It is TRUE that Databases and EC2 instances are most performant using block-level storage.
This is evident in the fact that Databases applications utilize block-level storage in storing files and data, and at the same time that EC2; Amàzon Elastic Compute Cloud, through Amàzon Elastic Block Store utilizes block-level storage to store data.
Hence, in this case, the correct answer is TRUE.
What is the last usable host IP address on the 192.168.32.9/30 network?
Answer:
192.168.32.10
Explanation:
HOPE THIS HELPS:)
As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors
Answer:
Printing devices
Video, Audio devices
Communication machines
Explanation:
Printing devices - Sysadmin needs this type of devices for print important data and information.
Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.
Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.
Finish the code to search for a 7 in the array.
from array import *
myArr = array('f',[3, 5, 7.3, 10])
location = myArr.
(7)
Answer:
The complete code is as follows:
from array import *
myArr = array('f',[3, 5, 7,3, 10])
location = myArr.index(7)
print(str("7")+" is at position "+str(location+1))
Explanation:
I made corrections to the third line of the code and I added a line
This line gets the index of 7 from the array myArr using the index keyword
location = myArr.index(7)
This line prints the position of the 7 in the array
print(str("7")+" is at position "+str(location+1))
A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What must occur in order for the students to perform this investigation?
Answer:
the temperature of the sample must change
Explanation:
A business owns a printer but the printer is used for cloud printing purposes. What type of resource is this?
Use the {blank} to view your presentation the way an audience will see it.
A. Slide Show Button
B. Play Button
C. Tools Menu
D. View Menu
Answer:
A. Slide Show Button
Explanation:
Suppose a webpage contains a single text field. We want to make the page such that a user can immediately start typing in the text field without clicking on it. What is correct way using?
1. .
2. .
3. .
4. Can't be done with only HTML5, need help of Javascript or something else.
Answer:
The answer is "Option 2".
Explanation:
In HTML5, text inputs use an autofocus attribute, which, when the page is loaded, uses a template to concentrate primarily on text fields. This attribute is a Boolean property that represents the HTML autofocus attribute, showing if the related <select> element will receive an output focus whenever the page loads if it is overruled by the user. An only form-associated entity can have this property specified in a text.
which data representation system is based on the digits 0-9 and is mostly easily interpreted In real wrold situations
Answer:
Hexadecimal data representation system is based on the digits 0-9 and is mostly easily interpreted In real word situations .
Explanation:
Hexadecimal manages sixteen different figures: most often the numbers 0–9 to describe values zero to nine, and (A–F) to describe values ten to fifteen. The modern hexadecimal system was first launched into the domain of computing by IBM in 1963. An older description, with 0-9 and u-z, was practiced in 1956 by the Bendix G-15 computer.
If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = int * N total int / 2 total = int. 2
Answer:
Yes
Explanation:
Because all answers are intotal (2)
Tips for staying safe using social media. Using in your own words.
Whatever you post on social media, it's now public. Yes there are ways to make posts private and such, but glitches do happen. Not only that, but hackers may be able to turn privacy features off. Also, sometimes the social media company changes policy on some aspects, which may turn some private features into public ones. That means you should be careful not to post anything too personal and also don't post anything such as addresses, bank account numbers, passwords, etc. This is probably common sense to you, but it's a good thing to keep in mind regardless.
Also, if there are people who verbally threaten or harass you, then you should either report them or block them. Preferably both, but blocking is probably more effective. If someone friend requests you, then it's ideal to only accept their request if you know who they are. Though you can relax this if you aren't worried about who sees your profile page.
In addition, you should be careful as to what you read on social media. Not everything is true. This is because practically anyone can post a news story even if it's completely made up. Lately there have been some efforts to do fact checking, but there's still a lot of fictional stuff out there. Be sure to avoid clicking on any links you may not recognized as they could be phishing links, or may lead to harmful malware. It's probably just best to get an antivirus of some kind.
What is the value of grade after the segment of code executes int result = 95?
if (result >= 90) grade = "A";
if (result >= 80) grade = "B";
if (result >= 70) grade = "C";
if (result >= 60) grade = "D";
else grade = "E";
Asnwer Choices
1.A
2.B
3.C
4.D
5.E
Answer:
the answer is A
because 80 to 90 is B
so 90 to 100 is A
Given positive integer num_insects, write a while loop that prints that number doubled up to, but without exceeding 100. Follow each number with a space.
Sample output with input: 8
8 16 32 64
Here's what I havenum_insects = 8 # Must be >= 1print(num_insects, '', end='')while num_insects <= 100 : num_insects = num_insects * 2 print(num_insects,'', end="")This code prints the number 128 even thought the loop is set to end after 100? Why is that?
Answer:
The while loop is executed one more time when num_insects is 64. It gets doubled and 128 gets printed. Then the while loop is not executed anymore since 128 exceeds 100.
So the reason you see 128 is because the multiplication by 2 happens inside the loop before you print. You enter it with 64, but by the time you get to the print statement, it was already multiplied.
The solution is to switch the print and the multiply:
num_insects = 8 # Must be >= 1
while num_insects <= 100 :
print(num_insects,'', end="")
num_insects = num_insects * 2
This has one added advantage that the very first print statement outside the loop can be removed.
Game Informer (often abbreviated to GI) is an American-based monthly magazine featuring articles, news, strategy, and reviews of popular video games and associated consoles. Formed in August 1991,[1] the magazine has nearly 3 million subscribers according to Andrew Reiner, making it the highest circulated video game magazine,[2] and as of the first quarter of 2007, it is listed as the 23rd largest overall magazine. Game Informer is now ranked among the top four magazines for reaching males 18 to 34.[3] It is owned and published by GameStop Corp., the parent company of the video game retailer of the same name. Due to this, a large amount of promotion is done in-store, which has contributed heavily to its large subscription base,[4] especially as a subscription is included with the store's Gamer's Edge discount card. Contents [hide] · · 1 GI Staff · · 2 Recurring events · · 3 Reviews · · 4 Website · · 5 References · · 6 External links Judging from this introduction, what kind of information would you expect to find in the article? a. How many people subscribe to Game Informer c. A list of games about which Game Informer has written b. Who works for Game Informer d. none of the above
Answer:
it is d i just took it
Explanation:
There is not any kind of information would you expect to find in the article, hence option d is correct.
What is information?Information is defined as a vague idea that describes something with the capacity to inform. Information is most fundamentally concerned with the interpretation of what may be sensed. Facts and text elements including a glossary, table of contents, photographs, and captions are characteristics of informational literature.
Game Informer is a consumer advocate who aims to assist gamers in finding games they will enjoy, and it has built a solid reputation for reliable reviews and clear, succinct reporting by an experienced staff. You can access both the PC/Mac browser version of Game Informer as well as the Game Informer app for iOS or Android with a single digital subscription.
Thus, there is not any kind of information would you expect to find in the article, hence option d is correct.
To learn more about information, refer to the link below:
https://brainly.com/question/13629038
#SPJ2
Which of the following options allow you to access a computer remotely?
a. NTP
b. SSH
c. Server
d. VPN
Answer:
b. SSH
Explanation:
Secure Shell (SSH) is a protocol that allows you to access a computer remotely by providing safe network communications via an unsecured network.
Secure Shell (SSH) protocol can be used to perform essential functions such as protected file transfers, remote access to private network systems, devices, and applications.
Thus, option "B" is the right answer.
Select the statement below that would most likely appear in a description of the Link-State routing protocol. Assume the referenced routers are all part of the same network: Group of answer choices Each router talks, sends updates, to all other routers on the network Each router only talks, sends updates, to its neighbors Each router will be controlled by a large master router All of the above
Answer:
Each router only talks, sends updates to its neighbors
Explanation:
There are two types of routing protocol, they are, link-state and distance-vector routing protocol. The link-state protocol is performed by nodes or routers prepared for packet switching. Each node is responsible for mapping out the route of the network, using the reachability protocol to assert the connectivity to neighboring nodes, updating its route and sending the link-state update messages periodically to neighboring nodes.
Which of the following is the primary difference between analog and digital communication?
Im marking Brainliest
electric cables vs. fiber cables
electric pulses vs. electronic devices
radio signal vs. microwave signal
radio signal vs. radio frequency
Answer:
Radio signal vs. microwave signal.
Explanation:
it's the suitable but again it's a weak answer to compare analog from digital signals
Answer:
Electric pulses vs. electronic devices
Explanation:
edg2021
direct quote from AV notes: "Analog technology transmits information using electric pulses. The human voice is the best example of analog communication. As the telephone was the major communication channel in the past, analog communication was common and the only type used.
Today, we depend on digital communication. Digital technology breaks down information into numerical bits and transmits the bits to digital receivers that decode the bits and recompose the original information. "
PLZ HELP THIS ENDS TODAY
During slide show mode, hitting the B key will do which of these?
End your presentation
Blank the screen with black screen
Move back one page
Move to the first page of your presentation
Answer:
B or Period. Pressing the B key or period key pauses the slideshow and displays a black screen, which you can write on. Press the B or period key again to resume the slideshow.
Answer: It blanks the screen black.
You should use the arrow keys.
Explanation:
I tried it.
Several key people were involved in programming-language development in the 1970s and 1980s
Answer:
Brian Kernighan and Dennis Ritchie created the C programming language, and Bjarne Stroustrup took it to the next level by creating C++ in the 80's.
Answer:
Bjarne Stroustrup released C++ programming language in the1980s.
Bill Gates and Paul Allen released the first programming language for a personal computer.
Niklaus Wirth developed Pascal to teach programming.
Explanation:
1,3,4
A company has a hybrid ASP.NET Web API application that is based on a software as a service (SaaS) offering.Users report general issues with the data. You advise the company to implement live monitoring and use ad hoc queries on stored JSON data. You also advise the company to set up smart alerting to detect anomalies in the data.You need to recommend a solution to set up smart alerting.What should you recommend?A. Azure Security Center and Azure Data Lake StoreB. Azure Data Lake Analytics and Azure Monitor LogsC. Azure Application Insights and Azure Monitor LogsD. Azure Site Recovery and Azure Monitor Logs
Answer: B. Azure Data Lake Analytics and Azure Monitor Logs
Explanation:
There is a feature on Azure Monitor called Application Insights. This feature offers clients the ability to implement live monitoring of applications as well as detect anomalies.
With its analytics tools, clients can diagnose the issues reported by users as well as follow and understand the activities of users.
What skills, knowledge, and strengths do you feel you bring to the FlexPath program?
Answer:
The answer is below
Explanation:
Skills: Problem-solving skills, Great attention to details skills
Knowledge: Computer Literacy, Mathematical and Statistical skills
Strength: highly disciplined and well determined.
Hence, I understand that I possess all the aforelisted skills, knowledge, and strength, that would assist me during the Flexpath program.
This will make me excel and complete the required courses with good grades.
Your organization uses a federated identity provider to login to your Oracle Cloud Infrastructure (OCI) environment. As a developer, you are writing a script to automate some operation and want to use OCI CLI to do that. Your security team doesn't allow storing private keys on local machines. How can you authenticate with OCI CLI?
Answer:
Run OCI session authenticate and provide your credentials
Explanation:
The OCI CLI when in combination with a shell script can be fastly used in the creation of shareable scripts. It uses API keys, private and public scheme as it's default authentication. The command to use is the oci set up keys, to create these keys. Since you cannot store private keys, you run OCI authentication and then you give your credentials
do you agree or disagree with the assertion that edutech transforms teachung and learning
Answer:I agree!
Explanation:
Agree
In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to see what is actually going on in memory. Show the values of str1, str2, and str3 and the output after each line of code on a piece of paper.
Answer:
The memory with variable names str1, str2, and str3 all have equal and the same value after the first if-statement.
Explanation:
The str1 was first assigned a null value while the str2 and str3 were assigned the string value "Karen" with the String class and directly respectively. On the first if-statement, the condition checks if the str1 is null and assigns the value of the variable str2 to str1, then the other conditional statement compares the values of all the string variables.