By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a ________ resource that can be configured and controlled by an upper layer control plane.

Answers

Answer 1

Answer:

Virtual

By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a Virtual resource that can be configured and controlled by an upper layer control plane.

Explanation:

The separating data plane (SDN) is used by users to hide the specifics of a device data layer so that all devices would be treated equally thereby representing the entire data plane as a  virtual abstract layer thus enhancing network efficiency.

The SDN work mainly on the Control and data plane separating both of the planes. Also, the SDN make networks more agile and flexible.

SDN provides the flexibility to view the entire data plane infrastructure as a

virtual resource that can be configured and controlled by an upper layer

control plane.

Answer 2

The type of resource which makes use of SDN to control an upper layer control plane is known as:

Virtual  

Based on the given question, we are asked to state the type of resource which makes use of SDN to control an upper layer control plane and how it is viewed for it it function effectively.

With this in mind, we can see that this can only be effectively done with a virtual resource so that the separating data plane can be effective in hiding the device data layer and test the other variables.

Read more about virtual resource here:

https://brainly.com/question/2680845


Related Questions

apply the fade transition with smoothly effect to all slides in the presentation​

Answers

Answer:

12

Explanation:

its very long answer so that it is that

You plan on taking a five-part exam, each part worth 50 points. The maximum
score is measured in the
A. ones
B. tens
C. hundreds D. thousands

Answers

Answer:

okk I will do

Explanation:

mark me as brainliest and follow and like my answer

a is the correct answer of this question

Write a function that reads from a file the name and the weight of each person in pounds and calculates the equivalent weight in kilograms. Output the Name, weightLB, and weightKG in that order. Format your output to two decimal places. (1 kilogram

Answers

Answer:

#include <iostream>

#include <fstream>

#include <iomanip>

using namespace std;

int main(){

   string name;

   double weightKg, weightPd;

   cout<< fixed << setprecision(2);

   fstream myFile("filename.txt");

   while (getline( myFlie, name, weightPd)){

       weightKg = weight * 0.453592;

       cout<< name << weightPd <<weightKg;

   }

   myFile.close();

}

Explanation:

The C++ source code reads in the content of a file that has a name and weight value in pounds and outputs the name, weight in pounds and the weight in kilograms.

Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD television, fitness watch, or microwave oven. Pick one specific device and discuss how well its interface is designed and how easy it is to use. Does the device use the same techniques as computer system interfaces, such as menus and icons

Answers

Answer:

Explanation:

Different technologies use different user interface designs in order to make the user experience as easy and intuitive as possible. This varies drastically from one device to another because of the capabilities and size of each device. If we take a fitness/smart watch into consideration, this device does not use pop up menus or side scrolling menus but instead uses large full screen menus where each option nearly fills the entire screen. That is done because the smart watch screens are very small and making everything full screen makes reading and swiping through options that much easier for the user. If the user interface were the same as in a television or smartphone it would be impossible to navigate through the different options on such a tiny screen.

why media is far from government​

Answers

Answer:

An independent media means that no one should control and influence its coverage of news. Media is far from independent, this is because of control of government over them. Government prevents some news items, scenes from a movie, or lyrics of songs from being shared with larger public, this is called as censorship.

hope it helps

pls mark as brainliest.....

An independent media means that no one should control and influence its coverage of news. Media is far from independent, this is because of control of government over them. Government prevents some news items, scenes from a movie, or lyrics of songs from being shared with larger public, this is called as censorship.

Users access servers located on a server VLAN and servers located in departmental VLANs. Users are located in the departmental VLAN. What is the expected traffic flow from users to servers

Answers

Answer:

Most of the traffic will have to be multilayer switched.

Explanation:

This is often referred to when a layer 3 switch is seen to add tons of flexibility to a network. As seen in in the above VLAN connection, it serves as a switch to connect devices found on same subnet a lightning speed and are seen also to posses IP routing intelligence which is seen as a doubling up built in it which serves as a router. It seen in most cases to support routing protocools, inspect incoming packages and most times checking sources and destination addresses which are been worked with.

You're typing up a document and come across the word sentient. You don't believe the readers of the document will know the meaning of the word, and you would like to substitute another word that's more common. What Word feature would you use to assist you in selecting a different word?

Answers

You would use a software tool that looks up the synonyms such as The Thesaurus

You would use a software tool that looks up the synonyms such as The Thesaurus.

What are the application?

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

A networking software can be defined as a set of executable instructions (codes) that is typically designed and developed to instruct a networking device on how to perform a specific task or transmit data from one location to another.

System software has software that has been intended to serve as the foundation for other software. The Operating systems like the macOS, Linux, Android, and the Microsoft Windows are the examples of the system software, as are computational science software, game engines, search engines, industrial automation, and software as a service applications.

Therefore, You would use a software tool that looks up the synonyms such as The Thesaurus.

Learn more about software on:

https://brainly.com/question/892475

#SPJ3

Draw the tree that results when you add the values 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 to each of the following initially empty trees Binary search tree 2-3 tree 2-4 tree Red-black tree

Answers

Answer:

What exactly are you asking?

Explanation:

Please don't report me, I'll edit my answer once I know the question

We see that the  black height of a node is the number of black nodes on the path from the node to the root of the tree.

What is a Binary search tree?

The B\\binary search tree is described as rooted binary tree data structure with the key of each internal node being greater than all the keys in the respective node's left subtree and less than the ones in its right subtree.

A unique variety of self-balancing binary search tree is the red-black tree has the  following characteristics:

Any node's left subtree is shorter than the node itself.Any node's right subtree is bigger than the node itself.Each and every node has the same black height.

Binary search tree for 2-3 tree: is shown below:

   10

  /  \

 20   40

/  \  / \

30  50 60  70

Binary search tree for 2-4 tree is shown below:

   30

  /  \

 20   50

 / \   / \

10  40 60  70

/ \  / \  / \

80 90 100

Binary search tree for Red-black tree:

   20(R)

  /  \

 /    \

10(B)    30(R)

 /  \   /  \

40(B)  60(B)  70(B)

/ \  / \  / \

80(B) 90(B) 100(B)

Learn more about Binary search tree  at:

https://brainly.com/question/30391092

#SPJ2

Is there anything you should be doing and / or do better at home to make sure your computer is always clean and running efficiently?

Answers

Answer:

Using the proper computer equipment and regularly performing a few small maintenance activities will help to keep your computer running smoothly and efficiently.

Organize your installation disks

Protect Your Computer Equipment from Power Surges. ...

Defragment Your Hard Drive. ...

Check Your Hard Disk for Errors. ...

Backup Your Data.

Update everything

Clean up your software.

Run antivirus and spyware scans regularly.

Explanation:

Write a public member function removeRandom that removes a random element from the ArrayBag. This method should also return a boolean indicating whether an element was actually removed

Answers

Answer:

Explanation:

The following code is written in Java. It is a function that takes in the ArrayList called ArrayBag as a parameter and randomly removes one of the elements in the ArrayList. As long as the ArrayBag has at least 1 element it will return true otherwise it will return false.

public static boolean removeRandom(ArrayList ArrayBag) {

               Random rand = new Random();

               

               if (ArrayBag.size() > 0) {

                       int randomNumber = rand.nextInt(ArrayBag.size());

                       ArrayBag.remove(randomNumber);

                       return true;

               } else {

                       return false;

               }

       }

Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?

Answers

Answer:

I need to consider my topic, my audience, the purpose of my presentation, and my method for giving it.

Explanation:

This is the sample response

The things you should consider when making a multimedia presentation are a text, images, audio, video, and animation.

What is a multimedia presentation?

A multimedia instructional message is a presentation of words and images that are intended to promote meaningful learning. Multimedia displays facilitate faster greedy of ideas and concepts than what simple oratory reasons can hope to achieve.

As a result, multimedia-based completely coaching reduces the cost of training sessions while improving the overall quality of such classes.

Multimedia is prevalent in our lives today because when we connect and communicate with more than one medium, we use multiple of our senses. The use of a variety of creative or communicative media such as this facilitates making an idea or presentation sparkle and exciting, as well as providing more insight.

Therefore, When creating a multimedia presentation, you should consider the text, images, audio, video, and animation.

To learn more about the multimedia presentation, refer to the below link:

https://brainly.com/question/27800459

#SPJ2

. Write an interrupt driven program that uses Port H pin 0 to detect an interrupt and multiply PORTB by 2 if the interrupt request is generated. IRQ should be asserted at falling edge. Write main program as well as ISR.

Answers

Problem-1. Write an interrupt driven program that uses Port H pin 0 to detect an interrupt and multiply PORTB by 2 if the interrupt request is generated. IRQ should be asserted at falling edge. Write main program as well as ISR. (15 points)

Write a class called Dragon. A Dragon should have a name, a level, and a boolean variable, canBreatheFire, indicating whether or not the dragon can breathe fire. The class should have getter methods for all of these variables- getName, getLevel, and isFireBreather, respectively. Dragon will alsomeed a constructor, a method to gain experience, and a method to attack. The constructor should take the name as the first argument and the level as the second argument. The constructor should initialize canBreatheFire based on the dragon's level. If the dragon is level 70 or higher, the dragon can breathe fire (meaning the third member variable should be set to true). You should create three getter (accessor) methods called getNameO getLevelO,and isFireBreatherO You should also create a method called attackO. This method does not return anything. If the dragon can breathe fire, it should print >>>999 1 public class Dragon private String name; private int level; private boolean canBreatheFire; 4 7 // Write the constructor here! public String getName(name) 9 10 return name; 12 13 14 - 15 public int getLevel(level) return level; 16 17 /Put getters here 18 19 20 21 221/ String representation of the object 23 24 - 25 26 27 3 28 // Put other methods here public String toStringO return "Dragon+ name +" is at level "+ level; 1 public class DragonTester extends ConsoleProgram 2 4 6 public void runCO // Start here! 7

Answers

Answer:

public class Dragon {

private String name;

private int level;

private boolean canBreatheFire;

public Dragon(String name,int level){

this.name=name;

this.level=level;

if(level>=70) {

this.canBreatheFire=true;

}

}

public String getName() {

return name;

}

public int getLevel() {

return level;

}

public boolean getCanBreatheFire() {

return canBreatheFire;

}

public void attack() {

if(getCanBreatheFire()) {

System.out.println(">>> 999");

}else {

System.out.println("Dragon does not have fire breath.");

}

}

public void gainExperience() {

level += 5;

}

public String toString() {

return "Dragon "+ name + " is at level "+ level;

}

Explanation:

The Java program above is a class called Dragon. An object instance of the dragon class has a name and level class variable. The level is used to determine the Boolean value of the canBreathFire class variable. The variables can be retrieved with the getter methods and the level updates by the experience method.

You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number of CRC errors displayed. What are the most likely causes

Answers

Answer:

Collision or electromagnetic interference (EMI)

Explanation:

Some network cables connected to switch or router ports are prone to internal collision (between two frames or packets) and external collision with electromagnetic waves from other sources (EMI).

Electromagnetic waves are also known as radio waves or signals. When they are transmitted, the network cable acts as a receiver, the received signal interferes with the packet in the cable. This is why the cyclic redundancy check (CRC) throws an error.

the best presentations try to include as much text as possible on each slide true or false ​

Answers

true is answered of that question

Please NEED HELP ASAP WILL MARK BRAINLIEST ONLY #8

Answers

Answer:

I think its A

Explanation:

Emma wants an artificial intelligence system with limited information on botony to identify a type of plant from an image. which challenge of artificial intelligence is Emma likely to face in the situation . Emma is likely to face the challenge of *blank* complexity

Answers

Answer:

It focuses on one task and has no self awareness

What are some of the ways we can resolve IPv4 address shortages? Check all that apply.

Answers

Answer:

I am not as close to the network as I used to be but I have not seen articles about the network apocalypse due to IPv4 address depletion. Unlike in the late 90’s when predictions of apocalypse were everywhere.

What happened?

Two things:

Network address translation (NAT) was introduced to allow organizations to use private addresses on their internal network and minimize the requirement for “real” IP4 addresses.

Second, IPv6 was created and introduced to expand the number of addresses available.

So, a direct answer is use IPv6 and/or NAT for internal networks.

Explanation:

This finding maximum number function will keep on going until we reach at the last value
[12, 18, 299, 38, 999, 89, 101, 500, 801, 45]

Answers

In which algorithm first the maximum element is found and then placed at the end?
Heapsort algorithm
The Heapsort algorithm involves preparing the list by first turning it into a max heap. The algorithm then repeatedly swaps the first value of the list with the last value, decreasing the range of values considered in the heap operation by one, and sifting the new first value into its position in the heap.

I need help with this its due today ahhhhhhh

Answers

3rd and 4th sentence

1st question just take a hint

In the program below, numA is a
def multiply(numA, numB):
product = numA* numB
return product
answer = multiply(8,2)
print (answer)

parameter

qualifier

accumulator

return value

Answers

Answer:

parameter

Explanation:

In the function 'multiply' you can pass values in that are to be used inside the function. These are called 'parameters' and are in parentheses after the function name.

- A qualifier is a name that adds extra information, such as 'final' to prevent reassignment

- An accumulator is a variable you use to sum up a bunch of values

- A return value is a mechanism to pass the result of a function back to the calling program (into 'answer' in above example).

Write a function called no_you_pick. no_you_pick should have two parameters. The first parameter is a dictionary where the keys are restaurant names and the values are lists of attributes of those restaurants as strings, such as "vegetarian", "vegan", and "gluten-free".
#
#The second parameter is a list of strings representing of necessary attributes of the restaurant you select.
#
#Return a list of restaurants from the dictionary who each contain all the diet restrictions listed in the list, sorted alphabetically. If there are no restaurants that meet all the restrictions, return the string
#"Sorry, no restaurants meet your restrictions". Types of diet restrictions that exist in this question's universe are: vegetarian, vegan, kosher, gluten-free, dairy-free
#
#For example:
#grading_scale = {"blossom": ["vegetarian", "vegan", "kosher", "gluten-free", "dairy-free"], \
# "jacob's pickles": ["vegetarian", "gluten-free"], \
# "sweetgreen": ["vegetarian", "vegan", "gluten-free", "kosher"]}
#guests_diet = ["dairy-free"]
#no_you_pick(grading_scale, guests_diet) -> ["blossom"]


#Write your code here!
def no_you_pick(restaurants, preferred_diet):
result = []
for i in preferred_diet:
for key, value in restaurants.items():
# print(value)
if i in value:
result.append(key)
result.sort()
return result
return "Sorry, no restaurants meet your restrictions"

#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print: blossom
grading_scale = {"blossom": ["vegetarian", "vegan", "kosher", "gluten-free", "dairy-free"], \
"jacob's pickles": ["vegetarian", "gluten-free"], \
"sweetgreen": ["vegetarian", "vegan", "gluten-free", "kosher"]}
guests_diet = ["dairy-free"]
print(no_you_pick(grading_scale, guests_diet))
**My code doesn't seem to work, any help with it I'll really appreciate it!**

Answers

Answer:

...

Explanation:

For two arrays A and B that are already in ascending order, write a program to mingle them into a new array ordered C evenly, the size of C is varied, depending on the values of A and B: the even-indexed (the index starts from 0) elements come from A while odd-indexed elements are from B. For instance, if A is (1,4, 10,12): B is 12.3,10, 11) then the new array C is (1, 2,4,10,12). If a black-box test approach will be used, how many test cases should you design?

Answers

Answer:

def generate_list(listA, listB):

   listC = []

   for item in listA[0::2]:

       listC.append(item)

   for items in listB[1::2]:

     listC.append(items)

   return sorted(listC)

Explanation:

The python program defines a function called generate_list that accepts two list arguments. The return list is the combined list values of both input lists with the even index value from the first list and the odd index value from the second list.

During execution of main(), how many user-defined methods are called? a) public static double calcTax(double cost) { return cost * 0.15; } b) public static double calcShippingCost(double weight) { double cost; if(weight < 10) { cost = 10.0; }else{ cost = 15.5; } cost = cost + calcTax(cost); return cost; } c) public static void main(String args[]) { double cost1; double cost2; cost1 = calcShippingCost(7.5); cost2 = calcShippingCost(17.5); }

Answers

Answer:

b) public static double calcShippingCost(double weight) { double cost; if(weight < 10) { cost = 10.0; }else{ cost = 15.5; } cost = cost + calcTax(cost); return cost; }

The method is called twice with arguments 7.5 and 17.5 respectively.

Explanation:

The Java program defines three user methods including the main. In the main, the calShippingCost method is called twice with 7.5 and 17.5 respectively to return double number values to cost1 and cost2.

What are the correct steps to add the bill using the receipt capture feature in quick books online?

Answers

Answer:

How it Works

The Bill can be imported into QuickBooks in a verity of methods such as drag and drop, browse to upload, email and image upload from a mobile device. The imported data is processed by QuickBooks. In my testing this processing varied depending on the type of document sent but overall, the process was fast, and the Bill was ready to view and categorized within five minutes. There were several pieces of data already extracted from the document which were the data and dollar amount but all other details in my experience needed to be entered.

One thing to not is you can not expense by line items at this time. Instead you can only choose one expenses account per transaction. (if I were a betting girl, I would say this is in the works, but I have no official word on that) However, you can add Classes and Billable Customers.

How to Get Started:

1) From the QBO Navigation Bar choose Banking Center

2) Select the Receipts tab

3) Drag and drop, email or upload a mobile image of the document to QuickBooks (1 file at a time)

4) From the For Review section of the Receipts tab you can see when the document is ready for review

5) QuickBooks extracts, data including date and dollar amount

6) Click on Review in the Action column

7) Select Bill as Document Type (as shown highlighted in the 'red box')

8) Enter the remaining details:

- Enter Payee

- Approve Bill date and enter due date

- Select Account  

- Verify amount total

- Additional Fields (optional)

- Make expenses billable

- Select Customer

- Class

- Add reference number

9) Import into QuickBooks by Saving and Closing

Within, seconds your document is coded and published into QuickBooks as an Open Bill pending payment. Like I said for now all you can add is an account but if you published the document to QBO you could later open it and edit to add required items if necessary.

The last step in optimization is after you have posted the payment to the open bill you will be able to match the bank feeds in QBO if you have already imported your banking activity. This type of audit proofing your bookkeeping helps prevent fraud and assures accuracy.

Hope this helps!! Merry Christmas!! And Happy New Year!!

james creates a piece of artwork that consists of circles and squares. he carefully avoids using random shapes that do not fit into the design. what is james trying to achieve? a. dominance b. harmony c. gradation d. placement e. contrast

Answers

answer:
b.harmony
explanation:
to make it harmonious and neat

Answer:

ITS B

Explanation:

i just know

Dynamic programming does not work if the subproblems: ___________

a. Share resources and thus are not independent
b. Cannot be divided in half
c. Overlap
d. Have to be divided too many times to fit into memory

Answers

Answer:

A. Share resources and thus are not independent

Explanation:

This would be the answer. If this is wrong plz let me know

How would you create a 2D array of Strings called paintSwatches that holds the paint manufacturer, paint color name and the paint collection name (in that order) for each of the 60,000 paint swatches a store carries

Answers

Answer:

String[][] paintSwatches = new String[6000][3];

Explanation:

The two-dimensional array is a data structure that holds and locates data in rows and columns. It is denoted by two square brackets after the data type when declaring the array.

The two-dimensional array "paintSwatches" would have 6000 rows and one column each of paint manufacturer, paint color name and paint collection name (that is, 3 columns).

What is an OS? Explain the objectives of an OS.​

Answers

Answer:

operating systems is a group of computer programs that is responsible for the management and coordination of activities and the sharing of the resources of that computer.

objective

1 to make the computer system convenient and easy to use for the user.

2 to use the computer hardware is a efficient way by handling the details of the operations of the hardware

PLEASE FASTTTTT



Which reasons explain why computer programmers use IDEs? Select all that apply.

An IDE provides an integrated work environment for the programmer.

An IDE writes the code for the programmer.

An IDE helps programmers automate repetitive tasks.

An IDE helps link code.

Answers

Answer:

Integrated work and repetitive tasks

Answer:

A C D

Explanation:

Other Questions
lhasdkjhasdufoidsuhfo8sdhfoiasdhfosadf An angle measures 29.2 less than the measure of its supplementary angle. What is the measure of each angle? Which statement summarizes the implicit message revealed through the subjective narrative voice?a.The colonel murdered his wife.b.Mr. Pontellier believes that the colonel is responsible for his wifes death.c.Societys unfair treatment of women is harmful.d.The colonel was a sensitive and loving husband. Grandma gave 13 pieces of jewelry and grandma fien gave y pieces to the sister to divide evenly among them selves.There are 5 sister HELP PLEASE ASAPI JUST NEED THIS OR IMA FAIL PLS Explore: Find an example of each of the following in the Gizmo:A.An example of no chemical reaction occurring: B.A reaction that produces an acid: C.A reaction that produces a base: D.A reaction that uses a catalyst: frankie can build a speaker box in 120 minutes trash can build a speaker box 40 minutes faster if they work together how many minutes does it take them to build the speaker box Why did Americans desire to gain control ofHawaii? Analysis Outline Template 1. Write your outline using complete sentences.2. Roman numeral I should be your thesis statement in response to the writing prompt. 3.Outline two body paragraphs- 1 paragraph about Kings language and 1 paragraph about Kings structure (Roman numerals II and III) 4. You need to introduce and include at least two pieces of supporting evidence per topic sentence by summarizing, paraphrasing, and/or directly quoting the text (letters A and C). Be sure to cite the paragraph where you get your evidence from!5. Evidence needs to be explained in your sentence outline (letters B and D).6. Remember to use the stop light approach (green = topic sentence, yellow = evidence/example, and red = Alexis reads 1/2 of a short story in five minutes. How many short stories could she read per hour? A prepaid cell phone charges a preset number of minutes to use text messaging. The graph represents y, the number of minutes used for x, the number of text messages sent and received. Is there a direct variation? Which equation represents the relationship?Yes, y = 2x.Yes, y = 20x.No, y = x + 10.No, y = x + 20. 1/7 divided by 2 soon Math Problem, I will mark brainliet thank youu Please please please please please help I need to get this done please In the 19th century, factory workers during the Industrial Revolution faced long hours, unsafe conditions, and little pay. What did some workers form to help bargain with employers for improved pay and working conditions? HELP ASAP!! WILL TRY TO GIVE BRAINLIESTHow are facilitated diffusion and active transport similar and different? A local little league has a total of 75 players, of whom 40 % are right-handed. How many right -handed players are there? What menacing odor does Pax smell when he's bringing part of the ham to Gray?Book Pax Chapters 16-18 Help pls i will give Brainlyest if u helpBtw the answer is not 5 Imagine that you have an ideal gas in a 4.30 L container, and that 1250 molecules of this gas collide with a square-inch area of the container at any given instant. If the volume is increased to 21.5 L at constant temperature, how many collisions will occur per square inch of this larger container