Answer: Private addresses cannot directly communicate to hosts outside the local subnet.
Explanation:
Automatic Private IP Addressing (APIPA) allows assigning an IP address by a computer system automatically when there's no availability of a Dynamic Host Configuration Protocol (DHCP) server to perform the function.
Since after the configuration of the APIPA, all systems are able to communicate with each other, but there's trouble configuring Internet access, then private addresses cannot directly communicate to hosts outside the local subnet.
write an algorithm and draw a flowchart to count the digits present in the given integer.
Answer:
The algorithm is as follows:
Input number
count = 0
while(number not equal 0)
number = number / 10
count = count + 1
end
Print count
Explanation:
This gets input for the integer number
Input number
This initializes count of digits to 0
count = 0
The following loop is repeated while number is not 0
while(number not equal 0)
This performs integer division of the number by 10; the resulting division is saved in variable number
number = number / 10
The count variable is incremented by 1
count = count + 1
The loop ends here
end
This prints the count of integers
Print count
See attachment for flowchart
Marcia is using the software program Slack. What is she most likely using it for at work?
Answer:
Communicating with collegues.
Explanation:
Marica is probably using slack for communicating with colleagues as slack has great features for work and organizations. It is most popular and reccomended for organizations and schools/colleges.
I hope for your success!
Write a pseudocode to calculate the factorial of a number
Answer:
Answer CODE from C# Sharp Language
Explanation:
using System;
namespace test
{
class Program
{
public void silnia()
{
decimal liczba;
decimal silnia = 1;
Console.WriteLine("Obliczanie Silni ");
Console.WriteLine("Podaj liczbę: ");
liczba = Convert.ToInt32(System.Console.ReadLine());
//liczba = int.Parse(Console.ReadLine());
for (int i = 1; i <= liczba; i++)
silnia *= i;
Console.WriteLine("Wynik Silni Wynosi : " +silnia +" \n ");
}
static Program ćwiczeniaA;
static void Main(string[] args)
{
ćwiczeniaA = new Program();
ćwiczeniaA.silnia();
Console.WriteLine("Koniec Programu");
System.Console.ReadLine();
}
}
}
Deb needs to add borders on the cells and around the table she has inserted into her Word document.
Where should she go to achieve this?
Insert tab, Tables group
Table Tools Design contextual tab
Home tab, Page Layout
Home tab, Format group
Answer:
Answer: B) Table Tools Design , contextual tab
Explanation:
Answer:
B
Explanation:
EDGE 2021
what are the other way of getting website static
Answer:
Explanation: Jekyll. Jekyll is far and away the most popular static site generator. ...
Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites
and Hugo
I hope this help =D
Answer:
Ten Static Website Generators
Jekyll. Jekyll is far and away the most popular static site generator. ...
Hexo. Hexo is a build tool created with nodeJS, which allows for super speedy rendering, even with extremely large sites. ...
Hugo. ...
Octopress. ...
Pelican. ...
Brunch. ...
Middleman. ...
Metalsmith.
1 which of the following tool is used to remove the area that is common to both when the parts of two objects are connected in inkscape
a union
b difference
c group
d duplicate
2 which of the following is a tool used to combine parts of images together to make them a unit in inkscape
a group
b ungroup
c mask
c false
which of the following tool is used to be to align texts according to the path of an object in inkscape
a test and font
b put and path
c object to path
d convert to text
Answer:
1. group
2. false
3. put and path
the term that orders data numerally or alphabetically is called
5 QUESTIONS, BRAINLIEST, PLEASE ANSWER
Question 1(Multiple Choice Worth 5 points)
(03.01 MC)
Cheri's teacher told her to write a program that prompts the user for information. Which function should she use?
input()
int()
main()
print()
Question 2(Multiple Choice Worth 5 points)
(03.01 LC)
In programming, what is a string?
A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)
Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use?
float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 MC)
Which line of code will only allow a non-decimal point to be stored in a variable?
candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)
Which function converts the user's input to a number with a decimal?
float()
int()
print()
string()
Answer:
1. Input() is the correct answer
2.Most programming languages have a data type called a string, which is used for data values that are made up of ordered sequences of characters, such as "hello world". A string can contain any sequence of characters, visible or invisible, and characters may be repeated. ... A string can be a constant or variable .
3.The int() function converts the specified value into an integer number.
4.CandyCost = int(input("How much is the candy?"))
5.int()
ANSWERS
Answer:
Cheri's should use input()
A way to store a sequence of letters, numbers, or symbols
Jabari hould use float()
Which function converts the user's input to a number with a decimal it is float()
candyCost = input("How much is the candy?")
Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of perfect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square of another integer (in this case 3*3, 4*4, 5*5, 6*6 respectively).) Associate the number you compute with the variable q. For example, if k and m had the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36,.
PYTHON CODING
Answer:
import math
def isPerfectSquare(n):
s = int(math.sqrt(n))
return n == s*s
def countPerfectSquares(k,m):
q = 0
for i in range(k,m):
if isPerfectSquare(i):
q=q+1
return q
print(countPerfectSquares(10,40))
Explanation:
Note that this is including the k, but excluding m. If you want to include m, write m+1 in the range expression.
Matthew is a computer technician and it is important to have a storage that contains all of his necessary tools. What kind of storage BOX would that be
Tool box
Hope this helps! :)
why is computer system maintenance important
Answer:
Because it helps your computer to have better performance and last longer
Explanation:
State the feature of a database management system that prints data in a specified format with a title.
Answer:
Data structuring
A DBMS is a database management system that is responsible for the software packages made for manipulating, retrieval, and managing the data in the DB.
DB generally manipulates the data itself on the basis of field names and file structure. It has multiuser access and provides a high level of security. It is a network database and network and has an object-oriented database.Hence the format with a title would be data structuring.
Learn more about the database management system that prints.
brainly.com/question/22486925.
Draw an electic bettle and label 3.
Explanation:
hope it helps thank you❤
En la 4ta revolución industrial se caracteriza con 3 procesos de aprendizaje o criterios, los cuales son:
Explanation:
-Uso de herramientas digitales
-La inteligencia artificial
-El análisis de datos para formar personas altamente competitivas
When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibility falls on you, as the client company?
Answer:
Software as a service (SaaS) platform would give the client company the responsibility of offering applications over the internet, develop, host, and update the product.
Explanation:
Salesforce is an example of Software as a service (SaaS), offering applications for businesses over the internet.
Software as a Service (SaaS) uses the cloud to host web-based apps and make them available to users over the internet, eliminating the need for users to install and maintain application software. Users only access this service with an internet connection and a web browser.
If an if- else statement is true, it will include which kinds of results?
In an if...else statement, if the code in the parenthesis of the if statement is true, the code inside its brackets is executed. But if the statement inside the parenthesis is false, all the code within the else statement's brackets is executed instead.
Of course, the example above isn't very useful in this case because true always evaluates to true. Here's another that's a bit more practical:
#include <stdio.h>
int main(void) {
int n = 2;
if(n == 3) { // comparing n with 3 printf("Statement is True!\n");
}
else { // if the first condition is not true, come to this block of code
printf("Statement is False!\n"); } return 0;
}
Output:
Statement is False!
All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages
Answer:
hard copy attachments
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).
An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.
The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.
However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.
In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the unshielded twisted pair patch cable runs 75 feet from the wall outlet and then passes through the ceiling and over several florescent light fixtures before reaching the client system.
Which of the following is the MOST likely cause of the connectivity problem?
A. Crosstalk.
B. EMI interference.
C. Failed patch cable.
D. The UTP cable does not support transmission distances of 75 feet without signal regeneration.
E. Attenuation.
Answer:
D. The UTP cable does not support transmission distances of 75 feet without signal regeneration.
is the most likely cause of the connectivity problem.
Explanation:
hope it will help you
whats the answer :)?
i will give brainslist
Answer:
Transmission medium is the answer
Write a HTML code for displaying the following
i need an answer urgently
Answer:
Following are the code to the given question:
Explanation:
<html>
<body>
<p align="center" >VOCATIONAL SUBJECT</p>
<table align="center" border="2">
<tr>
<td rowspan="2">YEAR</td>
<td colspan="5">Vocational course</td>
</tr>
<tr>
<td rowspan="1">IT</td>
<td rowspan="1">CS</td>
<td rowspan="1">EL</td>
</tr>
<tr>
<td colspan="1">2016</td>
<td colspan="1">66</td>
<td colspan="1">68</td>
<td colspan="1">60</td>
</tr>
<tr>
<td colspan="1">2017</td>
<td colspan="1">77</td>
<td colspan="1">78</td>
<td colspan="1">80</td>
</tr>
<tr>
<td colspan="1">2018</td>
<td colspan="1">60</td>
<td colspan="1">67</td>
<td colspan="1">70</td>
</tr>
</table>
</body>
</html>
Write the correct word to complete the sentence:
According to ................., Bolster the Giant terrorised the people of Cornwall.
Answer:
Legend
Explanation:
In English language, a legend can be defined as a traditional narrative or story that is written about a particular person or past events and it's likely to either be a myth or historical facts. Thus, a legend is sometimes an unrealistic story or narration that describe a particular person or an extraordinary event that occured in the past. Also, it's a story about a particular figure, past human events or actions whose origin is unknown, unproven and undocumented in real history
Additionally, the word "legend" was derived from the Latin word "legendus" which simply means something which should be read.
Hence, the most appropriate word to complete the sentence is a legend because there are no proven and documented or written records about how Bolster the Giant terrorised the people of Cornwall. Thus, the complete mythical sentence is then written as;
"According to legend, Bolster the Giant terrorised the people of Cornwall."
how do you simplify
[tex] \frac{ \sin(90 - \alpha ) \times \tan( - \alpha ) \times \cos( \alpha - 180) }{ \ \cos(100) \sin(135?) } [/tex]
Answer:
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]
Explanation:
The given expression is presented as follows;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})}[/tex]
The sine, cosine, and tangent of the common angles are given as follows;
sin(A - B) = sin(A)·cos(B) - cos(A)·sin(B)
∴ sin(90° - α) = sin(90°)·cos(α) - cos(90°)·sin(α) = cos(α)
tan(-α) = -tan(α)
cos(A - B) = cos(A)·cos(B) + sin(A)·sin(B)
∴ cos(α - 180°) = cos(α)·cos(180°) + sin(α)·sin(180°) = -cos(α)
sin(135°) = sin(90° + 45°) = sin(90°)·cos(45°) + sin(45°)·cos(90°) = cos(45°) = √2/2
Therefore, we get;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times -cos( 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{cos( \alpha) \times -tan (\alpha) \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}}[/tex]
[tex]\dfrac{cos( \alpha) \times -\dfrac{sin(\alpha)}{cos(\alpha)} \times -cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) \times \dfrac{\sqrt{2} }{2}} = \dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) }[/tex]
[tex]\dfrac{2}{\sqrt{2} } \times \dfrac{sin( \alpha) \times cos(\alpha )}{cos(100^{\circ}) } = \dfrac{sin(2 \times \alpha) }{\sqrt{2} \times cos(100^{\circ}) }[/tex]
Therefore;
[tex]\dfrac{sin(90^{\circ} - \alpha) \times tan (-\alpha) \times cos(\alpha - 180^{\circ})}{cos(100^{\circ}) \times sin(135 ^{\circ})} = \dfrac{\sqrt{2} \times sin(2 \times \alpha) }{2 \times cos(100^{\circ}) }[/tex]
Describe how serial data access finds data
Answer:
Serial data access will go through all the data by order until the target data is reached
Explanation:
This is opposite of direct data access which immediately finds the desired
data
Answer:
Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.
...
Examples of storage medium that use serial access are:
Video cassettes.
Music cassettes.
Backup tape cartridges(hold lots of tape for backing up large amounts of data)
What is a header row?
O the title of a document when it is centered
O the top row of a table that shows titles for the cells below
O the bottom row in a table that shows sums of numbers in cells
O the hidden space at the top of each page
Please help ASAP taking unit test
Answer:
b. the top row of a table that shows titles for the cells below
Explanation:
A header row is the first row of a given table that shows titles of the cells below it. In many cases, the header row has different styles from the other rows in the table. A header row can be found in, among others, both Microsoft's Excel and Word applications.
In the attached figure, the first row with a darker shade of background color is the header row for the table.
How to fix my pc from this
Answer:
Restart it
Explanation:
Answer:
break it and throw it away
Explanation:
cuz why not
Identify characteristics of object-oriented programming design. Choose all that apply
-It breaks the solution into independent objects.
-it is a simple, uncomplicated approach to programming.
-It uses objects that send data to other objects.
-It supports a modular design that encourages the reuse of code.
Answer:
It breaks the solution into independent objects
It supports a modular design that encourages the reuse of code
Explanation:
Object-Oriented programming (OOP) is a programming language type that makes use objects and classes in its construct. With object-oriented programming software is structured as classes which are both reusable and simple code blueprints used for the creation of instances of the objects of the program
An object oriented program design breaks the solution of the problem the program is solving into independent objects, such that the objects are made of classes which are modular and reusable code
Therefore, the correct options are;
It breaks the solution into independent objects
It supports a modular design that encourages the reuse of code
Answer:
all expect b
Explanation:
Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.
Answer:
NIST SP 800 30
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.
This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.
Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.
Question 10 :In a word processor, you can use the Word Count function to:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt 1 to alt 9. A count the number of images and animations in a document. B count the number of index entries in a document. C count the number of lines and paragraphs in a document. D count the number of primary and secondary headers in a document.
Answer:
C. count the number of lines and paragraphs in a document.
Explanation:
A word processor or word processing software application is a type of software designed to enable its users type, format and save text-based documents such as .docx, .txt, and .doc files. Some examples of a word processor are Microsoft Word, Notepad, Sublime text, etc.
In Microsoft Word, the number of words and pages you type in a document are automatically counted and displayed on the status bar at the left-bottom of the workspace.
Basically, you can use the Word Count function of a word processor to count the number of lines, pages, words, characters, and paragraphs in a text-based document.
Soluciónes tecnológicas cáseras para combatir los rezagos del corona virus
ayuda porfa
pongo corona
Explanation:
Los cielos: se están enviando drones para responder al brote en todo el país. Desde patrullar los pasillos con altavoces que advierten a los residentes que usen máscaras, hasta pasar por las calles con carteles de códigos QR que los conductores pueden escanear con sus teléfonos para registrar información médica; Los drones permiten a las autoridades obtener información más rápido y, al mismo tiempo, mantener una distancia segura mientras realizan sus funciones. Los drones agrícolas también están rociando desinfectantes en áreas remotas, mientras que otros se han utilizado para entregar suministros médicos cruciales. Los drones utilizados para rociar desinfectante en las calles de la ciudad son 5 veces más eficientes que la pulverización manual 3. Nuestros teléfonos: los teléfonos inteligentes desempeñan un papel fundamental en la reducción de la exposición. Las aplicaciones de entrega ofrecen entrega sin contacto, mediante la cual los conductores dejan la comida en un punto específico, incluida una tarjeta que indica la temperatura de todos los involucrados en cocinar y entregar la comida. Otro ofrece a los usuarios mapas que marcan comunidades residenciales con casos confirmados y su proximidad a ellos. Mientras tanto, las aplicaciones de pago móvil están reduciendo la transmisión a través del papel moneda, que puede transportar virus hasta por 17 días. Con la penetración más alta del mundo de billeteras electrónicas y dos de los pagos móviles más grandes del mundo, la tecnología china está ayudando a frenar la propagación del coronavirus.
Enfermeras robotizadas y diagnósticos de inteligencia artificial: los robots también se utilizan en muchos hospitales chinos para entregar alimentos, medicamentos y otros suministros a los pacientes; desinfectar hospitales y otras áreas públicas; para controlar la temperatura de los pacientes; y para responder preguntas comunes. El coronavirus se diagnostica mediante IA, que puede leer miles de tomografías computarizadas en 20 segundos con una tasa de precisión del 96%.
What is machine level language ?
Explanation:
The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.