Answer:
IP address and subnet mask.
Explanation:
The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;
I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.
Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.
II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.
A company is completing research and development for software which it is planning to produce in approximately 2 years time. Which of the following assumptions should the company make about the processing speeds of the hardware which will be used to run this software.
Answer:
true tbh I don't really Know
Please help!!! I am very confused about this question!
Explanation:
You mean like Sports Photography - focuses on athletes and coaches
Editoral Photography - focuses on a public story
Architectural Photography- focuses on design of buildings ,etc.
Answer:
Amateur Photography <----> focuses on capturing life events
Advertising Photography <----> focuses on enhancing desirability of products
Editorial Photography <----> focuses on providing visual news
Documentary Photography <----> focuses on social reality
Explanation: I think this should be correct, let me know if it helps :)
Write a program that first gets a list of integers from input. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds).
Answer:
The program in Python is as follows:
mylist = []
num = int(input("Length: "))
for i in range(num):
inp = int(input(": "))
mylist.append(inp)
lower = int(input("Lower Bound: "))
upper = int(input("Upper Bound: "))
for i in mylist:
if i >= lower and i <= upper:
print(i, end=" ")
Explanation:
This initializes an empty list
mylist = []
The prompts the user for length of the list
num = int(input("Length: "))
The following iteration reads input into the list
for i in range(num):
inp = int(input(": "))
mylist.append(inp)
This gets the lower bound of the range
lower = int(input("Lower Bound: "))
This gets the upper bound
upper = int(input("Upper Bound: "))
This iterates through the list
for i in mylist:
This checks for elements of the list within the range
if i >= lower and i <= upper:
This prints the list element
print(i, end=" ")
Answer:input_numbers = [int(x) for x in input().split(' ')]
input_range = [int(x) for x in input().split(' ')]
for number in input_numbers:
if input_range[0] <= number <= input_range[1]:
print('{}'.format(number), end = ' ')
Explanation:
In the range E7:E11, apply the Currency number format with zero decimal places and $ as the symbol.
Answer:
bt wheres the data
Explanation:
To find any information on the Internet, we enter specific keywords into a search engine. What happens next
Answer:
Answer A
Explanation:
_________________ allows cloud controller to locate instances on separate zones to boost redundancy.
Answer:
_____Router___ allows the cloud controller to locate instances on separate zones to boost redundancy.
Explanation:
A router, as a networking device, forwards data packets between one computer network and other networks. With a router, one can use wired and wireless devices to connect to the Internet. Unlike a modem, which connects the home network to a wider internet, a router can enable the networks to interact with one another without using the Internet.
what are the qualities of different products that caught your eye and encourage you to buy them
Answer:
The qualities of different products that caught your eye and encourage you to buy them is described below in detail.
Explanation:
A fantastic method to do this would be to practice shiny colors in any advertisement you publish. This is an old method, but it's a great one. Glowing orange, for example, is sure to hold watching much higher than bland shades like gray. Play throughout here, and apply the color you think illustrates the eye most.
Am giving BRAINLIEST!!!!!!! Assume you have entered the following after a prompt. >>> import time
How would you pause a program for 5 seconds?
Answer:
time.sleep(5)
Explanation:
Write a java program named SumThousand The program adds all the number from 1 to 1000 together and print out the sum
Answer:
The program in Java is as follows:
public class SumThousand {
public static void main(String args[]) {
int sum=0;
for(int i =1;i<=1000;i++)
sum+=i;
System.out.println("Sum = " + sum);
}
}
Explanation:
This initializes sum to 0
int sum=0;
This iterates from 1 to 1000
for(int i =1;i<=1000;i++)
This calculates the required sum
sum+=i;
This prints the calculated sum
System.out.println("Sum = " + sum);
please help me please i really need helpp so i can pass
Answer:
Piezoelectric gauge is used to convert charge into measureable electric signal.
Universal serial bus interface allows a computer and flash drive to exchange information.
Analytical balance is used to measure mass
Ultrasonic flow sensors measure the seed of water using ultrasonic waves.
Explanation:
Analytical balance is used to measure mass. An analytical balance is a device that can measure the mass of an object accurately. It can also measure very small amount of mass with a range between 0.1mg - 0.01mg.
Universal serial bus interface allows a computer and flash drive to exchange information. A Universal Serial Bus (USB) is an interface that allows communication between peripheral devices and a computer. It connects peripheral devices such as mouse, keyboards, printers, scanners, external hard drives and flash drives with the computer.
Piezoelectric gauge is used to convert charge into measureable electric signal. A piezoelectric gauge has a piezoelectric sensor that uses piezoelectric effect to measure changes in pressure, temperature, force and convert these changes into electrical charge.
Ultrasonic flow sensors measure the speed of flowing liquid using ultrasonic waves. It uses sound waves to determine the speed of the liquid.
An external file that can be imported into a slide to give more detailed explanation of the topic would be ____.
Answer:
Video clip
Explanation:
In a Microsoft PowerPoint, a video clip is considered an external file. Asides from the pictures and text presented in the slide for a smooth transition of the message in the PowerPoint document, a video clip can give a more detailed explanation of the topic.
This can be done by clicking the Insert tab from a Menu bar. Then click on the Video tab followed by Movie from the file. Then look for the movie file and click insert.
Write a method that accepts a number of seconds and prints the correct number of hours, minutes, and seconds.
Answer:
This solution is implemented in Java
public static void timme(int seconds) {
int hours = seconds/3600;
System.out.println("Hours: "+hours);
[tex]seconds = seconds - hours * 3600;[/tex]
int minutes = seconds/60;
System.out.println("Minutes: "+minutes);
[tex]seconds = seconds - minutes * 60;[/tex]
System.out.println("Seconds: "+seconds);
}
Explanation:
This method defines the method along with one parameter
public static void timme(int seconds) {
This calculates hours from the seconds
int hours = seconds/3600;
This prints the calculated hours
System.out.println("Hours: "+hours);
This calculates the seconds remaining
[tex]seconds = seconds - hours * 3600;[/tex]
This calculates the minutes from the seconds left
int minutes = seconds/60;
This prints the calculated minutes
System.out.println("Minutes: "+minutes);
This calculates the seconds remaining
[tex]seconds = seconds - minutes * 60;[/tex]
This prints the seconds left
System.out.println("Seconds: "+seconds);
}
Write a method, public static void selectSort(ArrayList list), which implements a selection sort on the ArrayList of Integer objects list. For example, if the parameter list would be printed as [3, 7, 2, 9, 1, 7] before a call to selectSort, it would be printed as [1, 2, 3, 7, 7, 9] after the method call.
Answer:
Explanation:
The following code is written in Java and like asked in the question, it is a function that takes in an ArrayList of Integers as a parameter and uses selection sort to sort the array.
public static void selectSort(ArrayList<Integer> list) {
for (int i = 0; i < list.size() - 1; i++)
{
int index = i;
for (int j = i + 1; j < list.size(); j++){
if (list.get(j) < list.get(index)){
index = j;
}
}
int smallerNumber = list.get(index);
list.set(index, list.get(i));
list.set(i, smallerNumber);
}
}
A drop light that does not allow any electrical parts to come in contact with the outer casing of the device is called a:
Answer:
The right answer is "Double insulated light".
Explanation:
Double insulated led is mostly a sophisticated type of natural light that does not necessitate a terrestrial or planetary correlation. These illuminations could be based on these metals, are indicated in the electrical protection environmental standards that now the construction workers comply with, and therefore are readily accessible about every bedroom.How do you change the order of the slides in your presentation in the slide pane 
Copy and paste
Delete
Drag and drop
Remove
Answer:
Hold down on your slide number and then pull in the order
Explanation:
Remember push down the pull up
If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All computers are electronic devices. Some electronic devices are not made of clay.
Answer:
because the conclusion is not in agreement with the two premises.
Explanation:
Remember, the term syllogism refers to the form of reasoning that draws its conclusion based on the stated premises. In other words, a conclusion is reached if it satisfies all or part of the premises.
In this case, the statement "No computer is made of clay" and "All computers are electronic devices" should be inferred to mean, No electronic devices are made of clay" not "Some electronic devices are not made of clay," since the two premises neither suggest that electronic devices are made from clay.
The reason why the given syllogism is invalid is because; The conclusion does not agree with the premise.
We are given two statements as premises;
1) No computer is made of clay
2) All computers are electronic devices
The third statement is the conclusion which states that;
3) Some electronic devices are not made of clay.
Now in syllogism, the conclusion must be in agreement with the two premises.
In this question, the conclusion doesn't agree with the premises because the conclusion says "some electronic devices are not made of clay". Whereas the premise says that no computer which is an electronic device is made of clay.
Since none of the premise suggests that any electronic device is made of clay, then the syllogism is invalid.
Read more about syllogism at; https://brainly.com/question/1622136
In the 2018-2019 softball season, Allison hit the ball 28 out of 67 times, this included fouls. What was her percentage
of misses?
Answer:
Allison missed 58.21% of the times.
Explanation:
The first step is to divide 28 by 67 to get the answer in decimal form:
28 / 67 = 0.4179
Then, we multiplied the answer from the first step by one hundred to get the answer as a percentage:
0.4179 * 100 = 41.79%
Then 100(%) - 41.79(%) = 58.21%
Timothy is an architect. He needs to create a prototype of a new apartment that his firm is building. Which multimedia software would he use? A. image editing program B. painting program C. animation program D. digital video program E. 3D modeling program
ELO 3.6 Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
Answer:
iSCSI Qualified Name (IQN).
Explanation:
iSCSI is simply an acronym for Internet Small Computer Systems Interface and it is typically an internet protocol (IP) with respect to a storage area network (SAN) standard used essentially for connecting data storage facilities over a transmission control protocol and internet protocol (TCP/IP).
iSCSI Qualified Name (IQN) is a type of iSCSI name that requires a registered domain name to generate a unique iSCSI identifier.
This ultimately implies that, a data storage organization must have a registered domain name in order to be able to generate an iSCSI Qualified Name (IQN). Also, the iSCSI Qualified Name (IQN) is not linked to an internet protocol (IP) address and as such it is considered to be a logical name.
The following program calculates yearly and monthly salary given an hourly wage. The program assumes a work-hours-per-week of 40 and work-weeks-per-year of 50. Insert the correct number in the code below to print a monthly salary. Then run the program. The monthly salary should be 3333.333... .
Answer:
The program implemented in Python is as follows:
hourly=float(input("Hourly Wage: "))
print("Annual Rate: "+str(hourly * 40 * 50))
print("Monthly Rate: "+str(round((hourly * 40 * 50/12),2)))
Explanation:
The question is incomplete as the missing code is not given. However, I've written the program from scratch in python.
This prompts the program user for the hourly Wage;
hourly=float(input("Hourly Wage: "))
This calculates and prints the annual rate
print("Annual Rate: "+str(hourly * 40 * 50))
This calculates and prints the monthly rate
print("Monthly Rate: "+str(round((hourly * 40 * 50/12),2)))
Note:
The annual rate is calculated by multiplying the hourly wage to number of hours per week (40) to number of weeks per year (50)
The monthly rate is calculated by [tex]annual\ rate/12[/tex]
create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.
Answer:
Explanation:
The following code is written in Python and creates a function called create_sentence which takes in 2 parameters which are the number of spaces and the number of stars. Then it uses these values to create the sentence and return it.
def create_sentence(spaces, stars):
sentence = ""
for x in range(spaces):
sentence += " "
for x in range(stars):
sentence += "★"
sentence += "\n"
return sentence
Describe at least two ways social media has impacted cybersecurity.
Answer:
Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.
Disgruntled Employees
While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.
Explanation:
Answer:Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.
Disgruntled Employees
While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business
Explanation:
To bundle links together in order to improve bandwidth availability and redundancy, what protocol is used
Answer:
Link Aggregation Control Protocol
Explanation:
Link Aggregation Control Protocol can be used to assist in the formation of port channel bundles of physical links.
Link Aggregation Control Protocol is an IEEE standard defined in IEEE 802.3ad. LACP lets devices send Link Aggregation Control Protocol Data Units (LACPDUs) to each other to establish a link aggregation connection.
2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s in reverse order. If s is 'top', the expression should evaluate to 'pot'.
Answer:
The program in Python is as follows:
s = input("Three letter string: ")
if(len(s)==3):
print(s[::-1])
else:
print("Invalid length")
Explanation:
This prompts the user for a three-letter string
s = input("Three letter string: ")
The following if condition checks if the length of the string is 3. If yes, it reverses and print the reversed string
if(len(s)==3):
print(s[::-1])
If otherwise, it prints "Invalid length"
else:
print("Invalid length")
What is the software system design to locate information on the World Wide Web
search browser
Search engine
Search keyboard
Search result
Answer:
Search engine
Explanation:
Answer:
search engine
Explanation:
what is the moon in science class?
True or False: Kitchen lighting can be included on a small appliance branch circuit.. Single line text.
Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size.
Answer:
The solution in Python is as follows:
class myClass:
def doubleUp(self,doubleList):
doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]
newlist = []
n = int(input("Number of elements: "))
for i in range(n):
num = int(input(": "))
newlist.append(num)
list = myClass()
list.doubleUp(newlist)
print(newlist)
Explanation:
Start by creating a class
The solution in Python is as follows:
class myClass:
Then define the method doubleUp
def doubleUp(self,doubleList):
The duplicates is done here
doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]
The program main begins here
This defines an empty list
newlist = []
This prompts user for number of elements
n = int(input("Number of elements: "))
The following iteration get the elements of the list
for i in range(n):
num = int(input(": "))
newlist.append(num)
This defines the instance of the class
list = myClass()
This calls the method
list.doubleUp(newlist)
Lastly, this prints the duplicate list
print(newlist)
How important "saving" in every individual?
Answer:
The importance of saving money is simple: It allows you to enjoy greater security in your life. If you have cash set aside for emergencies, you have a fallback should something unexpected happen. And, if you have savings set aside for discretionary expenses, you may be able to take risks or try new things.
What job does a back-end developer perform?
O Evaluates a computer systems vulnerabilities and weaknesses
O Handles what happens behind the scenes on websites
Handles what users see and experience on websites
O Writes code for video games
Answer:
Handles what happens behind the scenes on websites
Explanation:
The website back end is made up of server, an application, and a database. The back-end developer builds and coordinate these components together. Back end developers manage the technical side of the websites (that is what the users do not see on the website).
The back end developer needs to know how to program using PHP, java, Python, Ruby, as well as use tools such as MySQL, Oracle, and SQL Server.