You have just used a command that produced some interesting output on the screen. You would like to save that information into a file named "interesting.txt", which does not currently exist. You can do this by issuing the same command, but appending which of the following?
A. > interesting.txt
B.
C. interesting.txt
D. | interesting.txt

Answers

Answer 1

Answer: A. > interesting.txt

Explanation: From the command line, one can perform numerous tasks from navigating into a directory, creating a new directory, deleting files, create files, modify files and so on using simple commands. In the scenario above, after using a common which is used to produce an output on the screen, such as the 'echo' command, one may wish to save the file giving the user the ability to access the file later. Since it is stated the file name 'interesting.txt' given to the file does not currently exist, appending the sign > saves the file. If the filename already exists, it will overwrite the existing content.


Related Questions

You have arranged some directories and files as follows:
/home/yourLoginName/
docs/
a.txt
b.txt
assts/
cs150/
a0.cpp
cs250/
adata
a1.h
a1.cpp
a2.h
a2.cpp
You have just issued the command:
cd ~/assts/cs150
Which of the following are valid ways to copy all of the header files from the cs250 directory into the cs150 directory?
a) cp ../cs250/* ../cs150
b) cp ../cs250 cs150
c) cp ../cs250/*.? .
d) cp ../cs250/*.* cs150
e) cp ../cs250/*.h cs150
f) cp ../cs250/*.h .

Answers

Answer:

The answer is "Option a and Option f"

Explanation:

In the given question option a and option f is correct because both commands use the "cp" command, which is used to copy files and in this command, in option a, it uses the file "from cs250 to cs150", and an option "f" uses the "cs250 with '.h' that is a file extension", and the wrong choice can be defined as follows:

In choice b, it is wrong because it is not a correct command. In choice c, in this command we use "?" symbol, that is wrong.   In choice d and e both were invalid.  

Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to another variable call z. Use z for adding 30 into it and print the final result by using variable results.

Answers

Answer:

a = int(input("Enter first value between 1 - 10"))

b = int(input("Enter second value between 1 - 10"))

z = a + b

z += 30

print("The value of z = ", z)

Explanation:

The code is written above in python language to perform the given task.

Now, let us explain each statement of code.

Step 1: The first two lines take input from the user prompting the user to enter the values between 1 to 10.

Then the values are type casted to int using int().

The values are stored in variables a and b.

Step 2: Then, the values of a and b are added to get another variable z.

Step 3: The statement 'z += 30' is equivalent to z = z+30

It adds 30 to the variable z and stores it in the same variable z.

Step 4: Finally the value of variable 'z' is printed using print() command.

Referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relationships.
a) true
b) false

Answers

Answer:

a) true

Explanation:

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

Referential integrity is a property of data which states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.

For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid.

Hence, referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relationships.

This ultimately implies that, referential Integrity are rules used in database management systems (DBMS) to ensure relationships between tables when records are changed is VALID (INSERT and UPDATE).

In a nutshell, it always ensures a primary key must have a matching foreign key or it becomes null.

In this exercise we have to analyze the integrity that some constraints have, so the alternative that best matches is;

True

In Computer plan out, uprightness constraints maybe delineate as a set of standard rules that guarantee kind information and collection of data happen uphold. Basically, skilled are four (4) types of completeness restraint and these exist;

Key constraints. Domain constraints. Entity integrity constraints. Referential integrity constraints.

Referential honor exist a property of information in visible form that states that each irrelevant key value must equal a basic key profit in another family connection or the from another country key profit must be ineffectual.

For instance, when a experience transfer data from one computer system to another Table A points to the basic key of Table B, in accordance with the referential purity restraint, all the worth of the from another country transfer data from one computer system to another Table A must exist valueless or counterpart the basic transfer data from one computer system to another Table B.

Hence, the referential Integrity restraint make secure that the relationship middle from two points the information in visible form in a table exist compatible and right. Hence, referential integrity restraint exist concerned with restrain INSERT and UPDATE movement that influence the parent very young person connection.

This eventually indicate that, referential Integrity are rules secondhand fashionable collection of data management structure (DBMS) to make secure friendship middle from two points tables when records are transformed exist VALID (INSERT and UPDATE). In a nutshell, it forever ensures a basic key must bear a equal foreign key or it enhance ineffectual.

See more about integrity at brainly.com/question/14406733

The final step of the decision-making model is to make your decision and take action.​

Answers

Answer:

No, it is not the final step in decision-making model. It is rather the penultimate stage of the model of decision making.

Explanation:

The final step of the decision-making model is reviewing your decision and its consequences. The decision-making model has total of 7 steps. One should follow these all the steps to make it error free and more efficient then it rather would have been when the decision was made without following it.

The very first step of this model is to identify the decision. And it is one of the most important steps to be followed to avoid any error.  

When working at a retail store that also fixes computers, what five pieces of information should you request when a customer first brings a computer to your counter?

Answers

Answer:

From where did you purchase the computer?

How old is it?

What is the issue that you are facing?

Did you get it repaired before or is it the first time?

By what time do you want it to be repaired?

Did you get any of its parts replaced before?

Being a Java developer what do you think, "Would multi-threading play a vital role in maintaining concurrency for efficient and fast transactions of ATM or will slow down the ATM services by making it more complicated?”.

Answers

Answer:

No

Explanation:

Mutli-threading allows for various tasks to run simultaneously this can increase speeds but it would not play a vital role in maintaining concurrency for efficient and fast transactions of ATM. That being said this is not the most important aspect of ATM services, that would be Robustness and provable correctness and these two factors are much easier to achieve using a single-threaded solution.

When using IPsec, how can you ensure that each computer uses its own private key pair?

Answers

Answer:

By using digital certificates.

Explanation: Digital certificate are used for the following:

1) Digital certificates are used in public key cryptography functions; they are most commonly used for initializing secure SSL connections between web browsers and web servers.

2) Digital certificates can also be used for sharing keys to be used for public key encryption and authentication of digital signatures.

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output with input: 10 in high school

Answers

Answer:

Here is the expression:

user_grade = 10 #assigns 10 to the value of user_grade

if user_grade >=9 and user_grade <=12:  #checks if the user_grade is between 9 and 12 inclusive

   print('in high school')  # prints in high school if above condition is true

else:  #if user_grade is not between 9 and 12 inclusive

   print('not in high school') # prints not in high school if user_grade is not between 9 and 12 inclusive

This can also be written as:

user_grade = 10  # assigns 10 to user_grade

if 9<=user_grade<=12:  #if statement checks if user_grade is between 9 and 12 inclusive

   print('in high school')  #displays this message when above if condition is true

else:  #when above if condition evaluates to false

   print('not in high school')#displays this message

Explanation:

If you want to take the user_grade from user as input then:

user_grade = int(input("Enter user grade: "))

if user_grade >=9 and user_grade <=12:

   print('in high school')

else:

   print('not in high school')

The expression

if user_grade >=9 and user_grade <=12:  

contains an if statement that checks a condition that can either evaluate to true or false. So the if condition above checks if the value of user_grade is between 9 and 12 inclusive.

Here the relational operator >= is used to determine that user_grade is greater than or equals to 9. relational operator <= is used to determine that user_grade is less than or equals to 12.

The logical operator and is used so both user_grade >=9 and user_grade <=12 should hold true for the if condition to evaluate to true. This means the user_grade should be between 9 and 12 (inclusive).

For example is user_grade = 10 then this condition evaluates to true as 10 is between 9 and 12 (inclusive). Hence the message: in high school is displayed on output screen.

But if user_grade= 13 then this condition evaluates to false because 13 is greater than 12. Hence the message: not in high school is displayed on output screen.

If user_grade = 8 then this condition evaluates to false because 8 is less than 9. Notice here that 8 is less than 12 so one part of the condition is true i.e. user_grade <=12 but we are using logical operator and so both the parts/expressions of the if condition should evaluate to true. This is why this condition evaluates to false. Hence the message: not in high school is displayed on output screen.

The screenshot of program and its output is attached.

Following are the program to the given question:

Program Explanation:

Include header file.Defining the main method.Defining an integer variable "user_grade" that inputs the value from the user-end.In the next step, a conditional statement is declared that checks the input value within "9 to 12", if the value is true it will use a print method that prints the user input value with a message.Otherwise, it will print the value with the message.

Program:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   int user_grade;//defining integer variable user_grade

   cin>>user_grade;//input user_grade value

   if(user_grade>9 && user_grade<12)//defining if block that check input value is between 9 to 12

   {

       cout<<user_grade<<" in high school";//print value with message

   }

   else//else block

   {

       cout<<"not in high school";//print value with message

   }

   return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/16904233

Tanya is working on a science project with three other people. They are having a difficult time coordinating their schedules, but it's important they all meet to discuss their roles and responsibilities. What communication technology would be most efficient? Cloud computing Emailing Social networking Web conferencing

Answers

Answer:

Web Conferencing

Explanation:

you'd be speaking to them face to face

"Confrontation"

They rlly won't have an excuse and will just have to face it and take more responsibility

Which complaints was stated by some Strategic Defense Initiative Organization (SDIO) board members about the software of the Strategic Defense Initiative (SDI)?

Answers

Answer:

they complained that it threatened the Mutually assured destruction (MAD) approach.

Explanation:

For example, the Strategic Defense Initiative (SDI) allowed for a swift response if the United Nations came under attack, by deploying ballistic strategic nuclear weapons.

However, the Mutually assured destruction (MAD) approach demanded that there should be restraint in using nuclear weapons, especially when there is a threat of another Nation.

It is a good practice to use 3d to plot a single dimensional data in storytelling.
A. True
B. False

Answers

Answer:

The answer is "Option B".

Explanation:

The 3-dimensional diagrams also known as a 3D graph, it implies to 3D design, which Occasionally receives the 2D data, which effects 3D and It is a terrible form.

The whole additional dimension comes to an end but never more than inserting a chart or its readability could be dramatically affected.It uses the 3D to create a single dimension, but the information is not a great training.

Military members may be subject to dis-honorable discharge for unauthorized disclosure.
A. True
B. False

Answers

Answer:

A. True

Explanation:

A dis-honorable discharge is the process of dis-charging a member of his/ her duties in an humiliating manner after committing a grave offence, especially in military.

A member of military involved in any form of disclosure of unauthorized information can be prosecuted. The accused member will be court martial, and if found guilty of the offence may be sanctioned by being subjected to a dis-honorable discharge.

Print spooler is most common example of _______________.
Buffer
Printer speed
print quality

Answers

Answer: Print spooler is most common example of Print Quality

<marquee>mark me as the brainliest

Print spooler is most common example of: Buffer.

In Computer technologies, an output device can be defined as a hardware device that is designed to typically receive processed data from the central processing unit (CPU) and converts these data into an information that can be used by the end users of a computer system. Some examples of an output device are speaker, monitor, projector, printer, etc.

A printer can be defined as an electronic output device (peripheral) that is designed and developed for printing of paper documents containing texts and images.

Generally, a printer comprises the following components and software resources; paper support, print cover, connectors, output tray, edge guides, sheet feeder, control buttons, ink cartridge clamps, print head, print drivers, print spooler, etc.

A print spooler can be defined as a software application or program installed on a printer to organize, manage and control the paper printing jobs that are being sent to a printer by a computer. Thus, the execution and operation of various print jobs by a printer in printing documents is highly dependent on its print spooler.

A buffer can be defined as a temporary storage area set aside on a computer for data storage. Also, a buffer resides in the random access memory of a computer system.

This ultimately implies that, a print spooler is most common example of a buffer because it stores data, instructions and processes related to print jobs from multiple sources in a queue to sequentially execute them later on.

For more information: https://brainly.com/question/17144282

A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. studylib

Answers

Answer:

Moderate.

Explanation:

A breach of security can be defined as any incident which results in an unauthorized access or privileges to a network, computer, software application, classified informations or data and services. There are three (3) levels of impact on an individual or organization when there's a breach of security; low, moderate and high.

A moderate level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. It causes a serious adverse effect on individuals, employees or organizational assets and operations.

However, in order to prevent a breach of security, it is advisable to use the following programs: firewall, demilitarized zone (DMZ), Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) etc.

Why would you set up a workbook to be shared if you are the only one using the workbook?

a. You can send emails of your edits to yourself.
b. You can track changes.
c. You can make a draft copy of the workbook.
d. You can password protect the workbook.

Answers

Answer:

b. You can track changes.

Explanation:

Setting up a workbook to be shared if you are the only one using the workbook is to enable you track the changes that may occur.

When sharing a workbook, you can allow users gain access to it, make changes and then you easily track those changes.

It makes a team to work simultaneously on the same workbook.

A work book is a file that consists of more than work sheet that helps you to organize A workbook can be created from a blank workbook or a template.

MS excel has a collection of many work books and many worksheets that can help in keeping the track of changes. They are arranged in a network of rectangle cells. In the tabular form of rows and columns.

Hence the option B is correct.

Learn more about the set up of a workbook to be shared if you.

brainly.in/question/20376644.

Which expression correctly determines that String s1 comes before String s2 in lexicographical order

Answers

Options :

A.) s1 < s2

B.) s1 <= s2

C.) s1.compareTo(s2) == −1

D.) s2.compareTo(s1) < 0

E.) s1.compareTo(s2) < 0

Answer: E.) s1.compareTo(s2) < 0

Explanation: Lexicographical ordering simply means the arrangement of strings based on the how the alphabets or letters of the strings appear. It could also be explained as the dictionary ordering principle of words based on the arrangement of the alphabets. In making lexicographical comparison between strings, the compareTo () method may be employed using the format below.

If first string = s1 ; second string = s2

To compare s1 with s2, the format is ;

s1.compareTo(s2) ;

If s1 comes first, that is, before s2, the method returns a negative value, that is a value less than 0 '< 0', which is the case in the question above.

If s2 comes first, that is, before s1, the method returns a positive value, that is a value greater than 0 '> 0'.

If both are s1 and s2 are the same, the output will be 0.

Your team will write a function that reverses a C-string, to practice using pointers. You must use pointers and C-strings for this lab, not string objects. Your program should ask for the user's input, as "Enter the original string: " Then, it should print out the reversed string to the console.

Answers

Answer:

Here is the C++ program:

#include <iostream> //to use input output functions

#include<string.h> // to manipulate strings

using namespace std; //to identify objects like cin cout

void ReverseString(char* original_str){ // function that reverses a C-string

       char* ptr1 = original_str;  // pointer that points to the start of C-string

       char* ptr2 = original_str; // pointer that points to the start of C-string initially

       for (int i = 0; i < strlen(original_str)- 1; i++) {//iterates through the length of the C-string

           ptr2++;} //moves ptr2 to the end of the C-string

       while(ptr1 < ptr2) {// swaps each character of C-string using pointers

               char temp = *ptr1; //declares a temp variable to hold character that *ptr1 points to

               *ptr1 = *ptr2;

               *ptr2 = temp;

               ptr1++; //increments ptr1 moving it forward

               ptr2--;   }} //decrements ptr2 moving it backwards

int main(){ //start of main() function

       char input_str[]="";  /// declare a C-string

       cout<<"Enter original string: "; //prompts user to enter a string

       cin>>input_str; // reads that C-string from user

       ReverseString(input_str); //calls function to revserse the input string

       cout<<"\nReversed string: "<<input_str;} // displays the reversed string

Explanation:

The program has a function ReverseString that takes a C-style string as parameter and reverses the string using pointers.

The ptr1 and ptr2 are pointers that initially point to the beginning of original string.

for (int i = 0; i < strlen(original_str)- 1; i++) this statement has a for loop that iterates through the original string and moves the ptr2 to point at the end or last character of the C-string. strlen() method is used to get the length of the C-string. At each iteration ptr2 moves one time forward until the last character of the C-string is reached.

while(ptr1 < ptr2) statement has a while loop that works as follows:

checks if ptr1 is less than ptr2. This evaluate to true because the index of first character that ptr1 points to is 0 and last character is 5 so 0<5. Hence the statements inside while loop execute which swaps the character of C-string from beginning and end index using ptr1 and ptr2. a temp variable is declated to hold character that *ptr1 points to.

For example

original_string = "xyz" Then temp = *ptr1; stores the character that *ptr1 points to i.e. 'x'

*ptr1 = *ptr2; This statement assigns the character that *ptr2 points to the *ptr1. Basically these pointers are used as indices to the C-string. So this means that the *ptr1 now stores the last character of the C-string that is pointed to by *ptr2. So *ptr1 = 'z'

*ptr2 = temp; This statement assigns the character that temp stores to the *ptr2. We know that temp contains the first character i.e 'x'. So *ptr2 = 'x'      

ptr1++; The ptr1 is incremented to 1. This means it moves one position ahead and now points to the second character of the C-string.

ptr2--; The ptr2 is decremented to 1. This means it moves one position backwards and now points to the second character of the C-string.

Now the while loop breaks because ptr1 < ptr2 condition evaluates to false.

So the original string is reversed using pointers. Hence the output is:

zyx

screenshot of the program along with its output is attached.

"If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard drive." - Microsoft White Paper, July 1999. Is this statement categorically true or just true in most cases

Answers

Answer:

It is  just true in most cases

Explanation:

This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.

Having a physical access is one step closer in some cases but not the only step required .

Which of the following corresponds to the computer interface technology that uses icon, etc?
A. CUI
B. CAI
C. GDI
D. GUI

Answers

Answer:

D) GUI

Explanation:

GUI an acronym for Graphical user interface, is a type of user interface where a user interacts with a computer or an electronic device through the use of graphics. These graphics include icons, images, navigation bars etc.

GUIs use a combination of technologies and devices to create a layout that users can interact with and perform tasks on. This makes it easier for users who do have basic computer skills to utilize.

The most common combination of these elements is the windows, icons, menus and pointer paradigm (WIMP) . GUIs are used in mobile devices, gaming devices, smartphones, MP3 players etc.

Subtract (100000)2 from (111)2 using 1s and 2s complement method of subtraction​

Answers

Answer:

-11001

Explanation:

The following steps are performed in order to perform subtraction of the given binary numbers:

Step 1:

Find 2’s complement of the subtrahend. The subtrahend here is 100000

100000

First take 1's complement of 100000

1's complement is taken by inverting 100000

1's complement of 100000 = 011111

Now takes 2's complement by adding 1 to the result of 1's complement:

011111 + 1 = 100000

2's complement of 100000 = 100000

Step 2:

Add the 2's complement of the subtrahend to the minuend.

The number of bits in the minuend is less than that of subtrahend. Make the number of bits in the minuend equal to that of subtrahend by placing 0s in before minuend. So the minuend 111 becomes:

000111

Now add the 2's complement of 100000 to 000111

   0 0 0 1  1  1

+   1 0 0 0 0 0

    1 0 0 1  1  1

The result of the addition is :

 1 0 0 1  1  1

Step 3:

Since there is no carry over the next step is to take 2's complement of the sum and place negative sign with the result as the result is negative.

sum =   1 0 0 1  1  1

2's complement of sum:

First take 1's complement of 1 0 0 1  1  1

1's complement is taken by inverting 1 0 0 1  1  1

1's complement of 1 0 0 1  1  1 = 0 1 1 0 0 0

Now takes 2's complement by adding 1 to the result of 1's complement:

0 1 1 0 0 0 + 1 = 0 1 1 0 0 1

Now place the minus sign with the result of 2's complement:

- 0 1 1 0 0 1

Hence the subtraction of two binary numbers (100000)₂ and (111)₂  is

(-011001)₂

This can also be written as:

(-11001)₂

what is information processing cycle​

Answers

Answer:

The sequence of events in processing information, which includes:

1) input

2) processing

3) storage and

4) output.

These processes work together and repeat over and over. Input—entering data into the computer. Processing—performing operations on the data.

Explanation:

1. Input: The computer receives data from a user or software. A keyboard, microphone, or other input device can be used as a user's input source.

2. Processing: The computer processes data after it has been received by performing logical comparisons or mathematical calculations as instructed by the user or a program.

3. Output: After processing, data is delivered as output. The speaker, printer, monitor, or other output devices display the output results.

4. Storage: The processed data can be saved by the computer to a storage device for later use.

Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________.

Answers

Options:

(a) ensuring that a system is accessible when needed

(b) defining risk associated with a subject accessing an object

(c) ensuring that a system is not changed by a subject that is not authorized to do so

(d) ensuring that the right information is seen only by subjects that are authorized to see it

Answer:

(c) Ensuring that a system is not changed by a subject that is not authorized to do so.

Explanation:

Access control simply means controlling who accesses a particular data by putting necessary measures in place. The vital components of access control are explained briefly as follows:

Confidentiality: This refers to ensuring that sensitive information are getting to the right people and the right people only. Confidentiality ensures that data or information are getting to those that they are intended. Examples of sensitive information that require confidentiality are

i. Credit card details

ii. Passwords

Integrity: This refers to ensuring that the quality, consistency, accuracy and trustworthiness of an information does not change throughout its time.

It makes sure that data remains the same over a long period of time and in the event that it will be changed, it is not changed by unauthorized subject.

Availability: Just as the name implies, ensures that the data or information is available any time it is needed.

Out of the following three statements, which one is analytical?
Group of answer choices

Sleep deprivation is the term for getting too little sleep.

Scientific studies have shown that even in the short term, sleep deprivation is bad for productivity and people who get too little sleep have a more difficult time learning and retaining information, make poor decisions, and are more likely to have accidents.

If you want to do well in school then you should get enough sleep.

all of these.

Answers

Hi! I hope this helps!
The second option is correct it is more analytical since it uses sources and a more thought out presentation of facts.

Which would a student most likely do in a digital laboratory?
1.conduct an experiment in chemistry
2.take continuing education classes in chemistry
3.look for an out-of-print book about chemistry
4.watch an instructional video about chemistry

Answers

Answer:

a

Explanation:

The student most likely looks for an out-of-print book about chemistry in a digital laboratory. The correct option is 3.

What is a digital laboratory?

A laboratory that has practically all of its activities digitalized includes supply chains, lab systems, employees, and equipment is known as a digital lab.

As a result, the laboratory becomes more intelligent and automated. A network of intellectually curious individuals interested in creating, confirming, and disseminating best practices in digital transformation makes up the Digital Transformation Lab (DT-LAB).

Research, development, and test laboratories are the three distinct categories into which company labs fall. Both basic and practical research is done at research labs.

Therefore, the correct option is 3. Look for an out-of-print book about chemistry.

To learn more about the digital laboratory, visit here:

https://brainly.com/question/12207115

#SPJ6

What will allow you to purchase software without receiving full rights to the program?

Answers

Answer:

i need free points cus i have zero sry

Explanation:

Answer: an end user license agreement or (EULA)

Explanation:

would 2 bits be enough to create a special code for each english vowel

Answers

a single binary digit, either zero or one. byte. 8 bits, can represent positive numbers from 0 to 255. A 1-bit system uses combinations of numbers up to one place value (1). ... There are just two options: 0 or 1. A 2-bit system uses combinations of numbers up to two place values (11). There are four options: 00, 01, 10 and 11.

What is the approximate size of a transistor?
a room
a vacuum tube
a fingernail
billions of times smaller than a fingernail

Answers

Answer:

D

Explanation:

billions of times smaller than a fingernail

Answer:

D

Explanation:Billons times smaller

What is the fastest way to move data over long distances using the internet, for instance across countries or continents to your Amazon S3 bucket?

Answers

Answer:

Assuming you are using the AWS CLI to upload data to s3, there are two optimizations to increase the speed:

1) Parallel chunked uploading, which uploads your (large) file in chunks in parallel.

2) use Amazon S3 Transfer Acceleration

This will upload your file to a nearby CloudFront instance

You can enable this in your CLI configuration file, named config in the .aws folder. Add the following lines:

s3 =

max_concurrent_requests = 20

max_queue_size = 10000

multipart_threshold = 64MB

multipart_chunksize = 16MB

max_bandwidth = 100MB/s

use_accelerate_endpoint = true

addressing_style = path


How SDN is different from a normal network setup?

Answers

Answer:

I hope this is right (one difference)

SDN is software based whereas normal network setup is mostly hardware based

Pls ask me if you want another differrence! :)

PLS MARK AS BRAINLIEST

In the following scenario, which is the least
important criteria in evaluating the technological
device?
A college student needs a laptop that can be used
while commuting on the train and sitting in lecture.
Connectivity
Size
Speed
Storage

Answers

Answer:

Size

Explanation:

Connectivity, they need internet to work.

Speed, they need it to work fast.

Storage, they need space to work.

Size, isn't all that important, unlike the rest.

In the following scenario, the least important criterion in evaluating the technological device is its size. Thus the correct option is B.

What is Laptop?

A laptop is referred to as a portable computer that is easy to carry and performs a similar function to a computer with advanced technology. This is well suitable to use in jobs like traveling as it does not require sitting space like a PC.

In this case, when a college student needs s a laptop that can be used while commuting on the train and sitting in a lecture the least criterion in evaluating the device in size as it is already portable and easy to carry so not required importance.

While evaluating any technological device its speed and storage play a significant role in decision making as it smoothes the operations of the device and performs tasks quickly.

As it is used in train and lectures connectivity also plays a significant role in establishing communication with each other. Therefore, option B is appropriate.

Learn more about Laptop, here:

https://brainly.com/question/13092565


#SPJ6

Other Questions
what does conflict that the speaker experiences in the poem illustrate? fire and ice by Robert Frost A group of friends are playing a board game. As part of the game, each player is given the same number of cards. There are 6 players and 58 cards. How many cards will each player get if each player gets the same number of cards? what is the plural form of sheep? why is it necessary for states to establish their own Constitution? CA downhill skier was able to move 560 meters in 25 seconds. What is the skieanswer to the nearest tenth of a meter per second.)The skier's average speed ism/s Pensacola Inc. exchanged old equipment for new equipment in two exchange transactions. Each transaction has commercial substance.Old Equipment CashBook Value Fair Value ReceivedEquipment A $ 74,000 $ 81,300 $ 11,300 Equipment B $ 61,600 $ 54,800 $ 10,300 For Equipment B, Pensacola would record a gain/(loss) of:________.a. $5,300b. $(6,800)c. $(7,800)d. none of these answer choices are correct What is evolution? Evolution explains how life on Earth diversified. Evolution explains why Earth can support life. Evolution explains how life on Earth began. Evolution explains how fossils form. Which pricing strategy has the advantage of being simple to calculate but has the disadvantage of ignoring demand and competitive conditions please help!! I just started college Serena is the CEO of Pedalo Inc., a publicly traded company. The shareholders want Serena on the board of directors despite her recent appointment as the CEO. This decision of the shareholders is most likely because Serena: Parwin Corporation plans to sell 43,000 units during August. If the company has 18,000 units on hand at the start of the month, and plans to have 19,000 units on hand at the end of the month, how many units must be produced during the month Deena took six final exams and received these scores:65, 72, 79, 86, 93, 100.Fill in the table, assuming the scores are given in thesame order she took the exams.Replace a withReplace b withReplace c withReplace d with An ant walked on the coordinate plane from point A( 3,1) to point B(1,25) by the shortest path. Find y-coordinate of the point where the ant intersected y-axis. a rectangle parking lot has an area of 1775 square meters and a perimeter of 192 meters what is it dimension someone help please! what are the different types of thought What makes an argument convincing? What makes a piece of evidence compelling? What is the value of work for teenagers? What is the value of a college education? You purchased 1,150 shares of stock in Natural Chicken Wings, Inc., at a price of $43.46 per share. Since you purchased the stock, you have received dividends of $1.01 per share. Today, you sold your stock at a price of $46.71 per share. What was your total percentage return on this investment? How many different rays can be named? identify the error and correct it she was the oldest of the two sisters