Answer:
c. Mobile hotspot
Explanation:
A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection
Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal
So the mobile hotspot should be used to provide internet service to the group.
What do you mean by Bandwidth? Pls give full explanation
Answer:
In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.
Explanation:
The application layer process that sends mail uses __________. When a client sends email, the client process connects with a server process on well-known port __________. A client retrieves email, however, using one of two application layer protocols: ________ or ________. With ________, mail is downloaded from the server to the client and then deleted on the server. The server starts the __________ service by passively listening on TCP port __________ for client connection requests. However, when a client connects to ta server running __________, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.
Answer:
1. SMTP.
2. 25.
3. POP.
4. IMAP.
5. POP.
6. POP.
7. 110.
8. IMAP-capable server.
Explanation:
The application layer process that sends mail uses Simple Mail Transfer Protocol (SMTP). When a client sends email, the client process connects with a server process on well-known port 25. A client retrieves email, however, using one of two application layer protocols: Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). With POP, mail is downloaded from the server to the client and then deleted on the server. The server starts the POP service by passively listening on TCP port 110 for client connection requests. However, when a client connects to a server running IMAP, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.
A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function
Answer:
"Transport" is the correct answer.
Explanation:
Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.So that the above would be the correct approach.
Assume that the Measurable interface is defined with a static sum method that computes the sum of the Measurable objects passed in as an array, and that BankAccount implements the Measurableinterface. Also assume that there is a variable branchAccounts that is an object reference to a populated array of BankAccount objects for a bank branch. Which of the following represents a correct invocation of the sum method to find the total balance of all accounts at the branch?
A) Arrays.sum(branchAccounts)
B) Measurable.sum(branchAccounts)
C) BankAccount.sum(branchAccounts)
D) branchAccounts.sum()
Answer:
B) Measurable.sum (branchAccounts)
Explanation:
The user interface which can be built by adding components to a panel. The sum method that will be used to find total balance of all accounts at branch is measurable.sum, this will layout the sum of specified branch account total. The measurable interface implements public class bank account as measurable sum.
write a python program to calculate the compound interest
Answer:
initialPrincipal = float(input("Please enter your initial principal:"))
interestRate = float(input("Please enter your interest rate:"))
timePeriod = float(input("Please enter your number of times interest applied per time period:"))
elapsedPeriod = float(input("Please enter your number of time period elapsed:"))
finalAmount = initialPrincipal*(1 + interestRate/timePeriod)^(timePeriod*elapsedPeriod)
print("Your final amount would be:", finalAmount)
Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for writing programming code. They are usually strong problem-solvers. They spend most of their work hours running experiments in a laboratory. They must hold advanced degrees in computer science.
Answer:
First two statements: yes. Last two: not so much.
But many of the better ones do have advanced degrees, but some don't.
The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.
It should be noted that statements are true about software engineers are;
They are responsible for writing programming code. They are usually strong problem-solvers.Software engineering can be regarded as branch of computer science which is responsible for the development as well as the building of computer softwares, these could be applications software or system software.
The engineers that carry out this process is referred to as software engineers and they are responsible for responsible for writing programming code.
We can conclude that software engineers are strong problem-solvers.
Learn more about software engineer at:https://brainly.com/question/25757629
Select the correct answer. In which area is composing for games similar to composing for movies?
A. royalties earned
B. success of song-based soundtracks
C. usage of audio software for mixing and editing
D. spotting sessions
Answer:
c
Explanation:
cuz im jus right
Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque
Answer:
c.) stack
Explanation:
Answer:
the answer is c stack not only dose stack make the most since but i also got it right on edge 2020
Explanation:
IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID
Answer:
Following are the answer to this question.
Explanation:
It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.
What steps are needed for word to create an index
Answer:
Do this:
Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...
Click the References tab.
In the Index group, click the Insert Index button. The Index dialog box appears. ...
Click the OK button to insert the index into your document.
Answer:
Position the insertion pointer where you want the index to appear.
(the insertion point is the point where the next characters typed from the keyboard will appear)
If you want the index to start on a new page, create a new page in the program you're using
Then you click the References tab.
In the Index group, click the Insert Index button.
When the Index dialog box appears, click the OK button to insert the index into your document.
________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes
Answer:
Web 2.0
Explanation:
The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.
You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?
Answer:
Reset the router by holding down the reset button for 30 seconds. The reset button can be located in the back or bottom area of the router. The function of the reset button is to turn restore the wireless router to default factory setting such that customized settings including the DNS, the static IP address setup, stored personal passwords DHCP parameter settings port forwarding and routing settings are erased.
Explanation:
Which are characteristics of pseudocode? Select all that apply.
O helps in working out inputs and outputs of the solution
used in modeling the solution
presents algorithms informally, such as in English
presented in the programming language
Answer:
A,B,C
Explanation:
if your computer is gliching what do you do to stop it and some times it turnes off what do you do
Answer:
You can take it to the shop to fix it since it happens often ig
Explanation:
I Hope This Helps bro
An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential
Answer:
d . commercial potential
Explanation:
The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.
This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.
Your computer science teacher asks you to sample a black and white image that is 4" x 6". How would you sample the image to provide a good digital approximation using the pixelation widget? What sample size would you use? How would your decision affect the digital representation?
Answer:
The largest dimensions we can make of an image with the pixelation widget is 255*255.
When an image is resized, the number of pixels in the image may be reduced or increased, which causes the image to be resampled. Resampling changes the file size.
Explanation: This is all I could find. I hope its helps Sorry.
The sample size that would provide a good digital approx. will be 255 x 255
When resizing images using the pixelation widget, the pixels of the image will either reduce or increase and the reduction/increase in the pixels will have an effect ( blurry effect ) on the image when viewed by the user. also
when an image is resized the size of original size is either larger or smaller than the resampled image.
Hence to provide a good digital approx. using the pixelation widget from an image 4" x 6" is by using a sample size of 255 x 255
Note : A picture showing the effect of pixelation is attached below
learn more : https://brainly.com/question/19038576
How are the waterfall and agile methods of software development similar?
Both methods allow project teams to complete small portions of the entire project in small sprints and work on different steps simultaneously.
Both methods focus on development rather than planning, in order for project teams to work more quickly.
Both methods have project teams work on one step at a time and move on when the previous step is completed and approved.
Both methods require documentation so project teams stay on track and keep control over what version of the project they are working on.
Answer:
In the question "first and last", that is "option 1 and 4" is correct.
Explanation:
In the given question the numbering of the choices is missing. if we numbering the choices, then the first choice is on the 1 number, the second choice is in 2 and so on, in which the correct and the wrong choice can be defined as follows:
In point 1, Both method, it divides the project into small parts, at it the working is easy, that's why it is correct. In point 4, Both method, it requires the documentation, that's why it tracks the project. In point 2 and 3, both were wrong because it focuses on both development and planning, and in Waterfall when one part is complete then it will go on the next part, but in the Agile, it does not use this technique.You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules will you most likely need for this motherboard? A. DIP B. SIMM C. DIMM D. SODIMM
Answer:
The answer is "Option C"
Explanation:
The term DIMM stands for the Dual In-Line Memory Module, which is a kind of memory, that is used in computers. It is a small board of flash memory that uses the 64-bit memory bus because the SIMM has only a 32-bit path. It enables DIMMs to simultaneously transfer more information, and the wrong choices can be defined as follows:
In choice A, It is used in sockets, that's why it is wrong. In choice B, It is wrong because it is used in 32 bits only. In choice D, It is wrong because it is used in the expansion of memory.Which of the following is considered information? a. A single keystroke b. All the characters on a keyboard c. An individual test score d. Average of a series of test scores
Answer:
The correct option is;
d. Average of a series of test scores
Explanation:
Information is defined as the knowledge or news which has been sent by one person and received by another such as the reply for a request for the current weather at a specific geographical location
Information is data that has been interpreted, processed, organised, put into a structured and presented within a given context that can be intelligible, meaningful and useful to people.
What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom
Answer:
The correct option is;
D.) Zoom
Explanation:
The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera
The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.
Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.
Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing
Answer:
Testing
Explanation:
From the question, we understand that Carlos just finished the coding of the app.
In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;
This stage is an integral part of the implementation process and according to the question, the coding has been completed;
The next phase or stage after the implementation phase is testing.
Hence, Carlos is getting ready to test the app.
Answer:
Testing I took the test I definetly testing <3
You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge
Answer:
The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".
Explanation:
The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.
In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.
Answer:
The statement to this question can be defined as follows:
*strike_Counter =*strike_Counter +22;//adds value 22 in *strike_Counter
Explanation:
In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.
In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.
for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.
Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod
Answer:
FOR i% = 1 TO 100
IF ((i%\3) = i%/3) AND ((i%\7) = i%/7) THEN
PRINT i%
END IF
NEXT i%
Explanation:
Of course using MOD would be cleaner, but another way to check if a number is integer divisable is to compare the outcome of an integer division to the outcome of a floating-point division. If they are equal, the division is an integer division.
The program outputs:
21
42
63
84
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to
Answer:
Tell about an experience with a computer virus.
Explanation:
Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.
In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.
Thus, the correct answer is the first option.
Answer:
b
Explanation:
What are the Typical application
of mini computer
Answer:
calls, messages, photos, emails
Explanation:
as in mobile phones
Answer:Minicomputers are used for scientific and engineering computations, business-transaction processing, file handling, and database management, and are often now referred to as small or midsize servers.
Explanation:
When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database
Answer:
Database
Explanation:
Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.
in object oriented programming what is a constructor?
a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object
Answer:
The answer is A.
Answer:
A. the attributes that allow a programmer to imagine a new object
Explanation:
Got the answer right on the test!
What features in Excel are the same as in Word?
What features are differ?
Answer:
Following are the difference and similarity between word and Excel:
Explanation:
The similarity in word and excel:
The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the Spreadsheet (tablet program). In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.The difference in word and excel:
In a word, it includes an application for text processing, and excel would be used for the tablet program. The word is used to create documents like assignments file data files, while excel is being used for the manipulation of numbers by mathematical equations.Discuss three ways in which errors can arise in developing and executing linear optimization models in business situations, and indicate some of the business consequences of such errors. Explain how analytics professionals can help to prevent such errors.
Answer:
The following are the three-way, in which errors arise and, the process to solve them.
Explanation:
The mistake is something you did, that could not be incorrect. It may consider errors when creating and implementing simulation models in business situations because of some procedure problems. It is not because of bemusement and a few of the other error types were also acceptable even though the correction is affordable.
Type 1 error: This type of error arises due to limited accuracy issues, in this the gadgets or devices used for the simulation study, quantitative measurements. These errors Often simplified in expectations. It is a concept for analysis, in which experts firstly understand this kind of mistake. Type 2 error: These errors may occur due to inaccuracy. If another analytic method behaves differently for two analysts. It tends to cause errors, that are unrecognized by no pre-defined methods for fixing those errors. Type 3 error: These issues can be reduced by the improper selection of software, and in the implementation period, it can consider this sort of error due to the failure of system integration tools.