A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Wh are MOST likley the causes of this issue?

Answers

Answer 1

Answer: is this a real question but I think it would be Ip address hope this helps :)))

Explanation:


Related Questions

you are installing two new hard drives into your network attached storage device your director asks that they be put into a raid solution that offers redundndancy over performance which would you use

Answers

Question options:

a. RAID 0

b. RAID 1

c. RAID 5

d. RAID 6

e. RAID 10

Answer:

d. RAID 6

Explanation:

RAID is Redundant Array of Inexpensive/Independent Disks. RAID combines low cost physical hard disk drives in one hard disk drive. RAID is used to achieve data redundancy(data backup but with synchronization) or improved performance or both.

To get what the director requires he would need to use RAID 6. RAID 6 is RAID level optimized to achieve data redundancy but with slow performance.

It is common for people to name directories as dir1, dir2, and so on. When there are ten or more directories, the operating system displays them in dictionary order, as dir1, dir10, dir11, dir12, dir2, dir3, and so on. That is irritating, and it is easy to fix. Provide a comparator that compares strings that end in digit sequences in a way that makes sense to a human. First compare the part before the digit as strings, and then compare the numeric values of the digits.
Your program should work with the provided test program
DirectorySortDemo.java.
Call the class you write DirectoryComparator.java.
Submit the two files in your submission.
DirectoryComparator.java
DirectorySortDemo.java
import java.util.ArrayList;
import java.util.Arrays;
import java.util.collections;
public class DirectorySortDemo
{
public static void main (String [] args)
{
String dirNames ("dir12", "dir5", "dir9", "dirl", "dir4",
"lab10", "1ab2", "lab7", "lab17", "lab8",
"quiz8", "quiz10", "quiz11", "quiz12",
"dirll", "dir8", "dir7", "dir15", "dir3");
ArrayList directories = new
ArrayList<> (Arrays.asList (dirNames));
System.out.println ("Unsorted List:");
System.out.println (directories);
Collections.sort (directories, new DirectoryComparator ());
System.out.println ():
System.out-println ("Sorted List: ");
System.out.-println (directories);

Answers

Answer:

Here the code is given as follows,

Explanation:

what its the difference between Arduinos and Assembler?

Answers

Answer:

The Arduino boards can be programmed in assembly. All you need is an ICSP Cable (In Circuit Serial Programmer) and the AVR toolchain (free from ATMEL) to write to the board. You then get the advantage of on board debugging.

As you suggested, you can just slap an ATMEL chip on a breadboard and go to town.

Explanation: cause i said so

The subroutines/function calls you need to call to pass an application message down to the transport layer is called the

Answers

Answer:

"TCP/IP library" is the appropriate answer.

Explanation:

A communications protocol that always connects to yet another system or device and guarantees transmissions were also correctly converted to digital signals or received, is termed as TCP/IP.Technology can also do a variety of things on its own and. However, when you speak among each other devices' maximum throttle emerges.

Your dashboard should show the sum and average as two separate columns. If you use measure names as the column field, what should you use for the marks

Answers

Answer:

Hence the answer is a sum.

Explanation:

Here the statement shows that the dashboard should show the sum and average as two separate columns if we name measure names because the column field then for marks we'll use the sum. Since the sum displays the sum of the values of all the fields, which refers to the marks of the person.

Therefore the answer is a sum.

If we use measure names as the column field, we should use "the sum".

A set of cells that are support equipment on about a similar vertical line, is considered as a column.

Usually, the name of the user or a client represents a field column, while the total and sometimes even averaging columns in our dashboards or screen are different.When using a summation of total summary, perhaps the column field (title), as well as its amount and averaging marking, are indicated.

The preceding reply is thus right.

Learn more:

https://brainly.com/question/17271202

A small company with 100 computers has hired you to install a local area network. All of the users perform functions like email, browsing and Office software. In addition, 25 of them also do a large number of client/server requests into a database system. Which local area network operating system would you recommend?

Answers

Answer:

Answer to the following question is as follows;

Explanation:

Windows 7 for 100 users and Windows 8.1 for 25 users are the best options since they both enable networking and active directory, and Windows 8.1 also offers Windows server capabilities.

Winxp would therefore work for $100, but it is unsupported and has no updates.

If you wish to go with open source, you can choose Ubuntu 16 or 18 or Linux.

I need the SQL statements for these questions:
1. For each reservation, list the reservation ID, trip ID, customer number, and customer last name. Order the results by customer last name.
2. For each reservation for customer Ryan Goff, list the reservation ID, trip ID, and number of persons.
3. List the trip name of each trip that has Miles Abrams as a guide.
4. List the trip name of each trip that has the type Biking and that has Rita Boyers as a guide.
5. For each reservation that has a trip date of July 23, 2016, list the customer’s last name, the trip name, and the start location.
6. List the reservation ID, trip ID, and trip date for reservations for a trip in Maine (ME). Use the IN operator in your query.
7. Repeat Exercise 6, but this time use the EXISTS operator in your query.
8. Find the guide last name and guide first name of all guides who can lead a paddling trip. (Note: The query results should include duplicate values.)
Here are the tables:
CUSTOMER FIRST NAME POSTAL CODE CUSTOMER NUM LAST NAME ADDRESS Northfold Liam 9 Old Mill Rd Londonderry 10 NH 03053 103 Kasuma Sujata 132 Main St. #1 East Hartford CT 06108 MA 01854 Goff 164A South Bend Rd. Lowell Ryan 105 McLean Kyle 345 Lower Ave. Wolcott NY 14590 106 Morontoia Joseph 156 Scholar St Johnston 02919 107 Marchand Quinn 76 Cross Rd Bath NH 03740 108 32 Sheep stop St Edinboro PA Rulf Usch 16412 109 Caron Jean Luc 10 Greenfield St Rome ME 04963 110 Martha York Bers 65 Granite St NY 14592 112 Jones Laura 373 Highland Ave. Somerville MA 02143 115 Nu Adam 1282 Ocean Walk Ocean City Vaccari 08226 116 Murakami Iris 7 Cherry Blossom St. Weymouth MA 02188 119 Londonderry vT Chau 18 Ark Ledge Ln Clement 05148 120 Gernowski Sadie 24 stump Rd. Athens ME 04912 121 Cambridge VT Bretton-Borak Siam 10 Old Main St 122 Hefferson orlagh 132 South St. Apt 27 Manchester NH 03101 123 25 Stag Rd Fairfield Barnett Larry 06824 124 Busa Karen 12 Foster St. South Windsor CT 06074 125 51 Fredrick St Albion Peterson Becca NY 14411 126 Brown Brianne 154 Central St Vernon CT 06066 PHONE Click to Add 603-555-7563 413-555-3212 860-555-0703 781-555-8423 585-555-5321 401-555-4848 603-555-0456 814-555-5521 207-555-9643 585-555-0111 857-555-6258 609-555-5231 617-555-6665 802-555-3096 207-555-4507 802-555-3443 603-555-3476 860-555-9876 857-555-5532. 585-555-0900 860-555-3234

Answers

Answer:

Explanation:

/* From the information provided, For now will consider the name of table as TRIPGUIDES*/

/*In all the answers below, the syntax is based on Oracle SQL. In case of usage of other database queries, answer may vary to some extent*/

1.

Select R.Reservation_ID, R.Trip_ID , C.Customer_Num,C.Last_Name from Reservation R, Customer C where C.Customer_Num=R.Customer_Num ORDER BY C.Last_Name

/*idea is to select the join the two tables by comparing customer_id field in two tables as it is the only field which is common and then print the desired result later ordering by last name to get the results in sorted order*/

2.

Select R.Reservation_ID, R.Trip_ID , R.NUM_PERSONS from Reservation R, Customer C where C.Customer_Num=R.Customer_Num and C.LAST_NAME='Goff' and C.FIRST_NAME='Ryan'

/*Here, the explaination will be similar to the first query. Choose the desired columns from the tables, and join the two tables by equating the common field

*/

3.

Select T.TRIP_NAME from TRIP T,GUIDE G,TRIPGUIDES TG where T.TRIP_ID=TG.TRIP_ID and TG.GUIDE_NUM=G.GUIDE_NUM and G.LAST_NAME='Abrams' and G.FIRST_NAME='Miles'

/*

Here,we choose three tables TRIP,GUIDE and TRIPGUIDES. Here we selected those trips where we have guides as Miles Abrms in the GUIDES table and equated Trip_id from TRIPGUIDES to TRIP.TRIP_Name so that can have the desired results

*/

4.

Select T.TRIP_NAME

from TRIP T,TRIPGUIDES TG ,G.GUIDE

where T.TRIP_ID=TG.TRIP_ID and T.TYPE='Biking' and TG.GUIDE_NUM=G.GUIDE_NUM and G.LAST_NAME='Boyers' and G.FIRST_NAME='Rita'

/*

In the above question, we first selected the trip name from trip table. To put the condition we first make sure that all the three tables are connected properly. In order to do so, we have equated Guide_nums in guide and tripguides. and also equated trip_id in tripguides and trip. Then we equated names from guide tables and type from trip table for the desired results.

*/

5.

SELECT C.LAST_NAME , T.TRIP_NAME , T.START_LOCATION FROM CUSTOMER C, TRIP T, RESERVATION R WHERE R.TRIP_DATE='2016-07-23' AND T.TRIP_ID=R.TRIP_ID AND C.CUSTOMER_NUM=R.CUSTOMER_NUM

/*

The explaination for this one will be equivalent to the previous question where we just equated the desired columns where we equiated the desired columns in respective fields and also equated the common entities like trip ids and customer ids so that can join tables properly

*/

/*The comparison of dates in SQL depends on the format in which they are stored. In the upper case if the

dates are stored in the format as YYYY-MM-DD, then the above query mentioned will work. In case dates are stored in the form of a string then the following query will work.

SELECT C.LAST_NAME , T.TRIP_NAME , T.START_LOCATION FROM CUSTOMER C, TRIP T, RESERVATION R WHERE R.TRIP_DATE='7/23/2016' AND T.TRIP_ID=R.TRIP_ID AND C.CUSTOMER_NUM=R.CUSTOMER_NUM

*/

6.

Select R.RESERVATION_ID, R.TRIP_ID,R.TRIP_DATE FROM RESERVATION R WHERE R.TRIP_ID IN

{SELECT TRIP_ID FROM TRIP T WHERE STATE='ME'}

/*

In the above question, we firstly extracted all the trip id's which are having locations as maine. Now we have the list of all the trip_id's that have location maine. Now we just need to extract the reservation ids for the same which can be trivally done by simply using the in clause stating print all the tuples whose id's are there in the list of inner query. Remember, IN always checks in the set of values.

*/

7.

Select R.RESERVATION_ID, R.TRIP_ID,R.TRIP_DATE FROM RESERVATION WHERE

EXISTS {SELECT TRIP_ID FROM TRIP T WHERE STATE='ME' and R.TRIP_ID=T.TRIP_ID}

/*

Unlike IN, Exist returns either true or false based on existance of any tuple in the condition provided. In the question above, firstly we checked for the possibilities if there is a trip in state ME and TRIP_IDs are common. Then we selected reservation ID, trip ID and Trip dates for all queries that returns true for inner query

*/

8.

SELECT G.LAST_NAME,G.FIRST_NAME FROM GUIDE WHERE G.GUIDE_NUM IN

{

SELECT DISTINCT TG.GUIDE_NUM FROM TRIPGUIDES TG WHERE TG.TRIPID IN {

SELECT T.TRIP_ID FROM TRIP T WHERE T.TYPE='Paddling'

}

}

/*

We have used here double nested IN queries. Firstly we selected all the trips which had paddling type (from the inner most queries). Using the same, we get the list of guides,(basically got the list of guide_numbers) of all the guides eds which were on trips with trip id we got from the inner most queries. Now that we have all the guide_Nums that were on trip with type paddling, we can simply use the query select last name and first name of all the guides which are having guide nums in the list returned by middle query.

*/

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance. True False

Answers

Answer:

True

Explanation:

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance.

Write the name of test for the given scenario. Justify your answer.

The input values are entered according to the output values. If the results are ok then software is also fine but if results does not matched the input values then means any bugs are found which results the software is not ok. The whole software is checked against one input.

A-Assume you are being hired as a Scrum project Manager. Write down the list of responsibilities you are going to perform.
B-What are the qualifications required to conduct a glass box testing.
C-Write the main reasons of project failure and success according to the 1994 Standish group survey study.
D- Discuss your semester project.

Answers

Answer:

Cevap b okey xx

Explanation:

Sinyorrr

How can an Outlook user search for contacts? Check all that apply.

the Search bar located above the list of contacts
the Search People bar on the Find command group
the Search People located on the People navigation icon
CTL + E to activate the search contacts box
advanced Find under the Search tab
the options menu in the backstage view

Answers

Answer: the Search bar located above the list of contacts.

the Search People bar on the Find command group.

the Search People located on the People navigation icon.

CTL + E to activate the search contacts box.

advanced Find under the Search tab.

Explanation:

An Outlook user can search for contacts through the following ways:

• the Search bar located above the list of contacts.

• the Search People bar on the Find command group.

• the Search People located on the People navigation icon.

• CTL + E to activate the search contacts box.

• advanced Find under the Search tab.

Therefore, the correct options are A, B, C, D and E.

You are between flights at the airport and you want to check your email. Your wireless settings show two options:
a) a free unsecured site called TerminalAir and b) a pay-by-the-hour site called Boingo.
Which one is likely to be the most secure?

Answers

The correct answers Is B


How did the military in the early 1900s move resources?
engines.
In the early 1900s, military moved their resources to distant locations with the help of

Answers

Answer:

In the early 1900s, military moved their resources to distant locations with the help of trains, ships, and, to a lesser extent, horse-drawn wagons. This was so because at that time airplanes did not yet exist, capable of transporting inputs to any part of the world in a very short period of time. Therefore, inputs and resources were brought by sea and, if impossible, through land, using railways or highways.

Eureka! Is a telephone and Internet-based concierge service that specializes in obtaining things that are hard to find (e.g., Super Bowl tickets, first-edition books from the 1500s, Faberge eggs). It currently employs 60 staff members who work 24 hours per day (over three shifts). Staff answer the phone and respond to requests entered on the Eureka! Web Site. Much of their work is spent on the phone and on computers searching on the Internet. What type of connections should Eureka! consider from it’s offices to the outside world, in terms of phone and Internet? Outline the pros and cons of each alternative below and make a recommendation. The company has four alternatives:
1. Should it use traditional analog services, with standard voice lines, and use modems to dial into its ISP ($40 per month for each voice line plus $20 per month for each Internet access line)?
2. Should the company use standard voice lines but use DSL for its data ($40 per month per line for both services)?
3. Should the company separate its voice and data needs, using standard analog services for voice but finding some advanced digital transmission services for data ($40 per month for each voice line and $300 per month for a circuit with 1.5 Mbps for data)?
4. Should the company search for all digital services for both voice and data ($60 per month for an all-digital circuit that provides two PCM phone lines that can be used for two voice calls, one voice call and one data call at 64 Kbps, or one data call at 128 Kbps)?
5. Should the company invest in a modern-day fiber optic 10Mb/s flex? Research price.
NOTE: PLEASE PROVIDE DETAIL ANSWER OF THIS QUESTION.

Answers

Explanation:

Should the company separate its voice and data needs, using standard analog services for voice but finding some advanced digital transmission services for data ($40 per month for each voice line and $300 per month for a circuit with 1.5 Mbps for data)?

How does OOP keep both code and data safe from outside interference and
incuse?

Answers

Answer:

it is the process that binds together the data and code into a single unit and keeps both from being safe from outside interference and misuse. In this process, the data is hidden from other classes and can be accessed only through the current class's methods

An e-mail program allows?
A. users to access and view web pages on the internet.
B. geographically separated people to transfer audio and video.
C. real-time exchange of messages or files with another online user.
D. transmission of messages and files via a network such as the internet.​

Answers

Answer:

C

Explanation:

Real time exchange of messages or files with another online user

Write a class Example() such that it has a method that gives the difference between the size of strings when the '-' (subtraction) symbol is used between the two objects of the class. Additionally, implement a method that returns True if object 1 is greater than object 2 and False otherwise when the (>) (greater than) symbol is used. For example: obj1

Answers

Answer:

Here the code is given as follows,

Explanation:

class Example:

   def _init_(self, val):

       self.val = val

   def _gt_(self, other):

       return self.val > other.val

   def _sub_(self,other):

       return abs(len(self.val) - len(other.val))

def main():

   obj1 = Example('this is a string')

   obj2 = Example('this is another one')

   print(obj1 > obj2)

   print(obj1 - obj2)

main()

Output:-

If you fail a course as a MAIN (residency) course, you can repeat that course as either a MAIN (residency) or an online (IG or IIG) course.
A. True
B. False

Answers

it depends on where you are taking your courses. In most cases the answer would be true

In this technique, each attribute is associated with a specific feature of a face, and the attribute value is used to determinethe way a facial feature is expressed. This technique is called._______________

Answers

Answer:

Chernoff faces.

Explanation:

Chernoff faces is a data visualization technique that was developed by a statistician named Herman Chernoff. He introduced this data visualization technique to the world in 1973 to represent multivariate or multidimensional data containing at least eighteen (18) variables.

In Chernoff faces, each attribute is associated with a specific feature of a face (nose, eyes, ears, hair, mouth, and eyebrows), and the attribute value with respect to size, shape, orientation, colour and placement is used to determine the way a facial feature is expressed.

The Chernoff face is a technique designed and developed to help detect similarities between different items and discern subtle changes in facial expressions from the perspective of an observer.

You want to calculate a bonus if the sold price was at least equal to the listing price, and if the house sold within 30 days after being listed.
In cell L12, insert an IF function with a nested AND function to calculate a bonus. The AND function should ensure both conditions are met: Sold Price divided by the Listing Price is greater than or equal to 100% (cell L7) and the Days on Market are less than or equal to 30 (cell L8). If both conditions are met, the bonus is $1,000 (cell L9). Otherwise, the bonus is $0. Use mixed cell references to the input values in the range L7:L9. Copy the function to the range L12:L39.
BA Average Total Sold Highest 1 Location Sold Price Number Sold Dual Agent Total Sol Prices Sold Price Agent Codes and Commission Rates 2 Alpine Carey Buyer's Agent 2.75% 3 American Fork Hernandez DA Dual Agency 5.50% 4 Cedar Hills Pijuan SA Seller's Agent 3.25% 5 Lehi 6 Total Commission by Agent Input for Bonus 7 Carey Percent of List 100% 8 Hernandez Days on Market 30 9 Pijuan Bonus Amount $ 1,000 10 Days on Agent Number City Selling Agen Agent Type Agent Type List Price Sold Price Listing Date Sale Date Bonus 11 Market Commissio 12 1 Cedar Hills Pijuan DA Dual Agency $ 725,000 $ 705,000 4/1/2021 76 6/16/2021 13 4 Lehi Pijuan DA Dual Agency $ 350,799 $ 350,000 4/1/2021 5/25/2021 54 14 5 American Fork Pijuan DA Dual Agency $ 29 385,900 $ 385,900 4/1/2021 4/30/2021 15 6 Alpine Carey SA Seller's Agent $ 500,000 $ 495,800 68 4/3/2021 6/10/2021 16 7 Lehi Pijuan BA Buyer's Agent $ 345,999 $ 345,000 4/3/2021 59 6/1/2021 17 11 American Fork Hernandez DA Dual Agency $ 325,000 $ 320,000 48 4/12/2021 5/30/2021 18 Alpine 12 Pijuan DA Dual Agency $ 750,250 $ 725,900 4/12/2021 11/1/2021 203 19 $ DA 17 Alpine Dual Agency $ Carey 645,000 66 643,000 4/18/2021 6/23/2021 20 19 American Fork Pijuan BA Buyer's Agent $ 425,000 $ 415,000 4/18/2021 6/30/2021 73 21 21 Lehi Pijuan SA Seller's Agent $ 325,000 $ 330,000 4/28/2021 6/1/2021 34 22 24 American Fork Pijuan SA Seller's Agent $ 425,815 $ 418,000 4/28/2021 140 9/15/2021 23 27 Alpine DA Pijuan Dual Agency $ 700,000 $ 705,000 4/30/2021 6/19/2021 50 24 30 Lehi Hernandez SA Seller's Agent $ 365,000 $ 363,000 5/1/2021 6/18/2021 48 25 32 Cedar Hills Carey SA Seller's Agent $ 885,500 $ 800,000 5/1/2021 6/6/2021 36 26 34 Cedar Hills Carey SA Seller's Agent $ 610,000 $ 600,000 5/1/2021 6/26/2021 56 27 35 Cedar Hills Hernandez DA Dual Agency $ 560,700 $ 565,000 5/1/2021 5/30/2021 29 29 36 American Fork Hernandez BA . Buyer's Agent $ 450,000 $ 450,000 5/2/2021 9/30/2021 151 29 43 American Fork Carey BA 9 Buyer's Agent $ 375,000 $ 372,500 5/6/2021 5/15/2021 30 46 Cedar Hills Carey SA Seller's Agent $ 650,000 $ 625,750 5/15/2021 679/2021 25 48 31 Alpine Hernandez DA Dual Agency $ 545,000 $ 560,000 5/22/2021 6/16/2021 25 32 Lehi 53 Carey SA Seller's Agent $ 315,750 $ 320,000 5/28/2021 6/18/2021 21 33 61 Lehi Carey DA Dual Agency $ 300,000 $ 300,000 6/2/2021 9/2/2021 92 34 Alpine 69 Hernandez DA Dual Agency $ 589,000 $ 595,000 20 6/18/2021 7/8/2021 35 70 American Fork Hernandez DA Dual Agency $ 345,670 $ 102 345,000 6/20/2021 9/30/2021 36 73 Cedar Hills Carey BA Buyer's agent $ 555,000 $ 550,000 6 6/24/2021 6/30/2021 37 75 Alpine Carey BA Buyer's Agent $ 475,000 $ 485,000 86 6/24/2021 9/18/2021 38 78 American Fork Carey DA Dual Agency $ 400,000 $ 15 400,000 6/30/2021 7/15/2021 39 80 American Fork Pijuan SA Seller's Agent $ 380,500 $ 365,750 6/30/2021 63 9/1/2021 40 41 42 43 44 Details Map Loan +

Answers

Answer:

Following are the solution to the given question:

Explanation:

Please find the following Excel form for calculating the bonus as required. Please ensure the equation is duplicated even so, with the sign "=." It is possible to insert this formula into cell L12. Then cut/paste the cell into other L12:L39 cells.

[tex]=IF(AND(G12/F12 \geq \$L \$7,J12 \leq \$L\$8)=TRUE,\$L\$9,0)[/tex]

The mixed microbial reference here is used in L7, L8, and L9 so these cell references are not moved whenever the formula is copied to L12:L39.

Please verify that whenever the copy has also been copied, the cell formula appears beneath in each cell.

It must be as below in L12.

[tex]=IF(AND(G12/F12 \geq \$L\$7,J12\leq \$L\$8)=TRUE,\$L\$9,0)[/tex]

It must be as follows in L13.

[tex]=IF(AND(G13/F13\geq \$L\$7,J13\leq \$L\$8)=TRUE,\$L\$9,0)[/tex]

and so on.

Write a function that takes six arguments of floating type (four input arguments and two output arguments). This function will calculate sum and average of the input arguments and storethem in output arguments respectively. Take input arguments from the user in the main function.

Answers

Answer:

Answer:Functions in C+

The integer variable n is the input to the function and it is also called the parameter of the function. If a function is defined after the main() .....

Which of the following terms describes an attacker walking or driving through business areas and neighborhoods to identify unprotected wireless networks from the street using a laptop or a handheld computer?
A. Wi-Fi stealing.
B. Wi-Fi trolling.
C. Wi-Fi jacking.
D. Wi-Fi hacking.

Answers

Answer:

C. Wi-Fi jacking

Explanation:

Answer: yessir b

Explanation:

The importance of the 8 functions of an operating system​

Answers

Answer:

Explanation:

Important functions of an operating System:  

 

Security –  

The operating system uses password protection to protect user data and similar other techniques. it also prevents unauthorized access to programs and user data.  

 

Control over system performance –  

Monitors overall system health to help improve performance. records the response time between service requests and system response to have a complete view of the system health. This can help improve performance by providing important information needed to troubleshoot problems.  

 

Job accounting –  

Operating system Keeps track of time and resources used by various tasks and users, this information can be used to track resource usage for a particular user or group of user.  

 

Error detecting aids –  

Operating system constantly monitors the system to detect errors and avoid the malfunctioning of computer system.  

 

Coordination between other software and users –  

Operating systems also coordinate and assign interpreters, compilers, assemblers and other software to the various users of the computer systems.  

 

Memory Management –  

The operating system manages the Primary Memory or Main Memory. Main memory is made up of a large array of bytes or words where each byte or word is assigned a certain address. Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be executed, it should be first loaded in the main memory. An Operating System performs the following activities for memory management:  

It keeps tracks of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multi programming, the OS decides the order in which process are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.  

 

Processor Management –  

In a multi programming environment, the OS decides the order in which processes have access to the processor, and how much processing time each process has. This function of OS is called process scheduling. An Operating System performs the following activities for processor management.  

Keeps tracks of the status of processes. The program which perform this task is known as traffic controller. Allocates the CPU that is processor to a process. De-allocates processor when a process is no more required.  

 

Device Management –  

An OS manages device communication via their respective drivers. It performs the following activities for device management. Keeps tracks of all devices connected to system. designates a program responsible for every device known as the Input/Output controller. Decides which process gets access to a certain device and for how long. Allocates devices in an effective and efficient way. Deallocates devices when they are no longer required.  

 

File Management –  

A file system is organized into directories for efficient or easy navigation and usage. These directories may contain other directories and other files. An Operating System carries out the following file management activities. It keeps track of where information is stored, user access settings and status of every file and more… These facilities are collectively known as the file system.  

All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonymous email Preventing client computers from accepting cookies Email encryption Anonymous surfing

Answers

Answer:

Data use policies

Explanation:

Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.

Write a Python program square_root.py that asks a user for an integer n greater or equal to 1. The program should then print the square root of all the odd numbers between 1 and n (Including n if n is odd). Print the square roots rounded up with no more than two digits after the decimal point.

Answers

Answer:

import math

n = int(input("Enter n: "))

for number in range(1, n+1):

   if number % 2 == 1:

       print("{:.2f}".format(math.sqrt(number)), end=" ")

Explanation:

In order to calculate the square roots of the numbers, import math. Note that math.sqrt() calculates and gives the square root of the given number as a parameter

Ask the user to enter the n

Create a for loop that iterates from 1 to n+1 (Since n is included, you need to write n+1)

Inside the loop, check whether the number is odd or not using the if structure and modulo. If the number is odd, calculate its square root using the math.sqrt() and print the result with two digits after the decimal

have y’all beat shinobi 3 return of The ninja Master for The sega genesis

Answers

Explanation:

sorry l don't watch anime or ninja things.

Show the result of inserting 10, 12, 1, 14, 6, 5, 8, 15, 3, 9, 7, 4, 11, 13, and 2, one at a time, into an initially empty binary heap. b. Show the result of using the linear-time algorithm to build a binary heap using the same input.
Show the result of performing three deleteMin operations in the heap of the previous exercise.

Answers

Answer:

Explanation:

A)

10 10 10 1 1

/ / \ --> / \ / \

12 12 1 12 10 12 10

/

14

1 1 1 1

/ \ / \ / \ / \

12 10 --> 6 10 6 10 --> 6 5

/ \ / \ / \ / / \ /

14 6 14 12 14 12 5 14 12 10

1 1 1 1

/ \ / \ / \ / \

6 5 6 5 6 5 --> 3 5

/ \ / \ / \ / \ / \ / \ / \ / \

14 12 10 8 14 12 10 8 14 12 10 8 6 12 10 8

/ / \ / \

15 15 3 15 14

After inserting all 1

/ \

3 2

/ \ / \

6 7 5 4

/ \ / \ / \ / \

15 14 12 9 10 11 13 8

b)

First level build : 10

/ \

12 1

/ \ / \

14 6 5 8

/ \ / \ / \ / \

15 3 9 7 4 11 13 2

Heap bottom level: 10

/ \

12 1

/ \ / \

3 6 4 2

/ \ / \ / \ / \

15 14 9 7 5 11 13 8

Heap next level up: 10

/ \

3 1

/ \ / \

12 6 4 2

/ \ / \ / \ / \

15 14 9 7 5 11 13 8

Final heap: 1

/ \

3 2

/ \ / \

12 6 4 8

/ \ / \ / \ / \

15 14 9 7 5 11 13 10

c)

Duing the first time,

First, assume the last element, the 8, is at the root and bubble down.

Then, assume the last element, the 13, is at the root and bubble down.

Then, assume the last element, the 11, is at the root and bubble down.

Final heap:

4

/ \

6 5

/ \ / \

13 7 10 8

/ \ / \ /

15 14 12 9 11

In the next iteration,

First, assume the last element, the 10, is at the root and bubble down.

Then, assume the last element, the 13, is at the root and bubble down.

Then, asssume the last element, the 11, is at the root and bubble down.

So, after performing all operations, the heap looks like below:

4

/ \

6 5

/ \ / \

12 7 10 8

/ \ / \ /

15 14 9 13 11

What type of device is a computer? Where does it use​

Answers

Answer:A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web.

how to identify mistakes in a html code??​

Answers

hello i am having a mental breakdown could u help me please?

2.2 Write a program that uses input to prompt a user for their name and then welcomes them. Note that input will pop up a dialog box. Enter Sarah in the pop-up box when you are prompted so your output will match the desired output.

Answers

Answer:

Explanation:

The following program is written in Javascript. It creates a prompt that asks the user for his/her name and saves it in a variable called userName. Then it uses that variable to welcome the user. A test case is shown in the images below with the desired output.

let userName = prompt("Enter Your Name")

alert(`Hello ${userName}`)

Giải thích mục đích của các thao tác open() và close().

Answers

Answer:

Which lan is it

Answer:

Đang học năm nhất trường TDT đúng k bạn :D

Explanation:

Other Questions
Infrared waves are an example of heat transfer byA. convectionB. radiationC. conductionD. motion of the air f(x) = -4(x+3)+6(x+4) Please help with these two problems and give an accurate explanation. Thank you! How are all compounds similar?A. They are all made up of ions that are held together by attractions.B. They are all made up of the same few elements.C. They are all made up of atoms of two or more different elements.D. They are all made up of atoms that share electrons. 1. The varieties of jazz dance reflect what? How far from "0 is the green rectangle? vua quang trung tn tht l g Find the approximate area of the shaded region below, consisting of a right triangle with a circle cut out of it. Use 3.14 as anapproximation for90 m402,794 square meters1,256 square meters974 square metersO 6,844 square meters Below are the ratings for a sample of 12 hotels in small Ontario towns:1.1 4.7 4.8 4.8 5.3 6.5 6.7 7.1 7.1 7.3 8.1 9.2 The critical values of this data set are given:Q1=4.8 Q2=6.6 Q3=7.2a) Determine the following and show all work: [3 marks]i) interquartile range (IQR)ii) upper boundary and lower boundaryiii) any outlier(s)b) Create a modified box plot for the data, showing any outlier(s). [1 mark]c) In order for a hotel to be recommended by travel blog TravelWell, its score must be the 80th percentile or higher. What is the minimum rating a hotel can achieve in order to be recommended by TravelWell based on this sample? [2 marks] 6. He was ... in a car crash. (wounded/injured)7. Are you .........in astronomy? (interesting/interested)8. Yes, it's ansubject. (interesting/interested)9. Columbus .... America. (invented/discovered)10. Bell ............ the telephone. (invented/discovered)11. What is the ... fashion from Paris? (latest/last)12. The lake weter is ....... in the morning before people beginswimming. (clear/clean)13. Stay forinstruction. (farther/further)14. Take ............ day as it comes. (every/each)15. Derek is......... for his age. (big/old)Exercise 7We are rather ..... about the way we cook. (careless/carefree)She had been lively and ........... (careless/carefree) Determine the relative formula mass of dihydrogen monoxide using the periodic table below. A. 18 g/mol B. 17 g/mol C. 16 g/mol D. 2 g/mol On January 1, 2019, Stronger Industries issued $480,000 of 9%, five-year bonds that pay interest semiannually on June 30 and December 31. They are issued at $499,483 and their market rate is 8% at the issue date. After recording the entry for the issuance of the bonds, Bonds Payable had a balance of $480,000 and Premium on Bonds Payable had a balance of $19,483. Stroger uses the effective interest bond amortization method. The first semiannual interest payment was made on June 30, 2019. Complete the necessary journal entry for the interest payment date of June 30, 2019 by selecting the account names from the drop-down menus and entering the dollar amounts in the debit or credit columns. Which of the following pairs lists phase changes that both give off energy?a) Freezing and condensationb) Deposition and vaporizationc) Vaporization and meltingd) Condensation and sublimation How to distinguish between ethanol and 2 -methyl-2-propanol What is a 14 of the sequence 2, 11, 20, ...?A. 140B. 128C. 119D. 137 Read the thesis statement below and answer the question that follows.The life of the typical college student is characterized by time spent in many different areas.How can this thesis statement be improved?O Typical college students spend their time in numerous ways and in various areas.The life of the average college student is mostly characterized by time and work spent in many different areas.The life of the average college student is characterized by time spent in many different areas.The life of the typical college student is characterized by time spent studying, attending class, and socializing withpeers. HELP PLS 18-82+10= ? All of the following are TRUE for activities and activity coefficients, except: A) activity for a chemical species is the product of concentration and activity coefficient. B) the activity coefficient corrects for non-ideal behavior due to ionic strength. C) as ionic strength increases, the value of the activity coefficient increases. D) for ions, the activity coefficient approaches unity as the ionic strength approaches 0. E) the activity coefficient for neutral molecules is approximately unity. find the surface area of the prism What is the area of my lawn if it measures 4m x 4.5m