Answer:
The "operating system" manages software and hardware on the computer. Uploads files, has great memory and processes management.
You've been given a network of 130.0.0.0 /16. you need to divide it into four VLSM subnets as follows:
Production 500 hosts
Sales 60 hosts
Maintenance 12 hosts
Management 30 hosts
Required:
What will be the last host-usable address in the seattle office?
Answer: Hello your required question is wrong as it does not tally with the data provided , attached below is the complete question
answer:
/23 /26 /27 /28 option A
Explanation:
Breakdown of the last four subnet masks given to the subnets
For the subnet of 500 production host the mask = /23 which will produce 512 hosts
For the subnet of 60 sales host the mask = /26 which will produce 64 hosts
For the subnet of 12 host the mask = /27 which will produce 32 hosts
For the subnet of 30 hosts the mask = /28 which will produce 16 hosts
Which of the following represents knowledge as a set ofâ rules? A. Neural networks.B. Machine learning systems.C. Robotics.D. Expert systems.E. Genetic algorithms.
Answer:
D. Expert systems
Explanation:
Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.
Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.
Generally, there are two (2) main characteristics of artificial intelligence (AI) systems and these include;
I. Non-algorithmic processing.
II. Symbolic processing.
In artificial intelligence (AI), the field of expert systems is the most important applied area because it models human knowledge.
Hence, expert systems represents knowledge as a set of rules.
Although, all expert systems are generally lacking in human capabilities and can only use inference procedures to proffer solutions to specific problems that would normally require human expertise or competence.
Some of the areas where expert systems can be applied are; monitoring, diagnosis, scheduling, classification, design, process control, planning, etc.
The Expert systems represent the knowledge as a set of rules. Thus option D is correct.
What is an expert system?The system is the computer-based system that emulates all decision-making abilities of man and is designed to solving the complex problems by use of reasoning through the representation of IF-THEN rules.
The expert system is divided into the two types of systems such as knowledge base and inference engines. The knowledge base shows the facts and rules. The inference applies those facts to know the rules.
Find out more information about the expert systems.
brainly.com/question/9619145
Your friend Amy calls you asking for help with her new LCD monitor. She says the monitor isn't showing the whole picture. What is the resolution you should recommend for her to use
Answer: probably 1080p (which is HD)
Explanation: Lcd monitors mainly support 1080p.
The details of various measurable characteristics related to IT outcomes of a cloud environment, are typically expressed in a
Answer:
Service-Level Agreement (SLA).
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Software as a Service (SaaS).
3. Infrastructure as a Service (IaaS).
The details of various measurable characteristics related to information technology (IT) outcomes of a cloud environment or service, are typically expressed in a Service-Level Agreement (SLA).
Generally, a service level agreement (SLA) is usually between a service provider and its customers (end users).
In order to define and provide satisfactory service, organizations that provide services are expected to implement a service level agreement and it should comprise of the following parameters; responsibilities, expectations, metrics, time and frequency.
The function of while loop is
a. Repeata chunk of code a given number of times.
b. Repeat a chunk of code until a condition is true.
c. Repeata chunk of code until a condition is false.
d. Repeata chunk of code indefinitely.
Answer:
B repeat a chunk of code until the condition is true im 88% sure
Monitors with __________ technology are considered to have better picture sharpness and brightness, are sleeker and lighter, consume less power, but are more expensive.
Answer:
OLED
Explanation:
Kind of a wild guess but this question seems to describe exactly what OLED technology does.
Feel free to update me if I'm wrong :)
the first fully automatic computer was
Answer:
Z3
Explanation:
The Z3 was a German electromechanical computer designed by Konrad Zuse in 1935, and completed in 1941. It was the world's first working programmable, fully automatic digital computer.
discuss extensively, the historical development of public Administration
Public administration has ancient origins. In antiquity the Egyptians and Greeks organized public affairs by office, and the principal officeholders were regarded as being principally responsible for administering justice, maintaining law and order, and providing plenty. The Romans developed a more sophisticated system under their empire, creating distinct administrative hierarchies for justice, military affairs, finance and taxation, foreign affairs, and internal affairs, each with its own principal officers of state. An elaborate administrative structure, later imitated by the Roman Catholic Church, covered the entire empire, with a hierarchy of officers reporting back through their superiors to the emperor. This sophisticated structure disappeared after the fall of the Western Roman Empire in the 5th century, but many of its practices continued in the Byzantine Empire in the east, where civil service rule was reflected in the pejorative use of the word Byzantinism.
Explain about the Graphics mode Initialization and various in build graphics functions in C library.
Answer:
La biblioteca estándar de C (también conocida como libc) es una recopilación de archivos de cabecera y bibliotecas con rutinas, estandarizadas por un comité de la Organización Internacional para la Estandarización (ISO), que implementan operaciones comunes, tales como las de entrada y salida o el manejo de cadenas. A diferencia de otros lenguajes como COBOL, Fortran, o PL/1, C no incluye palabras clave para estas tareas, por lo que prácticamente todo programa implementado en C se basa en la biblioteca estándar para funcionar.
Explanation:
what is the printed version of what you see on the computer screen
Answer:
screenshot
Explanation:
screenshot
Answer:
a image of what is on your screen on paper
Explanation:
This is a image of the screen of your computer with all images pasted out in paper form
2) List three (3) negative impact of Technology on society
Answer:
1. social media and mobile devices may lead to psychological.
2. They may contribute to more serious health conditions such as depression.
3. The overuse of technology may have a more significant impact on developing children and teenagers.
Explanation:
may this help you have a good day
Explain the bad effect and good effect of mobile phone and internet.
Answer:
Bad effect of mobile phone: mobile phones can be a distraction and good effect is that your able to call for emergency and be able to connect with people.
bad effect of internet: internet can be deceiving when hearing a tragedy happen and the good effect is that your able to know news and important things.
What will be the output of the following code
1 Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
2
3
Pim val As Double
val - Math.Sqrt (12)
5
TextBox1.Text = val
6
7 End Sub
Answer:
3.4641016151377544
Explanation:
See picture for corrected code. The OCR messes up the code.
Which of these is unused normal, unvisited link ??
Answer:
hover
Explanation:
hope my answer help you
A sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted. A control procedure that would serve as a preventive control for this situation would be:
Answer:
a simple IF statement using Regex
Explanation:
In any coding language, a good control procedure for this would be a simple IF statement using Regex. In the IF statement you can grab the account code and compare it to a regular expression that represents the correct format. IF the account code is in the correct format (matches the regular expression), then you go ahead and save the account code for use. Otherwise, you would output an error and ask for another account code. This will prevent the program from trying to use an account code that is not valid.
Select the correct answer.
A software development team is currently in the database creation phase of a project. Which activity will they undertake in this phase?
A.
memory allocation
B.
database design
C.
selecting a DBMS
D.
loading data
Answer:
database design is the correct e
Answer:
memory allocation
Websites can send __________ to your computer that stay on your hard drive and can track your web movements. Multiple Choice freeware cookies viruses pop ups
Answer:
Cookies
Explanation:
Cookies are pieces of information stored as text strings on your computer.
A web server sends you a cookie and a web browser stores it. The browser then returns the cookie to the server the next time the page is referenced. One of the most common uses of cookies is to store user ID. For example, the cookie might contain the following ID = 456894.
An example of a website that uses a cookie is an e-commerce website. When you visit the site and fill out a form, the website assigns you a user ID, stores your information with this user ID in the database on the web server and then returns this ID to your browser as a cookie.
The next time you visit the page, the browser sends this ID to the server. The server looks up this ID and then customizes the page it sends back to you. For example, you might see on the page, "Welcome back, David!"
What are the types of Operating System
Answer:
1. Gestión de la memoria principal
Esta es una característica del sistema operativo básica. La memoria principal de la computadora almacena los datos que serán usados por el CPU en la ejecución de los programas. El sistema operativo se encarga de gestionarla, es decir, asignar partes de memoria a la nueva información usada, y evitar que se sature.
2. Gestión de la memoria secundaria
Es la memoria más “permanente” de una computadora. Al igual que la memoria principal, el SO sistema operativo asigna el orden de guardado en esta memoria y la mejor manera de aprovechar el espacio libre.
3. Gestión de procesos
Cuando envías un comando para que el ordenador realice una tarea, una de las funciones del sistema operativo es organizar los recursos de la computadora para ejecutarla. Esto incluye la memoria, el tiempo del CPU, los programas y archivos necesarios para ejecutar la tarea, los procesos que podrían entorpecerla y los periféricos que podrían ser necesarios para cumplirla.
4. Gestión de recursos
¡Esta es una de las características del sistema operativo más importantes! El sistema operativo coordina los recursos del hardware que integra la computadora para cumplir con las tareas requeridas. El CPU, los periféricos, las memorias principal y secundaria, los programas, todo tiene que trabajar al unísono para cumplir con las tareas de forma óptima.
5. Gestión de usuarios
El software operativo controla el acceso de los usuarios a las cuentas individuales o grupales. También, se encarga de administrar a qué recursos e información tiene acceso cada uno de ellos.
6. Gestión de la seguridad
Así como controla el acceso de usuarios, el sistema operativo también está encargado de gestionar los controles de seguridad de la computadora, entre ellos el firewall. Por ejemplo, en cuanto a la función del sistema operativo para la seguridad informática es evitar la pérdida de datos, controlar la confidencialidad de los datos y controlar el acceso a la información y a los recursos del equipo.
Write a Java program which displays a menu to allow user the following functionality: 1. Load employees’ data - prompts user for the number of employees to be loaded and then prompts for each employee name, id (5 digit number), and annual salary
Answer:
Explanation:
The code I created is written in Java. It creates an Employee class that holds the employee's name, id, and salary. Then the main method has a menu that asks the user if they want to load data, print data, or exit. Each of which is fully functioning. If the user wants to load data, it asks them how many employees they want to add and then allow them to add the employees by calling the Employee class every time and saving the objects in an ArrayList. The program has been tested and the output can be seen in the image below.
import java.util.ArrayList;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
ArrayList<EmployeeData> companyData = new ArrayList<>();
boolean loopAgain = true;
while (loopAgain) {
System.out.println("Menu:");
System.out.println("1: Load Employee Data");
System.out.println("2: Print Employee Data");
System.out.println("3: Exit");
int answer = in.nextInt();
switch (answer) {
case 1: {
System.out.println("How many employees will you add?");
int loop = in.nextInt();
for (int i =0; i < loop; i++) {
companyData.add(new EmployeeData());
}
} break;
case 2: {
for (EmployeeData x : companyData) {
x.printData();
}
} break;
case 3: loopAgain = false; break;
}
}
}
}
class EmployeeData {
String name;
int id, salary;
public EmployeeData() {
Scanner in = new Scanner(System.in);
System.out.println("Enter Employee Name: ");
String name = in.nextLine();
System.out.println("Enter Employee ID:");
int id = in.nextInt();
System.out.println("Enter Employee Salary: ");
int salary = in.nextInt();
this.name = name;
this.id = id;
this.salary = salary;
}
public void printData() {
System.out.println("Employee: " + this.name);
System.out.println("ID: " + this.id);
System.out.println("Salary: " + this.salary);
}
}
Study the following two class interfaces: class Question { public: Question(); void set_text(string new_text); void set_answer(string new_answer); void display() const; private: string text; string answer; }; class ChoiceQuestion : public Question { public: ChoiceQuestion(); void set_text(string new_text); }; Which member function from the Question class is overridden in the ChoiceQuestion class?
Answer:
The question function
Explanation:
The ChoiceQuestion function inherits from the Question class and should have it's functions and attributes as it is now a child of the Question class. It however overides the Question class function where it sets the ChoiceQuestion class function in the first function definition of the ChoiceQuestion class definition. This allows the child class to have it's own functions as well have access to the attributes and functions of the parent class.
For this assignment, you will use pointers to write a program that can be used to gather statistical data about the number of movies college students see in a month. The program should ask the user how many students were surveyed and dynamically allocate an array of that size. The program should then allow the user to enter the number of movies each student has seen. The program should then calculate the average, median, and mode of the values entered. Be sure to include comments throughout your code where appropriate.
Complete the C++ code
Answer:
Following are the program to the given question:
#include <iostream>//header file
#include <bits/stdc++.h>//header file
using namespace std;
int main()//main method
{
int x,i,sum=0;//defining integer variable
double average, median;//defining double variable
cout<<"How many students were surveyed? ";//print message
cin>>x;//input value
int *a = new int[x]; //dynamically created array
for(i = 0;i<x;i++)//defining for loop to input value in array
{
cout<<"Enter the number of movies seen by student number "<<i+1<<": ";//print message
cin>>a[i];//input value
}
for (int i = 0; i < x; i++)//defining loop for add value
sum += a[i]; //use sum to add array value
average = (double)sum/x;//defining average variable to calculate average
cout<<"Average is "<<average<<endl;//print average value with message
sort(a, a+x); //use sort method to sort array to find the median
if (x % 2 != 0)//use if to check the even value
median = (double)a[x/2];//calculating the median value
else//esle block
median = (double)(a[(x-1)/2] + a[x/2])/2.0;//calculating median value
cout<<"Median is "<<median<<endl;//print median value with message
int m_count=1 ,mode= a[0], c_count = 0;//defining integer variable
for( i=1;i<x;i++)//defining for loop arrenge value
{
if(a[i]==a[i-1])//use if to check array value
{
c_count++;//increment c_count variable value
}
else//else block
{
if(c_count>m_count)//use if to check c_count greater than m_count
{
m_count = c_count;//holding value in m_count
mode = a[i-1];//holding mode value
}
c_count = 1;//holding value integer value in c_count
}
}
cout<<"Mode is "<<mode;//print mode value with message
return 0;
}
Output:
Please find the attachment file.
Explanation:
Including header file.Defining the main method. Declaring integer and double type variables.Declaring integer array.Use the loop to the input value.After input, the value uses double variable "average, the median" that uses the for loop and conditional statement to check the value and hold in its variable.In the next step, another integer variable "m_count, mode, and c_count" is defined that uses the loop and conditional statement to check the median and mode value and hold its value into their variable.How does porter’s competitive forces model help companies develop competitive strategies using information systems?
Answer:
Porter's competitive forces model helps companies determine what they should do to be more productive by comparing what their competitors are doing. It also brings the companies costs down and makes them more efficient as a business by using Information Systems.Chris is concerned about deploying an application to a cloud service provider and being locked in technologically so that his organization would have to stay with that cloud service provider in order to run that application. Which of the following could he possibly use that should allow for an easier migration from one cloud service provider to another?
a. Virtual machines.
b. Containerization.
c. Orchestration.
d. Serverless computing.
Answer:
d. Serverless computing.
Explanation:
Chris is concerned about deploying an application to a cloud service provider and being locked in technologically so that his organization would have to stay with that cloud service provider in order to run that application.
Therefore, the use of Serverless computing should allow for an easier migration from one cloud service provider to another.
This is because, serverless computing has to do with a cloud computing model which gives the machine resources tasks to take care of servers on behalf of clients.
A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gie guests the option to create their own login accounts.
How can a network administrator help meet these criteria?
A. Choose the Internal captive portal with email registration option for the guest WLAN.
B. Make sure to create a guest provisioning account for the guest WLAN.
C. Disable authentication in the captive portal profile for the guest WLAN.
D. Choose ClearPass or the other external captive portal option for the guest WLAN.
Answer: D. Choose ClearPass or the other external captive portal option for the guest WLAN.
Explanation:
The Aruba Instant On mobile app allows the configuration and monitoring of a network from anywhere. It provides an affordable solution to small businesses and they're reliable and secure.
Based on the criteria given in the question, the network administrator can meet the criteria by choosing a ClearPass or the other external captive portal option for the guest WLAN.
You are sitting at the local coffee shop, enjoying your favorite latte. You pull out your laptop and, using the wireless network available at the coffee shop, access your e-mail. List all the different networks possibly involved in this operation.
Answer:
Laptop computer is connected to wireless connection in the coffee shop, which is connected to an ISP which is connected to the Internet.
Explanation:
The laptop's Wireless connection is turned on such that it is enabled to find wireless connection access signals within a certain Radius. The ability to connect to a wireless network is that the coffee shop has open wireless connection which is detected by the laptop signals and connects to it. The wireless connection provided by the coffee shop is connected to a certain internet service provider which eneblws connected networks to be able to access the internet.
You are developing a site for travel. From the homepage, a visitor wants to view packages for a trip to Japan. Based on the attached file structure and your knowledge of the Internet, write the code for links to the following:
Answer:
Explanation:
After finding the structure online that is mentioned in the question I was able to write out the necessary HTML code. The following code uses <a> tags which are the required tags for links. Inside these tags you will find the href attribute which tells the browser where to take the user when the user clicks on one of these links. Each link has the name of the link, for example, the first link will say "Visit Japan".
<a href="japan.html">Visit Japan</a>
<a href="family.html">Family Friendly Tours</a>
<a href="cycling.html">Cycling Enthusiast Tours</a>
<a href="culinary.html">Culinary Based Excursions</a>
To dynamically change a reference line using parameter action, you first create a reference parameter. Next, add a parameter action for it. Finally, _____.a. add a reference line whose value follows a reference parameter.b. add the sheet you want to control as the bottom-right element in the layout.c. also add a URL action that points to the dashboard itself.d. add a reference line with a per pane scope and a tooltip.
Answer:
a. add a reference line whose value follows a reference parameter
Explanation:
To dynamically change a reference line using parameter action, you first create a reference parameter. Next, add a parameter action for it. Finally, "add a reference line whose value follows a reference parameter."
This is because to dynamically change a reference line using parameter action, one needs to do the following:
1. Attribute the reference line with a parameter
2. Utilize a parameter action to make the parameter interactive.
3. As your users interact with the view, the reference lines automatically update to deliver more context to the data.
Answer:
add a reference line whose value follows a reference parameter
Explanation:
add a reference line whose value follows a reference parameter
Write a program that reads in the first name, hourly rate and number of hours worked for 5 people. Print the following details for each employee. Name of employee The number of hours worked Their weekly gross pay.This is calculated by multiplying hours worked times hourly rate. If hours worked per week is greater than 40, then overtime needs to also be included. Overtime pay is calculated as the number of hours worked beyond 40 * rate * 1.5 Taxes withheld Our tax system is simple, the government gets 20% of the gross pay. Net paid The amount of the check issued to the employee.
Answer:
import java.util.Scanner;
public class Main
{
public static void main(String[] args) {
String name;
double hourlyRate;
int hours;
double grossPay = 0.0;
double netPaid = 0.0;
double taxes = 0.0;
Scanner input = new Scanner(System.in);
for (int i=1; i<=5; i++){
System.out.print("Enter the name of the employee #" + i + ": ");
name = input.nextLine();
System.out.print("Enter the hourly rate: ");
hourlyRate = input.nextDouble();
System.out.print("Enter the hours: ");
hours = input.nextInt();
input.nextLine();
if(hours > 40)
grossPay = (40 * hourlyRate) + ((hours - 40) * hourlyRate * 1.5);
else
grossPay = hours * hourlyRate;
taxes = grossPay * 0.2;
netPaid = grossPay - taxes;
System.out.println("\nName: " + name);
System.out.println("The number of hours worked: " + hours);
System.out.println("The weekly gross pay: " + grossPay);
System.out.println("Taxes: " + taxes);
System.out.println("Net Paid: " + netPaid + "\n");
}
}
}
Explanation:
*The code is in Java
Declare the variables
Create a for loop that iterates 5 times (for each employee)
Inside the loop:
Ask the user to enter the name, hourlyRate and hours
Check if hours is above 40. If it is, calculate the gross pay and overtime pay using the given instructions. Otherwise, do not add the overtime pay to the gross pay
Calculate the taxes using given information
Calculate the net paid by subtracting the taxes from grossPay
Print the name, hours, grossPay, taxes, and netPaid
We have an N x N square grid.
We will paint each square in the grid either black or white.
If we paint exactly A squares white, how many squares will be painted black?
A and N are integers,
Print the number of squares that will be painted black.
C++
Answer:
The solution in C++ is:
#include <iostream>
using namespace std;
int main(){
int N, A;
cout<<"Grids: "; cin>>N;
cout<<"White: "; cin>>A;
cout<<"Black: "<<N * N - A;
return 0;
}
Explanation:
This declares N and A, as integers
int N, A;
This gets inputs for N
cout<<"Grids: "; cin>>N;
This gets inputs for A, (the white grids)
cout<<"White: "; cin>>A;
This calculates and prints the number of black grids
cout<<"Black: "<<N * N - A;
PS
From the question, we understand that the grid is N by N square grids.
This means that:
[tex]Total = N * N[/tex]
So, the number of black grids is:
[tex]Black = Total - A[/tex]
While using PERT (Program Evaluation Review Technique) and CPM (Critical Path Method) techniques, activities that are on the critical path are more flexible than those activities which are not on the critical path.
a. True
b. False
Answer:
b. False
Explanation:
The Critical Path Method(CPM) is used to determine the maximum time to finish a project based on the total maximum time of the network of interdependent activities in the project. The CPM is usually used in conjunction with the Program Evaluation Review Technique(PERT). If an activity is in the critical path then it is at its maximum or longest duration time and cannot be more flexible at this point.