Answer:
what?
Explanation:
Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches
A(n) ________ is an excellent tool for representing a system's component processes and the flow of data among them.
PLEASE HELP! (NO LINKS)
The US Copyright Act gives computer programs the same status as what kinds of work?
Answer:
C.
Explanation:
In image below.
Have a wonderful day and mark brainliest if I helped,
starkitty052010 of Brainly
Consider the following instance variables and method from a class: private String descriptor; public String makeSentence(int quant, boolean sign) { String s = "Object is "; if (!sign) { s += "not "; } for (int i = 0; i < quant; i++) { s += "very "; } return s + descriptor; } Suppose an object of this class is initialized so the value of descriptor is "regular". What would be returned by the call makeSentence(3, false) made on this object?
The call makeSentence(3, false) will return
"Object is not very very very regular"
The program fragment is:
///////////////////////////////////////////////////////////////////////////////////////////////////////////////
private String descriptor;
public String makeSentence(int quant, boolean sign) {
String s = "Object is ";
if (! sign) {
s += "not ";
}
for (int i = 0; i < quant; i++) {
s += "very ";
}
return s + descriptor;
}
///////////////////////////////////////////////////////////////////////////////////////////////////////////////
descriptor is an instance field of the class. When makeSentence(3, false) is called, it does the following;
Initializes a local variable s with "Object is "
s now contains "Object is "
Since sign== false, the if block executes
s now contains "Object is not "
The for loop will execute 3 times to append "very " to s
s now contains "Object is not very very very "
Finally the return statement returns a concatenation of the contents of descriptor (descriptor=="regular") and s
s now contains "Object is not very very very regular"
Learn more about programs here: https://brainly.com/question/19625875
Would my phone still work if I snapped it in half?
Depends on if you wanna get it repaired or not
A technology ____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.
Answer:
A technology __cycle __ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.
Explanation:
Hope its help
________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Human-computer interface d. Computer-aided design e. Total ownership
Answer:
a) reverse engineering
A computer game allows a player to repeat a level until they run out of lives. Which two of the following loops would work correctly?
Answer:
c.
Explanation:
because this is the right syntax for the following loops
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors.
Answer:
D. The method for retrieval is dependent on the specific app or device’s operating system.
What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop entry, and the expression that alters the loop control variable, all in one convenient place
Answer:
I think it's a for loop.
A for loop looks like:
for (starting statement; condition that is true; condition applied to iteration)
Explanation:
What are web protocols.
Answer:
Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.
Answer:
The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.
Explanation: i hope this helps
1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint
Answer:
a. Word
Explanation:
Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.
Answer: a) Word
Explanation: Microsoft Word is the most widely used word processing software.
we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.
Answer:
is this a sim chip card replacement card for Electronics ?
Explanation:
What type of programing code do game developers use.
Explanation:
object oriented programming languages like C#, C++, Java are used by developers to develop a game.
I need help with this question.
Fill in the blank with the correct response.
When an app seems to have a personality, we say it has ____
How to translate a word file with goole translator.
Answer:
Use the translation websiteClick "Browse your computer". A file selection dialog will pop up. Select the file. Select the translation languagePress 'translate'!Note: The document translation option will only show on medium and large screens
The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage
The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.
System design involves the process of determining an overall system architecture, which typically comprises the following:
Hardware.End users.Physical processing components.Software.Communication channel.Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:
1. Planning.
2. Analysis.
3. Design.
4. Development.
5. Testing.
6. Implementation.
7. Maintenance.
From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.
During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.
Read more: https://brainly.com/question/20813142
RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? Hub Switch Firewall
Answer:
Firewall
Explanation:
The firewall might block the Remote Desktop Protocol (RDP) connection. This is because hackers could use open connections to brute force passwords or control an infected computer. The firewall ensures that only authorised connections occur.
jelaskan tiga kemungkinan sebab pengasah pensil itu tidak dapat berfungsi secara tiba-tiba (translate: explain three possible reasons why the pencil sharpener may not work suddenly) pls help me
Explanation:
Internal gear wear must be significant (visually obvious) to be the cause of off-center sharpening. Cutter carrier is rotating but the pencil is not sharpening (doesn't feel like the cutter is engaging the pencil) This is usually caused by a foreign object (e.g., an eraser or broken pencil lead) inside the pencil bore.
what do you think is the reason why there are two kinds of transmission mode in computer networking?
Answer: Transmission mode or communication mode is referred to as transmission of data between two devices using a communication channel that includes an optical fiber, copper wires, wireless channels, and various storage media. The data that gets transmitted is in the form of electromagnetic waves. There are various ways of data transmission where the message that is passed is in the sequence of pulses using digital modulation. The transmission mode of data was first introduced in a computer networking system during the 1940s in modems, then in LANs, WANs, repeaters, and other networking system
is this what u are looking for?
How to remove link color and underline in html.
Answer:
To remove the underline from all hyperlinks on a page, follow these steps:
Open the page that you want to modify.
Click the Codetab.
Put the following HTML code before the <BODY> tag: <STYLE>A {text-decoration: none;} </STYLE>
Click the Designtab. Your hyperlinks no longer contain underlines.
alannah just purchased a smart lock for her front door. how can she connect her lock to the internet so she can control the lock when she’s away from home?
Answer: cellular connection
She can connect her lock to the internet so she can control the lock when she’s away from home by Bluetooth connection. The correct option is D.
What is a Bluetooth connection?Bluetooth technology enables devices to communicate with one another without the use of cables or wires.
Bluetooth operates on a short-range radio frequency, and any device equipped with the technology can communicate as long as it is within the required distance.
Some devices can be connected to your phone via Bluetooth without the use of a cord.
After the first time you pair a Bluetooth device, your devices may pair automatically. If your phone is connected to something via Bluetooth, a Bluetooth icon will appear at the top of the screen.
Alannah can connect her lock to the internet and control it via Bluetooth while she is away from home.
Thus, the correct option is D.
For more details regarding Bluetooth connection, visit:
https://brainly.com/question/28258590
#SPJ2
Your question seems incomplete, the missing options are:
A. network cable
B. cellular connection
C. power cable
D. Bluetooth connection
Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attached. Which setting must molly change?.
A computer is made up of different network. The setting that molly must change is network type.
A computer network is known to be a group of computers that are linked to each other so as to help the computer to communicate with another computer and share their resources, data, and applications.
A computer network can be classified based on their sizes. A computer network is of four types. They are:
LAN(Local Area Network)PAN(Personal Area Network)MAN(Metropolitan Area Network)WAN(Wide Area Network)Learn more from
https://brainly.com/question/14200752
1. What is the value of the digit 2 in the number below?
1,243 (a) 2) (b) 200) (c) 2000) (d) 20
Answer:
200
Explanation:
Let's split the number 1,243 into its values.
1,000 + 200 + 40 + 3.
To check your answer, add all the numbers together.
_2_ _.
Notice that there are "2" spaces after the 2.
This is why there are 2 zeros in 200.
Therefore, 200 is the answer.
-kiniwih426
What access-point feature allows a network administrator to define what type of data can enter the wireless network?
How to square a number in java.
Answer:
num**2
Explanation:
To square a number in Java, you just take the number and use two asterisks (**) to denote an exponent, and then connect a 2 to it.
For example, if your number is 5:
5**2 in Java means 5^2, which is 25.
Just like how 5**3 in Java means 5^3.
Hope this helps.
________ software consists of operating systems, utilities, device drivers, and language translators.
Answer:
"System"
Explanation:
System software consists of operating systems, utilities, device drivers, and language translators.
(not much explanation as it was a fill in the blank which explains itself haha)
Have a nice day!
I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)
- Heather
We use the keyboard to point, click, and select menus and icons, and for onscreen navigation. True or False
Answer:
False.
Explanation:
Hope I could help. Hey, have a nice study time.
Answer:
false
Explanation:
we use our keyboard to type not click icons or point.
3.5 code practice python
Answer: This chapter is about variables in Python. So a variable can be any data type. And to find the datatype of a variable we need to use below code: x =10 print (type (x)) This will output: integer Now we can covert a string into integer as below:x=input("Enter X:")But above x is considered as string, and we need to convert it to integer to make use in for loop or any calculation.we can use:int(x), and this will convert x to int from string.Also, we have operators to change the variable values like =. +=, -=, /=, *= etc. So you need to remember these, and you will be up with all that is required for understanding variables. And rest is self explanatory certainly.
Explanation:
The answer is self explanatory
Vhat is the result when you run the following program?
rint(2 + 7)
rint("3+ 1")
4
O an error statement
2+7
o
4
0
9
3 + 1
Answer:
4
Explanation: