Answer:
b. The IP address of the server the process is typically accessing has changed
Explanation:
IP address stands for Internet Protocol address. It refers to a numerical value which is assigned to a every device which is connected to a computer network using the internet protocol for any communication.
Every device is allotted a unique IP address number.
In the context, Keely who works on an automation tool suddenly gets an error message that the account has been locked. This is mainly due to the changed in the IP address of the server that accesses the process.
The account gets closed or clocked whenever the IP address of the server changes.
Therefore, the correct option is (b).
Write a program to compare the content of AX and DX registers, if they are equal store 1 (as 8 bits) in locations with offset addresses (0020H, 0021H, ..., 0040H), otherwise leave these locations without changing.
???
Answer:
so srry I'm very low that this question
Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator& calculate_wages(double hours, double wages) { this->wages = hours * wages; return *this; } double get_wages() { return wages; } }; (Refer to Code Example 17-1.) What coding technique is illustrated by the following code? PayCalculator calc; double pay = calc.calculate_wages(40, 20.5).get_wages(); a. self-referencing b. function chaining c. dereferencing d. class chaining
Answer:
The answer is "Option b".
Explanation:
Function chaining is shown by this code, as the functions are called one after the other with one statement. Whenever you want to call a series of methods through an object, that technique is beneficial. Just because of that, you may give the same effect with less code and have a single given value only at top of the leash of operations.
Phân tích vai trò của các yếu tố trong biên tập Audio và Video
Answer:
Answer to the following question is as follows;
Explanation:
A visual language may go a long way without even text or narrative. Introductory angles, action shots, and tracker shots may all be utilised to build a narrative, but you must be mindful of the storey being conveyed at all times. When it comes to video editing, it's often best to be as cautious as possible.
why am i doing the investigation
Mario is giving an informative presentation about methods for analyzing big datasets. He starts with the very basics, like what a big dataset is and why researchers would want to analyze them. The problem is that his audience consists primarily of researchers who have worked with big data before, so this information isn’t useful to them. Which key issue mentioned in the textbook did Mario fail to consider?
Answer:
Audience knowledge level
Explanation:
The Key issue that Mario failed to consider when preparing for her presentation is known as Audience knowledge level.
Because Audience knowledge level comprises educating your audience with extensive information about the topic been presented. she actually tried in doing this but she was educating/presenting to the wrong audience ( People who are more knowledgeable than her on the topic ). she should have considered presenting a topic slightly different in order to motivate the audience.
What are the best websites to learn about Java Programing?
Answer:
well you can download some apps from the play store and it is easy for you to learn from there (interactive)
The advantage of returning a structure type from a function when compared to returning a fundamental type is that a. the function can return multiple values b. the function can return an object c. the function doesn’t need to include a return statement d. all of the above e. a and b only
Answer:
The advantage of returning a structure type from a function when compared to returning a fundamental type is that
e. a and b only.
Explanation:
One advantage of returning a structure type from a function vis-a-vis returning a fundamental type is that the function can return multiple values. The second advantage is that the function can return can an object. This implies that a function in a structure type can be passed from one function to another.
What are the differences between sequential and random files? Which one do you think is better and why?
Answer:
Sequential is better
Explanation:
Sequential is more organized while the more easier to make but less dependable one is random.
sequential is used for things such as date of birth, or where someone was born.
you can't do that with a random file.
Write a program that creates an an array large enough to hold 200 test scores between 55 and 99. Use a Random Number to populate the array.Then do the following:1) Sort scores in ascending order.2) List your scores in rows of ten(10) values.3) Calculate the Mean for the distribution.4) Calculate the Variance for the distribution.5) Calculate the Median for the distribution.
Answer:
Explanation:
The following code is written in Python. It uses the numpy import to calculate all of the necessary values as requested in the question and the random import to generate random test scores. Once the array is populated using a for loop with random integers, the array is sorted and the Mean, Variance, and Median are calculated. Finally The sorted array is printed along with all the calculations. The program has been tested and the output can be seen below.
from random import randint
import numpy as np
test_scores = []
for x in range(200):
test_scores.append(randint(55, 99))
sorted_test_scores = sorted(test_scores)
count = 0
print("Scores in Rows of 10: ", end="\n")
for score in sorted_test_scores:
if count < 10:
print(str(score), end= " ")
count += 1
else:
print('\n' + str(score), end= " ")
count = 1
mean = np.mean(sorted_test_scores)
variance = np.var(sorted_test_scores, dtype = np.float64)
median = np.median(sorted_test_scores)
print("\n")
print("Mean: " + str(mean), end="\n")
print("Variance: " + str(variance), end="\n")
print("Median: " + str(median), end="\n")
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demilitarized zone (DMZ) and provides name resolution for the domain for Internet hosts.
i. True
ii. False
Answer:
i. True
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.
PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.
Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.
In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).
A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.
Programming languages categorize data into different types. Identify the characteristics that match each of the following data types.
a. Can store fractions and numbers with decimal positions
b. Is limited to values that are either true or false (represented internally as one and zero).
c. Is limited to whole numbers (counting numbers 1, 2, 3, ...)
Answer:
a) Integer data type.
b) Real data type.
c) Boolean data type.
Explanation:
a) Integer data type is limited to whole numbers (counting numbers 1, 2, 3…….).
b) Real data type can store fractions and numbers with decimal positions (such as dollar values like $10.95).
c) Boolean data type is limited to values that are either true or false (represented internally as 1 and 0 respectively).
You are the IT administrator for a small corporate network. You have recently experienced some problems with devices on the workstation in the Support Office. In this lab, your task is use Device Manager to complete the following:______.
The new network card you installed isn't working as expected (speed is only 1 Mbps). Until you can figure out what the problem is, disable the Broadcom network adapter and enable the Realtek network adapter. To make sure the network adapter has the latest drivers, update the driver for the Realtek network adapter by searching Microsoft Update. You recently updated the driver for your video card. However, the system experiences periodic crashes that you suspect are caused by the new driver. Roll back the driver to a previous version. Move the Ethernet cable to the integrated network port on the motherboard.
Answer:
I will fix it by my mind by thinking
Based on the above scenario, the steps to take is given below\
What is the management about?The first thing is to Right-click Start and click on Device Manager and then you expand Network adapters.
Later you Disable the network adapter and then Update the driver .
Learn more about Ethernet from
https://brainly.com/question/1637942
#SPJ2
Which of the given assertion methods will return true for the code given below? Student student1 = new Student(); Student student2 = new Student(); Student student3 = student1;
The Student class is as follows.
public class Student{
private String name;
}
a. assertEquals(student1, student2);
b. assertEquals(student1, student3);
c. assertSame(student 1, student3);
d. assertSame(student1, student2);
Answer:
The true statements are :
A. assertEquals(student1,student2)
C. assertSame(student1,student3)
Explanation:
AssertEquals() asserts that the objects are equal, but assertSame() asserts that the passed two objects refer to the same object or not, if found same they return true, else return false.
Methods are collections of named code segments that are executed when evoked
The assertion method that will return true for the given code is: assertEquals(student1,student2)
The code segment is given as:
Student student1 = new Student();
Student student2 = new Student();
Student student3 = student1;
In Java, the assertEquals() method returns true if two objects have equal values.
Assume student1 and student2 have equal values, the statement assertEquals(student1,student2) will return true
Read more about java methods at:
https://brainly.com/question/15969952
5. Which events is used to code on any form load
a) Form Text b) Form Code c) Form Load d) Form Data
Answer:
I think b is correct answer
Discuss the OSI Layer protocols application in Mobile Computing
Answer:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.
hope that helps you
please follow
please mark brainliest
what is programming language?
Answer:
A programming language is a formal language comprising a set of strings that produce various kinds of machine code output. Programming languages are one kind of computer language, and are used in computer programming to implement algorithms. Most programming languages consist of instructions for computers
Answer:
The artificial languages that are used to develop computer programs are called programming language . hope this help!
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
A. IDS
B. AES
C. TPM
D. EFS
Answer:
Option A (IDS) is the correct choice.
Explanation:
Whenever questionable or unusual behavior seems to be detected, another alarm is sent out by network security equipment, which would be considered as Intrusion Detection System.SOC analysts as well as occurrence responders can address the nature but instead, develop a plan or take steps that are necessary to resolve it predicated on such notifications.All other three alternatives are not related to the given query. So the above option is correct.
Analyzing the role of elements in audio editing and Video
+ analyzing the role of the visual element in Video + analyzing the role of text factor
+ analyzing the role of the audio factor
+ analyzing the role of the transfer scene
+ analysing the role of the audio visual effects
Answer:
Analyzing the role of elements in audio editing and Video
+ analyzing the role of the visual element in Video + analyzing the role of text factor
+ analyzing the role of the audio factor
+ analyzing the role of the transfer scene
+ analysing the role of the audio visual effect
Write a recursive function called DrawTriangle() that outputs lines of '*' to form a right side up isosceles triangle. Function DrawTriangle() has one parameter, an integer representing the base length of the triangle. Assume the base length is always odd and less than 20. Output 9 spaces before the first '*' on the first line for correct formatting.
Answer:
Code:-
# function to print the pattern
def draw_triangle(n, num):
# base case
if (n == 0):
return;
print_space(n - 1);
print_asterisk(num - n + 1);
print("");
# recursively calling pattern()
pattern(n - 1, num);
# function to print spaces
def print_space(space):
# base case
if (space == 0):
return;
print(" ", end = "");
# recursively calling print_space()
print_space(space - 1);
# function to print asterisks
def print_asterisk(asterisk):
# base case
if(asterisk == 0):
return;
print("* ", end = "");
# recursively calling asterisk()
print_asterisk(asterisk - 1);
# Driver Code
n = 19;
draw_triangle(n, n);
Output:-
# Driver Code n = 19;| draw_triangle(n, n);
College
START: what new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its important to START doing this right away
Answer:
Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...
Browse Online Tutorials. ...
Build-up online profile. ...
Learn new Tools. ...
Implement what you learned. ...
Enrich your skillset. ...
Try-out and Apply.
Write a program that randomly chooses among three different colors for displaying text on the screen. Use a loop to display 20 lines of text, each with a randomly chosen color. The probabilities for each color are to be as follows: white 30%, blue 10%, green 60%. Suggestion: Generate a random integer between 0 and 9. If the resulting integer falls in the range 0 to 2 (inclusive), choose white. If the integer equals to 3, choose blue. If the integer falls in the range 4 to 9 (inclusive), choose green. Test your program by running it ten times, each time observing whether the distribution of line colors appears to match the required probabilities.
INCLUDE Irvine32.inc
.data
msgIntro byte "This is Your Name's fourth assembly extra credit program. Will randomly",0dh,0ah
byte "choose between three different colors for displaying twenty lines of text,",0dh,0ah
byte "each with a randomly chosen color. The color probabilities are as follows:",0dh,0ah
byte "White=30%,Blue=10%,Green=60%.",0dh,0ah,0
msgOutput byte "Text printed with one of 3 randomly chosen colors",0
.code
main PROC
;
//Intro Message
mov edx,OFFSET msgIntro ;intro message into edx
call WriteString ;display msgIntro
call Crlf ;endl
call WaitMsg ;pause message
call Clrscr ;clear screen
call Randomize ;seed the random number generator
mov edx, OFFSET msgOutput;line of text
mov ecx, 20 ;counter (lines of text)
L1:;//(Loop - Display Text 20 Times)
call setRanColor ;calls random color procedure
call SetTextColor ;calls the SetTextColor from library
call WriteString ;display line of text
call Crlf ;endl
loop L1
exit
main ENDP
;--
setRanColor PROC
;
; Selects a color with the following probabilities:
; White = 30%, Blue = 10%, Green = 60%.
; Receives: nothing
; Returns: EAX = color chosen
;--
mov eax, 10 ;range of random numbers (0-9)
call RandomRange ;EAX = Random Number
.IF eax >= 4 ;if number is 4-9 (60%)
mov eax, green ;set text green
.ELSEIF eax == 3 ;if number is 3 (10%)
mov eax, blue ;set text blue
.ELSE ;number is 0-2 (30%)
mov eax, white ;set text white
.ENDIF ;end statement
ret
setRanColor ENDP
when was first generation of computer invented?
I wanna learn python but I don't know any websites that I can learn it online. Thanks for attention!
Answer:
https://www.codecademy.com/
What is the relationship between an organization’s specific architecture development process and the Six-Step Process?
Answer:
It is a method of developing architecture in various stages
Explanation:
The organization-specific architecture developmental process is a tested and repeated process for developing architecture. It made to deal with most of the systems. It describes the initial phases of development. While the six step process is to define the desired outcomes, Endorse the process, establish the criteria and develop alternatives. Finally to document and evaluate the process.Write a program that reads in an integer, and breaks it into a sequence of individual digits. Display each digit on a separate line. For example, the input 16384 is displayed as 1 6 3 8 4 You may assume that the input has no more than five digits and is not negative.
Answer:
The program in Python is as follows:
num = int(input())
for i in str(num):
print(int(i))
Explanation:
This gets input for the number
num = int(input())
This converts the number to string and iterates through each element of the string
for i in str(num):
This prints individual digits
print(int(i))
2. Which property is used for hiding text of the textbox?
a) Password Char b) Text Char c) Char Password d) Pass Char
Answer:
password char
Explanation:
The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.
Algorithm
Read marks and print letter grade according to that.
Answer:
OKAYYYY
Explanation:
BIJJJJJJJSGJSKWOWJWNWHWHEHIWJAJWJHWHS SJSJBEJEJEJEJE SJEJBEBE
Microsoft office can be classified under what heading of application
Answer:
Word processing software/application
pls mark as brainliest!
Have a grt day!!!
What are some 5 constraints in using multimedia in teaching
Answer:
Explanation:
Technological resources, both hardware and software
Technological skills, for both the students and teacher
Time required to plan, design, develop, and evaluate multimedia activities
Production of multimedia is more expensive than others because it is made up of more than one medium.
Production of multimedia requires an electronic device, which may be relatively expensive.
Multimedia requires electricity to run, which adds to the cost of its use
There are constraints in using multimedia in teaching; The Technological resources, both hardware and software Also, Technological skills, for both the students and teacher
What is a characteristic of multimedia?
A Multimedia system has four characteristics and they are use to deliver the content as well as the functionality.
The Multimedia system should be be computer controlled. The interface is interactive for their presentation and lastly the information should be in digital.
There are constraints in using multimedia in teaching;
The Technological resources, both hardware and software
Also, Technological skills, for both the students and teacher
Since Time required to plan, design, develop, and evaluate multimedia activities
The Production of multimedia is more expensive than others because it is made up of more than one medium.
The Production of multimedia requires an electronic device, which may be relatively expensive.
The Multimedia requires electricity to run, which adds to the cost of its use.
Learn more about multimedia here;
https://brainly.com/question/9774236
#SPJ2
What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initialization list to the first two elements but leaves the other elements with the values currently in memory. b. It assigns the two values in the initialization list to the first and second elements, third and fourth elements, and fifth and sixth elements. c. This statement is invalid. d. It assigns the two values in the initialization list to the first two elements and default values to the other elements.
Answer:
It assigns the two values in the initialization list to the first two elements and default values to the other elements.
Explanation:
Given
The array initialization
Required
Interpret the statement
double gallons[6] implies that the length/size of the array gallons is 6.
In other words, the array will hold 6 elements
{12.75, 14.87} implies that only the first two elements of the array are initialized ; the remain 4 elements will be set to default 0.