Answer:
IT terms Network:
Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
Packet: Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
Router: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
IP address: For the most part, an IP address tells you the city, ZIP code, or area code of your ISP, as well as your ISP's name. What can an IP address tell you? To some degree, your physical location and also the name of your ISP
Server: A server operating system, such as Windows Server or Linux, acts as the platform that enables applications to run. The operating system provides applications access to the hardware resources that they need and enables network connectivity. The application is what enables the server to do its job.
LAN: A local area network (LAN) consists of a series of computers linked together to form a network in a circumscribed location. The computers in a LAN connect to each other via TCP/IP ethernet or Wi-Fi. A LAN is normally exclusive to an organization, such as a school, office, association or church.
WAN: A wide area network (also known as WAN), is a large network of information that is not tied to a single location. WANs can facilitate communication, the sharing of information and much more between devices from around the world through a WAN provider.
Bus topology: also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.
A ring topology: is a network configuration where each networked device is connected to two other devices on either side of it to form a circular “ring” data path. When data is transferred in a ring topology, the data is sent in one direction along the single continuous pathway.
Star topology: is a network topology in which each network component is physically connected to a central node such as a router, hub or switch. In a star topology, the central hub acts like a server and the connecting nodes act like clients.
A mesh topology: is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.
Your ISP: is the company that gets you onto the Internet – your home Internet or mobile data provider. If your ISP is spying on you, it means they can use or sell your browsing history to others for things like creepy ads that follow you around the Internet or to junk mail providers.
Dial up: relating to or being a standard telephone line used for computer communications also : accessible via a standard telephone line a dial-up Internet provider.
DSL: DSL stands for Digital Subscriber Line, and describes a family of technologies used for digital data transmission and connection to the Internet. It is a type of broadband communication service available to homes and businesses that uses existing phone lines without interrupting telephone use.
Cable Broadband: Cable broadband connects your home to a fibre cabinet in your area. However, instead of using copper wires, cable broadband uses coaxial cables to connect to the cabinet, giving you a much faster internet connection than the traditional copper phone line cables used for 'superfast' broadband connections (up to 60Mbps)
Fiber optics: is used for long-distance and high-performance data networking. It is also commonly used in telecommunication services, such as internet, television and telephones.
A mobile network (also wireless network) route's communications in the form of radio waves to and from users. It is composed of base stations that each cover a delimited area or "cell." When joined together these cells provide radio coverage over a wide geographic area.
Explanation:
3
User input is required in an iterative program.
A.
True
B.
False
Answer:
B
Explanation:
An iterative program could work with or without user input. It really just depends on the type of program you're creating. Hope this helps.
Which of these is a quicker way to add onto the value previously held by the variable “a” in in Python? A. a == a + 20 B. a += 20 C. a + 20 D. a/20
Answer:
b
Explanation:
B. a += 20 exists a quicker way to add onto the value formerly carried by the variable “a” in Python.
What is Python?Python exists as a high-level, interpreted, general-purpose programming language. Its design philosophy highlights code readability with the use of substantial indentation. Python exists dynamically typed and garbage-collected.
Python exists as a computer programming language often utilized to build websites and software, automate tasks, and perform data analysis. Python exists as a general-purpose language, meaning it can be utilized to create a variety of various programs and isn't specialized for any distinctive problems.
A Python variable exists as a symbolic name that exists as a reference or pointer to an object. Once an object exists allocated to a variable, you can direct it to the object by that name.
Hence, B. a += 20 exists a quicker way to add onto the value formerly carried by the variable “a” in Python.
To learn more about Python refer to:
https://brainly.com/question/26497128
#SPJ2
Complete the sentence. Privacy of means that our data should not be automatically available to others.
The term Privacy means that our data should not be automatically available to others and there should be a measure of restriction for people in accessing it.
What is privacy of data?Data privacy is known to be the right of people to have control over how their personal information as to when or if it can be collected or used.
Data protection is known to be part of privacy. This is due to the fact that protecting user data and sensitive information is a initial step to keeping user data private.
Learn more about Privacy of means from
https://brainly.com/question/1189272
Discuss how the use of standard web component layouts and templates influences the visual design of a web page. In your opinion, do these approaches limit creativity and originality in web page design? Support your response by suggesting contexts in which using a standard layout or template may be especially helpful or unhelpful.
Answer: The standard web component layouts and templates makes the web page seem like many others but could also make it easier for users to interact and use the web page without much trouble. The approaches do limit creativity and originality in web page design but its better to have an easy to use web page that can still look good rather than something that is confusing for the users.
Explanation:
Standard web component layouts and templates make the website look generic, but they may also make it simpler for visitors to engage with and navigate the website.
What is web component?A group of functions known as Web Components offer a common component model for the Web, enabling the encapsulation and interchange of individual HTML components.
A collection of technologies called Web Components enables you to develop reusable bespoke elements for use in web projects that have their functionality isolated from the rest of your code.
Although standard web component layouts and templates give the website a basic appearance, they may also make it easier for visitors to interact with and navigate the site.
The methods do place restrictions on uniqueness and creativity in web page design, but it is preferable to create a web page that is simple for users to navigate while still looking nice.
Thus, the use of standard web component layouts and templates influences the visual design of a web page.
For more details regarding web components, visit:
https://brainly.com/question/21848424
#SPJ2
Your boss has asked you to create a program that calculates the total cost of an item
after a discount and sales tax have been applied. You have been testing the program
using a cost of $10.00, a discount of 50%, and 10% sales tax. You know the answer
should be $5.50 but the program returns $16.50. What type of error is most likely
causing the problem?
Answer:
Have you tried debugging the text? It shows the line by line process of the final answer
how do artificial intelligence works?
[tex]\huge\purple{——————————}[/tex]
[tex] \large \bold{QUESTION:}[/tex]
How do artificial intelligence works?
[tex] \\ [/tex]
[tex] \large \bold{ANSWER:}[/tex]
To imitate human intelligence, artificial intelligence employs machine learning. Because the computer must learn how to react to certain activities, it creates a propensity model using algorithms and previous data. Following that, propensity models will begin to make predictions.[tex]\huge\purple{——————————}[/tex]
#CarryOnLearning
How many times would the following loop iterate?
Set k = 1
While k < 5
Display k
Set k = k + 1
End While
Answer:
The answer to this question is given below in the explanation section
Explanation:
The code is :
Set k = 1
While k < 5
Display k
Set k = k + 1
End While
this is a while loop, that will iterate 4 times and display the body of loop. and at the fifth iteration, the loop condition does not meet the condition and the loop will get terminated.
explain the advantage and disadvantage of using css.
Explanation:
When discussing the advantage/dis- of CSS, its important to note the two types of CSS
Inline and External CSS.
Inline CSS allows for on the spot changing of the style of whatever.
External CSS allows for site wide changes to the style of whatever.
When it comes to UX, External CSS creates a longer load time of the webpage, especially if there's a large amount of styles for things.
Inline CSS causes problems when you want Javascript oriented design as Javascript overwrites Inline. when coded in a specific way.
Python programmers use the Else statement to run code
O when all the conditions in the preceding If and Elif statements evaluate as False.
when the first condition evaluates as True and the second condition evaluates as False.
when the code needs to be executed every time the program is run.
when the code needs to be executed for conditions that evaluate as True.
An else statement runs when all the conditions in the preceding if and elif statements evaluate as False.
Python programmers use the Else statement to run code when all the conditions in the preceding If and Elif statements evaluate as False.
What is an else statement in Python?An else statement is known to be a kind of computer statement that is made up of block of code that are often used to carry out the if conditional expression in the if statement so as to be able to take it to 0 or a FALSE value.
Conclusively, note that the else statement is said to be a statement that is optional in nature and as such, Python programmers use the Else statement to run code when all the conditions in the preceding If and Elif statements evaluate as False.
Learn more about Python programmers from
https://brainly.com/question/13723557
#SPJ2
Which should be your first choice for the most efficient and successful job search method?
visiting a career center
performing an online search
networking person-to-person
checking newspapers and other publications
Answer:
C
Explanation: Source: trust me bro
Answer:
C
Explanation: Edge 2022
Benchmark test compare similar systems performing in which tasks
A) similar tasks
B) different tasks
C) related tasks
D)identical tasks
Benchmark test compare similar systems performing in identical tasks.
What is Benchmark in the act of Performance Testing?A Benchmark Testing is known to be a kind of metric or one that is used as a kind of point of reference against a software products or services and it is one that can be compared to know the quality feature.
This kind of test is one where there is a set standard that aid one in knowing the quality of software product or service. One can benchmark a identical product to know its quality.
Learn more about Benchmark test from
https://brainly.com/question/226804
What can amber do to make sure no one else can access her document?
To make sure that no one else can access her document, Amber can do the following
Use strong passwordsEncrypt the documentWhat is the document about?The use of passwords that are challenging to speculate or break. To create a strong password, it is advisable to use a combination of capital and lowercase letters, as well as numbers and special symbols.
Lastly, Secure the document via encryption in order to prevent any unauthorized access. The majority of word processing software includes encryption functionalities that enable the encryption and password safeguarding of documents.
Learn more about Encrypt from
https://brainly.com/question/20709892
#SPJ1
Three-dimensional models are constructed using two-
dimensional profiles.
True or false
Answer:
False.
It would be true for pyramids, but not true for other shapes, like spheres and cubes.
Which mynav module serves as the source for sales and delivery content, assets, and internet and intellectual property across industries?
Accenture's myNav is the mynav module serves as the source for sales and delivery content, assets, and internet and intellectual property across industries.
What are myNav modules?myNav is a tool that is used by companies so as to manage the human, technology and also some other dimensions of cloud services in business.
The Accenture's myNav is known to be the right tool for the above platform as it on that can help the firm and the people to choose end-to-end cloud solutions.
Learn more about Accenture from
https://brainly.com/question/24918185
what is the extension of excel worksheet
Answer:
Excel file formats
Format Extension
Excel Workbook .xlsx
Excel Macro-Enabled Workbook (code) .xlsm
Excel Binary Workbook .xlsb
Template .xltx
what is Google search
Answer:
a web search engine developed by Google LLC.
Explanation:
Answer:
Google Search, or simply Google, is a web search engine developed by Google LLC.The main purpose of Google Search is to search for text in publicly accessible documents offered by web servers, as opposed to other data, such as images or data contained in databases.Google has a large index of keywords that help determine search results. What sets Google apart is how it ranks its results, which determines the order Google displays results on its search engine results pages. Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.
Explanation:
4. How many times will the print statement be executed within the following nested for loops? Briefly explain how or show the math to calculate that number of iterations.
for (int h = 1; h <= 12; h++) {
for (int m = 0; m <= 59; m++) {
for (int s = 0; s <= 59; s++) {
System.out.printf(“%d:%02d:%02d%n”, h, m, s);
}
}
}
Print statements are used to display outputs
The number of times the nested loop will be executed is 43200
What are nested for loops?Nested for loops are loops that are placed within another loop or loops
From the statement, we have the following loop conditions:
h = 1; h <= 12, m = 0; m <= 59 and s = 0; s <= 59
The above means that:
h = 12 --- the outer loop will be executed 12 timesm = 60 --- the middle loop will be executed 60 timess = 60 --- the inner loop will be executed 60 timesSo, the number of times the nested loop will be executed is:
[tex]Count = 12*60 *60[/tex]
[tex]Count = 43200[/tex]
Hence, the number of times the nested loop will be executed is 43200
Read more about loops at:
https://brainly.com/question/14284157
You are a Network administrator for a company whose IP address is 199.199.10.0/24. Your company has two departments. Research needs 13 hosts and Marketing needs 31 hosts. Using VLSM; what is the network address of the second subnet?
Answer:
Explanation:
VLSM is Variable Fixed Length Subnet Mask which creates subnets with varying sizes with a variable number of hosts.
Arrange the different subnets with descending number of hosts required. So the first subnet will be for Marketing and the second will be for Research. The second subnet will have the second higher IP available which is 199.199.10.0/26. It has 64 IP addresses that can be assigned to 13 hosts required by Research.
Should spreadsheets be used to track time worked at a job?
YES
NO
Answer:
Yes
Explanation:
Spreadsheets should be used to track time worked at a job because it would make it easier to use and see rather than another platform.
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . Group of answer choices analysis integrity masquerade encryption
List four useful spreadsheet functions and explain what they do.
Answer:
SUM, AVERAGE, MAX,MIN
Explanation:
Sum: The SUM function is categorized under Excel Math and Trigonometry functions. ... The function will sum up cells that are supplied as multiple arguments. It is the most popular and widely used function in Excel. SUM helps users perform a quick summation of specified cells in MS Excel.
Average: The AVERAGE function in Excel does exactly what you think it should. It computes the mathematical average of a set of numbers. In other words, it adds up a set of numbers and then divides the sum by how many numbers are being averaged.
Max: he MAX function will count numbers but ignore empty cells, text, the logical values TRUE and FALSE, and text values. In financial analysis, MAX can be useful in calculating the highest score, the fastest time, the highest expense or revenue amount, etc.
Min: will return the minimum value in a given list of arguments. From a given set of numeric values, it will return the smallest value. Unlike the MINA function, the MIN function ignores numbers, text, and logical values TRUE and FALSE and text values. In financial modeling.
What is the key difference between UDP and TCP protocols in TCP/IP reference model?
Answer:
TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. The speed for TCP is slower while the speed of UDP is faster.
Answer:
TCP is a connection oriented protocol.
UDP is a connectionless protocol.
Explanation:
PLEASE MARK ME AS BRAINLIEST
HAVE A NICE DAY :)
Write an application that allows a user to enter a filename and an integer representing a file position. Assume that the file is in the same folder as your executing program. Access the requested position within the file, and display the next 10 characters there.
The program is an illustration of file manipulations, where files are accessed, read and modified
The main programThe program written in Python, where comments are used to explain each action is as follows;
#This gets the file name
fname = input("Enter file name: ")
#This gets an integer value
num = int(input("Integer: "))
#This opens the file
file = open(fname, 'r')
#This initializes the number of characters to 0
count = 0
#This begins an iteration
while 1:
# This prints each character
print(file.read(1))
#This increases the number of characters printed by 1
count+=1
#When 10 characters are printed
if count == 10:
#This closes the iteration
break
#This closes the file
file.close()
Read more about file manipulations at:
https://brainly.com/question/16397886
okay this is a odd question but what is this symbol called?
< > what are these called lol
Answer: greater then or less than lol
Explanation: I learned it in elementary-
Explanation:
the one that "eats" the number means that one is greater.
greater than and less than.
hope this helps !
Use the drop-down menu to identify which command is used to do the activities.
Saving updates on a workbook:
Saving a workbook on OneDrive:
Changing the file name of an existing workbook:
Saving an existing workbook in a different location:
Assigning an initial location for the workbook to be saved:
Answer:
1. Both
2. Save As
3. Save As
4. Save As
5. Both
Explanation:
got the question right
The value you choose—typically the display text—will be saved as the default “Dropdown list” data-type. Instead of saving the text, the “Dropdown list with published keys” instead saves the Revalue ID (from the database).
What is use of a drop-down menu to identify a command?A drop-down menu, also known as a list of options, appears when a button or a piece of text is clicked. Users can decide a value from a list by selecting it from a graphical representation of this method.
People can select an item from a list you generate using drop-down menus. In a new worksheet, type the selections you want to appear in your drop-down list. Your list items should ideally be in an Excel table.
A closed-ended inquiry known as a dropdown allows respondents to select one response option from a set of options displayed in a dropdown menu.
Therefore, 1. Both 2. Save As 3. Save As 4. Save As 5. Both.
Learn more about drop-down here:
https://brainly.com/question/4379717
#SPJ2
Assignment 5B : Maze Game! 2D Arrays can be used to store and represent information
about video game levels or boards. You will use this knowledge to make an interactive game where players attempt to move through a maze. You will start by creating a pre-defined 2D array with the following values:
{"_","X","_","X","X"}
{"_","X","_","X","W"}
{"_","_","_","X","_"}
{"X","X","_","_","_"}
{"_","_","_","X","X"}
You will then set the player (represented by "O") at index 0, 0 of the array, the top-left
corner of the maze. You will use a loop to repeatedly prompt the user to enter a
direction ("Left", "Right", "Up", or "Down"). Based on these directions, you will try to
move the player.
• If the location is valid (represented by "_"), you will move the player there
• If the location is out of bounds (e.g. index 0, -1) or the command is invalid, you
will inform the player and prompt them to enter another direction
• If the location is a wall (represented by "X"), you will tell the user they hit a wall
and the game is over.
If the player did not lose, you will print out the current state of the map and ask them for
a new direction. You will keep doing this until they lose or they reach the end
(represented by the "W").
Sample Output #1:
[Maze Game]
O.X._.X.X.
_.X._.X.W.
_._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Up
You can't move there - it's out of bounds!
Which direction do you want to move? Down
_.X._.X.X.
O.X._.X.W.
_._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Down
_.X._.X.X.
_.X._.X.W.
O._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Down
You hit a wall - Game Over!
Sample Output #2:
[Maze Game]
O.X._.X.X.
_.X._.X.W.
_._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Eleventy
That's not a valid direction!
Which direction do you want to move? Down
_.X._.X.X.
O.X._.X.W.
_._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Down
_.X._.X.X.
_.X._.X.W.
O._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Right
_.X._.X.X.
_.X._.X.W.
_.O._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Right
//Skipping ahead (This line is not part of the output)
_.X._.X.X.
_.X._.X.W.
_._._.X.O.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Up
You win!
Answer:
yes
Explanation:
What can you create best in Word Online?
Animation
Graph
Newsletter
Spreadsheet
Answer:
The correct answer is Newsletter
Explanation:
You can't draw on Word so that rules out animation. You can make graphs but its incredibly complicated and same goes with spreadsheets. That just leaves newsletter which is just typing up an essay or a story.
Answer:
Newsletter
Explanation:
Observation and screening data should not influence curriculum development true or false?
Answer:true
Explanation: we cant rely on computers
The given statement about the importance of observation and screening in curriculum development is false.
What is curriculum development?Curriculum development is given as the process of development of the systematic process of learning for the students. The process of curriculum development is comprised of the steps that evaluate the development of the students.
Observation and screening play an important role in the development of the curriculum as is signifies the development. Thus, the given statement is false.
Learn more about curriculum development, here;
https://brainly.com/question/10686364
#SPJ2
what are the five generation of computer hardware
Answer:
First Generation: Vacuum Tubes.
Second Generation: Transistors.
Third Generation: Integrated Circuits.
Fourth Generation: Microprocessors.
Fifth Generation: Artificial Intelligence.
Write a C++ program to Calculate the value of π from the infinite series Print a table that shows the value of π approximated by computing the first 200,000 terms of this series. How many terms do you have to use before you first get a value that begins with 3.14159?
The C++ program is an illustration of loops and conditional statements
How to analyze the infinite seriesThe infinite series is given as:
[tex]\pi = 4 - \frac 43 + \frac 45 - \frac 47 + \frac 49 -\frac 4{11} + ....[/tex]
The above series shows that, the addition and the subtraction signs are interchanged, and the denominator of the fractions increase by 2 while the numerator remains the same
The main programThe program written in C++, where comments are used to explain each line is as follows:
#include <iostream>
using namespace std;
int main(){
//This initializes the value of pi to 0
double pi = 0;
//This iterates from 1 to 200000
for(int i = 0; i< 200000; i++){
//The following conditions determine the value of pi
if(i%2==0){
pi+=4.0/(1.0+2.0*i);
}
else{
pi-=4.0/(1.0+2.0*i);
}
}
//This prints the value of pi
cout<<pi;
return 0;
}
Read more about loops and conditional statements at:
https://brainly.com/question/24833629