Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second, regardless (within limits) of size. Assume the workstation uses direct memory access (DMA) to move data in and out of its main memory, which has a bandwidth of 2 Gbps, and that the I/O bus has a bandwidth of 1 Gbps. At what packet size would the bus bandwidth become the limiting factor

Answers

Answer 1

Answer:

When the transmission exceeds 667 packets

Explanation:

In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.

A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.


Related Questions

Which focal length and aperture combination is most likely to give you a deep depth of field?
a)50mm f2
b)120mm f4
c)18mm f22
d)120mm f5.6
50 points and brainliest mark

Answers

Answer:

f/11 is the answer I think

In the Dognition_aggregated_by_DogID data set, what is consistent about the relationship between breeding group and number of tests completed, regardless of whether you aggregate the variable representing the number of tests completed by the median or the average of the breeding group?

Answers

Answer:

Toy dogs

Explanation:

Tableau is an application used for statistically analyzing and visualizing data. It is very popular for its ecstatic data visualization figures and works with all dataset types to create a tableau data format.

The Dognition_aggregated_by_DogID dataset holds data for the different dog types, breeding, and tests done on them. The consistent relation between the breeding group column and tests completed is the toy dogs.

Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input begins with an integer indicating the number of integers that follow. You can assume that the list will have at least 2 integers and fewer than 20 integers. Ex: If the input is: 5 10 5 3 21 2 the output is: 2 3 To achieve the above, first read the integers into an array. Hint: Make sure to initialize the second smallest and smallest integers properly.

Answers

Answer:

Following are the code to this question:

import java.util.*;//import package

public class Main //defining a Main class  

{

   public static void main(String[] args)//defining a main method  

   {

       Scanner oxc = new Scanner(System.in);//defining main method  

       int n,m1,m2,num,t,i;//defining integer variable

       n= oxc.nextInt();//input value from user end  

       m1 = oxc.nextInt(); //input value from user end

       m2 = oxc.nextInt(); //input value from user end

       if (m1 > m2)//defining if block that check m1 greater then m2  

       {

           //swapping the value

           t= m1;

           m1 = m2;

           m2 = t;

       }

       for (i=2;i<n;i++)//defining for loop that check the smallest value    

       {

           num = oxc.nextInt();//input value from user end

           if (num < m1) //defining if block that check num lessthan m1

           {

               m2 = m1;//store m1 value into m2  

               m1 = num;//store num value into m1

           }

           else if (num<m2)//defining else if block that check num lessthan m2

           {

               m2 = num;//store m2 value in num

           }

       }

       System.out.println(m1 + " " + m2);//print value

   }

}

Output:

5

10

5

3

21

2

2 3

Explanation:

In the above-given code, inside the main class the main method is declared, in method 6 integer variable "n,m1,m2, num,t, and i" is declared, and in the "n, m1, m2, and num" is used for input the value from the user end.

In the next step, and if block is defined that check m1 greater than m2, and swap the value.In the next step for loop s used that defines two conditions that check the two smallest value from the user input and print its value.

I'm in Paris and want to take a picture of my mom in front of the Eifel Tower. I want both her and the tower to be in sharp focus. Which aperture is likely to do the best job of giving me that deep depth of field?
a) 2
b) 5.6
c) 11
d) 22
50 Points and brainliest mark

Answers

Answer:

Explanation:

It depends on the day. 5.6 might be best if it is a cloudy day. 2 would not work under any conditions.

11 might work well on a hazy day, but the sun is sort of visible.

A nice clear sunny day would allow you to use 22.

Answer:

Generally, a small aperture like f/8 will give you enough depth of field to be able to make most of your image sharp. However, if the subject is too close to your camera, you might need to either move back or stop down the lens even further to get everything looking sharp

And mostly :

It depends on the day. 5.6 might be best if it is a cloudy day. 2 would not work under any conditions. 11 might work well on a hazy day, but the sun is sort of visible. A nice clear sunny day would allow you to use 22.

The quality of an image is compromised when, what are stretched ?​

Answers

Answer:

pixels

Explanation:

The quality of an image is compromised when pixels are stretched the answer would be stretched.

What is resolution?

The number of unique pixels that may be displayed in each dimension depends on the display resolution or display modes of a digital television, computer monitor, or display device.

As we know,

The smallest component on your screen is a pixel. Resolution: The size of the pixel is discussed here.

The resolution increases with pixel size. Although strictly a printing word, DPI (or dots per inch) refers to the number of actual ink dots on a printed object.

When pixels are stretched, an image's quality suffers.

Thus, the quality of an image is compromised when pixels are stretched the answer would be stretched.

Learn more about the resolution here:

https://brainly.com/question/989447

#SPJ6

describe an activity to prove that sounds can travel in a liquid medium
in long



Answers

An activity to prove that sounds can travel in a liquid medium in long​ time is:

Use a tub  that is filled with water, also take a bell in one of your hand and then one can dip it into the water.  Note that you need to Keep one of your ears close to the surface of water and do not let the water go into the ear. Then ring the bell inside the tub water. You will be able to hear the sound very clearly. This tells that sound can travel via liquids.

How do sounds travel in liquids?

Sound waves is known to be one that tends to travel a lot faster in denser forms or kinds of substances due to the fact that neighboring particles will be able to bump into each other.

Therefore, An activity to prove that sounds can travel in a liquid medium in long​ time is:

Use a tub  that is filled with water, also take a bell in one of your hand and then one can dip it into the water.  Note that you need to Keep one of your ears close to the surface of water and do not let the water go into the ear. Then ring the bell inside the tub water. You will be able to hear the sound very clearly. This tells that sound can travel via liquids.

Learn more about sounds from

https://brainly.com/question/1199084

#SPJ1

A specific packet journey, from your computer to a remote server, end-to-end across multiple networks, has the following link bandwidths (packet travels across each of these links, in order): 1000 Mbps, 1 Mbps, 40 Mbps, 400 Mbps, 100 Mbps, 1000 Mbps. Assuming your computer and the server can transfer data at > = 1000 Mbps (so neither device is limiting the data transfer relative to the links), how long, in seconds, will it take to transfer a 125 MB file?

Answers

Answer:

0.125 seconds

Explanation:

The formula for the time taken to transfer the file is = file size / bandwidth

Assuming the computer and server could only transfer data at the speed of 1000 Mbps or more, The time of transmission is;

= 125 MB / 1000 Mbps = 0.125 seconds.

Which retouching action is unethical?

A.

removing a person from a photograph intended for publication in a newspaper

B.

removing the saturation in a photograph intended as a magazine cover page

C.

adding extra lighting on subject’s face and body in a photograph meant for display in an exhibition

D.

changing the color of the subject’s hair in a photograph intended for use in an advertising campaign

Answers

Answer:

B.) removing the saturation in a photograph intended as a magazine cover page

Answer:

its A for Plato

Explanation:Trust me i got it right

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.

5 3
9 3
5 7
9 7

Answers

Answer:

I took a screenshot of the test withe that question

Explanation:

some of the ways we can resolve IPv4 address shortage

Answers

Answer:

NAT

Proxy

IPv6

Explanation:

Network Address Translation (NAT) allows a local area network (LAN) to connect to the internet using only one external IP address. The LAN addresses (typically 192.168.x.x) can be used over and over again.

A proxy is a computer that makes requests to the internet on behalf of the computers on a LAN. It is a more restricted flavour compared to the NAT, but the effect is the same.

IPv6 is a new addressing scheme that will use a 48 bits address space rather than a 32 bits address space of IPv6, and that would provide plenty of addresses.

To make a window wider, you would move the pointer until it changes to the horizontal resize shape and then

Answers

Answer:double click it .

Explanation:

In a text messaging system, data is sent from one device to another. Devices are recognized by a unique device ID. The format of the message is sent as a string with information about the number of characters in the device ID, the device ID itself, the number of characters in the text message and the text message that is being sent with each part being separated by a space. The system uses this information to send the message to the correct device and the receiving device displays only the text message. The number of words in the text message is also useful. A word is defined by strings separated by spaces.
Here is a sample VALID message:
04 1234 05 hello
The first two digits in the string represent the length of the device ID to follow.
The device ID is the number of characters following the length. Note that the device ID may not be limited to number values.
Following the device ID is the length of the text message and then the text message itself. The text message may be any combination of characters (such as letters, numbers or symbols) and may include spaces.
This message contains one word.
Here is a sample INVALID message:
06 a2b10 09 I’m ready
The first two values 06 indicate the device ID length. The device ID is a2b10 which has a length of 5. This does not match the specified length 06. Thus, this is NOT a valid message.
This message contains two words.
The Message class represents messages in this system. A Message must have a device ID, the length of the ID, the length of the message and the text message being sent in order to be a valid message sent through the system. The Message class must determine if a message is valid in order to send a message. A valid message is one where the device ID length matches the given length in the message string and the text message length matches the length of the supplied text message. The text message consists of one or more words where the length of the text message string is at least one character.
Consider the code below:
Message msg1 = new Message("08 abc123xy 16 Computer Science"); //creates a new message object
boolean msg1Valid = msg1.isValid(); // returns true for a valid message
String text = "11 radio11a287 14";
Message msg2 = new Message(text);
boolean msg2Valid = msg2.isValid(); // returns false for an invalid message
Message msg3 = new Message("04 92a1 16 Computer Science");
Message msg4 = new Message("03 x8r 21 Today is a great day!");
int numWords = msg4.wordCount(); //returns 5, the number of words in the
//text message
Complete the Message class by writing the isValid() and wordcount() methods.
public class Message{
private int idLength;
private String deviceID;
private int msgLength;
private String textMsg;
public Message(String msg){
//implementation not shown
}
public boolean isValid(){
//to be written
}
public int wordCount(){
//to be written
}

Answers

Answer:

public int wordCount() {

       String[] arr = textMsg.split(" ", 0);

       return arr.length();

   }

public boolean isValid() {

       if (idLength == deviceID.length()) {

           if (msgLength == textMsg.length()) {

               return true;

           } else {

               return false;

           }

       return false;

   }

Explanation:

The Java source code defines two methods in a class named Message namely; isValid() and wordCount(). The isValid() method evaluates the validity of a message sent to return a boolean value while the wordCount() counts and returns the number of words in the message.

Amanda would like to add text to a slide in her presentation. Select all of the correct methods she can use to add text.
Select "Text" from the Insert menu.

Click in the Task pane and enter text.

Draw a text box, click in it, and enter text.

Click in a placeholder and enter text.

PLEASE help

Answers

Answer:

Draw a text box

Explanation:

Because if she draw it she can edit and write what she want

1. Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z
2. Write an if statement that assigns 10 to the variable b, and 50 to the variable c if the
3. Write an if-else statement that assigns 0 to the variable b if the variable a is less
than 10. Otherwise, it should assign 99 to the variable b.
Has and how does it work?
Algorithm Workbench
of the variable x is greater than 100.
variable a is equal to 100.​

Answers

Answer:

if x > 100:

   y = 20

   z = 40

Explanation:

what is the purpose of writing a topic sentence​

Answers

Answer:

A topic sentence must highlight the main idea of a paragraph, letting the reader know what the paragraph will be about. The topic sentence must present an idea that will unify the rest of the paragraph while relating it back to the main thesis of the paper.

Explanation:

Answer:

To summarize the main point of paragraph

Explanation:

Create a view named MAINE_TRIPS. It consists of the trip ID, trip name, start location, distance, maximum group size, type, and season for every trip located in Maine (ME). Write and execute the CREATE VIEW command to create the MAINE_TRIPS view. Write and execute the command to retrieve the trip ID, trip name, and distance for every Biking trip. Write and execute the query that the DBMS actually executes. Does updating the database through this view create any problems

Answers

Answer:

CREATE VIEW [MAINE_TRIPS] AS

SELECT trips_id, trip_name, start_location, distance, maximum_group_size , type, season

FROM trip

WHERE STATE = 'ME';

- To update a view, use the CREATE OR REPLACE VIEW clause. This would update the view with no errors.

Explanation:

The SQL statement above creates a view called MAINE_TRIPS from the trip table. A view is a virtual table that hold the result of query from an actual table.

It accepts all clauses like a normal table. For example, to get the trip id, name and distance column and the rows with the trip type biking;

SELECT trip_id, trip_name, distance FROM [MAINE_TRIPS]

WHERE type = 'biking'


If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color

Answers

I have no idea for that

Answer:

watermark

Explanation:

For this program you are given a String that represents stock prices for a particular company over a period of time. For example, you may be given a String that looks like the following:
String stockPrices = "1,22,30,38,44,68,49,73,52,66";
Each number in this String represents the stock price for a particular day. The first number is day 0, the second number is day 1, and so on. You can always assume tha the supplied string will formatted using commas to separate daily stock prices. The individual stock prices will always be valid integers, but they many not always be the same number of digits (i.e. 1 is a valid stock price, as is 1000. Your program should work with strings of any length. The "split" method might come in handy for this problem. Your task is to analyze the supplied string and determine the following:
• The highest price for the stock
• The day when the highest price occurred
• The lowest price for the stock
• The day when the lowest price occurred
Here are two sample runnings of the program:
// First run
Please enter stock prices: 1,22,30,38,44,68,49,73, 52,66
Highest price: 73 ocurred on day # 7
Lowest price: 1 occurred on day # 0
// pecond run
Please enter stock prices: stock_prices - 41,37,40,54,51,63,54,47,23,33
Highest price: 63 occurred on day # 5
Lowest price: 23 accurred on day # 8
Write your program on the following page. You can use this page for rough work.

Answers

Answer:

price = input("Please enter stock prices: ")

x = price.split(",")

min = int(x[0])

max = int(x[0])

for i in x:

    if int(i) < min:

         min=int(i)

    if int(i) > max:

         max=int(i)

index = x.index(str(max))

print("Highest price: "+str(max)+" ocurred on day # "+str(index))

index = x.index(str(min))

print("Lowest price: "+str(min)+" ocurred on day # "+str(index))

Explanation:

This solution is implemented in Python

This prompts user for stock prices

price = input("Please enter stock prices: ")

This places the price in a list

x = price.split(",")

The next two lines initialize the lowest and highest to stock at index 0

min = int(x[0])

max = int(x[0])

This iterates through the list

for i in x:

The following if statement checks for the lowest

    if int(i) < min:

         min=int(i)

The following if statement checks for the highest

    if int(i) > max:

         max=int(i)

This gets the day for the highest stock

index = x.index(str(max))

This prints the highest price and the day it occurred

print("Highest price: "+str(max)+" ocurred on day # "+str(index))

This gets the day for the lowest stock

index = x.index(str(min))

This prints the lowest price and the day it occurred

print("Lowest price: "+str(min)+" ocurred on day # "+str(index))

public class Main{ public static void main(String [] args){ String name=WelcomeJava; Runnable r1=() -> System.out.println(name); String name1 = name.toUpperCase(); Runnable r2=() -> System.out.println(name1); r1.run(); } }
What is the output of the above program?

Answers

Answer:

Concept: Programming

You take a string as an input, and you output the result which is a user defined name.Then you take that name and turn all the strings to uppercase in name and return that result.Rate brainlist

The output of the given program is,

''WelcomeJava''

Given program is,

public class Main {

   public static void main(String[] args) {

       String name = "WelcomeJava";

       Runnable r1 = () -> System.out.println(name);

       String name1 = name.toUpperCase();

       Runnable r2 = () -> System.out.println(name1);

       r1.run();

   }

}

Now, This program defines a class called Main, with a main method as the entry point.

It declares a String variable name with the value "WelcomeJava".

Then, it creates a Runnable r1 that prints the value of the name when executed.

Next, it converts the name to uppercase and assigns the result to name1.

Finally, it creates another Runnable r2 that prints the value of name1 when executed.

In the main method, r1 is called using the run method, resulting in the output "WelcomeJava".

Read more about Python programs at:

brainly.com/question/26497128

#SPJ4

What do you understand by storage devices ? Name any two storage devices.​

Answers

Answer:

Types of storage devices

Primary Storage: Random Access Memory (RAM) Random Access Memory, or RAM, is the primary storage of a computer. ...

Secondary Storage: Hard Disk Drives (HDD) & Solid-State Drives (SSD) ...

Hard Disk Drives (HDD) ...

Solid-State Drives (SSD) ...

External HDDs and SSDs. ...

Flash memory devices. ...

Optical Storage Devices. ...

Floppy Disks.

Answer:

this are the 2 examples of storage device

Hard Disk Drives (HDD)

Solid-State Drives (SSD)

Explanation:

basically storage device is a piece of hardware that is primarily used for storing data.

I hope it helps mate

mark me brainliest plsss

I will always help you understanding your assingments

have a great day

#Captainpower :)

write a an algorithm to find out volume?​

Answers

This for the algorithm of a sphere:
Define the radius of the sphere.
Define the pie and assign (22/7)
Calculate the volume of the sphere as (4/3)*pie*r3
Assign the volume of the sphere to volume_of_sphere.
Print the volume of the sphere.

A(n) __________ records the activities of computer operators surrounding each event in a transaction.
A. threat analysis
B. audit trail
C. DNA profile
D. expert systems analysis

Answers

Answer:

B. audit trail

Explanation:

A(n) audit trail records the activities of computer operators surrounding each event in a transaction.

I believe the answer is b

what is bullk email software​

Answers

Bull email software is a software that is used to send emails in large quantities

Hope this helps

What is a commonly used software access restriction for a computer system connected to other networks such as the internet?
a.Passwords
b. Firewall
c. encryption
d. biometric systems

Answers

Answer:

firewall

Explanation:

Select the correct answer. Which type of computer application is Apple Keynote? OA. word processor O B. spreadsheet O C. presentation OD. database O E. multimedia

Answers

Answer:

Apple Keynote is presentation Software

The correct option is C

Explanation:

Now let explain each option

Word processor:

Word processor is incorrect because it is used to type text, format it add tables and figures, For example MS Word

Spread Sheet:

Spread Sheet is incorrect as it is used for calculation. Like MS Excel

Presentation:

Key tone is a presentation software. it is used to make presentation and add animation and transition to it.

Database

Database is incorrect because databases are used for storing data. Not for presentation.

The type of device which is 3 ½ inch floppy drive is​

Answers

Answer:

That would be known as a floppy disk(literally)

Explanation:

It is a removable magnetic storage medium. They are used for moving information between computers, laptops or other devices.

explain the major innavotions made from the establishment of abacus​

Answers

Answer:

The abacus is one of many counting devices invented to help count large numbers.

Explanation:

A formal method for designing and representing human-computer interaction dialogues using box and line diagrams is called:________.

Answers

Answer:

Dialogue Diagramming

Explanation:

Dialogue is simply a sequence of interaction that usually occurs between a user and a system.it consists of Designing the dialogue sequence, Building a prototype and Assessing Usability

Dialogue diagramming is a known widely anf formal means by which we are designing and representing human-computer dialogues using box & line diagrams.

This is similar to the last problem, except that the first number on a line is an ID number that identifies an account. The same ID number may appear on any number of lines. Use a Dictionary to accumulate, for each ID, the sum of all the numbers that are on all the lines with that ID number. Call the input file id_data.txt. Write an output file called ID_sums.txt. On each line of the output fille, print an ID number and the sum. Sort the lines by the numerical order of the IDs

Answers

Answer:

Following are the code to this question:

def getSum(ID):#defining a method getSum that accept an ID

   t= 0#defining a variable t

   while ID!= 0:#defining while loop to check ID not equal to 0

       t+= ID % 10# holding remainder value

       ID = ID // 10#holding quotient value

   return t#return total value

def readRecord(S):#defining a method readRecord that hold list  

   f_Read = open("idInfo.txt","r")#defining a variable f_Read to open file

   for C_ID in f_Read:#defining for loop to hold file value  

       C_ID = C_ID.replace('\n', '')#use replace method

       S[C_ID] = getSum(int(C_ID))#use list to method value

   f_Read.close()#close file

def sortRecord(ID_List, t_List):#defining a sortRecord

   for x in range(len(ID_List) - 1):#defining for loop to calculate the length of list  

       for y in range(0, len(ID_List) - x - 1):#defining for loop to calculate the length of list

           if ID_List[y] > ID_List[y+1]:#defining if block to check value is greater

               ID_List[y], ID_List[y+1] = ID_List[y+1], ID_List[y]#swap the value

               t_List[y], t_List[y+1] = t_List[y+1], t_List[y]#swap the value

def showReport(ID, t):#defining a method showReport that accept id and t

   for i in range(len(ID)):#defining for loop to hold index value

       print(ID[i]," ",t[i])#print index value

def writeRecord(ID_List, t_List):#defining a method writeRecord that accept two list

   f_Write = open("idSorted.txt","w")#defining a variable f_Write to hold store value in file

   for i in range(len(ID_List)):#defining a for loop to store value with index

       f_Write.write(ID_List[i])#hold list value

       f_Write.write(" ")    #for space

       f_Write.write(str(t_List[i]) + "\n")# add index value

   f_Write.close()#close file

def run():#defining method run

   S = {}#defining an empty list

   readRecord(S)#passing list into readRecord method

   ID_List = list(S.keys())#defining a variable that holds key value in list

   t_List = list(S.values())#defining a variable that holds values value in list

   sortRecord(ID_List, t_List)#calling a method sortRecord by passing value

   showReport(ID_List, t_List)#calling a method showReport by passing value

   writeRecord(ID_List, t_List)#calling a method writeRecord by passing value

if "run":

   run()

Output:

Please find the attached file.

Explanation:

In the above program code, 6 method getSum, readRecord, sortRecord,showReport, writeRecord, and run method is defined, in which getSum and readRecord is used a single list store value in parameters, and in other methods, it accepts two parameter to store value in key and values form and use a txt file to store and take value.    

In the run method, an empty list s is declared, that pass into the variable ID_List and t_List, and call the method, in this program two a text file "idInfo.txt" is used, that holds some value in the file, and create another file that is "idSorted.txt", in this file it stores the value in the numerical order of the ID's.

In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose is

Answers

Answer:

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.

12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)

Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.

Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.

Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.

Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.

Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.

Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:

Explanation:

Other Questions
a small balloon containing baking soda has a mass of 4 grams. A student adds 10 ml. of vinegarto a 100 gram glass bottle. The student stretches the opening of the balloon over the mouth ofthe bottle, mixing the baking soda and vinegar inside the bottle. Once the balloon is inflated, thestudent finds the mass of the balloon, bottle, and their contents to be 116 grams. What was themass of the vinegar originally in the bottleF.10g G.12g J.16g Vital Silence Corp. has just issued a 30-year callable, convertible bond with a coupon rate of 6.4 percent and annual coupon payments. The bond has a conversion price of $93.40. The company's stock is selling for $28.60 per share. The owner of the bond will be forced to convert if the bond's conversion value is ever greater than or equal to $1,140. The required return on an otherwise identical nonconvertible bond is 7.4 percent. Assume a par value of $1,000.a. What is the minimum value of the bond?b. If the stock price were to grow by 10.8 percent per year forever, how long would it take for the bond's conversion value to exceed $1,140? Which country was expelled from the League of Nations?A-RussiaB-GermanyC-ChinaD-Italy Helppp... last question on the test lol (Will mark brainliest) Read each sentence carefully and select the option with the sentence written correctly. Yo necesito la camiseta. . T necesita la camiseta. Usted gusta la camiseta Yo le gustas la camiseta. Need help asap in a hurry, please. Doing a budget The gross income is $54,000. A body is moving with an acceleration of 60 m/s2. If the force applied to tbody is 42000 N, calculate its mass When two people play a game, each player starts with 10 points. The winner of each round gets 3 points and the loser of each round loses 3 points. William and Abigail play the game. William wins exactly four rounds, and Abigail ends up with16 points. How many rounds did they play altogether? What is the measure in degrees for the central angle of a circle whose radius is 8 cm and intercepted arc length is 5.6 cm? It all began with Effie's getting something in her eye. It hurt very much indeed, and it felt something like a red-hot sparkonly it seemed to have legs as well, and wings like a fly. Effie rubbed and criednot real crying, but the kind your eye does all by itself without your being miserable inside your mindand then she went to her father to have the thing in her eye taken out. Effie's father was a doctor, so of course he knew how to take things out of eyes.When he had gotten the thing out, he said: "This is very curious." Effie had often got things in her eye before, and her father had always seemed to think it was naturalrather tiresome and naughty perhaps, but still natural. He had never before thought it curious.Effie stood holding her handkerchief to her eye, and said: "I don't believe it's out." People always say this when they have had something in their eyes."Oh, yesit's out," said the doctor. "Here it is, on the brush. This is very interesting."Effie had never heard her father say that about anything that she had any share in. She said: "What?"The doctor carried the brush very carefully across the room, and held the point of it under his microscopethen he twisted the brass screws of the microscope, and looked through the top with one eye."Dear me," he said. "Dear, dear me! Four well-developed limbs; a long caudal appendage; five toes, unequal in lengths, almost like one of the Lacertidae, yet there are traces of wings." The creature under his eye wriggled a little in the castor oil, and he went on: "Yes; a bat-like wing. A new specimen, undoubtedly. Effie, run round to the professor and ask him to be kind enough to step in for a few minutes.""You might give me sixpence, Daddy," said Effie, "because I did bring you the new specimen. I took great care of it inside my eye, and my eye does hurt."The doctor was so pleased with the new specimen that he gave Effie a shilling, and presently the professor stepped round. He stayed to lunch, and he and the doctor quarreled very happily all the afternoon about the name and the family of the thing that had come out of Effie's eye.But at teatime another thing happened. Effie's brother Harry fished something out of his tea, which he thought at first was an earwig. He was just getting ready to drop it on the floor, and end its life in the usual way, when it shook itself in the spoonspread two wet wings, and flopped onto the tablecloth. There it sat, stroking itself with its feet and stretching its wings, and Harry said: "Why, it's a tiny newt!"The professor leaned forward before the doctor could say a word. "I'll give you half a crown for it, Harry, my lad," he said, speaking very fast; and then he picked it up carefully on his handkerchief."It is a new specimen," he said, "and finer than yours, Doctor."It was a tiny lizard, about half an inch longwith scales and wings.So now the doctor and the professor each had a specimen, and they were both very pleased. But before long these specimens began to seem less valuable. For the next morning, when the knife-boy was cleaning the doctor's boots, he suddenly dropped the brushes and the boot and the blacking, and screamed out that he was burnt.And from inside the boot came crawling a lizard as big as a kitten, with large, shiny wings."Why," said Effie, "I know what it is. It is a dragon like the one St. George killed."And Effie was right. That afternoon Towser was bitten in the garden by a dragon about the size of a rabbit, which he had tried to chase, and the next morning all the papers were full of the wonderful "winged lizards" that were appearing all over the country. The papers would not call them dragons, because, of course, no one believes in dragons nowadaysand at any rate the papers were not going to be so silly as to believe in fairy stories. At first there were only a few, but in a week or two the country was simply running alive with dragons of all sizes, and in the air you could sometimes see them as thick as a swarm of bees. They all looked alike except as to size. They were green with scales, and they had four legs and a long tail and great wings like bats' wings, only the wings were a pale, half-transparent yellow, like the gear-boxes on bicycles.Based on the rising action in the bolded paragraphs, what do we know about Daddy? He is calm and curious. He is angry and upset. He is hysterical. He is uninterested and bored. Find the slope of a line parallel to each given line 2. Re-write the equation in slope-intercept formy + 4 = -2(x + 3) If the dotted figure is the image, the original figure was reflected over the. How much silver phosphate is produced if 10 g of silver acetate is reacted with excess sodium phosphate? 29 of the first 42 presidents of the United States were lawyers. What percentage of these presidents were lawyers? (Give answer to nearest 1%) Show work answer this, please !!! Tools -Question 9Which expression is equivalent to (x-2)(x - 1)?Ax-3x-2Bx - 2x-3x-3x+2Dx - 2x + 3 What issue seemed to be the most significant for the Oklahoma state constitutional convention? A. educational supportB. segregation lawsC. state fundingD. federal support Completa el espacio en blanco con la mejor respuesta.Una estufa (stove) caliente puede ___________ tu mano.mostrartratarolvidarquemar What is the sum of the measures of the interior angles of a 27-gon?