Answer:
Collision or electromagnetic interference (EMI)
Explanation:
Some network cables connected to switch or router ports are prone to internal collision (between two frames or packets) and external collision with electromagnetic waves from other sources (EMI).
Electromagnetic waves are also known as radio waves or signals. When they are transmitted, the network cable acts as a receiver, the received signal interferes with the packet in the cable. This is why the cyclic redundancy check (CRC) throws an error.
Please!! I need help, this is due by tonight!!!
Answer:
sorry if it is too late but I think it is d
Explanation:
A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text. (230)Group of answer choices
Answer:
The appropriate response will be "Public key".
Explanation:
A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms. Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.As per the scenario, a Public key would be the set of such characters.
A public key would have been generated using cryptographic protocols or the techniques, which contains asymmetric keyword encrypted methods.These very same keys were being used to convert a memorandum or manuscript to such an unintelligible state. Decryption has always been accomplished solely through the use of a completely separate, but associated, highly classified address and otherwise key.Thus the above response is correct.
Learn more:
https://brainly.com/question/20709892
Which file extension indicates a text document? .ppt .tst .pdf .txt
Answer:
The answer is .txt
Explanation:
Answer:
.txt
Explanation:
odesseyware 2021
computer is an electronic machine that is used for data processing to produce meaningful information explain in statement
If you have a line that is 2.5 inches in decimal, what is that in fraction form?
2 5/16 inches
2 1/4 inches
2 3/4 inches
2 1/2 inches
If you are asked to measure 9/16th on a ruler how many lines would you have to count?
Answer: 2 1/2 inches; 9 lines
Explanation:
If one has a line that is 2.5 inches in decimal, this in fraction form will be written as:
= 2.5 inches = 2 5/10 inches.
When we reduce 5/10 to its lowest term, this will be 1/2. Therefore 2.5 inches = 2 1/2 inches.
Since each mark on a ruler is 1/16, therefore 9/16 will be (9/16 ÷ 1/16) = (9/16 × 16/1) = 9 lines
Search for articles describing front end and back end design of any application (example, a website). Summarize the concepts and elements for each one. Does the database that holds all the data exist at the front end or the back end
Answer:
No, the database is a back-end utility.
Explanation:
A webpage is a page of a website. The website is the collection of internet pages addressing particular information or service. There are two sides of web development, that is the front-end and back-end web development.
The front-end is the part of a website that interacts or is seen by the user of the website. The back-end developer scripts it to connect the server, route the webpages and communicate the data in the database.
In the program below, which variable has the same scope as strA?
def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]
def passwordMaker (strA, numC):
if len(strA) > 4:
answer = dogName[0:3]
return answer + str(numC)
else:
return 'xk&' + str(numC)
Answer:
" numC " is the correct answer
Explanation:
The reason is that on line 3 of code it has "def passwordMaker (strA, numC):"
strA and numC are both in "( )" which is the scope and only things inside are varibles. Also its the only line that has strA in it.
The scope of a variable is the extent at which the variable can be referenced.
The variable with the same scope as strA is variable numC
From the program, we have the following function definition
def passwordMaker (strA, numC):
Variables strA and numC are declared along with the function passwordMaker
This means that:
Variables strA and numC have the same scope
Hence, the variable with the same scope as strA is variable numC
Read more about scopes of variables at:
https://brainly.com/question/17102008
Write a program that can be used to calculate the federal tax. The tax is calculated as follows: For single people, the standard exemption is $4,000; for married people, the standard exemption is $7,000. A person can also put up to 6% of his or her gross income in a pension plan. The tax rates are as follows: If the taxable income is:
Between $0 and $15,000, the tax rate is 15%.
Between $15,001 and $40,000, the tax is $2,250 plus 25% of the taxable income over $15,000.
Over $40,000, the tax is $8,460 plus 35% of the taxable income over $40,000. Prompt the user to enter the following information:
Marital status
If the marital status is “married,” ask for the number of children under the age of 14
Gross salary (If the marital status is “married” and both spouses have income, enter the combined salary.)
Percentage of gross income contributed to a pension fund Your program must consist of at least the following functions:
Function getData: This function asks the user to enter the relevant data.
Function taxAmount: This function computes and returns the tax owed.
To calculate the taxable income, subtract the sum of the standard exemption, the amount contributed to a pension plan, and the personal exemption, which is $1,500 per person. (Note that if a married couple has two children under the age of 14, then the personal exemption is $1,500 ∗ 4 = $6,000.)
Since your program handles currency, make sure to use a data type that can store decimals with a decimal precision of 2.
Answer:
?
Explanation:
You can ask for helps on sites meant specifically for coding like cpphelp and stackoverflow
i want to touch it but if i talked about the past , it would be i wanted to touch it or i wanted to touched it?
Answer:
I wanted to touch it
Explanation:
since you put the setting in the past you can use present verbs because we already know it's something that already happened
What is Code?
A) Rules of conduct
B) One or more commands designed to be carried out by a computer.
C) A pack between friends.
D) Edoc spelled backwords.
Answer:
In a class of statistics course, there are 50 students, of which 15 students scored B, 25 students scored C and 10 students scored F. If a student is chosen at random from the class, what is the probability of scoring
not F?
Explanation:
Answer:
its b it's like opening multiple tabs
Write a function max_magnitude() with two integer input parameters that returns the largest magnitude value. Use the function in a program that takes two integer inputs, and outputs the largest magnitude value. Ex: If the inputs are: 5 7 the function returns: 7 Ex: If the inputs are: -8 -2 the function returns: -8 Note: The function does not just return the largest value, which for -8 -2 would be -2. Though not necessary, you may use the built-in absolute value function to determine the max magnitude, but you must still output the input number (Ex: Output -8, not 8). Your program must define and call the following function:
Answer:
The question is answered in python
def max_magnitude(a,b):
if abs(a) > abs(b):
return a
else:
return b
num1 = int(input("Num 1: "))
num2 = int(input("Num 2: "))
print(max_magnitude(num1,num2))
Explanation:
This question is answered using the concept of absolute value to get the integer with the highest magnitude
First, the function is defined with integer parameters a and b
def max_magnitude(a,b):
This checks if a has the highest magnitude
if abs(a) > abs(b):
If true, it returns a
return a
If otherwise, it returns b
else:
return b
The main starts here
The next two lines prompt the user for inputs
num1 = int(input("Num 1: "))
num2 = int(input("Num 2: "))
This calls the function
print(max_magnitude(num1,num2))
Which type(s) of license(s) allow the underlying software code to be viewed?
a. Freeware
b. Free software
Answer:
The correct answer is B. Free software.
Explanation:
Free software is a term used for software that the holder can use, copy, read, modify and distribute with or without modification at will. Software that falls under this category includes software that is not protected by copyright laws or software that is licensed to be used in this way.
Motives for developing free software can be technical, economic or social. What is significant for developers is the desire to develop as producers of programs by learning from other producers. The desire to help others is also a major motive.
What two solutions address lack of human access to clean water
Answer:
THREE strategies which local municipality is implementing in addressing the issue of lack of clean water caused by human factors include:
1) Increasing the amount of tax for those companies which are opening their wastes into water sources which can help built better water cleaning and recycle system.
2) Tree plantation is another strategy to help secure the water sources and naturally keep cleaning it.
3) Running awareness campaigns for general people to keep the water sources clean as well as use the only amount of water which they need and not waste it.
Explanation:
i hope this helps you
what command in cisco IOS allows the user to see the routing table
Answer:
Show IP route command
Explanation:
what is the full form of ARPANet, WAN,FTP,DCP,HTML,ISP and last WWW
Advanced Research Projects Agency Network,
wide area network
File Transfer Protocol
?
Hypertext Markup Language
Internet service provider
world wide web
ARPANET — Advanced Research Projects Agency Network
WAN — Wide Area Network
FTP — File Transfer Protocol
DCP — Diploma Computer Programming
HTML — Hyper Text Markup Language
ISP — Internet Service Provider
www — World Wide Web
HOPE IT HELPS
PLEASE MARK ME BRAINLIEST ☺️
Leo needs to consolidate data in multiple worksheets by performing a calculation across all worksheets on the same cells.
Which feature should he use to perform this task?
A) data consolidation
B) 3-D reference
C) grouped cells
D) linked cells
Answer:
3-D reference
Explanation:
Edge 2022
Write a program that prompts the user to input a string and outputs the string in uppercase letters. (Use a character array to store the string.)
Answer:
Explanation:
The following code is written in Java. It asks the user for a string/sentence and then grabs every character in the string, capitalizes it, and saves it in a char ArrayList. Then it concatenates the char array into a String variable called output and prints the capitalized String.
public static void capitalizeMe() {
Scanner in = new Scanner(System.in);
System.out.println("Enter a String:");
String inputSentence = in.nextLine();
ArrayList<Character> capitalString = new ArrayList<Character>();
for (int x = 0; x < inputSentence.length(); x++) {
capitalString.add(Character.toUpperCase(inputSentence.charAt(x)));
}
String output = "";
for (char x: capitalString) {
output += x;
}
System.out.println(output);
}
Where can a client identify the instant deposit options for their QuickBooks Payments account?
Deposits tab
Account and Settings
Invoices tab
Create Invoice screen
Banking Center
Answer:
Banking centre
.
.
..
.
.
.
.
.
.
.
What is the main advantage that a website builder offers for web development?
OA. It enables people with no coding skills to create websites.
OB. It allows developers to debug the code on your website.
OC. It allows developers to adjust the finer details more easily than an IDE does.
OD. It provides tools such as a resource manager and interpreter.
Answer: A
It enables people with no coding skills to create websites.
Explanation:
second question today 25 POINTS: What is the formula to balance a lever when both effort and resistance are present?
Answer:
To find the MA of a lever, divide the output force by the input force, or divide the length of the resistance arm by the length of the effort arm. In a first-class lever the fulcrum is located at some point between the effort and resistance forces.
Explanation:
Write a Java statement that declares and creates an array of Strings named Breeds. Your array should be large enough to hold the names of 100 dog breeds.
Answer: String[]Breeds = new String[100]
Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page. Which
markup language or technology will allow Rosa to add this element?
OA. HTML
OB. Semantic HTML
OC. DHTML
OD. XML
Answer:
The correct answer is C. DHTML.
Explanation:
I got it right on the Edmentum test.
why ROM is called non volatila Memory?
Answer:
Explanation:
ROMs that are read only memory are called non volatile because all of the data that are inside it happens to not get erased after shutting down the system or computer and starting it all over again. The opposite is this phenomenon is RAM. In RAM, they are being called volatile because all of the data that are inside it happens to get erased once shutting down of the system or computer occurs and it is being restarted.
This is telling us that ROM irrespective, stores data while it is on and also while it is off, it doesn't matter. It never forgets data, unless of course, in a situation whereby it is erased.
Volatile memory stores data as long as it is powered. ROM, which stands for read-only memory, is called non-volatile memory because of they do not lose memory when power is removed. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.
HOPE IT HELPS
PLEASE MARK ME BRAINLIEST ☺️
A browser is an example of a. :
general-purpose application
specialized
program
system application
utility program
What are differences between manual formatting and formatting in word
processor?
What will be result of below if statement.
if (Grade >= 90)
puts("A");
What’s the answer?
Explanation:
pls check it ur answer hp u understand this
A hacker posing as a potential customer has connected to your network and has discovered that a server running Windows Server has a configuration that a misconfiguration on a Windows Server that exposes the PowerShell prompt. The hacker executes a script to log valuable information about the server. Which vulnerabilities did the hacker exploit
Answer:
Lack of ips
Insecure configuration
Explanation:
Lack of IPS
This is fully known as intrusion prevention softwares this works by enabling the firewall and protecting the computer system from unauthorised users and potential attackers and it prevents data from being stolen by identifying potential attacks. It monitors the network continuously, thereby looking for possible malicious threats and also capturing informations about these threats.
Insecure configuration
Obviously if you have power shell enabled then you would have a secure configuration. Attackers can easily access your system in the presence of this flaw.
write instruction to recharge mobile phone
These are some instructions to recharge a mobile phone:
You need to have a phone charger.Connect your phone charger to your phone.Then connect it to the electricity.Wait for the mobile phone to charge fully.Disconnect your phone from the phone charger and the electricity.How do you give instructions?In this exercise, you have to give instructions to charge a mobile phone.
When you have to give instructions it is helpful to explain every action using a specific order so it is easier for the other person to understand the instructions.
Check more information about mobile phones here https://brainly.com/question/9447658
________ reveals functional requirements regarding the exchange of data and services between systems.
a. Observations
b. User interface analysis
c. Document analysis
d. System interface analysis
Explain the concept of Informed Consent?