Answer:
microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet
Implement a class Clock whose getHours and getMinutes methods return the current time at your location. (Call java.time.LocalTime.now().toString() and extract the time from that string.) Also provide a getTime method that returns a string with the hours and minutes by calling the getHours and getMinutes methods. Provide a subclass WorldClock whose constructor accepts a time offset. For example, if you live in California, a new WorldClock(3) should show the time in New York, three time zones ahead. Which methods did you override
Answer:
Explanation:
The following code was written in Java. It uses the LocalTime import to detect the current time. Then it creates a getHours, getMinutes, and getTime method to correctly print out only the hours and minutes in a simple format. Then it does the same for the WorldClock subclass which takes in the time offset as an int parameter and adds that to the hours in your own timezone.
class Clock {
public String getHours() {
String hours = java.time.LocalTime.now().toString().substring(0,2);
return hours;
}
public String getMinutes() {
String min = java.time.LocalTime.now().toString().substring(3,5);
return min;
}
public String getTime() {
String time = getHours() + ":" + getMinutes();
return time;
}
}
class WorldClock extends Clock {
int timeZone = 0;
public WorldClock(int timeZone) {
super();
this.timeZone = timeZone;
}
public String getHours() {
String hours = String.valueOf(Integer.parseInt(super.getHours()) + 3);
return hours;
}
public String getTime() {
String time = getHours() + ":" + super.getMinutes();
return time;
}
}
class Test {
public static void main(final String[] args) {
Clock myClock = new Clock();
System.out.println("My Time: " + myClock.getTime());
WorldClock worldClock = new WorldClock(3);
System.out.println("My Time + 3: " + worldClock.getTime());
}
}
(3) reasons why users attach speakers to their computer
Explanation
1.we connected speakers with computers for listening voices or sound . because the computer has not their own speaker.
2.Speakers are popular output devices used with computer systems.
3.Speakers are one of the most common output devices used with computer systems
What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How might some of these strategies be useful to a computer programmer working on a CPU scheduler?
Answer:
Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."
Explanation:
The strategies that you use for confronting a complex problem are:
First, define the issue.Use your inner eyes to visualize the issue. Break the problem into little piecesWhy are problem-solving strategies vital?Solving problems involves the act of making the right choices. It is known to be a good and effective way of problem-solving as one can get a good result from it.
Conclusively, by using the strategies give above, a computer programmer working on a CPU scheduler can be able to find out the issues that needs to be handled, where the problem is coming from and then solve it.
Learn more about CPU from
https://brainly.com/question/474553
what is a computer and what is the work of it
Answer:
A computer is an electronic machine that processes information. It is an information processor. It takes data, stores it, and then gives the result or answer.
It is a machine composed of hardare and software componests to be manually ised or atonomosly used.
Hope this helps!
Answer:
A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.
A _______ is one typed character.
-gigabyte
-byte
-megabyte
-kilobyte
-terabyte
What are the two functions in C that allow a programmer to randomly move the file cursor within a file stream, thus enabling random access. Please write down the names of the two functions and separate them by a comma only. As an example, assume the two functions are abc, and abe, you will write down your answer as abc,abe
Answer:
seekp(),tellp()
Explanation:
The two functions in c ++ that allow a programmer to randomly move the file cursor within a file stream are : seekp(),tellp()
The functions place cursor in file stream and also access the values
“What is an example of the vocabulary word foreshadow?” This question could be a
a.
Potential question
c.
Flashcards question
b.
Vocabulary definition
d.
Both A and C
Please select the best answer from the choices provided
A
B
C
D
Answer:
D) Both A and C
Explanation:
Answer:
D
Explanation:
Christopher was looking at the TV while getting feedback on his opinion essay. What should he do differently? Don't get feedback from a trusted adult. Finish watching his TV show. Make sure the trusted adult likes the show on TV, too. Turn off the TV and face the person who is speaking.
Answer:
Turn off the TV and face the person who is speaking.
what is digital literacy? describe three examples of digital literacy skills
Digital literacy means having the skills you need to live, learn, and work in a society where communication and access to information is increasingly through digital technologies like internet platforms, social media, and mobile device
Examples of Digital Literacy skills:
What is digital literacy?
ICT proficiency.
Information literacy.
Digital scholarship.
Communications and collaborations.
Digital learning.
Digital identity.
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link
Answer:
131 packets
Explanation:
Given
W (link ) =0.5 M bits, and Ping packets ( P ) = 500bytes
To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet
P ( required ) = 500 * 8 = 4000 bits
therefore the W /P packet is calculated as
= 0.5 M bits / 4000 bits
given that : 1 M bits = 1,048,576 bits
0.5 M bits / 4000 bits= 131.07
hence approximately 131 packets/ sec is required to flood the target organization
Create a function that returns a dictionary containing the number of upper and lower case characters in a string (e.g. {'lower': 8, 'upper': 2}). Ignore whitespace characters. Your function should be able to handle an empty string, though.
Answer:
Explanation:
The following is written in Python and takes in the input string, then loops through it counting all of the upper and lower case letters and adds it to the dictionary.
string = input("input string: ")
upper_case = 0
lower_case = 0
for char in string:
if char.isupper() == True:
upper_case += 1
elif char == ' ':
pass
else:
lower_case += 1
letter_dict = {'upper_case': upper_case, 'lower_case': lower_case}
Take a number N as input and output the sum of all numbers from 1 to N (including N).
Answer:
Incluint respuet
Explanation:
espero que te sirva
Project Description:
In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Department.
Instructions:
For the purpose of grading the project you are required to perform the following tasks:
Step Instructions Points Possible
1. Start Excel. Download and open the file named go16_xl_ch03_grader_3g_hw.xlsx. 0.000
2. In the Expenses worksheet, calculate row totals for each Expense item in the range F5:F9. Calculate column totals for each quarter and for the Annual Total in the range B10:F10. 8.000
3. In cell G5, construct a formula to calculate the Percent of Total by dividing the Annual Total for Salaries and Benefits by the Annual Total for Totals by Quarter. Use absolute cell references as necessary, format the result in Percent Style, and then Center. Fill the formula down through cell G9. 12.000
4. Use a 3-D Pie chart to chart the Annual Total for each item. Move the chart to a new sheet and then name the sheet Annual Expenses Chart. 8.000
5. For the Chart Title, type Summary of Annual Expenses and format the chart title using WordArt Style Fill - Blue, Accent 1, Shadow. Change the Chart Title font size to 28. 6.000
6. Remove the Legend from the chart and then add Data Labels formatted so that only the Category Name and Percentage display positioned in the Center. Change the Data Labels font size to 12, and apply Bold and Italic. 8.000
7. Format the Data Series using a 3-D Format effect. Change the Top bevel and Bottom bevel to Circle. Set the Top bevel Width and Height to 50 pt and then set the Bottom bevel Width and Height to 256 pt. Change the Material to the Standard Effect Metal.
Note, the bevel name may be Round, depending on the version of Office used. 4.000
8. Display the Series Options, and then set the Angle of first slice to 125 so that the Salaries and Benefits slice is in the front of the pie. Select the Salaries and Benefits slice, and then explode the slice 10%. Change the Fill Color of the Salaries and Benefits slice to a Solid fill using Green, Accent 6, Lighter 40%. 4.000
9. Format the Chart Area by applying a Gradient fill using the Preset gradients Light Gradient – Accent 4 (fourth column, first row). Format the Border of the Chart Area by adding a Solid line border using Gold, Accent 4 and a 5 pt Width. 6.000
10. Display the Page Setup dialog box, and then for this chart sheet, insert a custom footer in the left section with the file name. 4.000
Answer:
pelo o que diz na database é que você n é ser humano normal por perguntar isso!!
In the reverse outlining technique, which of the following techniques is involved in assessing the structure of the new outline? Select one.
Question 3 options:
Discovering content that should be deleted, added, or rearranged
Identifying confusing sentences that mischaracterize the content
Incorporating various forms of advanced organizers, such as headings or bulleted lists
Identifying citations or paraphrases that are improperly formatted
In the reverse outlining technique, the technique involved in assessing the structure of the new outline is incorporating various forms of advanced organizers, such as headings or bulleted lists
The correct answer to the given question is option C.
Reverse outlining is a revision strategy that helps writers evaluate the organization and coherence of their written work. It involves creating an outline based on an existing draft and then analyzing the outline to assess the structure and flow of the content.
By examining the outline, writers can identify sections or points that may need to be deleted if they are irrelevant or repetitive. They can also determine areas where additional content should be added to provide clarity or support their arguments. Additionally, the outline allows writers to assess the order and sequence of their ideas and make necessary rearrangements to improve the overall structure of the piece.
While identifying confusing sentences that mischaracterize the content, incorporating advanced organizers, or identifying improperly formatted citations or paraphrases are important aspects of the writing and revising process, they are not specifically involved in assessing the structure of the new outline in the reverse outlining technique. The focus of reverse outlining is primarily on evaluating the organization and coherence of the content.
For more such questions on technique, click on:
https://brainly.com/question/12601776
#SPJ8
Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a pair containing the minimum and maximum value. Require that the array elements implement the Measurable interface of Section 10.1.2.
Answer:
Explanation:
The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.
public static T minmax(ArrayList<T> mylist) {
T min = new T();
T max = new T();
for (int x = 0; x < mylist.size(); x++) {
if (mylist.get(x) > max) {
max = mylist.get(x);
} else if (mylist.get(x) < min) {
min = mylist.get(x);
}
}
return (min, max);
}
Create another method: getFactorial(int num) that calculates a Product of same numbers, that Sum does for summing them up. (1,2,3 ... num) Make sure you use FOR loop in it, and make sure that you pass a number such as 4, or 5, or 6, or 7 that you get from a Scanner, and then send it as a parameter while calling getFactorial(...) method from main().
Answer:
The program in Java is as follows;
import java.util.*;
public class Main{
public static int getFactorial(int num){
int fact = 1;
for(int i =1;i<=num;i++){
fact*=i;
}
return fact;
}
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Number: ");
int num = input.nextInt();
System.out.println(num+"! = "+getFactorial(num)); }}
Explanation:
The method begins here
public static int getFactorial(int num){
This initializes the factorial to 1
int fact = 1;
This iterates through each digit of the number
for(int i =1;i<=num;i++){
Each of the digits are then multiplied together
fact*=i; }
This returns the calculated factorial
return fact; }
The main begins here
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
This prompts the user for number
System.out.print("Number: ");
This gets input from the user
int num = input.nextInt();
This passes the number to the function and also print the factorial
System.out.println(num+"! = "+getFactorial(num)); }}
NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number
Answer:
The answer is D
Explanation:
what does ICT stand for?
Information Communication Technology
ICT stands for 'Information Communication Technology'. Everyday usage of digital technology includes when you use a computer, tablet or mobile phone, send email, browse the internet, make a video call - these are all examples of using basic ICT skills and technology to communicate.
You are helping a friend in college with his network connection. He would like a high speed connection between his computers so he can play Super Blast with others. In this lab, your task is to complete the following: Choose an appropriate router that will provide security and the fastest local connection. Connect the router to both computers and to the dorm internet connection. Request new TCP/IP information from the router on both computers. Configure Windows Firewall on both computers. Turn on Windows Firewall for both the Private and the Public network profiles. Add an exception for the SuperBlast program only for the Private network profile.
Solution :
Set up the router as follows:
On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet [tex]$100/1000TX$[/tex] router with the firewall to the Workspace.
Connection of the router as follows:
Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a [tex]$LAN$[/tex] port on the router. Above the Dorm-[tex]$PC2$[/tex] computer, select [tex]$\text{back}$[/tex] to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag the connector to the [tex]$LAN$[/tex] port on the computer. In the Selected Component window, drag the other connector to a [tex]$LAN$[/tex] port on the router. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag a connector to the [tex]$WAN$[/tex] port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.
Provide power to the router as follows:
On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.
Request new [tex]$TCP/IP$[/tex] information from the router for Dorm-PC as follows:
On the [tex]$\text{Dorm-PC}$[/tex] monitor, select Click to view [tex]$\text{Windows 10}$[/tex].In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter [tex]$\text{ipconfig}$[/tex] /renew and press [tex]$\text{Enter}$[/tex] to request new [tex]$TCP/IP$[/tex] information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.
Configure Windows Firewall on [tex]$\text{Dorm-PC}$[/tex] as follows:
In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.
reasons why users attach speakers to their computer
Answer:
To listen to sounds or voices because maybe the computer doesn't have its own speakers
In a multimedia presentation, when might voice-over be a better choice than placing the text on the screen?
when you have very little to say
when your audience is bored
when you have a lot to say
when you don’t want to write
In a multimedia presentation, the option that might be the voice-over when you have a lot to say.
What is multimedia presentation?A multimedia presentation is known to be a presentation where a person is said to often stand by themselves to present information via slides, video, etc.
In a multimedia presentation, the option that might be in the case of voice-over is when you have a lot to say as it is better to put it in a video format.
Learn more about multimedia from
https://brainly.com/question/24138353
#SPJ2
Write a program that replaces words in a sentence. The input begins with word replacement pairs (original and replacement). The next line of input is the sentence where any word on the original list is replaced. Ex: If the input is: automobile car manufacturer maker children kids The automobile manufacturer recommends car seats for children if the automobile doesn't already have one.
Answer:
In Python:
toreplace = input("Word and replacement: ")
sentence = input("Sentence: ")
wordsplit = toreplace.split(" ")
for i in range(0,len(wordsplit),2):
sentence = sentence.replace(wordsplit[i], wordsplit[i+1])
print(sentence)
Explanation:
This gets each word and replacement from the user
toreplace = input("Word and replacement: ")
This gets the sentence from the user
sentence = input("Sentence: ")
This splits the word and replacement using split()
wordsplit = toreplace.split(" ")
This iterates through the split words
for i in range(0,len(wordsplit),2):
Each word is then replaced by its replacement in the sentence
sentence = sentence.replace(wordsplit[i], wordsplit[i+1])
This prints the new sentence
print(sentence)
explain the different type of shift register counter
Answer:
Shift registers are also used as counters. There are two types of counters based on the type of output from right most D flip-flop is connected to the serial input. Those are Ring counter and Johnson Ring counter.
There are two types of shift register counters. They are given below:
Ring counter.Johnson ring counter. What do you mean by Shift register counter?The shift register counter may be defined as a sequence of a specific number of core registers that are significantly interconnected to one another in order to provide a clock-driven data shift.
A shift register is a set of f FFs that can be connected within the series and the stored data can be moved in the registers sequentially as per the command or instruction is given.
They are also utilized as counters. The type of shift register counter is based on the output from the D flip-flop which is connected to the serial input from the rightmost side.
Therefore, the two types of shift register counters are well mentioned above.
To learn more about Shift register, refer to the link:
https://brainly.com/question/14096550
#SPJ6
If D3=30 and D4=20, what is the result of the function
=IF(D4 D3, D3-D4, "FULL")?
0-10
O Unknown
O 10
O Full
Answer:
c. 10
Explanation:
Given
[tex]D3 = 30[/tex]
[tex]D4 = 20[/tex]
Required
The result of: [tex]=IF(D4 < D3,D3-D4,"FULL")[/tex]
First, the condition D4 < D3 is tested.
[tex]D4 < D3 = 20 < 30[/tex]
Since 20 < 30, then:
[tex]D4 < D3 = True[/tex]
The condition is true, so:
D3 - D4 will be executed.
[tex]D3 - D4 = 30 - 20[/tex]
[tex]D3 - D4 = 10[/tex]
Hence, the result of the function is 10
You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable - age.
Answer:
666
Explanation:
You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable
If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total number of free electrons that pass through at a point at the power supply terminals
Answer:
Q=It
and
p=IV
Given, v=9V P= 7W
I=P/V
I =7/9
Also, time(t) from 9am to 12pm is 3hrs
Converting into sec =3×3600
t=10800
Q= 7/9 ×10800
Q =8400C
arrange the following numbers from the highest to the lowest. ⅔,-7,0. no file or photo
Answer:
2/3, 0, -7
Explanation:
Which of the following does cloud computing allow users to do? Check all of the boxes that apply.
access data from anywhere with an Internet connection
store pictures and music
store data
have a unique address for their computer
Answer:
a b c
Explanation:
there just right
Answer: a b c d
Explanation edge 2023
what is subnetting. what does subnetting mean
Answer:
Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.
Explanation:
c program that calculates the summation of integers from one to N. Allow the user to input an integer, then pass that number to a function that will calculate the sum of all integers up to N. For example, if the user inputs the number 5, then the function will return the sum 1 2 3 4 5. Allow the user to enter multiple integers, calling the function for each number. Use a sentinel value or similar method to terminate user input.
Answer:
Answered below.
Explanation:
#include <studio.h>
#include<conio.h>
void main(){
int I = 0;
int sumOfNumbers = 0;
int number;
printf("Input an integer: ");
("%d", &sumOfNumbers);
//Loop over while adding numbers
while(I <= number){
sumOfNumbers = sumOfNumbers + I;
I++;
}
printf("\n Sum of N numbers is: %d", sumOfNumbers);
getch();
}