Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.c. use a star topology with one device, usually a switch.d. are the least common type of BN used in one building.e. switch the traffic based on layer 3 addresses.

Answers

Answer 1

Answer:

c

Explanation:

spongo  


Related Questions

what is suitable equipment to meet customer needs from
1 stand alone pcs
2 networked pcs
3 servers
4 network equipment
5 operating system
6 application software

Answers

uh i think it’s uh carrot

How do I fix my mistake in the code, do not give me a bs answer like “I don’t know sorry” if you do not know just move on because I will report it like I have before.

Answers

The problem lies within your if statement. You're using a single equals sign when you should be using two.

if (operation == 1)

Two equal signs is a comparison operator. It checks to see if one value equals another value. In your case, its checking if operation equals 1. But, this only solves half the problem. Operation is a string and you need to compare it to a string.

if (operation == "1")

I hope this helps!

Write the function appendEvens() which, given two arrays, adds all of the even elements from the first to the second. You may assume the second has enough space.

Answers

Answer:

function appendEvens( arr1, arr2) {

   for (let i in arr1){

       if (i%2 == 0){

           arr2.push(i);

       }

   }

}

Explanation:

The defined javascript function "appendEvens" is a function that returns undefined. It accepts two arrays and pushes the even numbers from the first array to the second.

Write a recursive function called sum_values that takes in a list of integers and an index of one element in the list and returns the sum of all values/elements in the list starting with the element with the provided index and ending with the last element in the list.

Answers

Answer:

Explanation:

The following code is written in the Java programming language and actually takes in three parameters, the first is the list with all of the int values. The second parameter is the starting point where the adding needs to start. Lastly is the int finalSum which is the variable where the values are all going to be added in order to calculate a final int value. Once the recursive function finishes going through the list it exits the function and prints out the finalSum value.

   public static void sum_Values(ArrayList<Integer> myList, int startingPoint, int finalSum) {

           if (myList.size() == startingPoint) {

               System.out.println(finalSum);

               return;

           } else {

               finalSum += myList.get(startingPoint);

               sum_Values(myList, startingPoint+1, finalSum);

           }

           

   }

2. Use the correct membership operator to check if "banana" is not present in the fruits object
fruits = ["mango", "orange") if
"banana"
fruits:
print("Yes, apple is a fruit!")​

Answers

Answer:

if not "banana" in fruits:

Explanation:

Given the code segment

Required

Fill in the missing blank

Literally, membership operators are used to check the membership of an item in lists, tuples, strings, etc.

The given code segment defines a list named fruits with two items.

To check if "banana" is not in fruit, we make use of the following statement:

if not "banana" in fruits:

Which means if banana is not in fruit

Having done that, the complete program would be:

fruits = ["mango", "orange"]

if not "banana" in fruits:

    print("Yes, apple is a fruit!")

Complete the sentence.
Python is a_____
level language compared to bytecode.

Answers

Python is an interpreted, object-oriented, high-level programming language with dynamic semantics.

Python is a high level language compared to bytecode.

Why Python is a high level programming language?

Hence, being an interpreted language, which is not subject to processor, makes Python a high-level language. Also, Python offers convenience of code readability -- which makes the syntax of the program much easier and shorter, resulting in less coding steps for developers than imposed by Java or C++.

Which type of language is Python?

Python is an interpreted, interactive, object-oriented programming language. It incorporates modules, exceptions, dynamic typing, very high level dynamic data types, and classes.

To learn more about python, refer

https://brainly.com/question/24700944

#SPJ2

PLS HELP I WILL MARK BRAINLIEST

Answers

Answer:

C

Explanation:

Animal cells each have a centrosome and lysosomes, whereas plant cells do not. Plant cells have a cell wall, chloroplasts and other specialized plastids, and a large central vacuole, and animal cells do not.

Java Eclipse homework. I need help coding this

Challenge 14A - BaseConverter

Package: chall14A
Class: BaseConverter

Task: Create a program that takes user input as a decimal and converts it to either an octal, binary, or hexadecimal base:

1. Show a title on the screen for the program.
2. Ask the user if they want to run the program.
3. Create a menu for the user to choose the base to convert to.
4. Take decimal (base10) from user and print out the number in the new base.

Answers

import java.util.Scanner;

public class BaseConvertor {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Welcome to Base Convertor! This program will convert numbers into different bases of your choosing.");

       System.out.print("Do you still want to run the program? ");

       String ans = scan.next();

       if (ans.toLowerCase().equals("yes")){

           System.out.println("1. Octal");

           System.out.println("2. Binary");

           System.out.println("3. Hexadecimal");

           System.out.print("Type the number of the base you want to conver to: ");

           int base = scan.nextInt();

           System.out.print("Enter your number: ");

           int num = scan.nextInt();

           if (base == 1){

               

               String newNum = Integer.toOctalString(num);

               System.out.println(num+" in Octal is "+newNum);

           }

           else if (base == 2){

               String newNum = Integer.toBinaryString(num);

               System.out.println(num+" in Binary is "+newNum);

           }

           else if (base == 3){

               String newNum = Integer.toHexString(num);

               System.out.println(num+" in Hexadecimal is "+newNum);

           }

                   

       }

       else{

           System.out.println("Have a good day!");

       }

   }

   

}

I hope this helps!

Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed command?

Answers

Answer:

sed '/march/{d;}' birthdays.txt > result .txt

Explanation:

sed syntax is basically:

sed '/expression/{command;command;...;}' inputfile > outputfile

First, for the expression part, we use /march/ to match all lines containing that string. Then for the command part, we only use {d} command to delete every matching line found.The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.Finally "> result .txt" makes the script output to be saved into a file named result.txt

Write a code for function main, that does the following: creates a variable and assign it the value True. uses a while loop which runs as long as the variable of the previous step is True, inside the while loop, get three integer numbers n1, n2 and n3 from the user and

Answers

Answer:

def main():

   is_true = True

   while is_true == False:

       try:

           num1 = int(input("Enter first number: ")

           num2 = int(input("Enter second number: ")

           num3 = int(input("Enter third number: ")

       except ValueError:

           print("Input must be an integer number")

       is_true = bool(input("do you want to end loop? True/False: "))

main()

Explanation:

The python main function above continuously creates three integer numbers in a while loop statement until a false input is received from the user.

Which items are placed at the end of a
document
O Header
O Footer
O Foot Note
O End note​

Answers

Answer:

End note, I think plz tell me if im wrong thank you

Is this statement true or false? You can apply only one of these at a time: underline, bold, or italics. true false

the correct answer is false ​

Answers

I think false not sure but let other people help u answer and u can decide

Answer:

its false

Explanation:

Many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail order companies, and online merchants. What form of ebusiness challenge is this statement referring to?
A. Adhering to taxation rules.
B. Ensuring consumer protection.
C. Identifying limited market segments.
D. Managing consumer relationships.

Answers

Answer:

A. Adhering to taxation rules.

Explanation:

This is because, when there is no level playing field for different segments of the business in terms of U.S tax policy, there will surely be challenges in "Adhering to taxation rules."

Given that the statement might imply that there are different rules applicable to different sectors of business, this will make it difficult for the different firms or players involved to follow the taxation rules.

Hence, stating that many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail order companies, and online merchants, indicated that the e-business challenge is "Adhering to taxation rules."

write an essay about yourself based on the dimensions of ones personality​

Answers

I don’t think that we can answer this question, since it’s based on yourself.

You used range in definite loops earlier in the course. The output of the range function is a sequence, which is a list of integers.


range(3) creates which sequence of numbers?



[1, 2, 3]


[0, 1, 2, 3]


[1, 2, 3, 4]


[0, 1, 2]

kAka pEe POoPOOoO

Answers

Answer:
It is D [0,1,2,]
Explanation:
PeE KakA PoOpOo GAGAGAGAGAGAGAGAGAGAGGAGAGAGAGAGAGAGAGAA

The output of the range function is a sequence, which is a list of integers. The range created in the sequence of number is [0, 1, 2]. Hence option D is correct.

What are integers?

Integers are defined as a whole number that can be positive, negative, or zero and is not a fraction. Your integer can be written in a number of different ways. Write your integer, for instance, in standard form (such as 63), extended form (such as 100+50+2, which would be 152 in standard form), or written form (such as one thousand two hundred thirteen).

Pass range start and stop values () such as range (0, 6). Here, start is equal to 0 and stop is equal to 6. Send range the step value () the move Put the increment in. For accessing each integer, use a for loop. To iterate and access a series of numbers returned by a range(), use a for loop.

Thus, the output of the range function is a sequence, which is a list of integers. The range created in the sequence of number is [0, 1, 2]. Hence option D is correct.

To learn more about integers, refer to the link below:

https://brainly.com/question/15276410

#SPJ2

Copy the formula from cell c5 to the range c6- c11

Answers

Answer:

Where is cell c5

Explanation:

Write an application named Hurricane that outputs a hurricane’s category based on the user’s input of the wind speed. Category 5 hurricanes have sustained winds of at least 157 miles per hour. The minimum sustained wind speeds for categories 4 through 1 are 130, 111, 96, and 74 miles per hour, respectively. Any storm with winds of less than 74 miles per hour is not a hurricane. If a storm falls into one of the hurricane categories, output This is a category # hurricane, with # replaced by the category number. If a storm is not a hurricane, output This is not a hurricane.

Answers

Answer:

def Hurricane(wind_speed):

   if wind_speed >= 157:

       print("Category 5 hurricane")

   elif wind_speed >= 130:

       print("Category 4 hurricane")

   elif wind_speed >= 111:

       print("Category 3 hurricane")

   elif wind_speed >= 96:

       print("Category 2 hurricane")

   elif wind_speed >= 74:

       print("Category 1 hurricane")

   else:

       print("Not a hurricane")

Hurricane(121)

Explanation:

The function "Hurricane" in the python code accepts only one argument which is the recorded speed of a hurricane. The nested if-statement evaluates the speed of the hurricane and output the appropriate category of the hurricane based on the speed.

Which of the following is an input device on a toaster?
O the heating element
the tray
O the start button
the electrical outlet

Answers

The electrical outlet
The start button the electrical oulet

Consider the use of 1000-bit frames on a 1-Mbps satellite channel with a 270-ms delay. What is the maximum link utilization for,
a. Stop-and-wait flow control?
b. Continuous flow control with a window size of 7?
c. Continuous flow control with a window size of 127?

Answers

i feel as if it would be B.

The project sponsor has asked Franz to hold a kickoff meeting for their project. What is the purpose of a
kickoff meeting?
Select an answer:
Introduce the team to the project, processes, and to one another.
Obtain approval for the team to start work on their assignments.
Provide an opportunity for the sponsor to talk about the project,
Obtain approval of the project plan.

Answers

Answer:

Introduce the team to the project

Explanation:

You never want to get ahead always start slown and easy for the team so none gets left behind also can i get brainliest

The purpose of the kickoff meeting is Introduce the team to the project, processes, and to one another.

The information regarding the kickoff meeting is as follows:

In this, the team members get to know each other.It helps team members to understand the objectives of the project.Also it permits the stakeholders for understanding the risk, assumptions, etc.

Learn more: brainly.com/question/17429689

Which of the following is NOT a reason to include comments in programs
A. Comments help the computer decide whether certain components of a program are important.
B. Comments help programmers debug issues in their own code
C. Comments help document how code was written for other programmers to use
D. Comments enable programmers to track their work throughout the development process

Previous page Submit

Answers

Answer:

C. Comments help document how code was written for other programmers to use.

Explanation:

I think it i C.

Answer:

A. Comments help the computer decide whether certain components of a program are important.

- just took the test and got it right. hope this helps!!

It is easier to make an object move across the screen by using the tweening function rather than creating each individual frame of the movement.

True

False

Answers

Uhhhh I believe it’s true if it’s wrong I’m srry ....

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.

Answers

Answer:

Brute force

Explanation:

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.

In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.

Answer:

D.  

triple Data Encryption Standard (DES)

Explanation:

                                       Sincerely : Baby weeb

A computer is using a fully associative cache and has 216 bytes of memory and a cache of 64 blocks, where each block contains 32 bytes.

Required:
a. How many blocks of main memory are there?
b. What is the format of a memory address as seen by the cache, that is, what are the sizes of the tag and offset fields?
c. To which cache block will the memory address F8C9 (subscript) 16 map?

Answers

1) The number of blocks of main memory that are there are;

2^16/32 = 2^16/2^5 = 2^11

2) The format of a memory address as seen by the cache,that is the sizes of the tag and offset fields are;

16 bit addresses with 11 bits also in the tag field and the 5 bits in the word field.

3) The cache block that the memory address F8C9 (subscript) 16 map;

Since it is an associative cache, it can actually map anywhere.

That is, it has the ability of mapping anywhere.

What is the function of the operating system of a computer?

It allows the CPU to communicate with input and output devices.
It executes commands from other computer hardware.
It lets the user communicate with the mouse.
It processes information from the hard drive to allow programs to run.

Answers

Answer:

It allows the CPU to communicate with input and output devices.

Explanation:

Plzzzzzzzzzzzzz give me brainiest

Builder Software is used to create _____? answers: 3d digital art design for cameras audio special effects

Answers

Answer:

HTML website without inputting manual codes

Explanation:

A Builder Software in computer engineering or science is a general name of the software that is designed to give users the ability to build HTML websites without inputting the manual codes themselves. The software comes with tools that help to create the user interface without adding code.

Example of Builder Software is Squarespace, Wix, Dudamonile, Weebly, OnDevice, RedTim, etc.

Answer:

I think it's used to create 3-D digital art

Explanation:

The HTTP protocol operates at which layer?

Answers

Answer:

application layer i believe

Answer:

The HyperText Transfer Protocol (HTTP), is the Web's application-layer protocol, is at the heart of the Web

Explanation:

An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device brought from home. What is put in place to stop such activity.

1- Media Access Control Filtering

2- Channel Overlap

3-WiFi Protected Access 2

4- collision Domain

Answers

Answer:

3. WiFi Protected Access 2

Explanation:

Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.

Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.

Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2

Write code that creates a text area displaying 10 rows and 15 columns. The text area should be capable of displaying scroll bars, when necessary. It should also perform word style line wrapping.

Answers

Answer:

<textarea wrap="hard" cols="30" rows="5"></textarea>

Explanation:

A textarea element or tag is a form tag element of a HTML file. It is used to ask for input value from a user in a webpage. The textarea tag has an opening and a closing tag.

The 'cols' attribute is used to set the column length while the 'rows' attribute sets the row length of the textarea element. The 'wrap' attribute has three options namely; soft, hard, and off. 'soft' adds the textarea wrapping, 'hard' sets off the box wrapping but only wraps each line, while the 'off' option removes all wrapping in the tag.

(Decimal to binary) Write a recursive method that converts a decimal number into a binary number as a string. The method header is public static String dec2Bin(int value) Write a test program that prompts the user to enter a decimal number and displays its binary equivalent.

Answers

Answer and Explanation:

import java.util.Scanner;

public class convertToBinary {

public static String declToBin(int value){

if(value == 1){

return declToBin((value/2) + "" + (value%2);

}

else{

declToBin((value/2) + "" + (value%2);

}

}

public static void main(String args[]){

int number;

Scanner change = new Scanner(System.in);

System.out.print("Enter decimal value: ");

number = change.nextInt();

System.out.println(declToBin(number));

}

}

The recursive function declToBin(int value) keeps executing code until value==1. Recursive functions reduces lines of code and makes it more efficient.

Note: Decimal is number in base 10(denary). To convert a decimal number to base 2(binary), we keep dividing the decimal number entered by the user by 2 until the result is zero(when the number divided is one)

We use the Java programming language here. First we import the Scanner object(import.java.util.Scanner). We use the method nextint() from the object to convert the string value entered by the user to int value( because our declToBin function takes an int parameter).

Other Questions
DESCRIBE TROPICAL STORM; THUNDERSTORM; AND TORNADOESPLEASE HELP ME THIS IS DUE AT 1:45 PM AND IT'S 1:22 OM PLEASEEEE helppp!!1 Read the excerpt from The Building of Manhattan.When the driver was ready for a new rivet, the heater took a hot cherry-red one out of his forge with his long-handled tongs. And with an underhand toss he hurled the smoking rivet straight at the catcher, who caught it in mid-air in his catching can. The catcher then grabbed it with his tongs, tapped it against a beam to remove any cinders, and jammed it into the waiting hole.Which illustration would best give the reader a clearer understanding of the text?an illustration of the heater and the catcher taking a lunch breakan illustration of the heater holding long-handled tongsan illustration of the heater tossing a rivet to the catcheran illustration of the catcher tapping a hot rivet against a beam the first team with twenty - one runs would win the game subject or predict almost due. would appreciate help please :)!! If the cost of a notebook is 2x-3 and the cost of a pen is x-4, what is the cost of 3 notebooks and 5 pens? Was Athens an example of a true democracy, a government run by the people? Explain. Which of the following contributed to the Whiskey Rebellion?Which of the following contributed to the Whiskey Rebellion?1 Farmers could not afford the tax on whiskey.2 Farmers found whiskey difficult to transport3 Spain was blocking trade along the Mississippi River.4 The federal government was overprotective of the settlers. Caps lock key is used to type alphabets. _________ 1. A stone of mass 0.8 kg is attached to a 0.9 m long string. The string will break if the tension exceeds 60 N. The stone is whirled in a horizontal circle on a frictionless tabletop while the other end of the string remains fixed. What is the maximum speed the stone can attain without breaking the string? A. 8.22 m/s B. 7.30 m/s C. 9.34 m/s D. 7.76 m/s2. A highway curve with radius 900 ft is banked so that a car traveling at 55 mph will not skid sideways even in the absence of friction. At what angle should the curve be banked to prevent skidding? A. 14.6 B. 18.9 C. 10.9 D. 12.73. A button will remain on a horizontal platform rotating at 40 rev/min as long as it is no more than 0.15 m from the axis. How far from the axis can the button be placed without slipping if the platform rotates at 60 rev/min? A. 0.365 m B. 0.338 m C. 0.225 m D. 0.294 m4. What is the tension in a cord 10 m long if a mass of 5 kg is attached to it and is being spun around in a circle at a speed of 8 m/s? A. 67 N B. 28 N C. 32 N D. 50 N5. A 0.5 kg mass attached to a string 2 m long is whirled around in a horizontal circle at a speed of 5 m/s. What is the centripetal acceleration of the mass? A. 11.3 m/s2 B. 12.5 m/s2 C. 5.9 m/s2 D. 10.2 m/s26. Find the maximum speed with which a car can round a curve that has a radius of 80 m without slipping if the road is unbanked and the coefficient of friction between the road and the tires is 0.81. A. 44.3 m/s B. 20.8 m/s C. 25.2 m/s D. 30.6 m/s 4x - 3y = 1-8x + 6y = -2 ULICUFind k.k457-12 m45O 7O 72O 7V22O 14 What is the molarity of calcium bicarbonate if 9.52 mL of 1.20 M HNO3 is required in a titration to neutralize 50.0 mL of a solution of Ca(HCO3)2? Help asap cuz idk whats going on Evaluate the surface integral SSs (x + y + z)ds, s is the parallelogram with parametric equations x = u + v, y = u - v, z = 1 + 2u +v, 0 Given that4x : 3= 11 : 5 Calculate the value of x. Identify the coefficients in the following expression.3x 5y z + 13A. 3, -5, -1B. 3, -5C. 3, 5, 13D. 3, 5, 1, 14Show your work Write about an experience, either real or imaginary using these words chemical energy, electric energy, kinetic energy, mechanical energy, nuclear energy, potential energy, radiant energy, seismic energy, sound energy, and thermal energy How do plants survive in alaska(including vegetables and wheat just to be clear) a new candle is 8 inches tall and burns at a rate of 2 inches per hour. a. Write an equation that models the height h after t hours. b. Sketch the graph of the equation. Four siblings have a dog walking business. The table shows the hours worked by sibling. sibling earns $25.50 per hour and the total number of hours worked is represented by 10h + 15, where h represents the number of hours Michael worked. Sibiling Hours Worked Martin 2. 5h +3 Emillo 4(h 2) Michael Mario 31 What was the total amount the siblings earned?