Answer:
Each router only talks, sends updates to its neighbors
Explanation:
There are two types of routing protocol, they are, link-state and distance-vector routing protocol. The link-state protocol is performed by nodes or routers prepared for packet switching. Each node is responsible for mapping out the route of the network, using the reachability protocol to assert the connectivity to neighboring nodes, updating its route and sending the link-state update messages periodically to neighboring nodes.
Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to a2d. Write some statements that assign true to isNegative if more integer elements in entire 2-dimensional array are negative than not.
Answer:
#include <iostream>
using namespace std;
int main(){
int rows, cols;
bool isNegatives;
cout<<"Rows: ";
cin>>rows;
cout<<"Columns: ";
cin>>cols;
int a2d[rows][cols];
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
cin>>a2d[i][j];} }
int negatives, others = 0;
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
if(a2d[i][j]<0){
negatives++;}
else{
others++;}} }
if(negatives>others){
isNegatives = true;}
else{
isNegatives = false;}
cout<<isNegatives;
return 0;
}
Explanation:
For clarity and better understanding of the question, I answered the question from the scratch.
This line declares number of rows and columns
int rows, cols;
This line declares the Boolean variable
bool isNegatives;
This line prompts user for rows
cout<<"Rows: ";
This line gets the number of rows
cin>>rows;
This line prompts user for columns
cout<<"Columns: ";
This line gets the number of columns
cin>>cols;
This line declares the array
int a2d[rows][cols];
This line gets user input for the array
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
cin>>a2d[i][j];} }
This line declares and initializes number of negative and others to 0
int negatives, others = 0;
The following iteration counts the number of negatives and also count the number of non negative (i.e. others)
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
if(a2d[i][j]<0){
negatives++;}
else{
others++;}} }
This checks of number of negatives is greater than others
if(negatives>others){
If yes, it assigns true to isNegatives
isNegatives = true;}
else{
If otherwise, it assigns false to isNegatives
isNegatives = false;}
This prints the value of isNegatives
cout<<isNegatives;
See attachment
100 POINTS!!!!!!
How does forecast information get to other government and business entities and to the public?
Answer:
Forecasting is valuable to businesses because it gives the ability to make informed business decisions and develop data-driven strategies. ... Past data is aggregated and analyzed to find patterns, used to predict future trends and changes. Forecasting allows your company to be proactive instead of reactive.
Answer:
Explanation:
There are many forecast information provided by government agencies. Since the question mentions business entities, it is likely related to economic forecast; like the quarterly report from the Federal Reserve Bank. That is usually how forecast info is shared: through released reports, public announcements, and printed sources like the Federal Register papers.
Azra wants to learn to program and knows it is important to be able to type well. Which of the following will contribute to the achievement of this goal? A. words per mile B. keys per line C. words per minute D. keys per function
Answer:
The answer to this question is given below in the explanation section.
Explanation:
In this question, a scenario is given about typing speed. The typing speed of someone can be easily monitored or guessed by how many words someone can write per minute.
So, in this context, Azra's goal to achieve fast and very well typing while doing programming.
so, she needs to learn and increase typing speed and this is measured in words per minute. That is about how many words she can type in a minute with accuracy.
So, the correct answer to this question is words per minute.
While the other options are not correct because:
words per mile, key per mile, and key per function don't determine its typing speed. and also note that the given options are also not logically suitable such as words per mile etc.
Answer:
Words Per Minute (WPM)
Explanation:
The other ones are not a thing.
-----------------------------------------------
I hope this helpedPlease tell me if it is wrongThank you and have a wonderful and blessed day!
-- Juri Davis
When using a software budget, you should feel very confident if you choose a solution that looks like it will come in exactly on budget, without any overage costs.
a
True
b
False
Answer:
probably false
Explanation:
because u dont want a budget to b exact u want it completely covered
what is the difference between application software and system software
Answer:
system software
1. system software is used for operating computer hardware.
2.system software is installed on the computer when the operating system is installed.
application software
1.it is used for performing specific task.
2.it is installed according to the user's requirements.
How do most business applications and websites process credit card transactions?
a
They develop in-house credit card apps/services.
b
They license third-party credit card apps/services.
c
They run them through banks owned by the business.
d
They refuse to accept credit cards.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
Most business applications and websites use and process the credit card for their transaction.
For example, e-commerce website such as ali baba, am a zon, accepting credit card transaction when the customer gets to purchase any product from their stores. Their transactions are processed by in house credit card apps/service. But these apps/services owned by a third party. They just give you API services and related code to integrate the credit card services.
By using their in-house credit card apps/services, they know that user has transferred the money into their account for the purchased product, upon receiving payment confirmation, they then prepare and dispatch the order.
So, the correct answer to this question is:
To process the credit card transactions, they license third-party credit card apps/services backed by the internet merchant who is responsible for handling and managing the money of the business account.
Which of the following represents the relationship between malware and cyber terrorism? (Select all that apply).
Both are used to disrupt network service.
Both involve the use of illegal software.
Cyber terrorists can use malware as a weapon.
Network risk analysts work to prevent both.
Answer:
Both are used to disrupt network service
Cyber terrorists can use malware as a weapon
Both involve the use of illegal software
Network risk analysts work to prevent both
All are valid.
Answer:
Its all four
Explanation:
edg2021
Id k why the other person got b ad rati ngs, because it is true and they both do all of these things.
Relationship between sped and time on statistics
Confidential corporate data was recently stolen by an attacker who exploited data transport protections.Which of the following vulnerabilities is the MOST likely cause of this data breach?
a. resource exhaustion on the vpn concentrators
b. weak ssl cipher strength
c. improper input handling on the ftp site
d. race condition on the packet inspection firewall
Answer:
c. improper input handling on the FTP site
Explanation:
Improper input handling on the FTP site is associated with encrypting and/or decrypting of input data. It has been observed that input handling on the FTP site is one of the leading causes of vulnerabilities found in contemporary's systems and applications, this is a result of application trusting which helps to establish restrictions and prevent Improper Input Handling attacks accurately.
Hence, in this case, the correct answer is "improper input handling on the FTP site"
Do you think that ethics training can really be effective in changing the behavior of employees? Why or why not?
When employees follow ethical standards, they don't cut corners or short-change the company or its customers. ... Ethical conduct boosts morale and promotes teamwork. When employees can trust one another and management, they can work together more harmoniously and effectively
Match the example with the type of collection.
___('casa': 'house')
___[3,5]
___(3, 5, 'dog')
A) list
B)tuple
C)dictionary
Answer:
1.c
2.list
3.tuple
Explanation:
Dictionary—('casa': 'house'), List - [3,5], Tuple - (3, 5, 'dog') are the example with the type of collection. Hence,
What is collection?A collection is a group of things, usually one that someone has assembled. For instance, many kids have a collection of comic books. The term "collection" contains the word "collect." If you enjoy collecting things, there's a good chance you already have a collection of some kind.
4 The Concept of "Collection" A collection is a gathering of things that have been picked out with a specific goal in mind. Similar ideas include Set, Aggregation (data modeling), Dataset (science and business), and Corpus (linguistics and literary analysis). We favor collecting since it is less defined and has fewer connotations.
Old French collection, a noun of action from the past-participle stem of colligere ('gather together'), is derived from Latin collectionem (nominative collectio), which means 'a gathering together'.
Thus, words are arranged above,
For more information about collection, click here:
https://brainly.com/question/19053793
#SPJ5
CAN SOMEONE DO OR LOOK UP THE PIE CHART FOR THIS ANSWER PLS AND I WILL MARK YOU BRAINLIEST BUT PLSSS HELP MEEEE!!!
Answer:
I highly recommened you use ggl charts.
Explanation:
It's free. ALL YOU NEED IS AN GGL ACCOUNT. You can also choose many types of graph you want.
What term is the ability to restore service quickly and without lost data if a disaster makes your components unavailable or it destroys data
Answer:
"Recoverability" is the appropriate solution.
Explanation:
The above refers to either the DBMS work timetables where only certain processes are conducted out only when all transactions where such modifications are learned by the submission are implemented or operated. This technique is used to reinstate make informed even without system failures.Universal Containers (UC) wants to customize basic Salesforce Reports using Lightning Experience. In which two ways can Reports be customized? Choose 2 answers v A. Add a chart. B. Add a Lightning Component. C. Add links to external pages. D. Add a filter.
Answer:
A. Add a chart.
D. Add a filter.
Explanation:
Workflow management systems can be defined as a strategic software application or program designed to avail companies the infrastructure to setup, define, create and manage the performance or execution of series of sequential tasks, as well as respond to workflow participants.
An example of a work management system is Salesforce.com.
A Salesforce Reports using Lightning Experience refers to an intuitive and powerful software tool used for visualizing and analyzing Salesforce data such as customization, filtering, grouping and creating a summary report.
In this scenario, Universal Containers (UC) wants to customize basic Salesforce Reports using Lightning Experience.
Hence, the two ways in which Reports can be customized are by adding a chart and a filter.
Ben wants to create a Book class that has an instance variable serialNumber. Where should he declare the instance variable
Answer:
within the Book class but needs to also be outside of any methods.
Explanation:
If Ben is creating an entire Book class then the instance variable needs to be within the Book class but needs to also be outside of any methods. If Ben places the variable inside a method it can only be used by that method and therefore becomes an instance variable of that method and not the class. By creating it inside the class and outside the methods it can be used every single time a Book object is created. Therefore, creating an instance variable of serialNumber every time.
Line installers must complete a four-year university degree program in order to be hired.
True
False
Answer:
Line installers must complete a four-year university degree program in order to be hired.
Explanation:
true
Which statement will read an entire line of input into the following string object?
Select one:
a. cin << address;
b. cin address;
c. getline(cin, address);
d. cin.get(address);
e. None of these
Answer:
getline(cin, address);
Explanation:
Given
String object: address
Required
Statement that reads the entire line
The list of given options shows that the programming language is c++.
Analysing each option (a) to (e):
a. cin<<address;
The above instruction will read the string object until the first blank space.
Take for instance:
The user supplied "Lagos state" as input, only "Lagos" will be saved in address using this option.
b. cin address:
This is an incorrect syntax
c. getline(cin,address);
Using the same instance as (a) above, this reads the complete line and "Lagos state" will be saved in variable address
d. cin.get(address);
address is created as a string object and the above instruction will only work for character pointers (i.e. char*)
From the above analysis, option (c) is correct.
The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for termination.
Answer:
"Cross-training " seems to be the right response.
Explanation:
Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization. This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.Given the following word addresses: 3, 180, 43, 2,191, 88, 190, 14, 181, 44, 186, 253
a. Show the final cache contents for a three-way set associative cache with two-word blocks and a total size of 24 words. Use LRU replacement. For each reference identify the index bits, the tag bits, the block offset bits, and if it is a hit or a miss.
b. Show the final cache contents for a fully associative cache with one-word blocks and a total size of 8 words. Use LRU replacement. For each reference identify the index bits, the tag bits, and if it is a hit or a miss.
c. What is the miss rate for a fully associative cache with two-word blocks and a total size of 8 words, using LRU replacement? What is the miss rate using MRU (most recently used) replacement? Finally what is the best possible miss rate for this cache, given any replacement policy?
Answer:
A. index bits = 2, tag bits = 2, block offset bits = 1, it is a miss.
B. index bits = 2, tag bits = 1, block offset bits = 0, it is a hit
C. the miss rate is 0
Explanation:
a. number of blocks = 12
number of blocks per set = 3
number of set = number of blocks / number of blocks per set = 12/3 = 4
word size = 24
block size = 2
the block offset = [tex]log_{2}[/tex] block size
= [tex]log_{2}[/tex] 2 = 1
the index bits = [tex]log_{2}[/tex] number of set = [tex]log_{2}[/tex] 4 = 2
the tag bits = ([tex]log_{2}[/tex] word size) - offset - index = ([tex]log_{2}[/tex] 24) -2 - 1 = 5 -2 - 1 = 2
b. word size = 8
block size = 1
the block offset = [tex]log_{2}[/tex] block size
= [tex]log_{2}[/tex] 1 = 0
the index bits = [tex]log_{2}[/tex] number of set = [tex]log_{2}[/tex] 4 = 2
the tag bits = ([tex]log_{2}[/tex] word size) - offset - index = ([tex]log_{2}[/tex] 8) -2 - 1 = 3 - 0- 2= 1
define an array of 12 structures of type DayMon. Name the array maps[] and initialize the array with the names of the 12 months in a year and the number of days in each month.
Answer:
#include<stdio.h>
int main(){
int i,n;
char* maps[] = {"January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"};
for(i=0;i<12;i++){
printf("%s\n", maps[i]);
}
printf("\n");
int days[] = {31,28,31,30,31,30,31,31,30,31,30,31};
for(i=0;i<12;i++){
printf("%s %d\n", maps[i], days[i]);
}
printf("\n");
return 0;
}
Explanation:
The C source code above declares two arrays, the maps array which is initialized with the months of the year and the days array which is initialized with the number of days of each month in the maps array. Both arrays are printed out side by side like a table of months and the days in each month.
create a pl/SQL block to retieve and display information for a specific pledge. Display the pledge ID, donor ID, Pledge Amount, total paid so far and the difference between the pledge amount and total paid amount
Answer:
SELECT pledge_ID,
donor_ID,
pledge_amount,
total_paid,
pledge_amount - total paid
FROM pledges;
Explanation:
The SELECT statement initiates the display command. It states the variables to be selected.
The variables are usually separated by a comma.
The FROM statement indicates the location from which the variables ne selected from.
; signifies the end of the query, stating that the query should be run.
The tags are always enclosed within a pair of
(a) curly
(b) square
(©) angular
Answer:
(©) angular
Explanation:
The tags should always be enclosed with a pair of angular brackets
In the case of Hyper text markup language (HTML) the brackets that should be used is angular brackets i.e. (< and >)
So as per the given situation, the option c is correct
And, the rest of the options are incorrect
Therefore the tags that should always enclosed with a angular pairs
Answer:
(©) angular
Explanation:
The tags are always enclosed within a pair of angular.
Which of these is NOT an example of a GUI?
a
virus protections software
b
microphone
c
icons
d
USB cord
Answer:
The answer to this question is given below in the explanation section.
Explanation:
First, we need to know what is the graphic user interface (GUI)?
A GUI is a form of user interface that allows the users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of a text-based user interface as in MS-DOS. Users interact through such devices using their icon, navigation using the mouse cursor, etc , and touching. In short, an interface that has graphical options.
so, in the context of the question, the following are examples of GUI.
Virus protection software: Because virus protection software has a graphical interface and user can use it easily by using its graphics and exploration functionality.
Icon: icon is an example of GUI because ICON built on other many graphics parts. In short, the icon is part of the GUI.
The followings are not the example of GUI:
Microphone and USB cord because these are the electronic parts and they don't possess the GUI.
A business owns a printer but the printer is used for cloud printing purposes. What type of resource is this?
Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the count of how many numbers were entered.
Sample Run Enter a number: 1 Enter a number: 41 Enter a number: 36 Enter a number: 25 Sum: 103 Numbers Entered: 4
total = 0
count = 0
while total<=100:
total += int(input("Enter a number: "))
count += 1
print("Sum:",total)
print("Numbers Entered:",count)
I wrote my code in python 3.8. I hope this helps
Answer:
total = 0
count = 0
while total<=100:
total += int(input("Enter a number: "))
count += 1
print("Sum:",total)
print("Numbers Entered:",count)
Explanation:
Derek is creating an animation for his class project. What is the first step Derek should follow while creating the animation?
A. storyboarding
B. preparing a script
C. adding voices to the animation
D. choosing an animation tool
Answer:
1. Script,2.Storyboarding,3.Choosing a Animation tool, 4. Adding voices to the animation
Explanation:
Script comes first since that you have to follow everything on there, then you have to make a illustration of the storyboard, then it comes to choosing which animation tool is better, and last but definitely not least is adding voices to that animation.
Answer: preparing a script
Explanation:
Your colleague has made a suggested change to an important document you are both working
You disagree with their suggested change. They will be reviewing the changes you make before
the final version of the document is submitted to your boss. You both work remotely and are in
radically different time zones. What is the best step to take next?
Answer:
come to an agreement with your partner on how you can modify or change the suggested change
Explanation:
The best step to take is to set up a virtual meeting between both of you, find out why the reason for the disagreement, and then settle the issues.
What is the virtual meeting about?Based on the fact that both of you cannot physically meet since both are in different location, the right thing to do is to set up a computer virtual meeting.
Conclusively, the parties involved can trash out issues and misconceptions before submitting to your boss.
Learn more about document from
https://brainly.com/question/16650739
#SPJ2
short description about your penfriend
Answer:
USEFUL WORDS:
Starting the first Letter. Hi! ...
Starting the second Letter. Hi! ...
Starting the second letter with an apology. I am sorry I did not reply earlier. ...
Saying Goodbye. Bye for now and write back soon! ...
Do not write everything in the first letter. The following are some ideas:
Introduce Yourself. ...
Introduce your family.
Explanation:
If you're a beginner to data analysis, what is the first thing you should check when you build data queries?
a. workflow diagrams
b. calculations
c. differentials
d. record counts
If an element contains text or another element, it is marked using a ______tag set in which an opening tag and a closing tag enclose the element content.
a. single-sided
b. two-sided
c. one-sided
d. double-sided
Answer:
b. two-sided
Explanation:
If an element contains text or another element, it is marked using a two-sided tag set in which an opening tag and a closing tag enclose the element content.
For example, <p>it is very important to "check" the expiration date of goods before buying them.</p>. In this scenario, the <p> represents the opening tag while the </p> represents the closing tag in HTML programming.