A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of data?
Answer:
Line graphs allow us to see overall trends such as an increase or decrease in data over time. Bar graphs are used to compare facts.
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file. When one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded
Answer:
The answer is below
Explanation:
Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.
When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.
determine the factors using computer failures and defects
Answer:
Voltage spike – This is a momentary change in the supply of electric power. It’s important to remember that the size of the transient can range from just milliseconds to longer periods of time. Even a small power glitch can damage a computer and corrupt data. If the screen goes blank during a thunderstorm, it’s likely that a voltage spike is responsible.
Circuit board fails with no visible indication of damage – This is the typical scenario: A computer goes down. A defective circuit board is suspected of the fault, but an inspection reveals no signs of physical damage. A replacement board is installed and operation resumes.
Failure to load software upgrades – Computer software often comes with various bugs, or vulnerabilities. These are simply programming mistakes, but they can make the software susceptible to viruses and glitches. When an error is discovered, the software designer sends out a “patch” that requires downloading and rebooting. Failing to upgrade the software by running the patch can lead to corruption of data.
Failure to keep virus protection up to date – There are several malware protection packages available for computer rooms or data centers. Once installed, the subscription must be maintained. One telltale sign of a malware infected computer is slow data processing.
Inadequate cooling – Computers produce heat, and the more data they process, the more heat must be eliminated. Servers, the “brains” of computers, fail under excess heat, so adequate cooling is essential.
Environment – If a computer room has a dedicated cooling system, there may be an opportunity to closely control the heat. If the cooling is shared with other equipment or the space contains offices, we often face a more challenging task. People have comfort needs different to those of computers.
Loss of Power, PDU fails – Power Distribution Units (PDU’s) are similar to power bars in homes and offices. They distribute power to different components in a computer room, and are usually located next to the server racks. PDU’s suffer a range of problems. Receptacles wear out and can be the sources of bad contacts, and moisture can lead to corrosion.
UPS batteries – Uninterruptible Power Supply (UPS) batteries are found in computer rooms. Most often, they are used to provide continuous power for a limited time, during an outage. Depending on how it’s used and the design of the battery, the life span can be as short as 4-5 years for what is considered a “10 year life” battery. Elevated room temperatures will shorten the life of any battery. Even a small facility such as a dentist office uses UPS batteries.
Transfer switch battery defective – This can be an indication that the site lacks an effective battery maintenance program. It can also be a sign that the transfer switch is “frozen” in position. Preventive maintenance could help avoid a breakdown.
Failure of standby power to synchronize (come on line) – When electric power from the grid disappears, standby power takes over in two different ways. In a small computer room, the focus is on turning computers off in a controlled manner. A fully charged UPS will provide power for 10-15 minutes to allow a computer to save its data and turn off. In a larger facility, it’s the matter of keeping cooling and power going long enough to give the standby generator an opportunity to “synchronize,” to get up to a rate of speed sufficient to power the infrastructure and continue data processing.
Diesel fuel contaminated – Most medium to large facilities have generators powered by diesel fuel, which can become contaminated and useless when a power outage occurs. Water is usually the culprit. Regular fuel testing is necessary to avoid contamination.
Storage defective – Data is stored on magnetic disks or tape. Both can be damaged during normal operation, so it’s a good practice to back up stored data on a regular basis. Backing up means creating a spare data storage. Failure of a tape or disk drive is often, but not always, proceeded by noise. Opening the unit to attempt data restoration is better left to a professional.
Sprinkler system turns on above the servers – Where a data room is protected by a water sprinkler system, a small spill can damage the electronic components. This is particularly true in cases where sprinkler heads are located directly above the servers.
Computers are crucial to business today, but there are so many things that can cause them to fail. By addressing the above common culprits, you could help reduce the overall risk of your computer systems failing.
Explantion: I hope this helps!!!!! :)
What are the challenges of giving peer feedback in peer assessment
Answer:
There can some challenges when giving and receiving peer feedback in a peer assessment. Some people can be harsh in their assessments of your work. Some students cannot take that and because of that it can cause them to question a lot of their work. People can also be wrong when it comes to the assessment
multiple keys may represent a primary key true or false
Help plz brainliest.
Answer:
Follows are the solution to this question:
Explanation:
In this question, the equation will be written as the coefficients for each of the bases, that is from the above quantum states b is given as follows:
[tex]\to | b \rangle = 0.4 | 00 \rangle + 0.65 | 01 \rangle + 0.2 | 10 \rangle + 0.61 | 11 \rangle[/tex]
Therefore the equation can be written as in the state b:
[tex]\to \mathbf{state_b = [0.4, 0.65, 0.21, 0.61]}[/tex]
Write a Java program that asks the user to enter an array of integers in the main method. The program should prompt the user for the number of elements in the array and then the elements of the array. The program should then call a method named minGap that accepts the array entered by the user as a parameter and returns the minimum 'gap' between adjacent values in the array. The main method should then print the value returned by the method. The gap
Answer:
In Java:
import java.util.*;
class Main {
public static void minGap(int intArray[], int arrlength) {
if(arrlength <2){return;}
int minm = Math.abs(intArray[1] - intArray[0]);
for (int i = 2; i < arrlength; i++)
minm = Math.min(minm, Math.abs(intArray[i] - intArray[i - 1]));
System.out.print("Minimum Gap = " + minm);
}
public static void main(String arg[]) {
Scanner input = new Scanner(System.in);
int arrlength;
System.out.print("Array Length: ");
arrlength = input.nextInt();
int[] intArray = new int[arrlength];
for(int i = 0;i<arrlength;i++){
intArray[i] = input.nextInt();
}
minGap(intArray, arrlength);
} }
Explanation:
The minGap method begins here
public static void minGap(int intArray[], int arrlength) {
This checks if array length is 1 or 0. If yes, the program returns nothing
if(arrlength <2){return;}
If otherwise, this initializes the minimum gap to the difference between the 0 and 1 indexed array elements
int minm = Math.abs(intArray[1] - intArray[0]);
This iterates through the array elements
for (int i = 2; i < arrlength; i++)
This checks for the minimum gap
minm = Math.min(minm, Math.abs(intArray[i] - intArray[i - 1]));
At the end of the iteration, the minimum gap is printed
System.out.print("Minimum Gap = " + minm);
}
The main method begins here
public static void main(String arg[]) {
Scanner input = new Scanner(System.in);
This declares the length of the array
int arrlength;
This prompts the user for array length
System.out.print("Array Length: ");
This gets the user input
arrlength = input.nextInt();
This declares the array
int[] intArray = new int[arrlength];
The following iteration gets input for the array
for(int i = 0;i<arrlength;i++){
intArray[i] = input.nextInt();
}
This calls the minGap method
minGap(intArray, arrlength);
}
HELP PLS
Which technologies have made global communication instant and more effective? Choose THREE answers.
social media
wireless devices
smart phones
automobiles
printed newspapers
Answer:
(1). social media
(2). wireless devices
(3). smart phones
Explanation:
The three technologies that have made global communication instant and more effective are social media, wireless devices, and smart phones.
Here,
Social media platforms have revolutionized the way people communicate globally. They allow individuals to connect, share information, and communicate with others in real-time, regardless of geographical location.
Wireless devices, such as laptops, tablets, and smartwatches, have eliminated the need for physical connections like cables and wires. They allow users to access the internet and communicate with others from virtually anywhere with a wireless signal.
Smartphones combine the features of a mobile phone with advanced computing capabilities. They provide instant communication through voice calls, text messages, emails, and various messaging apps.
Smartphones also allow users to access social media platforms and use wireless internet, making global communication more convenient and efficient.
Know more about communication technologies,
https://brainly.com/question/33037966
#SPJ6
Please help ASAP! will mark brianliest! 30 points!
Which popular VPN protocol allows segment access for users?
IPsec
PPTP
L2TP
SSL VPN
Answer:
SSL VPN
Explanation:
Secure Sockets Layer, or SSL VPN, is the second common VPN protocol.
A big plus for SSL VPNs is that they can allow segmented access for users. For example, users can be limited to checking email and accessing shared drives rather than having access to the entire network.
SSL VPNs come in two types, SSL portal and SSL tunnel.
SSL Portal VPNs
SSL Portal VPNs allow a user to securely access the web from a browser once the user logs into the VPN’s online portal using a specified method of authorization.
This type of SSL VPN gets its name because of how the user accesses it – through a single web page, or portal. The page acts as a single gateway to the other services available on the secured network.
SSL Tunnel VPNs
SSL Tunnel VPNs allow the user to not only access the web securely, but to also use applications and other network services that aren’t based on the web.
Due to their sophisticated segmentation capabilities, SSL VPNs often require more skill to implement.
VPNs are not a cure-all
Of course, what you could do is circumvent the entire debate around VPN SSL vs IPSEC. Our Gatekeeper offering is an enhanced alternative to VPN with no client, that still offers two-factor authentication to secure remote access.
Wherever you land between VPN SSL vs IPSEC, of if you join #TeamGatekeeper, having one of these tools to protect web traffic is a great way to help secure information, but it’s not an end-all be-all security solution.
After all, a VPN won’t protect your employees from social engineering attacks such as email phishing.
(hope this helps can i plz brainlist it will make my day :D hehe)
What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:
Width
Height
Length
They need to be written in this format: ___________X___________X___________
Fill in the blanks.
for my sibling.
Answer:
Length x Width x Hight
Explanation:
The following code will not display the results expected by the programmer. Can you find the error? Declare Real lowest, highest, average Display "Enter the lowest score." Input lowest Display "Enter the highest score." Input highest Set average = low + high / 2 Display "The average is ", average, "."
Based on the information given, the first error in the code is that the Variable name is lowest, NOT low, and Set average = low + high / 2.
How to find the error in the code.For Error 2: Variable name is highest, NOT high and Set average = low + high / 2
For Error 3 : Set average = low + high / 2. Thus, you will need to add the lowest and highest, then perform the division by 2
Set average = (lowest + highest) / 2 is the the correct statement.
Learn more about codes on:
https://brainly.com/question/25875879
Is the current month 12?
It's common to print a rotating, increasing list of single-digit numbers at the start of a program's output as a visual guide to number the columns of the output to follow. With this in mind, write nested for loops to produce the following output, with each line 60 characters wide: | | | | | | 123456789012345678901234567890123456789012345678901234567890
Answer:
The program in python is as follows:
for i in range(0,6):
for i in range(0,9):
print(" ",end='')
print("|",end='')
print()
for i in range(1,61):
print(i%10,end='')
Explanation:
See attachment for program output format
The next two instructions create a nested for loop
for i in range(0,6):
for i in range(0,9):
This prints 9 spaces
print(" ",end='')
This prints a vertical line at the top of the end of the spaces printed
print("|",end='')
This prints a new line
print()
This iterates from 1 to 60
for i in range(1,61):
This prints 1, 2, 3....9, then 0, 6 times on a straight line
print(i%10,end='')
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send an packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure. a = IP() a.dst = ’1.2.3.4’ a.ttl = 3 b = ICMP() send(a/b) If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result.
Answer:
answer b
is correct
Our tests will run your program with input 2, then run again with input 5. Your program should work for any input, though.
Write code that outputs variable numDays. End with a newline
Answer:
In Python:
numDays = int(input("Days: "))
print("Number of days: "+str(numDays)+"\n")
Explanation:
The program was written in Python and the explanation is as follows;
First, get the input for the number of days from the user
numDays = int(input("Days: "))
Next, print string "Number of days: " followed by the number input from the user and then newline
print("Number of days: "+str(numDays)+"\n")
The character \n represents new line
You are the systems administrator for a large trust company. Most of the Linux servers in the company host databases that are accessed frequently by company employees. One particular Linux server has been reported as being very slow today. Upon further investigation using the top utility, you have found a rogue process that is wasting a great deal of system resources. Unfortunately, the rogue process is a database maintenance program and should be killed with caution. Which kill signal would you send this process and why? If the rogue process traps this signal, which other kill signals would you try? Which command could you use as a last resort to kill the rogue process?
Answer:
soo long this one is ufff
Implement the ArrayMethod application containing an array that stores eight integers. The application should call the following five methods: 1. display - should display all the integers 2. displayReverse - should display all the integers in reverse order 3. displaySum - should display the sum of the integers 4. displayLessThan - should display all values less than a limiting argument 5. displayHigherThanAverage - should display all values that are higher than the calculated average value.
Answer:
public static void display(int [] arr){
System.out.print("Arrays: ");
for(int i =0;i<arr.length;i++){
System.out.print(arr[i]+" ");
}
System.out.println();
}
public static void displayReverse (int [] arr){
System.out.print("Arrays in reverse order: ");
for(int i=arr.length-1;i>=0;i--){
System.out.print(arr[i]+" ");
}
System.out.println();
}
public static int displaySum (int [] arr){
System.out.print("Sum: ");
int sum = 0;
for(int i =0;i<arr.length;i++){
sum+=arr[i];
}
return sum;
}
public static void displayLessThan (int [] arr, int num){
System.out.print("Less than "+num+": ");
for(int i =0;i<arr.length;i++){
if(arr[i]<num){
System.out.print(arr[i]+" ");
}
}
System.out.println();
}
public static void displayHigherThanAverage (int [] arr){
System.out.print("Higher than average: ");
int sum = 0;
for(int i =0;i<arr.length;i++){
sum+=arr[i];
}
float average = sum/arr.length;
for(int i =0;i<arr.length;i++){
if(arr[i]>average){
System.out.print(arr[i]+" ");
}
}
System.out.println();
}
Explanation:
The methods were written in Java. See attachment for explanation where I used comments to explain each lines.
Note that lines that begin with double slash (//) are comments
True or False
humans shed skin in their sleep (pwease fweinds onwy answer)
Answer:
Not all people but sometimes it happens
Help fast
When comparing and what is the main difference?
O The first symbol is for reviewing text and the second for enlarging text.
The first symbol is for spacing and the second for sizing.
O The first symbol is for viewing text and the second for inserting text.
O The first symbol is for inserting text and the second for viewing text.
Answer:
The first symbol is for inserting text and the second for viewing text
Explanation:
Select the correct answer.
Which of these is an adventure game?
A.
Duck Hunt
B.
Tetris
C.
Myst
D.
Sudoku
Elza hos a document with plain text. She wants to format only the second paragraph of the fifth page to have two
columns. What sequence of buttons will Eliza click to set up the correct type of section break for this?
O Page Layout, Breaks, Page
O Page Layout, Breaks, Continuous
Insert, Page Break
O Insert, Continuous
Which of the following are advantages of converting analog audio to digital audio? Choose all that apply
Reduction in editing time
Consistently accurate copies of audio recordings
Preservation
Susceptibility to computer viruses
Answer:
b and c
Explanation:
sorry if there wrong
Answer: A, B, and C
Explanation:
JAVA 6.37 LAB: Even/odd values in an array Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers in the list. The first integer is not in the list. Assume that the list will always contain less than 20 integers. Ex: If the input is: 5 2 4 6 8 10 the output is: all even Ex: If the input is: 5 1 -3 5 -7 9 the output is: all odd Ex: If the input is: 5 1 2 3 4 5 the output is: not even or odd Your program must define and call the following two methods. isArrayEven() returns true if all integers in the array are even and false otherwise. isArrayOdd() returns true if all integers in the array are odd and false otherwise. public static boolean isArrayEven(int[] arrayValues, int arraySize) public static boolean isArrayOdd(int[] arrayValues, int arraySize)
Answer:
Explanation:
Hey,
I an sorry I do not know java only python
Thanks
Select the correct answer.
A computer using a connectionless network protocol sends too many data packets to another computer, causing loss of a few packets. As a result, the message appears jumbled to the user at the destination computer. How does TCP overcome this issue?
A.
by using flow control
B.
by using cables
C.
by using terminals
D.
by using a larger IP address
Please only answer if you are 100% sure
Answer:
D by using a larger IP address correct
Explanation:
Correct answer I hope this helps you :)
Why do the optical signals used in optical fibre cables have a
very short wavelength?
Answer:
Optical signals have very high frequencies. A high frequency means a short wave length because the wave length is inversely proportional to the frequency (λ = v/f), where v is the propagation speed in the media.
Explanation:
Since optical signals have a greater frequency, measured in nanometers, their wavelengths are shorter (10-9 meter). A billionth of a meter is equal to one nanometer (nm), a unit of length.
What are optical signals?An electromagnetic signal is an optical signal. It has oppositely polarised magnetic and electric fields.
The frequency of this EM pulse is typically very high (in the order of THz). As a result, measuring it in terms of wavelength is more practical.
The frequency of optical communications are very high. Since the wave length and frequency are inversely related, a high frequency implies a short wavelength.
To a receiving end, where the light signal is processed as data, the fiber transfers "data" by light.
As a result, fiber optics serves as a "pipe" or transmission medium for signals that need to travel vast distances quickly.
Thus, the optical signals used in optical fiber cables have a very short wavelength.
For more details regarding optical signal, visit:
https://brainly.com/question/17646651
#SPJ2
PLEASE HELP ME WITH THIS i will mark you brainlist
Answer: you have to check your email and click on the microsoft email they sent you and enter the code in the email.
Explanation: plz mark brainliest
Question # 2
Dropdown
Identify the type of error described.
___5 / 0
___ float('two')
Answer:
ZeroDivisionError
ValuError
Explanation: Edg 2020-2021
Answer:
1.ZeroDivisionError
2.ValueError
Explanation:
took test
What episode and Season of Simpsons is this
Answer:
season 9 episode 23.65 and the bases it 12
In Reinforcement Learning, algorithms that learn from trial and error are called
Answer:
Explanation:Reinforcement Learning(RL) is a type of machine learning technique that enables an agent to learn in an interactive environment by trial and error using feedback from its own actions and experiences.
In Reinforcement Learning, algorithms that learn from trial and error are called as long term reward.
What are reinforcement learning?Reinforcement learning are defined as a branch of machine learning that looks at how intelligent agents should behave in a given situation to maximize the idea of cumulative reward. In order to optimize the "reward function" or other user-provided reinforcement signal that builds up from the immediate rewards, the agent uses reinforcement learning to develop an optimal or nearly optimal strategy.
Long term rewards are defined as a corporate policy that pays staff for achieving defined objectives that boost shareholder value. Without using a world model, learn how to plan out scenarios and behaviors to maximize long-term gain.
Thus, in Reinforcement Learning, algorithms that learn from trial and error are called as long term reward.
To learn more about Reinforcement Learning, refer to the link below:
https://brainly.com/question/18881520
#SPJ6
What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
A. 0.067
B. 0.533
C. 8
D. 15
Answer:
8
Explanation:
Gear reduction = driven gear teeth / driving gear teeth
First stage reduction :
Driven gear teeth = 36
Driving gear teeth = 12
36 /12 = 3
Second stage reduction :
Driven gear teeth = 60
Driving gear teeth = 12
60 /12 = 5
First stage + second stage
3 + 5 = 8