explain how you adapted the magazine ad design for the web banner design. for example, what technical steps had to be taken to prepare the images and text? what conceptual changes were implemented to go from a print media piece to something more animated to be viewed on screen? why did you feel those changes were necessary? be sure to document with screenshots which tools/software you used for the different steps in the design process of both pieces.

Answers

Answer 1

Web design involves a completely new way of thinking about design rather than just adjusting screen resolutions and automatically resizing graphics.

According to the principle of responsive web design, design and development should adapt to the environment and behavior of users based on factors such as screen size, platform, and orientation.

We're rapidly approaching the point in the realm of Web design and development where we can no longer keep up with the never-ending new resolutions and devices.

As there are more devices, there are more screen definitions, orientations, and resolutions. Each of these devices might be able to manage variations in size, functionality, and even color. New gadgets with new screen sizes are being invented every day.

Others are in portrait mode, while yet others are entirely square. Many modern devices can transition from portrait to landscape modes at the user's discretion, as evidenced by the increasing popularity of the iPhone, iPad, and sophisticated smartphones.

We must take into account the hundreds of different screen sizes in addition to designing for both landscape and portrait orientations (and enabling those orientations to potentially alter in a nanosecond upon page load). Yes, it is possible to divide them into broad categories, create designs for each, and then adjust each design as needed. In addition, a lot of people don't maximize their browsers, which by itself leaves an excessive amount of room for different screen sizes.

To know more about web design click on the link:

https://brainly.com/question/15339237

#SPJ4


Related Questions

which of the following statements is true about a vpn? group of answer choices a vpn client software encrypts messages to ensure secure transmissions. a vpn network does not provide users with remote access. a vpn connection utilizes private networks instead of the public network. a vpn connection appears as a secure connection, though it is not. a vpn is only used between hosts on local networks.

Answers

The statement that is true about VPN is: a VPN client software encrypts messages to ensure secure transmissions.

In the field of computer science, a VPN can be described as a network that allows a secured connection when a public connection is being used. A VPN helps to protect the privacy of a user and establishes secure transmissions.

Encryption is formed for the protection of data through a VPN. Secure transmissions are established by a VPN by hiding the IP address of a network through the VPN.

As a result of a VPN, you can use public networks such as a public wi-fi without any risk an VPN will ensure a secure transmisison.

To learn more about VPN, click here:

https://brainly.com/question/28110742

#SPJ4

please select which option is the most accurate line from the manifesto for agile software development? group of answer choices comprehensive documentation before working software working software over comprehensive documentation expedient development over working software comprehensive documentation defines working software

Answers

The four core values of Agile software development as told by the Agile Manifesto are individuals and interactions over processes and tools; working software over comprehensive documentation; customer collaboration over contract negotiation.

The Agile Manifesto means a document that sets out the key values and principles behind the Agile philosophy and provides to help development teams work more efficiently and sustainably. The Agile Manifesto contains of four key values: Individuals and interactions over processes and tools. Working software over comprehensive documentation. Customer collaboration over contract negotiation.

You can learn more about The Agile Manifesto at https://brainly.com/question/4478843

#SPJ4

what statement accurately reflects what occurs when a message is too large to transport on a network?what statement accurately reflects what occurs when a message is too large to transport on a network?

Answers

Network - The message is split up into smaller messages known as segments or datagrams (for TCP) (for UDP).

What is datagrams?
A packet-switched network's basic transfer unit is called a datagram. Datagrams typically consist of a header and a payload. Over a packet-switched network, datagrams offer a connectionless communication service. The network does not have to guarantee datagram delivery, timing, or sequence of arrival. Halvor Bothner-By, the CCITT rapporteur for packet switching, combined the words data and telegram to form the phrase datagram at the beginning of the 1970s. Despite the fact that the word is new, the idea was not. Paul Baran wrote about a hypothetical military network that had to withstand a nuclear strike in a report for the RAND Corporation in 1962.

To learn more about datagrams
https://brainly.com/question/22238625
#SPJ4

you need to view detailed information for the hr directory in the root (/) directory. type ls -l / at the prompt to answer the following questions: what is the directory size? what is the modified date?

Answers

HR - The directory size is 4096 and the modified date is Nov 28.

What is HR?
The group of individuals who work for a given organisation, business sector, industry, or economy is referred to as its human resources. Human capital, or the knowledge and abilities that people possess, is a more specific idea. Manpower, labour, personnel, colleagues, or simply "people" are comparable concepts. An organization's human resources department (HR department) handles human resource management, supervising various employment-related tasks like ensuring that labour laws and employment standards are followed, conducting interviews, managing employee benefits, organising employee files with the necessary paperwork for future use, and managing some facets of recruitment (also known as talent development) as well as employee offboarding. They act as a liaison between a company's management and its workers.

To learn more about HR
https://brainly.com/question/25443563
#SPJ4

THIS QUESTION IS ABOUT NETWORK ACCESS LAYER! WILL GIVE 30 POINTS PLEASE ANSWER ASAP
Diagram: Include a diagram (using squares, circles, arrows, etc.) showing the data unit and what its headers and footers do.

Answers

Answer:

it's 15 points

Explanation:

send a photo...can't understand like this

matt is supervising the installation of redundant communications links in response to a finding during his organization's bia. what type of mitigation provision is matt overseeing?

Answers

The type of mitigation provision is matt overseeing is installing a redundant computer system.

What is mitigation provision?

A mitigation provision is a clause in a contract that requires one party to take reasonable steps to mitigate damages that may be caused by the other party's breach of the contract. Under the code's mitigation provisions, a bar to an assessment, credit, or refund imposed by the expiration of a statute of limitations or other rule of law can be waived.

Matt is overseeing the installation of redundant communications links in response to a finding during his organization's business impact analysis (BIA). This is an example of proactive mitigation, which is activity taken in advance of an incident to reduce its potential severity.

To learning more about mitigation provision

https://brainly.com/question/28138888

#SPJ4

after locating the characters that separate the components of a string you wish to parse, which functions would you to extract the individual components?

Answers

In SQL, the functions used to extract individual components are LEFT, RIGHT, SUBSTRING, and LEN.

what is the LEFT() function?

The LEFT() function retrieves a string's first few characters (starting from the left).

what is the SUBSTRING() function?

A string of characters can be extracted using the SUBSTRING() function.

Once you've identified the characters that divide the parts of a string you want to parse. So the functions that are used to extract individual components are LEFT, RIGHT, SUBSTRING, and LEN.

Therefore, LEFT, RIGHT, SUBSTRING, and LEN functions are used.

To learn more about the SUBSTRING() function from the given link

https://brainly.com/question/28290531

#SPJ4

Which feature in microsoft word gives you the option to increase or decrease the indentation of items in a bulleted list or numbered list?.

Answers

Answer:

These icons.

Explanation:

You can these icons that are in the paragraph section or you can use the tab/delete keys on the keyboard

Iuanyware is a ________ application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

Answers

What is meant by IUanyWare?

Iuanyware is a service application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

What is meant by IUanyWare?

All IU staff, faculty, and students have access to IUanyWare. You may stream the IU-licensed apps and software you need from anywhere, on any device, without having to download, install, or utilize a VPN for each one.

While IUanyWare enables you to stream your program from a web browser or mobile app, IUware lets you install software straight to your hard drive.

Iuanyware is a service program made to function inside of a web browser like Firefox, Chrome, Opera, or Edge.

IUanyWare exists a service available to all staff, faculty, and students at IU. No matter where you exists or what device you're utilizing, you can stream the IU-licensed apps and software you required— without containing to install each one or utilize a VPN.

To learn more about IUanyWare refer to:

brainly.com/question/17493537

#SPJ4

The following code is intended to test if x is at least 5. Fill in the correct symbol:

Answers

To test the condition if x is at least 5, the statement with the correct symbol is as “x >= 5”.

The x is at least 5 means that the minimum value x has is 5 and all other values for the x are greater than 5. So the correct comparison symbol that truly reflects x is at least 5 is “>=”. Thus, the given statement with the correct symbol is written as follows: “ x >= 5 ”.

The symbol “>=” is pronounced as greater than or equal to and is called a comparison symbol or operator in the context of the programming paradigms. In the expression  “ x >= 5 ” the symbol true is returned if the value of x on the left is greater than or equal to the value on the right i.e. 5, otherwise false is returned; meaning that x can have a value equal to 5 or any value greater than 5, but cannot have any value less than 5.

The complete question is as follows:

"

The following code is intended to test if x is at least 5. Fill in the correct symbol: x _____ 5

"

You can learn more about Comparison Operators at

https://brainly.com/question/11193100

#SPJ4

What uses clickstream data to determine the efficiency of the site for the users and operates at the server level?.

Answers

Answer:

Website traffic analytics

Explanation:

a star topology is: group of answer choices difficult to manage because the central computer receives and routes all messages in the network dependent upon the capacity of the central computer for its performance always slower than a ring network less susceptible to traffic problems than other architectures not affected if the central computer fails

Answers

A star topology is dependent upon the capacity of the central computer for its performance. So the right answer to this question is B.

The star topology can be defined as a network topology in which each network component is physically connected to a central node such as a router, hub, or switch. In a star topology, the central hub acts like a server and the connecting nodes act like clients. The star topology has a function to reduce the impact of a transmission line failure by independently connecting each host to the hub.

You can learn more about The star topology at https://brainly.com/question/13186238

#SPJ4

Julie has 3 printers installed on her windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?.

Answers

To set one of her printers as a default printer, Julie should go to Settings>devices<Printers and Scanners.

In the field of computers, printers and scanners are hardware devices that are used for printing of a document or scanning it when they are attached to a computer.

A user can have the settings of multiple printers installed on the computer but for feasibility can set a default printer for easy use.

To make a particular printer as a default one, you need to go to settings, then choose devices and then choose printers and scanners. Here, you can easily make the choice of your default printer.

Although a part of your question is missing, you might be referring to this question:

Julie has 3 printers installed on her windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?

Settings > Devices > Printers & scanners

Control Panel > Devices > Printers & scanners

Control Panel > Printers and scanners

Settings > Printers & scanners

To learn more about printers, click here:

https://brainly.com/question/28110846

#SPJ4

python by searching the country only, answer the following questions: 1. how many movie titles mention the united states? 2. how many movie descriptions mention the united states? 3. how many movies are from the united states?

Answers

python by searching the country only

Program:

1. Import pandas as pd

df = pd.read_csv('movies_metadata.csv')

#Set the index to the movie title

df = df.set_index('movie_title')

#Details of the movie ' title with United states

result = df.loc['united states']

result.count()

print(result.count())

2. import pandas as pd

df = pd.read_csv('movies_metadata.csv')

#Set the index to the movie description

df = df.set_index('movie_description)

#Details of the movie ' description with United states'

results = df.loc['united states']

results.count()

print(results.count())

3.import pandas as pd

df = pd.read_csv('movies_metadata.csv')

#Set the index to the title

df = df.set_index('country')

#Details of the movie 'Grumpier Old Men'

numberofmovies = df.loc['unitedstates']

movies_count = numberofmovies.count()

print(movies_count)

Hence using pandas and data frame concept we can solve the question

To know more on pandas follow this link

https://brainly.com/question/24942162

#SPJ4

Write a program that reads the student information from a tab separated values (tsv) file. the program then creates a text file that records the course grades of the students. each row of the tsv file contains the last name, first name, midterm1 score, midterm2 score, and the final score of a student. a sample of the student information is provided in studentinfo.tsv. assume the number of students is at least 1 and at most 20.

Answers

Using the knowledge in computational language in C code it is possible to write a code that write a program that reads the student information from a tab separated values (tsv) file.

Writting the code:

#include<iostream>

#include<fstream>

#include<string>

#include<vector>

#include<sstream>

#include<iomanip>

using namespace std;

// Class student required to store the data

class Student{

   public:

       string lname;

       string fname;

       int marks[3];

       char grade;

       

       // Function which generates the grade for student

       void calculate_grade(){

           double sum = 0;

           for(int i=0;i<3;i++){

               sum+= marks[i];

           }

           double average = sum/3;

           if(average>=90 && average<100)

               this->grade = 'A';

           else if(average>=80)

               this->grade = 'B';

           else if(average>=70)

               this->grade = 'C';

           else if(average>=60)

               this->grade= 'D';

           else this->grade = 'F';

       }

};  

// This function reads the file ,  and creates a vector of Students data

vector<Student> read_file(string fileName){

   

   // Opening the file

   fstream fin;

   fin.open(fileName);

   // Temp variables

   vector<Student> list;

   vector<string> row ;

   string line, word, temp;

   // Read the data into vector

   while(getline(fin,line)){

       row.clear();

       stringstream s(line);

       

       while(getline(s,word,'\t')){

           

           row.push_back(word);

       }

       Student st;

       st.fname = row[0];

       st.lname = row[1];

       st.marks[0] = stoi(row[2]);

       st.marks[1] = stoi(row[3]);

       st.marks[2] = stoi(row[4]);

       st.calculate_grade();

       list.push_back(st);

   }

   fin.close();

   return list;

}    

// This function takes filname to be output as input, and list of student

void writeFile(string filename, vector<Student> list){

   // Opening the new file

   ofstream fin(filename);

   for(int i=0;i<list.size();i++){

       string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"

       +to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";

       fin<<line;

       

   }

   

   // Find the stats required

   double average1 =0,average2 =0 ,average3 = 0;  

   for(int i=0;i<list.size();i++){

       average1+=list[i].marks[0];

       average2+=list[i].marks[1];

       average3+=list[i].marks[2];

   }

   average1/=list.size();

   average2/=list.size();

   average3/=list.size();

   // Writting the stats

   fin<<"\n"<<"Average: "<<"mid_term1 "<<fixed<<setprecision(2)<<average1<<", mid_term2 "<<setprecision(2)<<average2<<",final "<<setprecision(2)<<average3<<"\n";

   

   // Closing the file

   fin.close();

}

int main(){

   // Taking the input

   cout<<"Enter the filename: ";

   string filename;

   cin>>filename;

   vector<Student> list;

   // Reading and Writting to the file

   list = read_file(filename);

   writeFile("report.txt",list);

   

}

See more about C code at brainly.com/question/19705654

#SPJ1

Describe a situation in which you would want to use integer division in a program. Then, write the line of code that would use integer division.

Answers

The description of a situation in which you would want to use integer division in a program is that they would give you the exact answer you want when performing addition, division, etc, and is more reliable than using floating point math.

What is Integer Division?

This refers to the term that is used to describe the operator divides two numbers and returns a result and its symbol is %

The Program that uses an integer division is given below:

int a = 25;

int b = 5;

int c = a / b ;

System. out. println(c);

Read more about integer division here:

https://brainly.com/question/28487752

#SPJ1

How is the aperture speed of three hundred and twentieth of a second displayed on a camera?

Answers

The aperture speed of three hundred and twentieth of a second displayed on a camera is known to be one that the shutter seen in your camera will be open for about three hundred and twentieth of a second of a second.

How is the shutter speed shown?

The diameter of the aperture stop is referred to as the "aperture" in photography (sometimes known as the "f-number") (the stop that determines the brightness in a photo at an image point). Contrarily, shutter speed refers to the overall amount of time the camera's shutter is open.

Therefore, Always express shutter speed in seconds or fractions of seconds. For instance, a single number with a quote mark or the letter "s" at the end, such as 1′′ or 1s, is often used to indicate a shutter speed of one second.

Learn more about  aperture speed from

https://brainly.com/question/13972212

#SPJ1

The aperture speed of three hundred and twentieth of a second is displayed on a camera as  [tex]f[/tex]/ 320.

What is aperture speed?

Aperture speed means how wide the aperture slot is. It's the diameter of the aperture slot. It also intensifies the amount of light that reaches the sensor of the camera.

There are two things displayed on the camera, the aperture speed is written as  [tex]f[/tex] and the number. The other is the shutter speed, which is written as; if the speed is supposed three hundred and twentieth of a second. Then it will be written as 1 / 320.

Therefore, on a camera, the aperture speed is shown as  [tex]f[/tex] / 320, or three hundred and twentieth of a second.

To learn more about aperture speed, refer to the below link:

https://brainly.com/question/28959586

#SPJ1

write a method called percenteven that accepts an array of integers as a parameter and returns the percentage of even numbers in the array as a real number. for example, if the array stores the elements {6, 2, 9, 11, 3}, then your method should return 40.0. if the array contains no even elements or no elements at all, return 0.0.

Answers

This program require to write a function that calculate the average of the even numbers in the array. The function perecentEven print the average of the even number while taking array of integer as an argument or parameter.

The above functionality is implemented in Python language as given in the below code and output of the code is also attached.

from array import * # import array related functionality.

def percentEven(a):#here 'i' defines the datatype of the array as integer

   evenNumber=[] # array to capture even number

   oddNumber=[] #array to capture odd number

   average=0 # average variable

   total=0 # total of positive number in array

   count=0 # count the positive number in array

   if len(a)>0: # check if the provided array has an element(s)

       for i in a: # iterate through the array

           if (i%2==0): # check if the number in the array is positive

               evenNumber.append(i)# store that number in array of #evenNumber

               count=count+1 #count the positive number in array

           else: #else the number in array is odd

               oddNumber.append(i) # add that number into array of #oddNumber

       if len(evenNumber)>0: # now check if evenNumber array has some #value

           for i in evenNumber: # iterate through every even number

               total= total+i # add the even number

           average=total/count # calculate average

           print(average) # print average

       else:

           print(0.0) # if array is empaty or have odd values then print 0.0

   

arr = array('i',[6, 2, 9, 11, 3]) # here 'i' defines the datatype of integer, and

#declare an array of integers

percentEven(arr) # pass the array to function.

You can learn more about function in Python at

https://brainly.com/question/25755578

#SPJ4

which of the following is not true? (a) an interface can extend another interface. (b) a class which is implementing an interface must implement all the methods of the interface. (c) an interface can implement another interface. (d) an interface is a solution for multiple inheritance in java. (e) none of the above.

Answers

An interface can extend another interface but not implement it. Java does not enable multiple inheritances for classes, so multiple inheritances can be accomplished by utilizing an interface.

What is meant by the interface?

An interface in computing is a shared boundary that allows two or more independent computer system components to communicate. Software, computer hardware, peripherals, people, and combinations of these can all be exchanged.

To accomplish complete abstraction, it is employed. Java does not enable multiple inheritances for classes, so multiple inheritances can be accomplished by utilizing an interface. In order to establish loose coupling, it is also used.

Java utilizes interfaces to achieve abstraction. A Java class can implement an interface by using the implements keyword. In general, an interface can be thought of as a repository for the method signatures that will be used to implement them in the code section. The degrees of abstraction is raised.

An interface can extend another interface but not implement it.

Therefore, the correct answer is an option (d) an interface is a solution for multiple inheritances in java.

To learn more about interface refer to:

https://brainly.com/question/28235695

#SPJ4

if the process is in control but not capable, what would you do? select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a redesign the process so that it can achieve the desired output. b use an alternative process that can achieve the desired output c retain the current process but attempt to eliminate unacceptable output using 100% inspection d see whether specs could be relaxed without adversely affecting customer satisfaction. e all of the above

Answers

All choices are true. So the right answer to this question is e. all of the above.

Things that you can do if the process is in control but not capable, there are:

Redesign the process so that it can achieve the desired output.Use an alternative process that can achieve the desired output.Retain the current process but attempt to eliminate unacceptable output using 100% inspection.See whether specs could be relaxed without adversely affecting customer satisfaction.

You can learn more about The Things that we can do if the process is in control but not capable at https://brainly.com/question/15734362

#SPJ4

write a declaration statement that creates a two-dimensional array referenced by a variable named grades. the array should store int values using 18 rows and 12 columns.

Answers

The array should store int values using 18 rows and 12 columns is int[][] grades = new int[18][12];

What is array?
An array is a type of data structure used in computer science that contains a set of elements (values and variables), each of which is designated by an array index or key. An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple. A linear array, sometimes referred to as a one-dimensional array, is the most basic sort of data structure. The memory addresses 2000, 2004, 2008,..., 2036 (or 0x7D0, 0x7D4, 0x7D8,..., 0x7F4) can be used to store an array with ten 32-bit (4-byte) integer variables with indices 0 through 9, where the element with index I does have the address 2000 + I 4). The first address, foundation address, and base address is the memory location of the first element of an array.

To learn more about array
https://brainly.com/question/28061186
#SPJ4

what are internet safety protocols that you use in your daily personal or professional internet activities? what are the benefits of internet security in the healthcare workplace? what are potential consequences of not following internet safety protocols in your personal, academic, or professional life?

Answers

Share no private information online. Don't reply to unsolicited emails, texts, or messages. Avoid sharing or posting images online. Don't open attachments, click links, or accept gifts from strangers.

What are Internet safety protocols?

You have more opportunities for fraudsters to harm you the more online accounts and gadgets you have. Because of this, it's crucial to comprehend the internet safety guidelines that guard your data and your family's devices against attacks.

One of the most popular ways to introduce viruses or other malicious files to your connection is through online file storage. As a result, the dangers of using the internet securely are significantly reduced.

Share no private information online. Don't reply to unsolicited emails, texts, or messages. Avoid sharing or posting images online. Don't open attachments, click links, or accept gifts from strangers.

Keep Personal Information Professional and Limited.Keep Your Privacy Settings On.Practice Safe Browsing. Make Sure Your Internet Connection is Secure. Be Careful What You Download.Choose Strong Passwords.Make Online Purchases From Secure Sites.Be Careful What You Post.

To learn more about Internet safety protocols refer to:

https://brainly.com/question/12276583

#SPJ4

jerome wants to search for articles about banana pudding but his web search results also show results for chocolate pudding as well as articles about bananas. what should jerome enter into the search window so that he only finds articles with the words banana pudding in them?

Answers

Jerome should enter Banana pudding into the search window so that he only found articles with the words banana pudding in them.

An article means a kind of written work that is often available in everyday life, both academically and non-academically. The regular purpose of an article is to educate, inform, and entertain the reader. Usually, articles are launched through websites or other digital media.

Based on the content of the article, articles can be divided into several types, namely:

1. Light Article, this article usually consists of light information that is packaged by the author in an entertaining style or inserted with humor.Practical Articles, Practical articles tend to be narrative, and the messages written in them are sorted by time or events.Opinion Articles, the aims of opinion articles is to express neutral and critical opinions with written presentations or evidence.Expert Analysis Article, the general goal of the article is to publish a research result that has been done.Description Articles, description articles are usually written to take a picture of something so that it can be easily understood by readers.

You can learn more about Article here brainly.com/question/14172780

#SPJ4

describe in your words how you think computer instruction design correlates with memory access ? the chapter also compares the design of various mainstream chips on the market. in particular, the chapter compares the design of the risc, arm, and cisc instruction sets describe some differences and similarities between the arm and risc instruction set describe some difference and similarities between the risc and cisc instruction sets describe some difference and similarities between arm and mips instruction sets what is the linker in computer software implementation what is the role of the loader in computer software implementation describe some of the addressing modes in the mips instruction set what is the role of the activation record in program execution

Answers

The computers operate with great speed and only run one process at once. The fastest storage of all is the cache memory. Random Access Memory is in second place, and the hard drive is in third.

What is computers?
A computer is a digital electrical device that may be configured to automatically perform series of logical or mathematical operations (computation). Programs are generic sets of actions that can be carried out by modern computers. These apps give computers the ability to carry out a variety of tasks. A computer system is a "complete" system that comes with the peripheral devices, operating system, and hardware required for "full" functioning. This phrase may also apply to a collection of connected computers that work as a unit, such as a computer network a computer cluster.

Computers are used as control systems in a wide variety of industrial and consumer goods.

To learn more about computer
https://brainly.com/question/23275071
#SPJ4

Estelle is the proud owner of one of the first commercial computers that was built with an os already installed. Who produced this classic machine?.

Answers

IBM is a company that produced this classic machine.

IBM is well known for producing and selling computer hardware and software, as well as cloud computing and data analytics. The company has also serve as a major research and development corporation over the years, with significant inventions like the floppy disk, the hard disk drive, and the UPC barcode.

IBM (International Business Machines) ranks among the world's largest information technology companies, serving a wide spectrum of hardware, software and services offerings.

You can learn more about IBM at https://brainly.com/question/17156383

#SPJ4

a word wide web server is usually set up to receive relatively small messages from its clients but to transmit potentially very large messages to them. explain which type of arq protocol (selective reject, go-back-n) would provide less of a burden to a particularly popular www server? g

Answers

The data link layer protocol would provide less of a burden to a particularly popular world wide web server.

Similar to the ftp daemon, a World Wide Web server is a program that responds to an incoming tcp connection and offers a service to the caller. To serve various types of data, there are numerous variations of World Wide Web server software.

Automatic Repeat Request, also called Automatic Repeat Query, is the acronym for this. An error-control technique called ARQ is applied in two-way communication systems. To achieve reliable data transmission through an unreliable source or service, it is a collection of error-control protocols. These protocols are located in the OSI (Open System Interconnection) model's Transport Layer and Data Link Layer, respectively. When packets are determined to be corrupted or lost during the transmission process, these protocols are in charge of automatically retransmitting them.

To know more about world wide web click on the link:

https://brainly.com/question/13211964

#SPJ4

you purchase a dns domain named contoso. you create an azure public dns zone named contoso that contains a host record for server1. you need to ensure that internet users can resolve the name server1.contoso. which type of dns record should you add to the domain registrar?

Answers

The type of DNS record that you should add to the domain registrar is an NS record.

Contoso Ltd. (also known as Contoso and Contoso University) can be described as a fictional company used by Microsoft as an example company and domain. NS record can be described as something that contains the names of the Azure DNS name servers assigned to the zone. You can add more name servers to this NS record set, to support cohosting domains with more than one DNS provider. You can also modify the TTL and metadata for this record set.

You can learn more about Contoso at https://brainly.com/question/2704969

#SPJ4

to address this vulnerability, you recommend that the client hire additional network administrators who have cybersecurity credentials and experience. what type of vulnerability does this address?

Answers

This addresses the vulnerability of not having enough staff with the necessary skills to protect the network.

What is vulnerability?

Vulnerability is defined as "the condition or state of being vulnerable to being attacked or damaged, either physically or emotionally."A window of vulnerability (WOV) is a period of time during which protective mechanisms are reduced, compromised, or absent. As a methodological technique, understanding social and environmental vulnerability entails analysing the risks and assets of disadvantaged populations, such as the elderly. The concept of vulnerability raises high expectations for social policy and gerontological planning.

This vulnerability addresses the issue of weak network security. By hiring additional network administrators who have cybersecurity credentials and experience, the client will be better able to protect their network from attacks.

To learn more about vulnerability

https://brainly.com/question/25633298

#SPJ4

your users are young children

Answers

The program that solves the problem given is indicated below. This is solved using Python.

What is the program that solves the above-mentioned problem?

The code is given as follows:

numA = [4, 1, 6, 10, 2, 3, 7, 9, 11, 12, 5, 8]

numB = [2, 12, 10, 11, 1, 3, 7, 9, 4, 8, 5, 6]

while True:

  i = 0

  userChoice = input("Adding or Multiplying? (a/m) ")

  if userChoice == "a":

      while i < len(numA):

          answer = int(input("What is {} + {} ".format(numA[i],numB[i])))

          if answer == numA[i] + numB[i]:

              print("Correct!")

          else:

              print("That's incorrect. The right answer is {}".format(numA[i] + numB[i]))

          i += 1

  elif userChoice == "m":

      while i < len(numA):

          answer = int(input("What is {} * {} ".format(numA[i], numB[i])))

          if answer == numA[i] * numB[i]:

              print("Correct!")

          else:

              print("that's incorrect. The right answer is {}".format(numA[i] * numB[i]))

          i += 1

Learn more about Python:
https://brainly.com/question/25774782
#SPJ1

Full Question:

Your users are young children learning their arithmetic facts. The program will give them a choice of practicing adding or multiplying. You will use two lists of numbers. numA = [4, 1, 6, 10, 2, 3, 7, 9, 11, 12, 5, 8]. numB = [2, 12, 10, 11, 1, 3, 7, 9, 4, 8, 5, 6].

If the user chooses adding, you will ask them to add the first number from each list. Tell them if they are right or wrong. If they are wrong, tell them the correct answer. Then ask them to add the second number in each list and so on. If the user chooses multiplying, then do similar steps but with multiplying.

Whichever operation the user chooses, they will answer 12 questions. Write your program and test it on a sibling, friend, or fellow student.

suppose that a tcp segment has a lifetime of 2 minutes in the network. calculate the maximum transmission speed (bits/second) at which a host can send out 1460-byte tcp segments so that there will not be two tcp segments from the same sender with the same sequence number in the network, i.e., without having the tcp sequence numbers wrap around?

Answers

The maximum transmission speed at which a host can send out 1460-bytes tcp segments from the same sender with the same sequence number in the network is 10 bits per second.

If the bandwidth is 10 Gbps, the link will be (10/8) 109 bps = 1.25 109 bps.

120 seconds is the maximum segment lifetime.

The amount of data transferred in 120 seconds is equal to 150 1.25 109 bps / 120. 1.5 x 1010 bytes Equals 109 bytes

As a result, the TCP will generate a 1.5 1010 sequence number in the 120 second period.

One needed to transfer data at the highest speed in order to create a 1.5 * 1010 unique sequence.

= ceiling(log(1.5 1010)

equals ceil(log(1.5) + log(1010))

= ceil(0.1761 + 10)

= ceil(10.1761) (10.1761)

= 10 bits in the field for the sequence number.

Therefore, a sustained maximum data transfer rate of 10 bits per second is needed between two hosts.

To know more about bytes click on the link:

https://brainly.com/question/2280218

#SPJ4

Other Questions
Simplify each expression.26. -2 11ly27. -5s(-4t)28. 3(-p)(-2q)29. -j(11k)30. 7x(-2y) graduating from college and moving to a new city can create stress as well as provide an opportunity for growth. this type of stress is called group of answer choices strain distress eustress adaptive response find the value of x in each case Which element does mythology have in common with fiction?settingcharacters message or theme all of these Okay so Im doing this assignment and got stuck ont his question can someone help me out please For questions 5&6 find F -1(x), the inverse of F(x) what is the distance between the two points in simplest radical form(2,7) and (5,0) What are the solutions to the equation (x-3)(x+5)=-15 How come my answer is wrong? It says its equal to the correct answer but its not the right answer. Marques works in a department store selling clothing. He makes a guaranteed salary of $200 per week, but is paid a commision on top of his base salary equal to 10% of his total sales for the week. How much would Marques make in a week in which he made $750 in sales? How much would Marques make in a week if he made x dollars in sales? Graph the following equation:(y + 4) = 2(x - 2)Step 1 of 3: Find a point on the line and the slope of the line. a 2 900-kg truck moving at 11.0 m/s strikes a car waiting at a traffic light, hooking bumpers. the two continue to move together at 7.00 m/s. what was the mass of the struck car? these two dramatic forms of theatre, or combination of the two, have dominated western theatre practice since fifth century greece. multiple select question. episodic feminist musical theatre climactic ritual A box contains six red pens, four blue pens, eight green pens, and some black pens. Leslie picks a pen and returns it to the box each time. The outcomes are recorded in the table.a. what is the experimental probability of drawing a green pen?b. if the theoretical probability of drawing a black pen is 1/10, how many black pens are in the box The fraction models below represent two fractions of the same whole: How much of the816 suppose you are applying for a mortgage loan. the loan officer tells you that if you get the loan, the bank will keep the house title until you pay back the loan. which problem of asymmetric information is the bank trying to solve? Question60 is 40% of what number? the traditional income statement uses which of the following cost categories? multiple choice 1 variable expenses and fixed expenses. cost of goods sold and fixed expenses. operating expenses and selling and administrative expenses. cost of goods sold and selling and administrative expenses. A tornado siren begins blaring from the center of town 9.5 seconds after a tornado was spotted. The siren is located 490 meters north of a school. If the sirens sound wave travels at a constant velocity of 350 meters per second south, how long will it take the sound wave to travel from the siren to the school? estimate 2,829 divided by 33=?