Answers

Answer 1
every node connects to a central network device. like a hub, switch, or computer.
Answer 2
It’s a local area network in which all nodes are individual connected to a central connection point, like a hub or a switch

Related Questions

Which navigation icon would you click on to add a new Contact?
O People
O Calendar
O Mail
O Tasks

Answers

the answer would be people
A) people. That is your answer! Hope this helps:)

An instruction for the computer. Many commands put together to
make up algorithms and computer programs.

1. Repeat
2. Command
3. Bug

Answers

Answer:

i think its command but not sure

True or False: The major advantage of Arrays over ArrayLists in Java is the fact that while ArrayLists are fixed in size, an Array can increase or decrease in size as needed.

Answers

Answer:

False

Explanation:

It's the other way round actually. Arraylists do not have fixed size and can increase or decrease in size as needed. On the other hand, Arrays are fixed from when they are declared; they have a particular size that number of elements cannot go beyond.

An arraylist in Java is a class that is part of a Java collection framework(java.util) that can have variable sizes and only store objects, not primitive data like strings or integers. An array is a data structure in Java and can store both primitive data and objects, while having a fixed size at declaration.

explain the relevancy of computers in today's global society​

Answers

Computers in today’s society connect different backgrounds of people and cultures with access to extensive information throughout the internet. With this, the relevancy of a computer is extremely common due to the ability and access to information the device holds.

Write a program that lets the user enter a charge account number. Be sure to include comments throughout your code where appropriate. The program should determine if the number is valid by checking for it in the following list of valid account number
5658845, 4520125, 7895122, 8777541, 8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877, 1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002
The list of numbers above should be initialized in a single– dimensional array. A simple linear search should be used tolocate the number entered by the user. If the user enters a numberthat is in the array, the program should display a message sayingthat the number is valid. If the user enters a number that is notin the array, the program should display a message indicating thatthe number is invalid.

Answers

Answer:

#include <iostream>

using namespace std;

int main(){

   int accountnum;

[tex]int\ accountnumbers[18] = \{5658845, 4520125, 7895122, 8777541,[/tex] [tex]8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877,[/tex] [tex]1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002\};[/tex]

   cout<<"Account Number: ";

   cin>>accountnum;

   int arrlength =*(&accountnumbers + 1) - accountnumbers;

   int exist = 0;

   for(int i =0;i<arrlength;i++){

       if(accountnum == accountnumbers[i]){

        cout<<"Valid account number";

        exist = 1;

        break;

       }

   }

   if(exist == 0)

       cout<<"Invalid account number";

     

   return 0;

}

Explanation:

The solution is implemented in C++ (See attachment)

This declares user account number as integer

  int accountnum;

This initializes the list of account numbers to an array

[tex]int\ accountnumbers[18] = \{5658845, 4520125, 7895122, 8777541,[/tex] [tex]8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877,[/tex] [tex]1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002\};[/tex]

This prompt user for account number

   cout<<"Account Number: ";

Here, user inputs the account number

   cin>>accountnum;

This calculates the length of the array

   int arrlength =*(&accountnumbers + 1) - accountnumbers;

This initializes a check variable to 0

   int exist = 0;

This iterates through the array

   for(int i =0;i<arrlength;i++){

This checks for valid account number.

       if(accountnum == accountnumbers[i]){

If true, the following message is printed

        cout<<"Valid account number";

The check variable is updated to 1, which implies that the account number is valid

        exist = 1;

And the loop is terminated

        break;

       }

   }

If the check variable is not updated, then the account number is invalid

   if(exist == 0)

       cout<<"Invalid account number";

     

   return 0;

Write a method named isVowel that returns whether a String is a vowel (a single-letter string containing a, e, i, o, or u, case-insensitively).public static boolean isVowel(String word){ for(int i=0;i

Answers

Answer:

public static boolean isVowel(String word){

  for(int i=0;i

   char vowels= word.toLowerCase(word.charAt(i));

       if (vowels== "a" || vowels == "e" || vowels== "i" || vowels == "o" ||  vowels == "u" ){

          return true;

       } else {

           return false;

       }

  }

}

Explanation:

The Java source code analyzes each character in a string object and returns true if it is a vowel letter.

Discuss, in detail, the usefulness of graphics and images in program development. Explain the importance of the interface of a class of objects. Be sure to emphasize the importance of design, color scheme and clarity.

Answers

Answer:

Explanation:

The main importance of graphics and images in program development is user experience. These graphics, color schemes, clarity, images etc. all come together to create a user interface that individuals will be able to easily navigate and use with extreme ease in order to benefit from what the program is intended to do. An interface of a class of objects allows every button and object in the program to grab and share functionality in order for the entire program to run smoothly.

A _____ is a computer that is deliberately set up to be easily hacked into.

Answers

Answer:

A Honeypot is a computer that is deliberately set up to be easily hacked into.

Explanation:

Basically, a honeypot is a computer that is meant to be easily hacked into, to attract cybercriminals and hackers. Then, the honeypot collects information about hackers. It's sort of like a trap.

Hope I helped!

algorithm that has been coded into something that can be run by a machine.

1. algorithm
2. event
2. program

Answers

the answer is program

_____________________________ focuses on organizing, structuring, and labeling content in an effective and sustainable way.

Question 8 options:

A)Interaction design


B)Interface elements


C)Information architecture


D)Informational components


E)Visual design

Answers

The answer is (E) visual design

You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on when you are evaluating implementation versus algorithm selection

Answers

Answer:

effectiveness and efficiency

Explanation:

The two main things that you should focus on are effectiveness and efficiency. When evaluating implementation you need to make sure that what you are thinking of implementing will actually solve the problem that the organization is having, which is the entire reason for implementing the solution in the first place. It needs to be effective as a solution. When selecting the proper algorithm you need to focus more on efficiency, you already know that it will provide the correct solution but now you need to see which solution would be the fastest and therefore most efficient choice.

fill in the blanks the cut and copy commanda are used in combination with the................ command​

Answers

Answer:

paste command.

Explanation:

The cut and copy commands are used in combination with the paste command. The cut, copy, and paste commands are related commands in human-computer interactions. These commands are interprocess communication in nature, helping to transfer data from one place in the user interface to another place in the user interface.

The cut, copy, and paste commands eliminate monotonous task of creating data which is already present somewhere else in the computer.

Therefore, the correct answer is paste command.

Match the IP Protections Patent, Copyright and Trademark into the following cases:

a. books, poems
b. music, movies, paintings
c. company logo
d. software
e. combinations of materials to make drugs

Answers

Answer:

A) copyright

B) copyright

C)Trade mark

D) copyright

E)Patent

Explanation:

Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.

trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.

Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.

Below is the match of the intellectual property with the examples.

a. books, poems<> Copyright

b. music, movies, paintings<> Copyright

c. company logo<> Trademark

d. software<>Copyright

e. combinations of materials to make drugs<> patent

Which of the following is NOT one of the four benefits of using email?

Answers

Answer:

Can you give choices.

Explanation:

Anyone down to play gta later i play on ps4?

Answers

Answer:

ok

Explanation:

user daboi1001001

explain how you can apply the computer in your field of study​

Answers

Answer:

The computer can be used for international which can help give students useful information

Explanation:

Justify the importance of Computer and internet security system.​

Answers

It helps keep your information protected. This reduces the risk of falling victim of data theft and sabatoge. Network security helps protect your computer from harmful spyware as well

Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks. What does Nicole need to do to make the study group more effective?

Answers

Answer:

B

Explanation:

She did all of the work so the other students wherent able to do anything

The thing that Nicole needs to do to improve the study group is to involve others and give them tasks.

What is a Study Group?

This refers to the collection of persons that forms a group with the aim of learning and revising together.

Hence, we can see that because Nicole does most of the tasks in the study group for the test on plant biology, she would have to involve the other students so they would handle some of the work.

Read more about study groups here:

https://brainly.com/question/23779014

#SPj2

what does it mean if you get the brainlyest ?and why does everyone want it so bad? and how do i give it to someone?

Answers

people mark the people who answered their question probably because they were asked to or their answer was what they were looking for and it helped them. and i don't know why people want it so bad, but personally for me i like getting brainliest because i guess it makes me look cool lol. also it's easy, to give brainliest, when you see a crown that's where you mark brainliest. but sometimes brainly doesn't show the crown i don't understand why, but it happens for some people including me.

Unwanted email sent to large groups of people who did not request the communication is called _____

Desired
Funmail
Returned
Spam

Answers

Spam mail is the answer

Which of the following would you use to search a table in excel?


Decenter

Merge

Find and select

Clear rules

Answers

It’s fine and select

Ask the user for two numbers. Print only the even numbers between them. You should also print the two numbers if they are even.

Answers

I've included the code in the picture below.

What is another word for: a location in memory that contains a value? A. integer B. Boolean C. variable D. float PLEASE HELP URGENT

Answers

Answer:

A

Explanation:

Integer because it contains digits that can undergo calculation within the memory

In order to move the file C:\Data\CustData.txt to C:\BackUp\CustData.txt in a VBScript program, which of the following command would be used( fso is a Scripting.FileSystemObject).

a. fso.MoveFile("C:\Data\CustData.txt","C:\BackUp\CustData.txt")
b. fso.MoveFile("C:\BackUp\CustData.txt", "C:\Data\CustData.txt")
c. fso.FileMove("C:\Data\CustData.txt","C:\BackUp\CustData.txt")
d. fso.FileMove("C:\BackUp\CustData.txt", "C:\Data\CustData.txt")

Answers

Answer:

fso.MoveFile("C:\Data\CustData.txt","C:\BackUp\CustData.txt")

Explanation:

Given

Source = C:\Data\CustData.txt

Destination = C:\BackUp\CustData.txt

Required

Code snippet to move file between directories using VScript

First, we need to write out the syntax.

The syntax to implement this is:

fso.MoveFile(Source Path, Destination Path)

The above line of code instructs the system to move the file from its source directory to its destination.

Note that the source path and destination path must include the full directories and the file extensions

In this case, the correct code is:

fso.MoveFile("C:\Data\CustData.txt","C:\BackUp\CustData.txt")

what is one reason you might want to change your document's margins

1. to change from portrait to landscape view
2. to split it into two columns
3. to decrease the font size
4. to adjust the amount of white space on document ​

Answers

Answer:

1. If there is a big table or picture needed to show in a single paper.

2. For showing differences between two things.

3. To have more words to fit in a paper

Explanation:

QUICK which statement about copyright is not correct

1. you must file the paperwork to own the copyright
2. you do not need permission when you create a hyperlink that links to another website.

Answers

Answer:

2.  you do not need permission when you create a hyperlink that links to another website.

Explanation:

Why is it important to ensure that DNS Servers have been secured before implementing an e-mail system

Answers

Answer:

b. E-mail relies upon DNS MX records to identify hosts that are responsible for e-mail transmission.

Explanation:

It is important to ensure that Domain Name Servers have been secured before implementing an e-mail system because E-mail relies upon DNS MX records to identify hosts that are responsible for e-mail transmission.

In other word, this helps the DNS MX determines the mail server accountable for receiving email messages on behalf of a domain name.

Order the steps to use a logical argument as a rule type.

(Click New Rule.)
(Use a formula to determine)
(Click Conditional Formatting)
(Click the Home tab, then click )
(the Styles group)

Answers

Answer:

Click home tab, click conditional formatting, click new rule, use formula to determine

Answer:

1. Home Tab

2. Conditional Formatting

3. New Rule

4. Formula

Explanation:

Just did it on Edge 2021

Plz click the Thanks button!

<Jayla>

Given the message size of 16Kb, packet size of 2Kb, speed of 4Kbps over 3 links, how much time, will it take the message to travel from the source to the destination considering there are no packet delays?

Answers

Answer:

5 seconds

Explanation:

Given that :

Message size = 16kb

Packet size = 2kb

Speed = 4kbps

Number of links = 3

The time taken is calculated using the formula :

[Number of packets + (Number of links - 1)] * (packet size / speed)

Number of packets = message size / packet size

Number of packets = 16kb / 2 kb = 8

Hence,

[Number of packets + (Number of links - 1)] * (packet size / speed)

(8 + (3 - 1)) * (2 / 4)

(8 + 2) * (1 /2)

10 * 1/2

= 5 seconds

Which sorting algorithm is LEAST efficient when performed on an array in which the values are already in the desired sorted order

Answers

Answer:

Merge sort

Explanation:

The various types of sorting algorithms are

1. Quick sort

2. Bubble sort

3. Selection sort

4. Insertion sort

5. Merge sort

6. Heapsort

The algorithm that performs best for an already sorted list is the insertion sort

While the algorithm that performs worse for an already sorted list is the merge sort since it divides the sorted list into sub list before it operations

Other Questions
Plzzzzz help right answer gets a brainly! How would the Three-Fifths Compromise impact the Constitutional Convention? calculate the shaded area of each of the following the person that maintains the stage combat of the show and runs fights calls before the show starts is called please differentiate metals, metalloids,non-metals,noble gas What do you think"civil rights" are? What were people fighting for during this movement 3(a+b)+15-a+2b=Need answer Based on the differences in the maps, what happened to the Gupta Empire after the death of Chandra Gupta I?Its territory grew dramatically.Its territory decreased drastically.Its territory spread only to the north.Its territory did not expand across the region. can someone please help me will mark you brainliest !! Yancy got a hair cut for 16 he left a 15 tp for the barber what is the total amount of Money yancy said solve for X (3X+1) (10) (22) (7x-1) After cytokinesis, how many cells have been formed from the parent cell? what are the powers of the federal government under the constitution(multiple choice) help me again and ty. Help me please!!!!!!!!!!!!! Click the photo to solve for x I don't understand this problem plis help Calculus BCA screenshot of the problem is attached. Which document signed long before the Age of Enlightenment represents the first time that citizens used a "contract" to place limits on the power of a king? Select one: a. Magna Carta b. the English Bill of Rights c. The Rights of Man and Citizens d. Declaration of Independence The sum of x and 1 is 9.