Fast Ethernet is 10 times faster than Ethernet.
What is Ethernet?Metcalfe modified the name to "Ethernet" in 1973. He did this to demonstrate that any computer, not just Alto's, would be supported by the technology he had developed.
He chose the term "Ether" to refer to the physical medium that carries bits to stations, which is a crucial aspect of the system. Fast Ethernet transmission, which is at least 10 times faster than standard Ethernet, helps maintain compatible connections to high-speed servers.
It reduces bandwidth bottlenecks for network systems running multiple IP video cameras and the Internet of Things and supports seamlessly complex networks that simultaneously run a number of bandwidth-hungry software programs.
Therefore, fast Ethernet is 10 times faster than Ethernet.
To learn more about Ethernet, refer to the link:
https://brainly.com/question/13441312
#SPJ2
a computer never gets tired or bored while working for a long time ..
Answer :Computers never get tired or bored because of doing the same task continuously. They work in the same manner all the time. A computer can store large amount of information in its memory.
Explanation: it is quality which makes the user to be dependent on computer. As we all know, computer systems do repetitive tasks without any boredom, tiredness, or fatigue.
what does receive input mean in coding? I will give brainliest if you want just ask :3 no random answers please. AND HURRY.
Answer:
It is a way for the codebase to interpret data based off of what a user types or enters in a specified area.
Answer:
to provide or give something to the computer
in other words, when a computer or device is receiving a command or signal from outer sources, the event is referred to as input to the device.
Explanation:
What is the name of the menu in the bottom left corner of the windows environment?.
Answer:
Microsoft Windows Start menu
what’s The abbreviation of afk and what does That Mean in gaming playing in Multiplayer online battle arena games
Answer:
afk means away from keyboard so if someone says they are going afk it means they have to go for like a couple of minutes or so
how can a security framework k assist in the deisng and implementation of a secuiry infrastructure what isn information security governance
Answer:
on January 1st the new year begins rewrite and punctuate correctly
Write a program to construct the first 15 terms of a geometric sequence with initial term 4 and a common ratio 1/2. The output should be a python list and the number should be rounded to 5 digits after the decimal places.
The program to construct the first 15 terms of a geometric sequence with initial term 4 and a common ratio 1/2 is as follows:
def geometric(a, r):
list_of_terms = [a]
length = 0
n = 2
while length < 14:
x = round(a*pow(r, n-1), 5)
length += 1
n += 1
list_of_terms.append(x)
return list_of_terms
print(geometric(4, 0.5))
Code explanationThe code is written in python.
we defined a function named geometric. The function accept two parameters as a(first term) and r(common ratio).we declared a variable "list_of_terms" and store the first term in it. Then we initialise length to zeroThe number of term start from 2.While the length variable is less than 14, we use the geometric formula to find the terms by increasing the value of n in the loop.We append the terms to list_of_terms.Then return the list_of_terms.Finally, we call the function with the parameters.learn more on python here: https://brainly.com/question/26949234
Create a file using any word processing program or text editor. Write an application that displays the fie's name, containing folder, size, and time of last modification. Save the file as FileStatistics.java.
Answer:
yes
Explanation:
yeah
Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but not Bob) finds out whether her x equals any of Bob's five items; Alice should not find out anything other than the answer ("Yes" or "No") to the above question, and Bob should not know that answer or any secret from Alice. Do not use a hash-based solution because even though the probability of a colission is small, Alice requires that no such colission can occur (but using encryption is fine, because in that case two distinct items that are encrypted with the same key will result in two different ciphertexts).
NOTE: THE SOLUTION FOR THIS SHOULD BE MATHEMATICALLY EXACT.
The protocol shows that the items of Alice = {x} and the items of Bob = {y1, y2, y3, y4, y5}
How to depict the protocolThe ways to design the protocol will be:
Alice will get Bob's public key.Alice will send a communication to Bob encrypted through Bob's community key.Bob's motivation has a clandestine key.Through the top-secret key, Bob will try to work out the communication.Bob will give a response called yes or no.Bob doesn't know what substances are with Alice.If Alice Alice gets any of the responses as yes then Alice's item is equivalent to any of Bob's five items.If Alice's items are not equal to Bob's items then Alice will get a response as no.It should be noted that protocol is important for relaying datagrams across the network boundaries.
Learn more about protocol on:
https://brainly.com/question/17062016
Explain the schema to be followed when solving a dp problem
Answer:
Every Dynamic Programming problem has a schema to be followed: Show that the problem can be broken down into optimal sub-problems. Recursively define the value of the solution by expressing it in terms of optimal solutions for smaller sub-problems. Compute the value of the optimal solution in bottom-up fashion.
Complete a program that reads a vector index as input and outputs the element of a vector of 10 names at the index specified by the input. Use a try block to output the name and a catch block to catch any out_of_range exceptions. When an out_of_range exception is caught, output the message from the exception object and the first element in the vector if the index is negative or the last element if the index is greater than the size of the vector.
The program segment is an illustration of the try and catch program exceptions
The complete programThe program segment written in C++, where comments are used to explain each action is as follows:
//This opens the try block
try{
//This prints the vector element
cout<<names[index];
}
//This opens the catch block
catch (const std::out_of_range& oor) {
//This prints the exception
cerr << "Out of Range error: " << oor.what() << '\n';
}
Read more about program segments at:
https://brainly.com/question/11623795
Compare and contrast frame header to internet protocol header.
A Frame Header is known to have the source and the destination addresses of all the frame and the control bytes while the IP header is known to be the header information at the start of an Internet Protocol packet.
The IP packets is made up of a header that is used for addressing and routing.What is IP header?This type of header is known to have the source address and the destination address. IP is known to be one that uses an Internet datagram that has all the information that are the same to the physical frame.
A frame is regarded as the unit of transmission that is found on a link layer protocol. It is made up of a link layer header that is known to be followed by a packet.
Learn more about IP header from
https://brainly.com/question/4297610
Is there a parrapa level for stage 1 in umjammer lammy?
Answer:yes there WAS a parrapa level but it was scrapped from the game I think you can find it in beta versions of the game but
ASAP!
Choose the correct term to complete the sentence.
A _____ search can only be done on an ordered sequence or collection.
Options
1. linear
2. binary
Answer:it is binary
Explanation:just did the test
From analysis, Arthur believes the system's I/O throughput will improve by changing the I/O scheduler. On his system is a real-time application, which uses a database located on a solid-state drive. Which I/O scheduler should Arthur choose?
Since the real-time application uses a database that is located on a solid-state drive, Arthur should use a deadline I/O scheduler.
What is an I/O scheduler?An I/O scheduler is an abbreviation for input-output scheduler and it can be defined as a technique which is used by the operating system (OS) of a computer to decide the particular order that input-output (I/O) operations are submitted to storage volumes such as solid-state drives.
In this scenario, Arthur should use a deadline I/O scheduler because his real-time application uses a database that is located on a solid-state drive.
Read more on data here: brainly.com/question/13179611
What is the significance of backing up data on a computer?
Backing up data allows you to browse the Internet more quickly.
Your computer will never become infected with a virus.
A copy of your work can be saved in case the computer crashes.
The web cache will be cleared regularly.
Answer:
the answer is c
Explanation:
i got it right
Answer:
c
Explanation:
edg2020
How can we tell the computer both what to put on
the web page, and how to organize it?
There is only 1 answer. Code. You have to code the web page if you want to put stuff on it/organize it.
We instruct the computer and tell how to organize the web-page through Coding.
Coding in essence, means the language that instruct computer and these are used to develop application, websites, software and so on.
In order to learn how to code, you must follow certain procedure:
Learning the Basics of HTML and Understanding Document Structure Learn about the CSS Selectors Knowing how to put together a CSS Stylesheet etc.In conclusion, instruction given to computer to organize a Web-page and communication with the system are made possible through coding.
Learn more here
brainly.com/question/19535447
I need help please this computer class.
Answer:
C
Explanation:
The Correct way of spelling Internet
Do you think that Aunt Susan needs more than the normal RDA for protein? Why or why not?
Answer:
Amanda is a 21-year old college student who is minoring in nutrition. While home on break from college, she eats out one day with her Aunt Susan who is 55 years old.Amanda learns that her aunt has been doing basic strength training with a personal trainer twice a week for the past four months. Aunt Susan tells her that she started doing the strength training not because she wants to be a body builder, but because she wants to get in better shape, have stronger muscles and bones, and improve her balance and coordination.At this point, Aunt Susan definitely feels she is in better shape, and also has been paying more attention to her diet. She tells Amanda that her trainer wants her to eat more protein.
Explanation:
How can a Word user insert a page break into a document to isolate a table on a new page? Use the drop-down
menus to complete the statements.
1. Place the v at the text that needs editing.
2. Open the
dialog box
3. Select the
v tab.
4. Choose
5. Click OK
How can a Word user insert a page break into a document to isolate a table on a new page? Use the drop-down menus to complete the statements.
1. Place the
✔ cursor
at the text that needs editing.
2. Open the
✔ Paragraph
dialog box.
3. Select the
✔ Line and Page Breaks
tab.
4. Choose
✔ Page break before
.
5. Click Ok.
A Word user can insert a page break into a Word document to enable the insertion of a table on the new page by following these steps.
Place the cursor at the text that needs to be edited. Open the paragraph dialog box Select the line and page breaks tab. Choose page break Click OK.
Thus, following these mentioned steps will enable the Word user to correctly insert a table on the required Word page.
Learn more about inserting page breaks on Word documents at https://brainly.com/question/1267739
When creating and modifying templates, which keys are used to add placeholders?
Alt+F9
Shift+F8
Delete+F8
Ctrl+F9
Answer:
Ctrl + F9
Explanation:
D is the answer to you're question!
Answer:
d
Explanation:
right on edg <3
CAR_SALE (Car_no, Date_sold, Agent_no, Commission_pct, Discount_amt)
Assume that a car may be sold by multiple agents, and hence {Car_no, Agent_no} is the primary key. Therefore, a single car sale may occupy multiple tuples.
Additional dependencies are:
Date_sold → Discount_amt and
Agent_no → Commission_pct
Based on the given primary key, is this relation in 1NF, 2NF, or 3NF? Why or
why not? How would you successively normalize it completely? Provide reasoning for each normalization.
1NF
In 1NF the relation should follow atomicity that means no repeating groups
In the relation there is no repeating groups
So
the relation is in 1NF
2NF
In 2NF, the relation should be in 1NF and each non prime
attribute must depend on primary key and No Partial dependency
Commission% is functional dependent on Salesperson# which is only part of the primary key.
So
relation is not in 2NF
3NF
In 3NF, the relation should be in 2NF and any NON prime attribute should not describe any non prime attribute.
Already we know relation is not in 2NF
there is a non prime attribute date_sold that describe another non prime attribute Discount_amt,
the relation is not in 3NF
Finally we come to. Know
the relation satisfies only 1NF
NORMALIZATION
The relation is not in 2NF
Decompose the relation CAR_SALE
CAR_SALES (Car#, Date_sold, Salesperson#, Discount_amt)
SALESCOMM (Salesperson#, Commission%)
CAR_SALES and SALESCOMM are in 2NF
In 3NF, the relation should be in 2NF and any NON prime
attribute should not describe any other non prime attribute
SALESCOMM relation is in 3NF
but CAR_SALES is not in 3NF the reason is that there is a
non prime attribute Date_sold that describes another non prime attribute Discount_amt.
So, decomposing the relation
CARSALEDATE (car#, salesperson#, Date_sold)
DATEDISS(Date_sold, discount_amt)
The relations CARSALEDATE
SALESCOMM
DATEDIS are in 3NF
Explain the four (4) important attributes that all professional software should have.
Answer:
Acceptability, Dependability and Security, Efficiency, and Maintainability.
Explanation:
Acceptability, Dependability and Security, Efficiency, and Maintainability.
Answer:
1. Maintainability
2. Dependability and security
3. Efficiency
4. Acceptability/Usability
Explanation:
Maintainability, dependability and security, efficiency (performance), and acceotability/usability are the four most critical characteristics. Reusability (can it be reused in other applications), distributability (can it be distributed over a network of processors), portability (can it operate on multiple platforms, such as laptop and mobile platforms), and inter-operability (can it communicate with other systems) are all important attributes to consider (can it work with a wide range of other software systems).
ps. i would really appreciate it if you mark me as brainliest:> (i'm trying to reach virtouso) but it's fine if u don't.
hope this helps
Dante has a worksheet shared with multiple users. He would like the ability to approve or reject changes that are made. Which feature should he use? Protection Change Tracking Comments Data Consolidation
Answer:
Data Consolidation.
Explanation:
Answer:
Change tracking.
Explanation:
It's the only one of the options that tracks anything.
what is the use of form in HTML
Answer:
to make the internet faster
Explanation:
becuase it will have a faster act on the computer so the computer could process the information for it later to be used
What query class will you choose
for this query "women are evil"?
Answer:
A) Gibberish or Vague Profane
Explanation:
Hope this helps
The query class will you choose for this query "women are evil" is Gibberish or Vague Profane. The correct option is A).
What is a query?A query might ask your database for data results, a specific action to be taken with the data, or both. A query can add, alter, or remove data from a database, conduct computations, integrate data from other databases, and answer simple questions.
A search for information or a question is what a query is. The phrases inquiry, question, quest, request, and query all derive from the Latin verb quaere, which means "to ask." As follows: SQL queries include select, action, parameter, crosstab, and parameter queries.
Swearing or profanity refers to words that are considered impolite, inappropriate, or objectionable. The adverb is vulgar.
Therefore, the correct option is A) Gibberish or Vague Profane.
To learn more about the query, refer to the link:
https://brainly.com/question/29575174
#SPJ2
The question is incomplete. Your most probably complete question is given below:
A) Gibberish or Vague
Profane
C) Foreign Language
D) Valid
E) None
Which of the following is NOT true about an entrepreneur?
Answer:
A. An entrepreneur gets to act as his own boss.
Please give crown award and thanks.
Does Rational database software lets you link multiple tables? Yes or no
Answer:
yes
Explanation:
i did some research but don't take my word for it and let me know if it wrong
Write a program in Java programming language to display or calculate “Hello, Daddy and Mum”
Answer:
class Simple{
public static void main(String args[]){
System.out.println("Hello Daddy and Mum);
}
}
Explanation:
First, we create a class, then a method and then give the Integrated Data Environment (IDE) the command to give out an output that says Hello, Daddy and Mum”
Answer:
public class Program
{
public static void main(String[] args) {
System.out.println("Hello, Daddy and Mum");
}
}
Explanation:
Java is a high level, modern programming language designed in the early 1990s by Sun Microsystems.
The above one is simple program that displays “Hello, Daddy and Mum” on the screen.
In Java, every application begins with a class definition. Here we have named class Program.
The main() method is the entry of the program. A valid Java program must have main() method.
The code prints the text “Hello, Daddy and Mum” using System.out.println() function.
Suppose that the WEQ scheduling policy is applied to a buffer that supports three classes, and suppose the weights are 0.5, 0.25, and 0.25 for the three classes. Suppose that each class has a large number of packets in the buffer. In what sequence might the three classes be served in order to achieve the WFQ weights?
Answer:
The WFQ (Weighted Fair Queuing) scheduling is a circular order a round roubin strategy in ascending order depends on weights.
Assume the three classes weights are 0.5, 0.25, and 0.25 respectively.
If same weight have for two or more classes then give highest order is the first preference class.
The sequence order that the three classes served is :1 2 1 3 1 2 1 3….
Another possible sequence order that the three class are: 1 1 2 1 1 3 1 1 2 1 1…
Explanation:
The part of the screen where you write or place code is called the _____.
Answer:
Screenwriting plz mark me brainliest
Explanation:
Answer:
ground.
Explanation:
im not sure completely. but you above me answered wrong, so this makes most sense.