Given the following values of arr and the mystery method, what will the values of arr be after you execute: mystery()? private int[] arr - (-17, -14, 3, 9, 21, 34); public void mystery() for (int i = 0; i < arr.length / 2; i += 2) arr[i] = arr[i]. 2;
A. {-34, -28, 6, 18, 42, 68}
B. {-17, -14, 3, 18, 21, 34}
C. {-34, -28, 6, 9, 21, 34)
D. {-34, -14, 6, 9, 21, 34}
E. {-34, -14, 6, 9, 42, 34}

Answers

Answer 1

After you execute value , will have the following values: -34, -14, 6, 9, 21, 34.

Which method should be used to build and assign a 2D array?

To create an array, enter new int[numRows][numCols] followed by the type, new, a space, then the number of rows and columns in square brackets. A 2D array has the same amount of elements as its rows times its columns.

When using every element of an array that is part of an application?

It is typical to utilise loops that vary in length when an application comprises an array and you wish to use each element of the array in some job from 0 to one less than the array's size, the loop control variable.

To know more about execute value visit:-

https://brainly.com/question/22600030

#SPJ1


Related Questions

Proportional spacing replaced what other kind of spacing?


parallel spacing


monospacing


one-to-one spacing


fixed spacing

Answers

Answer:

Explanation:

Proportional spacing replaced fixed spacing.

Please Help 100 points with all 5 questions Question 1 (1 point)
Jared spends a lot of time on the phone. Which is MOST likely to cause him neck pain?

Question 1 options:

holding the phone with his left hand


using a speakerphone


using a headset


resting the phone on his shoulder

Question 2 (1 point)
Zoe's workstation is being evaluated by an ergonomics specialist. How far away would they recommend she position her monitor?

Question 2 options:

12 inches from her eyes


36 inches from her eyes


20 inches from her eyes


30 inches from her eyes

Question 3 (1 point)
What is the MOST likely reason for Karla to set an alarm on her work computer for 50 minutes past the hour every hour?

Question 3 options:

It reminds her to stand up for a few minutes each hour.


It signals that it's meal time.


It wakes her up in case she falls asleep.


It reminds her to readjust the position of her monitor.

Question 4 (1 point)
Alexandra has signed up for a touch typing class. She'll learn proper finger placement on the keyboard without what?

Question 4 options:

practicing


looking at the keys


looking at a screen or monitor


touching the keys

Question 5 (1 point)
When you begin typing, your fingers rest on the A, S, D, F, J, K, L, and ; keys. What is this called?

Question 5 options:

the base row


the starting line


the main row


the home row

Answers

Question 1

resting the phone on his shoulder

Question 2

20 inches from her eyes

Question 3

It reminds her to stand up for a few minutes each hour.

Question 4

looking at the keys

{this one I'm not really sure but I think}

Question 5

the home row

Jared will suffer neck pain majorly because of resting the phone on his shoulder as it is a bad posture. Thus, the correct options are 1. D, 2. C, 3. A, 4. B, and 5. D.

What is bad posture?

Bad posture is defined as the position of the body while doing any activity that results in back pain, neck pain, etc. Jared will have a neck pan as he is resting his phone on his shoulder resulting in strain to his neck muscles. Thus, 1. D is correct.

An ergonomist evaluates and makes jobs easier for people by observing and helping the people to adjust their body movement to the environmental surroundings of the work. They would recommend Zoe position her monitor 20 inches from her eyes, which is at her arm's distance. Thus, 2. C is correct.

Karla should set an alarm for 50 minutes past every hour as a part of the Pomodoro technique that helps her to boost her focus and increases her task efficiency. Thus, 3. A is correct.

One can learn to type on the keyboard without looking at the keys as it helps the learner to quickly adapt to writing speed. The A, S, D, F, J, K, L, and ; keys are the home rows that are present in the middle of the keyboard. Thus, 4. B, and 5. D.

Learn more about bad posture, here: https://brainly.com/question/1535916

#SPJ2

What happens when a circulatory system and computing system are connected by abstraction?

Answers

When a circulatory system and computing system are connected by abstraction, it allows for the exchange of information and data between the two systems. This enables the circulatory system to control the computing system and receive feedback from it, allowing for the development of more complex systems. By abstracting the two systems, it allows for the development of powerful medical applications that can monitor and adjust the circulatory system in real time. For example, this could be used to adjust a patient's blood pressure or monitor their heart rate in order to prevent dangerous conditions from developing.

What is the purpose of simulation mode?

Answers

Answer:

Simulation mode has multiple purposes, a really convenient one being that you can investigate the amount of work you could have saved by using ASReview LAB compared to your manual screening process. After running multiple simulations you obtain average statistics about your screening process.

Explanation:

Simulation mode has multiple purposes, a really convenient one being that you can investigate the amount of work you could have saved by using ASReview LAB compared to your manual screening process. After running multiple simulations you obtain average statistics about your screening process.

18. if you delete a file from _____ , it is stored in the recycle bin where you can recover it until you empty the recycle bin.

Answers

If you delete a file from your computer, it is automatically stored in your Recycle Bin, where you can then recover it until you choose to empty the Recycle Bin.

A file that you delete from your computer is not entirely gone from your system. The Recycle Bin is where the computer keeps the file instead. Deleted files are temporarily stored in the Recycle Bin so you can still recover them if you change your mind. When files are kept in the Recycle Bin, you can retrieve them by choosing the item you wish to recover and then clicking the Recycle Bin icon. By doing this, the file's original location will be restored. The files kept in the Recycle Bin, however, are permanently erased and cannot be restored once the bin is empty. Hence, before emptying the Recycle Bin, make sure you really want to remove the file.

Learn more about computers here:

brainly.com/question/30206316

#SPJ4

C++ - Did I write this code correctly? I am unable to output the conversion I created, so I am not sure if I am missing something. Here are the instructions:
Prompt
In this assignment, you are presented with a text document that includes six cities and their average yearly temperature in Fahrenheit. Your goal is to read that data, convert it to Celsius using the provided formula, and then write that new data to its own file.
To begin your work, open Visual Studio and create a new C++ project. Save the provided FahrenheitTemperature.txt document in a location where you will easily be able to access it while you work in Visual Studio. For this assignment, you will be submitting only your C++ (.cpp) file. You do not need to submit the final converted data; the C++ code you create just needs to be able to generate that file.
Specifically, you must address the following rubric criteria:
Develop code to read data from a text file. Your work should be completed using C++. Read the provided document, FahrenheitTemperature.txt, which includes data on the average yearly temperature for six different cities in degrees Fahrenheit. Note that a space separates each city from its temperature. Assume the city’s name does not include any spaces or special characters (the name should consist of only a single word). Also assume the provided temperature is presented as an integer. Consider the following steps as you work:
Open the provided file so it is ready to be read. Remember the file is named FahrenheitTemperature.txt. Watch out for the class you use, and make sure it is for reading a file and not writing to a file.
Read data from the provided file. Remember, to read this file you will need to declare a variable. Begin by reading the first value and putting it in the first variable. Then read the next value and put it in the second variable.
Once this is complete, be sure to close the file. This releases the file so it can be used again.
Develop code to write data to a text file. Your work should be completed using C++. Title the new document you are creating CelsiusTemperature.txt. The name of the output file needs to be different from the name of the input file so you do not overwrite and erase the input file. Consider the following steps as you work:
Declare a variable to point to the file that will be written to. Watch out for the class you use, and make sure it is for writing to a file and not reading a file.
Create the code instructions for writing data to the new output file. In this new file, include space for both the name of the city and the temperature in Celsius for each city included in the original input file. You will need to complete the Fahrenheit-to-Celsius conversion calculation before you write to the new file. Use the following formula to make this conversion. Note that °F represents the temperature in degrees Fahrenheit while °C represents the temperature in degrees Celsius.
Close the file once you are done writing to it. If you attempt to look at the results in the file before completing this step, your file may appear empty.
***************************************
Here is the .txt file:
Toronto 47
Lima 66
Istanbul 57
Lagos 81
Shanghai 61
Sydney 64
***************************************
Here is my code:
#include
#include //enables use of ifstream class
#include
using namespace std;
int main() {
//Declaring object/variables
ifstream inFS; //input file stream
ofstream outFS; //output file stream
string cityName; //Name of city from file
int tempFarenheit; //Farenheit temp
double tempCelsius; //Celsius temp (double because when calculating, there will be a decimal)
//Opening Farenheit file
inFS.open("FarenheitTemperature.txt");
//Creating Celsius file
outFS.open("CelsiusTemperature.txt");
//Creating a while loop that reads FarenheitTemperature.txt info, converts temp from F to C
//using formula provided, then writes new info to CelsiusTemperature.txt file
while (inFS >> cityName >> tempFarenheit) {
tempCelsius = (tempFarenheit - 32) * (5 / 9);
outFS << cityName << " " << tempCelsius << endl;
}
//Closing files
inFS.close();
outFS.close();
return 0;
}

Answers

Answer:

This code looks correct, but there is a small issue that may affect the accuracy of the temperature conversion. In the calculation for the temperature in Celsius, you are dividing 5 by 9 using integer division, which means that the division will be truncated to an integer and any decimal values will be discarded. To avoid this, you need to cast one or both of the values to a floating-point type, such as double.

Explanation:

#include <iostream>

#include <fstream> //enables use of ifstream class

#include <string>

using namespace std;

int main() {

// Declaring object/variables

ifstream inFS; //input file stream

ofstream outFS; //output file stream

string cityName; //Name of city from file

int tempFarenheit; //Farenheit temp

double tempCelsius; //Celsius temp (double because when calculating, there will be a decimal)

// Opening Farenheit file

inFS.open("FarenheitTemperature.txt");

// Creating Celsius file

outFS.open("CelsiusTemperature.txt");

// Creating a while loop that reads FarenheitTemperature.txt info, converts temp from F to C

// using formula provided, then writes new info to CelsiusTemperature.txt file

while (inFS >> cityName >> tempFarenheit) {

tempCelsius = (tempFarenheit - 32) * (5.0 / 9.0);

outFS << cityName << " " << tempCelsius << endl;

}

// Closing files

inFS.close();

outFS.close();

return 0;

}

1. Short Answer Questions What is system software? What is the purpose of system softwere​

Answers

Answer:

System software refers to the underlying low-level software in a computer system that provides basic functionality and support for other software running on a device.

The purpose of system software is to provide basic services and functions for the computer and its applications. This includes tasks such as managing hardware resources (such as the CPU, memory, and storage), managing system files and directories, managing input/output operations, providing security and authentication services, and more. System software acts as an intermediary between the computer's hardware and the higher-level application software, enabling the applications to interact with the hardware and access its resources.

(a)Make logic circuit for the following Boolean expressions:
(xyz) + (x'y'z)

Answers

Answer:

The logic circuit for the Boolean expression (xyz) + (x'y'z) is shown below:

```

   x   y   z

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

   |   |   |

  / \ / \ / \

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |   |   |   |

 |

Explanation:

2. Which of the following are cons that come from using a Cloud Service?

Answers

Below are some of the cons of using a cloud service:

Dependence on internet connectivity: Cloud services rely on a stable and fast internet connection to access and store data. In case of connectivity issues, it can cause disruptions and result in loss of access to important data.

Security concerns: Storing sensitive data on a third-party server raises security concerns such as data breaches and unauthorized access to data.

What is the cons of Cloud Service?

They also includes:

Cost: Depending on the service and usage, cloud services can be more expensive than traditional in-house storage solutions in the long term.

Compliance issues: Some industries have specific regulations regarding data storage and privacy, making it difficult for them to use cloud services without violating these regulations.

Lastly, Limited control: With cloud services, the customer may have limited control over the data and the storage infrastructure. This can cause issues with customization, maintenance and support.

Learn more about Cloud Service from

https://brainly.com/question/19057393

#SPJ1

Kevin owns a toy company. How should he ensure that his customers are receiving a high-quality product Question 1 options: Offer a discount on future purchases to customers Repair products that have been sold to customers and are broken Survey customers and ask for suggestions Test a prototype

Answers

To ensure that his customers are receiving a high-quality product, Kevin can take a number of steps.

One option is to test a prototype before launching the final product to ensure that it meets the desired quality standards. Additionally, he can use customer feedback to improve the quality of the product. He can survey customers and ask for suggestions to understand their needs and preferences. Kevin can also offer a warranty or guarantee on his products and repair or replace products that have been sold to customers and are broken. By doing so, he can demonstrate his commitment to customer satisfaction and improve his company's reputation for producing high-quality products.

To know more about prototype visit:

https://brainly.com/question/28370530

#SPJ1

2: Design an algorithm which generates even numbers between 1000 and 2000 and then prints them in the standard output. It should also print total sum​

Answers

def main():

   even_numbers = []

   for i in range(1000, 2001):

       if i % 2 == 0:

           even_numbers.append(i)

   total_sum = sum(even_numbers)

   print("Even numbers between 1000 and 2000:")

   print(even_numbers)

   print("Total sum:", total_sum)

if __name__ == "__main__":

   main()

In cell B12, add the ROUNDUP function to display the total sales for Quarter 1

rounded up to 0 decimal places.

Answers

To carryout the above prompt in Microsoft Excel, you must use the following formula.: =ROUNDUP(B2+B6+B10,0)

What is the rationale for the above response?

This assumes that the total sales for Quarter 1 are in cells B2, B6, and B10, and the result should be rounded up to 0 decimal places. The ROUNDUP function rounds up a number to a specified number of digits, with 0 meaning to round to the nearest integer.

Microsoft Excel is a spreadsheet program developed by Microsoft that is available for Windows, macOS, Android, and iOS. It includes calculating or computation skills, graphing tools, pivot tables, and Visual Basic for Applications, a macro programming language. Excel is part of the Microsoft Office software suite.

Learn more about  Microsoft Excel:

https://brainly.com/question/24202382

#SPJ1

Suppose Tserial = n and Tparallel = n/p + log2(p), where times Tserial and Tparallel are in microseconds. Assume p represents the number of processes.

a) Write the expressions for speed up and efficiency.
b) Find the speedup and efficiency for n = 10000 and p = 16.

Answers

The speed up is 15.86 and the efficiency is 0.994.

How to calculate the speed

The speed up (S) is defined as the ratio of the time taken to execute a task serially to the time taken to execute the same task in parallel. It can be expressed as:

S = Tserial / Tparallel

The efficiency (E) is defined as the ratio of the actual speed up achieved to the maximum possible speed up. It can be expressed as:

E = S / p

b) To find the speed up and efficiency for n = 10000 and p = 16, we substitute these values into the expressions for Tserial and Tparallel:

Tserial = 10000

Tparallel = 10000 / 16 + log2(16) = 625 + 4 = 629

S = Tserial / Tparallel = 10000 / 629 = 15.86

E = S / p = 15.86 / 16 = 0.994

So the speed up is 15.86 and the efficiency is 0.994.

Learn more about speed on:

https://brainly.com/question/13943409

#SPJ1

investigate the types of topologies implemented in the computer laboratory and itemize the various hardware components used for the topology​

Answers

Answer:

sgsgsghsjjxjdjdjdndjd

A social media search and analysis platform that aggregates user generated content into a single stream of information for a common purpose si called

Answers

A social media aggregator is a tool for social media search and analysis that compiles user-generated content into a single stream of data for a particular objective.

What methodical process is employed to group specific responses into more broad themes in order to uncover themes?

A technique for assessing qualitative data is theme-based data analysis. The majority of the time, it pertains to a collection of texts, such an interview or transcript.

What method of data collection is used in a face-to-face setting between the researcher and the respondents?

Face-to-face, telephone, and online quantitative interviews are the most common methods of conducting these interviews. These allow researchers to not only gather data but also instantly modify the questions to the target audience.

To know more about social media visit:-

https://brainly.com/question/30613367

#SPJ1

What is the "canvas" in an image editing program?
Select one:
O a. This is the name of the color-choosing screen.
O b. This is the bar where all the menu options are found.
O c. This is your main drawing area in the center of the screer
O d. This is the list of tools that are available in the software.

Answers

Answer:

I think

Explanation:

The correct answer is C

If the "limit n" clause is not provided as part of an SQL command, all the rows of the table will get displayed. True

Answers

Answer:

Explanation:

True. If the "limit n" clause is not specified as part of an SQL command, all the rows of the table will be displayed. The "limit n" clause is used to limit the number of rows returned in a query result, so if it's not provided, the entire table will be returned by default.

Has gain insights about the cloud, quantum and autonomic computing, their differences, and applications.​

Answers

Cloud computing is a delivery model for IT services that provides users with access to a shared pool of resources (such as servers, storage, and applications) over the internet.

Applications of cloud computing include data storage and backup, web and mobile application development, and large-scale data processing

What is Quantum Computing:

Quantum computing is a type of computing that uses quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data,

Applications of quantum computing include cryptography, optimization, and simulations of quantum systems.

Autonomic computing is a type of computing that aims to create systems that can manage themselves, without human intervention.

Read more about cloud computing here:

https://brainly.com/question/19057393

#SPJ1

Identify Key Terms of Digital Video
Use the drop-down menus to match each description to the correct term.
a single image or still:
an individual digit in binary:
the number of images shown during a unit of time:
the number of bits of video data transmitted each second

Answers

Answer:

a single image or still: Frame

an individual digit in binary: Bit

the number of images shown during a unit of time: Frame rate

the number of bits of video data transmitted each second: Bitrate

Explanation:

Aɳʂɯҽɾҽԃ Ⴆყ ɠσԃKEY ꦿ

Answer:

a single image or still: Frame

an individual digit in binary: Bit

the number of images shown during a unit of time: Frames per second

the number of bits of video data transmitted each second: Bit rate

Explanation: I just did it on edge 2023! Hope this helps!

In netbeans
Clone the following repo to your netbeans, complete the Course class to have the following data members: - ID - Name - Code - You need to have setters and getters for all data members - You must have a default constructor and an overloaded one that accepts 3 parameters to update the member variables. - Using a driver class (with main), instantiate the Course class and call its methods to change the id, name, and code. - Test and run your code.

Answers

To complete the Course class in NetBeans, we need to add data members for ID, Name, and Code, and implement setters and getters for each.

Additionally, we must provide a default constructor and an overloaded constructor that accepts three parameters to update the member variables.

Next, we need to create a driver class with a main method to instantiate the Course class and call its methods to change the ID, name, and code. In the main method, we can create a new instance of the Course class, set its data members using the setters, and retrieve their values using the getters.

Once the code is implemented, we can test and run it to verify that the class behaves as expected. This includes checking that the data members are correctly initialized, that the setters and getters work correctly, and that the overloaded constructor properly updates the member variables. By following these steps, we can ensure that our Course class is functional and ready for use in larger programs.

Learn more about programs :

https://brainly.com/question/3224396

#SPJ4

When forwarding an e-mail, you should take the time to enter a comment at the top of the e-mail explaining why it is being sent.
True
False

Answers

The correct answer is True. When forwarding an email, it is important to take the time to enter a comment at the top of the email explaining why it is being sent. This will help the recipient understand the context of the email and why it is being sent to them. Additionally, this will help the recipient to quickly understand the purpose of the email and take the most appropriate action.

Answer:

depends if it is a profesional email

Explanation:

if it is a profesionaal email then yes it is important but if its to a freind no its not

True or False. Hardware Trojan can be said to be a malicious modification of the circuitry in a chip.

Answers

Answer:

True

Explanation:

Hardware trojan is very malicious. It can leak your personal confidential information. It does this by emitting radio emissions. This can be bad for other chips because it will either disable, damage, or even destroy other chips or components. This can disable or bypass the security fence in the system. They are also called hidden front doors.

Write a simple single thread CSC4420 shell, i.e., no concurrent commands, to support at least the following built-in commands: prompt : can set to any string you input, in addition to the current history event number, i.e, %h as in csh;url: list the course web site hour : list class times room : list classroom location desp : list the description of this course text: list the textbook ref: list the reference books prof: list the professor's name pol: professor's office location poll: professor's office hours pma : professor's email address ta : list the TA's name tol: TA's office locationtoh : TA's office hours tma : TA's email address history : list history of events up to the number you set help : list all the available commands exit or quit: exit CSC4420 shell

Answers

According to the question, a simple single thread CSC4420 shell, are given below:

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

#define MAX_HISTORY 50

char history[MAX_HISTORY][MAX_HISTORY];

int history_count = 0; // count of history

void print_prompt(){

char prompt[20];

printf("CSC4420 Shell>");

scanf("%s", prompt); // get user input

if(strcmp(prompt,"") != 0)

 printf("CSC4420 %s %d>", prompt, history_count);

else

 printf("CSC4420 Shell>");

}

void print_url(){

printf("Course website: http://www.csc4420.org\n");

}

void print_hour(){

printf("Class times: Tuesday and Thursday 2:00PM to 3:15PM\n

What is single thread?

Single thread is a type of programming model where only one thread of execution occurs at any given time. This means that only one task can be processed at a time, and no other tasks can be processed until the current one is completed. Single threading can be beneficial when programming for applications that do not require multiple threads, as it is simpler to program and less resource intensive.

To learn more about single thread

https://brainly.com/question/29851066

#SPJ1

Embedded styles apply to the Hypertext Markup Language (HTML) documents in which they are created and are accessible to other documents in the website.

Answers

It is false that embedded styles apply to the Hypertext Markup Language (HTML) documents in which they are created and are accessible to other documents in the website.

What is Embedded style?

Embedded styles are styles defined within the style> element of an HTML document's head section.

They are only applicable to the document in which they are created, not to any other documents on the website.

It is recommended to use an external style sheet when applying the same styles to multiple HTML documents on a website.

An external style sheet is a separate file that contains style rules and can be linked to from multiple HTML documents, allowing styles to be shared throughout the website.

Thus, the given statement is false.

For more details regarding HTML, visit:

https://brainly.com/question/17959015

#SPJ1

Help please Budget on excel

Answers

Please keep in mind that this is a Microsoft Excel prompt. The finished tables and charts are attached in the appropriate places.

What is the significance of Microsoft Excel?

Microsoft Excel users may uncover trends and organize and categorize data into usable categories. Excel can also help firms better understand their personnel's structure and operations by classifying work hours and organizing employee profiles and budgets.

Excel is also very beneficial for pupils. They make graphs and charts with the application. Students are increasingly using it for projects and other objectives.

Excel may be used to perform a comparative analysis of various school and student data.

Learn more about Microsoft Excel:

https://brainly.com/question/29786924

#SPJ1

What are the characteristics of a physical network topology?
[Choose all that apply)

A physical network topology displays the physical
location of devices

A physical network topology is a representation of the
logical network

A physical network topology displays the actual
layout of the network

A physical network topology is a diagram of the
network

Answers

The correct option is: A physical network topology is a diagram of the

network.

The characteristics of a physical network topology include displaying the physical location of devices, displaying the actual layout of the network, and being a diagram of the network. A physical network topology provides a visual representation of the physical layout of the network and the location of devices such as computers, routers, and switches. It represents the actual physical connections between devices, including cables, routers, and switches. A physical network topology does not represent the logical network, which refers to the flow of data between devices and the network protocols that govern communication between devices.

To know more about topology visit:

https://brainly.com/question/30452844

#SPJ1

HELP

Which of the following is used with mobile file storage systems?

Basic Disk
Dynamic Disk
FAT32
NTFS

Answers

Answer: It should be dynamic

Explanation: a online search.

4. Create a Java application to calculate NY State taxes. A
user should be able to enter the taxable income, and the
program should display the taxes due. If the income is
below $20,000 the tax rate is 2%. If the income is
between $20,000 and $50,000 the tax rate is 3% and for
incomes greater than $50,000 the tax rate is 5%.

Answers

Use the following straightforward procedure to determine the Java  New York City sales tax rate: All sales x the applicable sales tax rate (in this case, 8%) equals sales tax.

How does Java calculate sales tax?

You must multiply or divide the sales tax by 100, for example, 7/100, where 7 is the tax variable's percentage. 01, then add the outcome to the overall value of your variable. 1% is . 01 of 100%.

What is the state income tax in New York?

The income tax rates for the state of New York are 4%, 4.5%, 5.25%, 5.85%, 6.25%, 6.85%, 9.65%, 10.3%, and 10.9%. Taxable income and filing status determine the income tax rates and brackets in New York.

To know more about Java  visit:-

https://brainly.com/question/29897053

#SPJ1

Compute the sum with carry-wraparound (sometimes called the one's complement sum) of the following two numbers. Give answer in 8-bit binary, zero-padded to 8 bits if necessary, with no spaces (e.g. 00101000). Please note this is different than the checksum calculation.
10000011
10000000

Answers

the sum of these two numbers is 100000100. The two numbers are 10000011 and 10000000. Starting from the rightmost bit, we begin adding from each column.

The two numbers are 10000011 and 10000000. Starting from the rightmost bit, we begin adding from each column. We can see that the rightmost bit is 1 + 0 = 1, and this carries over to the next column on the left. We continue to add each column, carrying over the 1 from the previous column, until we reach the leftmost column. We can see that the leftmost column is 1 + 1 = 0, and there is no carry over to the next column. Therefore, the sum of these two numbers is 100000100.

learn more about BIT here

https://brainly.com/question/16005809

#SPJ4

1.
Question 1
Computer 1 on network A, with the IP address of 10.1.1.8, wants to send a packet to Computer 2, with the IP address of 10.1.1.10. On which network is computer 2?
1 point

Not present

Network C

Network B

Network A
2.
Question 2
Computer 1 wants to send a packet to Computer 2. Since computer 2 is not on the local network, Computer 1 checks the ARP table for the corresponding ______ that matches the gateway IP.
1 point

TTL value

MAC address

Destination MAC address

Port number
3.
Question 3
Which layer constructs the Ethernet frame?
1 point

Application layer

Transport layer

Physical Layer

Data link layer
4.
Question 4
What information is in the payload section of the TCP segments?
1 point

Handshake

The MAC address of Computer 1

The application layer data

ART Table
5.
Question 5
When constructing the Ethernet datagram to send the packet from Router Z to Computer 2 which is on Network C, what information needs to be in the destination MAC address?
1 point

Router Y’s MAC address

Computer 1’s MAC address

Computer 2’s MAC address

No MAC address is needed
6.
Question 6
Computer 1 on Network A sends a packet to Computer 2 on Network C. What's the first step that Router Z does after receiving the Ethernet frame?
1 point

Increases the TTL by one

Calculates a checksum and compares this checksum with the one in the Ethernet frame header

Checks the destination IP address and changes it to its own

Sends an ARP broadcast message
7.
Question 7
Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 172.16.1.64. If the TTL value was set to 64 at the beginning, what is the value of the TTL once it reaches its destination?
1 point

60

62

0

65
8.
Question 8
Computer 1 on network B, with IP address of 192.168.1.121, wants to send a packet to Computer 2, with IP address of 10.1.1.8. Taking in consideration that computer 1 is sending a request to a web server on computer 2, listening on port 80, and the source port on computer 1 is 5000, which of the following contains the correct information for the first TCP segment of data?
1 point

Source Port: 8081
Destination Port: 50
Sequence Number: 4
Acknowledgment Number: 1

Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 2

Source Port: 5000
Destination Port: 80
Sequence Number: 1
Acknowledgment Number: 2

Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 1
9.
Question 9
Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of 172.16.1.64. Which of the following has the correct IP datagram information for the fields: Version, minimum Header Length, Source IP, and Destination IP?
1 point

Version: 6
Header Length: 20
Source IP Address: 8a:1a:2b:3c:4d:5f
Destination IP address: 2a:2b:3c:4d:8f

Version: 5
Header Length: 16
Source IP Address: 171.1.1.1.
Destination IP address: 172.16.1.0/24.

Version: 4
Header Length: 20
Source IP Address: 10.1.1.10
Destination IP address: 172.16.1.64

Version: 4
Header Length: 32
Source IP Address: 10.1.1.1
Destination IP address: 172.16.1.1
10.
Question 10
The Cat6 cable is part of the ______ layer.
1 point

Transport

Physical

Application

Network

Answers

Answer:

Network AMAC addressData link layerApplication layer dataComputer 2's MAC addressChecks the destination IP address and changes it to its own62Source Port: 5000, Destination Port: 80, Sequence Number: 1, Acknowledgment Number: 1Version: 4, Header Length: 20, Source IP Address: 10.1.1.10, Destination IP Address: 172.16.1.64Physical

Explanation:

Other Questions
What is the ground state configuration of calcium (Ca)? diseases and chronic conditions associated with aging: a. may have delayed onset due to lifestyle. b. may be strongly affected by lifestyle. c. are inevitable, regardless of lifestyle. d. may be slightly modified by lifestyle. fly high drones, a corporation owned and managed by volunteers, delivers medical supplies to remote populations in africa. its focus is not on earning a surplus but on serving the community. fly high drones is an example of a If a cuboid weighs 100N has sides 5cm by 10cm. Find the area of the cuboid What is Fast-food fare in which two pancakes form a sandwich crossword clue ? what is the total enthalpy change (in kj/mol) for the dissociation of a mole of hydrogen gas at stp? the question refers to the table, which compares the percent sequence homology of four different parts of a gene (two introns and two exons) that is found in five different eukaryotic species. the data show the percentage of sequence homology of each intron and exon in comparison to the sequences in species a. % sequence homology species intron i exon i intron vi exon v a 100% 100% 100% 100% b 98% 99% 82% 96% c 98% 99% 89% 96% d 99% 99% 92% 97% e 98% 99% 80% 94% based on the data in the table, which phylogenetic tree is the most likely depiction of the evolutionary relationships among these five species? explain how events like coxey's army and the pullman strike show growing discontent in the united states in the 1890s Put brackets into this calculation to make it correct.6 x 1.5 + 4.9 x 4 = 55.6 Write the equation of a line that is perpendicular to y= 3/2x - 4 and goes through the points (2,-2) What kind of strip is Dr. Hewitt holding in his hand?What happens when Dr. Hewitt heats up the strip?Why does the strip behave as it does when Dr. Hewitt heats it up? The _____ ______ is the ability to reach threshold without stimulation Which expression has a coefficient of 2? Choose AllA. x + 2y + 18B. 1.2a + 4b + 2C. 24k divided by 12D. 17 + 2jE. 2t divided by 100 What quantum numbers represents each electron in a ground state? Please help me figure out the area of this shape! gently laser clinic purchased laser equipment for $6,593 and paid $728 down, with the remainder to be paid later. the correct entry would be Write In PythonWrite a program that writes a series of random numbers to a file called rand_num. Each random number should be be in the range of 1 to 500. The application should allow the user to specify how many numbers the file will hold. Then write a program that reads the numbers in the file rand_num and displays the total of the numbers in the file and the number of random numbers in the file. Revenues cause equity to __________(decrease/increase), and they are increased on the ______ (left/right)side of the T-account. describe how water quality changes from the source of a river to the mouth Create a 1-page PowerPoint or poster to advertise the Jumeirah Archaeological site to university students.