What are authorization rules?

Answers

Answer 1
An authorization rule specifies the policy that applies to an object and that is based on various conditions, such as context and environment. Each authorization rule has a unique name and can be applied to multiple objects in a domain.

Related Questions

Mention and discuss specific professional ethics related to augmented reality, artificial intelligence, and the internet of things?

Answers

Specific professional ethics related to augmented reality, artificial intelligence, and the internet of things are:

OpacityBiasEmploymentPrivacySingularityAutonomous systems

What are the professional ethics of AI systems?

Artificial intelligence often has some dilemma that confronts people who are in this field of duty. Some of the daily challenges that they must face are the ones mentioned above. Opacity is a challenge that even the end-users must face. Often, there is the challenge of not knowing how the program came about.

There is a worry about end-users participating in the process of developing some of these systems. People want to be more involved but since machine learning is not easy, many might not know how the results are generated.

Bias is another problem that augmented reality and the other mentioned fields face. Since the output is predictive in nature, there is often the worry that the machine might generate data that impede human freedom.

Learn more about the professional ethics of AI systems here:

https://brainly.com/question/28158916

#SPJ1

Assemble a client computer based on your programmed of study (e.g IT, CS, Business etc), discussing the type of components ( giving their exact names and functions) you would need and gives reasons why you need them

Answers

The assembly of client computer based on IT  are:

The monitor -  Acer Nitro XV282K KVbmiipruzx The CPU -  64-Core TR 3990XThe mouse - Logitech MX Master 3Voltage regulator- APC Line-R Automatic Voltage RegulatorSolar battery - Tesla Powerwall 2.Microsoft office 365

The  reasons why I need the above hardware and software is because they are the one of the best in regards to IT and they will really help me a lot in regards to gaming and programming.

What is a client computer in regards to computer?

The term client computer is known to be one that is often used at home and also in corporate environment.

A  client is seen as an kind of computer hardware or software device that is known to often needs access to a service that is said to be provided by a server. Clients are known to be the requesting program or the user that is in a client-server base.

Therefore, The assembly of client computer based on IT  are:

The monitor -  Acer Nitro XV282K KVbmiipruzx The CPU -  64-Core TR 3990XThe mouse - Logitech MX Master 3Voltage regulator- APC Line-R Automatic Voltage RegulatorSolar battery - Tesla Powerwall 2.Microsoft office 365

Learn more client computer from

https://brainly.com/question/14753529

#SPJ1

In what way, if any, is the impact of a given risk affected by the timing of a project?
The impact of a given risk is greater in the middle of a project.
The impact of a given risk is not affected by the timing of a project.
The impact of a given risk is greater in the beginning of a project.
The impact of a given risk is greater toward the end of a project.

Answers

The impact of a given risk affected by the timing of a project is that The impact of a given risk is greater in the beginning of a project.

What is perfect timing?

This is known to be the time when something happens at what we call the exact right or ideal time.

Time is known to be a key or one of the factors that is said to often makes projects what they stand to be.

Note that; projects are said to be often bounded by scope, time, cost, quality and others.

Hence,  The impact of a given risk affected by the timing of a project is that The impact of a given risk is greater in the beginning of a project.

Learn more about timing  from

https://brainly.com/question/2854969

#SPJ1

Answer: The likelihood of risk is greater in the beginning of a project.

Explanation: I got it right on edge

Discuss how you would use a DHCP server, and why.

Answers

Answer:

DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients.

Explanation:

I hope this is helpful.

Please solve this in JAVA

Please see the attachment

Answers

Answer:

I'm going to do it but you should try these things for yourself or else you won't learn.

Explanation:

-First create a project (I'm using Netbeans 14 and the project is a Maven, but the code should work on any IDE)


-Name the project 'ShoppingCartPrinter' and leave the package name as it is. This is the main class so the main method is gonna be there already.

-Then you will create a second class named 'ItemToPurchase'. So I'll leave the code in the attachment (at the bottom of my answer it's written 'Download txt') or else brainly will think it's some sort of redirection to another websites because of the 'dots' and won't let me post it.






Hannah is editing her brother’s birthday video. She has selected the usable shots and copied them onto her computer. What is the next step for Hannah? A. capture the shots B. create a rough cut C. create the final music D. add titles and credits

Answers

Answer:

She needs to create the final music

Answer:

She needs to create the final music

Explanation:

Task 04

Write C# code which generates and displays 10 random (integer) numbers between 0 and

50, note that each time this program runs the results are different.

Task 05

Repeat your code from the previous exercise.

In addition to generating the 10 random numbers, display the lowest of the 10 numbers.

Task 06

Repeat your code from the previous exercise.

In addition to the lowest number, display the highest and the average of the 10

numbers.

Answers

Answer:

are u sure this is the right question?

Explanation:

Which option is an example of an array of numbers?
A. The answer to whether you have finished your homework
B. A list of items that you need to pick up at the grocery store
OC. A list of order numbers for books in a section of a bookstore
D. The name of your local computer supply store

Answers

C. A list of order numbers for books in a section of a bookstore

You get in your car after work and turn
on the radio. What type of communication does the
radio use?

Answers

Answer:

Radio Waves

Explanation:

Pretty self-explanatory.

Radio is a technology that uses radio waves for signaling and communication. Between 30 hertz (Hz) and 300 gigahertz, radio waves are electromagnetic waves (GHz).

What is the process of radio communication?

Electromagnetic waves are sent and received by radio equipment to operate. An extremely fast-moving electrical current is what makes up the radio signal. This field is broadcast by a transmitter using an antenna; a receiver picks up the field and converts it to the audio heard on the radio.

Radio technology is the transmission and reception of communication signals made of electromagnetic waves that bounce off the ionosphere or a communications satellite or pass through the air in a straight line.

Modern technology uses radio waves for a wide range of purposes, including broadcasting, radar and radio navigation systems, fixed and mobile radio communication, wireless computer networks, and communication satellites.

Learn more about Radio waves here:

https://brainly.com/question/21995826

#SPJ2

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to transfer a good file to the computer?

Answers

The fastest way to transfer a good file to the computer is Use the C$ administrative share to copy the file.

How do I copy a file?

To copy a file, right-click on the desired file and select Copy. Alternatively, you can use the keyboard shortcut. To copy the item: click Ctrl+C. Navigate to the folder you want to move or copy the item to and click Ctrl+V or right-click and select paste.

To automatically paste the text, you will be inserting the copied content, which is in the clipboard to the desired location by the user, since such an operation only works if something has previously been copied or cut.

See more about copy a file at brainly.com/question/18241798

#SPJ1

Line formatting can be accomplished by using

Answers

Answer:

How can line formatting be accomplished?

To format line spacing:

Select the text you want to format. Selecting text to format.

On the Home tab, click the Line and Paragraph Spacing command. A drop-down menu will appear.

Move the mouse over the various options. A live preview of the line spacing will appear in the document. Select the line spacing you want to use.

The line spacing will change in the document.

What relation between two sets S and T must hold so that |S ∪ T| = |S| + |T|

Answers

Suppose S and T are sets. Then the intersection of S and T, denoted S∩T, is the set whose elements are only those that are elements of S and of T.

What is |S ∪ T| = |S| + |T|?

DeMorgan’s Set Theory Laws

In Set Theory, there are analogous relationships called DeMorgan’s Set

Theory Laws. These laws are exactly the analogues of the corresponding logic

laws, where  is replace by the complement, ∧ is replace by ∩, and ∨ is replaced

by ∪. DeMorgan’s Set Theory Laws are stated below:

S ∩ T = S ∪ T and S ∪ T = S ∩ T .

We will prove the latter of these below.

Theorem. Let S and T be sets. Then,

S ∪ T = S ∩ T .

two sets S and T must hold so that |S ∪ T| = |S| + |T|

To learn more about DeMorgan’s Set, refer

https://brainly.com/question/21353067

#SPJ9

What type of computer system can recognize and act on patterns or trends that it detects in large sets of data and is developed to operate like the human brain?.

Answers

The type of computer that can recognize and act on patterns or trends that it detects in large sets of data is a neural network.

What is a neural network?

A neural network is a type of computer system that can spot patterns or trends in massive amounts of data and take appropriate action. An architecture for a neural network is based on the mesh-like design of the human brain and makes use of massively parallel processors.

As a result, neural networks can process multiple bits of data simultaneously and discover patterns. A computer may adapt its response to circumstances based on the feedback it gets thanks to learning systems. To find information on any topic, a genetic algorithm can be used to scan the huge Internet's resources.

Therefore, a neural network is a sort of computer that can spot patterns or trends in huge amounts of data and take appropriate action on them.

To learn more about neural networks, refer to the link:

https://brainly.com/question/14632443

#SPJ2

A neural network is a sort of computer that can spot patterns or trends in huge amounts of data and take appropriate action on them.

What is neural network?

Neural network is defined as a technique used in artificial intelligence that instructs computers to process information in a manner modeled after the human brain.  A certain kind of computer system called a neural network can identify patterns or trends in vast volumes of data and take the necessary action. Massively parallel processors are used in a neural network architecture that is based on the human brain's mesh-like structure.

As a result, neural networks are able to analyze numerous pieces of data at once and find patterns. Thanks to learning systems, a computer may modify its response in reaction to the situation. A genetic algorithm can be used to search the vast Internet's resources to find information on any subject.

Thus, a neural network is a sort of computer that can spot patterns or trends in huge amounts of data and take appropriate action on them.

To learn more about neural network, refer to the link below:

https://brainly.com/question/14632443

#SPJ5

Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.

Answers

Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays

Writting the code in JAVA:

BEGIN

DECLARE

employeeNames[100] As String

employeeSalaries[100] as float

name as String

salary, totalSalary as float

averageSalary as float

count as integer

x as integer

rangeMin, rangeMax as float

INITIALIZE

count = 0;

totalSalary =0

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

//Read Employee data

WHILE name != “*” AND count < 100

employeeNames [count] = name

DISPLAY“Enter salary for “ + name + “.”

READ salary

employeeSalaries[count] = salary

totalSalary = totalSalary + salary

count = count + 1

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

END WHILE

//Calculate average salary with mix , max range

averageSalary = totalSalary / count

rangeMin = averageSalary - 5

rangeMax = averageSalary + 5

DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”

For (x = 0; x < count; x++)

IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )

DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]

END IF

END FOR

END

See more about JAVA at brainly.com/question/12978370

#SPJ1

Which microsoft tool can be used to review a systems security configuration recommended?

Answers

Answer:The Security Compliance Toolkit (SCT)

Explanation:

It allows security administrators to download, analyze, test, edit, and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products.

Why are there so few steps to secure
default IIS in Windows Server 2019?

Answers

The few steps to secure default IIS in Windows Server 2019 are:

Select the run window and type “inetmgr” After that  press enter to open IIS web server in the windows system. Go to  Default Document Option.Then select your site. Provide Default Page Name. Set Top in Priority Order.

What is the  Web Server (IIS) role in Windows Server 2019 ?

Web Server (IIS)  which is in the Windows Server 2019  helps to give secure as well as easy-to-manage, modular and extensible platform .

This platform gives a reliably hosting websites and  services, and applications.

It should be noted that Microsoft Internet Information Server (IIS) has been adopted globally and is been used especially in the enterprise, even though it posses less-than-stellar reputation for security.

However, there has been great improvement in the Microsoft's web server solution over the years.

Learn more about Windows Server  on:

https://brainly.com/question/12510017

#SPJ1

You are in process of writing a class definition for the class Book. It has three data attributes:
book_title, book_author, and book_publisher. The data attributes should be private.
In Python, write an initializer method that will be part of your class definition. The attributes will
be initialized with parameters that are passed to the method from the main program.
Note: You do not need to write the entire class definition, only the initializer method

Answers

Using the knowledge in computational language in python it is possible to write a code that uses  process of writing a class definition for the class Book.

Writting the code in python:

class Book:

   # a constructor for this class.

   # The constructor should accept an argument for each of the fields.

   def __init__(self, book_title, book_author, book_publisher):

       self.book_title = book_title

       self.book_author = book_author

       self.book_publisher = book_publisher

def main():

   b = Book("title1", "author1", "publisher1")

   print(b.book_title)

   print(b.book_author)

   print(b.book_publisher)

main()

See more about python at brainly.com/question/18502436

#SPJ1

Project 12-2: Bird Counter
Help me make a Python program for birdwatchers that stores a list of birds along with a count of the
number of times each bird has been spotted.


Console
Bird Counter program

Enter 'x' to exit

Enter name of bird: red-tailed hawk
Enter name of bird: killdeer
Enter name of bird: snowy plover
Enter name of bird: western gull
Enter name of bird: killdeer
Enter name of bird: western gull
Enter name of bird: x

Name Count
=============== ===============
Killdeer 2
Red-Tailed Hawk 1
Snowy Plover 1
Western Gull 2


Specifications
 Use a dictionary to store the list of sighted birds and the count of the number of times
each bird was sighted.
 Use the pickle module to read the dictionary from a file when the program starts and
to write the dictionary to a file when the program ends. That way, the data that's
entered by the user isn't lost.

Answers

The program based on the information given is illustrated below.

How to illustrate the program?

It should be noted that a computer program is a set of instructions in a programming language for the computer to execute.

Based on the information, the program is illustrated thus:

Code:

import pickle

#function to read birds data

def readBirdsData():

try:

birdsFile = open("birdsData","rb")

birdWatcher = pickle.load(birdsFile)

birdsFile.close()

birdWatcher ={}

except EOFError:

birdWatcher ={}

return birdWatcher

#function to write the data into file using pickle

def writeBirdsData(birdWatcher):

if birdWatcher == {} :

return

sorted(birdWatcher)

birdsFile = open("birdsData","ab")

pickle.dump(birdWatcher,birdsFile)

birdsFile.close()

#function to display birds data in sorted order

def displayBirdsData(birdWatcher):

print("Name\t\tCount")

print("========\t===========")

for key in sorted(birdWatcher.keys()):

print("{}\t\t{}".format(key,birdWatcher[key]))

#main function

def main():

birdWatcher = readBirdsData()

print("Bird Counter Program")

print ("\nEnter 'x' to exit\n")

name = input("Enter name of bird: ")

while True:

#break the loop if x is entered

if name == 'x':

#if the name exists in dictionary then increase the value

if the name in birdWatcher.keys():

birdWatcher[name] = birdWatcher[name] + 1

else:

#dd it otherwise

birdWatcher[name] = 1

name = input("Enter name of bird: ")

displayBirdsData(birdWatcher)

writeBirdsData(birdWatcher)

#driver code

if __nam__ == '__main__':

main()

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

• Ethernet network that connects a single client PC to a single server and label the locations of switches and transmission links.

Provide a rationale for each part of your design, explaining the problem, approach, and why you made the choices you made.

Answers

In the network constructed, we need to use 3 switches to  be able to connect a single client PC to the single server. Therefore:

Connect server to switch 1        (225 m)Connect switch 1 to switch 2     (225 m)Connect switch 2 to switch 3    (225 m)Connect switch 3 to client PC   (225 m)

What is the network about?

The maximum distance for ethernet connection is known to be about 100 meters and it is one that is often used in the transmission speeds.

Note that when one has added to the network switches, the distance need to be increased to about 200 meters and thus about 900 meters of distance need to exist between the client PC and the server.

The Ethernet network need to be designed as:

Connect server to switch 1        (225 m)

Connect switch 1 to switch 2     (225 m)

Connect switch 2 to switch 3    (225 m)

Connect switch 3 to client PC   (225 m)

Note that Total distance covered = 225 + 225 + 225 + 225

                                                       = 900 meters

Therefore, In the network constructed, we need to use 3 switches to  be able to connect a single client PC to the single server.

Learn more about Ethernet from

https://brainly.com/question/16947988

#SPJ1

How can a company that collects and uses private customer data ensure it will move forward in a sustainable culture of privacy?
Select an answer:

1- by creating a culture of privacy in every facet of the company's operations
2- by developing an internal data privacy policy that can apply to all current and new products
3- by asking the hard questions, and struggling to get the right answers
4- by making sure the privacy policies provided to customers are up-to-date

Answers

The company that collects and uses private customer data will need to ensure that it will move forward in a sustainable culture of privacy if they act by:

Option 1: creating a culture of privacy in every facet of the company's operations.Option 4- by making sure the privacy policies provided to customers are up-to-date.

What is Data Protection and Privacy?

The terms data protection and data privacy is known to be one that is said to be used a lot and also  interchangeably.

Note that Data privacy is one that tells about who has  the ability or permission to access to data, and data protection is one that gives tools and policies to be able to restrict access to the data.

Hence, The company that collects and uses private customer data will need to ensure that it will move forward in a sustainable culture of privacy if they act by:

Option 1: creating a culture of privacy in every facet of the company's operations.Option 4- by making sure the privacy policies provided to customers are up-to-date.

Learn more about privacy policies from

https://brainly.com/question/13335106

#SPJ1

How many outcomes are possible in this control structure?

Answers

In regards to computing, The numbers of outcomes possible in this control structure is two.

Check more about control below.

What is a Control Structures?

Control Structures is known to be made up of blocks that helps to examine variables and one can be able to choose directions where they can go to and this is often based on its given parameters.

Note that the basic Control Structures in programming languages are composed of Conditionals (or Selection) that helps  to execute one or a lot of statements if the given condition is met.

Hence, The numbers of outcomes possible in this control structure is two.

Learn more about control structure from

https://brainly.com/question/26504433

#SPJ1

Answer:

i think your asking about the forever one in computer scinece

im pretty sure its 2

Explanation:

Following Aristotle,man by nature is a political animal,justify the above claim in the light of the Russian invasion of Ukraine

Answers

Following Aristotle, man by nature is a political animal using the claim in the light of the Russian invasion of Ukraine is that:

Aristotle stated that State is natural due to the fact that nature has not made man to be in a self-sufficient state. But Man has a lot of -different type of needs  which they want them to be fulfilled. Russian need and Ukraine need differs and as such, man is fighting to satisfy their needs.

What is the quote about?

In his Politics, Aristotle was  known to be a man who believed man to be a "political animal" due to the fact that he is a social creature that is said to have the power of speech and also one that has moral reasoning:

He sate that man is a lover of war and as such, Aristotle stated that State is natural due to the fact that nature has not made man to be in a self-sufficient state. But Man has a lot of -different type of needs  which they want them to be fulfilled. Russian need and Ukraine need differs and as such, man is fighting to satisfy their needs.

Learn more about Aristotle from

https://brainly.com/question/24994054

#SPJ1

How has 5G become more energy efficient?

1. by creating cross channel wavelengths
2. by utilizing beamforming and multiple-input multiple-output (MIMO)
3. by converting to all solar power
4. by utilizing more energy efficient access points

Answers

Option 4. The way that 5G is more efficient is that is is able to  utilize more energy efficient access points.

What is the 5G?

This is the term that is used to refer to the fifth generation mobile network. This is the latest generation of networks and it is known to be a faster way and a more efficient way of connecting to the internet when we compare it to the others that came before it.

This is known to have lower latency when we compare it to the 4G network. It is 100 times said to be faster than the 4G and more efficient for businesses and the people that use them. Hence the The way that 5G is more efficient is that is is able to  utilize more energy efficient access points.

Read more on 5G network here: https://brainly.com/question/24664177

#SPJ1

For a lens with focal length f find the smallest distance possible between the object and its real image.​

Answers

Answer:

Ray optics and optical instruments show that the least possible distance between an object and its real image for convex lens is 4f where f is the focal length of lens

convert the following decimaal numbers to octal numbers
1. 500
2. 169
3. 53
4.426

Answers

1. 500--->764

2. 169--->251

3. 53--->65

4.426--->652

Given main(), complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a car (SetPurchasePrice(), GetPurchasePrice()), and to output the car's information (PrintInfo()). Ex: If the input is: 2011 18000 2018 where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, the output is: Car's information: Model year: 2011 Purchase price: 18000 Current value: 5770

Answers

The C++ program to show and complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a car is:

Car.h

#ifndef CARH

#define CARH

class Car{

private:

int modelYear;

 

int purchasePrice;

int currentValue;

public:

void SetModelYear(int userYear);

int GetModelYear() const;

void SetPurchasePrice(int purchasePrice);

int GetPurchasePrice() const;

void CalcCurrentValue(int currentYear);

void PrintInfo();

};

#endif // CARH

Car.cpp

#include<iostream>

#include<math.h>

#include "Car.h"

using namespace std;

void Car::SetModelYear(int userYear){

modelYear=userYear;

}

int Car::GetModelYear() const{

return modelYear;

}

void Car::SetPurchasePrice(int userPrice){

purchasePrice = userPrice;

}

int Car::GetPurchasePrice() const{

return purchasePrice;

}

void Car::CalcCurrentValue(int currentYear){

double depreciationRate = 0.15;

int carAge = currentYear- modelYear;

currentValue = (int)round(purchasePrice*pow((1-depreciationRate),carAge));

}

void Car::PrintInfo(){

cout<<"Car's information:\n";

cout<<"\t\tModel Year : "<<GetModelYear();

cout<<"\n\t\tPurchase price: "<<GetPurchasePrice();

cout<<"\n\t\tCurrentValue: "<<currentValue;

}

Read more about C++ programs here:

https://brainly.com/question/20339175

#SPJ1

online activities among businesses

Answers

Some of the online activities among businesses are:

SEO consultant. ...Web designer or web developer. ...Blogger. ...Virtual assistant. ...Affiliate marketer, etc

What are Online Activities?

This refers to the various activities that are done on the world wide web and is usually used by businesses to increase visibility, and in turn, revenue.

Hence, we can see that the use of online activities by businesses are important because the products and services for sale by businesses are advertised to target audiences through some of the aforementioned activities.

Read more about online activities among businesses here:

https://brainly.com/question/27172895

#SPJ1

pleaseeeee helpppppppp​

Answers

Answer:

int

Explanation:

a (signed) int has a higher rank than a char, therefore the result will be int, and an implicit type promotion will take place.

o How basic blocks are identified and how the blocks are used to construct control flow graphs

Answers

Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Note that  Basic Block is said to be a composition  of statements that is known to be one that often always executes one after other, and this is often done in a sequence.

How do you create a flow graph from the basic blocks?

Flow graph  is gotten by:

Lets Block B1 be the initial node and also Block B2 will tend to follows B1, so from B2 to B1 there is seen a kind of an edge.

Note that the first task is for a person to partition a sequence of three-address code and this is done into basic blocks.

Hence, Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Learn more about basic blocks from

https://brainly.com/question/132319

#SPJ1

A packet switch has 5 users, each offering packets at a rate of 10 packets per second. The average length of the packets is 1,024 bits. The packet switch needs to transmit this data over a 56-Kbps WAN circuit. Calculate the load and utilization of the link.

Answers

The load and utilization of the link will be, respectively, 51200bps and 91,4%.

What is a WAN circuit?

Wide Area Network (WAN) is a communication network that covers a large geographic area, such as cities, states and even countries. This type of connection is usually the result of joining smaller networks, such as several LANs (Local Area Networks).

While LANs are able to integrate devices, documents, data, software and hardware in a geographically small space, to facilitate the exchange of information wide area networks (WAN) are able to integrate multiple local area networks. In this way, the integration between devices, documents and important data of a company or institution can take place even between geographically very distant regions.

That being said, to calculate the load it is necessary to multiply users, packets and bits. So:

[tex]5.10.1024 = 51200bps[/tex]

And to calculate the utilization it is necessary to divide load per transmission. So:

[tex]51200/561000 = 0,914[/tex] or 91,4%

See more about WAN circuit at: brainly.com/question/621746

#SPJ1

Other Questions
How do you fix this?from random import randintclass Character: def __init__(self): self.name = "" self.health = 1 self.health_max = 1 def do_damage(self, enemy): damage = min( max(randint(0, self.health) - randint(0, enemy.health), 0), enemy.health) enemy.health = enemy.health - damage if damage == 0: print("%s evades %s's attack." % (enemy.name, self.name)) else: print("%s hurts %s!" % (self.name, enemy.name)) return enemy.health randint(1, self.enemy.health): print("%s flees from %s." % (self.name, self.enemy.name)) self.enemy = None self.state = 'normal' else: print("%s couldn't escape from %s!" % (self.name, self.enemy.name)) self.enemy_attacks() def attack(self): if self.state != 'fight': print("%s swats the air, without notable results." % self.name) self.tired() else: if self.do_damage(self.enemy): print("%s executes %s!" % (self.name, self.enemy.name)) self.enemy = None self.state = 'normal' if randint(0, self.health) < 10: self.health = self.health + 1 self.health_max = self.health_max + 1 print("%s feels stronger!" % self.name) else: self.enemy_attacks() def enemy_attacks(self): if self.enemy.do_damage(self): print("%s was slaughtered by %s!!!\nR.I.P." % (self.name, self.enemy.name)) def fall(self): print( "%s fell down a pit and dies.\nR.I.P." % self.name) self.health = 0Commands = { 'quit': Player.quit, 'help': Player.help, 'status': Player.status, 'rest': Player.rest, 'explore': Player.explore, 'flee': Player.flee, 'attack': Player.attack,}p = Player()p.name = input("What is your character's name? ")print("(type help to get a list of actions)\n")print("%s enters a dark cave, searching for adventure." % p.name)while(p.health > 0): line = input("> ") args = line.split() if len(args) > 0: commandFound = False for c in Commands.keys(): if args[0] == c[:len(args[0])]: Commands[c](p) commandFound = True break if not commandFound: print("%s doesn't understand the suggestion." % p.name) You inherit one million dollars. You invest it all in three accounts for one year. The first account pays 3% compounded annually, the second account pays 4% compounded annually, and the third account pays 2% compounded annually. After one year, you earn $34,000 in interest. If you invest four times the money into the account that pays 3% compared to 2%, how much did you invest in each account? Why was swami vivekananda ideally suited to represent hinduism at the 1893 worlds parliament of religions in chicago? Quick algebra 1 question for 10 points!Only answer if you know the answer, quick shout-out to tariqareesha2 and MrBrainly, tysm for the help! What was the name given to the transformation of the european economy as a result of changes in business procedures and increasing trade? an irrational number is one that simply can not be worked into any equation. true or false Hi I need help and I am willing to give brainliestCan you help me find the percent yield of SiO2 given the equation of SiCl4 + O2 SiO2 + Cl2the starting amount for SiCl4 is 150g and O2 at 200g. the actual yield for SiO2 is 49.2 g.Thank you for any help Suppose the owners of lopes and homemax meet for a friendly game of golf one afternoon and happen to discuss a strategy to optimize growth related profit. They should both agree to? In a region where the electric field is uniform and points in the x direction, the electric potential is -2000 v at x = 8 m and is 400 v at x = 2 m. what is the magnitude of the electric field? What windows utility can be used to find out what process are launched at startup? Why doesnt the total pressure increase when more gas is added to the chamber? (hint: what would you see if the volume of the chamber was fixed?) with reference to the paragraph explain how a persian wheel is used for water supply round 00.963.785 to the nearest. hundredth 12 in.14 in.14 in.Find the area of the figure above.[?] square inches please explain how you got the answer for future questions Determine if there is a statistically significant difference between the absorption data ofblack walnut trees and maple trees Caisse can download a maximum of 1000 mb of songs or movies to her smartphone each month. the file of each movie is 85mb, and the file of each song is 4mb. write an inequality that represents the number of movies(M) and songs(S) that Caisse downloads each month? When retained earnings are not enough to meet their long-term funding needs, businesses may be able to raise funds by? Name a pair of vertical angles Name a pit of adjacent anglesIf mCan someone help Im confused I never learned this A "Shirley Temple" drink is made by a 5.mixing 2 cups of 7-Up with 4 tablespoonsof grenadine syrup. Write a ratio ofgrenadine syrup to 7-Up. (hint: 160 lstot of anTablespoons = 1 Cup) When Braden was nine, he saw one of his classmates fall under the wheels of a school bus as it pulled away from the curb. Today, at the age of 34, he has no memory of the accident. The evening news carried a flashback of the accident that happened 25 years ago, and Braden still didn't remember being at the scene when the accident happened. According to Freud, it seems that Braden's memory of the accident is contained in his unconscious mind O ego O superego O preconscious mind