Answers

Answer 1
Mirror sites or mirrors are replicas of other websites or any network node. The concept of mirroring applies to network services accessible through any protocol, such as HTTP or FTP. Such sites have different URLs than the original site, but host identical or near-identical content.
Answer 2
ANSWER: Mirror sites, often known as mirrors, are exact copies of other websites or network nodes.

Related Questions


How did the military in the early 1900s move resources?
engines.
In the early 1900s, military moved their resources to distant locations with the help of

Answers

Answer:

In the early 1900s, military moved their resources to distant locations with the help of trains, ships, and, to a lesser extent, horse-drawn wagons. This was so because at that time airplanes did not yet exist, capable of transporting inputs to any part of the world in a very short period of time. Therefore, inputs and resources were brought by sea and, if impossible, through land, using railways or highways.

Print the two strings in alphabetical order. Assume the strings are lowercase. End with newline. Sample output: capes rabbits import java.util.Scanner: public class OrderStrings { public static void main (String args) { String firstString: String secondString: firstString = "rabbits" secondString = "capes" /*Your solution goes here */ return: } }import java.util.Scanner;public class OrderStrings { public static void main(String[] args) { String firstString; String secondString; firstString = "rabbit"; secondString= "capes"; //String class in java provide string comparison function, use it, and get //your work done may even use brute force i.e using for loop and compare character by // character which will not good for the programming language which already have vast //predefined number of functions if(firstString.compareTo(secondString) < 0){ System.out.println(firstString + " " + secondString); } else{ System.out.println(secondString + " " + firstString); } return; }}

Answers

Answer:

Following are the code to the given question:

import java.util.Scanner;//import package

public class OrderStrings // defining a class OrderStrings  

{

   public static void main(String[] args) //defining a main method

   {

       Scanner scnr = new Scanner(System.in);//defining a Scanner class object  

       String firstString;//defining a String variable

       String secondString; //defining a String variable

       firstString = scnr.next();//input value

       secondString = scnr.next();//input value

       if (firstString.compareTo(secondString) < 0)//use if to compare sting value

           System.out.println(firstString + " " + secondString);//print sting value  

       else//else block

           System.out.println(secondString + " " + firstString);//print sting value

   }

}

Output:

rabbits capes

capes rabbits

Explanation:

In this code a class "OrderStrings" is defined inside the class the main method is defined that declares the two string variable that uses the input method to input the string value and after input, it uses the conditional statement. Inside this compareTo method is declared that compare string value and prints the string value.

solve(-8/3)+7/5 please answer​

Answers

Answer:

hope this will help you more

Hey ! there

Answer:

-19/15 is the answer

Explanation:

In this question we are given two fraction that are -8/3 and 7/5. And we have asked to add them .

Solution : -

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 8}{3} + \dfrac{7}{5} [/tex]

Step 1 : Taking L.C.M of 3 and 5 , We get denominator 15 :

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 8(5) + 7(3)}{15} [/tex]

Step 2 : Multiplying -8 with 5 and 7 with 3 :

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 40 + 21}{15} [/tex]

Step 3 : Solving -40 and 21 :

[tex]\quad \: \dashrightarrow \qquad \: \red{\underline{ \boxed{ \frak{\dfrac{ - 19}{15} }}}} \quad \bigstar[/tex]

Henceforth , -19/15 is the answer .

#Keep Learning

Can you suggest a LinkedIn Helper (automation tool) alternative?

Answers

Answer:

Have you tried LinkedCamp alternative to LinkedIn Helper?

Well, LinkedCamp is a super-efficient cloud-based LinkedIn Automation Tool that empowers businesses and sales industries to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.

Some other LinkedIn automation tools are:

Meet Alfred Phantombuster WeConnect ZoptoExpandi

Hope you find it useful.

Good luck!

command create database in oracle database ::((

Answers

Answer:

kdkskskiisidiodoosooddodod

Your dashboard should show the sum and average as two separate columns. If you use measure names as the column field, what should you use for the marks

Answers

Answer:

Hence the answer is a sum.

Explanation:

Here the statement shows that the dashboard should show the sum and average as two separate columns if we name measure names because the column field then for marks we'll use the sum. Since the sum displays the sum of the values of all the fields, which refers to the marks of the person.

Therefore the answer is a sum.

If we use measure names as the column field, we should use "the sum".

A set of cells that are support equipment on about a similar vertical line, is considered as a column.

Usually, the name of the user or a client represents a field column, while the total and sometimes even averaging columns in our dashboards or screen are different.When using a summation of total summary, perhaps the column field (title), as well as its amount and averaging marking, are indicated.

The preceding reply is thus right.

Learn more:

https://brainly.com/question/17271202

Computer data that is suitable for sound​

Answers

Answer:

Answer:In this context sound data is stored and transmitted in an analog form. Since computers represent data in digital form, (as bits and bytes) the

What is machine learning

Answers

Answer:

machine learning is the ability for computers to develop new skills and algorithms without specific instructions to do so.

Machine learning is a branch of artificial intelligence (AI) and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy.

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses, it does determine which systems are active on the network and what services they offer or what ports are available

Answers

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

Write a program that reads in the size of the side of a square and then prints a hollow square of that size out of asterisks and
blanks. Your program should work for squares of all side sizes between 1 and 20. For example, if your program reads a size of 5, it
should print

Answers

Answer:

Explanation:

#include <iostream>

using std::cout;

using std::endl;  

using std::cin;  

int main()

{

int side, rowPosition, size;

cout << "Enter the square side: ";

cin >> side;

size = side;

while ( side > 0 ) {

rowPosition = size;

 while ( rowPosition > 0 ) {

if ( size == side || side == 1 || rowPosition == 1 ||  

rowPosition == size )

cout << '*';

else

cout << ' ';

--rowPosition;

}  

cout << '\n';

--side;

}

cout << endl;

return 0;

}

Write a partial class that shows a class constant and an instance method. Write an instance method that converts feet to inches using a class constant representing the number of inches in one foot. The value passed to the method represents the distance in feet.

Answers

Answer:

Please the code snippet below, the code was writen in Kotlin Language

Explanation:

const val inches:Int= 12 .   //This is the const value

fun main(args: Array<String>) {

 //this will ask the user for input

   print("Enter a number")            

  //this will do the conversion

var valueInFeet= Integer.valueOf(readLine())*inches

   print("The value in feet is $valueInFeet feet(s)")  

   }

Which of the following was one reason why electronic (computer-based) information sharing was challenging in the not too distant past?
a. Individuals and/or members of organizations did not speak the same language.
b. Hardware and software applications on either end could not talk to one another.
c. The most powerful computers were owned by large companies.
d. Organizations needed to protect information for competitive advantage.

Answers

Answer:

B. Hardware and software applications on either end could not talk to one another.

Explanation:

The answer to this question is that making connection to the internet used to be very slow, it's operation was difficult and so was its maintenance. Therefore they could be said to be unreliable at the time making electronic information sharing difficult as well as challenging. From this explanation the right answer to this question is answer option b.

Thank you.

That's the code that's was already provided with the assignment
// Program takes a hot dog order
// And determines price
using System;
using static System.Console;
class DebugFour1
{
static void Main()
{
const double BASIC_DOG_PRICE = 2.00;
const double CHILI_PRICE = 0.69;
const double CHEESE_PRICE = 0.49;
String wantChili, wantCheese;
double price;
Write("Do you want chili on your dog? ");
wantChilli = ReadLine();
Write("Do you want cheese on your dog? ");
wantCheese = ReadLine();
if(wantChili = "Y")
if(wantCheese = "Y")
price == BASIC_DOG_PRICE + CHILI_PRICE + CHEESE_PRICE;
else
price == BASIC_DOG_PRICE + CHILI_PRICE;
else
if(wantCheese = "Y")
price = BASIC_DOG_PRICE;
else
price == BASIC_DOG_PRICE;
WriteLine("Your total is {0}", price.ToString("C"));
}
}

Answers

Answer:

Code:-

// Program takes a hot dog order

// And determines price  

using System;

using static System.Console;  

class DebugFour1

{

   static void Main()

   {

       const double BASIC_DOG_PRICE = 2.00;

       const double CHILI_PRICE = 0.69;

       const double CHEESE_PRICE = 0.49;

       String wantChili, wantCheese;

       double price;

       Write("Do you want chili on your dog? ");

       wantChili = ReadLine();

       Write("Do you want cheese on your dog? ");

       wantCheese = ReadLine();

       if (wantChili == "Y")

       {

           if (wantCheese == "Y")

               price = BASIC_DOG_PRICE + CHILI_PRICE + CHEESE_PRICE;

           else

               price = BASIC_DOG_PRICE + CHILI_PRICE;

       }

       else

       {

           if (wantCheese == "Y")

               price = BASIC_DOG_PRICE + CHEESE_PRICE;

           else

               price = BASIC_DOG_PRICE;

       }

       WriteLine("Your total is {0}", price.ToString("C"));

   }

}

let's have a class named Distance having two private data members such as feet(integer), inches(float), one input function to input values to the data members, one Display function to show the distance. The distance 5 feet and 6.4 inches should be displayed as 5’- 6.4”. Then add the two objects of Distance class and then display the result (the + operator should be overloaded). You should also take care of inches if it's more than 12 then the inches should be decremented by 12 and feet to be incremented by 1.

Answers

Answer:

Humildade

Ser justo (Fair Play)

Vencer independente

In Interactive Charting, which chart type allows you to chart the current spread between a corporate bond and a benchmark government bond?
a. Price
b. Price Impact
c. Bond Spread
d. Yield Curve

Answers

Answer:

c. Bond Spread

Explanation:

An interactive chart is used to show all the details in the chart and the user can extend or shrink the details that is presented in the charts by using the slider control.

The bond spread in an interactive is a chart that is used to compare and chart the current spread between the corporate bond as well as the benchmark government bond.

In Interactive Charting, the chart type that give room for charting the current spread between a corporate bond and a benchmark government bond is C:Bond Spread.

An interactive charts serves as a chart that give room to the user to carry out zooming actions as well as hovering a marker to get a tooltip and avenue to choose variable.

One of the notable type of this chart is Bond Spread, with this chart type, it is possible to charting the current spread that exist between a corporate bond as well as benchmark government bond.

Therefore, option C is correct because it allows charting of the current spread between a corporate bond.

Learn note about interactive charts at:

https://brainly.com/question/7040405

Assume myString and yourString are variables of type String already declared and initialized. Write ONE line of code that sets yourString to the first character and the last character of myString added to myString variable.

Answers

Answer:

line of code :

newString=myString+myString.charAt(0)+myString.charAt(myString.length()-1);

Explanation:

In Java, the + is used for concatenation

method

charAt() will return the character from the given index from string

myString.charAt(0) will return E

myString.charAt(myString.length()-1)

Connie works for a medium-sized manufacturing firm. She keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer. Connie is employed as a __________. Hardware Engineer Computer Operator Database Administrator Computer Engineer

Answers

Answer: Computer operator

Explanation:

Following the information given, we can deduce that Connie is employed as a computer operator. A computer operator is a role in IT whereby the person involved oversees how the computer systems are run and also ensures that the computers and the machines are running properly.

Since Connie keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer, then she performs the role of a computer operator.

The subroutines/function calls you need to call to pass an application message down to the transport layer is called the

Answers

Answer:

"TCP/IP library" is the appropriate answer.

Explanation:

A communications protocol that always connects to yet another system or device and guarantees transmissions were also correctly converted to digital signals or received, is termed as TCP/IP.Technology can also do a variety of things on its own and. However, when you speak among each other devices' maximum throttle emerges.

The computer that is used in scientific research is ........​

Answers

Answer:

supercomputers are the computer that is used in scientific research.

Answer:

super computer is the right answer

Define a class named Point with two data fields x and y to represent a point's x- and y-coordinates. Implement the Comparable interface for the comparing the points on x-coordinates. If two points have the same x-coordinates, compare their y-coordinates. Define a class named CompareY that implements Comparator. Implement the compare method to compare two points on their y-coordinates. If two points have the same y-coordinates, compare their x-coordinates. Randomly create 100 points and apply the Arrays.sort method to display the points in increasing order of their x-coordinates, and increasing order of their y-coordinates, respectively.

Answers

Answer:

Here the code is given in java as follows,

For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.

Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD

Answers

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

When implementing a 1:1 relationship, where should you place the foreign key if one side is mandatory and one side is optional? Should the foreign key be mandatory or optional?

Answers

Answer:

When implementing a 1:1 relationship, the foreign key should be placed on the optional side if one side is mandatory and one side is optional.  

When this is implemented, the foreign key should be made mandatory.

Explanation:

A foreign key (FK) is a primary key (PK) in relational databases.  It is used to establish a relationship with a table that has the same attribute with another table in the database.  A mandatory relationship exists when the foreign key depends on the parent (primary key) and cannot exist without the parent.  A one-to-one relationship exists when one row in a data table may be linked with only one row in another data table.

Write a class Example() such that it has a method that gives the difference between the size of strings when the '-' (subtraction) symbol is used between the two objects of the class. Additionally, implement a method that returns True if object 1 is greater than object 2 and False otherwise when the (>) (greater than) symbol is used. For example: obj1

Answers

Answer:

Here the code is given as follows,

Explanation:

class Example:

   def _init_(self, val):

       self.val = val

   def _gt_(self, other):

       return self.val > other.val

   def _sub_(self,other):

       return abs(len(self.val) - len(other.val))

def main():

   obj1 = Example('this is a string')

   obj2 = Example('this is another one')

   print(obj1 > obj2)

   print(obj1 - obj2)

main()

Output:-

..............is a piece of hardware used to provide data and instructions to a computer used for interaction and control. *
Output device.
Processing.
input device.
All of above. ​

Answers

Answer:

output

Explanation:

it can be seen and touched

Please use thread to complete the following program: one process opens a file data.txt, then creates a thread my_thread. The job of the thread my_thread is to count how many lines exist in the file data.txt, and return the number of lines to the calling process. The process then prints this number to the screen.
Basically, you need to implement main_process.c and thread_function.c.
Basic structure of main_process.c:
int main ()
{
Open the file data.txt and obtain the file handler fh;
Create a thread my_thread using pthread_create; pass fh to my_thread;
Wait until my_thread terminates, using pthread_join;
Print out how many lines exist in data.txt.}
Basic structure of thread_function.c:
void *count_lines(void *arg)
{
Obtain fh from arg;
Count how many lines num_lines exist in fh;
Close fh;
Return num_lines
}

Answers

Answer:

Here is the code:-

//include the required header files

#include<stdio.h>

#include<pthread.h>

// method protocol definition

void *count_lines(void *arg);

int main()

{

    // Create a thread handler

    pthread_t my_thread;

    // Create a file handler

    FILE *fh;

    // declare the variable

    int *linecnt;

    // open the data file

    fh=fopen("data.txt","r");

// Create a thread using pthread_create; pass fh to my_thread;

    pthread_create(&my_thread, NULL, count_lines, (void*)fh);

    //Use pthread_join to terminate the thread my_thread

    pthread_join( my_thread, (void**)&linecnt );

    // print the number of lines

printf("\nNumber of lines in the given file: %d \n\n", linecnt);

    return (0);

}

// Method to count the number of lines

void *count_lines(void *arg)

{

    // variable declaration and initialization

    int linecnt=-1;

    char TTline[1600];

    //code to count the number of lines

    while(!feof(arg))

    {

         fgets(TTline,1600,arg);

         linecnt++;

    }

    pthread_exit((void *)linecnt);

    // close the file handler

    fclose(arg);

}

Explanation:

Program:-

Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of

Answers

Answer:

confidentiality

Explanation:

Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of

This type of security concept is an example of confidentiality. Thus, option B is correct.

What is security?

Security is the capacity to withstand possible damage from other individuals by placing restrictions on their right to act freely. The term security is the absence of threat or a sense of safety.

Any uncovered danger or weakness in any technology that could be exploited by criminals to compromise equipment or knowledge is a security threat.

It has to do with Alice’s ability to decide on their own how if, and why people exploit individual data if it is being sent to bob. To ensure human rights, welfare, and consciousness, solitude must be protected. People are able to independently create their own personalities.

Therefore, option B is the correct option.

Learn more about security, here:

https://brainly.com/question/15278726

#SPJ2

The question is incomplete, the complete question is:

a. message integrity

b. confidentiality

c. availability

d. non-repudiation

e. authentication

Data representation and interactivity are important aspects of data visualization.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Data visualization are defined as the representation of the data and information in graphical way. The data visualization tool uses charts, diagrams, graphs, maps, etc. to represent and visualized the information and understand the patter or trend in the data.

It is an effective way to interact with the user and works likes a form of a visual art.

Thus interactivity and data representations are the two important aspect of the data visualization.

Hence, the answer is true.

What are the LinkedIn automation tools you are using?

Answers

Answer:

Well, for me I personally use LinkedCamap to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.

Some other LinkedIn automation tools are;

ExpandiMeet AlfredPhantombusterWeConnectLinkedIn Helper

Hope this helps!

Add (total) all the number in the list (below) using a for loop, but skip over the number at index 3.
numbers = [10,20,30,40,50,60,100]

Answers

Answer:

The program in Python is as follows:

numbers = [10,20,30,40,50,60,100]

total = 0

for i in range(len(numbers)):

   if i != 3:

       total+=numbers[i]

print(total)

Explanation:

This initializes the list

numbers = [10,20,30,40,50,60,100]

Set total to 0

total = 0

This iterates through numbers

for i in range(len(numbers)):

This ensures that the index 3, are not added

   if i != 3:

       total+=numbers[i]

Print the calculated sum

print(total)

Write a method swapArrayEnds() that swaps the first and last elements of its array parameter. Ex: sortArray

Answers

I understand you want a function that swaps the first and last element of an array so that the first element takes the last one's value and vice versa.

Answer and Explanation:

Using Javascript programming language:

function swapArrayEnds(sortArray){

var newArray= sortArray.values();

var firstElement=newArray[0];

newArray[0]=newArray[newArray.length-1];

newArray[newArray.length-1]=firstElement;

return newArray;

}

var exampleArray=[2, 5, 6, 8];

swapArrayEnds(exampleArray);

In the function above we defined the swapArray function by passing an array parameter that is sorted by swapping its first and last element. We first get the elements of the arrayvusing the array values method. We then store the value of the first element in the variable firstElement so that we are able to retain the value and then switch the values of the first element before using the firstElement to switch value of the last element. We then return newArray and call the function.

Other Questions
9. Mariah has 28 centimeters of reedand 10 meters of reed for weavingbaskets. How many meters of reeddoes she have? Write your answer as adecimal and explain your answer. Paragraph to write to my girl????? 3. How do Christian beliefs about God/ ultimate reality, human nature, the world, and the ultimate goal or purpose of human existence compare with those of the closely related religions of Judaism and Islam What do you think Joses grandmother meant by saying that the bread was too dense? What other things can you think of that are dense? What is the importance of Philippine folkdance in your life as a Filipino Infrared radiation from young stars can pass through the heavy dust clouds surrounding them, allowing astronomers here on Earth to study the earliest stages of star formation, before a star begins to emit visible light. Suppose an infrared telescope is tuned to detect infrared radiation with a frequency of 4.39 THz. Calculate the wavelength of the infrared radiation. During a party, Eli loses a bet and is forced to drink a bottle of lemon juice. Not long thereafter, he begins complaining of having difficulty breathing, and his friends take him to the local emergency room. His blood pH is 7.28. What does this mean Will give brainliest!!!2.6(5.5p 12.4) = 127.92p= Lucido Products markets two computer games: Claimjumper and Makeover. A contribution format income statement for a recent month for the two games appears below: Claimjumper Makeover Total Sales $ 110,000 $ 55,000 $ 165,000 Variable expenses 27,400 5,600 33,000 Contribution margin $ 82,600 $ 49,400 132,000 Fixed expenses 93,840 Net operating income $ 38,160 Required: 1. What is the overall contribution margin (CM) ratio for the company? 2. What is the company's overall break-even point in dollar sales? 3. Prepare a contribution format income statement at the company's break-even point that shows the appropriate levels of sales for the two products. help me solve the simultaneous linear inequalities Stars have different colors. What causes stars to have colors?A. locationB. temperatureC. oxygenD. carbon dioxide solve the simultaneous equation: x-y=2 xy=36 Indicate in standard form the equation of the line passing through the given points, writing the answer in the equation box below. G(4, 6), H(1, 5) Retained earnings, December 31, 2012 $311,900 Cost of equipment purchased during 2013 30,000 Net loss for the year ended December 31, 2013 4,550 Dividends declared and paid in 2013 15,200 Decrease in cash balance from January 1, 2013, to December 31, 2013 12,800 Decrease in long-term debt in 2013 15,900 Required:From the above data, calculate the retained earnings balance as of December 31, 2013. (Negative amounts should be indicated by a minus sign.) Jen recently rode her bicycle to visit her friend who lives 6 miles away. On her way there, her average speed was 8 miles per hour faster than on her way home. If jenspent a total of 2 hours bicycling find the two rates. what is the product of ten and the sum of two and a number is five times the number What is the narrator relationship to Maggie? The coordinate plane below represents a city. Points A through F are schools in the city.graph of coordinate plane. Point A is at negative 5, 5. Point B is at negative 4, negative 2. Point C is at 2, 1. Point D is at negative 2, 4. Point E is at 2, 4. Point F is at 3, negative 4.Part A: Using the graph above, create a system of inequalities that only contains points D and E in the overlapping shaded regions. Explain how the lines will be graphed and shaded on the coordinate grid above. (5 points)Part B: Explain how to verify that the points D and E are solutions to the system of inequalities created in Part A. (3 points)Part C: Timothy can only attend a school in his designated zone. Timothy's zone is defined by y < 3x 3. Explain how you can identify the schools that Timothy is allowed to attend We can use SOH-CAH-TOA forA. Any triangle everB. Non-right triangle onlyC. right triangle onlyD. Never ANSWER ASAP IM BEING TIMEDIF I GET AN A ON THIS I WILL DO ANOTHER POINT FREE DROP, PLEASE SHOW YOUR WORK The lengths of three sides of a quadrilateral are shown below:Side 1: 1y2 + 3y 6Side 2: 4y 7 + 2y2Side 3: 3y2 8 + 5yThe perimeter of the quadrilateral is 8y3 2y2 + 4y 26.Part A: What is the total length of sides 1, 2, and 3 of the quadrilateral? (4 points)Part B: What is the length of the fourth side of the quadrilateral? (4 points)Part C: Do the answers for Part A and Part B show that the polynomials are closed under addition and subtraction? Justify your answer. (2 points)