Select what's true about packet sniffers. Check All That Apply Legitimate sniffers are used for routine examination and problem detection.Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.Unauthorized sniffers are used to steal information. Packet sniffers are relatively easy to detect.Packet sniffers are relatively easy to detect. Packet sniffers use viruses to capture data packets.

Answers

Answer 1

Answer:

-Legitimate sniffers are used for routine examination and problem detection.

-Unauthorized sniffers are used to steal information.

Explanation:

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Legitimate packet sniffers are used for routine examination and problem detection while Unauthorized packet sniffers are used to steal information.

Answer 2
Final answer:

Packet sniffers serve as network diagnostic tools used by administrators and can be used illicitly to steal network data. They are not easy to detect and don't use viruses to capture data.

Explanation:

A packet sniffer can be referred to as a computer software or hardware designed to intercept and log traffic on a digital network. They function as network diagnostic tools used by administrators to troubleshoot and optimize network operations. Legitimate sniffers are indeed used for routine examination and problem detection. On the other hand, unauthorized sniffers are illicitly used to steal information by capturing sensitive data traveling over the network. Unfortunately, contrary to intuition, packet sniffers are not relatively easy to detect because data transmission over networks is typically public. Furthermore, packet sniffers do not use viruses to capture data packets, they simply log the packets moving through networks.

Learn more about Packet Sniffers here:

https://brainly.com/question/32272138

#SPJ6


Related Questions

Citing Wikipedia as a reference is not considered a good practice because 1.leverages a neutral point of view. 2.hosts unopinionated entries. 3.is proprietary in nature. 4.is not original source material, 5.but rather a clearinghouse of information. 5.offers limited content.

Answers

Answer:

4. is not original source material,

5. but rather a clearinghouse of information.

Explanation:

Citing Wikipedia as a reference is not considered a good practice because Wikipedia is not original source material but rather a clearinghouse of information.

Wikipedia is a free online encyclopedia hosted by the Wikimedia foundation. Informations on the website are basically created and edited by volunteers around the world.

A TV game show Jeopardy! contestant who uses a strategy to seek out the hidden Daily Double questions, which are usually the three highest-paying and most difficult questions in the categories instead of the more common approach of selecting a single category and selecting questions gradually increasing in the degree of difficulty, has been highly successful. What is this an application of?

Answers

Answer:

Game theory.

Explanation:

In the TV game show Jeopardy! Game theory allows contestant to use a strategy to seek out the hidden Daily Double questions, instead of the more common approach of selecting a single category and selecting questions gradually increasing in the degree of difficulty.

Game theory is the process of using mathematical model in the study of strategic interaction between two or more players in a game or situation having laid down rules and outcomes.

The normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process. Group of answer choices True False

Answers

Answer:

The normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process is true.

Explanation:

Given statement is "The normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process".

To check whether the given statement is true or false :Given statement is true.FOR:

By using the application to Database Design the normalization process is true with the given statement.

By following rules and appropriate normalization methods, normal forms higher than the third  normal form.

Hence the normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process is true

Write the definitions of two classes Day and Night. Both classes have no constructors, methods or instance variables. Note: For this exercise, please do not declare your classes using the public visibility modifier.

Answers

Answer:

class Day

{

}  

class Night

{

}

Explanation:

Given

Two classes named: Day and Night

Requirement: Both classes have no constructors, methods or instance variables. should not be declared using the public visibility modifier.

The syntax to define a class in object oriented programming is

modifier class classname {

 // Constructor

 constructor(variablename) { ......}

 // Methods

 methods() { ... }

 ...

}

Access modifiers (or access specifiers) are keywords in object-oriented languages that set the accessibility of classes, methods, and other members. Examples are private, public, protected, etc.

Going by the syntax above to define class Day

Day

private class Day{

 // Constructor

 constructor(duration)

{

this.duration = duration;

}

 // Methods

CalculateDate() { ... }

}

But the question states that both classes have no constructors, methods or instance variables. should not be declared using the public visibility modifier.

So, class Day will be defined as follows

class Day

{

}

It could also be declared using visibility modifiers other than public modifier.  So, class Day will be defined as follows

private class Day

{

}

and

protected class Day

{

}

Similarly, class Night can be defined as follows

class Night

{

}

private class Night

{

}

and

protected class Night

{

}

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the internet. Why can't you access the server?

Answers

Answer:

The answer is "private Ip addresses were not be accessed over the Network".

Explanation:

Private network addresses were not distributed on the web and also no data from either the network will be sent to them, it only was intended to operate inside of the home network.

It includes the appropriate subnet the IP addresses. This network also enables you to link to many other sites.  This network will use its IP address to access the home device, but it can not interact with the network.

As part of the National Institute of Standards and Technology (NIST) program, the Security Content Automation Protocol (SCAP) identifies standards and protocol implemented to establish a range of different automated compliance tools and scanners. One of the different tools available is the ______________________, which deploys a privileged account to authenticate on the target system, and it eventually scans the system to ascertain compliance with an identified set of configuration requirements.

Answers

Answer:

Authenticated configuration scanner.

Explanation:

As part of the National Institute of Standards and Technology (NIST) program, the Security Content Automation Protocol (SCAP) identifies standards and protocol implemented to establish a range of different automated compliance tools and scanners.

One of the different tools available is the authenticated configuration scanner which deploys a privileged account to authenticate on the target system, and it eventually scans the system to ascertain compliance.

Answer:

The answer is authenticated configuration scanner.

Explanation:

Authenticated configuration scanner is one of the tools identified by Security Content Automation Protocol (SCAP) AND  which deploys a privileged account to authenticate on the target system eventually scanning the system to ascertain compliance with an identified set of configuration requirements.

This tool is used on computer systems to identify various system vulnerabilities to authentications.

Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as input

Answers

Answer:

following are the program to this question:

#include <iostream>  //defining header file

using namespace std;  

int main() //defining main method

{  

   int arr[10],n,sum=0,i; //defining integer variable

   float avg; //defining float variable  

   cout<<"Enter total elements you want to insert in array: "; //print message

    cin>>n; //input value

   cout<<"Enter numbers: "; //print message

   for(i=0;i<n;i++) //define loop to input value from user

   {

       cin>>arr[i]; //input values

   }

   for(i=0;i<n;i++) //defining loop for calculate average

   {

       sum=sum+arr[i]; //add number  

       avg=sum/n; // calculate average and holds its value

   }

   cout<< "Average number: "<<avg; //print average

   for(i = 0;i < n; i++)//defining loop to find largest value  

   {

      if(arr[0] < arr[i]) // check condition for largest number

      {

          arr[0] = arr[i]; //find number and store its value

      }

   }

   cout << endl<<"Largest element = " << arr[0]; //print its value

   return 0;  

}  

Output:

Enter total elements you want to insert in array: 5

Enter numbers: 10

20

0

5

1

Average number: 7

Largest element = 20

Explanation:

In the given question is incomplete, in this question, we input an array and prints its average  and largest number, which can be defined as follows:

Defining an array, that is "arr" in this array input values from the user end. In the next two for loop is declared, the first loop uses integer and float variable, that is "sum and avg", the sum variable adds all array element and the avg variable calculate its average value. In the next for loop, the if block is used, that calculates its largest number and prints its value.

Bob has been assigned to set up a digital certificate solution for use with e-mail. One of the requirements he has been given is to ensure that the solution provides for third-party authentication. Which of the following should he choose

PGP

X.509

Kerberos

Sesame

Answers

Answer:

B : X.509

Explanation:

(08.03 MC) Maya is a senior in high school and would like to pursue a career in web design. She needs more information about what skills and level of education are needed. What type of resource would be most helpful? (6 points)

Answers

Answer:

Career resource website

Explanation:

In this case, Maya needs a career resource website as it would help her with the necessary information about the skills and educational level required to pursue a degree in web design. A career resource website is a website that has tips and articles on several areas of career enhancement and counselling services. However, some offer these services for a fee.

Answer:

B

Explanation:I took the test LOL. It is Career resourse website. Hope it helps.

Write a SELECT statement that returns six columns: VendorID From the Invoices table InvoiceDate From the Invoices table InvoiceTotal From the Invoices table VendorTotal The sum of the invoice totals for each vendor VendorCount The count of invoices for each vendor VendorAvg The average of the invoice totals for each vendor The result set should include the individual invoices for each vendor.

Answers

Answer:

SELECT VendorID, InvoiceDate, InvoiceTotal, SUM(InvoiceTotal) OVER (PARTITION BY VendorID) AS VendorTotal, COUNT(InvoiceTotal) OVER (PARTITION BY VendorID) AS VendorCount, AVG(InvoiceTotal) OVER (PARTITION BY VendorID) AS VendorAvg FROM Invoices;

Explanation:

The select query to invoices table is to return six column;

First column is VendorID

Second column is InvoiceDate

Third column is InvoiceTotal

Fourth is the sum of sum of the invoice totals for each vendor represented as VendorTotal

Fifth is the count of invoices for each vendor represented as VendorCount

Sixth is the average of the invoice totals for each vendor represented as VendorAvg

The result set should include the individual invoices for each vendor is the reason why we use VendorID in the query.

The Watch Window is observable: a) only when the complete model is observable on the screen.b) only in the same worksheet of a workbook. c) across different worksheets of a workbook. d) across different workbooks in the same folder.

Answers

Answer:

Option c is the correct answer for the above question.

Explanation:

The watch window is an important feature of the excel sheet or spreadsheet software which is used to gives the features to see the important cells or data into a separate window. When any user wants to put the record of an important cell on a single glance, then he can do it with the help of the watch window.

This is a feature which is used in all the worksheet of the same workbook. SO option c is the correct answer, while the other is not because:-

Option a states about the complete software which is not correct.Option b states about the same worksheet only, but it is available on the whole workbook.Option d states about all workbooks, but it is available on the same workbook.

Final answer:

The Watch Window in Microsoft Excel allows users to track cell values and formulas across different worksheets within a workbook.

Explanation:

The Watch Window in Microsoft Excel is a powerful feature that allows users to keep track of certain cells and their formulas across different areas in a workbook. Specifically, it provides the ability to observe cell values and formulas even when navigating away from the cell.

To answer the student's question, the Watch Window is observable c) across different worksheets of a workbook. This means you can monitor the value of a cell regardless of which sheet you are currently viewing in the workbook.

The ability to track cells is not limited to the visibility of the complete model on the screen, as it displays the cell value and location even when you are working on a different part of the workbook. Additionally, the Watch Window is not restricted to viewing within the same worksheet or across different workbooks in the same folder.

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multi-mode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling.
Which Ethernet standard meets these guidelines? (Choose two.)

a.10GBaseSR
b.10BaseFL
c.10GBaseER
d.1000BaseSX
e.1000BaseT

Answers

Answer:

a.10GBaseSR

d.1000BaseSX

Explanation:

In Computer Networking, The 1000BaseSX is a type of cabling standard used for deploying Gigabit Ethernet networks. The SX in 1000BaseSX denotes short, and it implies that it's for use with transmissions having short-wavelength over short runs of fiberoptic cabling in a Gigabit Ethernet networks.

The SR in 10GBaseSR denotes short-range, it is exclusively used for multi-mode fiberoptic medium that uses 850nm lasers having LC duplex connector and DDM with a maximum transmission distance of 300meters in a Gigabit Ethernet networks.

Your application needs to process large numbers of job requests and you need to ensure that they are processed in order, and that each request is processed only once. How would you deploy SQS to achieve this end?

a.Use the SetOrder attribute ensure sequential job processing.
b.Convert your standard queue to a FIFO queue by renaming your standard queue with the .fifo suffix.
c. Use an SQS FIFO queue to process the jobs.
d.Configure FIFO delivery in a standard SQS queue.

Answers

Answer:

Use an SQS FIFO queue to process the jobs.

Explanation:

SQS stands for Simple Queue Service. It is a programmatic web service that is used to process and store information between computers. SQS was designed to build applications to prevent requests from staying too long on a queue. They process large number of requests at least once and in a sequential order. SQS removes messages permanently from the queue that have been there for a maximum period of time. The default retention period is usually 240 hours but you can reset it to a time to suit your desire.  Using FIFO( First-in, First-out) queue, messages are processed exactly once and it supports 300 messages per second. Therefore, using an SQS FIFO queue to process messages will ensure that messages are processed in order and only once.

A network administrator is working on the implementation of the Cisco Modular Policy Framework on an ASA device. The administrator issues a clear service-policy command. What is the effect after this command is entered?

A. All class map configurations are removed.
B. All service policy statistics data are removed.
C. All service policies are removed.
D. All policy map configurations are removed.

Answers

Answer:

B. All service policy statistics data are removed.

Explanation:

When you issue the clear-service policy command on the Cisco Modular Policy Framework, what it does is to ensure that all statistics concerning service policy is totally eliminated from the system. This does not imply that all services policies are removed. It also does not remove all class or policy map configurations.

Write a program that accepts a time as an hour and minute. Add 15 minutes to the time

Answers

Answer:

The code is given below

hours = int(input("Enter time in hour: "))

minutes = int(input("Enter time in minute: "))

total time = (hours * 60) + (minutes + 15 )

total hours = int(total minutes  / 60)

minutes  = total hours/ 60

print("Hours: " + str(hours))

print("Minutes: " + str(minutes))

Write down the bit pattern to represent -3.75 assuming a version of this format, which uses an excess-16 format to store the exponent. Comment on how the range and accuracy of this 16-bit floating point format compares to the single precision IEEE 754 standard.

Answers

Answer:

Explanation:

find the solution below

What are ways to enter formula in Excel? Check all that apply

Answers

Final answer:

To enter formulas in Excel, one can type them directly or use the pointing method. AutoSum is a feature that can create formulas automatically, and keyboard shortcuts like Ctrl + Shift + Enter can apply formulas across multiple cells.

Explanation:

To enter a formula in Excel, you can type the formula directly into the cell by starting with an equal sign (=). This can include cell references, arithmetic operators, and constants. Another way to enter formulas is by using the pointing method, where you click on the cells you want to reference instead of typing them, which can help avoid typing errors. For example, to calculate Owner's Equity, you would type '=', click on cell D30, type '-', and then click on cell D60, followed by clicking the Enter check mark on the formula bar. Additionally, when using functions like AutoSum, Excel can automatically generate a formula. Simply select the destination cell, click the AutoSum button, and adjust the default range if necessary before confirming with the Enter check mark.

Remember that after entering a formula, if you want to apply it to multiple cells, you need to use the Ctrl + Shift + Enter shortcut instead of just hitting Enter to ensure it populates across the selected range. You can also use various keyboard shortcuts to streamline the data entry process in Excel, such as F1 to open the Help pane for more shortcuts.

2.Write an if /else if statement that carries out the following logic. If the value of variable quantityOnHand is equal to 0, display the message ''Out of stock''. If the value is greater than 0, but less than 10, display the message ''Reorder ''. If the value is 10 or more do not display anything.

Answers

Answer:

if(quantityOnHand == 0) { cout<<"Out of stock"; }

else if(quantityOnHand > 0 && quantityOnHand <10) { cout<<"Reorder "; }

else if(quantityOnHand >= 10){ }

See Explanation for comments

Explanation:

//This program segment is written in C++

//Only required segment is written

// Comments are used for explanatory purpose

// Program Segment starts here

/*

The following condition tests if quantityOnHand equals 0

If this condition is true, the program prints "Out of stock" without the quotes

*/

if(quantityOnHand == 0) { cout<<"Out of stock"; }

/*

The following condition tests if quantityOnHand  is greater than 0, but less than 10

If this condition is true, the program prints "Reorder " without the quotes

*/

else if(quantityOnHand > 0 && quantityOnHand <10) { cout<<"Reorder "; }

/*

The following condition tests if quantityOnHand  is greater than o equal to 10

If this condition is true, nothing is done

*/

else if(quantityOnHand >= 10){ }

// End of program segment

Assumption: The program assumes that variable quantityOnHand has already been declared

Which of the following is true of tape? Group of answer choices It is no longer used as a primary method of storage but is used most often for long-term storage and backup. It is used as a primary method of storage and for long-term storage and backup. It is no longer used for long-term storage and backup but is used most often as a primary method of storage. It is no longer used as a primary method of storage or for long-term storage and backup.

Answers

Answer:

It is no longer used for long-term storage and backup but is used most often as a primary method of storage.

Suppose two threads execute the following C code concurrently, accessing shared variables a, b, and c: Initialization int a = 4; int b = 0; int c = 0; Thread 1 Thread 2 if (a < 0) { b = 10; c = b-a; a = -3; } else { c = b + a; } What is the total number of possible values for c after both threads complete? You can assume that reads and writes of the variables are atomic and that the order of statements within each thread is preserved in the code generated by the C compiler?

Answers

Answer:

Therefore, there are 4 possible values for c after both threads complete

c = 4, 14, 3, 13

Explanation:

Initialization:

int a = 4;

int b = 0;

int c = 0;

Thread 1:

if (a < 0)

{

c = b - a;

}

else

{ c = b + a; }

Thread 2:

b = 10;

a = -3;

We have to consider all the possible cases.

Case 1: a = 4, b = 0, c = 0

if (a < 0) false

{

c = b - a;

}

else

{ c = b + a; }  c = 0 + 4 = 4

c = 4

Case 2: a = 4, b = 10, c = 0

if (a < 0) false

{

c = b - a;

}

else

{ c = b + a; }  c = 10 + 4 = 14

c = 14

Case 3: a = -3, b = 0, c = 0

if (a < 0) true

{

c = b - a; c = 0 - (-3) = 3

}

else

{ c = b + a; }  

c = 3

Case 4: a = -3, b = 10, c = 0

if (a < 0) true

{

c = b - a; c = 10 - (-3) = 13

}

else

{ c = b + a; }  

c = 13

Therefore, there are 4 possible values for c after both threads complete

c = 4, 14, 3, 13

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users
Windows
Linux
Macintosh

Answers

Answer:

Linux

Explanation:

Linux is a family of open source operating system and can be easily modified and changed to meet its particular requirements. Linux is one the most used operating systems on servers, mainframe computers and even super computers. Being a free and open source system, it can be modified and distributed for both commercial and non commercial by anyone under the terms of its licence.

When the processor needs an instruction or data, it searches memory in this order: L1 cache, then L2 cache, then L3 cache (if it exists), then RAM — with a greater delay in processing for each level it must search.

Answers

Answer and Explanation:

Memory Cache speed the processes of the computer. It stores instruction and data. The computer has two types of memory cache

L1 cache, L2 cache, and L3 Cache i.e., Level 1, Level 2 and Level 3

L1 cache is built on the processor chip and has a minimal capacity.

L2 cache is slower than L1 and has a large capacity. Mostly processor uses ATC advanced transfer cache.

When the processor needs instruction, it searched in order L1 cache than L2 cache and L3. If any data or instruction is not found, then search slower speed medium such as a hard disk and optical disc.

Final answer:

Processor checks data or instruction first in the L1 cache, then L2, L3 cache and finally RAM. The time required to access data increases with each level, starting from the least latency in L1 cache to the most latency in RAM. This hierarchy is utilized for maintaining quick instruction execution.

Explanation:

The subject of this question is related to a computer processor and its memory hierarchy. In a processor, when an instruction or data is needed, it typically follows a sequential order for searching - first it checks L1 cache, if not found then it checks L2 cache, further the L3 cache and finally the RAM. Each level increases the delay in processing as the time required to access data increases from L1 cache to RAM.

This search order is utilized since the closest memory to the processor (L1 cache) has the least latency, and therefore provides the fastest access to data, while the furthest memory (RAM) has higher latency but typically larger size.

Therefore, by checking the closest memory levels first, the processor can keep instruction execution as rapid as possible.

Learn more about Processor Memory Hierarchy here:

https://brainly.com/question/31959355

#SPJ3

Regarding the excerpt, what synthesized information helps spread a message to a large audience? Check all that apply. taking advantage of technology being good at public speaking appearing on a television program speaking mostly to college students presenting at professional conferences

Answers

The question is incomplete! Complete question along with answer and step by step explanation is provided below.

Question:

Read the excerpt from News Articles about Bullying.

Aside from his website, Jaylen has appeared on numerous TV networks, chatted via Skype with college education students nationwide and spoken at the Florida Teachers Conference in Orlando in front of more than a thousand educators.

Regarding the excerpt, what synthesized information helps spread a message to a large audience? Check all that apply

1. taking advantage of technology

2. being good at public speaking

3. appearing on a television program

4. speaking mostly to college students

5. presenting at professional conferences

Answer:

The correct options are 1, 2, 3 and 5

Explanation:

In order to convey the message to a large audience, an individual can adopt certain measures that can ensure efficient spread of message.

Jaylen used technology (Skype) to chat with students nationwide, therefore, option 1 is correct.

Speaking in front of more than a thousand educators at the Florida Teacher Conference clearly suggests that Jaylen is good at public speaking, therefore, option 2 is correct.

Jaylen appeared on numerous TV networks as well as she presented at professional conferences which helps in spreading the message across a large audience, therefore, option 3 and 5 are also correct.

It is not necessary to speak to only college students, she can speak to students of all education levels to spread her message to large audience, therefore, option 4 is not correct.

Answer:

its 1,2,3, and 5

Explanation:

Match the job skills with the correct job role.

1.)Neil directs medical services in a
managed care organization.

2.)Rita compiles patient records in a medical facility.

3.)Carol formulates policies and provides
overall direction in a managed care organization.

4.)Abraham handles information requests
and prepares correspondence in a medical facility.

A.)medical secretary

B.)executive secretary

C.)medical services coordinator

D.)chief executive


Answers

Answer:

medical secretary---------Rita compiles patient records in a medical facility.

executive secretary-----------Carol formulates policies and provides

overall direction in a managed care organization.

medical services coordinator-----------Neil directs medical services in a

managed care organization.

chief executive-----------Abraham handles information requests

and prepares correspondence in a medical facility.

Explanation:

I am 80% sure this answer is correct.

Final answer:

Neil is a medical services coordinator, Rita is a medical secretary, Carol is a chief executive, and Abraham is an executive secretary. These matches are based on the job skills described for each individual.

Explanation:

The job skills should be matched with the correct job role as follows:

Neil directs medical services in a managed care organization: His job matches with C.) medical services coordinator.

Rita compiles patient records in a medical facility: Her job matches with A.) medical secretary.

Carol formulates policies and provides overall direction in a managed care organization: Her job matches with D.) chief executive

Abraham handles information requests and prepares correspondence in a medical facility: His job matches with B.) executive secretary.

Learn more about Job Matching here:

https://brainly.com/question/32111132

#SPJ2

What is the purpose of the following loop? int upperCaseLetters = 0; int position; String str = "abcdEfghI"; boolean found = false; for (position = 0; position < str.length() && !found; position++) { char ch = str.charAt(position); if (Character.isUpperCase(ch)) { found = true; } }

Answers

Answer:

See the explanation

Explanation:

Initialize a string called str and a boolean called found

Initializes a for loop that iterates through the str

Inside the for loop:

Gets the characters of the str and assigns them to the ch. Checks if the character is an uppercase or not. If an uppercase character found, updates the found as true and stops the loop.

For this example, the loop will stop when the character "E" is reached

Review the excerpt from the outline for the speech, "Organ Donation." What type of research do you think this student did to prepare for his speech? What quotes or other types of information did he include in his speech? Did he include source information?

Answers

Answer and Explanation:

Ethical, regulatory, policy and organizational issues relevant research would have been involved, deceased organ donors.

Answers will vary. In organ donor research, it involved in preparation. This type of research includes the transplantation of organs. The research purpose is to improve the outcomes and transplanting of the organ. Quotations from speech should list.The quotation list may or may not include source information.

Answer:

kalso is right, I dont know why they have such low amount of stars bc they are right sooo just saying

Explanation:

"two stations communicate via a 1-mbps satellite link with a propagation delay of 279 ms. the satellite serves merely to transmit data received from on station to another, with negligible switching delay. using hdlc frames of 1024 bits with 3-bit sequence numbers, what is the maximum possible data throughput, that is, what is the amount of data bits transferred using hdlc frame per second?"

Answers

Answer:

The answer is "[tex]\bold{11964.9 \times 10^3 kbps}[/tex]"

Explanation:

The

[tex]t_{pd} = 279 \ ms[/tex]

[tex]t_{single} = \frac{Bits \ HDLC} {Link \ rate}\\[/tex]

[tex]t_{single} = \frac{1024 }{10^6} \ ms\\[/tex]

Transmit station can controls at most 7 frames in 3 bit sequence and without act total time to transmit.

Total time (t) = time for first frame + 2(frame delays)

[tex]t=\frac{1024}{10^6}+ 279+279\\\\t= 0.571 m[/tex]

during the time t frame sent = 7 So, data on each frame is

frame = frame size - ( flag + address+control+fcs bits +flag hits)

frame = 1024 -(8+8+8+16+8)

frame= 976 bits frame

through put =  [tex]\frac{7 \times 976}{0.571 \times 10^{-3}}\\[/tex]

through put = [tex]\frac{6832 \times 1000}{0.571}[/tex] = [tex]11964.9 \times 10^3[/tex] kbps

The maximum data throughput, considering HDLC frames and the satellite link's delay, is approximately 1830 bits per second.

To determine the maximum data throughput over the 1 Mbps satellite link with HDLC frames, we need to consider the propagation delay and the frame size.

1. **Frame Size and Throughput Calculation:**

  - HDLC frames have a payload of 1024 bits.

  - Including the HDLC overhead (typically 8 bits for flag and sequence numbers), the total frame size is 1032 bits.

2. **Propagation Delay:**

  - The propagation delay is 279 ms (milliseconds) or 0.279 seconds.

3. **Maximum Throughput Calculation:**

  - First, calculate the time taken to transmit one frame:

 [tex]\[ \text{Time to transmit one frame} = \frac{\text{Frame size in bits}}{\text{Link speed in bits per second}} = \frac{1032 \text{ bits}}{1 \text{ Mbps}} = 0.001032 \text{ seconds} \][/tex]

  - To find the maximum throughput, we consider the time to transmit one frame and the round-trip propagation delay:

   [tex]\[ \text{Maximum throughput} = \frac{\text{Frame size in bits}}{\text{Time to transmit one frame + 2 * Propagation delay}} \][/tex]

 [tex]\[ \text{Maximum throughput} = \frac{1024 \text{ bits}}{0.001032 \text{ s} + 2 \times 0.279 \text{ s}} = \frac{1024 \text{ bits}}{0.559 \text{ s}} \approx 1830 \text{ bits/second} \][/tex]

4. **Conclusion:**

  - The maximum possible data throughput, considering the HDLC frame size and the propagation delay, is approximately **1830 bits per second**. This represents the effective data transfer rate accounting for the transmission time of frames and the round-trip propagation delay of the satellite link.

Which of the following is an advantage of using an internal database? A. Data always remains current in internal databases. B. Highly sophisticated equipment and techniques are not required for maintaining internal databases. C. Internal databases can be accessed more quickly and cheaply than other information sources. D. Internal databases require less maintenance efforts. E. Information obtained from internal databases is almost always sufficient for making marketing decisions. 2 points

Answers

Answer:

The correct answer to the following question will be "Option C".

Explanation:

Internal databases include the digital customer as well as industry details sets collected via sources of information throughout the corporate network.

Marketing executives can quickly or easily access or interact with information throughout the database or repository to define commercial opportunities and challenges, execute projects, as well as quality assessments.The growing field offers a unique viewpoint, but the divisions are linked by the data or information.

The other options are not related to the advantages of the internal database. So that Option C is the right answer.

Which of the following loop conditions will read all the data in the file assuming that each line in the file contains two integer values, and you will read the first one into a variable named intOne, and the other into intTwo

Answers

Answer:

while(inFile >> intOne >> intTwo)

Explanation:

Options are missing but the line of code that does the illustration in the question is while(inFile >> intOne >> intTwo)

Considering two variables, intOne and intTwo

Suppose that a file location has been specified, the infile statement identifies file which could either be an external data or an in-stream data from which data should be read.

while(inFile >> intOne >> intTwo)

Declares a while loop, with the help of the inFile statement, values in the first column are entered into intOne while the second column are entered into intTwo through with the help of then input channel symbol (>>).

Survey Q. Non-scoring: What role is played in the team? (1 correct answer)



1. Product Owner/Product Specialist.



2. Team Facilitator/Scrum Master/Release Train Engineer/Coach.



3. Developer/Engineer/DevOps Engineer/Automation Engineer/Reliability Engineer.



4. Manual Tester/L1 support/L2 support.



5. Visual Designer/Interactive Designer/UI Expert.



6. Support Function

Answers

I really don’t kno the answer to this question sorry
Other Questions
Jeff is going to cut this shape out of a piece of paper. He will fold the paper on the dotted lines and connect all the edges. What solid will Jeff have when he is done?A)square prismB)square pyramidC)triangular prismEliminateD)triangular pyramid A round ball has a diameter of 10 inches. What is the approximate volume of the ball? Which of the following is not a physical property of elements?solubilityductilitycombustibilityo malleabilitybe What a wonderful world three things you discovered Convert the angle 0 = 230 to radians. Goods X and Y are complementary goods. A decrease in price of good X has occurred. In the market for good Y, this will lead to a decrease in price and a decrease in quantity. an increase in price and an increase in quantity. an increase in price and a decrease in quantity. a decrease in price and an increase in quantity. Which number line shows the correct placement of 20%, 1/3, and 2/3? Clark and Phil are each running to raise money. The amount of money (y), in dollars, they each raise is based on the distance (x), in miles, they each run. Clark has an initial donation that he has received regardless of how many miles he runs. The graphs model the amount of money each will raise based on the distance they each run. What is the unit rate for the person for whom the amount of money and the number of miles are proportionally related? A)$5.00 per mile B)$7.50 per mile C)$15.00 per mile D)$30.00 per mile According to MacGregor, what was the resultof introducing Japanese prints to Westernculture?A: It encouraged Western cultures to share their art with the Japanese.B: It encouraged the Japanese to adopt European art techniques.C: It influenced European and American art.D: It encouraged Europeans to isolate themselves. Billy has a collection of baseball cards that he has separated into two different value categories. His common cardsare worth $0.50 each, while his premium cards are worth $1.00 each. Together, Billy's entire baseball card collectionof 124 cards is worth $81.50.Which of the following systems of equations models Billy's baseball card collection? Farmer and Taylor formed a partnership with capital contributions of $250,000 and $300,000, respectively. Their partnership agreement calls for Farmer to receive a $90,000 per year salary. The remaining income or loss is to be divided equally. Assuming net loss for the current year is $25,000, the journal entry to allocate the net loss is:a. Debit Income Summary, $31,000; Debit Farmer, Capital, $35,500; Credit Taylor, Capital, $66,500.b. Debit Income Summary, $31,000; Credit Farmer, Capital, $15,500; Credit Taylor, Capital, $15,500.c. Debit Taylor, Capital, $66,500; Credit Income Summary, $31,000; Credit Farmer, Capital, $35,500.d. Debit Income Summary, $31,000; DebitTaylor, Capital, $35,500; Credit Taylor, Capital, $66,500.e. Debit Income Summary, $31,000; Credit Taylor, Capital, $15,500; Credit Farmer, Capital, $15,500. Clara wants to follow a diet that is high in carbohydrates. Which type of vegetables should Clara consume The type and frequency of security awareness training is contingent on the type of user. For instance, all users might be required to attend refresher training courses on an annual basis, whereas a vendor should be required to attend outside training only as outlined in the vendor-company contract.a. Trueb. False principal: $1000, annual interest rate: 4.8%, time: 2 yr PLZ HELP!!! List three cities in East Asia that are world financial centers. Which portion of the Space Race did the United States complete before the Soviet Union?launching a manned satellitelanding a man on the moonlaunching an unmanned satellitelanding a man on mars please help me ASAP !! The absorbance features observed in the visible spectrum for curcumin is a result of an allowed optical excitation of an electron from the -HOMO to the *-LUMO. What is the energy change for this electronic excitation based on the spectrum? (Hint: Energy and wavelength are related by the equation E = hc/.) h = 4.136 10-15 eV s c = 2.998 108 m/s Ware Co. produces and sells motorcycle parts. On the first day of its fiscal year, Ware issued $35,000,000 of five-year, 12% bonds at a market (effective) interest rate of 10%, with interest payable semiannually. Compute the following, presenting figures used in your computations: a. The amount of cash proceeds from the sale of the bonds. Use the tables of present values in Exhibit 5 and Exhibit 7. Round to the nearest dollar. $ b. The amount of premium to be amortized for the first semiannual interest payment period, using the interest method. Round to the nearest dollar. $ c. The amount of premium to be amortized for the second semiannual interest payment period, using the interest method. Round to the nearest dollar. $ d. The amount of the bond interest expense for the first year. Round to the nearest dollar. A study is conducted to determine whether sunshine affects depression. Eight individuals are given a questionnaire measuring depression immediately following a run of 10 consecutive days when the sun shone for over 80% of the daylight hours. The same individuals have their depression measured immediately following 10 consecutive days without any sunshine. The following data are collected. The higher the score the greater the depression.Individuals 1 2 3 4 5 6 7 8Sunshine 10 12 14 11 12 10 14 15No Sunshine 20 21 17 14 18 8 18 14Using the Wilcoxon signed ranks test to evaluate the data, with a = 0.052 tail, Tcrit =a.- 3c.33b.3d.4