Answer:
Formatting refers to the appearance or presentation of your essay.
Explanation:
Most essays contain at least four different kinds of text: headings, ordinary paragraphs, quotations and bibliographic references.
This component of the CPU is responsible for fetching the data, converting it, and de-converting
A) ALU
B) RAM
C) Control Unit
D) None of the above
In CPU there are two components name ALU and CU(Control unit) which ALU's function is to solve mathematic sequence and CU fuction is to vetch data to memory and manage commands and input & output.
#See pic for how the data proceed
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send a packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we
This project is based on SEED labs by Wenliang Du, Syracuse University.
get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure
a = IP()
a.dst '1.2.3.4
a.ttl = 3
b = ICMP()
send (a/b)
If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result
Task: Sniffing and-then Spoofing
In this task, you will combine the sniffing and spoofing techniques to implement the following sniff- and-then-spoof program. You need two VMs on the same LAN. From VM A, you ping an IP X. This will generate an ICMP echo request packet. If X is alive, the ping program will receive an echo reply, and print out the response. Your sniff-and-then-spoof program runs on VM B, which monitors the LAN through packet sniffing. Whenever it sees an ICMP echo request, regardless of what the target IP address is, your program should immediately send out an echo reply using the packet spoofing technique. Therefore, regard-less of whether machine X is alive or not, the ping program will always receive a reply, indicating that X is alive. You need to use Scapy to do this task. In your report, you need to provide evidence to demonstrate that your technique works.
Answer:
kad ;ikajlfhdakjsfhadskfadhkjfahdjkfadk a jk h
Explanation:
Answer:
is this even a legit question
6n^3+n-2 C++ code using Dev
i need only the code
Answer:
A = 6*pow(n,3) +n - 2
Explanation:
I'm not sure if this what you need but that's what I can help you with :)
which internet service is the main reason the internet has expanded and what draws newcomers to the internet?
Answer:
It has spread throughout the world since it is a very useful tool since most things are facilitated, thus leading to a much more efficient daily life, which is why the internet is one of the main means for the functioning of the world today. day, as new technologies have revolutionized
Social media.
The term social media refers to those digital tools that facilitate the transmission of information, communication and social interaction between individuals. Thus, social media allows individuals to relate to each other, in a similar way as if they were physically interacting, but through computer means.
These social media can be from profiles on social networks to blogs, podcasts or even videos on digital platforms. In short, nowadays social media is an integral part of people's social life, and it is in many cases what ends up driving them to use the internet.
Learn more in https://brainly.com/question/21765376
name 2 kitchen tools equipment or materials you are going to store or stack in the following drawers and cabinet 1.flat drawer 2.upper cabinet 3 . Small drawer near countertops 4.Lower cabinets 5.Lower cabinets under the sink
Answer:
silverware and dishwasher chemicles
Explanation:
1. Which of the following is used to operate computers and execute tasks?
A. Software
C. Update
B. Application
D. Upgrade
Answer:
a.software
I hope it hel
Define a class named Money that stores a monetary amount. The class should have two private integer variables, one to store the number of dollars and another to store the number of cents. Add accessor and mutator functions to read and set both member variables. Add another function that returns the monetary amount as a double. Write a program that tests all of your functions with at least two different Money objects.
Answer:
#include<iostream>
using namespace std;
class Money{
private:
int dollars;
int cents;
public:
Money(int d=0, int c=0){
setDollar(d);
setCent(c);
}
void setDollar(int d){
dollars = d;
}
void setCent(int c){
cents = c
}
int getDollar() {
return dollars;
}
int getCent() {
return cents;
}
double getMoney(){
return (dollars + (cents/100));
}
};
// testing the program.
int main(){
Money Acc1(3,50);
cout << M.getMoney() << endl;
Money Acc2;
Acc2.setDollars(20);
Acc2.setCents(30);
cout <<"$" << Acc2.getDollars() << "." << Acc2.getCents() << endl;
return 0;
}
Explanation:
The C++ source code defines the Money class and its methods, the class is used in the main function as a test to create the instances of the money class Acc1 and Acc2.
The object Acc2 is mutated and displayed with the "setDollar and setCent" and "getDollar and getCent" methods respectively.
It is important to create a strong password because it will
let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus
What is htc one mseven
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
where are all of your documents saved?
Answer:
create a my document folder so you can easily find it
. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?
Explanation:
d answer
gzjxubejeiizbtozueg
what, if anything, is returned by the method call rearrange ("apple")?
Answer:
[tex] \boxed{E} \to \boxed{nothing \: is \: returned \: due \: to \: run \: tie \: error}[/tex]
Which of the following would be considered software? Select 2 options.
memory
printer
operating system
central processing unit (CPU)
Microsoft Office suite (Word, Excel, PowerPoint, etc.)
Thing
Answer:
Microsoft Office suite (Word, Excel, PowerPoint, etc.), and thing
Explanation:
The Operating system and Microsoft Office suite will be considered as software.
A Software is the opposite of Hardware in a computer system.
Let understand that Software means some set of instructions or programs on a computer which are used for operation and execution of specific tasks.There are different type of software and they include:
Application Software are software installed into the system to perform function on the computer E.g. Chrome.System Software is the software designed to provide platform for other software installed on the computer. Eg. Microsoft OS. Firmware refers to set of instructions programmed on a hardware device such as External CD Rom.In conclusion, the Operating system is a system software while the Microsoft Office suite is an application software.
Learn more about Software here
brainly.com/question/1022352
Which term describes the surrounding area of this image?
The surrounding area of this image is called
Surroundings
Foreground
Background
This area is also called a
Negative
Positive
Neutral
Answer: background/negative
Explanation: the background, is negative space. A solid piece of sculpture occupies space, and makes the space around it come to life.
In the central processing unit (CPU).
A) Causes data to be input into the system
B) Responsible for the logical order of processing and converting data.
C) Both
D) None of the above
As i said bro, in CPU there are ALU and CU where ALU is to do mathematics problem and CU where its to processing, converting data. CPU is like the brain of computer. But it can't be the input, the input can get through hardware, not CPU.
State and give reason, if the following variables are valid/invalid:
Variables defined in Python
Valid/Invalid
Reason
daysInYear
4numberFiles
Combination-month_game
Suncity.school sec54
Answer:
See Explanation
Explanation:
Variable: daysInYear
Valid/Invalid: Valid
Reason: It begins with a letter; it is not a keyword, and it does not contain a hyphen
Variable: 4numberFiles
Valid/Invalid: Invalid
Reason: It begins with a number
Variable: Combination-month_game
Valid/Invalid: Invalid
Reason: It contains a hyphen
Variable: Suncity.school sec54
Valid/Invalid: Invalid
Reason: It contains a dot and it contains space
Here is the problem specification: An Internet service provider has three different subscription packages for its customers: Package A: For $9.95 per month 10 hours of access are provided. Additional hours are $2.00 per hour. Package B: For $14.95 per month 20 hours of access are provided. Additional hours are $1.00 per hour. Package C: For $19.95 per month unlimited access is provided. Write a program that calculates a customer's monthly bill. It should ask which package the customer has purchased and how many hours were used. It should then display the total amount due. Input Validation: Be sure the user only selects package A, B or C. Also, the number of hours used in a month cannot exceed 744. Use switch.
Answer:
In C++:
#include <iostream>
using namespace std;
int main(){
int hour; char pkg; float bill = 0;
cout<<"Package: "; cin>>pkg;
cout<<"Hour: "; cin>>hour;
if(hour<=744 && hour >=0){
switch (pkg) {
case 'A':
bill = hour * 9.95;
if(hour >10){bill = 10 * 9.95 + (hour - 10) * 2;}
break;
case 'B':
bill = hour * 14.5;
if(hour >10){bill = 20 * 14.5 + (hour - 20) * 1;}
break;
case 'C':
bill = 19.95;
break;
default:
cout << "Package must be A, B or C";}
cout<<"Total Bills: $"<<bill; }
else{ cout<<"Hour must be 0 - 744"; }
return 0;
}
Explanation:
This declares all variables: int hour; char pkg; float bill=0;
This prompts the user for package type: cout<<"Package: "; cin>>pkg;
This prompts the user for number of hours: cout<<"Hour: "; cin>>hour;
This checks if hour is between 0 and 744 (inclusive)
if(hour<=744 && hour >=0){
If true, the following is executed
A switch statement to check valid input for package
switch (pkg) {
For 'A' package
case 'A':
Calculate the bill
bill = hour * 9.95;
if(hour >10){bill = 10 * 9.95 + (hour - 10) * 2;}
End of A package: break;
For 'B' package
case 'B':
Calculate the bill
bill = hour * 14.5;
if(hour >10){bill = 20 * 14.5 + (hour - 20) * 1;}
End of B package: break;
For C package
case 'C':
Calculate bill: bill = 19.95;
End of C package: break;
If package is not A, or B or C
default:
Prompt the user for valid package cout << "Package must be A, B or C";}
Print total bills: cout<<"Total Bills: $"<<bill; }
If hour is not 0 to 744: else{ cout<<"Hour must be 0 - 744"; }
Computers has done more harm than good
Explanation:
Teueeeeeeeeeeeeeeeeeee
list out various computer generation long with their basic characteristic
Answer:
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ... 1956 – 1963: Second Generation – Transistors. ... 1964 – 1971: Third Generation – Integrated Circuits. ... 1972 – 2010: Fourth Generation – MicroprocessorsExplanation:
there are 4 generations ok
please mark me as brainlist
Checkpoint 4.20 Assume hour is an int variable. Write an if statement that displays the message “Time for lunch” only if hour is equal to 12.
Answer:
if(hour == 12)
{cout << "Time for lunch";}
Explanation:
1. In what ways a computer system is like a human being
la
2. In what ways is it not like a human being
3. What will happen if the computer is not invented
a computer system can be considered similar to human beings in a way that it needed various parts in order to it to function it humans we need the or such as hurt brain veins exactra while computer need the CPU Ram etc
can anyone teach me the basics of lua scripts 50 points
like how do i tell lua to move a object or send me a prompt asking me to do something
Answer:
are you talking about about a game, or coding?
A data science experiment you are conducting has retrieved two historical observations for the price of Bitcoin(BTC) on December 2, 2017 of 11234 and 12475. Create a Python script that stores these two historicalobservations in a list variable namedbtcdec1.
Answer:
In Python:
btcdec1 = []
btcdec1 = [11234, 12475]
print(btcdec1)
Explanation:
First, create an empty list named btcdec1
btcdec1 = []
Next, insert the two data (11234 and 12475) into the list
btcdec1 = [11234, 12475]
Lastly, print the list
print(btcdec1)
A local real estate company can have its 25 computers upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?
Answer:
it is
Explanation:
400 dollars for 10 systems and 200 dollars for 5 systems
explanation
first
find the price of 1 system or computer which is done by dividing 1000 by 25
25)1000(40
100
____
00
00
__
0
then multiple it by 10 =40 ×10=$400
Answer:
400!!
Explanation:
I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?
Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==
Implement the function permutations() that takes a list lst as input and returns a list of all permutations of lst (so the returned value is a list of lists). Do this recursively as follows: If the input list lst is of size 1 or 0, just return a list containing list lst. Otherwise, make a recursive call on the sublist l[1:] to obtain the list of all permutations of all elements of lst except the first element l[0]. Then, for each such permutation (i.e., list) perm, generate permutations of lst by inserting lst[0] into all possible positions of perm.
>>> permutations([1, 2])
[[1, 2], [2, 1]]
>>> permutations([1, 2, 3])
[[1, 2, 3], [2, 1, 3], [2, 3, 1], [1, 3, 2], [3, 1, 2], [3, 2, 1]]
>>> permutations([1, 2, 3, 4])
[[1, 2, 3, 4], [2, 1, 3, 4], [2, 3, 1, 4], [2, 3, 4, 1],
[1, 3, 2, 4], [3, 1, 2, 4], [3, 2, 1, 4], [3, 2, 4, 1],
[1, 3, 4, 2], [3, 1, 4, 2], [3, 4, 1, 2], [3, 4, 2, 1],
[1, 2, 4, 3], [2, 1, 4, 3], [2, 4, 1, 3], [2, 4, 3, 1],
[1, 4, 2, 3], [4, 1, 2, 3], [4, 2, 1, 3], [4, 2, 3, 1],
[1, 4, 3, 2], [4, 1, 3, 2], [4, 3, 1, 2], [4, 3, 2, 1]]
Answer:
def permutations(myList: list)-> list:
if len(myList) <= 1:
return [myList]
perm = []
for i in range(len(myList)):
item = myList[i]
seglists = myList[:i] + myList[i+1:]
for num in permutations(seglists):
perm.append([item] + num)
return perm
data = [1,2,3]
result = permutations(data)
print(result)
Explanation:
The program defines a python function that returns the list of permutations. The program checks if the length of the input list is less than or equal to one. The function declaration identifies the input and output as lists.
The for loop iterate through the list and the permutations are saved in an empty list in the next loop statement. At the end of the program, the list of lists is returned.
What are the two choices for incorporating or removing changes when reviewing tracked changes made to a document?
Edit or Apply
Revise or Accept
Accept or Reject
Incorporate or Edit
Answer:
Accept or Reject
Explanation:
The only way to get tracked changes out of the documents is to accept or reject.
So, the correct option is - Accept or Reject
Answer:
C. Accept or reject
Explanation:
Which artistic technique uses multiple layers of small calligraphic or scribbled marks?
A. random hatching
B. crosshatching
C. shading
D. stippling
E. scrumbling
Answer:
E. scrumbling
Explanation:
Use EBNF notation to describe the syntax of the following language constructs.
A. A Java return statement, which could be either a return keyword followed by a semicolon, or a return keyword followed an expression then followed by a semicolon. Assume the grammar for expression has been defined as expr-> e
B. A Python return statement, either a return keyword, or return one or more expressions separated by comma.
C. Based on your syntax definition in (b), is return x+y; a valid Python return statement?
Answer:
Following are the description to the given points:
Explanation:
To resolve basic design restrictions, EBNF has also been developed.This principle was its lack of support can identify repeatings easily. It implies that popular BNF models, like the description of a sequence of replicable elements, are complicated and rely on contra intuitive logical math.
To set a list of words divided by commas (e.g. john, coffee, logic) for instance, we would like to say something like "a list is a word accompanied by a few commas or terms." Through EBNF, they may say so. However, there have been no "many" alternatives in the standard BNF format. So, to describe something such as "a list is a term or a number accompanied by a pair with notation and script," you have to say the same thing. Which functions, although it is difficult, as it specifies a variety of lists instead of a specific list.
Essentially, "john, coffee, logic is John's list, accompanied by coffees or, and logic" would be the earlier link. That's why in Option (a):
The return statement in Java is:
return ('”‘ (~[“] | ” [”e‘])*);
In option (c), it is the valid statement.
1
When collection of various computers
look like a single coherent system to its
client, then it is called
Answer:
The appropriate answer is "Distributed system".
Explanation:
Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of mainframes, processors as well as stationary machines, it can be programmed. A distributed machine has massive program modules, which operate as a single device on many machines.