cmu 2.5.4 scoreboard i need help with all of cmu 2.5.4

Cmu 2.5.4 Scoreboard I Need Help With All Of Cmu 2.5.4

Answers

Answer 1

Answer:

Explanation: i can not see your sreeen


Related Questions

a word wide web server is usually set up to receive relatively small messages from its clients but to transmit potentially very large messages to them. explain which type of arq protocol (selective reject, go-back-n) would provide less of a burden to a particularly popular www server? g

Answers

The data link layer protocol would provide less of a burden to a particularly popular world wide web server.

Similar to the ftp daemon, a World Wide Web server is a program that responds to an incoming tcp connection and offers a service to the caller. To serve various types of data, there are numerous variations of World Wide Web server software.

Automatic Repeat Request, also called Automatic Repeat Query, is the acronym for this. An error-control technique called ARQ is applied in two-way communication systems. To achieve reliable data transmission through an unreliable source or service, it is a collection of error-control protocols. These protocols are located in the OSI (Open System Interconnection) model's Transport Layer and Data Link Layer, respectively. When packets are determined to be corrupted or lost during the transmission process, these protocols are in charge of automatically retransmitting them.

To know more about world wide web click on the link:

https://brainly.com/question/13211964

#SPJ4

mohammed needs to open a firewall port so that web traffic can be passed through the firewall. what protocol is used for web pages, and on which port does it work?

Answers

HTTP protocol with port number 80 is used to open a firewall port

What is an HTTP protocol?

An application-layer protocol called Hypertext Transfer Protocol (HTTP) is used to send hypermedia documents like HTML. Although it was created for web browser and web server communication, there are other uses for it as well.

Explanation :

Your computer sends network data identifying itself as traffic intended for port 80 of the web host whenever you want to view a website. The firewall on the web server is configured to allow incoming traffic to port 80, so it acknowledges your request (and the web server, in turn, sends you the web page in response). 

How HTTP protocol controls the network traffic ?

By controlling network traffic, a firewall can assist in protecting your computer and data. By preventing unwanted and unsolicited incoming network traffic, it accomplishes this. By scanning this incoming traffic for malicious content like hackers and malware that could infect your computer, a firewall verifies access.

Thus we can conclude that at port 80 HTTP protocol is used

https://brainly.com/question/12921030

#SPJ4

Iuanyware is a ________ application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

Answers

Iuanyware is a service program made to function inside of a web browser like Firefox, Chrome, Opera, or Edge.

What is IUanyWare?

All IU staff, faculty, and students have access to IUanyWare. You can stream the IU-licensed apps and software you need from anywhere, on any device, without having to download, install, or use a VPN for each one.

A service program called iuanyware is designed to run inside a web browser like Firefox, Chrome, Opera, or Edge.

There is a service called IUanyWare that all IU employees, faculty members, and students can use. You can stream the IU-licensed programs and software you needed, without having to install anything, regardless of where you are or what device you're using.

To learn more about ' IUanyWare' refer to

https://brainly.com/question/28940270

#SPJ4

write a program that counts the number of words, lines , and toal characters(not including whitespace) in a paper, assuming that consecutive worlds are separated either by spaces or end of line characters. it also calculates the average word length by dividing the total number of characters by total number of words.

Answers

Create a program that, assuming that subsequent words are separated by either spaces or end-of-line characters, counts the number of words, lines, and overall characters (excluding whitespace) in a paper.

What is the Line, Word, and Character Counting Program?

1.WordCount.java Term papers with a specific word count are frequently assigned to students. The computer can help with the tedious task of counting words in a long paper.

2. Write a programme that counts the number of words, lines, and overall characters (excluding whitespace) in a paper, assuming that subsequent words are separated by either spaces or end-of-line characters. The average word length is calculated by dividing the total number of characters by the total number of words.

3. The data. The data is contained in the txtfile. Make a copy of the data file and save it in the program's project directory.

4.In addition to displaying the findings on the screen, write down the same information.

To learn more about 'Program' refer to

brainly.com/question/16397886

#SPJ4

question 1 for an assignment you wrote the method sort largest depth in the class quakesortinplace to sort earthquakes by their depth from largest depth to smallest depth using the selection sort algorithm. modify this method to do exactly 50 passes and then modify testsort to run this method on the file earthquakedatadec6sample2.atom. the file may not be completely sorted as there are more than 50 quakes in the file. after running your program of 50 selection sort passes on this file, what is the depth of the last earthquake in the arraylist?

Answers

ArrayList is a class in the java.util package and a component of the Java collection system. In Java, it offers us dynamic arrays.

The depth of the last earthquake in the arraylist exists -100000.00.

What is meant by arraylist?

ArrayList is a class in the java.util package and a component of the Java collection system. In Java, it offers us dynamic arrays. Although it might be slower than conventional arrays, it can be useful in programs that require a lot of array manipulation. Java contains a class like this.

A resizable array that is part of the java.util package is the ArrayList class. Built-in arrays have a fixed size, but ArrayLists have a dynamic size. An ArrayList can have elements added and removed as needed, which aids in memory management for the user.

The elements are kept in a dynamic array by ArrayList internally. Internally, LinkedList stores the elements in a double-linked list.

The depth of the last earthquake in the arraylist exists -100000.00.

To learn more about ArrayLists refer to;

https://brainly.com/question/26666949

#SPJ4

according to the penal code, a server-seller who fails to meet a standard level of care that an ordinary person under similar conditions would meet, such as checking ids, calculating age, refusing to over-serve patrons, and looking for signs of intoxication is guilty of:

Answers

Answer:

criminal negligence

Explanation:

write a function called remove duplicates that accepts a list and returns a list containing the same elements in the same order but with duplicates removed. for example, if the argument is [7, 4, 2, 7, 2, 2, 9, 4], the returned list would be [7, 4, 2, 9].

Answers

The function that called remove duplicates that accepts a list and returns a list containing the same elements in the same order but with duplicates removed is def remove_duplicates(lst).

The method of obtaining the unique list from a list that may contain duplicates is the subject of this article. Remove duplicates from list procedure has a wide range of uses, thus understanding it is beneficial.

This is the simplest and quickest way to complete a specific activity. After eliminating the duplicates, it returns a dictionary that must be transformed into a list.

List in the beginning: [1, 2, 4, 2, 1, 4, 5]

[1, 2, 4, 5] is the list after deleting duplicate elements.

Depending on the elements contained in the list, its size, whether or not the element order should be retained, and the effectiveness of the removal method, duplicates can be removed from Python lists using a variety of techniques. These processes might be iterative, implement themselves using built-in functions, or import functionality from modules.

To know more about duplicates click on the link:

https://brainly.com/question/28609285

#SPJ4

write a sql statement to show the average item cost for each vendor. the output should list vendor company names, vendor phone numbers, and the average item cost

Answers

The SQL statement to show the average item cost of each vendor is avg(vendor_avg_item_cost).

GROUP BY Vendor_companyname, Vendor_phonenumber, Ven_avgcost

What is avg() function?

The syntax for the avg() function is as follows: SELECT AVG(column name) FROM table name; Data from a table can be retrieved using the avg() function and a SELECT query.

what is a GROUP BY statement in SQL?

Finding summary rows, such as "find the number of consumers in each country," is done with the GROUP BY statement, which groups rows with similar values. The COUNT(), MAX(), MIN(), SUM(), and AVG() aggregate functions are frequently used with the GROUP BY statement to group the result set by one or more columns.

Therefore, the SQL statement to show the average is avg().

To learn more about the SQL from the given link

https://brainly.com/question/27851066

#SPJ4

What are the importance of computer in electronics engineering

Answers

Computers play an important role in electronics engineering as they are used to design and test electronic components and systems. They are also used to control manufacturing processes and to automate test and measurement equipment.

What is electronics engineering?

Electronics engineering is a branch of electrical engineering that arose in the early twentieth century and is characterised by the use of active components like as semiconductor devices to amplify as well as control electric current flow. Previously, only passive devices also including mechanical switches, resistors, inductors, and capacitors were employed in electrical engineering. Analog electronics, digital electronics, consumer electronics, embedded systems, and power electronics are all covered.

To learn more about electronics engineering

https://brainly.com/question/28194817

#SPJ13

Other Questions
a 68.1-kg boy is surfing and catches a wave which gives him an initial speed of 1.60 m/s. he then drops through a height of 1.56 m, and ends with a speed of 8.51 m/s. how much nonconservative work (in kj) was done on the boy? Consider the reaction between sodium metal and chlorine gas to form sodium chloride (table salt):2 Na(s) + Cl2 (g) > 2 NaCI(s)If 12.5 g of sodium react with sufficient chlorine, how many grams of sodium chloride should form?1. 12.1 grams2. 1.18 x 10^2 grams3. 15.9 grams4. 3.18 x 10^1 grams5. 51.0 grams Solve the equation on the interval [0, 2\small \pi). Show all work. Do not use a calculator - use your unit circle! Fill in the table using this function rule. There were eight questions on Emily's math quiz, and she missed two questions.Which of the following diagrams represents the percentage of Emily's accuracy onthe quiz?A. 50%B. 75%C. 30%D. 10% 1. Alex and chris share sweetsIn ratio Alex : Chris= 7:3Work out the number ofSweets chris recieves. when a grizzly bear hibernates, its heart rate drops to 101010 beats per minute, which is 20\ , percent of its normal value. what is a grizzly bear's normal heart rate when not hibernating? beats per minute write a declaration statement that creates a two-dimensional array referenced by a variable named grades. the array should store int values using 18 rows and 12 columns. If f(x) is an exponential functionwhere f(-2) = 1 and f(7) = = 63,then find the value of f(1) , to thenearest hundredth. one-year treasury securities yield 4.65%. the market anticipates that 1 year from now, 1-year treasury securities will yield 5.4%. if the pure expectations theory is correct, what is the yield today for 2-year treasury securities? calculate the yield using a geometric average. do not round intermediate calculations. round your answer to two decimal places. Which line from "We Real Cool" shows the best example of the literary device, alliteration?Question 4 options:Left school. WeSing sin. WeThin gin. WeDie soon. Lee Ann is planning a bridal shower for her best friend. At the party, she wants to serve 3 beverages, five appetizers, and three desserts, but she doesn't not have time to cook. She can choose from 9 bottle drinks, 9 Frozen appetizers, and 12 prepared desserts at the supermarket. How many different ways can lie and pick up the food and drinks to serve at the bridal shower? in the diagram segment AD and AB are tangent to circle C solve for x HELP MEEEWhat are two examples of diffusionOne historical and one contemporary given g(x)= -12f(x+1)+7 and f(-4)=2 fill in the blanks round answers to 2 decimal points as needed g( )= under certain circumstances, the actin and myosin myofilaments can be extracted from muscle cells and placed in a beaker. they subsequently bind together to form long strands of actin and myosin. what substance could be added to the beaker to make the actin and myosin unbind? group of answer choices Which of kohlbergs stages of moral development notes that right and wrong is identified by children based on what is rewarded?. Dwayne is making a poster about friendship in his art class. He divides his poster into 12 equal parts. Dwayne writes the names of his friends all over each part. Dwayne uses 7 parts for his neighborhood friends and 5 parts for his friends from school. What fraction of the poster does Dwayne use for his friends from school? if a style of music had been influenced by the music of north africa, primarily derived from asian musical sounds, what features might this style of music have? Although Francisco felt like giving up, he kept on running until he finished the entirerace. What does this BEST demonstrate?O injuryO activation.O persistenceO intensity