suppose that a tcp segment has a lifetime of 2 minutes in the network. calculate the maximum transmission speed (bits/second) at which a host can send out 1460-byte tcp segments so that there will not be two tcp segments from the same sender with the same sequence number in the network, i.e., without having the tcp sequence numbers wrap around?

Answers

Answer 1

The maximum transmission speed at which a host can send out 1460-bytes tcp segments from the same sender with the same sequence number in the network is 10 bits per second.

If the bandwidth is 10 Gbps, the link will be (10/8) 109 bps = 1.25 109 bps.

120 seconds is the maximum segment lifetime.

The amount of data transferred in 120 seconds is equal to 150 1.25 109 bps / 120. 1.5 x 1010 bytes Equals 109 bytes

As a result, the TCP will generate a 1.5 1010 sequence number in the 120 second period.

One needed to transfer data at the highest speed in order to create a 1.5 * 1010 unique sequence.

= ceiling(log(1.5 1010)

equals ceil(log(1.5) + log(1010))

= ceil(0.1761 + 10)

= ceil(10.1761) (10.1761)

= 10 bits in the field for the sequence number.

Therefore, a sustained maximum data transfer rate of 10 bits per second is needed between two hosts.

To know more about bytes click on the link:

https://brainly.com/question/2280218

#SPJ4


Related Questions

which of the following are properties of relations? question 3 options: a) each attribute has the same name. b) all columns are numeric. c) there are multivalued attributes in a relation. d) no two rows in a relation are identical.

Answers

Option d is correct. The property of relations is that no two rows in a relation are identical.

Both reflexive and irreflexive relationships are incompatible. As a result, these two qualities are incompatible. It is not irreflexive if it is reflexive. It cannot be reflexive if it is irreflexive. However, a relationship could also be neither reflexive nor irreflexive.

The relationship between the elements of the sets is the next topic that is brought up whenever sets are being discussed. Between objects of the same set or between objects of two or more sets, relations may exist.

A directed graph can be used to depict a relation.

The number of elements in the set from which the relation has been defined equals the number of vertices in the graph. There will be a directed edge from the vertex 'x' to the vertex 'y' for any ordered pair (x, y) in the relation R. There will be a self-loop on vertex "x" if there is an ordered pair (x, x).

To know more about relations click on the link:

https://brainly.com/question/6241820

#SPJ4

a binary search algorithm searches for a target value within a sorted array. binary search compares the target value to the middle element of the array; if they are unequal, the half in which the target cannot lie is eliminated and the search continues on the remaining half until the target value is found or until a search can no longer be performed. this problem can be solved using which of the techniques?

Answers

This problem can be solved using divide and conquer techniques. An method known as "divide and conquer" works by breaking down a large task into smaller ones.

An algorithmic pattern is known as Divide and Conquer. In algorithmic approaches, the idea is to take a dispute involving a large amount of input, divide the input into smaller pieces, solve the problem on each of the smaller pieces, and then combine the piecewise solutions into a comprehensive solution. The Divide and Conquer is the algorithmic  name of the approach that was used to solve the issue.

The three steps below are used in a dispute utilizing the Divide and Conquer method.

Create a group of subproblems from the main issue.

Conquer: Recursively and individually solve each subproblem.

Combine: Combine the solutions to the individual subproblems to arrive at the overall solution.

To know more about divide and conquer click on the link:

https://brainly.com/question/18720923

#SPJ4

mobile devices, fitness trackers, and apps are now widely available to assist individuals with behavior change. what behavioral strategy do mobile devices mainly impact?

Answers

The behavioral strategy that the  mobile devices mainly impact is option d: self monitoring.

What is Behavioral strategy?

Behavioral strategy integrates cognitive psychology and social psychology into the theory and practice of strategic management. By putting strategic management on a solid foundation of reasonable presumptions about human cognition, emotion, and social interaction, it seeks to increase the empirical integrity and practical applicability of strategy theory.

Self-monitoring is a personality attribute that entails the capacity to keep track of and control one's appearance, feelings, and actions in response to social contexts and circumstances. It entails being conscious of your actions and how they affect your surroundings. 2

A technique called self-monitoring trains pupils to evaluate their own conduct and keep track of the outcomes. Self-monitoring does raise or decrease the frequency, intensity, or length of existing behavior, but it does not produce new abilities or knowledge. Teachers also spend less time observing pupils' conduct as a result.

Learn more about behavioral strategy from

https://brainly.com/question/8211003
#SPJ1

See full question below

Mobile devices, fitness trackers, and apps are now widely available to assist individuals with behavior change. What behavioral strategy do mobile devices mainly impact? 36 2.38 Multiple Choice w Chain-breaking references Stimulus control Cognitive restructuring Self-monitoring

Write a class to represent a CookOut. The class should have the following:
 Class variables to represent the number of people at the cookout and how many hot dogs each
person gets ( a person CANNOT get a partial hot dog)
 There are 10 hot dogs in a package and 8 buns per package. These values CAN NOT change.
Include class variables to represent these.
 A multi-argument constructor that accepts 2 integers and initializes class variables
 Appropriate getters and setters
 To toString method that prints out a message stating how many people were at the cookout and
how many packages of hotdogs and buns were needed.
 A method, calculateDogsRequired, that calculates and returns how many hot dog packages are
requited.
 A method, calculateBunsRequired, that calculates and returns how many packages of buns are
required
 A method, leftOverDogs, that calculates and displays the number of leftover hot dogs there will
be
 A method, leftOverBuns, that calculates and returns the number of leftover buns there will be

There may be some methods in the Math class that can help with calculations/rounding properly! Use
the API

Write a class, CookOutTester. In the main method, prompt the user for how many people are attending
the cookout and how many hot dogs they each get. Then print out a description of the cookout and how
many leftover hot dogs and buns there will be using appropriate methods from the CookOut class. Also
print out the cost for everything if a package of hot dogs is $7.43 and a package of buns is $3.12.

Round all money to 2 decimal places and remember to include comments!
Sample Output:
Enter the number of people:
43
Enter the number of hot dogs each person gets:
3
There are 43 at the cookout and every one gets 3. We need 13 package of hot dogs and
17 packages of buns
There will be 7 buns leftover
There will be 1 hot dogs leftover
It will cost $96.59 for the hot dogs
It will cost $53.04 for the buns

Answers

A class, CookOutTester. In the main method, which prompts the user for how many people are attending the cookout and how many hot dogs they each get is given below:

The Program

import math

HOT_DOGS_PER_PACKAGE = 10

HOT_DOGS_BUNS_PER_PACKAGE = 8

attendees = int(input('Enter the number of guests: '))

hot_dogs_per_person = int(input('Hot dogs per person: '))

required_hot_dogs = attendees * hot_dogs_per_person

packages_of_hot_dogs = required_hot_dogs / HOT_DOGS_PER_PACKAGE

packages_of_hot_dog_buns = required_hot_dogs / HOT_DOGS_BUNS_PER_PACKAGE

print(f"You require {math.ceil( packages _ of _ hot _ dogs)} packs of hot dogs for the cookout.")

print(f"You require {math.ceil(packages_of_hot_dog_buns)} packs of buns for the cookout.")

remain_hotdogs = (math.ceil(packages_of_hot_dogs) * HOT_DOGS_PER_PACKAGE) - required_hot_dogs

if remain_hotdogs != 0:

   print(f'You have {remain_hotdogs} left over hot dogs')

remain_buns = (math.ceil(packages_of_hot_dog_buns) * HOT_DOGS_BUNS_PER_PACKAGE) - required_hot_dogs

if remain_buns != 0:

   print(f'You have {remain_buns} leftover hot dog buns. ')

Output

You require 12.5 packs of hot dogs for the cookout.

You require 15.625 packs of buns for the cookout.

Read more about programming here:

https://brainly.com/question/25458754

#SPJ1

in the model-view-controller pattern: a. the . . . displays the data. b. the . . . handles events. c. the . . . is pure data with no visual appearance.

Answers

View displays the data

Controller handles events

the model is pure data with no visual appearance

What is model-view controller pattern?

MVC, or model-view-controller, is an acronym. What each of those elements means is as follows: Model: All of the data logic is contained in the backend. View: The graphical user interface or frontend (GUI)

What advantages does MVC offer?

quicker development cycle MVC supports quick and concurrent development.

Ability to offer multiple perspectives ...

Support for the asynchronous method:

The entire model is not affected by the modification:...

Data from the MVC model is returned without formatting

Development platform that is SEO-friendly

Therefore view,controller and the model does the work

https://brainly.com/question/14958535

#SPJ4

alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data. what type of attack does he suspect is taking place?

Answers

The type of attack that Allan suspects is Side-channel Attack.

What do you mean by a Side-channel attack?

An attack made possible by data loss from a physical cryptosystem. Timing, power use, and electromagnetic and auditory emissions are characteristics that could be used in a side-channel attack.

What is a cryptosystem?

A group of cryptography methods known as a cryptosystem are required to implement a specific security service, such as confidentiality. Three algorithms are typically used in a cryptosystem: one for key generation, one for encryption, and one for decryption.

Alan suspects that a hacker is gathering data on a sensitive cryptographic device's electrical usage and utilising it to decrypt data that has been encrypted. So he suspects a Side-channel attack.

Hence, Alan believes that the undergone attack is a Side-channel attack.

To learn more about cryptography from the given link

https://brainly.com/question/88001

#SPJ4

polish cryptanalysts developed strategies to attack the rotor machine ciphers in the 1930s. cryptanalysts from other allied countries improved on these techniques at what location?

Answers

Cryptanalysts from other allied countries improved on these techniques at Blechley, UK.

What is cryptanalysis?

Cryptanalysis is the technique of studying information systems in order to comprehend their hidden characteristics. Cryptanalysis is a technique for breaking into cryptographic security systems and gaining access to the contents of encrypted messages, even when the cryptographic key is unknown. Cryptanalysis covers, in addition to mathematical analysis of cryptographic algorithms, the study of side-channel attacks, which do not target holes in the cryptographic algorithms themselves, but rather exploit weaknesses in their implementation. Cryptanalysis methods and techniques have evolved dramatically during the history of cryptography, adjusting to increasing cryptographic complexity, beginning with pen-and-paper methods and progressing to machines such as the British Bombes and Colossus computers at Bletchley Park during World War II.

To learn more about cryptanalysis
https://brainly.com/question/17489685

#SPJ4

what is the primary goal of change management? question 16 options: preventing security compromises allowing rollback of failed changes keeping users informed of changes maintaining documentation

Answers

The primary goal of change management is to successfully introduce new procedures, items, and company strategies while limiting adverse effects.

The systematic strategy and application of knowledge, resources, and instruments to deal with change is known as change management. It entails developing and implementing company policies, structures, processes, and technology to address changes in the business environment and the outside world.

Leading the "human side" of significant change within an organization entails more than project management and technical duties carried out to implement organization changes. The main objective of change management is to successfully introduce new procedures, items, and company strategies while limiting adverse effects.

Most major firms engage in continual change management efforts, yet this concept might be perplexing to those who aren't directly involved. Change management is a more reactive and erratic process than project management, which has a formal framework and adheres to a set schedule organization. Since change management activities frequently aim to be discrete, staff members might not even be aware that change management is happening.

To know more about change management click on the link:

https://brainly.com/question/11239217

#SPJ4

listen to exam instructions while developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. the programmer forgets to remove this functionality prior to finalizing the code and shipping the application. which type of security weakness does this describe?

Answers

During the development of a network application, a programmer adds functionally that makes her able to access the running program without 'authentication' so she can capture debugging data.  Prior to finalizing the code and delivering the application, the programmer forgets to remove this added functionality. This sort of security weakness is referred to as ‘backdoor’.

What is 'Backdoor' Security Weakness?

Backdoor is described as any type of security attack where authorized and unauthorized users are able to get around normal security measures and attain high-level root access on a software application, computer system, or network. Backdoor is a potential security weakness that negates an appropriate authentication process to access a system or application. As a result, remote access is granted to databases and file servers of an application that remotely issue system command and update malware.

You can learn more about security backdoor at

https://brainly.com/question/14718381

#SPJ4

while performing a penetration test for a client, you issue the command telnet smtp1.acame 25 to see what information is returned. what is this called?

Answers

While performing a penetration test for a client, you issue the command telnet smtp1.acame 25 to see port scan information is returned.

What is penetration test?

A penetration test, also known as a pen test or ethical hacking, is a legally sanctioned simulated cyberattack on a computer system undertaken to examine the system's security; this is not to be confused with a vulnerability assessment. The test is carried out to discover vulnerabilities, such as the possibility of unauthorised parties gaining access to the system's features and data, as well as strengths, allowing a full risk assessment to be carried out. Typically, the process determines the target systems and a specific goal, then evaluates available information and employs various methods to achieve that goal. A penetration test target can be either white or black.

To learn more about penetration test
https://brainly.com/question/26555003

#SPJ4

an engineer is writing a web application and needs to dynamically update some content on their page when a certain condition is met in their javascript. which web api would be their best bet for achieving this functionality?

Answers

DOM API would be the best bet for achieving the mentioned functionality to update content dynamically

What is DOM API?

By storing the structure of a document—such as the HTML encoding a web page—in memory, the Document Object Model (DOM) links web pages to scripts or programming languages and helps to update content dynamically. Despite the fact that modeling HTML, SVG, or XML documents as objects is not a function of the core JavaScript language, it usually refers to JavaScript.

A logical tree is used by the DOM to represent a document. Every node in the tree, where each branch of the tree ends, is home to objects. Programmatically, the tree can be accessed via DOM methods. They enable you to alter the document's content, style, or organization.

Using DOM API dynamically:

The DOM provides methods for obtaining and modifying elements as well as for handling events by affixing event handlers. These are the techniques:

A document's event handler is attached by the addEventListener() function.

A node from another document is adopted by adoptNode().

The document that was previously opened with the document's output writing stream is closed with the close() function.

open()

Hence using the DOM API we can update content dynamically

Follow this link to know more about API

https://brainly.com/question/16792873

#SPJ4

difference between cell address and cell pointer​

Answers

A cell is the basic unit in Microsoft excel, which is the space created due to the intersection of the row and column, whereas, a cell pointer is the big black boundary that surrounds the active sale.

you have azure active directory (azure ad) tenant. you need to ensure that a user named admin1 can create access reviews. the solution must use the principle of least privilege. which role should you assign to admin1?

Answers

The role you should assign to admin1 in directory is the Access Review Manager role.

What is directory?

A directory is a file system cataloguing structure in computing that contains references to other computer files and maybe other directories. Many computers refer to directories as folders or drawers, similar to a workbench or a standard office filing cabinet. The name comes from books like a telephone directory, which include the phone numbers of everyone in a given area. Files are ordered by grouping together similar files in the same directory. A subdirectory is a directory that is contained within another directory in a hierarchical file system (one in which files and directories are structured in a tree-like fashion).

To learn more about directory
https://brainly.com/question/28391587

#SPJ4

your boss has asked you what type of monitor he should use in his new office, which has a wall of windows. he is concerned there will be considerable glare. which gives less glare, an led monitor or an oled monitor?

Answers

However, it does seem to have helped minimize glare, so that's something to bear in mind when choosing a new television. The advantages of OLED panel's self-emissive pixels mean that total brightness is fairly low compared to the normal LCD or QLED screen.

Image result for which monitor has less glare: an oled or a led?

Glossy screens are found in Samsung's Q and OLED models.Reflections can be seen in situations where there is only black and no image. The modern external hard drives use the fastest connection possible in addition to speed.Solution: Thunderbolt 3 is the quickest type of connection used by external hard drives or storage devices.Thunderbolt 3 can transport data at a maximum rate of 40 Gbps (Gigabytes per second). Which is faster, FireWire 800 or SuperSpeed USB?FireWire 800 is not as quick as SuperSpeed USB.they serve as input and output. Device manager will have all of the devices listed in UEFI/BIOS, although not every device will be present in UEFI/BIOS. Registered.The gloss on each oled is the same.However, they have a good anti-reflective coating.I wouldn't stress over itOLED screens are better for your eyesight overall, to sum it up.They have a wider variety of colors, higher color contrast, and more natural lighting. OLED versus QLEDBecause of their higher peak brightness of up to 2000 nits and beyond compared to OLED TVs' 500–600 nits, QLED TVs are the finest TV type for bright rooms.Thus, the ideal TV for bright rooms is QLED. OLED has far broader viewing angles than LED LCD, which is fantastic for when there are many of people watching TV at once. OLED is also much better at handling darkness and lighting precision.OLED also offers greater refresh rates and motion processing, although image preservation is a concern. Opt for an OLED TV if you want the best-looking TV image money can buy.OLED TVs naturally create precisely inky black levels, highly saturated colors, smooth motion, and excellent viewing angles because of a panel design that is fundamentally different from LCD TVs.

        To learn more OLED refer

        https://brainly.com/question/14312229  

         #SPJ1

         

A few risks that do NOT arise when we connect to the Internet are
O stolen PII or credit card data
O spam
O viruses
O farming

Answers

The correct answer would be farming
the answer is farming because that has nothing to do w the internet

Cybersecurity applications, used across a broad range of industries and government sectors, represent ________ applications.

Answers

Cybersecurity applications, used across a broad range of industries and government sectors, represent  mission-critical applications.

What is application?
An application programme, often known as a software application or an app, is a type of computer programme that is used by end users and is created to perform a particular purpose other than one related to the use of the computer itself. Some examples include word processors, video players, and accounting software. All applications are referred to collectively by the word "application software."  System software, which has to do with how computers work, and utility software are the other two main categories of software ("utilities"). Applications can be created as private, open-source, or project-based software, and they can be published independently or combined with the computer as well as its operating system software. Apps are typically referred to as being for mobile devices like phones.

To learn more about application
https://brainly.com/question/24264599
#SPJ4

you manage a group of 20 windows workstations that are currently configured as a workgroup. you have been thinking about switching to an active directory configuration. which advantages would there be to switching to active directory? (select two.)

Answers

It addresses the businesses who create and provide maintenance for systems and software geared at libraries.

The numerous sorts of technology goods and services used by libraries are covered in-depth and objectively by Library Technology Guides. It addresses the businesses who create and provide maintenance for systems and software geared at libraries. The website provides comprehensive databases and document repositories to support libraries as they examine new systems and is a crucial tool for industry professionals to stay up to date with emerging trends.

The Active Directory (AD) database and services link users to the network resources they require to complete their tasks.

The database (or directory) holds crucial details about your environment, such as how many computers and users there are, as well as who has access to them. The database might, for instance, contain information on 100 user accounts, including each user's job title, contact information, and password. Additionally, it will note their permissions.

A large portion of the activities in your IT system is controlled by the services. They specifically verify that each user is who they say they are (authentication), typically by verifying the user ID and password they input, and only permit them to access the data they are authorized to use (authorization).

To know more about libraries click on the link:

https://brainly.com/question/475367

#SPJ4

a data mart is a(n): enterprise-wide data warehouse. smaller system built upon file processing technology. data warehouse that is limited in scope. generic on-line shopping site.

Answers

A data mart is a data warehouse that has a limited scope.

Data mart:

A data mart is a structure/access pattern used to retrieve client-facing data in data warehouse systems. While data warehouses have an enterprise-wide depth, data marts only have information for a specific department.

A limited-scope data warehouse whose data are obtained by choosing and summarising data from a data warehouse or via independent extract, transform, and load operations from source data systems. A data mart containing data retrieved from the operational environment that does not have the benefit of a data warehouse.

So, the right answer of the question is C.

To learn more about data mart
https://brainly.com/question/28166657

#SPJ4

adam is evaluating the security of a web server before it goes live. he believes that an issue in the code allows a cross-site scripting attack against the server. what term describes the issue about adam discovered

Answers

He believes a flaw in the code allows for a cross-site scripting attack on the server. Adam's vulnerability describes the problem that was discovered.

What do you mean cross-site scripting?

Cross-site scripting (XSS) is a sort of security flaw found in some web applications. XSS attacks allow attackers to inject client-side scripts into web pages that other users are seeing. Attackers may exploit a cross-site scripting vulnerability to circumvent access constraints such as the same-origin policy. Up until 2007, cross-site scripting on websites accounted for nearly 84% of all security vulnerabilities discovered by Symantec. The severity of XSS impacts varies depending on the sensitivity of the data handled by the vulnerable site and the type of any security mitigation implemented by the site's owner network.

To learn more about cross-site scripting

https://brainly.com/question/24099248

#SPJ4

a simple risc microprocessor has 5 pipeline stages. assume it is perfectly pipelined. how much speedup will it achieve compared to the nonpipelined processor?

Answers

The speedup will it achieve compared to the nonpipelined processor is 100 ps (picosecond).

A microprocessor is a computer processor where the data processing logic and control are included on a single integrated circuit or a small number of integrated circuits. The microprocessor contains the arithmetic, logic, and control circuitry required to perform the functions of a computer's central processing unit. The three main components of microprocessor CPU, Bus and memory. The microprocessor, well-known as the Central Processing Unit (CPU), can be defined the brain of all computers and many household and electronic devices.

You can learn more about A microprocessor at https://brainly.com/question/1305972

#SPJ4

suppose a process in host c has udp socket with port number 2315. suppose both host a and host b send udp segment to host c from source port numbers 1345 and 7876 respectively. what port number will host c receive the segment on? group of answer choices port 7876 port 2315 port 1345 port 4610

Answers

Yes, the same socket will receive both segments. The operating system will give the process the IP addresses for each received segment via the socket interface so it may figure out where each segment came from.

What is meant by an operating system?

An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.

An operating system is a piece of system software that controls computer resources, hardware, and common services for software programs.

A group of software applications that coordinates the activities of computer hardware and software is referred to as an operating system. It serves as a link at the point where humans and machines interact. Examples of Operating System are: Windows Linux BOSS etc.

Yes, the same socket will receive both segments. The operating system will give the process the IP addresses for each received segment via the socket interface so it may figure out where each segment came from.

To learn more about operating system refer to:

https://brainly.com/question/1763761

#SPJ4

you need to view detailed information for the hr directory in the root (/) directory. type ls -l / at the prompt to answer the following questions: what is the directory size? what is the modified date?

Answers

HR - The directory size is 4096 and the modified date is Nov 28.

What is HR?
The group of individuals who work for a given organisation, business sector, industry, or economy is referred to as its human resources. Human capital, or the knowledge and abilities that people possess, is a more specific idea. Manpower, labour, personnel, colleagues, or simply "people" are comparable concepts. An organization's human resources department (HR department) handles human resource management, supervising various employment-related tasks like ensuring that labour laws and employment standards are followed, conducting interviews, managing employee benefits, organising employee files with the necessary paperwork for future use, and managing some facets of recruitment (also known as talent development) as well as employee offboarding. They act as a liaison between a company's management and its workers.

To learn more about HR
https://brainly.com/question/25443563
#SPJ4

What software controls a computer’s basic functions? the central processor the bios the motherboard the operating system

Answers

The operating system is the software that controls a computer's basic functions.

All computers require a master software program that help in managing the basic functions of the computer. This master software program is referred to as the operating system.

There are different kinds of operating systems such as Windows, macOS etc.

The operating system is itself a program that is fixed into a computer by a boot program. After its installation, the operating system has the capability to manage all the other programs and installations in a computer.

To learn more about operating system, click here:

https://brainly.com/question/1763761

#SPJ4

Post-production is the phase where all the film, audio, and other visuals come together to create the completed Input Answer .

Answers

Post-production is the conclusive procedure of film and video production whereby all the uncooked footage, audio recordings, as well as other visible components are amassed and altered together to construct the concluding product.

What is found in this process?

Included in this process comes activities such as color grading, jingling combinations, unique effects, adding tunes and other sonic touches.

The aim of post-production is to improve and accentuate the shots that were seized during production, attaining an exquisite, uniformity final item which holds the creative conception of the director and producers.

This point is crucial to the prosperity of the closing project, since it can unmistakably sway the viewers' full viewing knowledge.

Read more about Post-production here:

https://brainly.com/question/26528849

#SPJ1

Write a program that repeatedly reads in integers until a negative integer is read. The program also keeps track of the largest integer that has been read so far and outputs the largest integer at the end.

Answers

For Python: Number = int("Enter number: ");, num = maxn, if num >= 0:, If num >= maxn, num = maxn, Number = int("Enter number: ");, "Largest:" print(str(maxn) + ".

A well-liked general-purpose programming language is Python. It is utilized in a variety of industries, including desktop applications, web development, and machine learning. Fortunately, Python features a straightforward, user-friendly syntax for beginners. Python is a fantastic language for beginners to learn because of this.

All of Python's core ideas will be covered in our tutorials. By the conclusion, you will feel confident using Python to create projects. Obtain user input

Number = int("Enter number: ");

Set the biggest as the first input.

num = maxn

Up until a negative input is recorded, this loop is repeated.

if num >= 0:

If the current input is bigger than the biggest before

If num >= maxn,

Set the current input to biggest.

num = maxn

Obtain further input from the user

Number = int("Enter number: ");

Print the biggest

"Largest:" print(str(maxn) + ".

To know more about python click on the link:

https://brainly.com/question/13437928

#SPJ4

please select which option is the most accurate line from the manifesto for agile software development? group of answer choices comprehensive documentation before working software working software over comprehensive documentation expedient development over working software comprehensive documentation defines working software

Answers

The four core values of Agile software development as told by the Agile Manifesto are individuals and interactions over processes and tools; working software over comprehensive documentation; customer collaboration over contract negotiation.

The Agile Manifesto means a document that sets out the key values and principles behind the Agile philosophy and provides to help development teams work more efficiently and sustainably. The Agile Manifesto contains of four key values: Individuals and interactions over processes and tools. Working software over comprehensive documentation. Customer collaboration over contract negotiation.

You can learn more about The Agile Manifesto at https://brainly.com/question/4478843

#SPJ4

write a method called max that accepts an array of integers as a parameter and returns the maximum value in the array. for example, if the array passed stores {12, 7, -1, 25, 3, 9}, your method should return 25. you may assume that the array contains at least one element. your method should not modify the elements of the array.

Answers

Method called max that accepts an array of integers as a parameter and returns the maximum value in the array:

public class max {
   public static void main(String[] args) {
       int[] myArray = {12, 7, -1, 25, 3, 9};
       int max = myArray[0];
       for (int i = 1; i < myArray.length; i++) {
           if (myArray[i] > max) {
               max = myArray[i];
           }
       }
       System.out.println("The maximum value in the array is: " + max);
   }
}

What is array?
A collection of items (values or variables) is referred to as an array in computer science. Each element is identifiable by at least one array index or key. An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple. A linear array, sometimes referred to as a one-dimensional array, is the most basic sort of data structure. Two-dimensional arrays are sometimes referred to as "matrices" since the theoretical concept of a matrix can be expressed as a two-dimensional grid. Although tuples instead of vectors it is the more mathematically accurate counterpart, the term "vector" is occasionally used in computers to reference to an array. In particular, lookup tables are frequently implemented as arrays, and the word "table" is occasionally used as a shorthand for array.

To learn more about array
https://brainly.com/question/28061186
#SPJ4

Debug the code provided in the starter file so it does the following:

creates an int with the maximum possible value

increases this int by 1

prints the result

creates an int with the minimum possible value

decreases this int by 1

prints the result

----------------------------------

Code:

public class U2_L7_Activity_One

{

public static void main(String[] args)

{

long a = Long. MAX_VALUE();

a + 1;

System. Out. Println(a);

long b = Long. MIN;

b - 1;

System. Out. Println('b');

}

}

Answers

Finding and correcting code flaws is part of debugging. The following are the code errors: group name, Statements in print, declare variables, input declarations.

Debugging is the process of identifying and fixing flaws in computer programs, software, or systems. Bugs are errors or issues that prohibit proper operation.

Debugging techniques include memory dumps, profiling, control flow analysis, unit testing, integration testing, log file analysis, interactive debugging, and monitoring at the application or system level.

The program's class name is U3 L5 Activity Two.

Spaces are not permitted in class names; an underscore should be used instead.

Therefore, U3 L5 Activity Two or U3 L5 ActivityTwo is the proper class name.

The statement in print

Java distinguishes between lowercase and uppercase letters.

The program's print statements start with the little letter s. This is untrue.

The following are accurate statements:

"Enter two numbers," System.out.println;

"is a multiple of" + System.out.println(b + "" + a);

"Is not a multiple of" + System.out.println(b + "" + a);

Statements of declaration and input

Additionally, the input statements are incorrect, and variables a and b were incorrectly declared.

The appropriate answers are:

Integers a and b are equal to scan.nextInt();

The circumstance

The if statement is not formatted correctly.

The right response is: iif(b%a == 0)

Thus, the appropriate code is:

import scanner from java.util;

general class Main

(String[] args) public static void main

new Scanner(System.in) = Scanner scan;

"Enter two numbers," System.out.println;

I = scan.next int a

Int();

scan.nextInt(); int b;

if(b%a == 0){

"is a multiple of" + System.out.println(b + "" + a);

else{

"Is not a multiple of" + System.out.println(b + "" + a);

To know more about debugging click on the link:

https://brainly.com/question/13966274

#SPJ4

to determine what resources or shares are on a network, security testers must use footprinting and what other procedure to determine what services a host computer offers?

Answers

A security tester would use port scanning to determine what services a host computer offers.

What is host?
A computer or other device linked to a computer network is referred to as a network host. A host may serve as a server, providing users and other hosts on the network with information resources, services, or applications. Each host is given a minimum of one network address.

An IP host is a computer that participates in networks that uses protocol suite. Internet hosts are specifically machines connected to the Internet. The network interfaces of internet hosts as well as other IP hosts are given one or more IP addresses. Administrators can manually specify the addresses, and had the Dynamic Host Configuration Protocol (DHCP) automatically configure them at startup, or use stateless address autoconfiguration techniques.

To learn more about host
https://brainly.com/question/27075748
#SPJ4

our cpu is to be connected to ram with 16gb capacity [this means the ram stores data 1byte in the x-direction, and 16g in the y-direction]. what is the required address bus width between the cpu and ram to support 16g discrete addresses?

Answers

The maximum accessible memory for the PC is 16 gigabytes. It has a 32-bit address bus width.

What is an Address bus?

The hardware address of the physical memory, or the physical address, is a computer bus architecture used to transfer data between devices. This address is maintained as a string of binary integers to allow the data bus to access memory storage.

What is accessible memory?

Playing the memory game Accessible Memory with pushbuttons or by touching the screen is interchangeable. Use the provided images or make your own tabs are the main features.

our CPU is to be connected to ram with 16GB capacity [this means the ram stores data 1byte in the x-direction and 16g in the y-direction]. And the required address bus width between the CPU and ram to support 16g discrete addresses is 32.

Hence, 32 Address bus width is required.

To learn more about Address bus from the given link

https://brainly.com/question/27380625

#SPJ4

Other Questions
Convert to fractional Notation 4 19/100 A marble was thrown vertically up the air and came back down to the samelevel in 1.6 s. (using g = 9.81 ms?).(a) What is it initial velocity?(b) What would be the highest height it can reach?(c) How long would it take to reach the highest point? an assembly line requires two components: gadjits and widjits. gadjits are produced by center 1 and widjits are produced by center 2. each unit of the end item, called a jit-together, requires 3 gadjits and 2 widjits. the daily production quota on the assembly line is 900 jit-togethers. the container for gadjits holds 90 units. the policy variable for center 1 is set at 0.04. the average waiting time for a container of gadjits is 0.07 day, and 0.07 day is needed to produce a container. the container for widjits holds 50 units, and the policy variable for center 2 is 0.07. the average waiting time per container of widjits is 0.12 day, and the time required to process a container is 0.26 day. how many containers are needed for gadjits? and how many containers are needed for widjits? What is 1 way to make the operational definition, "on a cold day", better? "On a cold day, determine what happens to a can of soda left outside." which of the following would most likely have caused the production possibilities frontier to shift outward from a to b? group of answer choices a decrease in unemployment a technological advance in the consumer goods industries a general technological advance an increase in the availability of capital-producing resources prove the formula sin 3 A + sin A = 4 sin A cos2A A group of people were asked if they owned a dog. 191 responded "yes", and 485 responded "no".Find the probability that if a person is chosen at random, they own a dog. 191485 294191 191676 suppose that the members of a student governance committee will be selected from the 40 members of the student senate. there are 18 sophomores, 12 juniors and 10 seniors who are members of the student senate. in how many ways can the governance committee be selected, if it must be made up of 2 sophomores, 2 juniors and 3 seniors? assume that each of the sophomores, each of the juniors and each of the seniors is equally likely to be selected for the committee. a. 339 b. 1211760 c. 2160 d. 18643560 e. 25920 The graph shows a dilation of trapezoid TRAP with respect to the origin which statements are true about the figures select three complete the table to show the total change in the average mean daily in the price of for stocks over a five-day. 1. Why does Friar Lawrence seem so uneasy about Paris's request? A parallelogram has an area of 364.5 cm2. If the base is 27 cm, What is the height? Jim baked 48 cookies with 4 scoops of flour. How many scoops of flour does Jim need in orderto bake 96 cookies? Assume the relationship is directly proportional. what would happen if there was no greenhouse effect within Earth's atmosphere? Alyssa will correctly label the numbers 48.4, 48482, 48.09, and 48on the number line below. Fill in the missing number to complete the linear equation that gives the rule for this tablex: 4, 5, 6, 7y: 32, 40, 48, 56y = ?x NOBODY'S ANSWERING MY QUESTION, HELLO? I WILL GIVE BRAINLIEST :( how many shirts can Jeanette sew at most of and still have 1. spool of thread left helpppppppppppppppppppppppppppppp an off-shore windfarm is likely coming to north carolina, and beachfront property owners are concerned about potential property value impacts. to monetize these impacts, one could use the nonmarket valuation technique. select one: a. averting behavior. b. travel cost. c. hedonic. d. contingent valuation.