Placing javascript code in a web page file means that users need to retrieve only ____ file from the server.
In a ______ connection, two and only two devices are connected by a dedicated link.
A) multipoint
B) point-to-point
C) (a) and (b)
D) none of the above
In a point-to-point connection, two and only two devices are connected by a dedicated link. Thus, option B is correct.
What is devices?A piece of machinery, apparatus, or system created with a specific function in mind. devices like cell phones as well as other electronics. Devices include any computer, mobile phone, phone, video recorder, recorder, or other electronic gadgets which can be used to create, store, or transport media in the form of digital communications.
Exclusive connectivity between devices connected is provided through a P2P connection. These two devices are the only ones allowed to transmit at the complete capability of a link.
A unique link that links two network components is known as a point-to-point link. These two machines transmit data using the ’s of such a link.
Therefore, option B is the correct option.
Learn more about devices, here:
https://brainly.com/question/11599959
#SPJ2
Final answer:
The correct answer is B) point-to-point. This connection type refers to a dedicated link between two and only two devices, providing a direct communication path.
Explanation:
In a point-to-point connection, two and only two devices are connected by a dedicated link. The correct answer to this question is B) point-to-point. A point-to-point connection is a direct communication path between two devices where they are uniquely connected with each other. This type of network configuration is commonly used for a permanent link between two endpoint devices.
the internet is an example of
a. a large multi user program
b. a computer program
c. wireless connection
d. mass file storage
The internet is an example of a large multi-user program. Thus the correct answer is A.
What is the internet?The Internet is refers to a Network of thousands of computers used to connect people from miles away. This has shortened the distance between people.
It helps to communicate, do online shopping, education, research, play games, animations, and so on. It allows many people to connect over the program.
Therefore, option A a large multi-user program is the appropriate answer.
Learn more about the Internet, here:
https://brainly.com/question/13308791
#SPJ2
Which term describes the order of arrangement of files and folders on a computer?
Regression testing should be a normal part of integration testing because as a new module is added to the system new
A) control logic is invoked
B) data flow paths are established
C) drivers require testing
D) all of the above
E) both a and b
Regression testing should be a normal part of integration testing because as a new module is added to the system new control logic is invoked and data flow paths are established.
What is regression testing?Regression testing is a software testing practice which ensures that an application is still functioning as it need to or expected after making any code changes or improvements. Regression testing checks for the overall stability and functionality of the existing features of the software.
Now, the Regression testing is integrated with the software so that if any changes are made, new control logics are automatically invoked and data flow path is established.
Thus, the correct option is E. i.e. both A and B.
Learn more about regression testing.
https://brainly.com/question/13327687
#SPJ2
What was the only method of sharing files between computers before networks were invented?
Why are using some special characters (@, #, !, etc.) not a good idea?
Assign True to the variable has_dups if the string s1 has any duplicate character (that is if any character appears more than once) and False otherwise.
Here is the answer I wrote:
i = []
for i in range(len([s1])):
if s1.count(s1[i]) > 1:
has_dups = True
elif s1.count(s1[i]) = 1:
has_dups = False
Here is the message I got from the system:
Solutions with your approach don't usually use: elif
Please Help me to correct it.
_______ is the protocol suite for the current Internet.
A) TCP/IP
B) NCP
C) UNIX
D) ACM
XML Schemas consist of:
A.
properties and methods.
B.
elements and attributes.
C.
structure and data.
D.
tables and relationships.
View Answer Workspace Report Discuss in Forum
9.
The expression FOR XML RAW tells SQL Server to:
9.
A.
place the values of the columns as attributes in the resulting XML document.
B.
place the values of the columns into elements rather than attributes.
C.
place some columns into elements and others into attributes.
D.
None of the above is correct.
which of the following is the default letter assigned for the primary hard drive
Which of the following need to be assessed during unit testing?
A) algorithmic performance
B) code stability
C) error handling
D) execution paths
E) both c and d
Error handling & execution paths whether any of the following should be evaluated in the testing phase, and further discussion can be defined as follows:
Error handling relates to routines in programming that respond to unexpected inputs or conditions. It is also the process for dealing with the possibility of loss. The lucidity of error messages and the options provided to the users regarding problem resolution assess the quality of these procedures. It's significant because it makes life simpler for end-users to use the code appropriately. The execution route is a potential flow of command in a program. During symbolic execution, each execution path keeps and changes the mapping from variables to symbolic expressions. Sequence expressions including if cause an execution path to split into two distinct test steps.Therefore, the answer is "Option E".
Learn more:
brainly.com/question/6646878
Frequency of failure and network recovery time after a failure are measures of the _______ of a network.
A) Performance
B) Reliability
C) Security
D) Feasibility
Final answer:
The frequency of failure and network recovery time after a failure are measures of the reliability of a network, reflecting its stability and how quickly it can resume normal operations after downtime.
Explanation:
The frequency of failure and network recovery time after a failure are measures of the reliability of a network. When assessing reliability, it is important to consider how consistent a network is in terms of its uptime and its ability to maintain functionality over time.
Reliability is a key factor in network design and operation because it quantifies the likelihood of a system operating without failure for a certain period of time. In a network context, reliability encompasses not only the stability of the network but also the speed at which it can recover from issues, including errors, faults, and failures. An unreliable network might experience frequent downtimes or take a long time to recover from disruptions, negatively affecting the users and potentially leading to loss of data or service.
Let's consider another scenario outside of networking for a broader understanding of reliability. In research, reliability refers to the measure of a study's consistency that considers how likely results are to be replicated if a study is reproduced. Similar to network reliability, this also focuses on the predictability and stability of outcomes.
Reliability should not be confused with feasibility or performance, which deal with different aspects of network or system attributes.
The frequency of failure and network recovery time after a failure are measures of the reliability of a network, indicating the system's consistency and likelihood of uninterrupted performance.
Explanation:The frequency of failure and network recovery time after a failure are measures of the reliability of a network. Reliability in this context refers to the likelihood that a system will perform as expected over a given period. It is a measure of consistency, indicating how likely it is for the network's performance to be replicated consistently without failures. A reliable network typically experiences less downtime and is able to recover quickly from interruptions, thus ensuring consistent connectivity and service availability.
C++ code-- Factorial Recursion
Write code to complete PrintFactorial()'s recursive case. Sample output if userVal is 5:
5! = 5 * 4 * 3 * 2 * 1 = 120
#include
using namespace std;
void PrintFactorial(int factCounter, int factValue){
int nextCounter = 0;
int nextValue = 0;
if (factCounter == 0) { // Base case: 0! = 1
cout << "1" << endl;
}
else if (factCounter == 1) { // Base case: Print 1 and result
cout << factCounter << " = " << factValue << endl;
}
else { // Recursive case
cout << factCounter << " * ";
nextCounter = factCounter - 1;
nextValue = nextCounter * factValue;
}
}
int main() {
int userVal = 0;
userVal = 5;
cout << userVal << "! = ";
PrintFactorial(userVal, userVal);
return 0;
}
Answer:
void PrintFactorial(int factCounter, int factValue){
int nextCounter = 0;
int nextValue = 0;
if (factCounter == 0) { // Base case: 0! = 1
cout << "1" << endl;
}
else if (factCounter == 1) { // Base case: Print 1 and result
cout << factCounter << " = " << factValue << endl;
}
else { // Recursive case
cout << factCounter << " * ";
nextCounter = factCounter - 1;
nextValue = nextCounter * factValue;
printFactorial(nextCounter, nextValue);
}
}
Explanation:
The only things that is left is calling the recursive function in the else statement. It is the bolded command on the answer.
factCounter is the value we are multiplying. In the function, it is nextCounter. So for 5, it is 5, then 4, then 3, until 0...
factValue is the value of the factorial. In the function, it is nextValue So it is 5, then 5*4 = 20, then 5*4*3 = 60, then...
void PrintFactorial(int factCounter, int factValue){
int nextCounter = 0;
int nextValue = 0;
if (factCounter == 0) { // Base case: 0! = 1
cout << "1" << endl;
}
else if (factCounter == 1) { // Base case: Print 1 and result
cout << factCounter << " = " << factValue << endl;
}
else { // Recursive case
cout << factCounter << " * ";
nextCounter = factCounter - 1;
nextValue = nextCounter * factValue;
printFactorial(nextCounter, nextValue);
}
}
Recovery testing is a system test that forces the software to fail in a variety of ways and verifies that software is able to continue execution without interruption.
A) TRUE
B) FALSE
In access, the columns in a table are called?
I have this question from the textbook:" Web Development and Design Foundations with HTML5-7th ed."
I cannot seem to figure out part "c" of the question.
1. Design a new web page using embedded CSS to configure a background color and text color. Include the following in your web page.
a. Your name
Use an h1 header that you have configured, using element selector with drop shadow text, transparent background color, and a sans-serif font
b. A description of your favorite hobbies and activities
Configure a CSS class that stylizes this description list
c. A photo of yourself (be sure to optimize the image for display on the Web)
Write the CSS for an id called holder that is configured to 80% width and centered
Put your photo in a that uses the id holder
Make sure that your image is accessible by using an alt tag, etc.
Make this image a hyperlink by adding a link to it to a favorite hobby site or your email with a mailto link
this is what I have so far, and kind of stuck!
A ________ is a set of rules that governs data communication.
A) forum
B) protocol
C) standard
D) none of the above
A java ____ is a program written in the java programming language that can be included in a web page.
Answer:
Java Applets are used to include java programs on web page.
Explanation:
Java Applets are small java programs that can be run on any browser with appropriate Java Plug-in and displays applet as a section of web page.
How to Create Applet
Create an applet class by extending it with JApplet and add a paint method in it. for example
import java.awt.*;
import javax.swing.*;
public class HelloWorld extends JApplet {
public void paint(Graphics graphic)
{
super.paint(graphic);
}
}
The above code will create an applet and super.paint(graphic) method will draw the applet for you.
In order to display "Hello World" string in applet. you just need to add the following line after super.paint(graphic); method.
graphic.drawString("Hello World" , 20, 20);
Run Code
Click on Run Button and you will able to see the applet in applet viewer window.
Answer:
Java Applets are used to include java programs on web page.
Explanation:
Java Applets are small java programs that can be run on any browser with appropriate Java Plug-in and displays applet as a section of web page.
How to Create Applet
Create an applet class by extending it with JApplet and add a paint method in it. for example
import java.awt.*;
import javax.swing.*;
public class HelloWorld extends JApplet {
public void paint(Graphics graphic)
{
super.paint(graphic);
}
}
The above code will create an applet and super.paint(graphic) method will draw the applet for you.
In order to display "Hello World" string in applet. you just need to add the following line after super.paint(graphic); method.
graphic.drawString("Hello World" , 20, 20);
Run Code
Click on Run Button and you will able to see the applet in applet viewer window.
All of the following are the four more widely social media networks discussed in the text EXCEPT:
a. Twitter.
b. YouTube.
c. Facebook.
d. LinkedIn.
e. Groupon.
Answer: C
Explanation: a website where users create a personal profile, add other users as friends, and exchange comments, photos, videos, and "likes" with them.
i have a couple of questions on java for my homework
21229
Assume the availability of a method named makeLine that can be passed a non-negative integer n and a character c and return a String consisting of n identical characters that are all equal to c. Write a method named printTriangle that receives two integer parameters n andk. If n is negative the method does nothing. If n happens to be an even number, its value is raised to the next odd number (e.g. 4-->5). Then, when k has the value zero, the method prints a SYMMETRIC triangle of O's (the capital letter O) as follows: first a line of n O, followed by a line of n-2 O's (indented by one space), and then a line of n-4 O's (indented by two spaces), and so on. For example, if the method received 5,0 (or 4,0) it would print:
OOOOO
OOO
O
Note: in the above output , the first line contains 0 spaces before the first O, the next line 1 space, and so on.
Note: These instructions state what the method does when k is zero, but it is up to you, the programmer, to determine what it does when k is not zero and use it for your advantage.
The method must not use a loop of any kind (for, while, do-while) to accomplish its job. The method should invoke makeLine to accomplish the task of creating Strings of varying lengths.
20861
A palindrome is a string that reads the same forwards or backwards; for example dad, mom, deed (i.e., reversing a palindrome produces the same string ). Write a recursive, boolean -valued method , isPalindrome that accepts a string and returns whether the string is a palindrome.
A string , s, is a palindrome if:
s is the empty string or s consists of a single letter (which reads the same back or forward), or
the first and last characters of s are the same, and the rest of the string (i.e., the second through next-to-last characters ) form a palindrome.
20864
A 'array palindrome' is an array which, when its elements are reversed, remains the same (i.e., the elements of the array are same when scanned forward or backward) Write a recursive, boolean -valued method , isPalindrome, that accepts an integer -valued array , and a pair ofintegers representing the starting and ending indexes of the portion of the array to be tested for being a palindrome. The function returnswhether that portion of the array is a palindrome.
An array is a palindrome if:
the array is empty (0 elements ) or contains only one element (which therefore is the same when reversed), or
the first and last elements of the array are the same, and the rest of the array (i.e., the second through next-to-last elements ) form a palindrome.
Given the ip address 192.168.112.0. each network requires between 35 and 60 hosts. what is the broadcast address of the first available subnet?
In your opinion, is it more beneficial to have many folders or is it better to “nest” subfolders? Explain your response.
Which of the following strategic issues needs to be addressed in a successful software testing process?
A) conduct formal technical reviews prior to testing
B) specify requirements in a quantifiable manner
C) use independent test teams
D) wait till code is written prior to writing the test plan
E) both a and b
The strategic issues that should be addressed for a successful software testing process include the conducting of a formal technical reviews prior to testing and specifying the requirements in a quantifiable manner.
The test strategy has to do with the testing approach of the development cycle of the software and its aim is to ensure that the objectives of the software are met.
It should be noted that using independent test teams and waiting till the code is written prior to writing the test plan doesn't need to be addressed in a successful software testing process.
Therefore, the correct option is E since both option and B are correct.
Read related link on:
https://brainly.com/question/13262403
________ is a collection of many separate networks.
A) A WAN
B) An internet
C) a LAN
D) None of the above
Why are words like monkey, smile, and freedom not good to use as passwords??
Antel and imd both produce similar computer chips and the two companies dominante this
Answer:
Because it will restrict the supply of computer chips
Explanation:
Antel and imd both produce similar computer chips and the two companies dominante this
Because they can both charge more for the product at the given level of production
Because it will restrict the supply of computer chips
Because overall demand for computer chips will increase
Because the firms' marginal costs increase as output increases
As both companies have the total supply of the product in the market they can dominate everything that they are providing because of this, they cab restrict the supply of the computer chips, if they cooperate and work together they can set a minimum price and a ceiling price, they can dictate how the market flows, because of that, the price of the computer chips will depend solely on them.
Debugging is not testing, but always occurs as a consequence of testing.
A) TRUE
B) FALSE
It is true to say that Debugging is not testing but always occurs as a consequence of testing.
What is Debugging?Debugging is the process of identifying and fixing defects in computer programs, software, or systems. It is a crucial step in computer programming and software development.
Debugging is used to identify and correct errors. The testing procedure just displays the consequences of the coding fault on the application; it does not assist the developer in identifying the mistake in the code.
Software developers and engineers use debugging to find and correct bugs in programs before making them available to the general public. It's an additional step to testing, which entails discovering how an issue impacts a program as a whole.
Debugging is the act of locating and fixing problems in software code that might lead to unexpected behavior or crashes. These mistakes are sometimes referred to as "bugs." Debugging is used to identify and fix faults or flaws in software or systems so that they don't operate incorrectly.
To read more about Debugging, refer to - https://brainly.com/question/13966274
#SPJ2
A ______ is a data communication system spanning states, countries, or the whole world.
A) MAN
B) LAN
C) WAN
D) none of the above
A WAN is a data communication system spanning states, countries, or the whole world. Thus, option C is correct.
What is data communication?
Data communication is the process of sending messages or data through two devices across a wireless medium, as it is in computer systems. A combination of hardware and connectivity is used in this procedure.
A communications system known as a large area network covers a huge geographic region. Leased telecommunications lines are frequently used to construct large-area networks.
Since this includes numerous stations dispersed across a particular bregion, or perhaps the entire world, it is known as a wide-area network. This was to ensure that the data can be reached, by multiple users.
Therefore, option C is the correct option.
Learn more about data communication, here:
https://brainly.com/question/28588084
#SPJ2
What type of Microsoft Server serves as an email server?