Implement the simulation of a biased 6-sided die which takes the values 1,2,3,4,5,6 with probabilities 1/8,1/12,1/8,1/12,1/12,1/
hjlf
Answer:
see explaination
Explanation:
import numpy as np
import matplotlib.pyplot as plt
a = [1, 2, 3, 4, 5, 6]
prob = [1.0/8.0, 1.0/12.0, 1.0/8.0, 1.0/12.0, 1.0/12.0, 1.0/2.0]
smls = 1000000
rolls = list(np.random.choice(a, smls, p=prob))
counts = [rolls.count(i) for i in a]
prob_exper = [float(counts[i])/1000000.0 for i in range(6)]
print("\nProbabilities from experiment : \n\n", prob_exper, end = "\n\n")
plt.hist(rolls)
plt.title("Histogram with counts")
plt.show()
check attachment output and histogram
Answer:
i. True
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.
PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.
Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.
In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).
A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.
Answer: static
Explanation:
In java we have the static keyword to indicate that it can be called without creating an object of the class.
example :
public static void main(String arg[])
So, main can be called without creating an object of the class.
Explanation:
Let, DG is the datagram so, DG= 2400.
Let, FV is the Value of Fragment and F is the Flag and FO is the Fragmentation Offset.
Let, M is the MTU so, M=700.
Let, IP is the IP header so, IP= 20.
Let, id is the identification number so, id=422
Required numbers of the fragment = ![[\frac{DG-IP}{M-IP} ]](https://tex.z-dn.net/?f=%5B%5Cfrac%7BDG-IP%7D%7BM-IP%7D%20%5D)
Insert values in the formula = ![[\frac{2400-20}{700-20} ]](https://tex.z-dn.net/?f=%5B%5Cfrac%7B2400-20%7D%7B700-20%7D%20%5D)
Then, =
= ![[3.5]](https://tex.z-dn.net/?f=%5B3.5%5D)
The generated numbers of the fragment is 4
- If FV = 1 then, bytes in data field of DG=
and id=422 and FO=0 and F=1.
- If FV = 2 then, bytes in data field of DG=
and id=422 and FO=85
and F=1.
- If FV = 3 then, bytes in data field of DG=
and id=422 and FO=170
and F=1.
- If FV = 4 then, bytes in data field of DG=
and id=422 and FO=255
and F=0.