1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
4 years ago
8

Which tool lists active tcp connections?

Computers and Technology
1 answer:
dimaraw [331]4 years ago
8 0
Netstat
Type netstat -a to get a complete overview.
You might be interested in
Stanford Rosenberg Computing wants to establish an assembly line for producing a new product, the Personal Digital Assistant (PD
Elina [12.6K]

Answer:

d what is the efficiency of this assembly line assignment?

8 0
4 years ago
Consider the Google Trends graph of dogs and cats. Give a plausible explanation or hypothesis for the spike in dog searches that
Nataly [62]

Answer:

The correct answer for: Consider the Google Trends graph of dogs and cats. Give a plausible explanation or hypothesis for the spike in dog searches that occurred between 2014 and 2015 that would lead to further investigation or research. Give your explanation and what you would want to investigate next. Is: b. dog rescues someone.

Explanation:

All right. The topic I would lie t investigate next is dogs rescue someone. Because first of all, the word dog by itself wouldn't generate such a spike in searches. c) option new dog breed seems quite difficult because for a new dog breed to be created. There has to be a hundred-year period to make the genetic design and also it has to be allowed by the kennel club as well as organizations that seek for dog's health and wellbeing. That leaves dog attack and dog rescues someone in the final mile. A dog attack is something not very common but that happens. Nevertheless, even though it is relevant it wouldn't as impressive and pivoting as a dog rescuing someone. The reason behind my posture is that as a story is not very promising, it could be a little bit yellow journalism and won't be as accepted and shared as a good act from a dog.

7 0
3 years ago
Internet users aged 15 and older are expected to buy about ________ worth of products and services online in 2022 (excluding tra
gregori [183]

Internet users aged 15 and older are expected to buy about<u>  $500 billion </u>worth of products and services online in 2022.

<h3>Who are the most users of internet?</h3>

China ranks first in this list of countries with most internet users. Due to its ongoing and fast-paced economic development, but also to a cultural inclination towards technology, more than a billion of the estimated 1.4 billion population in China are online

<h3>How many internet users are there in the world 2022?</h3>

The global total has still increased by 7.5 percent year on year though, with an additional 326 million new users over the past 12 months taking the global count to 4.65 billion by the start of April 2022.

To learn more about Internet users, refer

brainly.com/question/27003790

#SPJ4

Complete Question is,

A) $200 million

B) $900 million

C) $40 billion

D) $100 billion

E) $500 billion

4 0
2 years ago
Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the
WITCHER [35]

Answer:

The code to this question can be defined as follows:

Code:

#include <stdio.h> //defining header file

int main() //defining main method

{

float user_num; //defining float variable

printf("Enter a value: "); //message

scanf("%f",&user_num); //input value from user end

printf("%f, ",user_num); //print value

while (user_num>1) //loop to calculte value

{

user_num=user_num/2; //diving value

printf("%f, ",user_num); //print value.

}

   return 0;

}

Output:

Enter a value: 20

20.000000, 10.000000, 5.000000, 2.500000, 1.250000, 0.625000,  

Explanation:

Description of the code as follows:

  • First, a float variable "user_num" is declared, in which we take input from the user-end.
  • In the next step, a while loop is declared, that uses the above variable to calculates its value.
  • Inside the loop variable "user_num" divide its value by 2 and holds its calculated value, to print its value the "printf" method is used that prints its value.  
8 0
4 years ago
Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB
lyudmila [28]

Answer:

a) 20 MB

b) 10 MB

c) 18 MB

Explanation:

First fit method works by keeping list of jobs which are ordered by memory location. This list of jobs contains free/busy status. Free means that hole is available and it takes the memory requests and busy is for the memory space is occupied.

In first fit method the first process takes the first available hole or memory with space greater than or equal to the size of the job. OS assigns process to nearest memory partition available with sufficient size.

For the request for 12 MB the hole with size 20 MB is taken as its nearest memory location of sufficient size than 10 and 4 MB. Now the status of this is busy as its taken by a job.

Next for the request of 10 MB the sufficient nearest memory hole is 10 MB as its equal to the size of the job. The status is changed to busy.

Next for the request of 9 MB the sufficient nearest hole is 18 MB as the 10 and 20 MB are already taken and 4 MB is not sufficient so the first sufficient available hole is of 18 MB.

5 0
4 years ago
Other questions:
  • Which is a network of devices built around a person, typically within 10 meters of range?
    5·1 answer
  • Color of seagrass beds on navigational charts? Please quickly
    12·1 answer
  • A technician has connected a laptop to a television via HDMI cable. The entire display cannot be seen on the television. Which o
    14·2 answers
  • What is the default file extension for a document created in Word 2016​
    13·1 answer
  • Which of the following is a setting in both the Transparency panel and the Mirror panel?
    10·1 answer
  • Which one you choosing? PS5 OR THE XBOX SERIES X???
    14·2 answers
  • How to do or create a shepard tone using additive synthesis in Pure Data. Please help, desperate!!
    8·1 answer
  • True or false: Concurrent validation is more time consuming to measure than predictive validation because it involves a wait per
    13·1 answer
  • In python, what is the difference between a dictionary and a set? How are they similar?
    11·1 answer
  • In java complete a program that takes a weight in kilograms as input, converts the weight to pounds, and then outputs the weight
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!