1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
13

List some good names for devices on your home network or on the network in your school's lab. Demonstrate the use of best practi

ces when creating a naming scheme for devices on a computer network.
Computers and Technology
1 answer:
Anton [14]3 years ago
8 0

Answer:

Following are the answer to this question:

Explanation:

The following is the list of name devices, which is used home network or the school lab.

  • hrtr01(home router 1).
  • schadmrtr02(school building router 2).
  • clpc01, and clpc02 (computer laboratory pc 1 and 2) .

Uses:

  • Its use as descriptive names as necessary without gives potential hacks much more relevant data.  
  • It provides only areas that are essential for both device identification.  
  • It allows the name for irrelevant or redundant information doesn't over-complicated.
You might be interested in
Technician A says that the reserve rating of a battery is the amount of steady current that a fully charged battery can supply f
Andre45 [30]

Answer:

Neither A nor B

Explanation:

<em>Reserve capacity</em> is the number of minutes that a new, fully charged battery can discharge continuously and maintain a terminal voltage equal to or greater than 1.75 volts per cell.

<em>An ampere-hour </em>is an electric charge unit and its abbreviation is Ah.

It measures the amount of electric charge flowing through a battery in the case that amount supplies a current of 1 amp for 1 hour.

5 0
3 years ago
What are the advantages of using a vpn?​
Fantom [35]

Answer:

Changing ip address to avoid ip ban. keeping your personal info safe while on public connections

Explanation:

Looked it up.

5 0
2 years ago
Which of these is a way that a doctor can examine a patient?
SIZIF [17.4K]

Answer:

D. all the above

Explanation:

because doctor uses stethoscope to listen patients heart, he also used hammer to check patients reflexes and also doctor has to listen to the patient.

5 0
3 years ago
Write a method transpose, that takes as argument a 2D array of integers, myTable, and returns the transpose of myTable. The tran
Gelneren [198K]

Answer:

The program to this question can be given as:

Program:

import java.util.*; //import package

public class Main //defining class

{

public static int[][] transpose(int[][] a1) //defining function transpose

{

int i,j; //define variables

int[][] transpose = new int[a1[0].length][a1.length]; //define variable transpose.

//loop for transpose matrix.

for(i = 0; i < a1.length; i++)  

{

for(j = 0; j < a1[i].length; j++)

{

transpose [j][i] = a1[i][j]; //hold value in transpose variable

}

}

return transpose ; //return transpose matrix.  

}

public static void main(String[] args) //main method.

{

int row,col,i,j; //defining variable.

Scanner obj = new Scanner(System.in); //creating Scanner class Object

System.out.print("Enter number of rows: ");//message

row = obj.nextInt(); //input rows form user.

System.out.print("Enter number of columns: ");//message

col = obj.nextInt(); //input columns form user.

int[][] a1 = new int[row][col]; //defining array.

System.out.println("Enter matrix"); //message

// loop for input array elements from user

for(i=0; i<a1.length;i++)  

{

for(j=0; j<a1[i].length;j++)  

{

a1[i][j]=obj.nextInt(); //input in array variable.

}

}

System.out.println("Matrix you insert :"); //message

// loop for display array.

for(i=0; i<a1.length;i++)  

{

for(j=0; j<a1[i].length;j++)  

{

System.out.print(a1[i][j]+" "); //print matrix

}

System.out.print("\n");

}

int[][] result = transpose(a1); //define result array variable that holds function value.

System.out.println("Transposed matrix is :");

//use loop for print Transpose matrix.

for(i = 0;i < result.length;i++)

{

for (j = 0; j < result[i].length;j++)

{

System.out.print(result[i][j] + " "); //print matrix

}

System.out.print("\n");

}

}

}

Output:

Enter number of rows: 2

Enter number of columns: 3

Enter matrix

2

3

4

9

8

7

Matrix you insert :

2 3 4  

9 8 7  

Transposed matrix is :

2 9  

3 8  

4 7  

Explanation:

The description of the above program can be given as:

  • In the above program firstly import a package, then declare a class that is "Main" inside a class defining a transpose() function this function returns a matrix in transpose form.
  • In the main class, we define a variable and matrix that is "row, col, i, j and a1[][]".  Then we Creating a scanner class object, which is used by row, col and a1[][] variables for user input.  
  • The row and col variables are used to declare matrix size and i, j variable is used in the loop for insert and display matrix.  
  • a1[][] matrix is used for input matrix elements and passes into transpose() function as an argument that returns a value that is held in the result variable. This is used as a loop for the print transpose matrix.

5 0
3 years ago
3.1.5 Which network component connects a device to transmission media and allows the device to send and receive messages?
Rom4ik [11]

Answer:

Network Interface Card (NIC)

Explanation:

Also called Ethernet Card, the Network Interface Card (NIC) allows a computer or any device to make wired or wireless connections with other devices in a network. This connection made possible by the NIC allows the device to send and receive messages in the network.

An application of this is seen in Internet of Things(IoT) where devices communicate with one another. This is actually possible because all of the devices one way or the other have a network interface card.

8 0
3 years ago
Other questions:
  • In the space below, write the formula that needs to be added to the blank cells under the fourth column of the table.
    13·1 answer
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
    8·1 answer
  • Which HTML tag is used to add a paragraph to a web page?
    15·1 answer
  • What do the following standards cover?
    7·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • Resize vector countDown to have newSize elements. Populate the vector with integers {newSize, newSize - 1, ..., 1}. Ex: If newSi
    6·1 answer
  • How would you design an adaptive environment for people who are blind?
    10·1 answer
  • How much do you think it would cost to develop an app?
    14·2 answers
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!