1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
2 years ago
13

List some good names for devices on your home network or on the network in your school's lab. Demonstrate the use of best practi

ces when creating a naming scheme for devices on a computer network.
Computers and Technology
1 answer:
Anton [14]2 years ago
8 0

Answer:

Following are the answer to this question:

Explanation:

The following is the list of name devices, which is used home network or the school lab.

  • hrtr01(home router 1).
  • schadmrtr02(school building router 2).
  • clpc01, and clpc02 (computer laboratory pc 1 and 2) .

Uses:

  • Its use as descriptive names as necessary without gives potential hacks much more relevant data.  
  • It provides only areas that are essential for both device identification.  
  • It allows the name for irrelevant or redundant information doesn't over-complicated.
You might be interested in
Write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). A function j
Lelu [443]

Answer:

see explaination

Explanation:

def words2number(s):

words = s.split()

numbers = ['zero', 'one', 'two', 'three', 'four', 'five', 'six', 'seven', 'eight', 'nine']

result = ""

for word in words:

if word in numbers:

result += str(numbers.index(word))

return result

4 0
3 years ago
Read 2 more answers
Which of the following best explains why algorithms are written in the design phase?
Annette [7]

Answer:

D. Algorithms need to be written in the design phase so they can be translated into code in the development phase.

Explanation:

5 0
3 years ago
You want to send an email message to your friend to describe your meeting with Michal. However, you incorrectly type the name as
Gemiola [76]

Answer:

Option B.

Explanation:

The delete key is used to delete the symbol after the insertion point.

Here, Michal is typed as Michael.

So, to delete the letter e from Michael, put the insertion point before e.

If you put insertion point after the letter e or before the letter l, l gets deleted.

In no case, you can put the insertion point after the letter l.

So, option B is correct.

4 0
3 years ago
The same student is curious about how a Web site appears on his computer screen. On a separate piece of paper, draw and explain
Ksivusya [100]

Answer:

HTTP is the application layer protocol required.

Explanation:

For a web page to be displayed on a browser, the seven layers of the OSI model work together. On the application layer, HTTP protocol is used to communicate between the server and the client. The HTTP client is the browser (Chrome, Internet Explorer, Firefox etc.) which sends a request to the HTTP server for accessing a web page.  

When a URL is accessed, the HTTP client sends a request to the HTTP server. The server locates the file which is being requested and sends a response message containing the web page which is to be displayed. The exchange of data between the HTTP client and server takes place over a TCP connection.

TCP is a transport layer protocol which provides a reliable connection over which the exchange of data takes place. Data at the transport layer is sent in the form of segments. If the data being sent from the server is too long, it is divided into multiple segments and sent one after the other. The client is then responsible for joining the segments and displaying the information as a web page. The transport layer is also responsible for error correction and detection during the communication process.

If the student is sending or retrieving information from a secure website, the messages being exchanged between the client and server will be encrypted. This means that if a third-party tries to tap the communication process, they would not be able to decipher the messages. This increases the security and helps keep the information present on the web page confidential.

8 0
3 years ago
CASE II AziTech is considering the design of a new CPU for its new model of computer systems for 2021. It is considering choosin
34kurt

Answer:

(a)The CPU B should be  selected for the new computer as it has a low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A.

(b) The CPU B is faster because it executes the same number of instruction in a lesser time than the CPU A .

Explanation:

Solution

(a)With regards to  the MIPS performance metric the CPU B should be chosen for the new computer as it low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A and when we look at the amount of process done by the system , the CPU B is faster when compared to other CPU and carries out same number of instruction in time.

The metric of response time for CPU B is lower than the CPU A and it has advantage over the other CPU and it has better amount as compared to CPU A, as CPU B is carrying out more execution is particular amount of time.

(b) The execution can be computed as follows:

Clock cycles taken for a program to finish * increased by the clock cycle time = the Clock cycles for a program * Clock cycle time

Thus

CPU A= 5*10^6 * 60*10^-9 →300*10^-3 →0.3 second (1 nano seconds =10^-9 second)

CPU B= 3 *10^6 * 75*10^-9 → 225*10^-3 → 0.225 second

Therefore,The CPU B is faster as it is executing the same number of instruction in a lesser time than the CPU A

6 0
3 years ago
Other questions:
  • Which of the following best describes the purpose of child labor laws?
    13·2 answers
  • To use a stored address, C provides us with an indirection operator, ____.
    6·1 answer
  • Convert 15 from decimal to binary. Show your work.
    14·1 answer
  • Amazon SWF is restricts you to use a specific programming language when setting up a work flow
    8·1 answer
  • Higher-speed Ethernet technologies use an electronic device known as a Hub rather than a switch True/False
    15·1 answer
  • What is a benefit of the Name Manager feature?​
    12·2 answers
  • Discuss the importance of top management commitment and the development of standards for successful project management. Provide
    10·1 answer
  • For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
    8·1 answer
  • You have to cut a wood stick into pieces. The most affordable company, The Analog Cutting Machinery, Inc. (ACM), charges money a
    10·1 answer
  • hi pls help me how to connect my imac to our wifi cause it’s not showing the wifi option (use pic for reference)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!