Answer:
B. Change the router's default administrative password.
Explanation:
Whenever a user purchase a router for wireless network, a default password has been set for the device, which can be easily accessible to different users on the internet or that particular network. This will lead to unsecured that particular user in terms of hacking or stealing data or personnel information easily.
To make sure the security of customer on private network, the technician should change the router default password.
Answer:
if full_admission_price = f and discount_amount = d
=> Price of a discount admission = d/f
total_weight
quantity
weight of one item = total_weight/quantity
for i in range(80, 18, -2):
print(i, end=' ')
Explanation:
The first two questions are just mathematical to get a single quantity given some relationship. So, its basically division
For the python code, I used the python's range function which takes in three arguments. The first one is the starting value, the second one is the terminating value which is the number before the terminating value and the last one specifies the common difference popularly known as step in the language. Since the step is 2, only even numbers are printed out. In the print function, I made use of the end keyword specifying a space (' ') as the end. This ensures that the print is done in the same line with a space seperating them. Without that specification, each result will printed in a newline
Answer:
Prolog program are used in the artificial intelligence and the web development in a systematic manner process. As, it is also sometimes known as declarative language which basically consist of some facts and list. Prolog program are divided into the sections that are:
- Domain sections
- Clauses sections
- Predicates sections
- Goal sections
We need each section of the prolog program because all the sections introduced the systematic program and performed there particular functions so by using all these processing steps an efficient function are formed.
Answer:
D. He should designate all the files in the shared folder as read-only.
Explanation:
The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.
In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.
By default, he is already the owner of the file, so option B is not the correct answer.
Also making the file executable give other users higher privilege, so option A is also not correct.
Answer:
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID tag consists of a tiny radio transponder; a radio receiver and transmitter.
Radio Frequency Identification (RFID) is a technology designed to allow objects, animals and even human beings to be identified, located, and tracked using radio frequency signals.