1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
7

User accounts will be locked out after authentication is attempted

Computers and Technology
1 answer:
Tatiana [17]3 years ago
7 0
Whats is the question ?
You might be interested in
Using MARS/MIPS
slega [8]

Answer:

Explanation:

MIPS program which increments from 0 to 15 and display results in Decimal on the console

In this program the user defined procedures print_int and print_eot were used to print the integer values and new line characters(\n) respectively.the mechanisam of the loop is explaine in the comment section of the program.

     addi $s0, $0, 0

     addi $s1, $0, 15

print_int:

              li $v0, 1                # system call to print integer

              syscall                

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s1<$s0

beq $s0, $0, end

end:

MIPS progam to increment from 0 to 15 and display results in Hexadecimal on the console

this program is slightly differed from the previous program in this program the system call issued in print_int is implemented with a system call that prints numbers in hex.

addi $s0, $0, 15

     addi $s1, $0, 0

print_int:

   li      $v0,34                  # syscall number for "print hex"

   syscall                         # issue the syscall

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s0>$s1

beq $s0, $0, end

end:

5 0
3 years ago
Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance
olchik [2.2K]

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

4 0
3 years ago
To most efficiently distribute IP address pools in networks, system administrators typically set up services that automatically
zhuklara [117]

Answer:

Explanation:

Dynamic host configuration protocol DHCP help us to assign an IP automatically, with this method is not necessary to get more IP blocks because this method use lease time or rental IP, this means, if an IP is not being used, this is save for the next user, in this case, we're reciclyn the IP bloks, and this is the most efficient way to administrate our IP address.

8 0
3 years ago
The alternative to encapsulating security protocol (esp) is _________.
Lina20 [59]
The alternative to Encapsulating Security Protocol (ESP) is Authentication Header (AH). Hope this helped!
8 0
4 years ago
What is a good project I can do for Artificial Intelligence? It has to be some type of Technology that covers Artificial Intelli
Allisa [31]
Look at the fields that utilize artificial intelligence and expand further. 

You can talk about A.I. being used to operate on patients in complex surgeries. 

A.I. in space exploration or roaming in the deep trenches of our oceans looking for information about our planet.

A.I. in law enforcement and rescue squads.

A.I. in security.

A.I. in engineering. 

Programming of A.I.

Integration of A.I.

Outlook of A.I. in our future and how it may be used.

Artificial Intelligence in warfare.


7 0
4 years ago
Other questions:
  • Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their
    14·1 answer
  • One of the most famous ___ licenses is gpl, which ensures that a particular program remains free to distribute and allows its co
    10·1 answer
  • A Game Object must have a Transform<br><br> True<br><br> False
    5·1 answer
  • For which task is the WordArt gallery most useful?
    15·2 answers
  • The use of computers in education is referred to as computer assisted instruction (CAI). Write a program that will help an eleme
    8·1 answer
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • What is the correct order of the phases of the software development process?
    14·1 answer
  • Write a program to enter a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program n
    10·1 answer
  • A computer is defined by 4 specific criteri. Select all 4.*
    10·1 answer
  • When you use the predict step in the IPDE process you
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!