Answer:
Flowchart of an algorithm (Euclid's algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≥ A yields "yes" or "true" (more accurately, the number b in location B is greater than or equal to the number a in location A) THEN, the algorithm specifies B ← B − A (meaning the number b − a replaces the old b). Similarly, IF A > B, THEN A ← A − B. The process terminates when (the contents of) B is 0, yielding the g.c.d. in A. (Algorithm derived from Scott 2009:13; symbols and drawing style from Tausworthe 1977).
Explanation:
Flowchart of an algorithm (Euclid's algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≥ A yields "yes" or "true" (more accurately, the number b in location B is greater than or equal to the number a in location A) THEN, the algorithm specifies B ← B − A (meaning the number b − a replaces the old b). Similarly, IF A > B, THEN A ← A − B. The process terminates when (the contents of) B is 0, yielding the g.c.d. in A. (Algorithm derived from Scott 2009:13; symbols and drawing style from Tausworthe 1977).
Answer:
c i think it mit be right i'm sorry if it's not ,
Explanation:
it's c or D.
Answer: Limits the row data that are returned.
Explanation: In structured query language (SQL), The where clause is used as a filter. The filter is applied to a column and as such the filter value or criteria determines the values that are spared in the column on which the WHERE clause is applied. All rows in which the column value does not meet the WHERE clause criteria are exempted from the output. This will hence limit the number of rows which our command displays.
For instance,
FROM * SELECT table_name WHERE username = 'fichoh' ;
The command above filters the username column for username with fichoh, then displays only rows of Data with fichoh as the username. All data columns are displayed but rows of data which do not match fichoh are exempted.
Answer:
The question is incomplete.The full question with options is rewritten below:
"While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss.
Which of the following is the next step the technician should take in troubleshooting this issue?
A. Contact the ISP, inform the provider of the issue, and ask the provider to check the server.
B. Verify the server has a valid assigned IP address on the LAN subnet.
C. Escalate the problem to a server administrator to check for issues with the server.
D. Check the workstations on the LAN for APIPA configuration."
The answer is option (C): <em>Escalate the problem to a server administrator to check for issues with the server</em>
Explanation:
Being a Support Technician, you may not be able to determine the main issue with the mail server but may need to escalate further to the next category of individual that will confirm the issue with the mail server, in this case the server administrator as he may have higher access into the server at the back end or may directly liaise with the Private ISP.
Answer:
(b) is used in Traceroute
(d) is used by Ping
Explanation:
ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;
i. Requested service is not available
ii. Host could not be reached
ICMP does not use ports. Rather it uses types and codes. Some of the most common types are <em>echo request</em> and <em>echo reply.</em>
<em />
Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as <em>Time Exceeded</em>) to trace a network route.
Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP <em>echo request </em>packets to the host and then waits for an ICMP <em>echo reply</em> from the host.
ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.