Answer: star topology.
Explanation:
The layout of the way how the computers in a netword are interconnected is called network tipology.
Some types of network topologies are:
1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).
2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.
3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.
4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.
5) Mesh: every computer is connected to every other computer.
Answer:
Disruptive innovation
Explanation:
Disruptive innovation are considered those new technologies, products or services whose application can greatly impact the manner in which an industry or a market functions. This is because the surpass the existing dominant product or technology. One example of a disruptive innovation is the internet. The internet altered the manner in which business was done by companies, but negatively affected those who refused to adopt it.
Answer:
Explanation:
Following are the Semaphores:
Customers: Counts waiting customers;
Barbers: Number of idle barbers (0 or 1)
mutex: Used for mutual exclusion.
Cutting: Ensures that the barber won’t cut another customer’s hair before the previous customer leaves
Shared data variable:
count_cust: Counts waiting customers. ------------copy of customers. As value of semaphores can’t access directly.
// shared data
semaphore customers = 0; semaphore barbers = 0; semaphore cutting = 0; semaphore mutex = 1;
int count_cust= 0;
void barber() {
while(true) { //shop is always open
wait(customers); //sleep when there are no waiting customers
wait(mutex); //mutex for accessing customers1
count_cust= count_cust-1; //customer left
signal(barbers);
signal(mutex);
cut_hair();
}
}
void customer() {
wait(mutex); //mutex for accessing count_cust
if (count_cust< n) {
count_cust= count_cust+1; //new customer
signal(customers); signal(mutex);
wait(barbers); //wait for available barbers get_haircut();
}
else { //do nothing (leave) when all chairs are used. signal(mutex);
}
}
cut_hair(){ waiting(cutting);
}
get_haircut(){
get hair cut for some time; signal(cutting);
}
Answer:
The class is called MyApp which inherits from JFrame and implements the ActionListener interface.
Explanation:
The class is called MyApp which extends the swing class JFrame and implements the ActionListener interface for event handling. As a results it needs to implement a method called actionPerformed for handling the relevant events that may be raised from the user interface. Since it extends JFrame, it has access to all the public and protected methods defined in JFrame(for example setTitle to set the title of the frame).
Answer:
worm
Explanation:
Computer worm -
It is a malware program which is illegally or secretly added to the system of the host computer , and then further multiplies and spread to other computer , is known as a computer worm.
Worm can very cause a huge harm to the network of the computer.
Hence, from the given scenario of the question, the correct term for the given information is computer worm .