1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
2 years ago
8

What are the advantages and disadvantages of providing the MSRN asopposed to the address of the VLR to the HLR?

Computers and Technology
1 answer:
ryzh [129]2 years ago
6 0

Answer:

The answer is below

Explanation:

The advantages of providing the MSRN as opposed to the address of the VLR to the HLR is:

1. It leads to provision of value at a faster rate without querying the VLR.

2. Refreshing of the MSRN in the HLR would not be necessary.

The disadvantages of providing the MSRN asopposed to the address of the VLR to the HLR is

1. It would require value update of MSRN in HLR each time MSRN changes.

You might be interested in
30 points) Suppose you are given a string containing only the characters ( and ). In this problem, you will write a function to
navik [9.2K]

Answer:

The screenshot is attached below

Explanation:

The below program check balence of paranthesis using stack.

if the input charecter is ( then push to stack

if the input charecter is ) then pop top element and compair both elements for match.

Program:

public class Main

{

static class stack // create class for stack

{

int top=-1; // initialy stack is empty so top = -1

char items[] = new char[50]; // Create an array for stack to store stack elements

 

void push(char a) // Function push element to stack

{

if (top == 49) // chack stack is full ?

{

System.out.println("Stack full");

}

else

{

items[++top] = a; // increment the array index and store the element

}

}

 

char pop() // function to return the elements from stack

{

if (top == -1) // check the stack is empty

{

System.out.println("Empty stack");

return '\0';

}

else

{

char element = items[top]; // return the top element

top--; // Decrement the array index by one

return element;

}

}

 

boolean isEmpty() // Check the stack is empty or not

{

return (top == -1) ? true : false;

}

}

static boolean isMatch(char character1, char character2) // Check the input charecters are matching pairs or not

{

if (character1 == '(' && character2 == ')') // If they match return true

return true;

else

return false;

}

 

static boolean isBalanced(String parantheses) // check the input string is balenced or not

{

char[] exp = new char[parantheses.length()]; // Create a charecter array

for (int i = 0; i < parantheses.length(); i++) { // Convert the string parantheses to charecter array

exp[i] = parantheses.charAt(i);

}

stack st=new stack(); // Declare an empty character stack    

for(int i=0;i<exp.length;i++)

{  

if (exp[i] == '('))   // if input charecter is '(' push to stack

st.push(exp[i]);

if (exp[i] == ')') // if input charecter is ')' pop top element from stack

{

if (st.isEmpty())

{

return false;

}

 

else if ( !isMatch(st.pop(), exp[i]) ) // Call isMatch function

{

return false;

}

}

 

}

 

if (st.isEmpty())

return true; //balanced

else

{

return false; //not balanced

}

}

 

 

public static void main(String[] args)

{

 

System.out.println(isBalanced("()()()")); // Output true if string is balenced

 

}

 

}

Screenshot:

5 0
2 years ago
A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
Black_prince [1.1K]

Answer:

A(n)  <u>Cipher</u> or crypto-system is an encryption method or process encompassing the algorithm, key(s) or crypto-variable(s), and procedures used to perform encryption and decryption.

Explanation:

  • Cryptography is such a technique that is used for the secure transfer of the information. We make codes for this purpose.
  • Cryptosystem is such a system in cryptography is simply an encryption method that has three algorithms. One algorithm is used for the generation of key, one for encryption and decryption.
  • Encryption is a process of converting the information in a data that is not understandable and decryption, this non-understandable data is converted into information so that we can read it.  
3 0
3 years ago
WILL GIVE BRAINLIEST
GenaCL600 [577]

Answer:

None of those answers is correct because E[1101] is index out of range.

8 0
3 years ago
When elements are placed on the page so that text and graphic elements are evenly distributed you have:
Mashcka [7]
When elements are placed on the page so that text and graphic elements are evenly distributed you have: balance.
6 0
3 years ago
How is the pattern matching done in the SQL?
Alinara [238K]

Answer:

SQL pattern matching allows you to search for patterns in data if you don't know the exact word or phrase you are seeking. This kind of SQL query uses wildcard characters to match a pattern, rather than specifying it exactly. For example, you can use the wildcard "C%" to match any string beginning with a capital C.

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • "Technician A says that Ohm's law can be used to determine circuit current flow if total circuit resistance and total voltage ar
    14·1 answer
  • As an improvement of the ATX form factor over AT, shorter wires made it easier to shield them and made them capable of handling
    6·1 answer
  • The national highway system improved economic activity in Georgia by
    6·2 answers
  • A thermostat with the processor program to control temperature is an example of what kind of computer
    6·1 answer
  • C program To print odd numbers from 15 to 1 ​
    8·1 answer
  • how do I delete my brainly account, my child signed up for it and nothing has been paid but I do not want the account to exist a
    7·2 answers
  • . Write at least three benefits of using a network.​
    8·1 answer
  • MULTIPLE CHOICE QUESTION
    14·2 answers
  • How does the issue of cybersecurity relate to the internet of things?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!