Answer: Subnet mask
Explanation:
Subnet mask is the type of parameter that should be match in order to form the adjacency for running the OSPFv2. The subnet mask is mainly used to identifying the address of network in the system.
The OSPF enable the router that must form an adjacency with the neighbors before sharing any type of data.
It mainly determine the neighbors links in the OSPF. The OSPFv2 router send the special type of message which is known as hello packet in the network.
The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.
<h3>What is the network about?</h3>
Broad network access is known to be a feature of cloud computing as it is seen as the ability of network tools to be able to link with a large scope or variety of devices.
Note that The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.
Learn more about cloud technology from
brainly.com/question/19057393
#SPJ1
Answer:
#include<iostream>
using namespace std;
int lcm(int m, int n) {
int a;
a = (m > n) ? m: n;
while (true) {
if (a % m == 0 && a % n == 0)
return a;
++a;
}
}
int gcd(int m, int n) {
int r = 0, a, b;
a = (m > n) ? m : n;
b = (m < n) ? m : n;
r = b;
while (a % b != 0) {
r = a % b;
a = b;
b = r;
}
return r;
}
int main(int argc, char **argv) {
cout << "Enter the two numbers: ";
int m, n;
cin >> m >> n;
cout << "The LCM of two numbers is: " << lcm(m, n) << endl;
cout << "The GCD of two numbers is: " << gcd(m, n) << endl;
return 0;
}
Explanation:
Answer:
See Explaination
Explanation:
This assume that input is a file and is given on command line. Please note this will ot print lines with frederick as thats what I feel question is asking for
#!/usr/bin/perl -w
open(FILE, $ARGV[0]) or die("Could not open the file $ARGV[0]");
while ($line = <FILE>){
if($line=~/\s+fred\s+/)
{
print $line;
}
}
close(FILE);
Answer:
Firewalls, Antiviruses, Malware, Antispyware,
Explanation: