1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
3 years ago
14

E) Point out the errors( if any) and correct them:-

Computers and Technology
1 answer:
leonid [27]3 years ago
5 0

Explanation:

double e-d/5.6;is wrong it should return to c

You might be interested in
Altering grade records within a computer system is called
Cloud [144]
Altering grade records within a computer system is called forgery. The correct option among all the options given in the question is option "a". Any kind of altering using the computer without the consent of the proper authorities amounts to forgery. Forgery is a crime and a person can be jailed for such a serious offense.
4 0
3 years ago
Read 2 more answers
13. The Save As command is useful if you want to copy an open document and
Marina86 [1]
A. give the copy a new name
6 0
3 years ago
Read 2 more answers
Hank is the network administrator responsible for managing the web server cluster for an e-commerce company. He’s worried about
statuscvo [17]

Answer: ....

If one load balancer fails, the secondary picks up the failure and becomes active. They have a heartbeat link between them that monitors status. If all load balancers fail (or are accidentally misconfigured), servers down-stream are knocked offline until the problem is resolved, or you manually route around them.

Explanation:

Load balancing is a technique of distributing your requests over a network when your server is maxing out the CPU or disk or database IO rate. The objective of load balancing is optimizing resource use and minimizing response time, thereby avoiding overburden of any one of the resources.

The goal of failover is the ability to continue the work of a particular network component or the whole server, by another, should the first one fail. Failover allows you to perform maintenance of individual servers or nodes, without any interruption of your services.

It is important to note that load balancing and failover systems may not be the same, but they go hand in hand in helping you achieve high availability.

3 0
3 years ago
Suppose you use Batch Gradient Descent to train a neural network and you plot the training error at every epoch. If you notice t
Phantasy [73]

Answer:

The answer is "using validation error".

Explanation:

The validation error is used to response the test for one of the queries is activated to the participant, which may not properly answer the question. These errors go up continuously after each time, the processing rate is too high and also the method is different.  

  • These errors are also unless to increase when they are actually in the problem.  
  • The training level will be that, if the learning error may not increase when the model overrides the learning set and you should stop practicing.
6 0
3 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
4 years ago
Other questions:
  • In the following statement:
    12·1 answer
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • In cell h15 enter a vlookup function to determine the 2018 percentage of total attendance for the city listed in cell h14. Use t
    7·1 answer
  • Which of the following is true regarding the mod operator, %? Group of answer choices It can only be performed on int values and
    8·2 answers
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • You looked at the methods used to determine database requirements. Now, research and find a database requirements template. Choo
    9·1 answer
  • write the definition of a class clock. the class has no constructors and one instance variable of type int called hours.
    12·1 answer
  • Which insert image option allows a user to compile, modify, and add captions to images?
    5·2 answers
  • I need the answer asap !!!!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!