Answer:
The complete Matlab code along with step by step explanation is provided below.
Matlab Code:
function Req=ParallelR(Number)
Number=input('Please enter the number of resistors: ');
if Number>10 | Number<=0
disp('Invalid input')
return
end
R=0;
for i=1:Number
r=input('Please enter the value of resistor: ');
R=R+1/r;
end
Req=1/R;
end
Explanation:
Parallel resistance is given by

First we get the input from the user for how many parallel resistors he want to calculate the resistance.
Then we check whether the user has entered correct number of resistors or not that is from 1 to 10 inclusive.
Then we run a for loop to get the resistance values of individual resistors.
Then we calculated the parallel resistance and keep on adding the resistance for N number of resistors.
Output:
Test 1:
Please enter the number of resistors: 3
Please enter the value of resistor: 10
Please enter the value of resistor: 20
Please enter the value of resistor: 30
ans = 60/11
Test 2:
Please enter the number of resistors: 11
Invalid input
Test 3:
Please enter the number of resistors: 0
Invalid input
to reduce the file size of the attachment
In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.
<h3>What are BPDU used for?</h3>
A bridge protocol data unit (BPDU) is known to be a kind of a data message that is known to be often transmitted in a local area network to be able to know or find loops in that given network topologies.
Hence, in the case above, In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.
See full question below
. In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?
a. BPDU filter
b. BPDU guard
c. root guard
d. BPDU drop
Learn more about ports from
brainly.com/question/10097616
#SPJ1
Answer: (B) Legal hold
Explanation:
As being a security director, the security director are approached to solidify a server that run the red hat enterprise server the 5.5.
The servers are being utilized as DNS (Dynamic host service) and the server time. This is not utilized as the database, print server and the web server. There is no particular remote associations with the server.
The window of the command will be given the root accessing. Then, it provide the associated by means of a protected shell with the access root in the system.