Answer:
In businesses
Explanation:
Line of Sight internet provides an over-the-air internet connection to buildings that have a clear line of sight to a dedicated mast. This means no underground cables, quicker installation times and lower latency. It is common in businesses.
Answer:
using System.IO;
using System;
class FineForOverdueBooks
{
static void Main()
{
Console.WriteLine("Enter the number of books user checked out: ");
int books = Convert. ToInt32(Console.ReadLine());
Console.WriteLine("Enter the number of overdue days: ");
int days = Convert. ToInt32(Console.ReadLine());
DisplayFine(books, days);
}
public static void DisplayFine(int books, int days) {
double amt = 0;
int d = days;
if(days>7) {
amt = (days-7) * .20 * books;
days = 7;
}
if(days > 0) {
amt = amt + days * .10 * books;
}
Console.WriteLine("The fine for {0} book(s) for {1} day(s) is {2}", books, d, amt);
}
}
Explanation:
Answer:
def my_sqrt(a):
while True:
x = a
y = (x + a / x) / 2
if (y == x):
break
else:
x = y
print(x)
return 0
my_sqrt(5)
Explanation:
The above is a function in Python, and the exact copy as code of what is being given in the question. Its a method to find out the square root of a number which is a here. The while loop has been used as being mentioned in the question, and the variables are defined and calculated as being stated.
Answer:
plotter:
A device used to print large maps, drawing, graphs etc is known as plotter. A plotter contains a printing head and a drum through which the paper comes out.Posters can be made by any printing method ie: serigraph, stone lithograph, offset lithograph, woodblock, silk screen on any number of types of paper. A poster is a "publicity" for something.
Answer:
payload
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
The encapsulating security payload (ESP) protocol is a standard protocol that provides secrecy for the contents (data) transmitted via network communications, as well as system-to-system authentication and data integrity verification so as to prevent unauthorized access.
Basically, the encapsulating security payload (ESP) protocol is a transport layer protocol that provides data confidentiality, integrity and authentication in IPv6 and IPv4 protocols.