1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
5

When computer network are joined together they form a bigger network called the​

Computers and Technology
1 answer:
Airida [17]3 years ago
8 0

Answer:

A WAN can be one large network or can consist of two or more lans connected together. The Internet is the world's largest wan.

Explanation:

You might be interested in
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
With ____________________, you can insert and remove a device while the computer is running.
padilas [110]
...a hot pluggable interface...
6 0
3 years ago
Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet?
natali 33 [55]

Answer:

d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork

Explanation:

When four bits are borrowed from the fourth octet of class C IP address 200.245.10.150, the IP address is subnetted to 16 subnets, where the number of subnets is equal to two raised to the number of borrowed bits (ie, 2^ number of borrowed bits), and 14 assignable host IP address gotten from the formula;

  = 2^(number of host bits in the fourth octet) - 2

  = (2^4) - 2

  = 16 - 2 = 14 host addresses

3 0
3 years ago
In numerical methods, one source of error occurs when we use an approximation for a mathematical expression that would otherwise
Shtirlitz [24]

Answer:

The function in Python is as follows:

import math

import numpy as np    

def exp(x):

   mylist = []

   for n in range(10):

       num = (x**n)/(math.factorial(n))

       mylist.append([num])

   exp_approx = np.asarray(mylist)

   sum = 0

   for num in exp_approx:

       sum+=num

   return sum

Explanation:

The imports the python math module

import math

The imports the python numpy module

import numpy as np    

The function begins here

def exp(x):

This creates an empty list

   mylist = []

This iterates from 0 to 9

   for n in range(10):

This calculates each term of the series

       num = (x**n)/(math.factorial(n))

This appends the term to list, mylist

       mylist.append([num])

This appends all elements of mylist to numpy array, exp_approx

   exp_approx = np.asarray(mylist)

This initializes the sum of the series to 0

   sum = 0

This iterates through exp_approx

   for num in exp_approx:

This adds all terms of the series

       sum+=num

This returns the calculated sum

   return sum

3 0
3 years ago
Which actions should be taken so that transitions proceed automatically? Check all that apply.
DiKsa [7]

Answer:

a,d

Explanation:

because when you the after box you will probably see it,and you got put effects to the transition

6 0
4 years ago
Read 2 more answers
Other questions:
  • In Word, how can you tell when text is selected?
    8·1 answer
  • How to save customised keyboard shortcuts on word
    11·1 answer
  • Which type of factories began to flourish in the late eighteenth century
    5·1 answer
  • A field with the extend data type can contain an attached file, such as an image, document, chart, or spreadsheet.
    6·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • What is the minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP add
    9·1 answer
  • What do the power key and refresh key do when pressed together
    11·1 answer
  • Private void finishMap()
    7·1 answer
  • You are the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about sl
    7·1 answer
  • 2
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!