Https://zoo.cs.yale.edu/classes/cs112/2012-spring/as/as9/ visit this website it gives you the answers
Answer:
System software is software designed to provide a platform for other software. Examples of system software include operating systems like macOS, Linux, Android and Microsoft Windows, computational science software, game engines, search engines, industrial automation, and software as a service applications.
Explanation:
public static void main()
{
String s = Console.ReadLine();
int len = s.length();
Char startletter = s[0];
Char endletter = s[len-1];
string midletter = ‘’;
if(len % 2 ==0)
midletter = s[len/2] + s[(len/2) +1]
else
midletter = s[len/2];
Console.WriteLine(startletter + midletter + endletter);
}
Here the logic is that, startletter is obtained using the index ‘0’, the last letter is obtained by calculating the “length of the string” and subtract 1 to get the “last index” of the given string.
Middle letter is calculated by first finding whether the given string length is “odd or even” and based on that index(es) are identified.
Answer:
(c) Router Delay
Explanation:
The network layer of the TCP/IP provides a mechanism or tool for troubleshooting and error messaging called Internet Control Message Protocol (ICMP). Network layer devices such as routers may use this tool to communicate errors especially if there is an issue delivering data packets.
Some of these error messages are;
i. Source Route Failed
ii. Source Host Isolated
iii. Network Unreachable
iv. Host Unreachable
v. Destination Network Unknown
vi. Destination Host unknown
Note:
Router delay is not one of the error messages identified by the ICMP.
Answer:Full-interruption--A
Explanation: The Full-interruption is one of the major steps for a Disaster Recovery Plan, DRP which ensures businesses are not disrupted by saving valuable resources during a disaster like a data breach from fire or flood.
Although expensive and very risky especially in its simulation of a disruption, this thorough plan ensures that when a disaster occurs, the operations are shut down at the primary site and are transferred to the recovery site allowing Individuals follow every procedure, ranging from the interruption of service to the restoration of data from backups, also with the notification of appropriate individuals.