Answer:
The output of this question is 21. As show in the image
The explanation is given in below
Explanation:
Let first write the question
C=1
sum = 0
while(C<10):
C=C+3
sum=sum + C
print(sum)
Now Focus on
while(C<10):
C=C+3
sum=sum + C
The value of C is initially 1
C=1+3
Sum= 0+4
In second loop the value of C will become 4
c=4+3
sum=4+7
In third loop the value of C will be 7
c=7+3
sum=11+10
so the answer is 11+10=21
Answer: True
Explanation:
TCP is the transmission control protocol which and TCP ACK is the transmission control handshake method which are used by TCP. It basically indicates the next sequence number in the method when the flag is set.
Firstly, the ACK (Acknowledge) send by the each end for the initial sequence number itself but it does not contained any type of data. In the TCP segment header ACK contain 32 bit field.
The acknowledgement is just a proof to clients that ACK is a specific to the SYN when the clients initiate.
Answer: (B) Strategic alliance.
Explanation:
The strategic alliance is one of the type of the agreement that help the organization for developing the effective processes. The strategic alliance basically allow associations, people or different substances to move in the direction of normal or connecting objectives.
The main advantage of the strategic alliance is that in terms of economical condition it reduces the overall, risks in the process and also reduced the costs. This technique basically include new technologies and diversifying services and the products.
Therefore, Option (B) is correct.
it depends on the organization some organizations are more monopolizing than others so it really just depends on the organization that it talks about
Answer:
You should install a personal firewall, a program that protects your computer from unauthorized access by blocking certain types of communications.
Explanation:
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.