The engineer will need to set the distance to 130 for the static link so that it becomes a floating static route.
<h3>What is Floating static routes?</h3>
This is known to be a static routes that is said to have a kind of administrative distance that is also known to be bigger than the administrative distance of any other static route or dynamic routes.
Note that the value 130 stands for the next most logical value, nd as such it is to know that the right route comes first in the steps for administrative distance.
Learn more about WAN from
brainly.com/question/11352260
Answer:
The statement in Python is:
print("The average pH of citrus fruits is ",avg_citrus_pH)
Java
System.out.print("The average pH of citrus fruits is "+avg_citrus_pH);
C++
cout<<"The average pH of citrus fruits is "<<avg_citrus_pH;
Explanation:
The programming language is not stated; so, I answered the question in 3 languages (Python, Java and C++)
Assume that avg_citrus_pH has been declared and initialized; all you need to do is invoke a print statement and then append the variable
In Python, use print()
In c++, use cout<<
In Java, use System.out.print()
So, the statements are:
Python:
print("The average pH of citrus fruits is ",avg_citrus_pH)
Java
System.out.print("The average pH of citrus fruits is "+avg_citrus_pH);
C++
cout<<"The average pH of citrus fruits is "<<avg_citrus_pH;
Answer:
Worm malware
Explanation:
The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.
Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.
Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.
Answer: rootkit
Explanation:
Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.
Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.
I think the answer would be C