1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
15

Which validation method would you use for first name on a data form

Computers and Technology
1 answer:
slega [8]3 years ago
6 0
Which validation method would you use for first name on a data form
You might be interested in
Prove each statement using a proof by exhaustion. For every integer n such that 0 lessthanorequalto n < 3, (n + 1)^2 > n^3
yawa3891 [41]

Answer:

See attachment below

Explanation:

5 0
3 years ago
The sender side of rdt3.0 simply ignores (that is, takes no action on) all received packets that are either in error or have the
Rom4ik [11]

Answer:

It might not work efficiently.

Explanation:

The function of the protocol rtd3.0 is to transfer data to a receiver from a sender.

As soon as the receiver received the packet transferred by the sender, we respond acknowledge (Ack) to the sender so that sender can confirm the receiver has gotten it.  

The receiver will not send any acknowledgment if the packet he receives are such that bits contain error or not in order.

After that timeout, the packet will be re-transmitted by the sender.

It is then possible the protocol might seem to be inefficient if a packet is sent many times, because other packets will have to wait to sent until the current packet is sent successfully.

The solution to prevent this kind of issue is to allow for the occurrence of premature timeouts.

7 0
3 years ago
1) What is Database? List its Uses.<br>​
Serggg [28]

Answer:

a database stores a large sum of data

Explanation:

its used to keep track of things like student names bank accounts and other things

7 0
3 years ago
Hank is the network administrator responsible for managing the web server cluster for an e-commerce company. He’s worried about
statuscvo [17]

Answer: ....

If one load balancer fails, the secondary picks up the failure and becomes active. They have a heartbeat link between them that monitors status. If all load balancers fail (or are accidentally misconfigured), servers down-stream are knocked offline until the problem is resolved, or you manually route around them.

Explanation:

Load balancing is a technique of distributing your requests over a network when your server is maxing out the CPU or disk or database IO rate. The objective of load balancing is optimizing resource use and minimizing response time, thereby avoiding overburden of any one of the resources.

The goal of failover is the ability to continue the work of a particular network component or the whole server, by another, should the first one fail. Failover allows you to perform maintenance of individual servers or nodes, without any interruption of your services.

It is important to note that load balancing and failover systems may not be the same, but they go hand in hand in helping you achieve high availability.

3 0
3 years ago
Design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the num
Svetach [21]

Answer:

Logic for a program

Explanation:

//Here ind = index

//declare the number

number ind

number sum

number avg

number SIZE = 20

number num[SIZE] = {0,0,0,0,0,0,0,0,0,0 ,0,0,0,0,0,0,0,0,0,0}

getReady()

while ind < SIZE

getNumbers()

stop

getReady()

ind = 0

sum = 0

return

getNumbers()

cout<< “Enter a number for position ”, ind

input numbers[ind]

sum = sum + numbers[ind]

ind = ind + 1

return ;

finishUp()

avg = sum/SIZE

ind = 0

while ind < SIZE

output numbers[ind], avg – numbers[index]

ind = ind + 1

return

Modify the program in 2a

number index

number sum

number avg

number actualSize

number SIZE = 10

number number[SIZE] = 0

7 0
4 years ago
Other questions:
  • A user states that when they power on their computer, they receive a "Non-bootable drive" error. The user works with external st
    8·1 answer
  • A binary search can be performed only on ____.
    6·1 answer
  • Which social network site has 1.5 billion actives users per month?
    15·1 answer
  • • Two advertisers A and B
    8·1 answer
  • What can be designed to create annoying glitches or destroy data
    15·2 answers
  • Discuss the importance of top management commitment and the development of standards for successful project management. Provide
    10·1 answer
  • Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
    5·1 answer
  • What is the difference between Packaged and tailored soft ware?​
    6·1 answer
  • Can I control my digital footprint?
    9·2 answers
  • How to hide location on iphone without them knowing?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!