1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
14

Reality and computer-generated simulations can solve a lot of problems

Computers and Technology
1 answer:
m_a_m_a [10]3 years ago
8 0

Answer:

true?

Explanation:

if it's a yes or no question

You might be interested in
You are the IT security administrator for a small corporate network. Due to some recent restructuring, Corey Flynn (flynn) no lo
astra-53 [7]

Explanation:

The said action sof removing cflynn from HR group and keeping in other can be done by following;

First open the command prompt, type user group name of cflynn. Upon pressing enter a list of all group in which cflynn belongs would be displayed.

We see that Cflynn belong sto mgmt1 group

Now to change its status in this group; Type usermod -G mgmt1,it cflynn and press Enter to take out cflynn from this group

To keep him in other groups, type the usermod -G command enlisting all groups to which cflynn must belong.

5 0
4 years ago
You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
Kitty [74]

<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>

Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.

It is a security device and purpose to make organization to access or connected to end use of other networks.

Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN

Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers.  Keeping network logs is policy driven. So network administrator keeps logs for no. of days.

Some network administration export log and keep as reference.

4 0
4 years ago
When does playstation charge formy new subscription
BlackZzzverrR [31]
Right when you pay for subscription to PSPlus the timer starts and after 30 days it will end ( if you got the 1 month subscription) This is the same for 3 month and 1 year subscription
3 0
3 years ago
a program p takes time proportional to log where nlogn is the input size. if the program takes 100 ms to process input of size 1
Eddi Din [679]

Answer:

The time is 4 \times 10^7 \ microseconds.

Explanation:

\ The \ requires \ time \ be \ t \ microseconds, \\\\\ \ formula: \\\\ time \propto \ nlog_n \Rightarrow \ time \ = \ knlogn \\\\

\ 10 \ = \ 100 \ log(100) \ \ \ \ \ \ \ \ \ k= 10^2 \ log\ ( \ 10^2\ ) \ k\\\\t=100,000,000 \log \ ( \ 100,000,000\ ) \ k = \ 10^8 \ log\ (\ 10^8\ )\ k \\\\\rightarrow \frac{t}{10} \ =\frac{10^8\ log \ (10^8)k}{10^2\ log\(10^2\ ) k} \\\\\rightarrow \frac{t}{10} \ =\frac{10^8\ log \ (10)\times 8 \times k}{10^2\ log\(10) \times 2 k} \\\\\rightarrow \frac{t}{10} \ =\ 4\times 10^6\\\\\rightarrow \ t \ =\ 4\times 10^6 \times 10 \\\\\rightarrow \ t \ =\ 4\times 10^7 \ microseconds \\\\

3 0
3 years ago
Suppose there are 2 routers in sequence between Host A and Host B, all of which use store-and-forward routing. What is the total
lora16 [44]

Answer:

Check the explanation

Explanation:

Going by the question above,there are 2 routers in a sequence amid Host A and Host B and using store-and-forward routing.

So that time would conprise of both propagation delay and transmission time

Propagation delay is nothing but the time taken for traveling.

Transmission delay is the amount of delay time from the beginning to end of transmission)

Now,

Propagation delay = distance traveled / speed of propagation

= 161200 / 2.7 *108 = 59703703.70 * 10-8 mili sec

Transmission delay:

= packet size / bandwidth

= 4 / (9.1 * 1024) = 4.2925 * 10-1 mili sec

Let us assume routers have zero (0) processing time

total time = Transmission delay by host A + Transmssion delay by router1 + Transmssion delay by router2 + propagation time

= 3 * ( 4.2925 * 10-1 ) + (59703703.70 * 10-8)

= 1.28775 + 0.5970370370 ms

= 1.884787 ms

6 0
3 years ago
Other questions:
  • A ____ is a structure that allows repeated execution of a block of statements.
    13·2 answers
  • Who usually signs a collection letter?
    15·2 answers
  • Wrire a code that display elements at indices 1 and 4 in the follwoing array.
    12·1 answer
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all t
    15·1 answer
  • Arrange the types of movies in terms of the amount of content they can hold
    14·1 answer
  • PLEASE AWNSER 50 POINTS PLUS BRAINLEST ILL FAIL MY GRADE IF I DONT AWNSER IN A HOUR!
    15·1 answer
  • The ____ code sets the style so that the web page element remains constant and does not move.
    11·1 answer
  • Write a function, AvgList, that takes a single argument, a list, and returns the average (mean) of the numbers in the list. You
    10·1 answer
  • Write a program that will input two numbers and print the larger number on the screen.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!