Answer:
Border Gateway Protocol is a protocol the routers use to determine the most optimal path to forward the traffic.
Explanation:
BGP is a path vector protocol which chooses the most optimal path. The protocol decides core routing decisions based on path, configuration and network.
This protocol gives all the notification about the status of the connection and router.
It is used to routing in an autonomous system and provides ways to measure the effectiveness of configuration.
Answer:
- public class FindDuplicate{
-
- public static void main(String[] args) {
- Scanner input = new Scanner(System.in);
-
- int n = 5;
- int arr[] = new int[n];
-
- for(int i=0; i < arr.length; i++){
- int inputNum = input.nextInt();
- if(inputNum >=1 && inputNum <=n) {
- arr[i] = inputNum;
- }
- }
-
- for(int j =0; j < arr.length; j++){
- for(int k = 0; k < arr.length; k++){
- if(j == k){
- continue;
- }else{
- if(arr[j] == arr[k]){
- System.out.println("True");
- return;
- }
- }
- }
- }
- System.out.println("False");
- }
- }
Explanation:
Firstly, create a Scanner object to get user input (Line 4).
Next, create an array with n-size (Line 7) and then create a for-loop to get user repeatedly enter an integer and assign the input value to the array (Line 9 - 14).
Next, create a double layer for-loop to check the each element in the array against the other elements to see if there is any duplication detected and display "True" (Line 21 - 22). If duplication is found the program will display True and terminate the whole program using return (Line 23). The condition set in Line 18 is to ensure the comparison is not between the same element.
If all the elements in the array are unique the if block (Line 21 - 23) won't run and it will proceed to Line 28 to display message "False".
Answer:
The operation that will occur first is D5*C6 (multiplication).
Explanation:
Excel’s default order of operator precedence mandates that Excel perform multiplication before addition and substraction. If you want the addition or substraction to be performed before multiplication or division, they must be in parentheses.
The order of operations in exel is:
1. Evaluate items in parentheses.
2. Evaluate ranges (:).
3. Evaluate intersections (spaces).
4. Evaluate unions (,).
5. Perform negation (-).
6. Convert percentages (%).
7. Perform exponentiation (^).
8. Perform multiplication (*) and division (/), which are of equal precedence.
9. Perform addition (+) and subtraction (-), which are of equal precedence.
10. Evaluate text operators (&).
11. Perform comparisons (=, <>, <=, >=).
Answer and Explanation:
Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user to enter the network without being detected for a long period.
APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.
Some of the practical strategies for protection against APT are:
- Sound Internal Auditing
- Strong Password Accessing Policies
- Stringent policies for accessing any device
- Introduction and implementation of multi factor authentication
- Strong IDs and sound honeypot solutions
Answer: Primary key
Explanation: Relational databases are those databases which are commonly found in the form of tables . It works in the relation pattern for accessing the data in the database
Primary key is a major factor which is found in the relational databases for the identification of the data in the table's column.It is considered as the unique value that corresponds to the values of rows in the table of relational database.