Answer:
TCP
Explanation:
Answer:
TCP
Explanation:
FTP (File Transfer Protocol) can be found in the Application layer of the TCP/IP model and the Application layer of the OSI model not on the Transport layer of the TCP/IP model as stated in the question.
In the Transport layer, we have end-to-end message transmission or application connection, which can be grouped as connection-oriented or connectionless. Connection-oriented is implemented in TCP (Transmission Control Protocol) while connectionless is implemented in UDP (User Datagram Protocol), which are the two major protocols found in the Transport Layer of the TCP/IP model. The choice of TCP as the correction option out of the four options given is based on the fact that FTP is a protocol found in the Application layer of TCP/IP
FTP is a network protocol used to receive and send files between machines on a TCP/IP network using ports 20 and 21. This protocol uses a client-server architecture, an FTP client is installed on the client and used to establish the connection to an FTP server running on a remote machine. FTP supports user authentication, so when a connection has been established and the user authenticated, data can be transferred between them. All data are sent in clear text, be it usernames or passwords. For secure transmission that protects the username and password, and encrypts the content, FTP can be secured with SSL.TLS or replaced with SSH File Transfer Protocol (SFTP). A connection to port 21 from the FTP client forms the control stream on which commands are passed to the FTP server and responses are collected. The parameters for the data streams depend on the specifically requested transport mode. Data connection usually uses port 20.
In order for the computer to accurately locate the appropriate anatomy, the part must be centered to the cassette and at least _______ sides of collimation detected.
A. 1
B. 2
C. 3
D. 4
Answer:
C. 3
Explanation:
In order for the computer to accurately locate the appropriate anatomy , at least three sides are required and it will allow the computer to locate the exposed area on the image plate.
The components of the 4-term contingency include:_________
A. Discriminative stimulus, the behavior, the reinforcer, the consequence
B. Motivating operation, discriminative stimulus, the behavior, the consequence
C. Motivating operation, prompts, behavior, the consequence
D. Motivating operation, discriminative stimulus, prompts, behavior
Answer:
The correct option is B: Motivating operation, discriminative stimulus, the behavior, the consequence
Explanation:
A 4-term contingency is regarded as an important factor when trying to understand behavior and why that behavior was exhibited as identified in Grafton's philosophy. The Four terms include the behavior, Antecedents (also known as the discriminative stimulus), the consequences of the behavior, and the fourth piece which is sometimes forgotten; the motivation behind the behavior.
Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product’s warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which of the following codes would you suggest Eamon to use?A• Significant digit codeB• Block sequence codeC• Action codeD• Sequence code
Answer:
Significant digit code
Explanation:
Significant digit code is a kind of coding system which brings ease of locating items in a pool of items by providing parameters that makes finding the item's precise location easier. this can shorten time taken to find item especially when turn around time is supposed to be little.
What does not usually synchronize among devices using the same E-Reader app?
Account information
Bookmarks
Downloads
Purchases
The answer is Downloads.
Downloads must be saved in local storage such as memory and hard drive. If you are using two or more devices, then these items must be downloaded in your local memory and it will take time, depending on the size of the document you are reading.
Account information, bookmarks and purchases can be saved and synchronized as these are small information and sizes.
The process of capturing moving images on film or a digital storage device is called?
Answer:
Cinematography
Explanation:
Cinematography is the blend of art and science and it deals with the recording of moving images on film or a digital storage device.
While making a movie some example of cinematography are the conclusions reached about lighting, camera filters, lenses etc.
Which one of the basic guidelines to remember when editing photographs with a photo editing software?
Answer:
less is often more
Explanation:
This applies when we're photographers, and we take a lot of photos in a session, that we have one hundred photos doesn't mean all of them are good for our portfolio or for sale, we have to choose carefully the best pictures.
If we start to fix every photo, we're going to lose time and energy, in addition when we make a portfolio is better a few photos with great quality than a lot of photos with bad quality.
The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and ____________ .
Answer:
Disable
Explanation:
Windows Device Manager Properties:
It provides access to you of your installed hardware as well as corresponding installed software and also provide you with options to change its properties.
The option tabs that you will find for each device in your hardware includes;
1. Driver details: To view the details of currently installed drivers.
2. Update Drivers: To update the driver software and start driver update wizard .
3. Roll Back Driver: Just in case if updating the drivers caused malfunction, then you can get back to the previously installed drivers without having to manually install the drivers again.
4. Uninstall: To completely uninstall all the drivers associated with the device .
5. Disable: To disable the device, if you want to use the device again then you have to enable it.
Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?
A. Matrix Half-height smart
B. CUBIE Full-height smart
C. CUBIE MiniDrawer Bin
Answer:
CUBIE MiniDrawer Bin
Explanation:
MiniDrawers comes in two configurations, and each fitting comes in one drawerslot. The MiniDrawer (1-6) comes with the most primary pocket dimensions. And we have the 18-tray MiniDrawer (1-8) comes with another dimensions in its basic form. You will in fact find various pocket dimensions like 1,2,3,4,6,12, and these comes within the 18-tray and 6-tray MiniDrawers. And they come in all the dispensing modes mentioned in the question. Hence, the above answer. The answer is clear from the options as well, and since it has the matrix mode as well apart from single dose mode and multi dose mode.
The drawer with three dispensing modes: single-dose, multi-dose, and matrix, is the CUBIE MiniDrawer Bin (option C). These modes provide flexibility in dispensing medications efficiently.
If you're looking for a drawer with three dispensing modes: single-dose, multi-dose, and matrix, the correct type is the CUBIE MiniDrawer Bin.(option C)These dispensing modes allow for various ways to manage and dispense medications in a medical setting with flexibility and efficiency. For example, the single-dose mode dispenses one unit at a time, the multi-dose mode allows multiple units, and the matrix mode provides a grid structure to dispense items from specific locations within the drawer.Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page layout and appearance.
Answer:
4.01 version .
Explanation:
A hypertext Markup language is used for designing the web page when we added the CSS on the web page we can create the web page more efficient manner and also there is more control over the web page because we can easily call the classes of CSS.
The Hypertext Markup language version 4.01 provides greater flexibility on the web page also We can also control the page layout in a very easy manner. The appearance of the web page is good as compared to version HTML 4
What controls network connectivity such as Wi-Fi and the GPS locator in a mobile device?
IMEI
IMSI
PRL
Radio firmware
Answer:
Radio Firmware
Explanation:
Radio Firmware is a hardware in a smartphone or tablet that control network such as wifi and gps.
Carolyn is the network administrator for a small financial services company and is responsible for controlling access to the resources on her network. Which technology is responsible for blocking access to a resource based on the requesting IP address?
Answer:
Firewall.
This technology allows the network administrator to block access from a specific IP address to the network resources. This can be done in different ways depending on the OS used. If you were going to use Windows, you would do as follows:
1. Open 'Control Panel'.
2. Search 'Windows Firewall' and open it.
3. In there, create a new rule which will determine what actions or permissions are going to get blocked.
4. Add the IP address to be blocked.
5. Block the connection.
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by:___________
Answer:
Severity of harm & Probability of harm
Explanation:
While evaluating the risk of harm in research, two deciding factors are:
1. Magnitude of harm (how severe is the harm)
2. Probability of harm (what are the chances of happening)
Therefore, in this case, it must be analyzed how much harm it can produce for the individual if his information gets leaked along with the chances of occurrence of this event.
When installing hardware, it is best to:Select one:
a. leave this to the last minute, so to get the latest versions of the hardware from the vendor(s)
b. work closely with the vendors who are supplying the hardware
c. create a RFP two weeks before install date
d. call Home Depot
e. outsource the hardware installation to India
Answer:
Option B is the correct answer to the following question.
Explanation:
Because at time of installing the hardware there are the risk of damage and also the corruption of the important data and the information so that's why it best to work nearly to the vendor because you can see how to work or when you work he nevigates you and risk of damage and the corruption is reduced.
You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.A) The information that your secretary provided was partly good as it was timely,but insufficient. B) The secretary provided adequate and timely information,but the information did not add value to you. C) The information that your secretary gave will be considered as good information. D) The infortation that you obtained through the secretary was not timely and worth its cost.
Answer:
Option A is correct
Explanation:
It was good because it was timely but insufficient because am in the position to dim any information surplus and I never directed the secretary to prone down on a need bases which makes it insufficient, but it can be rewritten and all information added before time of meeting that is why it's timeliness makes the report good.
Harold cannot increase the width of his worksheet because, if he does, he will not be able to print it on one sheet. However, his columns are truncating his content. What solution would be the best for Harold to use to make all his text visible without losing data?
Answer:
Harold choose Wrap text for the columns.
Explanation:
Harold has to choose Wrap text for the columns, if he not choose then he lost their data.
Firstly, select the column in which you want to use wrap text.Then, click the right button from the mouse and some options appear and click on the Format cell.Then, a prompt of Format Cell will appear then, you have to click on the Alignment tab then, click on the checkbox of the Wrap Text.Finally, you have to come back on your sheet and then you see that the following selected texts should wrapped.You are evaluating the bounce rate of your overall website traffic and find that users with a social media referral source have a higher bounce rate. Which user experience principle will help to keep social media visitors engaged on your website?
Answer:
On social media, we can engage more visitors on our post bu creating relevant post that interacts and attracts the users.
Explanation:
On internet and social media, the only thing that increase the traffic on website is the content of website or post. As much as the content is relevant and good more number of users visit the website. Frequency(No. of post a day) of Post is also an important factor in arriving and engagement of visitors on web page or post.
k-means clustering is the process of a. reducing the number of variables to consider in data-mining. b. agglomerating observations into a series of nested groups based on a measure of similarity. c. organizing observations into distinct groups based on a measure of similarity. d. estimating the value of a continuous outcome variable
Answer:
c. organizing observations into distinct groups based on a measure of similarity
Explanation:
In the field of data science and machine learning, clustering is a technique that is used to identify sub-groups within a data set. This subgroups are called clusters because they share similarities. K-means is one technique of clustering where the algorithm iteratively tries to divide the data into a pre-defined K subgroup. k-means ensures that each data-point belongs to only one sub-group (cluster) and data-points in same cluster are as similar as possible.
K-means clustering is the process of organizing observations into distinct groups based on a measure of similarity.
Explanation:K-means clustering is the process of organizing observations into distinct groups based on a measure of similarity. It does not reduce the number of variables or estimate the value of a continuous outcome variable, nor does it agglomerate observations into nested groups. The algorithm assigns each point to exactly one cluster based on their attributes, aiming to create the most compact clusters possible.
Employers and recruiters rarely use the Internet to search for personal details about applicants.
a) true
b) false
Answer:
false
Explanation:
With advent of internet technology, employers and recruiter always search for personal details about job applicants online. A person's historical job profile or criminal records (if any) can be retrieved from various online sources.
For example, Linkedln is one of the professional social media site which offer employment-oriented service. Employers can always look up their potential candidates' job experiences and details of required job skills through Linkedln. This is also not uncommon for a job applicant to include a Linkedln link in their resume to enable employer to look up their personal details for further reference if necessary.
fals uis your answer have a good dayExplanation:
You can copy a selected shape by holding down the ____ key and then dragging the shape.
A_[Ctrl]
B_[Esc]
C_[Alt]
D_[Tab]
Answer:
Option A is the correct choice answer for the above question.
Explanation:
In an MS-Powerpoint document, when a user wants to copy the selected shape and drag that shape for use in slides then he needs to--
Select the shape Press the Ctrl key and drag that shape on the slide of the powerpoint.Then the user gets the shape on the slide for their personal use.
The question scenario also suggests the same which is described above. hence Option A is the correct answer while the other is not because--
Option B suggests 'ESC' which is used to escape any running program.Option C suggests about ALT key which is of no use for the MS-Powerpoint document.Option D suggests about TAB key which is used to make the space between two texts or diagram.Answer:A
Explanation:
Ctrl c is copy
A data mart differs from a data warehouse in that: Group of answer choices it deals with a particular component or functional area of the business. data mart users do not have the data management expertise of data warehouse employees. Both it has a smaller database and it deals with a particular component or functional area of the business All of these it has a smaller database.
Answer:
A Data Warehouse is a corporate database that integrates purified information from the various sources in the organization. This information must be homogeneous and reliable, it is stored in a way that allows its analysis from many different perspectives, and that it is in turn of the optimal response times. For this, the information is highly denormalized and modeled in a way quite different from transactional systems, mainly the star models (star scheme) and snowflake (snowflake scheme) that we will study later.
A Data Warehouse is much more than what we have commented so far. According to Bill Inmon it is characterized by being:
Theme-oriented: data is organized by topics to facilitate user understanding, so that all data related to the same element of real life is linked together. For example, all customer data can be consolidated in the same table, all product data in another, and so on.
Integrated: the data must be integrated into a consistent structure, eliminating the inconsistencies involved between the various operational systems. The information is structured in various levels of detail to suit the needs of users. Some of the most common inconsistencies that we usually find are: in nomenclature, in units of measure, in date formats, multiple tables with similar information (for example, having several applications in the company, each with customer tables) .
Historical (time variant): the data, which may vary over time, must remain reflected in such a way that these changes are consulted and the reality that was at the time they were stored is not altered, thus avoiding the problem that occurs in the operational systems, that specifically only the state of the present business activity. A Data Warehouse must save the different values that take a variable over time. For example, if a client has lived in three different cities, he must specify the period he lived in each of them and associate the facts (sales, returns, incidents, etc.) that occurred at any time to the city in which He lived when they occurred, and did not associate all historical facts with the city in which he currently lives. If a customer, during all the time we have been selling has gone through three civil states (single, married and divorced) we must know what marital status he had at the time we made each of the sales.
which of these variable declarations will the variable remain uninitialized unless it is explicitly initialized?1)Declaration of an instance variable of type int.2)Declaration of a static variable of type float.3)Declaration of a local variable of type float.4)Declaration of a static variable of type Object.5)Declaration of an instance variable of type int[].
Answer:
Option 3: Declaration of a local variable of type float
Explanation:
In Java programming, a local variable doesn't possess a default value. This means a value must be explicitly initialized to the local variable before it can be used.
The instance variable and static variable, on another hand, have default value which is dependent on the data type. For example, an instance or a static variable of type int is 0. If the data type is boolean, the default value is false.
Buttons for frequently used commands such as ____ are found on the Standard toolbar.
a. Cut
b. Open Project
c. Save
d. Paste
Answer:
In the given question all options are correct.
Explanation:
An office software provides a standard toolbar to edit the document. This software works on graphical mode means that to edit anything we do not write code. we simply use click on button or drag and drop options. In this question all options is correct, that can be described as:
Option a and Option d both work together because When we use "Cut" that is used for cut(delete) data. and "paste" is used to insert data into the document or a page.In option b, an Open project is a button that is used to open a new project.In option c, Save is a button that is available in the office menu and it is used to save a file.Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem is not urgent and can be easily fixed. The policy at Rebecca’s company is that all problems need to be reported and given a priority code before they can be assigned to someone.What should Rebecca do about this new problem?a. Report the new problem.b. Troubleshoot the new problem.c. Ignore the new problem.d. Determine whether fixing the first problem caused the second problem.
Rebecca should Determine whether fixing the first problem caused the second problem.
d. Determine whether fixing the first problem caused the second problem.
Explanation:
Rebecca completed work on the computer and is verifying the functionality of the system when she finds a new problem.
Keeping in mind the fact that Rebecca's company's policy is that all problems need to be reported and given a priority code before they can be assigned to someone, she should go ahead and determine whether fixing the first problem caused the second problem to arise.
Although the company's policy does not approve of this, before reporting a problem she should check whether the problem is worth the effort. As mentioned, the problem is not urgent and can easily be fixed, she should go ahead with this option.
Where can sales professional find the most complete, up-to-date information for the tcuv program?
Answer:
At Toyota certified site
Explanation:
You need to move to the Toyota certified site. This is an insurance program ran by Toyota, and as a sales professional, you are certainly going to require the details about the Tcuv program. At this site, you can find complete detail about the program. And a complete and detailed knowledge is a must for you to rise as a sales professional. And for that, you need to visit the above site.
____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
Answer:
The correct answer to the following question will be Vendor Lock-In.
Explanation:
Vendor Lock-In: It is also known as Customer Lock-In. The Vendor Lock-In makes the costumer depends on services and products on the vendor. The costumers are not able to use another vendor without changing costs as it creates barriers.
Some ways to avoid Vendor Lock-In, these are as follows:
Design your application portable.Keep watching vendor contracts.Arrange both entry and exit with your vendor.
Google's Chrome OS integrates with web servers using cloud computing and storage to run applications and to perform other functions.True / False.
Answer:
True.
Explanation:
Google's chrome is a web browser, used to surf the internet. But this is not its only feature. google's chrome runs several applications like google's map,Google's mail,play store, translate, photos,duo etc, all in the google's chrome platform.
A user must sign in to use its services, which are running directly from the cloud. Every data generated from this services are stored in the cloud.
Mark noticed that one of the employees at his company tethers to his smartphone to bypass corporate web security to access prohibited websites while still being connected to the LAN. What is the best way to prevent this?
Answer:
Implement a policy that prohibits tethering
Explanation:
A policy that prohibits tethering should be implemented here, and a consequence is needed to be enforced.
An engineer is working for a large scale cable TV provider that requires multicast on multisourced streaming video but must not use any rendezvous point mechanism. Which multicast protocol must be configured?
A. PIM-SMB. SSMC. BIDIR-PIMD. ASM
Answer:
D. ASM
Explanation:
There are three types of transmission, namely;
Unicast, Multicast and broadcast.
Multicast is a form transmission where packets are sent to a specific group of computers in a network. It can be a one to many or a many to many transmission. There are different types of multicast transmission, they are,
ASM (Any source multicast transmission)
SSM ( Source specific multicast transmission) etc.
ASM and SSM are opposite in their functions, as ASM transmits multicast packets from multiple sources without using any rendezvous point, but SSM only transmit from a specified source address.
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen, and rather than entering proper login credentials, the attacker entered some odd text: ‘ or ‘1’=’1. What is this attack known as?A) Cross-site scriptingB) Cross-site request forgeryC) SQL injectionD) ARP poisoning
Answer:
The answer is C) SQL Injection
Explanation:
Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.
SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.
Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.
From the above brief definition; it is seen that the answer is C) SQL Injection.
The privilege-based issuance model provides for the ongoing qualification of individuals by testing, and for the ongoing monitoring of driver performance.
A. True
B. False
Answer:
True
Explanation:
Truly, the privilege-based issuance model provides for the ongoing qualification of individuals by testing, and for the ongoing monitoring of driver performance.
Final answer:
False, The assertion in Exercise 1.2.2 is false; both models and theories can be scientifically tested. Models serve as simplifications or representations of reality and are used in many scientific fields, such as environmental science, to understand and predict phenomena.
Explanation:
The statement regarding the privilege-based issuance model is not relevant to Exercise 1.2.2, which asks about the testability of models versus theories. The correct answer to Exercise 1.2.2 is B. False. While there is often confusion between models and theories, it is important to clarify that both can be scientifically tested. Models are simplifications or representations of reality and are used to understand, explain, or predict phenomena within specific domains. Models can be conceptual, physical, mathematical, or computational, and they are indeed subject to testing against empirical observations and experiments.
A common example is the climate model used in environmental science, which scientists use to predict climate changes based on various parameters. These models are continually tested with new data to refine predictions and understand the climate system better.