A new version of your operating system is released with several changes made to the transport layer protocols. Specifically, TCP has been removed completely but UDP was not changed. What specific changes must be made to your application to accomodate these changes?

Answers

Answer 1

Answer:

Throughout the description section down, the overview and per the instance.

Explanation:

Throughout terms of communicating and maintaining a link between the application as well as the network, TCP protocols were essential. The program would not be linked or activated if the TCP has indeed been fully disabled. The essential TCP protocol that enables the application to be linked from over network become HTTP as well as HTTPS. Almost all of the significant protocols needed to operate some programs are based primarily on TCP protocols. Besides, as SSH would not operate as a TCP protocol, the OS would not be remotely linked.

Therefore, that would also make it impossible for all the administrators to operate upon this system.


Related Questions

Question 1 (1 point)
What is an advantage of the wireless option for peripheral?

Answers

I am not sure let me search it

A Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with one of the nation’s largest

A)retail sellers of computers and related accessories.
B)in-store computer repair and service companies.
C)developers of computer operating systems.
D)makers of computer networking equipment.

Answers

Answer:

C

Explanation:

This job will have the largest amount of 1. computer programmers, 2. like-minded coworkers, and 3. a large number of like-minded coworkers.

Please give Brainliest if accurate!

The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.

What is  the term like-minded?

The Definition of the term like-minded is known to be when two or more people like or have the same purpose, habit or thought.

Therefore we can say that The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.

Learn more about Programmer from

https://brainly.com/question/23275071

#SPJ2

What are the three categories of managerial decisions?

Answers

                                Top 3 levels of management

Strategic Production Planning

Technology decision

Capacity decisions

solve the system of equations and choose the correct ordered pair.

4x+5y=22
2x+3y = 12

Answers

Answer:

(3,2) x = 3, y = 2

Explanation:

kali linux os and window os who is the best​

Answers

Answer:

Windows

Explanation:

It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.

Answer:

It is only what you prefer

Explanation:

im doing programming with kali and i have no problems. although windows is more user friendly and what people use on a day to day, kali is for pentsters mostly.

A Python programmer is writing a function definition. What syntax should be used?
def( statement ): functionName
argument1
argument2
argument3
def functionName( arguments ):
statement1
statement2
statement3
def functionName( statement ):
argument1
argument2
argument3
def( arguments ): functionName
statement1
statement2
statement3

Answers

Answer:

Python - Functions

Advertisements

A function is a block of orgaof code that is used to perform a single, related action. Functions provide better modularity for your application and a high degree ofAdvertisement

As you already know, Python gives you many built-in functions like print(), etc. but you can also create your own functions. These functions are called user-defined functions.

Defining a Function

You can define functions to provide the required functionality. Here are simple rules to define a function in Python.

Function blocks begin with the keyword def followed by the function name and parentheses ( ( ) ).

Any input parameters or arguments should be placed within these parentheses. You can also define parameters inside these parentheses.

The first statement of a function can be an optional statement - the documentation string of the function or docstring.

The code block within every function starts with a colon (:) and is indented.

The statement return [expression] exits a function, optionally passing back an expression to the caller. A return statement with no arguments is the same as return None.

Answer:

def functionName( arguments ):

statement1

statement2

statement3

Explanation:

Consider this function comment. Which of the following options is recommended in your textbook? Computes the area of a cuboid. eparaml width the width of the cuboid eparam2 height the height of the cuboid eparam3 length the length of the cuboid ereturn the area of the cuboid double area(double width, double height, double length) double result - width +height 1ength; return result: A. The comments are adequate to describe the function. B. The lines need to end with semicolons like other C++ statements. C. The parameters should be described more completely. D. The eparaml, eparam2, eparam3 should be just eparam.

Answers

Answer:

A. The comments are adequate to describe the function.

Explanation:

C++ programming language comments starts with two forward-slash ("//") and can be written above a code statement or at the right-hand side of the code statements

The comments of the area() function with three parameters width, height, and length are adequate to describe the function as it does not need to end with a semi-colon.

When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c. aborts program execution d. returns to the calling function

Answers

Answer:

sorry this is tought

Explanation:

no idea

in the middle of the iteration, how should a team handle requirement changes from the customer

Answers

Answer:

Team may take up the changes in flight after discussing the overall impact with the Product owner

Explanation:

In the middle of the iteration, one of the best ways a team should handle requirement changes from the customer is to take up the changes in flight after discussing the overall impact with the Product owner.

This will make the customer well aware of the advantages and disadvantages that come with changes in the requirement, such that, the customer will be surprised about the final outcome of the iteration.

different between input and output device​

Answers

Answer:

An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.

Explanation:

One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?

Answers

Explanation:

Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:

Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.

Python rephactor

1. Write code that swaps the first and last elements in a list called my_list. Assume that the list has already been created and contains at least one element.

2.Write code that creates a Python set containing each unique character in a string named my_string. For example, if the string is 'hello', the set would be {'h', 'e', 'l', 'o'} (in any order). Assign the set to a variable named my_set. Assume that my_string has already been initialized.

Answers

1.

my_list = ([1,2,3,4,5])

h = my_list[-1]

my_list[-1] = my_list[0]

my_list[0] = h

print(my_list)

2.

my_string = "hello"

my_set = set(my_string)

print(my_set)

The list has already been created and contains one element. The python set of my string has been already initiated.

What is python set?

Python set is defined as a data type for unordered collections that is iterable, changeable, and lacks duplication of elements. There are essentially two sorts of sets in Python. the frozenset and the set. Whether the frozenset is changeable or not depends on the set type. On a set, we can use add(), remove(), and other operations of this nature; however, frozenset does not support these actions.

The program is

your list = ([1,2,3,4,5])

my list[-1] = h

MyList[-1] equals MyList[0]

h print(my list, "my list");

"hello" is my string

set(my string) my set

print(my set)

Thus, the list has already been created and contains one element. The python set of my string has been already initiated.

To learn more about python set, refer to the link below:

https://brainly.com/question/14936500

#SPJ5

Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, you would use:a) *sptr[*3] b) *sptr+3 c) sptr +3 d) *(sptr + 3)

Answers

Answer:

The correct option for accessing the value in sarray[3] is : d) *(sptr+3)

Explanation:

a) *sptr[*3]  is wrong option because its syntax is not right it will give errors.

b) *sptr+3 is also wrong option because it will add 3 to the value of sarray[0].

c) sptr+3 is wrong option because it will only access the address of sarray[3] not the value it contains.

d) *(sptr +3) is correct syntax for accessing value in sarray[3] by using pointer

A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?

Answers

Answer: Nothing should be done.

Explanation:

Group Policy helps in the provision of a centralized management of operating systems, and applications. It should be noted that a group policy object (GPO) is simply referred to as the configurations involving the group policy.

Nothing should be done to manage the GPO created. When the permission to create a GPO has been given to someone, it means that they can also manage the GPO therefore, nothing needs to be done anymore.

Which of the following are reasons why it is important to write readable code?
Choose all that apply.

Readable code is easier to maintain.

Readable code is easier to modify.

Readable code is fun to write.

Writing readable code saves time in the long run.

Answers

Answer:

Readable code is easier to maintain.

Writing readable code saves time in the long run.

Readable code is easier to modify.

Readable code is fun to write.

Explanation:

Readability of a code means that how easy it is to read the code even if any person other than programmer reads the code. Different techniques like line breaks and indentation are used to make the code readable. the program follows an indentation pattern so it is easy and fun to write.

Hence,

it can be concluded that the true statements are:

Readable code is easier to maintain.

Writing readable code saves time in the long run.

Readable code is easier to modify.

Readable code is fun to write.

Answer:

for short answer it is a,b and D

Explanation:

Why is content knowledge as important as generalized critical thinking for Web Analytics and Web Intelligence reporting and insights? A) Because it's very difficult for students to apply critical thinking skills learned in one subject to another, even between different fields of science. B) It is said that content is king and that having up to date content knowledge of Web Analytics is crucial in order to be an effective Analyst C) Everything is changing so fast that you need to keep up to date with the changes in the platforms that you use or are considering using for personal or organizational deployment. D) Content knowledge of Web Analytics is important because in a field like emerging technology that Web Analytics is still considered to be, new features of a Web Analytics platform can have a major impact on the ability to do the project and deliver value from it.

Answers

Answer:

B) It is said that content is king and that having up to date content knowledge of Web Analytics is crucial in order to be an effective Analyst

Explanation:

The answer is option B. A good knowledge of content is very important and crucial due to the fact that knowledge stands at the center or the most important thing in the business sector.

Web analytics is a method of measuring, analysing and reporting web usage data. Content knowledge is a good understanding of the subject area. To understand web analytics, a going knowledge of the facts, theories and concepts are important if one wants to be an effective analyst.

Therefore b is the answer to this question.

PLEASE I NEED HELP NOW!!!!!


Frank types in many numbers to calculate baseball statistics. To enter these numbers, he should use the _____.

Answers

Answer:

Numeric keypad

Explanation:

The numeric keypad has mostly only numbers so it would be more convenient for him.

Hope this helps!

Answer:

Numeric keypad on the right side of the keyboard.

Explanation:

Ap*x

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.

Answers

Answer:

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.

Explanation:

thats all you said

In python 3.8:

def pyramid_volume(base_length, base_width, pyramid_height):

   return round((base_length*base_width*pyramid_height)/3,2)

print(pyramid_volume(1,1,2))

I used the round function to round the volume to 2 decimal places. You can change this if you need more or less precision. I hope this helps!

Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse

Answers

Answer:

True

Explanation:

Minoritys have always faced prejudice

What is the minimum size of a data type, in bytes, to be impacted by system endianness. (Whole numbers only)?

Answers

Answer:

30

Explanation:

A data type must be at least 2 bytes in size to be affected by the endianness system.

What is endianness system?

Endianness in computing refers to the arrangement of bytes inside a word of digital data stored in a computer's memory.

Big-endian or little-endian are the two main ways that endianness is stated.

The least significant byte in a word is kept at the largest memory location and the most significant byte is kept at the smallest address in a big-endian system.

The term "endianness" refers to the arrangement of bytes as they are stored in computer memory. Endianness is classified as big or little depending on which value is stored first.

Thus, for the endianness system to apply, a data type must be at least 2 bytes in size.

For more details regarding endianness system, visit:

https://brainly.com/question/14488920

#SPJ6

Return-from-trap instruction returns into the calling user program while simultaneously reducing the privilege level back to ________ Select one: a. User mode b. Kernel mode c. OS mode d. CPU mode

Answers

Answer:

A. user mode

Explanation:

A computer system is a machine that is run by a series of programs that connect the virtual parts (software) to the hardware or electronic parts. The kernel is a computer program that connects the software and hardware of a computer system.

The kernel-mode has several privileges like I/O, interrupts and traps, etc. This mode is tapped by root or administrators to utilize these privileges. Unlike the kernel mode, the user-mode does not have these functions, so a return from the trap instruction (kernel) reduces the privileges back to the user mode.

Which of the following online activities seem appropriate for the workplace? (select all that apply) A.watching a webinar to learn new job skills
B.watching TV online
C. seeking donations to support your election to the Senate
D. reading press releases from your company's competitors
E. sharing career advice with your peers
F. sharing company secrets in a public forum​

Answers

Answer:

A, D, and E

watching a webinar to learn new job skills

reading press releases from your company’s competitors

sharing career advice with your peers

Explanation:

got it right on edge2020

The online activities that seem appropriate for the workplace  is sharing career advice with your peers.

What are virtual activities?

The virtual activities are known to be any kind of online activities that is often done by people to make sure they have good and continued collaboration with other people.

Conclusively, Note that the use of online activities in the workplace should be the one that will help you and your peers to grow such as  sharing career advice with your peers.

Learn more about  online activities  from

https://brainly.com/question/13171394

PLEASE HELPP
Why do you think it is important to write your high school plan in middle school? Explain your answer in 3-4 well written sentences.

Answers

Answer:

Es muy importante que escriba su plan para la escuela secundaria antes de llegar a la escuela secundaria. Te da algo a lo que admirar cuando llegas a la escuela secundaria. Cuando lo complete, sabrá que hizo algo bien. Entonces puede establecer sus metas cada vez más altas, dándole la oportunidad de una buena vida.

4.8 code practice question 2 edhesive

Answers

Answer:

for y in range(88, 43, -4):

   print(y, end=" ")

Explanation:

yw

The code practice is an illustration of loops;

Loops are program statements that are used to perform iterative operations

The complete program in Python

The program in Python, where comments are used to explain each action is as follows:

#This iterates from 88 to 42, with a difference of -4

for i in range(88, 43, -4):

#This prints the numbers on a single line

   print(i, end=" ")

Read more about loops at:

https://brainly.com/question/24833629

#SPJ2

Write a program that computes the minimum, maximum, average, median and standard deviation of the population over time for a borough (entered by the user). Your program should assume that the NYC historical population data file, nycHistPop.csv is in the same directory.

Answers

Answer:

import pandas as pd

df = pd.read_csv('nycHistPop_csv', skiprows=5)

NY_region = list(df.columns[1: -1])

select_region = input("Enter region: ")_capitalize()

if select_region in NY_region:

   pass

else:

   raise("Region must be in New york")

def pop(location):

   # or used describe() to replace all like: print(df[location]_describe())

   print(df[location]_min())

   print(df[location]_max())

   print(df[location]_mean())

   print(df[location]_median())

   print(df[location]_td())

pop(select_region)

Explanation:

Pandas is a python packet that combines the power of numpy and matplotlib used for data manipulation. It is good for working with tables that are converted to dataframes.

The nycHistPop_csv file is read to the code to a dataframe called "df", then the user input and the function "pop" is used to automatically generate the statistics of a given region.

PLZ HELP!!!!!!!!! XC

what dose it mean if a circuit is hot to the touch

Answers

Answer:

The circuit is carrying more than it is supposed to and is overheating.

The series is overloaded

can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and communications facilities to organizations and individual users.

A)Global Communication


B)Social Media Platform


C)Internet


D)Technological Advancement

Answers

Answer:

Internet

Explanation:

just took the test and got A

When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the variablec) the length of the variabled) a copy of the variablee) the binary memory address

Answers

Answer:

The answer is "Option d".

Explanation:

In this question the choice d, that is "a copy of the variable" is correct because the method takes a reference value or a copy of the variable in its parameter, the example of this question can be defined as follows:

void me2(double x)//defining a method me2 with a double parameter

{

//method body

 }

double x = 35.655;//defining a double variable x

me2(x);//calling a method with passing the copy of th e variable

the formula to calculate percentage is the same as which other functions

Answers

Answer:

Division

Explanatio

Answer: everyone’s saying division, so I’m guessing the correct answer is division

Explanation: hope y’all have a blessed day

The task of handling how active processes are making efficient use of the CPU processing cycles is called_______?

Answers

Answer:

Scheduling.

Explanation:

A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

Hence, the task of handling how active processes are making efficient use of the central processing unit (CPU) processing cycles is called scheduling.

In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.

Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).

Other Questions
Why is it important now for HR management to transform from being primarily administrative and operational to becoming more of an overall strategic contributor to the organization?How have you seen this implemented in your workplace/former workplace? Can someone help me please the sum of two numbers is 52 the larger number is 4 more than 2 times the smaller number find both numbers let x be the smaller number A survey was conducted to see how many people ride a bus to school everyday. 160 people reported that they ride the bus to school everyday. This number represents 80% of the people surveyed how many people were surveyed. Can someone please find out what x is? Select the transformations of g(x) = |- 2x + 6| in relation to the parent function.A) Translated right 3 unitsB) Translated left 3 unitsC) Reflected over y-axisD) Reflected over x-axisE) Vertical StretchF) Horizontal Compression a) Los niosY las ninas no raconan.Que efectos tiene esta idea en losnios y las niois ? what do chemical reactions do What is 71283922222 E Times 78232 E Divide by 8326.291213? The nitrogen, oxygen, and other gases surrounding Earth A.are pulled toward Earth by gravityB.are found mainly near the outer edge of the atmosphereC.exert pressure only at sea levelD. exert pressure that works against atmospheric pressure The figure below shows two triangles on the coordinate grid: A coordinate grid is shown from positive 6 to negative 6 on the x axis and from positive 6 to negative 6 on the y axis. A triangle ABC is shown with vertex A on ordered pair 4, 1, vertex B on ordered pair 3, 1, and vertex C on ordered pair 3, 4. Another triangle A prime B prime C prime is shown with vertex A prime on ordered pair negative 4, 4, vertex B prime on ordered pair negative 3, 4, and vertex C prime on ordered pair negative 3, 1. What set of transformations is performed on triangle ABC to form triangle ABC? (5 points) A translation 5 units down, followed by a 180-degree counterclockwise rotation about the origin A translation 5 units down, followed by a 270-degree counterclockwise rotation about the origin A 180-degree counterclockwise rotation about the origin, followed by a translation 5 units down A 270-degree counterclockwise rotation about the origin, followed by a translation 5 units down Write the equation of the line that is parallel to the line y= 3x+ 6 and passes through the point (4, 7). My last question!!!! But what does it mean? Please help! Solve for y in terms of x: 3x = 15-5yHelppp vitamin c is 3/4 cup of orange juice Please tell me if they are a simile or metaphor: 1) Love like Salt. 2) Love like a Red, Red Rose find the length of side BD round your answer to the nearest hundred Choose the description that best matches the labeled part of the ear. How can you find the slope from a table? What are two common symptoms of major depression?A. obsessive thoughts and sleeplessnessB. losing items and misunderstanding wordsC. fatigue and lack of interest in activitiesD. hostility and delusional thinking